0% found this document useful (0 votes)
62 views59 pages

Model Question

model

Uploaded by

abdumulate16
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
62 views59 pages

Model Question

model

Uploaded by

abdumulate16
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 59

In which phase of the SDLC is a feasibility study conducted?

a.
Design

b.
Implementation

c.
Planning

d.
Requirement Analysis
Feedback
The correct answer is: Planning
Question 2
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
What is the time complexity of the binary search algorithm?

a.
O(n log n)

b.
O(log n)

c.
O(1)

d.
ONo
Feedback
The correct answer is: O(log n)
Which data structure is typically used in a compiler for storing tokens during lexical analysis
a.
Abstract Syntax Tree (AST)
b.
Symbol Table
c.
Parse Tree
d.
Token Stream
Feedback
The correct answer is: Token Stream
Question 4
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Question text
Which HTML attribute is used to define inline styles?
a.
style
b.
styles
c.
class
d.
font
Feedback
The correct answer is: styles
Question 5
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Question text
Which performance enhancement technique involves splitting a CPU's resources to execute multiple
threads simultaneously?
a.
Multicore Processing
b.
Pipelining
c.
Parallel Processing
d.
Hyper-Threading
Feedback
The correct answer is: Hyper-Threading
Question 6
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
Which data type in C++ is used to store single characters?
a.
int
b.
char
c.
float
d.
string
Feedback
Your answer is correct.
The correct answer is:
char
Question 7
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
In which topology do all devices have a dedicated point-to-point link to a central hub?
a.
Ring
b.
Mesh
c.
Star
d.
Bus
Feedback
The correct answer is: Star
Question 8
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
In the Von Neumann architecture, which of the following components is used to store both data and
instructions?
a.
Control Unit
b.
I/O Devices
c.
Main Memory
d.
ALU (Arithmetic Logic Unit)
Feedback
The correct answer is: Main Memory
Question 9
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Question text
Which protocol is used to find the hardware address of a local device?

a.
ARP

b.
ICMP

c.
IP

d.
RARP
Feedback
The correct answer is: ARP
Question 10
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Question text
What is the term for a software vulnerability that allows an attacker to execute arbitrary code on a
target system?

a.
Cross-Site Scripting

b.
Phishing

c.
SQL Injection

d.
Buffer overflow
Feedback
The correct answer is: Buffer overflow
Question 11
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
To ensure integrity of the data, a database system should ensure transactions to possess certain
properties. The property which make sure that the partial effects of incomplete transactions should
not visible to the other transactions is called

a.
Atomicity

b.
Consistency

c.
Durability

d.
Isolation
Feedback
The correct answer is: Isolation
Question 12
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
What is the primary goal of using cache memory in a computer system?

a.
To reduce the time it takes to access data from the main memory

b.
To increase the storage capacity

c.
To improve graphical processing

d.
To enhance security features
Feedback
The correct answer is: To reduce the time it takes to access data from the main memory
Question 13
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
What is the main difference between TCP and UDP?

a.
TCP is connection-oriented, UDP is connectionless

b.
TCP is connectionless, UDP is connection-oriented
c.
Both are connectionless

d.
Both are connection-oriented
Feedback
The correct answer is: TCP is connection-oriented, UDP is connectionless
Question 14
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
Which concept in system administration emphasizes the important of regularly backing up data?

a.
Disaster recovery

b.
Load balancing

c.
Fault tolerance

d.
Redundancy
Feedback
The correct answer is: Disaster recovery
Question 15
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Question text
A person wants to visit some places. He starts from a vertex and then wants to visit every vertex till it
finishes from one vertex, backtracks and then explore other vertex from same vertex. What algorithm
he should use?

a.
Trim’s algorithm

b.
Depth First Search

c.
Kruskal’s Algorithm

d.
Breadth First Search
Feedback
The correct answer is: Depth First Search
Question 16
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
public class Main {

public static void main(String[] args) {

Test obj1 = new Test();

Test obj2 = new Test();

obj1.value = 10;

obj2.value = 20;

System.out.println(obj1.value + " " + obj2.value);

class Test {
int value;

a.
10 10

b.
20 20

c.
10 20

d.
20 10

Feedback
Your answer is correct.
The correct answer is:
10 20

Question 17
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Question text
Which algorithm design technique is used in the greedy approach to the Activity Selection problem?

