Ibps I.T. Officer Scale-I 2013.

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Prashant_kr
P
Prashant_kr
Community Contributor
Quizzes Created: 3 | Total Attempts: 1,467
Questions: 50 | Attempts: 385

SettingsSettingsSettings
Scale Quizzes & Trivia

Test consists of 50 Questions 75 Marks. Total Time=30 minutes


Questions and Answers
  • 1. 

    Which of the following microprocessors is not 8bit microprocessor?

    • A.

      8085

    • B.

      6502

    • C.

      Z80

    • D.

      68000

    • E.

      None of these

    Correct Answer
    D. 68000
    Explanation
    68000 is a 16 bit Microprocessor

    Rate this question:

  • 2. 

    Which of the following interrupts has the lowest priority?

    • A.

      RST 5.5

    • B.

      RST 7.5

    • C.

      TRAP

    • D.

      INTR

    • E.

      None of These

    Correct Answer
    D. INTR
    Explanation
    he lowest priority interrupt in the 8085 microprocessor is INTR

    Rate this question:

  • 3. 

    The Data control language (DCL).

    • A.

      Is used to manage user access to data bases

    • B.

      Is used to manipulate the contents of a database in some form

    • C.

      Both (A) and (B)

    • D.

      Used for inserting, deleting and updating data in a database

    • E.

      None of these

    Correct Answer
    A. Is used to manage user access to data bases
    Explanation
    The correct answer is "is used to manage user access to databases." The Data Control Language (DCL) is a subset of SQL (Structured Query Language) that is used to control access to the database by granting or revoking privileges to users. It includes commands such as GRANT and REVOKE, which allow administrators to specify the level of access that different users or user groups have to the database. DCL is primarily focused on managing user permissions and ensuring data security within the database system.

    Rate this question:

  • 4. 

    Microprocessor 8085 is the enhanced version of which essentially the same construction set

    • A.

      6800

    • B.

      8080

    • C.

      6800A

    • D.

      8000

    • E.

      All of these

    Correct Answer
    B. 8080
    Explanation
    The correct answer is 8080. The microprocessor 8085 is an enhanced version of the 8080 microprocessor. It is essentially the same construction set as the 8080 but with some added features and improvements. The 8085 is backward compatible with the 8080, meaning that programs written for the 8080 can run on the 8085 without any modifications. Therefore, the 8080 is the correct answer as it is the predecessor to the 8085 and shares the same construction set.

    Rate this question:

  • 5. 

    A collection of fields is called a record with respect of DBMS, a record corresponds to

    • A.

      Tuple

    • B.

      Relation

    • C.

      File

    • D.

      Attribute

    • E.

      None of these

    Correct Answer
    A. Tuple
    Explanation
    In the context of a DBMS, a record is a collection of fields that represents a single entity or instance of a table. In this case, the correct term for a collection of fields is a "tuple". A tuple is a row in a table that contains data for each attribute or field. Therefore, the correct answer is "Tuple".

    Rate this question:

  • 6. 

    Multiplexer means

    • A.

      One into many

    • B.

      Many into one

    • C.

      Many into many

    • D.

      All of the above

    • E.

      None of these

    Correct Answer
    B. Many into one
    Explanation
    A multiplexer is a device that combines multiple input signals into a single output signal. It selects one of the input signals based on a control signal and forwards it to the output. Therefore, the correct answer is "Many into one" as it accurately describes the functionality of a multiplexer.

    Rate this question:

  • 7. 

    Which gate is known as universal gate ?

    • A.

      NOT gate

    • B.

      NAND gate

    • C.

      AND gate

    • D.

      XOR gate

    • E.

      None of these

    Correct Answer
    B. NAND gate
    Explanation
    The NAND gate is known as the universal gate because it can be used to implement any other logic gate. It can perform the functions of AND, OR, and NOT gates by combining multiple NAND gates in different configurations. This makes it a versatile gate that can be used to design complex digital circuits.

