Explore topic-wise MCQs in Amazon.

This section includes 35 Mcqs, each offering curated multiple-choice questions to sharpen your Amazon knowledge and support exam preparation. Choose a topic below to get started.

1.

Which of the following correctly shows the hierarchy of arithmetic operations in C?

A. / + * -
B. * - / +
C. + - / *
D. / * + -
Answer» E.
2.

Which of the following is not logical operator?

A. &
B. &&
C. ||
D. !
Answer» B. &&
3.

What will you do to treat the constant 3.14 as a long double?

A. use 3.14LD
B. use 3.14L
C. use 3.14DL
D. use 3.14LF
Answer» C. use 3.14DL
4.

What are the different types of real data type in C ?

A. float, double
B. short int, double, long int
C. float, double, long double
D. double, long int, float
Answer» D. double, long int, float
5.

What does the following declaration mean? int (*ptr)[10];

A. ptr is array of pointers to 10 integers
B. ptr is a pointer to an array of 10 integers
C. ptr is an array of 10 integers
D. ptr is an pointer to array
Answer» C. ptr is an array of 10 integers
6.

What will happen if in a C program you assign a value to an array element whose subscript exceeds the size of array?

A. The element will be set to 0.
B. The compiler would report an error.
C. The program may crash if some important data gets overwritten.
D. The array size would appropriately grow.
Answer» D. The array size would appropriately grow.
7.

What does the following declaration mean? int (*ptr)[10];

A. ptr is array of pointers to 10 integers
B. ptr is a pointer to an array of 10 integers
C. ptr is an array of 10 integers
D. ptr is an pointer to array
Answer» C. ptr is an array of 10 integers
8.

How will you free the allocated memory?

A. remove(var-name);
B. free(var-name);
C. delete(var-name);
D. dalloc(var-name);
Answer» C. delete(var-name);
9.

What do the following declaration signify? char *arr[10];

A. arr is a array of 10 character pointers.
B. arr is a array of function pointer.
C. arr is a array of characters.
D. arr is a pointer to array of characters.
Answer» B. arr is a array of function pointer.
10.

Which among the following is right?

A. sizeof(struct stemp*) > sizeof(union utemp*) > sizeof(char *)
B. sizeof(struct stemp*) < sizeof(union utemp*) < sizeof(char *)
C. sizeof(struct stemp*) = sizeof(union utemp*) = sizeof(char *)
D. The order Depends on the compiler
Answer» D. The order Depends on the compiler
11.

What is the similarity between a structure, union and enumeration?

A. All of them let you define new values
B. All of them let you define new data types
C. All of them let you define new pointers
D. All of them let you define new structures
Answer» C. All of them let you define new pointers
12.

stdout, stdin and stderr are ________

A. File pointers
B. File descriptors
C. Streams
D. Structure
Answer» B. File descriptors
13.

What is FILE reserved word?

A. A structure tag declared in stdio.h
B. One of the basic data types in c
C. Pointer to the structure defined in stdio.h
D. It is a type name defined in stdio.h
Answer» E.
14.

Which of the following fopen() statements are illegal?

A. fp = fopen(“abc.txt”, “r”);
B. fp = fopen(“/home/user1/abc.txt”, “w”);
C. fp = fopen(“abc”, “w”);
D. none of the mentioned
Answer» E.
15.

How does user buffer work?

A. When user logs on to the system ,user buffer is created containing all user context
B. When user logs on to the system ,manually required to generate user buffer
C. When user is created by default user buffer is created
D. All of the above is correct
Answer» B. When user logs on to the system ,manually required to generate user buffer
16.

User master record comparison is scheduled in background by executing which job ?

A. PFCG_TIME_DEPENDENCY
B. PFCG_TOTAL_DEPENDENCY
C. PFCG_AUTH_DEPENDENCY
D. PFCG_DEPENDENCY_AUTH
Answer» B. PFCG_TOTAL_DEPENDENCY
17.