a.
Divide-and-conquer
b.
Sorting and selection

c.
Dynamic programming

d.
Backtracking
Feedback
The correct answer is: Sorting and selection
Question 18
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Question text
Which scripting technique is commonly used for monitoring system resources ,such as CPU, usage and
memory utilization ?

a.
Log parsing

b.
Signal handling

c.
System calls

d.
Performance counters
Feedback
The correct answer is: System calls
Question 19
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Question text
public class Main {
public static void main(String[] args) {

int x = 10;

if (x > 5) {

System.out.print("A");

} else if (x > 8) {

System.out.print("B");

} else {

System.out.print("C");

a.
C

b.
B

c.
A

d.
AB

Feedback
Your answer is incorrect.
The correct answer is:
A

Question 20
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Question text
What is the result of the following postfix expression 2 3 * 2 1 - / 5 4 * +

a.
24

b.
22

c.
26

d.
28
Feedback
The correct answer is: 26
Question 21
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Question text
What is the primary objective of artificial intelligence in gaining insight into intelligence and
perceptions?

a.
Analyze large datasets efficiently
b.
Improve natural language processing

c.
Replicate human intelligence and perception

d.
Enhance computer processing power
Feedback
The correct answer is: Replicate human intelligence and perception
Question 22
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
What is the time complexity of inserting an element into a binary search tree (BST) on average?

a.
O(n log n)

b.
ONo

c.
O(log n)

d.
O(1)
Feedback
The correct answer is: O(log n)
Question 23
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
In a school database, each teacher can teach multiple subjects, and each subject can be taught by
multiple teachers. How should you model this many-to-many relationship?
a.
By combining Teacher and Subject tables into a single table

b.
By creating a TeacherSubject junction table with foreign keys to both Teacher and Subject tables

c.
By adding a TeacherID column to the Subject table

d.
By adding a SubjectID column to the Teacher table
Feedback
The correct answer is: By creating a TeacherSubject junction table with foreign keys to both Teacher
and Subject tables
Question 24
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
What is the time complexity of the Kruskal's algorithm for finding the Minimum Spanning Tree?

a.
O(n^2)

b.
O(log n)

c.
O(n log n)

d.
O(1)
Feedback
The correct answer is: O(n log n)
Question 25
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Question text
What is the primary difference between a Deterministic Finite Automaton (DFA) and a Non-
Deterministic Finite Automaton (NFA)?

a.
A DFA uses a stack, while an NFA does not

b.
A DFA can have multiple transitions for a single input symbol from a state, while an NFA cannot

c.
A DFA is used for recognizing context-free languages, while an NFA is used for regular languages

d.
An NFA can have multiple transitions for a single input symbol from a state, while a DFA cannot
Feedback
The correct answer is: An NFA can have multiple transitions for a single input symbol from a state,
while a DFA cannot
Question 26
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Question text
What is the key principle of system administration?

a.
Least privilege

b.
Agile development

c.
Window programming

d.
Cloud computing
Feedback
The correct answer is: Least privilege
Question 27
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
Consider the given graph. What is the weight of the minimum spanning tree using the Kruskal’s
algorithm?

a.
15

b.
19

c.
24

d.
23

Feedback
Your answer is correct.
The correct answer is:
19

Question 28
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
What is the purpose of the Program Counter (PC) in CPU operations?
a.
To hold the address of the next instruction to be executed

b.
To store the current instruction being executed

c.
To store data temporarily

d.
To manage input and output operations
Feedback
The correct answer is: To hold the address of the next instruction to be executed
Question 29
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
What is the primary advantage of FAT32 over NTFS in terms of compatibility?

a.
Advanced security features

b.
Wider compatibility with various operating systems

c.
Larger maximum file size

d.
Better performance
Feedback
The correct answer is: Wider compatibility with various operating systems
Question 30
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Question text
Given the grammar rule S → aSb | ε, what kind of strings does this grammar generate?

a.
Palindromic strings of 'a' and 'b'

b.
Strings with equal numbers of 'a's and 'b's in any order

c.
Strings of balanced parentheses

d.
Strings with a prefix of 'a's followed by the same number of 'b's
Feedback
The correct answer is: Strings with a prefix of 'a's followed by the same number of 'b's
Question 31
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Question text
Which type of attack involves overwhelming a network with excessive traffic?

