Explore topic-wise MCQs in Testing Subject.

This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.

1.

_______is a downloadable image recognition application by Google.

A. Google Images
B.        GoogleMovies
C. Google Goggles
D.        Google Video
Answer» D.        Google Video
2.

Google Now, an intelligent personal assistant by Google can provide_________.

A. Weather Information                  
B. Sports Updates
C. Nearby Events
D.        All of these
Answer» E.
3.

Live television, Video on Demand and time shifted television are services offered by _________.

A. IPTV                
B.        HTTV
C. VOTP              
D.        Colde TV
Answer» B.        HTTV
4.

Which of the following is an online multiplayer gaming and digital media service for Xbox One?

A. Xbox Station     
B. Xbox Shipping
C. Xbox Live  
D. Xbox Digital
Answer» D. Xbox Digital
5.

Identify the logo.

A. Wimax
B. Click Force
C. PlayStation Network       
D. Lulzsec Hackers
Answer» D. Lulzsec Hackers
6.

What is the output of the following Visual Basic code?  

A. HelloWorld    
B. Hello/World
C. Hello World    
D. helloworld
Answer» C. Hello World    
7.

In Visual Basic, the key to display the Properties window is _______.

A.   
B.                     
C.           
D.         
Answer» C.           
8.

The statements which control the flow of execution of a program are called conditional statements. VB provides two conditional statements which are______.

A. If _ _ Then _ _ Else and Select Case
B. If _ _ Then _ _ Else and Do While
C. Select Case and For _ _ Next
D. For Next and Do _ _ Loop
Answer» B. If _ _ Then _ _ Else and Do While
9.

A VB application works in three modes. Which among the following is NOT a valid mode?

A. Design mode                             
B. Run mode
C. Interaction mode
D. Break / suspended mode
Answer» D. Break / suspended mode
10.

What is the base of a user interface in a Visual Basic application?

A. Lable               
B. Text Box
C. Command Button
D.        Form
Answer» E.
11.

An environment that contains all tools and characteristics needed to create, run and test your program is called a/an ________.

A. IDE           
B. OOD
C. OOP                
D.        EIDE
Answer» B. OOD
12.

Which of the following string functions returns the numbers contained in a string as numeric values?

A. Val( )   
B.        lnstr( )
C. Len( )   
D.        Digit( )
Answer» B.        lnstr( )
13.

In Visual Basic, what value of the ScrollBars property in the properties of the textbox indicates that both horizontal and vertical scrollbars are included if you have set the MultiLine property as True?

A. 0                     
B. 1
C. 2                     
D. 3
Answer» E.
14.

The form interface in Visual Basic is shown here that adds the two numbers entered by the user. Which of the following codes is correct for adding two numbers?Assume the Name property of the controls as:(b) First Number TextBox : Text1(c) Second Number TextBox : Text2(d) Answer TextBox : Text3(e) add Command Button  : cmdAdd 

A. Private Sub cmdAdd_Click()Text3.Text=Val(Text1.Text)+Val(Text2.Text)End Sub
B. Private Sub cmdAdd_Click()Text1 .Text=Val (Text1 .Text) +Val (Text3. Text)End Sub 
C. Private Sub cmdAdd_Click()Text1.Text=Val(Text2.Text), Add, Val(Text3.Text)End Sub
D. Both [B] and [C]
Answer» B. Private Sub cmdAdd_Click()Text1 .Text=Val (Text1 .Text) +Val (Text3. Text)End Sub 
15.

You have designed a form in VB and now you want to view where it will be positioned on the screen at run time. Which of the following is a tool available in VB that gives you a thumbnail view of the current form and also let you move this thumbnail to change the position of form?

A. Project Explorer
B.        Menu Bar
C. Form Layout window
D. Object Browser
Answer» D. Object Browser
16.

Which of the statements marked as Line 1, Line 2, Line 3 and Line 4 will cause an error?  

