MCQOPTIONS
Saved Bookmarks
This section includes 50 Mcqs, each offering curated multiple-choice questions to sharpen your Axtria knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
To have a file hold a list, it is necessary to |
| A. | identify the records in the list |
| B. | identify the name, width and type of the fields of each record. |
| C. | decide which fields will be used as sort or index keys |
| D. | All of the above. |
| E. | None of the above |
| Answer» E. None of the above | |
| 2. |
The PROJECT command will create new table that has |
| A. | more fields than the original table |
| B. | more rows than the original table |
| C. | both (a) and (b) |
| D. | all the fields of master table |
| E. | None of the above |
| Answer» F. | |
| 3. |
A database management system |
| A. | allows simultaneous access to multiple files |
| B. | can do more than a record management system |
| C. | is a collection of programs for managing data in a single file |
| D. | both (a) and (b) |
| E. | None of the above |
| Answer» E. None of the above | |
| 4. |
A top-to-bottom relationship among the items in a database is established by a |
| A. | Hierarchical schema |
| B. | Network schema |
| C. | Relational schema |
| D. | All of the above |
| E. | None of the above |
| Answer» B. Network schema | |
| 5. |
What is the name given to the database management system which is able to handle full text data, image data, audio and video? |
| A. | Full media |
| B. | Graphics media |
| C. | Multimedia |
| D. | Hypertext |
| E. | None of the above |
| Answer» D. Hypertext | |
| 6. |
An-owner-member set in the CODASYL specifications may have |
| A. | only one owner but many owner occurrences |
| B. | only one member but many member occurrence |
| C. | more than one member but only one occurrence per member |
| D. | All of the above. |
| E. | None of the above |
| Answer» B. only one member but many member occurrence | |
| 7. |
Which command is used to remove an index from the database in SQL? |
| A. | DELETE INDEX |
| B. | DROP INDEX |
| C. | REMOVE INDEX |
| D. | ROLL BACK INDEX |
| E. | None of the above |
| Answer» C. REMOVE INDEX | |
| 8. |
The files stored on a secondary stage device are composed of a hierarchy of data. What does a record in a file contain? |
| A. | Bits |
| B. | Characters |
| C. | Data field |
| D. | Schema |
| Answer» D. Schema | |
| 9. |
Prior to the invention of time sharing, the prevalent method of computer access was: |
| A. | batch processing |
| B. | telecommunication |
| C. | remote access |
| D. | All of the above |
| Answer» B. telecommunication | |
| 10. |
DEC advertises that it helped to create "the world's first expert system routinely used in an industrial environment," called XCON or: |
| A. | PDP-11 |
| B. | Rl |
| C. | VAX |
| D. | MAGNOM |
| Answer» C. VAX | |
| 11. |
To invoke the LISP system, you must enter |
| A. | AI |
| B. | LISP |
| C. | CL (Common Lisp) |
| D. | both b and c |
| Answer» E. | |
| 12. |
Programming a robot by physically moving it through the trajectory you want it to follow is called: |
| A. | contact sensing control |
| B. | continuous-path control |
| C. | robot vision control |
| D. | pick-and-place control |
| Answer» C. robot vision control | |
| 13. |
PROLOG is an AI programming language which solves problems with a form of symbolic logic known as predicate calculus. It was developed in 1972 at the University of Marseilles by a team of specialists. Can you name the person who headed this team? |
| A. | Alain Colmerauer |
| B. | Nicklaus Wirth |
| C. | Seymour Papert |
| D. | John McCarthy |
| E. | None of the above |
| Answer» B. Nicklaus Wirth | |
| 14. |
Decision support programs are designed to help managers make: |
| A. | budget projections |
| B. | visual presentations |
| C. | business decisions |
| D. | vacation schedules |
| E. | None of the above |
| Answer» D. vacation schedules | |
| 15. |
What was originally called the "imitation game" by its creator? |
| A. | The Turing Test |
| B. | LISP |
| C. | The Logic Theorist |
| D. | Cybernetics |
| E. | None of the above |
| Answer» B. LISP | |
| 16. |
Which kind of planning consists of successive representations of different levels of a plan? |
| A. | hierarchical planning |
| B. | non-hierarchical planning |
| C. | All of the above |
| D. | project planning |
| E. | None of the above |
| Answer» B. non-hierarchical planning | |
| 17. |
