MCQOPTIONS
Saved Bookmarks
This section includes 35 Mcqs, each offering curated multiple-choice questions to sharpen your Amazon knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Which of the following correctly shows the hierarchy of arithmetic operations in C? |
| A. | / + * - |
| B. | * - / + |
| C. | + - / * |
| D. | / * + - |
| Answer» E. | |
| 2. |
Which of the following is not logical operator? |
| A. | & |
| B. | && |
| C. | || |
| D. | ! |
| Answer» B. && | |
| 3. |
What will you do to treat the constant 3.14 as a long double? |
| A. | use 3.14LD |
| B. | use 3.14L |
| C. | use 3.14DL |
| D. | use 3.14LF |
| Answer» C. use 3.14DL | |
| 4. |
What are the different types of real data type in C ? |
| A. | float, double |
| B. | short int, double, long int |
| C. | float, double, long double |
| D. | double, long int, float |
| Answer» D. double, long int, float | |
| 5. |
What does the following declaration mean? int (*ptr)[10]; |
| A. | ptr is array of pointers to 10 integers |
| B. | ptr is a pointer to an array of 10 integers |
| C. | ptr is an array of 10 integers |
| D. | ptr is an pointer to array |
| Answer» C. ptr is an array of 10 integers | |
| 6. |
What will happen if in a C program you assign a value to an array element whose subscript exceeds the size of array? |
| A. | The element will be set to 0. |
| B. | The compiler would report an error. |
| C. | The program may crash if some important data gets overwritten. |
| D. | The array size would appropriately grow. |
| Answer» D. The array size would appropriately grow. | |
| 7. |
What does the following declaration mean? int (*ptr)[10]; |
| A. | ptr is array of pointers to 10 integers |
| B. | ptr is a pointer to an array of 10 integers |
| C. | ptr is an array of 10 integers |
| D. | ptr is an pointer to array |
| Answer» C. ptr is an array of 10 integers | |
| 8. |
How will you free the allocated memory? |
| A. | remove(var-name); |
| B. | free(var-name); |
| C. | delete(var-name); |
| D. | dalloc(var-name); |
| Answer» C. delete(var-name); | |
| 9. |
What do the following declaration signify? char *arr[10]; |
| A. | arr is a array of 10 character pointers. |
| B. | arr is a array of function pointer. |
| C. | arr is a array of characters. |
| D. | arr is a pointer to array of characters. |
| Answer» B. arr is a array of function pointer. | |
| 10. |
Which among the following is right? |
| A. | sizeof(struct stemp*) > sizeof(union utemp*) > sizeof(char *) |
| B. | sizeof(struct stemp*) < sizeof(union utemp*) < sizeof(char *) |
| C. | sizeof(struct stemp*) = sizeof(union utemp*) = sizeof(char *) |
| D. | The order Depends on the compiler |
| Answer» D. The order Depends on the compiler | |
| 11. |
What is the similarity between a structure, union and enumeration? |
| A. | All of them let you define new values |
| B. | All of them let you define new data types |
| C. | All of them let you define new pointers |
| D. | All of them let you define new structures |
| Answer» C. All of them let you define new pointers | |
| 12. |
stdout, stdin and stderr are ________ |
| A. | File pointers |
| B. | File descriptors |
| C. | Streams |
| D. | Structure |
| Answer» B. File descriptors | |
| 13. |
What is FILE reserved word? |
| A. | A structure tag declared in stdio.h |
| B. | One of the basic data types in c |
| C. | Pointer to the structure defined in stdio.h |
| D. | It is a type name defined in stdio.h |
| Answer» E. | |
| 14. |
Which of the following fopen() statements are illegal? |
| A. | fp = fopen(“abc.txt”, “r”); |
| B. | fp = fopen(“/home/user1/abc.txt”, “w”); |
| C. | fp = fopen(“abc”, “w”); |
| D. | none of the mentioned |
| Answer» E. | |
| 15. |
How does user buffer work? |
| A. | When user logs on to the system ,user buffer is created containing all user context |
| B. | When user logs on to the system ,manually required to generate user buffer |
| C. | When user is created by default user buffer is created |
| D. | All of the above is correct |
| Answer» B. When user logs on to the system ,manually required to generate user buffer | |
| 16. |
User master record comparison is scheduled in background by executing which job ? |
| A. | PFCG_TIME_DEPENDENCY |
| B. | PFCG_TOTAL_DEPENDENCY |
| C. | PFCG_AUTH_DEPENDENCY |
| D. | PFCG_DEPENDENCY_AUTH |
| Answer» B. PFCG_TOTAL_DEPENDENCY | |
| 17. |
What will happen when you create a role from the transaction code PFCG ? |
| A. | Generated profile by default assigned to user master record |
