Opera Quiz - Campus Recruitment Pwr March 2018

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Catherine Halcomb
C
Catherine Halcomb
Community Contributor
Quizzes Created: 1452 | Total Attempts: 5,812,280
Questions: 36 | Attempts: 250

SettingsSettingsSettings
Recruitment Quizzes & Trivia

Welcome to the Opera Quiz!
You will be given 10 questions from various fields of IT. Each question has just single correct answer. We have 3 x SoundBlaster Free portable speaker and 3 x RaspberryPi Zero W sets for the students that solve the quiz with the best result and in the shortest time. We will get in contact with the winners within 10 days in order to schedule a tour of our office in Wrocław and deliver the prizes.
Opera Software Team
Please provide your data, so we can reach you out:


Questions and Answers
  • 1. 

    Which application layer protocol serves traffic between a web server and an internet browser?

    • A.

      UDP

    • B.

      HTTP

    • C.

      FTP

    • D.

      SMTP

    Correct Answer
    B. HTTP
    Explanation
    HTTP (Hypertext Transfer Protocol) is the correct answer because it is the application layer protocol that serves traffic between a web server and an internet browser. HTTP is responsible for transmitting hypertext messages, allowing the browser to request and receive web pages, images, videos, and other resources from the web server. It is the foundation of communication on the World Wide Web and enables the retrieval and display of web content.

    Rate this question:

  • 2. 

    Which of the following is not a Linux distribution?

    • A.

      Debian

    • B.

      Ubuntu

    • C.

      Red Hat

    • D.

      Redstone

    Correct Answer
    D. Redstone
    Explanation
    Redstone is not a Linux distribution. Debian, Ubuntu, and Red Hat are all well-known Linux distributions, but Redstone is not.

    Rate this question:

  • 3. 

    Which of the following is not a routing protocol?

    • A.

      RIP

    • B.

      RIPE

    • C.

      RIPv2

    • D.

      BGP

    Correct Answer
    B. RIPE
    Explanation
    RIPE (Réseaux IP Européens) is not a routing protocol. It is a regional internet registry responsible for allocating and managing IP address space in Europe, the Middle East, and parts of Central Asia. Routing protocols, on the other hand, are used by routers to exchange information and determine the best path for forwarding data packets in a network. RIP (Routing Information Protocol), RIPv2, and BGP (Border Gateway Protocol) are all examples of routing protocols.

    Rate this question:

  • 4. 

    Which of the following is the safest access method for wireless networks?

    • A.

      WPA-TKIP

    • B.

      WPA-AES

    • C.

      WPA2-TKIP

    • D.

      WPA2-AES

    Correct Answer
    D. WPA2-AES
    Explanation
    WPA2-AES is the safest access method for wireless networks because it combines the strongest encryption algorithm (AES) with the latest security protocol (WPA2). AES (Advanced Encryption Standard) is a symmetric encryption algorithm that provides a high level of security, while WPA2 (Wi-Fi Protected Access 2) is the most advanced security protocol currently available for wireless networks. This combination ensures that the data transmitted over the network is highly secure and protected against unauthorized access or attacks.

    Rate this question:

  • 5. 

    Which ISO/OSI layer do traditional switches operate in?

    • A.

      Layer 2

    • B.

      Layer 3

    • C.

      Layer 4

    • D.

      Layer 7

    Correct Answer
    A. Layer 2
    Explanation
    Traditional switches operate in Layer 2 of the ISO/OSI model. Layer 2, also known as the Data Link layer, is responsible for the reliable transfer of data between adjacent network nodes. Switches use MAC addresses to forward data packets within a local area network (LAN). They operate at the link layer, providing a bridge between the physical layer (Layer 1) and the network layer (Layer 3).

    Rate this question:

  • 6. 

    Which network does 192.168.1.88 address belong to?

    • A.

      192.168.1.0/28

    • B.

      192.168.1.64/26

    • C.

      192.168.1.80/30

    • D.

      192.168.1.128/25

    Correct Answer
    B. 192.168.1.64/26
    Explanation
    The given IP address 192.168.1.88 falls within the range of the network 192.168.1.64/26. This is because the subnet mask of /26 indicates that the first 26 bits of the IP address are the network portion, and the remaining 6 bits are the host portion. Therefore, any IP address within the range of 192.168.1.64 to 192.168.1.127 belongs to this network. Since 192.168.1.88 falls within this range, it belongs to the 192.168.1.64/26 network.

    Rate this question:

  • 7. 

    What was Opera's Desktop previous layout engine called?

    • A.

      Presto

    • B.

      Pronto

    • C.

      Trident

    • D.

      Gecko

    Correct Answer
    A. Presto
    Explanation
    Opera's Desktop previous layout engine was called Presto.

    Rate this question:

  • 8. 

    What is the official programming language for Android development?

    • A.

      JavaScript

    • B.

      Java

    • C.

      C++

    • D.

