

MCQOPTIONS
Saved Bookmarks
This section includes 35 Mcqs, each offering curated multiple-choice questions to sharpen your Amazon knowledge and support exam preparation. Choose a topic below to get started.
1. |
Which of the following correctly shows the hierarchy of arithmetic operations in C? |
A. | / + * - |
B. | * - / + |
C. | + - / * |
D. | / * + - |
Answer» E. | |
2. |
Which of the following is not logical operator? |
A. | & |
B. | && |
C. | || |
D. | ! |
Answer» B. && | |
3. |
What will you do to treat the constant 3.14 as a long double? |
A. | use 3.14LD |
B. | use 3.14L |
C. | use 3.14DL |
D. | use 3.14LF |
Answer» C. use 3.14DL | |
4. |
What are the different types of real data type in C ? |
A. | float, double |
B. | short int, double, long int |
C. | float, double, long double |
D. | double, long int, float |
Answer» D. double, long int, float | |
5. |
What does the following declaration mean? int (*ptr)[10]; |
A. | ptr is array of pointers to 10 integers |
B. | ptr is a pointer to an array of 10 integers |
C. | ptr is an array of 10 integers |
D. | ptr is an pointer to array |
Answer» C. ptr is an array of 10 integers | |
6. |
What will happen if in a C program you assign a value to an array element whose subscript exceeds the size of array? |
A. | The element will be set to 0. |
B. | The compiler would report an error. |
C. | The program may crash if some important data gets overwritten. |
D. | The array size would appropriately grow. |
Answer» D. The array size would appropriately grow. | |
7. |
What does the following declaration mean? int (*ptr)[10]; |
A. | ptr is array of pointers to 10 integers |
B. | ptr is a pointer to an array of 10 integers |
C. | ptr is an array of 10 integers |
D. | ptr is an pointer to array |
Answer» C. ptr is an array of 10 integers | |
8. |
How will you free the allocated memory? |
A. | remove(var-name); |
B. | free(var-name); |
C. | delete(var-name); |
D. | dalloc(var-name); |
Answer» C. delete(var-name); | |
9. |
What do the following declaration signify? char *arr[10]; |
A. | arr is a array of 10 character pointers. |
B. | arr is a array of function pointer. |
C. | arr is a array of characters. |
D. | arr is a pointer to array of characters. |
Answer» B. arr is a array of function pointer. | |
10. |
Which among the following is right? |
A. | sizeof(struct stemp*) > sizeof(union utemp*) > sizeof(char *) |
B. | sizeof(struct stemp*) < sizeof(union utemp*) < sizeof(char *) |
C. | sizeof(struct stemp*) = sizeof(union utemp*) = sizeof(char *) |
D. | The order Depends on the compiler |
Answer» D. The order Depends on the compiler | |
11. |
What is the similarity between a structure, union and enumeration? |
A. | All of them let you define new values |
B. | All of them let you define new data types |
C. | All of them let you define new pointers |
D. | All of them let you define new structures |
Answer» C. All of them let you define new pointers | |
12. |
stdout, stdin and stderr are ________ |
A. | File pointers |
B. | File descriptors |
C. | Streams |
D. | Structure |
Answer» B. File descriptors | |
13. |
What is FILE reserved word? |
A. | A structure tag declared in stdio.h |
B. | One of the basic data types in c |
C. | Pointer to the structure defined in stdio.h |
D. | It is a type name defined in stdio.h |
Answer» E. | |
14. |
Which of the following fopen() statements are illegal? |
A. | fp = fopen(“abc.txt”, “r”); |
B. | fp = fopen(“/home/user1/abc.txt”, “w”); |
C. | fp = fopen(“abc”, “w”); |
D. | none of the mentioned |
Answer» E. | |
15. |
How does user buffer work? |
A. | When user logs on to the system ,user buffer is created containing all user context |
B. | When user logs on to the system ,manually required to generate user buffer |
C. | When user is created by default user buffer is created |
D. | All of the above is correct |
Answer» B. When user logs on to the system ,manually required to generate user buffer | |
16. |
User master record comparison is scheduled in background by executing which job ? |
A. | PFCG_TIME_DEPENDENCY |
B. | PFCG_TOTAL_DEPENDENCY |
C. | PFCG_AUTH_DEPENDENCY |
D. | PFCG_DEPENDENCY_AUTH |
Answer» B. PFCG_TOTAL_DEPENDENCY | |
17. |
What will happen when you create a role from the transaction code PFCG ? |
A. | Generated profile by default assigned to user master record |
