MCQOPTIONS
Saved Bookmarks
This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Where the default value of parameter have to be specified? |
| A. | Function call |
| B. | Function prototype |
| C. | Function definition |
| D. | Both B or C |
| Answer» C. Function definition | |
| 2. |
Which of the following is NOT a type of SQL constraint? |
| A. | PRIMARY KEY |
| B. | FOREIGN KEY |
| C. | ALTERNATE KEY |
| D. | UNIQUE |
| Answer» D. UNIQUE | |
| 3. |
What are the decimal and hexadecimal equivalents for the binary number 10110111? |
| A. | 69/0x2102 |
| B. | 183/B7 |
| C. | 173/A6 |
| D. | 83/0xC5 |
| Answer» C. 173/A6 | |
| 4. |
Which switching technology reduces the size of a broadcast domain? |
| A. | ISL |
| B. | 802.1Q |
| C. | VLANs |
| D. | STP |
| Answer» D. STP | |
| 5. |
The command to eliminate a table from a database is: |
| A. | REMOVE TABLE CUSTOMER; |
| B. | DROP TABLE CUSTOMER; |
| C. | DELETE TABLE CUSTOMER; |
| D. | UPDATE TABLE CUSTOMER; |
| Answer» C. DELETE TABLE CUSTOMER; | |
| 6. |
In which of the following technologies is the term HFC used? |
| A. | DSL |
| B. | PPPoE |
| C. | Frame Relay |
| D. | Dedicated T1 |
| Answer» E. | |
| 7. |
Which of the following function / type of function cannot be overloaded? |
| A. | Member function |
| B. | Static function |
| C. | Virtual function |
| D. | Both B and C |
| Answer» D. Both B and C | |
| 8. |
Which is true about a method-local inner class? |
| A. | It must be marked final. |
| B. | It can be marked abstract. |
| C. | It can be marked public. |
| D. | It can be marked static |
| Answer» C. It can be marked public. | |
| 9. |
Which protocol reduces administrative overhead in a switched network by allowing the configuration of a new VLAN to be distributed to all the switches in a domain? |
| A. | STP |
| B. | VTP |
| C. | DHCP |
| D. | ISL |
| Answer» C. DHCP | |
| 10. |
The SQL statement to create a view is: |
| A. | CREATE VIEW. |
| B. | MAKE VIEW. |
| C. | SELECT VIEW. |
| D. | INSERT VIEW. |
| Answer» B. MAKE VIEW. | |
| 11. |
Which header file should you include, if you are going to develop a function, which can accept variable number of arguments? |
| A. | varagrg.h |
| B. | stdlib.h |
| C. | stdio.h |
| D. | stdarg.h |
| Answer» E. | |
| 12. |
The keyword "inverse" is used in which of the following? |
| A. | Class |
| B. | Attribute |
| C. | Relationship |
| D. | All of the above. |
| Answer» D. All of the above. | |
| 13. |
Which of the following is private IP address? |
| A. | 12.0.0.1 |
| B. | 168.172.19.39 |
| C. | 172.15.14.36 |
| D. | 192.168.24.43 |
| Answer» E. | |
| 14. |
Which two statements are equivalent? 3/2 3<2 3*4 3<<2 |
| A. | 1 and 2 |
| B. | 2 and 3 |
| C. | 3 and 4 |
| D. | 1 and 4 |
| Answer» D. 1 and 4 | |
| 15. |
A ________ is a stored program that is attached to a table or a view |
| A. | pseudofile |
| B. | embedded SELECT statement |
| C. | trigger |
| D. | None of the above is correct. |
| Answer» D. None of the above is correct. | |
| 16. |
The library function used to find the last occurrence of a character in a string is |
| A. | strnstr() |
| B. | laststr() |
| C. | strrchr() |
| D. | strstr() |
| Answer» D. strstr() | |
| 17. |
What is the output of the following program? #include int g =20; void func(int &x, int y) { x=x-y ; y=x*10 ; cout<< x<<’,’<< y<< ‘\n’ } void main() { int g=7 ; func(g,::g); cout<< g<< ‘,’ << :: g ; } |
| A. | -13,-130 33,330 |
| B. | -13,-130 -13,20 |
| C. | -13,20 33,330 |
| D. | None of these |
| Answer» C. -13,20 33,330 | |
| 18. |
Which of the following are included in relational integrity constraints in DBMS? |
| A. | Key constraints |