What stage of the manufacturing process has been described as "the mapping of function onto form"? |
| A. | Design |
| B. | Distribution |
| C. | project management |
| D. | field service |
| E. | None of the above |
| Answer» B. Distribution | |
| 18. |
What is the term used for describing the judgmental or commonsense part of problem solving? |
| A. | Heuristic |
| B. | Critical |
| C. | Value based |
| D. | Analytical |
| E. | None of the above |
| Answer» B. Critical | |
| 19. |
What layer of the OSI model would you assume the problem is in if you type show interface serial 1 and receive the following message? "Serial1 is down, line protocol is down." |
| A. | Physical layer |
| B. | Data Link layer |
| C. | Network layer |
| D. | None. It is a router problem |
| Answer» B. Data Link layer | |
| 20. |
Which of the following commands sets the secret password to Cisco? |
| A. | enable secret password Cisco |
| B. | enable secret cisco |
| C. | enable secret Cisco |
| D. | enable password Cisco |
| Answer» D. enable password Cisco | |
| 21. |
If an Ethernet port on a router were assigned an IP address of 172.16.112.1/25, what would be the valid subnet address of this host? |
| A. | 172.16.112.0 |
| B. | 172.16.0.0 |
| C. | 172.16.96.0 |
| D. | 172.16.255.0 |
| Answer» B. 172.16.0.0 | |
| 22. |
You have a network that needs 29 subnets while maximizing the number of host addresses available on each subnet. How many bits must you borrow from the host field to provide the correct subnet mask? |
| A. | 2 |
| B. | 3 |
| C. | 4 |
| D. | 5 |
| Answer» E. | |
| 23. |
You need to subnet a network that has 5 subnets, each with at least 16 hosts. Which classful subnet mask would you use? |
| A. | 255.255.255.192 |
| B. | 255.255.255.224 |
| C. | 255.255.255.240 |
| D. | 255.255.255.248 |
| Answer» C. 255.255.255.240 | |
| 24. |
What is the maximum number of IP addresses that can be assigned to hosts on a local subnet that uses the 255.255.255.224 subnet mask? |
| A. | 14 |
| B. | 15 |
| C. | 16 |
| D. | 30 |
| Answer» E. | |
| 25. |
Specify the 2 library functions to dynamically allocate memory? |
| A. | malloc() and memalloc() |
| B. | alloc() and memalloc() |
| C. | malloc() and calloc() |
| D. | memalloc() and faralloc() |
| Answer» D. memalloc() and faralloc() | |
| 26. |
What function should be used to free the memory allocated by calloc() ? |
| A. | dealloc(); |
| B. | malloc(variable_name, 0) |
| C. | free(); |
| D. | memalloc(variable_name, 0) |
| Answer» D. memalloc(variable_name, 0) | |
| 27. |
Which header file should be included to use functions like malloc() and calloc()? |
| A. | memory.h |
| B. | stdlib.h |
| C. | string.h |
| D. | dos.h |
| Answer» C. string.h | |
| 28. |
What will you do to treat the constant 3.14 as a long double? |
| A. | use 3.14LD |
| B. | use 3.14L |
| C. | use 3.14DL |
| D. | use 3.14LF |
| Answer» C. use 3.14DL | |
| 29. |
What are the different types of real data type in C ? |
| A. | float, double |
| B. | short int, double, long int |
| C. | float, double, long double |
| D. | double, long int, float |
| Answer» D. double, long int, float | |
| 30. |
How would you round off a value from 1.66 to 2.0? |
| A. | ceil(1.66) |
| B. | floor(1.66) |
| C. | roundup(1.66) |
| D. | roundto(1.66) |
| Answer» B. floor(1.66) | |
| 31. |
Is there any difference between following declarations? 1 : extern int fun(); 2 : int fun(); |
| A. | Both are identical |
| B. | No difference, except extern int fun(); is probably in another file |
| C. | int fun(); is overrided with extern int fun(); |
| D. | None of these |
| Answer» C. int fun(); is overrided with extern int fun(); | |
| 32. |
Which of the following special symbol allowed in a variable name? |
| A. | * (asterisk) |
| B. | | (pipeline) |
| C. | - (hyphen) |
| D. | _ (underscore) |
| Answer» E. | |
| 33. |
What are the types of linkages? |
| A. | Internal and External |
| B. | External, Internal and None |
| C. | External and None |
| D. | Internal |
| Answer» C. External and None | |
| 34. |
Which of the following statements should be used to obtain a remainder after dividing 3.14 by 2.1 ? |
| A. | rem = 3.14 % 2.1; |
| B. | rem = modf(3.14, 2.1); |
| C. | rem = fmod(3.14, 2.1); |
| D. | Remainder cannot be obtain in floating point division. |
| Answer» D. Remainder cannot be obtain in floating point division. | |
| 35. |
#include <stdio.h> int main() { printf("%d", main); return 0; } |