| B. | Generated profile should not be assigned to user master record until the user master record have been compared |
| C. | Authorization profile created with default adjustments |
| D. | None of the above |
| Answer» C. Authorization profile created with default adjustments | |
| 18. |
Which join combines all rows from both tables? |
| A. | Inner Join |
| B. | Left Outer Join |
| C. | Right Outer Join |
| D. | Cross Join |
| Answer» E. | |
| 19. |
Which of the following prevent "Dirty Reads"? |
| A. | Read commited |
| B. | Read Uncommitted |
| C. | Repeatable Read |
| D. | Serializable |
| Answer» D. Serializable | |
| 20. |
Which of the following Linux commands could be used to find what processor was detected on boot, when a laptop system is slow/ |
| A. | proc |
| B. | POST |
| C. | dmesg |
| D. | Any of the above |
| Answer» C. dmesg | |
| 21. |
Which of the following will kill the process 1010 by an administrator(logged in as a standard user)? The process 1010 was started by the root user. |
| A. | kill 1010 |
| B. | su "kill 1010" |
| C. | su -c "kill 1010" |
| D. | killall -9 1010 |
| Answer» D. killall -9 1010 | |
| 22. |
How much usable space is available, when a Linux system is configured with a RAID 5 array that consists of six 20 GB hard disk drives? |
| A. | 80 |
| B. | 0100 |
| C. | 120 |
| D. | 60 |
| Answer» D. 60 | |
| 23. |
Which directory contains configuration files that stores system and application setting? |
| A. | /etc |
| B. | /lib |
| C. | /usr |
| D. | /var |
| Answer» B. /lib | |
| 24. |
Saving open files, flush the system cache and other necessary system maintenance are allowed by. |
| A. | restarting the system |
| B. | rebooting the system |
| C. | logging off the system |
| D. | shutting down the system |
| Answer» D. shutting down the system | |
| 25. |
The hierarchy of a series of directories branching in a user system starts from |
| A. | home |
| B. | oot |
| C. | /home |
| D. | /root |
| Answer» D. /root | |
| 26. |
In Novell’s use of RIP, there are two metrics used to make routing decisions. Select the two metrics. |
| A. | Ticks & Hops |
| B. | Hops & Loops |
| C. | Loops & Counts |
| D. | Counts & Ticks |
| Answer» B. Hops & Loops | |
| 27. |
Novell’s implementation of RIP updates routing tables every _________ seconds. |
| A. | 60 |
| B. | 90 |
| C. | 10 |
| D. | 30 |
| Answer» B. 90 | |
| 28. |
What does the “IPX maximum-paths 2” command accomplish? |
| A. | It enables load sharing on 2 paths if the paths are equal metric paths |
| B. | It sets up routing to go to network 2 |
| C. | It is the default for Cisco IPX load sharing |
| D. | It enables load sharing on 2 paths if the paths are unequal metric paths |
| Answer» B. It sets up routing to go to network 2 | |
| 29. |
NetWare IPX addressing uses a network number and a node number. Which statement is not true? |
| A. | The network address is administratively assigned and can be up to 16 hexadecimal digits long |
| B. | The node address is always administratively assigned |
| C. | The node address is usually the MAC address |
| D. | If the MAC address is used as the node address, then IPX eliminates the use of ARP |
| Answer» C. The node address is usually the MAC address | |
| 30. |
Consider that m elements are to be sorted. What is the worst case time complexity of bubble sort ? |
| A. | O(1) |
| B. | O(log n) |
| C. | O(n) |
| D. | O(n2) |
| Answer» E. | |
| 31. |
The C declaration int A[5][7] Contains x elements, each of these elements is itself an array containing y integers. What is the value of 2x+y |
| A. | 17 |
| B. | 24 |
| C. | 354 |
| D. | None of the above |
| Answer» B. 24 | |
| 32. |
What is the order to access the elements of a pushdown stack ? |
| A. | First In First Out |
| B. | Last In First Out |
| C. | Last In Last Out |
| D. | First In Last Out |
| Answer» C. Last In Last Out | |
| 33. |
Which of the following is the function/s of the database administration? |
| A. | Application checking |
| B. | Database access planning |
| C. | Computer applications management |
| D. | All of these |
| Answer» C. Computer applications management | |
| 34. |
What of the following sorting procedure is the slowest? |
| A. | Bubble sort |
| B. | Quick sort |
| C. | Heap sort |
| D. | Shell sort |
| Answer» B. Quick sort | |
| 35. |
What is the function of application programs in the DBMS approach? |
| A. | processing functions |
| B. | storage functions |
| C. | access control |
| D. | None of these |
| Answer» B. storage functions | |