| B. | Domain constraints |
| C. | Referential integrity constraints |
| D. | All of these |
| Answer» E. | |
| 19. |
Which of the following is not supported by Java? |
| A. | Operator overloading |
| B. | Multiple inheritances for classes |
| C. | None of these |
| D. | Both (a) and (b) |
| Answer» E. | |
| 20. |
What is the error in the code?" Char ch; Int vowels=0,others=0; Cin>> ch; While((ch>= ‘A’ && ch <+ ‘Z’) || (ch>=’a’ && ch <= ‘z’)){ Switch(ch) { Case’a’: Case’A’: Case’e’: Case’E’: Case’i’: Case’i’: Case’o’: Case’O’: Case’u’: Case’U’: ++vowels; Break; Default: ++others; }} Cout<< vowels<< ‘\n’<< others; |
| A. | The while loop is an endless loop. Whatever value of ch has in the beginning, will remain the same, as ch is not updated within the loop. |
| B. | There is no need to declare a and A and hence all other vowels gain in switch as it is case insensitive. |
| C. | The switch statement’s two case constants are identical case i and i which is an error |
| D. | More than one is correct from above. |
| Answer» E. | |
| 21. |
What will be the output of following code fragment? a=60; b=70; i=j=10; if(a<100){ if(b>50){ ++i ; else ++j ; }} cout<< i+j; |
| A. | 21 |
| B. | 19 |
| C. | 20 |
| D. | None of the above |
| Answer» B. 19 | |
| 22. |
In both induction and synchronous ac motors |
| A. | the operating speed is very steady |
| B. | the stator magnetic field is stationary |
| C. | the stator magnetic field rotates |
| D. | the "squirrel cage" forms the rotor |
| Answer» D. the "squirrel cage" forms the rotor | |
| 23. |
With negative feedback, the returning signal |
| A. | is proportional to the output current |
| B. | is proportional to the differential voltage gain |
| C. | opposes the input signal |
| D. | aids the input signal |
| Answer» D. aids the input signal | |
| 24. |
A circuit whose output is proportional to the difference between the input signals is considered to be which type of amplifier? |
| A. | common-mode |
| B. | darlington |
| C. | differential |
| D. | operational |
| Answer» D. operational | |
| 25. |
Most practical alternators generate electricity from |
| A. | a coil rotating within a magnetic field |
| B. | a magnetic field rotating around fixed windings |
| C. | a permanent magnet rotating within a varying electromagnetic field |
| D. | none of the above |
| Answer» C. a permanent magnet rotating within a varying electromagnetic field | |
| 26. |
All of the following are basic op-amp input modes of operation |
| A. | inverting mode |
| B. | common-mode |
| C. | double-ended |
| D. | single-ended |
| Answer» B. common-mode | |
| 27. |
Locks placed by the DBMS are called ________ . |
| A. | implicit locks |
| B. | explicit locks |
| C. | exclusive locks |
| D. | shared locks |
| Answer» B. explicit locks | |
| 28. |
What is the overall responsibility of the DBA? |
| A. | Facilitate the development and use of the database |
| B. | Create and populate tables |
| C. | Development, operation, and maintenance of the database and its applications |
| D. | Both the first and third answers above are correct. |
| Answer» E. | |
| 29. |
A cursor type in which the application sees the data as they were at the time the cursor was opened is called: |
| A. | forward only. |
| B. | static. |
| C. | keyset. |
| D. | dynamic. |
| Answer» C. keyset. | |
| 30. |
The size of a lock is called: |
| A. | implicit lock. |
| B. | lock granularity. |
| C. | exclusive lock. |
| D. | shared lock. |
| Answer» C. exclusive lock. | |
| 31. |
Which of the following locks the item from access of any type? |
| A. | Implicit lock |
| B. | Explicit lock |
| C. | Exclusive lock |