    Rate this question:

  • 8. 

    Which of the following is the first integrated logic family?

    • A.

      TCL

    • B.

      TIL

    • C.

      DTL

    • D.

      MOS

    • E.

      RTL

    Correct Answer
    E. RTL
    Explanation
    RTL stands for Resistor-Transistor Logic, which was the first integrated logic family. It was developed in the late 1950s and early 1960s and was widely used in early computer systems. RTL logic gates were constructed using resistors and transistors, and they operated by using the transistor as a switch to control the flow of current. This allowed for the creation of complex logic circuits on a single integrated circuit, paving the way for the development of modern digital electronics.

    Rate this question:

  • 9. 

    In the relational schema, each tuple is divided into fields called.

    • A.

      Relations

    • B.

      Domains

    • C.

      Queries

    • D.

      Both (A) and (B)

    • E.

      Both (A) and (C)

    Correct Answer
    B. Domains
    Explanation
    In a relational schema, each tuple is divided into fields called domains. Domains define the set of possible values that a field can take in a relation. They specify the data type and constraints for each field in a relation. By dividing tuples into fields called domains, it allows for better organization and management of data within a relational database system.

    Rate this question:

  • 10. 

    A top to bottom relationship among the items in a database is established by a

    • A.

      Hierarchical schema

    • B.

      Network Schema

    • C.

      Relational Schema

    • D.

      Both (A) and (B)

    • E.

      Both (B) and (C)

    Correct Answer
    A. Hierarchical schema
    Explanation
    A hierarchical schema is a database structure where the data is organized in a tree-like structure, with a top-to-bottom relationship among the items. This means that each item has only one parent and can have multiple children. This type of schema is commonly used in systems where data has a clear parent-child relationship, such as organizational structures or file systems. Network schema, on the other hand, allows for a more complex relationship among items, with each item being able to have multiple parents and children. Relational schema, on the other hand, is a database structure where data is organized into tables with relationships established through keys. Therefore, the correct answer is hierarchical schema as it establishes a top-to-bottom relationship among the items in a database.

    Rate this question:

  • 11. 

    The modify operation is likely to be done after.

    • A.

      Delete

    • B.

      Insert

    • C.

      Look up

    • D.

      All of the above

    • E.

      None of these

    Correct Answer
    C. Look up
    Explanation
    The correct answer is "Look up" because the modify operation typically involves searching for an existing element or record in a data structure or database before making any changes to it. This involves looking up the desired element or record based on certain criteria or key values. Therefore, "Look up" is the most appropriate option among the given choices.

    Rate this question:

  • 12. 

    The way a particular application views the data from the database that the application uses is a :

    • A.

      Module

    • B.

      Relational model

    • C.

      Schema

    • D.

      Subschema

    • E.

      None of these

    Correct Answer
    D. Subschema
    Explanation
    A subschema refers to a subset of the entire database schema that is relevant to a specific application or user. It allows the application to view and manipulate only the data that is necessary for its functionality, while hiding the rest of the database's structure and data. This helps in maintaining data security and providing a simplified view of the database for different applications or users.

    Rate this question:

  • 13. 

    Which two files are used during operation of the DBMS?

    • A.

      Query language and utilities

    • B.

      Data manipulation language and query language:

    • C.

      Data dictionary and transaction log

    • D.

      Data dictionary and query language

    • E.

      None of these

    Correct Answer
    C. Data dictionary and transaction log
    Explanation
    During the operation of a DBMS, two important files are used: the data dictionary and the transaction log. The data dictionary contains metadata about the database, such as the structure, organization, and relationships between tables. It helps in maintaining data integrity and ensuring consistency. On the other hand, the transaction log records all the changes made to the database, including insertions, deletions, and modifications. It provides a way to recover the database in case of system failures or errors. Therefore, the data dictionary and transaction log are essential components for the smooth functioning of a DBMS.

    Rate this question:

  • 14. 