What will happen when you create a role from the transaction code PFCG ?

A. Generated profile by default assigned to user master record
B. Generated profile should not be assigned to user master record until the user master record have been compared
C. Authorization profile created with default adjustments
D. None of the above
Answer» C. Authorization profile created with default adjustments
18.

Which join combines all rows from both tables?

A. Inner Join
B. Left Outer Join
C. Right Outer Join
D. Cross Join
Answer» E.
19.

Which of the following prevent "Dirty Reads"?

A. Read commited
B. Read Uncommitted
C. Repeatable Read
D. Serializable
Answer» D. Serializable
20.

Which of the following Linux commands could be used to find what processor was detected on boot, when a laptop system is slow/

A. proc
B. POST
C. dmesg
D. Any of the above
Answer» C. dmesg
21.

Which of the following will kill the process 1010 by an administrator(logged in as a standard user)? The process 1010 was started by the root user.

A. kill 1010
B. su "kill 1010"
C. su -c "kill 1010"
D. killall -9 1010
Answer» D. killall -9 1010
22.

How much usable space is available, when a Linux system is configured with a RAID 5 array that consists of six 20 GB hard disk drives?

A. 80
B. 0100
C. 120
D. 60
Answer» D. 60
23.

Which directory contains configuration files that stores system and application setting?

A. /etc
B. /lib
C. /usr
D. /var
Answer» B. /lib
24.

Saving open files, flush the system cache and other necessary system maintenance are allowed by.

A. restarting the system
B. rebooting the system
C. logging off the system
D. shutting down the system
Answer» D. shutting down the system
25.

The hierarchy of a series of directories branching in a user system starts from

A. home
B. oot
C. /home
D. /root
Answer» D. /root
26.

In Novell’s use of RIP, there are two metrics used to make routing decisions. Select the two metrics.

A. Ticks & Hops
B. Hops & Loops
C. Loops & Counts
D. Counts & Ticks
Answer» B. Hops & Loops
27.

Novell’s implementation of RIP updates routing tables every _________ seconds.

A. 60
B. 90
C. 10
D. 30
Answer» B. 90
28.

What does the “IPX maximum-paths 2” command accomplish?

A. It enables load sharing on 2 paths if the paths are equal metric paths
B. It sets up routing to go to network 2
C. It is the default for Cisco IPX load sharing
D. It enables load sharing on 2 paths if the paths are unequal metric paths
Answer» B. It sets up routing to go to network 2
29.

NetWare IPX addressing uses a network number and a node number. Which statement is not true?

A. The network address is administratively assigned and can be up to 16 hexadecimal digits long
B. The node address is always administratively assigned
C. The node address is usually the MAC address
D. If the MAC address is used as the node address, then IPX eliminates the use of ARP
Answer» C. The node address is usually the MAC address
30.

Consider that m elements are to be sorted. What is the worst case time complexity of bubble sort ?

A. O(1)
B. O(log n)
C. O(n)
D. O(n2)
Answer» E.
31.

The C declaration int A[5][7] Contains x elements, each of these elements is itself an array containing y integers. What is the value of 2x+y

A. 17
B. 24
C. 354
D. None of the above
Answer» B. 24
32.

What is the order to access the elements of a pushdown stack ?

A. First In First Out
B. Last In First Out
C. Last In Last Out
D. First In Last Out
Answer» C. Last In Last Out
33.

Which of the following is the function/s of the database administration?

A. Application checking
B. Database access planning
C. Computer applications management
D. All of these
Answer» C. Computer applications management
34.

What of the following sorting procedure is the slowest?

A. Bubble sort
B. Quick sort
C. Heap sort
D. Shell sort
Answer» B. Quick sort
35.

What is the function of application programs in the DBMS approach?

A. processing functions
B. storage functions
C. access control
D. None of these
Answer» B. storage functions