      Python

    Correct Answer
    B. Java
    Explanation
    Java is the official programming language for Android development. It is specifically designed to run on the Java Virtual Machine (JVM) and provides a robust and secure environment for developing Android applications. Java offers a wide range of libraries and frameworks that simplify the development process, and its object-oriented nature allows for efficient code organization and reuse. Additionally, Java has a large and active community, providing ample resources and support for Android developers.

    Rate this question:

  • 9. 

    According to the C++11 standard, what is the output of this program? #include void f(int) { std::cout << "i"; } void f(double) { std::cout << "d"; } int main() { f(1.0); return 0; }

    • A.

      1

    • B.

      1.0

    • C.

      I

    • D.

      D

    Correct Answer
    D. D
    Explanation
    The program calls the function f() with the argument 1.0, which is a double. There are two overloaded versions of f(), one that takes an int and one that takes a double. Since 1.0 is a double, the program will call the f(double) function. This function will output "d" to the console.

    Rate this question:

  • 10. 

    What does HTML stand for?

    • A.

      Hyper Trainer Marking Language

    • B.

      Hyper Text Marketing Language

    • C.

      Hyper Text Markup Language

    • D.

      Hyper Text Markup Leveler

    Correct Answer
    C. Hyper Text Markup Language
    Explanation
    HTML stands for Hyper Text Markup Language. It is a standard markup language used for creating and structuring the content on webpages. HTML uses tags to define the structure and elements of a webpage, such as headings, paragraphs, links, images, and more. It allows web browsers to interpret and display the content in a structured manner.

    Rate this question:

  • 11. 

    Which of the following is the correct way of making a string in Java?

    • A.

      String "Text";

    • B.

      String text = 'text';

    • C.

      String text = "text"

    • D.

      String text = "text";

    Correct Answer
    D. String text = "text";
    Explanation
    The correct way of making a string in Java is by using the statement "string text = "text";". In Java, strings are represented using double quotes, not single quotes. Additionally, the "string" keyword should be written in lowercase, as it is a class name in Java.

    Rate this question:

  • 12. 

    Which of the passwords below is the strongest?

    • A.

      Admin

    • B.

      Password123

    • C.

      Tr0ub4dor&3

    • D.

      Correct horse battery staple strawberry

    Correct Answer
    D. Correct horse battery staple strawberry
    Explanation
    The password "correct horse battery staple strawberry" is the strongest because it is a long and complex phrase that is difficult for hackers to guess or crack. It includes a combination of unrelated words and has a high entropy, making it harder to break through brute force attacks. Additionally, the use of spaces between words adds an extra layer of complexity.

    Rate this question:

  • 13. 

    How to defend against SQL injection?

    • A.

      Use parameterized queries and prepared statements

    • B.

      Use HTTPS everywhere

    • C.

      Do not hardcode passwords

    • D.

      Use HTTPOnly cookie flag

    Correct Answer
    A. Use parameterized queries and prepared statements
    Explanation
    Using parameterized queries and prepared statements is an effective way to defend against SQL injection attacks. This approach involves separating the SQL code from the user input by using placeholders in the query that are later filled with the user input. This prevents malicious input from being interpreted as part of the SQL code. Prepared statements also help by precompiling the SQL statement, making it more secure and efficient. By implementing these techniques, the risk of SQL injection attacks can be greatly reduced.

    Rate this question:

  • 14. 

    Which of the following is not a feature of Object-Oriented Programming?

    • A.

      Encapsulation

    • B.

      Multitasking

    • C.

      Polymorphism

    • D.

      Inheritance

    Correct Answer
    B. Multitasking
    Explanation
    Multitasking is not a feature of Object-Oriented Programming. Object-Oriented Programming focuses on the concepts of encapsulation, polymorphism, and inheritance. Encapsulation refers to the bundling of data and methods within a class, allowing data hiding and access control. Polymorphism allows objects of different classes to be treated as objects of a common superclass, enabling flexibility and code reuse. Inheritance allows the creation of new classes based on existing classes, inheriting their attributes and behaviors. However, multitasking, which refers to the ability of a system to execute multiple tasks concurrently, is not a specific feature of Object-Oriented Programming.

    Rate this question:

  • 15. 

    Which Linux system directory traditionally contains configuration files?

    • A.

      /root

    • B.

      /var

    • C.

      /etc

    • D.

      /proc

    Correct Answer
    C. /etc
    Explanation
    The correct answer is /etc. In Linux systems, the /etc directory is traditionally used to store configuration files. This directory contains various configuration files for different aspects of the system, such as network settings, user accounts, software configurations, and more. It is a common practice for system administrators to modify these configuration files to customize the behavior of the system and its installed software.

    Rate this question:

  • 16. 

    Which tool can be used to get current memory utilization in Linux?

    • A.

      Free

    • B.

      Top

    • C.

      Htop

    • D.

      All answers are correct

    Correct Answer
    D. All answers are correct
    Explanation
    All of the given options can be used to get the current memory utilization in Linux. The "free" command provides information about the total, used, and free memory in the system. The "top" command displays real-time information about various system resources, including memory usage. The "htop" command is an interactive process viewer that also provides information about memory usage. Therefore, all of the given answers are correct options for obtaining the current memory utilization in Linux.