     Which normal form is considered adequate for relational da   tabase design?  

    • A.

      2 NF

    • B.

      3 NF

    • C.

      4 NF

    • D.

      5 NF

    • E.

      BCNF

    Correct Answer
    B. 3 NF
    Explanation
    The third normal form (3NF) is considered adequate for relational database design. This normal form ensures that there is no transitive dependency between non-key attributes in a table. It eliminates any redundancy and allows for efficient storage and retrieval of data. By adhering to 3NF, a database can achieve a high level of data integrity and maintainability.

    Rate this question:

  • 15. 

    An attribute of one matching the primary key another table, is called as

    • A.

      Foreign key

    • B.

      Secondary key

    • C.

      Candidate key

    • D.

      Composite key

    • E.

      None of these

    Correct Answer
    A. Foreign key
    Explanation
    A foreign key is an attribute in one table that matches the primary key of another table. It is used to establish a relationship between the two tables and enforce referential integrity. When a foreign key is defined, it ensures that values in the referencing table (child table) must exist in the referenced table (parent table). This helps maintain data consistency and integrity between related tables in a database. Therefore, the correct answer is "Foreign key".

    Rate this question:

  • 16. 

    Which of the following SQL commands can be used modify existing data in a database table?

    • A.

      MODIFY

    • B.

      UPDATE

    • C.

      CHANGE

    • D.

      NEW

    • E.

      None of these

    Correct Answer
    B. UPDATE
    Explanation
    The UPDATE command is used to modify existing data in a database table. It allows users to change the values of specific columns in one or more rows of a table. The other options, MODIFY, CHANGE, and NEW, are not valid SQL commands for modifying data in a table. Therefore, the correct answer is UPDATE.

    Rate this question:

  • 17. 

    The average number of key comparisons done in a successful sequential search in a list of length “n” is

    • A.

      Log n

    • B.

      (n-1)/2

    • C.

      N/2

    • D.

      (n+1)/2

    • E.

      None of these

    Correct Answer
    D. (n+1)/2
    Explanation
    The average number of key comparisons done in a successful sequential search in a list of length "n" is (n+1)/2. This is because in a sequential search, each element in the list is compared with the key until a match is found. On average, the key is expected to be found in the middle of the list, so the number of comparisons needed would be approximately half of the length of the list. Adding 1 to account for the final comparison gives us the average number of comparisons as (n+1)/2.

    Rate this question:

  • 18. 

    Each node in a linked list must contain at least:

    • A.

      Three fields

    • B.

      Five fields

    • C.

      Four fields

    • D.

      Two Fields

    • E.

      One Field

    Correct Answer
    D. Two Fields
    Explanation
    In a linked list, each node stores two fields: one for the data and one for the reference to the next node in the list. These two fields are essential for maintaining the structure and connectivity of the linked list. The data field holds the actual value or information that the node is intended to store, while the reference field points to the next node in the list, allowing traversal through the linked list. Having only one field would not be sufficient to create a linked list, and having more than two fields would be unnecessary for the basic functionality of a linked list.

    Rate this question:

  • 19. 

    The order of the binary search algorithm is

    • A.

      N

    • B.

      N^2

    • C.

      Nlog(n)

    • D.

      Log(n)

    • E.

      None of these

    Correct Answer
    D. Log(n)
    Explanation
    The order of the binary search algorithm is logarithmic (log(n)). This is because in each step of the algorithm, the search space is divided in half. As a result, the algorithm can quickly narrow down the search range until it finds the desired element or determines that it does not exist. This logarithmic time complexity makes binary search efficient, especially for large datasets, as it significantly reduces the number of comparisons needed to find the target element.

    Rate this question:

  • 20. 

    Which of the following is useful in implementing quick sort using recursion?

    • A.

      Stack

    • B.

      Set

    • C.

      List

    • D.

      Queue

    • E.