| D. | Shared lock |
| Answer» D. Shared lock | |
| 32. |
You set the console password, but when you display the configuration, the password doesn't show up; it looks like this: What cause the password to be stored like this? |
| A. | encrypt password |
| B. | service password-encryption |
| C. | service-password-encryption |
| D. | exec-timeout 1 35 |
| Answer» C. service-password-encryption | |
| 33. |
How many simultaneous Telnet sessions does a Cisco router support by default? |
| A. | 2 |
| B. | 3 |
| C. | 4 |
| D. | 5 |
| Answer» E. | |
| 34. |
If you wanted administrators to see a message when logging into the router, which command would you use? |
| A. | message banner motd |
| B. | banner message motd |
| C. | banner motd |
| D. | message motd |
| Answer» D. message motd | |
| 35. |
You type Router#sh ru and receive an % ambiguous command error. Why did you receive this message? |
| A. | The command requires additional options or parameters. |
| B. | There is more than one show command that starts with the letters ru. |
| C. | There is no show command that starts with ru. |
| D. | The command is being executed from the wrong router mode. |
| Answer» C. There is no show command that starts with ru. | |
| 36. |
What command do you type to save the configuration stored in RAM to NVRAM? |
| A. | Router(config)#copy current to starting |
| B. | Router#copy starting to running |
| C. | Router(config)#copy running-config startup-config |
| D. | Router#copy run startup |
| Answer» E. | |
| 37. |
If you use either Telnet or FTP, which is the highest layer you are using to transmit data? |
| A. | Application |
| B. | Presentation |
| C. | Session |
| D. | Transport |
| Answer» B. Presentation | |
| 38. |
Which class of IP address provides a maximum of only 254 host addresses per network ID? |
| A. | Class A |
| B. | Class B |
| C. | Class C |
| D. | Class D |
| Answer» D. Class D | |
| 39. |
Which of the following services use UDP? DHCP SMTP SNMP FTP HTTP TFTP |
| A. | 1, 3 and 6 |
| B. | 2 and 4 |
| C. | 1, 2 and 4 |
| D. | All of the above |
| Answer» B. 2 and 4 | |
| 40. |
The DoD model (also called the TCP/IP stack) has four layers. Which layer of the DoD model is equivalent to the Network layer of the OSI model? |
| A. | Application |
| B. | Host-to-Host |
| C. | Internet |
| D. | Network Access |
| Answer» D. Network Access | |
| 41. |
Which of the following allows a router to respond to an ARP request that is intended for a remote host? |
| A. | Gateway DP |
| B. | Reverse ARP (RARP) |
| C. | Proxy ARP |
| D. | Inverse ARP (IARP) |
| Answer» D. Inverse ARP (IARP) | |
| 42. |
You have 10 users plugged into a hub running 10Mbps half-duplex. There is a server connected to the switch running 10Mbps half-duplex as well. How much bandwidth does each host have to the server? |
| A. | 100 kbps |
| B. | 1 Mbps |
| C. | 2 Mbps |
| D. | 10 Mbps |
| Answer» E. | |
| 43. |
What command is used to create a backup configuration? |
| A. | copy running backup |
| B. | copy running-config startup-config |
| C. | config mem |
| D. | wr mem |
| Answer» C. config mem | |
| 44. |
What are the two main types of access control lists (ACLs)? Standard IEEE Extended Specialized |
| A. | 1 and 3 |
| B. | 2 and 4 |
| C. | 3 and 4 |
| D. | 1 and 2 |
| Answer» B. 2 and 4 | |
| 45. |
What flavor of Network Address Translation can be used to have one IP address allow many users to connect to the global Internet? |
| A. | NAT |
| B. | Static |
| C. | Dynamic |
| D. | PAT |
| Answer» E. | |
| 46. |
How long is an IPv6 address? |
| A. | 32 bits |
| B. | 128 bytes |
| C. | 64 bits |
| D. | 128 bits |
| Answer» E. | |