A. Line 1              
B. Line 2
C. Line 3              
D. Line 4
Answer» B. Line 2
17.

Given here is the syntax of message box. What value should be entered for style value. If you want to display yes and no command buttons on the message box? MsgBox (Prompt, style value, title) 

A. 0
B. 1
C. 3                                 
D. 4
Answer» E.
18.

Match the components given in Column-I with the functions they provide given in Column-II. Column -IColumn -II(a) Form window(i) To write the instruction for any object.(b) Properties window(ii) Displays a list of forms and other objects that constitute an application.(c) Project Explorer window(iii) Used to place various controls on a blank area.(d) Code window(iv) Used to set the characteristic of forms and other controls placed on them. 

A. (a) - (iv), (b) - (iii), (c) - (i), (d) - (ii)
B. (a) - (iv), (b) - (i), (c) - (ii), (d) - (iii)
C. (a) - (iii), (b) - (iv), (c) - (ii), (d) - (i)
D. (a) - (iv), (b) - (i), (c) - (iii), (d) - (ii)
Answer» D. (a) - (iv), (b) - (i), (c) - (iii), (d) - (ii)
19.

Which of the following lines of code will display an input box and then store the value entered in an Input Box into a variable of integer type?

A. n = Input Box ("Enter number", Input, 0)
B. Input Box ('Enter number", Input, 0) = n
C. n = Val (Input Box ("Enter number", Input, 0))
D. All of these
Answer» B. Input Box ('Enter number", Input, 0) = n
20.

______ is used to display some text.

A. Label               
B.        Toolbox
C. Properties     
D.        IDE  
Answer» B.        Toolbox
21.

What would be the value of variable res after execution? res = 9 Mod 2+1-2 

A. -1
B. 3
C. 0                     
D. 4
Answer» C. 0                     
22.

A _____ is the primary work area where a user draws a GUI interface by placing several controls.

A. Toolbox
B.        Form window
C. Project window
D.        Properties
Answer» C. Project window
23.

Which is not a view for displaying a report object?

A.  Datasheet view             
B.  Design view
C.  Print preview                
D.  Layout preview
E.  None of these
Answer» B.  Design view
24.

DBMS full form is:

A.  Database Management System   
B.  Data Manage System
C.  Data Based Manage System      
D.  Database Managed System
E.  None of these
Answer» B.  Data Manage System
25.

In MS-Access 2013, text data type may contain maximum character of:

A.  255 character               
B.  256 characters
C.  2 characters                 
D.  8 characters
E.  None of these
Answer» B.  256 characters
26.

Query can be use to select data from:

A.  Single table                  
B.  Key record
C.  Unique key                   
D.  Field name
E.  None of these
Answer» D.  Field name
27.

Queries in Access can be used as:

A.  View, change and analyze data in different ways
B.  A source of records for forms and reports
C.  Name of fields, field type and size
D.  Both [a] and [b]
E.  None of these
Answer» E.  None of these
28.

A ______ name must be unique with a database.

A.  Table         
B.  Field
C.  Record                         
D.  Text
E.  None of these
Answer» B.  Field
29.

This option allows you to build a new table by entering data directly into the datasheet.

A.  Datasheet view             
B.  Design view
C.  Link table                    
D.   [a] and [b]
E.  None of these
Answer» B.  Design view
30.

This key uniquely identifies each record:

A.  Primary key
B.  Key record
C.  Unique key                   
D.  Field name
E.  None of these
Answer» B.  Key record
31.

To create a table in MS-Access 2013:

A.  Database should be created before create table.
B.  Table can be created using table templates.
C.  There must be at least one Primary key in a table.
D.  All of these
E.  None of these
Answer» D.  All of these
32.

Steve wants to convert 10111 to decimal number. Which one of the following is the correct conversion?

A.  48                               
B.  23
C.  29                               
D.  3000
E.  None of these
Answer» C.  29                               
33.

NOR is a complement of:

A.  AND                         
B.  OR
C.  XOR              
D.  Both [a] and [b]
E.  None of these
Answer» C.  XOR              
34.

\[X.{{X}^{1}}\] is equal to:

A.  1              
B.  0
C.  X                                
D. \[{{X}^{1}}\]
E.  None of these
Answer» B.  0
35.

A Boolean function may be transformed into:

A.  logical diagram             
B.  logical graph
C.  matrix            
D.  All of these
E.  None of these
Answer» B.  logical graph
36.