      None of these

    Correct Answer
    A. Stack
    Explanation
    Stack is useful in implementing quick sort using recursion because it follows the Last In First Out (LIFO) principle. In quick sort, the partitioning step involves selecting a pivot element and rearranging the array such that all elements smaller than the pivot are placed before it, and all elements greater than the pivot are placed after it. This partitioning process is performed recursively on the sub-arrays formed before and after the pivot. Using a stack allows us to keep track of the sub-arrays that need to be processed, ensuring that the recursive calls are made in the correct order and preventing stack overflow.

    Rate this question:

  • 21. 

    Which data communication method is used to transmit the data over a serial communication link.

    • A.

      Simplex

    • B.

      Full duplex

    • C.

      Half duplex

    • D.

      Both (a) and (b)

    • E.

      Both (b) and (c)

    Correct Answer
    B. Full duplex
    Explanation
    Full duplex is the correct answer because it is a data communication method that allows data to be transmitted simultaneously in both directions over a serial communication link. In full duplex, data can be sent and received at the same time, enabling faster and more efficient communication. This is different from simplex, where data can only be transmitted in one direction, and half duplex, where data can be transmitted in both directions but not simultaneously. Both (a) and (b) and both (b) and (c) are incorrect options as they do not accurately describe the method used to transmit data over a serial communication link.

    Rate this question:

  • 22. 

    OSI model consists of ____ layers

    • A.

      3

    • B.

      4

    • C.

      5

    • D.

      6

    • E.

      7

    Correct Answer
    E. 7
    Explanation
    The OSI (Open Systems Interconnection) model consists of 7 layers. These layers are a conceptual framework that helps in understanding how different network protocols and technologies interact with each other. Each layer has a specific function and is responsible for a particular aspect of network communication. These layers include the physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer.

    Rate this question:

  • 23. 

    Encryption and decryption are functions of the ____ layer.

    • A.

      Transport

    • B.

      Session

    • C.

      Application

    • D.

      Physical

    • E.

      Presentation

    Correct Answer
    E. Presentation
    Explanation
    The correct answer is Presentation. Encryption and decryption are functions of the Presentation layer in the OSI model. This layer is responsible for the formatting and encryption of data to be sent over the network. It ensures that the data is in a format that can be understood by the receiving device and also handles encryption and decryption for secure communication.

    Rate this question:

  • 24. 

    Which of the following is not a connecting device?

    • A.

      Bridge

    • B.

      Trans receiver

    • C.

      Router

    • D.

      Repeater

    • E.

      None of these

    Correct Answer
    B. Trans receiver
    Explanation
    A transceiver is a device that combines both transmitter and receiver functions in one unit. It is used for transmitting and receiving signals in a network. Therefore, it is considered a connecting device. Bridges, routers, and repeaters are all examples of connecting devices as well, as they are used to connect different parts of a network together.

    Rate this question:

  • 25. 

    How many hosts are attached to each of the local area network at your site?

    • A.

      128

    • B.

      256

    • C.

      254

    • D.

      64

    • E.

      None of these

    Correct Answer
    C. 254
    Explanation
    The correct answer is 254 because in a local area network, the number of hosts that can be attached is determined by the available IP addresses in the network's subnet. In a typical IPv4 subnet, the total number of usable IP addresses is 2^(number of bits in the host portion of the IP address) - 2. Since a typical subnet has 8 bits for the host portion, the calculation would be 2^8 - 2, which equals 256 - 2 = 254. Therefore, each local area network at the site can have 254 hosts attached.

    Rate this question:

  • 26. 

    Which of the following types of software should we use if we often need to create, edit and print documents?

    • A.

      Word processing

    • B.

      Spread sheet

    • C.

      Object program

    • D.

      UNIX

    • E.

      None of these

    Correct Answer
    A. Word processing
    Explanation
    Word processing software is the appropriate choice for creating, editing, and printing documents. This type of software provides tools and features specifically designed for manipulating text, formatting documents, and producing professional-looking prints. Word processing software allows users to easily type, edit, and format text, insert images and tables, apply styles and templates, and perform spell-checking and grammar correction. It also offers features like page layout customization, header and footer management, and printing options, making it the ideal choice for tasks related to document creation, editing, and printing.