a.
Spoofing

b.
Phishing

c.
Man-in-the-Middle

d.
Denial-of-Service
Feedback
The correct answer is: Denial-of-Service
Question 32
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Question text
Which of the following is not a command of DDL?

a.
Create

b.
Update

c.
Alter

d.
Drop
Feedback
The correct answer is: Update
Question 33
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Question text
public class Main {

public static void main(String[] args) {

int[] arr = {1, 2, 3, 4, 5};

for (int i = 0; i < arr.length; i++) {

if (i % 2 == 0) {

continue;

System.out.print(arr[i] + " ");


}

a.
24

b.
135

c.
12345

d.
246

Feedback
Your answer is incorrect.
The correct answer is:
24

Question 34
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
What is the role of the symbol table in a compiler?

a.
To keep track of variables, functions, and their attributes

b.
To store the syntax rules of the programming language

c.
To hold machine code instructions

d.
To store intermediate code
Feedback
The correct answer is: To keep track of variables, functions, and their attributes
Question 35
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Question text
Of the following which one is multi-valued attribute.

a.
Name

b.
ID

c.
Date_of_birth

d.
Phone_number
Feedback
The correct answer is: Phone_number
Question 36
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
How can you create an e-mail link?

a.
&lt;a href="a@b"&gt;
b.
&lt;mail&gt;a@b&lt;/mail&gt;

c.
&lt;a href="mailto:[email protected]"&gt;

d.
&lt;mail href="a@b"&gt;
Feedback
The correct answer is: &lt;a href="mailto:[email protected]"&gt;
Question 37
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Question text
Which service allows multiple devices to share a single public IP address?

a.
RTP

b.
HTTP

c.
DNS

d.
NAT
Feedback
The correct answer is: NAT
Question 38
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Question text
Which C++ library is used for file input and output operations?
a.
string

b.
cstdio

c.
iostream

d.
fstream

Feedback
Your answer is incorrect.
The correct answer is:
fstream

Question 39
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Question text
Which mode open a file for read/write and the existing data in file is preserved?

a.
a+

b.
x+

c.
a

d.
w+
Feedback
The correct answer is: a
Question 40
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Question text
What is the correct syntax for declaring an array in Java?

a.
int arr[] = new int[5];

b.
int arr[5] = new int[];

c.
int arr[] = new int[5];

d.
int arr = new int[5];
Feedback
The correct answer is: int arr[] = new int[5];
Question 41
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
What is the main advantage of using virtual memory?

a.
It increases the speed of the CPU

b.
It prevents process swapping

c.
It eliminates the need for a hard disk
d.
It allows the execution of larger programs than the physical memory
Feedback
The correct answer is: It allows the execution of larger programs than the physical memory
Question 42
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
Which technique involves executing multiple instructions simultaneously by dividing them into
separate stages?

a.
Pipelining

b.
Branch Prediction

c.
Multithreading

d.
Cache Memory
Feedback
The correct answer is: Pipelining
Question 43
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
What does DNS stand for?

a.
Domain Name System

b.
Digital Network Service
c.
Data Network System

d.
Domain Network System
Feedback
The correct answer is: Domain Name System
Question 44
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
Which type of memory is volatile and loses its content when power is turned off?

a.
EEPROM

b.
ROM

c.
Flash Memory

d.
RAM
Feedback
The correct answer is: RAM
Question 45
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
What is the process of converting plain text to cipher text called?

a.
Hashing
b.
Decryption

c.
Key Transfer

d.
Encryption
Feedback
The correct answer is: Encryption
Question 46
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Question text
Maximum number of nodes in binary tree of height 4 is?

a.
16

b.
31

c.
30

d.
32
Feedback
The correct answer is: 31
Question 47
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
Which of the following is NOT a necessary condition for a deadlock to occur?

a.
Mutual exclusion

b.
Hold and wait

c.
Circular wait (processes waiting for resources held by each other)

d.
Preemption (forced release of resources)
Feedback
The correct answer is: Preemption (forced release of resources)
Question 48
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
Which data type in C++ is used to store single characters?

a.
char

b.
int

c.
string

d.
float

Feedback
Your answer is correct.
The correct answer is:
char

Question 49
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Question text
The type of learning algorithm aims to mimic the structure and function of human brain is called
_____?

a.
Reinforcement learning

b.
Unsupervised learning

c.
Deep learning

d.
Supervised learning
Feedback
The correct answer is: Deep learning
Question 50
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
Which HTML tag is used to define an internal style sheet?