The hexadecimal number system is based on 16. Which one of the following is an example of hexadecimal number?

A.  232G                          
B.  137H
C.  120AG                        
D.  121BC
E.  None of these
Answer» E.  None of these
37.

The _____ rule is used to make sure that the property always be applied whether another property appears in CSS.

A.  @important                 
B.  #important
C.  !important                    
D.  !first
E.  None of these
Answer» D.  !first
38.

The different ways to associate styles with a HTML document is/are:

A.  Embedded CSS with <style> element
B.  Inline CSS with style attribute.
C.  External CSS with <link> element.
D.  All of the above
E.  None of these
Answer» E.  None of these
39.

How do you add a background color for all elements?

A.  all. h1 {background-color:#FFFFFF}
B.  h1. all {background-color:#FFFFFF}
C.  h1 {background-color:#FFFFFF}
D.  h1 {background-color;#FFFFFF}
E.  None of these
Answer» D.  h1 {background-color;#FFFFFF}
40.

How do you insert a comment in a CSS file?

A.  / / this is a comment / /
B.  / * this is a comment * /
C.  ' this is a comment
D.  / / this is a comment
E.  None of these
Answer» C.  ' this is a comment
41.

Which HTML tag is used to define an internal style sheet?

A.  <style>                        
B.  <css>
C.  <script>                       
D.  <internal>
E.  None of these
Answer» E.  None of these
42.

Where in an HTML document is the correct place to refer to an external style sheet?

A.  At the end of the document
B.  In the <head> section
C.  At the top of the document
D.  In the <body> section
E.  None of these
Answer» C.  At the top of the document
43.

The technology that creates a secure and private connection between two or more computers is called a _________.

A. Network Tethering          
B. Encryption
C. FTP                 
D.        Secure Socket Layer
Answer» E.
44.

A low power WLAN technology that facilitates interoperability among smartphones and portable consumer devices such as headphones fitness accessories and heart rate monitor. It is also called "Bluetooth 4.0".

A. Bluetooth Smart Ready  
B. Bluetooth Berry casting
C. Bluetooth Handoff         
D. Podcasts
Answer» B. Bluetooth Berry casting
45.

Rerouting from a requested site to an undesired site without your intervention is called ______.

A. Pharming     
B.        Spamming
C. Hijacking          
D. Trapping
Answer» B.        Spamming
46.

Identify the virus. 1. It was distributed by David L. Smith. 2. It was distributed as e-mail attachment.

A. Melissa      
B. Code Red
C. Blue Whale                   
D. ILOVEYOU 
Answer» B. Code Red
47.

When you copy the address book contents of one of your mobile phones to another mobile phone, where both your phones are in your two hands, you may be using ____ technology.

A. Parallel             
B.        Bluetooth
C. Fidelity             
D.        Personal
Answer» C. Fidelity             
48.

Which of the following technologies uses encryption to protect the privacy of all your data transmissions between two points?

A. Secure Socket Layer       
B. Virtual Private Network
C. Transport Layer Security 
D. All of these
Answer» B. Virtual Private Network
49.

In which of the following ways computer worm spreads? (i) Via e-mail attachments (ii) Via hyperlinks to web or any such source or network (iii) Via peer to peer networks

A. Only (i)                         
B. Only (ii)
C. Only (iii)           
D.                    All (i), (ii) and (iii)
Answer» E.
50.

Match the following.Column - IColumn - II(a) Password(i) Detects and removes viruses and other malicious software from the computer.(b) Antivirus software(ii) Protects information by converting it into unreadable code that cannot be deciphered easily by unauthorized people.(c) Firewall(iii) Secret sequence of characters that enables a user to control access to a computer program of file.(d) Disk Encryption (iv) A security system designed to protect a computer from hacker attacks. 

A. (a) - (iv), (b) - (i), (c) - (i), (d) - (ii)
B. (a) - (iv), (b) - (i), (c) - (ii), (d) - (iii)
C. (a) - (iv), (b) - (iii), (c) - (i), (d) - (ii)
D. (a) - (iii), (b) - (i), (c) - (iv), (d) - (ii)
Answer» E.