B. | Generated profile should not be assigned to user master record until the user master record have been compared |
C. | Authorization profile created with default adjustments |
D. | None of the above |
Answer» C. Authorization profile created with default adjustments | |
18. |
Which join combines all rows from both tables? |
A. | Inner Join |
B. | Left Outer Join |
C. | Right Outer Join |
D. | Cross Join |
Answer» E. | |
19. |
Which of the following prevent "Dirty Reads"? |
A. | Read commited |
B. | Read Uncommitted |
C. | Repeatable Read |
D. | Serializable |
Answer» D. Serializable | |
20. |
Which of the following Linux commands could be used to find what processor was detected on boot, when a laptop system is slow/ |
A. | proc |
B. | POST |
C. | dmesg |
D. | Any of the above |
Answer» C. dmesg | |
21. |
Which of the following will kill the process 1010 by an administrator(logged in as a standard user)? The process 1010 was started by the root user. |
A. | kill 1010 |
B. | su "kill 1010" |
C. | su -c "kill 1010" |
D. | killall -9 1010 |
Answer» D. killall -9 1010 | |
22. |
How much usable space is available, when a Linux system is configured with a RAID 5 array that consists of six 20 GB hard disk drives? |
A. | 80 |
B. | 0100 |
C. | 120 |
D. | 60 |
Answer» D. 60 | |
23. |
Which directory contains configuration files that stores system and application setting? |
A. | /etc |
B. | /lib |
C. | /usr |
D. | /var |
Answer» B. /lib | |
24. |
Saving open files, flush the system cache and other necessary system maintenance are allowed by. |
A. | restarting the system |
B. | rebooting the system |
C. | logging off the system |
D. | shutting down the system |
Answer» D. shutting down the system | |
25. |
The hierarchy of a series of directories branching in a user system starts from |
A. | home |
B. | oot |
C. | /home |
D. | /root |
Answer» D. /root | |
26. |
In Novell’s use of RIP, there are two metrics used to make routing decisions. Select the two metrics. |
A. | Ticks & Hops |
B. | Hops & Loops |
C. | Loops & Counts |
D. | Counts & Ticks |
Answer» B. Hops & Loops | |
27. |
Novell’s implementation of RIP updates routing tables every _________ seconds. |
A. | 60 |
B. | 90 |
C. | 10 |
D. | 30 |
Answer» B. 90 | |
28. |
What does the “IPX maximum-paths 2” command accomplish? |
A. | It enables load sharing on 2 paths if the paths are equal metric paths |
B. | It sets up routing to go to network 2 |
C. | It is the default for Cisco IPX load sharing |
D. | It enables load sharing on 2 paths if the paths are unequal metric paths |
Answer» B. It sets up routing to go to network 2 | |
29. |
NetWare IPX addressing uses a network number and a node number. Which statement is not true? |
A. | The network address is administratively assigned and can be up to 16 hexadecimal digits long |
B. | The node address is always administratively assigned |
C. | The node address is usually the MAC address |
D. | If the MAC address is used as the node address, then IPX eliminates the use of ARP |
Answer» C. The node address is usually the MAC address | |
30. |
Consider that m elements are to be sorted. What is the worst case time complexity of bubble sort ? |
A. | O(1) |
B. | O(log n) |
C. | O(n) |
D. | O(n2) |
Answer» E. | |
31. |
The C declaration int A[5][7] Contains x elements, each of these elements is itself an array containing y integers. What is the value of 2x+y |
A. | 17 |
B. | 24 |
C. | 354 |
D. | None of the above |
Answer» B. 24 | |
32. |
What is the order to access the elements of a pushdown stack ? |
A. | First In First Out |
B. | Last In First Out |
C. | Last In Last Out |
D. | First In Last Out |
Answer» C. Last In Last Out | |
33. |
Which of the following is the function/s of the database administration? |
A. | Application checking |
B. | Database access planning |
C. | Computer applications management |
D. | All of these |
Answer» C. Computer applications management | |
34. |
What of the following sorting procedure is the slowest? |
A. | Bubble sort |
B. | Quick sort |
C. | Heap sort |
D. | Shell sort |
Answer» B. Quick sort | |
35. |
What is the function of application programs in the DBMS approach? |
A. | processing functions |
B. | storage functions |
C. | access control |
D. | None of these |
Answer» B. storage functions | |