    Rate this question:

  • 27. 

    _____ is present in spiral model

    • A.

      Code generator

    • B.

      Risk analysis

    • C.

      Code optimizer

    • D.

      Reengineering

    • E.

      None of these

    Correct Answer
    B. Risk analysis
    Explanation
    The spiral model is a software development process model that combines elements of both waterfall and iterative development models. It involves a series of iterations or spirals, with each spiral representing a phase of the software development life cycle. During the risk analysis phase of the spiral model, potential risks and uncertainties associated with the project are identified and analyzed. This helps in making informed decisions and taking necessary actions to mitigate or manage these risks effectively. Therefore, risk analysis is an integral part of the spiral model.

    Rate this question:

  • 28. 

    The approach used in top down analysis and design is :

    • A.

      To identify the top level functions by combining many smaller components into a single entity

    • B.

      To identify a top level function and then create hierarchy of lower level modules and components

    • C.

      To prepare flowcharts after programming has been completed

    • D.

      All of these

    • E.

      None of these

    Correct Answer
    B. To identify a top level function and then create hierarchy of lower level modules and components
    Explanation
    The correct answer is to identify a top level function and then create a hierarchy of lower level modules and components. This approach involves breaking down a complex system into smaller, manageable components and organizing them in a hierarchical structure. By identifying the top level function first, the design process can be structured and the lower level modules and components can be designed to fulfill the requirements of the top level function. This approach allows for better understanding, organization, and management of the system's functionality.

    Rate this question:

  • 29. 

    B2C ecommerce focuses on customer ___.

    • A.

      Respond to customer

    • B.

      Obtain customer feedback

    • C.

      Establish buyerseller transaction

    • D.

      All of these

    • E.

      None of these

    Correct Answer
    D. All of these
    Explanation
    B2C ecommerce focuses on customer satisfaction and engagement throughout the entire buying process. It involves responding to customer inquiries and concerns, obtaining customer feedback to improve products and services, and facilitating the buyer-seller transaction. Therefore, all of these options are correct as they encompass the various aspects of customer interaction in B2C ecommerce.

    Rate this question:

  • 30. 

    OLAP stands for

    • A.

      Online Analytical project

    • B.

      Online Analytical problem

    • C.

      Online Application process

    • D.

      Online Application Problem

    • E.

      Online Analytical processing

    Correct Answer
    E. Online Analytical processing
    Explanation
    OLAP stands for Online Analytical Processing. It is a technology used in data analysis that allows users to extract and view data from multiple dimensions or perspectives. It enables users to perform complex calculations, generate reports, and gain insights from large volumes of data. OLAP is commonly used in business intelligence and decision-making processes, as it provides a multidimensional view of data, allowing users to analyze it from different angles.

    Rate this question:

  • 31. 

    Thrashing

    • A.

      Can always be avoided by swapping

    • B.

      Is a natural consequence of virtual memory system Always occurs on large computers

    • C.

      Can be caused by poor paging algorithms

    • D.

      None of these

    Correct Answer
    B. Is a natural consequence of virtual memory system Always occurs on large computers
    Explanation
    Thrashing refers to a situation in which a computer's performance is severely degraded due to excessive swapping of pages between the main memory and the disk. It occurs when the system is constantly busy swapping pages in and out, instead of executing useful work. This is a natural consequence of the virtual memory system, where pages are swapped in and out to manage memory usage. While it can occur on any computer, it is more likely to happen on large computers with high memory demands. Poor paging algorithms can also contribute to thrashing.

    Rate this question:

  • 32. 

    Data mining is

    • A.

      Storing data when in need

    • B.

      Automatic extraction of patters of information

    • C.

      Searching data on Internet

    • D.

      All of these

    • E.