| A. | Address of main function |
| B. | Compiler Error |
| C. | Runtime Error |
| D. | Some random value |
| Answer» B. Compiler Error | |
| 36. |
Which of the following is true about return type of functions in C? |
| A. | Functions can return any type |
| B. | Functions can return any type except array and functions |
| C. | Functions can return any type except array, functions and union |
| D. | Functions can return any type except array, functions, function pointer and union |
| Answer» C. Functions can return any type except array, functions and union | |
| 37. |
In C, parameters are always |
| A. | Passed by value |
| B. | Passed by reference |
| C. | Non-pointer variables are passed by value and pointers are passed by reference |
| D. | Passed by value result |
| Answer» B. Passed by reference | |
| 38. |
Output of following program? #include <stdio.h> int main() { int i = 5; printf("%d %d %d", i++, i++, i++); return 0; } |
| A. | 7 6 5 |
| B. | 5 6 7 |
| C. | 7 7 7 |
| D. | Compiler Dependent |
| Answer» E. | |
| 39. |
Predict output of following program int main() { int i; int arr[5] = {1}; for (i = 0; i < 5; i++) printf("%d ", arr[i]); return 0; } |
| A. | 1 followed by four garbage values |
| B. | 1 0 0 0 0 |
| C. | 1 1 1 1 1 |
| D. | 0 0 0 0 0 |
| Answer» C. 1 1 1 1 1 | |
| 40. |
Predict the output of the below program: #include <stdio.h> #define SIZE(arr) sizeof(arr) / sizeof(*arr); void fun(int* arr, int n) { int i; *arr += *(arr + n - 1) += 10; } void printArr(int* arr, int n) { int i; for(i = 0; i < n; ++i) printf("%d ", arr[i]); } int main() { int arr[] = {10, 20, 30}; int size = SIZE(arr); fun(arr, size); printArr(arr, size); return 0; } |
| A. | 20 30 40 |
| B. | 20 20 40 |
| C. | 50 20 40 |
| D. | Compile-time error |
| Answer» D. Compile-time error | |
| 41. |
Which of the following is true about arrays in C. |
| A. | For every type T, there can be an array of T. |
| B. | For every type T except void and function type, there can be an array of T |
| C. | When an array is passed to a function, C compiler creates a copy of array. |
| D. | 2D arrays are stored in column major form |
| Answer» C. When an array is passed to a function, C compiler creates a copy of array. | |
| 42. |
Output of following program? #include<stdio.h> int main() { int a[] = {1, 2, 3, 4, 5, 6}; int *ptr = (int*)(&a+1); printf("%d ", *(ptr-1) ); return 0; } |
| A. | 1 |
| B. | 2 |
| C. | 6 |
| D. | Runtime Error |
| Answer» D. Runtime Error | |
| 43. |
What is output? # include <stdio.h> void print(int arr[]) { int n = sizeof(arr)/sizeof(arr[0]); int i; for (i = 0; i < n; i++) printf("%d ", arr[i]); } int main() { int arr[] = {1, 2, 3, 4, 5, 6, 7, 8}; print(arr); return 0; } |
| A. | 1, 2, 3, 4, 5, 6, 7, 8 |
| B. | Compiler Error |
| C. | 1 |
| D. | Run Time Error |
| Answer» D. Run Time Error | |
| 44. |
Predict the output of below program: #include <stdio.h> int main() { int arr[5]; // Assume base address of arr is 2000 and size of integer is 32 bit printf("%u %u", arr + 1, &arr + 1); return 0; } |
| A. | 2004 2020 |
| B. | 2004 2004 |
| C. | 2004 Garbage value |
| D. | The program fails to compile because Address-of operator cannot be used with array name |
| Answer» D. The program fails to compile because Address-of operator cannot be used with array name | |
| 45. |
Predict the output of below program: #include <stdio.h> int main() { int arr[5]; // Assume that base address of arr is 2000 and size of integer // is 32 bit arr++; printf("%u", arr); return 0; } |
| A. | 2002 |
| B. | 2004 |
| C. | 2020 |
| D. | lvalue required |
| Answer» E. | |
| 46. |
Which command does not exist in DOS? |
| A. | Dir |
| B. | CLS |
| C. | CD |
| D. | Sum |
| Answer» E. | |
| 47. |
A smaller version of an image is called a |
| A. | Clipart |
| B. | Bitmap |
| C. | Thumbnail |
| D. | Portable network graphic |
| Answer» D. Portable network graphic | |
| 48. |
Which command changes a file's group owner? |
| A. | cgrp |
| B. | chgrp |
| C. | change |
| D. | group |
| Answer» C. change | |
| 49. |
Which of the following is NOT of implementation of data structure ? |
| A. | View Level |
| B. | Abstract Level |
| C. | Implementation Level |
| D. | Application Level |
| Answer» B. Abstract Level | |
| 50. |
Sorting is not possible by using which of the following methods? |
| A. | Insertion |
| B. | Selection |
| C. | Exchange |
| D. | Deletion |
| Answer» E. | |