Explore topic-wise MCQs in Agilent.

This section includes 49 Mcqs, each offering curated multiple-choice questions to sharpen your Agilent knowledge and support exam preparation. Choose a topic below to get started.

1.

From the following which of the statement is true

A. Any procedure cannot raise an error and return a system message and error number
B. Error numbers ranging from 20000 to 20999 are system defined error messages
C. Oracle checks uniqueness of user defined messages
D. The Raise_Application_Error is used for raising user defined error messages.
Answer» E.
2.

Networking : The loss in signal power as light travels down the fiber is called

A. attenuation
B. progragation
C. scattering
D. interruption
Answer» B. progragation
3.

Networking: You want to implement a mechanism that automates the IP configuration, including IP address, subnet mask, default gateway, and DNS information. Which protocol will you use to accomplish this?

A. SMTP
B. SMNP
C. DHCP
D. ARP
Answer» D. ARP
4.

Networking: Frames from one LAN can be transmitted to another LAN via the device

A. Router
B. Bridge
C. repeater
D. Modem
Answer» C. repeater
5.

Networking: Print server uses ________ which is a buffer that holds data before it is sent to the printer.

A. Queue
B. Spool
C. Node
D. Stack
Answer» C. Node
6.

Networking: Communication circuits that transmit data in both directions but not at the same time are operating in

A. a simplex mode
B. a half duplex mode
C. a full duplex mode
D. an asynchronous mode
Answer» C. a full duplex mode
7.

C++: What does C++ append to the end of a string literal constant?

A. a space
B. a number sign (#)
C. an asterisk (*)
D. a null character
Answer» B. a number sign (#)
8.

C++: A constructor

A. Constructs new data type
B. Enables the initialization of an object as it is created
C. Obtain memory for a new variable
D. None of the above
Answer» C. Obtain memory for a new variable
9.

C++: Which of the following can not be used as identifiers?

A. Lettersscope resolution operator in c++
B. Digits
C. Underscores
D. Spaces
Answer» E.
10.

C++: The keyword used to transfer control from a function back to the calling function is

A. switch
B. goto
C. go back
D. return
Answer» E.
11.

C++: When a copy of an entire object is passed to a function, then it is referred to as

A. Pass-by-reference
B. Pass-by-pointer
C. Pass-by-value
D. None of the above
Answer» D. None of the above
12.

Java: The comment must begin with /* and end with */ is known as?

A. Multiline comment
B. Single line comment
C. Both A & B
D. None of the above
Answer» B. Single line comment
13.

Which specification that provides runtime environment in which java byte code can be executed?

A. JDK
B. JVM
C. JRE
D. None of the above
Answer» C. JRE
14.

Java Virtual Machine is platform independent?

A. True
B. False
Answer» C.
15.

Which is used for Java Virtual Machine "assembly language", its opcodes and operands, as well as items in the Java Virtual Machine's run-time data areas?

A. ASCII
B. Italic
C. Latin
D. Greek
Answer» C. Latin
16.

Java: In this type one super-class is having more than one sub-class?

A. Hierarchical inheritance
B. Single inheritance
C. Multiple inheritances
D. Multilevel inheritance
Answer» B. Single inheritance
17.

Java: Which provides a new way for your programs to interface with code libraries written in other languages?

A. JNI
B. JDBC
C. RMI
D. GUI
Answer» B. JDBC
18.

Java language was initially called as 'Oak'

A. True
B. False
Answer» B. False
19.

Algorithms: What will be the Huffman code for the letters a,b,c,d,e?

A. 0,10,110,1110,1111
B. 10,011,11,001,010
C. 10,01,0001,100,1010
D. 100,110,001,000,010
Answer» B. 10,011,11,001,010
20.

Algorithms: Consider a B-tree of order 4 and is built from scratch by 10 successive insertions. What would be the maximum number of node splitting operations that take place?

A. 6
B. 3
C. 4
D. 2
Answer» E.
21.

Algorithms: From the following algorithm design techniques which one is used to find all the pairs of shortest distances in a graph?

A. Backtracking
B. Greedy
C. Dynamic programming
D. Divide
Answer» D. Divide
22.

What is the responsibility of the buffer manager?

A. Fetching data from disk storage into main memory, and deciding what data to cache in main memory.
B. Allocation of space on disk storage and the data structures used to represent information stored on disk.
C. Storing details such as how many users, which user has which permissions etc.
D. None of the above
Answer» B. Allocation of space on disk storage and the data structures used to represent information stored on disk.
23.

The problem caused by independent multivalued dependencies is eliminated in which of the normal form?

A. 3NF
B. BCNF
C. 4NF
D. 5NF
Answer» D. 5NF
24.

Which is not the relational algebra operator?

A. Set difference
B. Cartesian product
C. Rename
D. Join
Answer» B. Cartesian product
25.

An attribute or combination of attributes in one table whose values must either match the primary key in another table or be null is called __________.