      None of these

    Correct Answer
    B. Automatic extraction of patters of information
    Explanation
    The correct answer is "Automatic extraction of patterns of information." Data mining refers to the process of discovering patterns, correlations, and relationships in large datasets. It involves using various techniques and algorithms to automatically extract valuable information from the data. This information can be used for decision-making, predictive analysis, and other purposes. Storing data when in need and searching data on the internet are not accurate definitions of data mining. Therefore, the correct answer is automatic extraction of patterns of information.

    Rate this question:

  • 33. 

    Decision support system are based on ____ analysis

    • A.

      Query and reporting

    • B.

      Data mining

    • C.

      OLAP

    • D.

      All of these

    • E.

      None of these

    Correct Answer
    D. All of these
    Explanation
    Decision support systems are based on various types of analysis, including query and reporting, data mining, and OLAP (Online Analytical Processing). Query and reporting analysis allows users to retrieve specific information from the system, while data mining involves discovering patterns and relationships in large datasets. OLAP analysis involves multidimensional analysis of data to provide insights and support decision-making. Therefore, all of these types of analysis are utilized in decision support systems.

    Rate this question:

  • 34. 

    Backup procedure helps in

    • A.

      Restoring the operation whenever there is a disk failure

    • B.

      Restoring both application and system software whenever there is disk corruption

    • C.

      Restoring the data sites whenever there is a system crash

    • D.

      All of the above

    • E.

      None of these

    Correct Answer
    D. All of the above
    Explanation
    A backup procedure is an essential part of any system to ensure the continuity of operations and protect against data loss. It helps in restoring the operation whenever there is a disk failure by providing a copy of the data that can be used to rebuild the system. It also helps in restoring both application and system software whenever there is disk corruption, allowing the system to be brought back to a functional state. Additionally, it helps in restoring the data sites whenever there is a system crash, ensuring that the data is not permanently lost. Therefore, the correct answer is "All of the above."

    Rate this question:

  • 35. 

    Banker’s algorithm for resource allocation deals with

    • A.

      Deadlock prevention

    • B.

      Deadlock avoidance

    • C.

      Deadlock recovery

    • D.

      Mutual exclusion

    • E.

      All of these

    Correct Answer
    B. Deadlock avoidance
    Explanation
    The Banker's algorithm for resource allocation is a technique used to prevent deadlocks from occurring in a system. It works by carefully analyzing the available resources and the current allocation requests to determine if granting a request would potentially lead to a deadlock. By avoiding situations that may result in a deadlock, the Banker's algorithm helps to ensure the system's stability and prevent resource deadlocks.

    Rate this question:

  • 36. 

    Regression testing in primarily related to

    • A.

      Functional testing

    • B.

      Data flow testing

    • C.

      Development testing

    • D.

      Maintenance testing

    • E.

      None of these

    Correct Answer
    A. Functional testing
    Explanation
    Regression testing is primarily related to functional testing because it is a type of testing that ensures that previously developed and tested software still performs correctly after changes or updates have been made. Functional testing focuses on testing the functionality of the software to ensure that it meets the specified requirements. Regression testing is specifically aimed at verifying that the existing functionality has not been affected by any changes or updates, making it closely related to functional testing.

    Rate this question:

  • 37. 

    Pointer is used in

    • A.

      Direct Addressing

    • B.

      Indirect Addressing

    • C.

      Indexed mode

    • D.

      Immediate Addressing

    • E.

      None of these

    Correct Answer
    B. Indirect Addressing
    Explanation
    Indirect addressing is a method of accessing data in which the address of the data is stored in a pointer variable. Instead of directly accessing the data, the pointer is used to indirectly access the data. This allows for more flexibility and dynamic memory allocation as the pointer can be updated to point to different memory locations. In contrast, direct addressing refers to directly accessing data using its memory address. Indexed mode and immediate addressing are different addressing modes that are not related to the use of pointers.

    Rate this question:

  • 38. 

