Explore topic-wise MCQs in Testing Subject.

This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.

1.

 Where the default value of parameter have to be specified?

A. Function call
B. Function prototype
C. Function definition
D. Both B or C
Answer» C. Function definition
2.

Which of the following is NOT a type of SQL constraint?

A. PRIMARY KEY
B. FOREIGN KEY
C. ALTERNATE KEY
D. UNIQUE
Answer» D. UNIQUE
3.

What are the decimal and hexadecimal equivalents for the binary number 10110111?

A. 69/0x2102
B. 183/B7
C. 173/A6
D. 83/0xC5
Answer» C. 173/A6
4.

Which switching technology reduces the size of a broadcast domain?

A. ISL
B. 802.1Q
C. VLANs
D. STP
Answer» D. STP
5.

 The command to eliminate a table from a database is:

A. REMOVE TABLE CUSTOMER;
B. DROP TABLE CUSTOMER;
C. DELETE TABLE CUSTOMER;
D. UPDATE TABLE CUSTOMER;
Answer» C. DELETE TABLE CUSTOMER;
6.

In which of the following technologies is the term HFC used?

A. DSL
B. PPPoE
C. Frame Relay
D. Dedicated T1
Answer» E.
7.

Which of the following function / type of function cannot be overloaded?

A. Member function
B. Static function
C. Virtual function
D. Both B and C
Answer» D. Both B and C
8.

Which is true about a method-local inner class?

A. It must be marked final.
B. It can be marked abstract.
C. It can be marked public.
D. It can be marked static
Answer» C. It can be marked public.
9.

Which protocol reduces administrative overhead in a switched network by allowing the configuration of a new VLAN to be distributed to all the switches in a domain?

A. STP
B. VTP
C. DHCP
D. ISL
Answer» C. DHCP
10.

The SQL statement to create a view is:

A. CREATE VIEW.
B. MAKE VIEW.
C. SELECT VIEW.
D. INSERT VIEW.
Answer» B. MAKE VIEW.
11.

Which header file should you include, if you are going to develop a function, which can accept variable number of arguments?

A. varagrg.h
B. stdlib.h
C. stdio.h
D. stdarg.h
Answer» E.
12.

The keyword "inverse" is used in which of the following?

A. Class
B. Attribute
C. Relationship
D. All of the above.
Answer» D. All of the above.
13.

Which of the following is private IP address?

A. 12.0.0.1
B. 168.172.19.39
C. 172.15.14.36
D. 192.168.24.43
Answer» E.
14.

Which two statements are equivalent?   3/2 3<2 3*4 3<<2

A. 1 and 2
B. 2 and 3
C. 3 and 4
D. 1 and 4
Answer» D. 1 and 4
15.

A ________ is a stored program that is attached to a table or a view

A. pseudofile
B. embedded SELECT statement
C. trigger
D. None of the above is correct.
Answer» D. None of the above is correct.
16.

The library function used to find the last occurrence of a character in a string is

A. strnstr()
B. laststr()
C. strrchr()
D. strstr()
Answer» D. strstr()
17.

What is the output of the following program? #include int g =20; void func(int &x, int y) { x=x-y ; y=x*10 ; cout<< x<<’,’<< y<< ‘\n’ } void main() { int g=7 ; func(g,::g); cout<< g<< ‘,’ << :: g ; }

A. -13,-130 33,330
B. -13,-130 -13,20
C. -13,20 33,330
D. None of these
Answer» C. -13,20 33,330
18.

Which of the following are included in relational integrity constraints in DBMS?

A. Key constraints
B. Domain constraints
C. Referential integrity constraints
D. All of these
Answer» E.
19.

Which of the following is not supported by Java?

A. Operator overloading
B. Multiple inheritances for classes
C. None of these
D. Both (a) and (b)
Answer» E.
20.

What is the error in the code?" Char ch; Int vowels=0,others=0; Cin>> ch; While((ch>= ‘A’ && ch <+ ‘Z’) || (ch>=’a’ && ch <= ‘z’)){ Switch(ch) { Case’a’: Case’A’: Case’e’: Case’E’: Case’i’: Case’i’: Case’o’: Case’O’: Case’u’: Case’U’: ++vowels; Break; Default: ++others; }} Cout<< vowels<< ‘\n’<< others;

A. The while loop is an endless loop. Whatever value of ch has in the beginning, will remain the same, as ch is not updated within the loop.
B. There is no need to declare a and A and hence all other vowels gain in switch as it is case insensitive.
C. The switch statement’s two case constants are identical case i and i which is an error
D. More than one is correct from above.
Answer» E.
21.

What will be the output of following code fragment? a=60; b=70; i=j=10; if(a<100){ if(b>50){ ++i ; else ++j ; }} cout<< i+j;

A. 21
B. 19
C. 20
D. None of the above
Answer» B. 19
22.

In both induction and synchronous ac motors

A. the operating speed is very steady
B. the stator magnetic field is stationary
C. the stator magnetic field rotates
D. the "squirrel cage" forms the rotor
Answer» D. the "squirrel cage" forms the rotor
23.