A. Secondary Key
B. Super key
C. Candidate Key
D. Foreign Key
Answer» E.
26.

A transaction state changes from active to______, after the transaction has been rolled back and the database restored to its state prior to the start of the transaction.

A. Partially committed
B. Committed
C. Aborted
D. Failed
Answer» D. Failed
27.

How is specialization denoted in an ER Diagram?

A. Triangle labeled IS A
B. Rectangle labeled IS A
C. Rectangle Labeled HAS A
D. Triangle labeled HAS A
Answer» B. Rectangle labeled IS A
28.

What is Degree of relationships?

A. number of participating entity types
B. number of participating relations
C. number of participating attribute types
D. number of participating constraints
Answer» E.
29.

From where does the insertion and deletion of elements get accomplished in Queues?

A. Front & Rear ends respectively
B. Rear & Front ends respectively
C. Only Front ends
D. Only Rear ends
Answer» C. Only Front ends
30.

Which among the below mentioned entities is / are essential for an Array Representation of a Queue?

A. An array to hold queue elements
B. A variable to hold the index of front element
C. A variable to hold the index of rear element
D. All of the above
Answer» E.
31.

Which value is assigned/set at front and rear ends during the Initialization of a Queue?

A. 0
B. 1
C. - 1
D. infinity
Answer» D. infinity
32.

Which among the below specified condition is applicable if the Queue is non - empty?

A. rear > front
B. rear < front
C. rear = front
D. Unpredictable
Answer» B. rear < front
33.

Where the elements are stored in accordance to the representation of Queue by a Linked Structure?

A. mesh
B. node
C. both a & b
D. none of the above
Answer» C. both a & b
34.

How are the elements with the same priority get processed according to the Priority Queue mechanism?

A. Before the processing of other elements with lower priority
B. After the processing of other elements with highest priority
C. On the basis of First-Come-First Served priority
D. None of the Above
Answer» D. None of the Above
35.

Which linear structure has a provision of Last-In-First-Out (LIFO) mechanism for its elements?

A. Stack
B. Queue
C. Both a & b
D. None of the above
Answer» B. Queue
36.

Pseudo-classes in CSS ________.

A. match a specified element
B. select the active links
C. are used to define a special state of an element
D. are used to select all the visited links
Answer» D. are used to select all the visited links
37.

A CSS combinator is the one which explains the relationship between the selectors.

A. True
B. False
Answer» B. False
38.

Which CSS property sets the stack order of an element?

A. z-index
B. position
C. overflow
D. clip
Answer» B. position
39.

Which CSS property is used for controlling the layout?

A. header
B. display
C. footer
D. none of the above
Answer» C. footer
40.

Which of the following is / are the state of the links in CSS?

A. a:link
B. a:visited
C. a:hover
D. All of the above.
Answer» E.
41.

Which of the following switching technologies reduces the size of the broadcast domain?

A. VLAN
B. ISL
C. STP
D. ARP
Answer» B. ISL
42.

Which of the following is / are the advantages of VLAN?

A. It can increase the network security.
B. It allows logical grouping of users by function.
C. All of the above
D. None of the above
Answer» D. None of the above
43.

Which of the following VTP mode allows to make change in the VLAN information on the switch?

A. STP
B. Transparent
C. Server
D. Client
Answer» D. Client
44.

In which of the following OS is Internet Packet Exchanger (IPX) / Sequence Package Exchanger (SPX) used?

A. MS-DOS
B. Mac OS
C. Windows 95
D. Novells Netware Network
Answer» E.
45.

What should be the size of ROM if it is used to store the table for multiplication of two 8 - bit unsigned integers?

A. 64k x 8
B. 64k x 16
C. 4k x 8
D. 64k x 16
Answer» B. 64k x 16
46.

What will happen when we format a floppy disk?

A. Identification information is written on all tracks and sectors
B. The system area is deleted
C. Data is written
D. Data is arranged on the disk in contiguous fashion
Answer» E.
47.

What is the use of thrashing?

A. It improves system performance
B. It implies excessive page I/O
C. It decreases the degree of multiprogramming
D. It reduces page I/O
Answer» D. It reduces page I/O
48.

Match the following list1 with list2: a. DMA I/O -------------------------------------- 1. High speed RAM b. Cache ---------------------------------------- 2. Disk c. Interrupt I/O --------------------------------- 3. Printer d. Condition code register ------------------- 4. ALU

A. a – 2, b – 1, c – 3, d - 4
B. a – 4, b – 1, c – 3, d - 2
C. a – 2, b – 3, c – 1, d - 4
D. a – 3, b – 4, c – 2, d - 1
Answer» B. a – 4, b – 1, c – 3, d - 2
49.

What must reside in the main memory under all situations in a resident - OS computer?

A. Linker
B. Loader
C. Assembler
D. Compiler
Answer» C. Assembler