    The break statement causes an exit.

    • A.

      From the innermost loop only

    • B.

      Only from the innermost switch

    • C.

      From the loops and switches

    • D.

      From the innermost loop or switch

    • E.

      None of these

    Correct Answer
    C. From the loops and switches
    Explanation
    The break statement in programming is used to exit a loop or switch statement. In this case, the correct answer is "From the loops and switches", which means that the break statement can cause an exit from both loops and switch statements. This means that when a break statement is encountered within a loop or switch, the program will immediately exit out of the loop or switch and continue with the next line of code outside of it.

    Rate this question:

  • 39. 

    The term push and pop is related to the

    • A.

      Array

    • B.

      Lists

    • C.

      Stacks

    • D.

      All of the above

    • E.

      None of these

    Correct Answer
    C. Stacks
    Explanation
    The term push and pop is related to stacks. In a stack data structure, the push operation adds an element to the top of the stack, while the pop operation removes the topmost element from the stack. This follows the Last-In-First-Out (LIFO) principle, where the last element pushed onto the stack is the first one to be popped off. Arrays and ArrayLists can also perform push and pop operations, but they are not specifically designed for it like stacks are. Therefore, the correct answer is Stacks.

    Rate this question:

  • 40. 

    Software testing is

    • A.

      The process of demonstrating that error are not present

    • B.

      One process of establishing confidence that a program does what it is supposed to do

    • C.

      The process of executing a program to show that it is working as per specifications

    • D.

      The process of executing a program with the intent of finding errors

    • E.

      None of these

    Correct Answer
    D. The process of executing a program with the intent of finding errors
    Explanation
    The correct answer is "The process of executing a program with the intent of finding errors." This answer accurately describes software testing as the process of intentionally executing a program to identify any errors or bugs present. The other options either do not fully capture the purpose of software testing or are not comprehensive enough to encompass the entire process.

    Rate this question:

  • 41. 

    HTTP refers to

    • A.

      Hyper Text Transmission Protocol

    • B.

      Hyper Text Transfer Protocol

    • C.

      Hyper Text Tie Protocol

    • D.

      Hyper Text Total Protocol

    • E.

      None of these

    Correct Answer
    B. Hyper Text Transfer Protocol
    Explanation
    HTTP stands for Hyper Text Transfer Protocol. It is a protocol used for transmitting hypertext over the internet. Hypertext refers to text that contains links to other texts, allowing users to navigate and access information on the World Wide Web. The correct answer is "Hyper Text Transfer Protocol."

    Rate this question:

  • 42. 

    Array can be passed in a functions in C language through

    • A.

      ‘Call by value’ only

    • B.

      ‘Call by reference’ only

    • C.

      Both (1) & (2)

    • D.

      Call by preference

    • E.

      None of these

    Correct Answer
    B. ‘Call by reference’ only
    Explanation
    In C language, arrays can only be passed to functions using 'Call by reference'. This means that when an array is passed to a function, the function receives a reference to the original array in memory, allowing it to modify the original array. This is different from 'Call by value', where a copy of the array would be passed to the function, and any modifications made to the array within the function would not affect the original array. Therefore, the correct answer is 'Call by reference' only.

    Rate this question:

  • 43. 

    Which of the following is easiest software development process model?

    • A.

      Waterfall Model

    • B.

      Prototyping

    • C.

      Interactive enhancement

    • D.

      Spiral Model

    • E.

      All of these

    Correct Answer
    A. Waterfall Model
    Explanation
    The Waterfall Model is considered the easiest software development process model because it follows a linear and sequential approach. It involves clearly defined phases, starting from requirements gathering and ending with maintenance. Each phase is completed before moving on to the next, which makes it easier to plan and manage the development process. Additionally, the Waterfall Model is well-documented and has a clear structure, making it easier for developers to understand and follow.

    Rate this question:

  • 44. 

    An email account includes a storage area, often called a (n)

    • A.