With negative feedback, the returning signal

A. is proportional to the output current
B. is proportional to the differential voltage gain
C. opposes the input signal
D. aids the input signal
Answer» D. aids the input signal
24.

A circuit whose output is proportional to the difference between the input signals is considered to be which type of amplifier?

A. common-mode
B. darlington
C. differential
D. operational
Answer» D. operational
25.

Most practical alternators generate electricity from

A. a coil rotating within a magnetic field
B. a magnetic field rotating around fixed windings
C. a permanent magnet rotating within a varying electromagnetic field
D. none of the above
Answer» C. a permanent magnet rotating within a varying electromagnetic field
26.

All of the following are basic op-amp input modes of operation

A. inverting mode
B. common-mode
C. double-ended
D. single-ended
Answer» B. common-mode
27.

Locks placed by the DBMS are called ________ .

A. implicit locks
B. explicit locks
C. exclusive locks
D. shared locks
Answer» B. explicit locks
28.

What is the overall responsibility of the DBA?

A. Facilitate the development and use of the database
B. Create and populate tables
C. Development, operation, and maintenance of the database and its applications
D. Both the first and third answers above are correct.
Answer» E.
29.

A cursor type in which the application sees the data as they were at the time the cursor was opened is called:

A. forward only.
B. static.
C. keyset.
D. dynamic.
Answer» C. keyset.
30.

The size of a lock is called:

A. implicit lock.
B. lock granularity.
C. exclusive lock.
D. shared lock.
Answer» C. exclusive lock.
31.

Which of the following locks the item from access of any type?

A. Implicit lock
B. Explicit lock
C. Exclusive lock
D. Shared lock
Answer» D. Shared lock
32.

You set the console password, but when you display the configuration, the password doesn't show up; it looks like this: What cause the password to be stored like this?

A. encrypt password
B. service password-encryption
C. service-password-encryption
D. exec-timeout 1 35
Answer» C. service-password-encryption
33.

How many simultaneous Telnet sessions does a Cisco router support by default?

A. 2
B. 3
C. 4
D. 5
Answer» E.
34.

If you wanted administrators to see a message when logging into the router, which command would you use?

A. message banner motd
B. banner message motd
C. banner motd
D. message motd
Answer» D. message motd
35.

You type Router#sh ru and receive an % ambiguous command error. Why did you receive this message?

A. The command requires additional options or parameters.
B. There is more than one show command that starts with the letters ru.
C. There is no show command that starts with ru.
D. The command is being executed from the wrong router mode.
Answer» C. There is no show command that starts with ru.
36.

What command do you type to save the configuration stored in RAM to NVRAM?

A. Router(config)#copy current to starting
B. Router#copy starting to running
C. Router(config)#copy running-config startup-config
D. Router#copy run startup
Answer» E.
37.

If you use either Telnet or FTP, which is the highest layer you are using to transmit data?

A. Application
B. Presentation
C. Session
D. Transport
Answer» B. Presentation
38.

Which class of IP address provides a maximum of only 254 host addresses per network ID?

A. Class A
B. Class B
C. Class C
D. Class D
Answer» D. Class D
39.

Which of the following services use UDP? DHCP SMTP SNMP FTP HTTP   TFTP

A. 1, 3 and 6
B. 2 and 4
C. 1, 2 and 4
D. All of the above
Answer» B. 2 and 4
40.

The DoD model (also called the TCP/IP stack) has four layers. Which layer of the DoD model is equivalent to the Network layer of the OSI model?

A. Application
B. Host-to-Host
C. Internet
D. Network Access
Answer» D. Network Access
41.

Which of the following allows a router to respond to an ARP request that is intended for a remote host?

A. Gateway DP
B. Reverse ARP (RARP)
C. Proxy ARP
D. Inverse ARP (IARP)
Answer» D. Inverse ARP (IARP)
42.

You have 10 users plugged into a hub running 10Mbps half-duplex. There is a server connected to the switch running 10Mbps half-duplex as well. How much bandwidth does each host have to the server?

A. 100 kbps
B. 1 Mbps
C. 2 Mbps
D. 10 Mbps
Answer» E.
43.

What command is used to create a backup configuration?

A. copy running backup
B. copy running-config startup-config
C. config mem
D. wr mem
Answer» C. config mem
44.

What are the two main types of access control lists (ACLs)? Standard IEEE Extended Specialized

A. 1 and 3
B. 2 and 4
C. 3 and 4
D. 1 and 2
Answer» B. 2 and 4
45.

What flavor of Network Address Translation can be used to have one IP address allow many users to connect to the global Internet?

A. NAT
B. Static
C. Dynamic
D. PAT
Answer» E.
46.

How long is an IPv6 address?

A. 32 bits
B. 128 bytes
C. 64 bits
D. 128 bits
Answer» E.
Previous Next