a.
&lt;style&gt;

b.
&lt;css&gt;

c.
&lt;script&gt;
Feedback
The correct answer is: &lt;style&gt;
Question 51
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
ou are tasked with designing a database for a company's human resources system. Which of the
following best describes the relationship between the Employee table and the Department table if
each employee belongs to exactly one department and each department can have multiple
employees?

a.
One-to-Many

b.
Many-to-Many

c.
Many-to-One

d.
One-to-One
Feedback
The correct answer is: One-to-Many
Question 52
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Question text
Segmentation of a data stream happens at which layer of the OSI model?

a.
Network

b.
Data Link
c.
Physical

d.
Transport
Feedback
The correct answer is: Transport
Question 53
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Question text
Which of the following is a common authentication factor used in two-factor authentication?

a.
Ask Security question

b.
OTP

c.
Username

d.
Password
Feedback
The correct answer is: OTP
Question 54
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Question text
Which class of IP address provides a maximum of only 254 host addresses per network ID?

a.
Class D

b.
Class A

c.
Class C

d.
Class B
Feedback
The correct answer is: Class C
Question 55
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
What will be the output of the following fragment of code

#include <iostream>

using namespace std;

int main() {

int arr[] = {10, 20, 30, 40};

cout << arr[2];

return 0;

a.
30
b.
40

c.
20

d.
10

Feedback
Your answer is correct.
The correct answer is:
30

Question 56
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
Consider the given graph. What is the weight of the minimum spanning tree using the Kruskal’s
algorithm?

a.
19

b.
24

c.
23

d.
15

Feedback
Your answer is correct.
The correct answer is:
19

Question 57
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
The practice of hiding confidential data within other data called ____?

a.
IDS

b.
Steganography

c.
Encryption

d.
Decryption
Feedback
The correct answer is: Steganography
Question 58
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
Which skill is important for a system administrator to possess?
a.
Database query optimization

b.
Network cable installation

c.
Troubleshooting and problem-solving

d.
Graphics design
Feedback
The correct answer is: Troubleshooting and problem-solving
Question 59
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Question text
In the context of operating systems, what is "thrashing"?

a.
A method of disk scheduling

b.
A technique for improving cache performance

c.
A way to manage deadlocks

d.
A high paging activity that degrades performance
Feedback
The correct answer is: A high paging activity that degrades performance
Question 60
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
Which data structure is best suited for implementing a graph?

a.
Array

b.
Linked list

c.
Binary search tree

d.
Adjacency matrix
Feedback
The correct answer is: Adjacency matrix
Question 61
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Question text
Among the phases given below on waterfall model which phase takes the longest time?

a.
Testing phase

b.
Analysis and requirement phase

c.
Integrating phase

d.
Maintenance
Feedback
The correct answer is: Maintenance
Question 62
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
Which of the following is not a Java keyword?

a.
interface

b.
class

c.
extends

d.
virtual
Feedback
The correct answer is: virtual
Question 63
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Question text
During which phase of the compiler is a parse tree generated?

a.
Lexical Analysis

b.
Semantic Analysis

c.
Code Optimization

d.
Syntax Analysis
Feedback
The correct answer is: Syntax Analysis
Question 64
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
What is the output of the following code snippet?

public class Test {

public static void main(String[] args) {

Test obj = new Test();

obj.myMethod();

public void myMethod() {

System.out.println("Hello, World!");

a.
Compilation Error

b.
Hello, World!

c.
No Output
d.
Runtime Error

Feedback
Your answer is correct.
The correct answer is:
Hello, World!

Question 65
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
What is the primary goal of normalization in database design?

a.
To increase data redundancy

b.
To simplify the database schema

c.
To reduce data redundancy and improve data integrity

d.
To improve query performance
Feedback
The correct answer is: To reduce data redundancy and improve data integrity
Question 66
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Question text
Which of the following is NOT a common security policy?

a.
Firewall Configuration
b.
Open wireless network access

c.
Password complexity requirements

d.
Regular data backups
Feedback
The correct answer is: Open wireless network access
Question 67
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Question text
The correct why of opening a file test.txt as read only?

a.
open("test.txt");C. fopen("test.txt","r+");

b.
fread("test.txt","r");

c.
open("test.txt","read");

d.
fopen("test.txt","r");
Feedback
The correct answer is: fread("test.txt","r");
Question 68
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Question text
Which technique is used to make predictions or decisions based on probabilistic model?