      Attachment

    • B.

      Hyperlink

    • C.

      Mailbox

    • D.

      IP Address

    • E.

      None of these

    Correct Answer
    A. Attachment
    Explanation
    An email account includes a storage area, often called a mailbox, where incoming and outgoing emails are stored. This mailbox acts as a virtual container for all the messages and attachments that are sent and received through the email account. It allows users to access and manage their emails, including attachments, in one central location. Therefore, the correct answer is "Mailbox".

    Rate this question:

  • 45. 

    A(n) ____  is a collection of information that determines which files you can access and which setting you use.

    • A.

      Network

    • B.

      User account

    • C.

      Operating system

    • D.

      File System

    • E.

      None of these

    Correct Answer
    B. User account
    Explanation
    A user account is a collection of information that determines which files you can access and which settings you use. It allows you to log in to a system or network and provides you with specific permissions and privileges based on your user role and level of access. With a user account, you can customize your settings, access specific files and folders, and interact with the operating system or network in a personalized manner.

    Rate this question:

  • 46. 

    To print a document

    • A.

      Select the print command and then select OK

    • B.

      Select the Ready printer and then select OK

    • C.

      Type PRINT and then press Enter

    • D.

      Close the document, select the print command then select OK

    • E.

      None of these

    Correct Answer
    A. Select the print command and then select OK
    Explanation
    The explanation for the given correct answer is that to print a document, the user needs to first select the print command. After selecting the print command, they should then select the "OK" button to confirm the printing action. This sequence of steps ensures that the document is sent to the printer and the printing process is initiated.

    Rate this question:

  • 47. 

    Which part of the computer provides only temporary storage of files?

    • A.

      ROM memory

    • B.

      Processor

    • C.

      Hard drive

    • D.

      Mother board

    • E.

      RAM memory

    Correct Answer
    E. RAM memory
    Explanation
    RAM memory provides only temporary storage of files. Unlike the hard drive, which stores files permanently, RAM memory is volatile and loses its data when the computer is powered off or restarted. The processor and motherboard are responsible for executing and managing tasks, while ROM memory stores permanent instructions for the computer. Therefore, RAM memory is the correct answer as it is specifically designed for temporary storage.

    Rate this question:

  • 48. 

    SONET uses

    • A.

      Twisted Pair Cable

    • B.

      Fiber Optic Cable

    • C.

      Co-Axial Cable

    • D.

      All of these

    • E.

      None of these

    Correct Answer
    B. Fiber Optic Cable
    Explanation
    SONET (Synchronous Optical Network) is a high-speed telecommunications network that is widely used for transmitting large amounts of data over long distances. It utilizes fiber optic cables for transmission because they offer high bandwidth, low signal loss, and immunity to electromagnetic interference. Twisted pair and coaxial cables are not suitable for SONET due to their limited bandwidth and higher susceptibility to signal degradation. Therefore, the correct answer is "Fiber Optic Cable."

    Rate this question:

  • 49. 

    1. What will be the output of “a” in following code?
    #include int main() int a=20; { int a=10; printf(“%d”,a); printf(“%d”,a);  return 0; }

    • A.

      20 20

    • B.

      10 20

    • C.

      20 10

    • D.

      10 10

    • E.

      Compilation Error

    Correct Answer
    E. Compilation Error
    Explanation
    The code will result in a compilation error because the main function is missing its opening and closing braces.

    Rate this question:

  • 50. 

    In Queue, the items deleted at one end called___

    • A.

      Rear

    • B.

      Front

    • C.

      Top

    • D.

      Bottom

    • E.

      None of these

    Correct Answer
    B. Front
    Explanation
    In a queue, the items that are deleted or removed are always done so from the front of the queue. This is because a queue follows the First-In-First-Out (FIFO) principle, where the item that has been in the queue for the longest time is the first one to be removed. Therefore, the correct answer is "Front".

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 03, 2014
    Quiz Created by
    Prashant_kr
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.