a.
Decision tree

b.
Markov models

c.
Support vector machines

d.
Reinforcement learning
Feedback
The correct answer is: Markov models
Question 69
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Question text
What is the purpose of a fire wall in computer Security?

a.
To monitor and control network traffic

b.
To detect and remove malware

c.
To authenticate users

d.
To encrypt network traffic
Feedback
The correct answer is: To monitor and control network traffic
Question 70
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
Which of the following is false about Waterfall Model?
a.
There is overlapping in the phases.

b.
It is also known as the linear sequential model.

c.
Development of the next phase starts only when the previous phase is complete.

d.
The outcome of one phase is the input for the next phase.
Feedback
The correct answer is: There is overlapping in the phases.
Question 71
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
What is the correct way to select a database created using php?

a.
mysqli_select_db ("dbName");

b.
mysqli_query_db("dbName");

c.
mysqli_connect("localhost", "root", "");
Feedback
The correct answer is: mysqli_select_db ("dbName");
Question 72
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Question text
What is the time complexity of retrieving an element from a HashMap by key?
a.
O(n log n)

b.
O(1)

c.
O(log n)

d.
ONo
Feedback
The correct answer is: O(1)
Question 73
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
In database design, what is a 'foreign key'?

a.
A key that can contain null values

b.
A key used to enforce referential integrity between tables

c.
A key used to uniquely identify a row in a table

d.
A primary key in a different database
Feedback
The correct answer is: A key used to enforce referential integrity between tables
Question 74
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
Which of the following is an example of a syntactic error in programming?

a.
Dividing by zero

b.
Using an undeclared variable

c.
Type mismatch between variables

d.
Missing a semicolon at the end of a statement
Feedback
The correct answer is: Missing a semicolon at the end of a statement
Question 75
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
Which of the following is not a pillar of Object-Oriented Programming?

a.
Polymorphism

b.
Compilation

c.
Encapsulation

d.
Inheritance
Feedback
The correct answer is: Compilation
Question 76
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Question text
Which knowledge representation techniques uses logical rules and inference mechanisms?

a.
Production systems

b.
Bayesian networks

c.
Semantic networks

d.
Neural networks
Feedback
The correct answer is: Production systems
Question 77
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
Which refers to a property of computer to run several operation simultaneously and possible as
computers await response of each other:

a.
Backup

b.
Deadlock

c.
Concurrency

d.
Recovery
Feedback
The correct answer is: Concurrency
Question 78
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
Which area of AI research focuses on understanding and replicating human vision?

a.
NLP

b.
Expert system

c.
Computer vision

d.
Robotics
Feedback
The correct answer is: Computer vision
Question 79
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
What is the purpose of access control in network and system administration?

a.
Controlling user access to resource

b.
Performing system backups

c.
Monitoring network traffics

d.
Limiting physical access to servers
Feedback
The correct answer is: Controlling user access to resource
Question 80
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
Which of the following is the first phase of a compiler?

a.
Semantic Analysis

b.
Lexical Analysis

c.
Syntax Analysis

d.
Code Generation
Feedback
The correct answer is: Lexical Analysis
Question 81
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Question text
How can you make a list that lists the items with numbers?

a.
&lt;ol&gt;

b.
&lt;dl&gt;

c.
&lt;list&gt;
d.
&lt;ul&gt;
Feedback
The correct answer is: &lt;ol&gt;
Question 82
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
Which of the following grammars can be used to describe the syntax of programming languages?

a.
Unrestricted Grammar

b.
Context-Free Grammar

c.
Context-Sensitive Grammar

d.
Regular Grammar
Feedback
The correct answer is: Context-Free Grammar
Question 83
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Question text
Which of the following operating systems is an example of an open-source operating system?

a.
Unix

b.
macOS

c.
Linux

d.
Windows
Feedback
The correct answer is: Linux
Question 84
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Question text
What will be the output of the below code?

#include <iostream>

using namespace std;

int main() {

int arr[] = {10, 20, 30, 40};

int *p = arr;

p += 2;

cout << *p << " ";

p--;

cout << *p;

a.
40 30
b.
10 20

c.
30 10

d.
30 20

Feedback
Your answer is incorrect.
The correct answer is:
30 20

Question 85
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
Which protocol is used for secure web browsing?

a.
FTP

b.
HTTP

c.
HTTPS

d.
SMTP
Feedback
The correct answer is: HTTPS
Question 86
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
Which of the following is used to destroy the session?

a.
unset() function

b.
session_start() function

c.
isset() function

d.
$_SESSION[]
Feedback
The correct answer is: unset() function
Question 87
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
Which reasoning technique involves drawing conclusions from specific observations or examples?

a.
Probabilistic reasoning

b.
Abductive reasoning

c.
Deductive reasoning

d.
Inductive reasoning
Feedback
The correct answer is: Inductive reasoning
Question 88
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Question text
What is asymptotic small-oh and small omega notation for the functions fNo = 10n2+logNo and f(x) =
2x3 + xlogx respectively?

a.
o(nlogn), Ω(x3)

b.
o(n3logn), Ω(x2logx)

c.
o(logn), Ω(x3logx)

d.
o(n3), Ω(x2)
Feedback
The correct answer is: o(n3), Ω(x2)
Question 89
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Question text
public class Main {

Find Output

public static void main(String[] args) {

int a = 10;

int b = 20;

int c = a++ + ++b;


System.out.println("a: " + a + ", b: " + b + ", c: " + c);

a.
a: 10, b: 21, c: 30

b.
a: 11, b: 21, c: 31

c.
a: 10, b: 21, c: 31

d.
a: 11, b: 20, c: 31

Feedback
Your answer is incorrect.
The correct answers are:
a: 11, b: 20, c: 31, a: 11, b: 21, c: 31

Question 90
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
Which is the correct CSS syntax?

a.
body:color=black
b.
{body:color=black(body}

c.
{body;color:black}

d.
body {color: black}
Feedback
The correct answer is: body {color: black}
Question 91
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Question text
Which of the following is a distributed database?

a.
A single logical database that is limited to one location

b.
A loose collection of a file that is spread to multiple locations and is interconnected by a network

c.
A single double logical database that is limited to one location

d.
A single logical database that is spread to multiple locations and is interconnected by a network
Feedback
The correct answer is: A loose collection of a file that is spread to multiple locations and is
interconnected by a network
Question 92
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
Which of the following is the correct sequence of steps in the Fetch-Decode-Execute cycle of a CPU?
a.
Decode, Fetch, Execute, Write-back

b.
Fetch, Decode, Execute, Write-back

c.
Fetch, Decode, Execute, Store

d.
Fetch, Execute, Decode, Write-back
Feedback
The correct answer is: Fetch, Decode, Execute, Write-back
Question 93
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
What is the term used for a software program that attempts to gain unauthorized access to computer
System?

a.
Decryption

b.
Encryption

c.
VPN

d.
Malware
Feedback
The correct answer is: Malware
Question 94
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
Which of the following models involves executing several iterations of development before a final
release?

a.
Agile Model

b.
V-Model

c.
Waterfall Model

d.
Big Bang Model
Feedback
The correct answer is: Agile Model
Question 95
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Question text
In the context of graph traversal, which of the following algorithms uses a queue?

a.
Depth-First Search (DFS)

b.
Dijkstra's Algorithm

c.
Kruskal's Algorithm

d.
Breadth-First Search (BFS)
Feedback
The correct answer is: Breadth-First Search (BFS)
Question 96
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
What is the main purpose of a kernel in an operating system?

a.
To manage hardware resources and system calls

b.
To handle network connections

c.
To compile application programs

d.
To provide a user interface
Feedback
The correct answer is: To manage hardware resources and system calls
Question 97
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Question text
If a node having two children is deleted from a binary tree, it is replaced by its

a.
Preorder successor

b.
Preorder predecessor

c.
In order predecessor

d.
In order successor
Feedback
The correct answer is: In order successor
Question 98
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
Which of the following is an example of an input device?

a.
Keyboard

b.
Monitor

c.
Hard Drive

d.
Printer
Feedback
The correct answer is: Keyboard
Question 99
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
Software testing used to check the source code?

a.
Grey box testing

b.
White-box testing

c.
Black box testing

d.
Red box testing
Feedback
The correct answer is: White-box testing
Question 100
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
Which security requirement is critical for protecting sensitive data in a database?

a.
Scalability

b.
Concurrency

c.
Confidentiality

d.
Availability
Feedback
The correct answer is: Confidentiality

You might also like