    Rate this question:

  • 17. 

    Which of the following project is used for application containerization?

    • A.

      Docker

    • B.

      KVM

    • C.

      Syslog

    • D.

      Packer

    Correct Answer
    A. Docker
    Explanation
    Docker is the correct answer because it is a popular open-source platform used for application containerization. It allows developers to package their applications and dependencies into containers, which can then be easily deployed and run on any system. Docker provides a lightweight and portable way to isolate applications, making it easier to manage and scale them across different environments. It also provides tools for building, shipping, and running containers, making it a widely used solution in the software development industry.

    Rate this question:

  • 18. 

    Traditionally, which user name by default has access to all commands and files on a Linux operating system?

    • A.

      Root

    • B.

      Admin

    • C.

      Sysadmin

    • D.

      System

    Correct Answer
    A. Root
    Explanation
    The user name "root" is traditionally assigned as the superuser in a Linux operating system. This user has complete access and control over all commands and files on the system. The root user has the highest level of privileges and can perform any administrative tasks, including modifying system files and executing sensitive commands. Other user names like "admin," "sysadmin," or "system" may have administrative privileges, but they do not possess the same level of unrestricted access as the root user.

    Rate this question:

  • 19. 

    Which protocol allows name resolution in the Internet?

    • A.

      DNS

    • B.

      DHCP

    • C.

      LDAP

    • D.

      SMTP

    Correct Answer
    A. DNS
    Explanation
    DNS (Domain Name System) is the protocol that allows name resolution in the Internet. It translates domain names (such as www.example.com) into IP addresses (such as 192.168.1.1) so that computers can communicate with each other over the network. DNS is responsible for mapping human-friendly domain names to the corresponding IP addresses, making it easier for users to access websites and services on the Internet. DHCP (Dynamic Host Configuration Protocol) is used to assign IP addresses to devices on a network, LDAP (Lightweight Directory Access Protocol) is used for accessing and managing directory information, and SMTP (Simple Mail Transfer Protocol) is used for sending emails.

    Rate this question:

  • 20. 

    Abstract class in C++

    • A.

      Can be instantiated directly

    • B.

      Must consist of at least one virtual function

    • C.

      Can not be overwritten (inherited)

    • D.

      All statements are correct

    Correct Answer
    B. Must consist of at least one virtual function
    Explanation
    An abstract class in C++ must consist of at least one virtual function. This is because an abstract class is designed to be a base class and cannot be instantiated directly. It is meant to be inherited by other classes, which can then provide their own implementation for the virtual function(s) defined in the abstract class. By requiring at least one virtual function, the abstract class ensures that derived classes will have to provide their own implementation, making it necessary for the abstract class to be inherited and not instantiated directly.

    Rate this question:

  • 21. 

    DOM is a set of browser features that allow developer manipulation of the content of a website. In this context DOM stands for

    • A.

      Document Object Model

    • B.

      Document Objectification Method

    • C.

      Development Of Markup

    • D.

      Development Of Methods

    Correct Answer
    A. Document Object Model
    Explanation
    The correct answer is Document Object Model. The DOM is a programming interface for HTML and XML documents. It represents the structure of a document as a tree-like model, where each node represents an element, attribute, or piece of text in the document. Developers can use the DOM to access, modify, and manipulate the content, structure, and style of a website. The other options, such as Document Objectification Method, Development Of Markup, and Development Of Methods, do not accurately describe the purpose or functionality of the DOM.

    Rate this question:

  • 22. 

    Which feature is available in the newest version of Opera Desktop browser

    • A.

      Free VPN

    • B.

      Native ad-blocker with cryptojacking protection

    • C.

      Currency and unit converter

    • D.

      All mentioned features

    Correct Answer
    D. All mentioned features
    Explanation
    The newest version of Opera Desktop browser includes all the mentioned features, which are: Free VPN, Native ad-blocker with cryptojacking protection, and Currency and unit converter. This means that users can enjoy a built-in VPN for secure browsing, protection against malicious cryptojacking scripts, and the convenience of a currency and unit converter within the browser itself.

    Rate this question:

  • 23. 

    The process the computer takes to convert a high-level programming language into a machine language that the computer can understand is called

    • A.

      Compilation

    • B.

      Debugging

    • C.

      Linking

    • D.

      Preprocessing

    Correct Answer
    A. Compilation
    Explanation
    Compilation is the process by which a computer converts a high-level programming language into a machine language that the computer can understand. During compilation, the source code is translated into object code, which is a low-level representation of the program. This object code is then further processed to generate an executable file that can be run on the computer. Debugging, linking, and preprocessing are all important steps in the software development process, but they are not specifically related to the conversion of high-level programming language into machine language.

    Rate this question:

  • 24. 

    Which cloud computing model allows user to deploy and fully manage a virtual machine

    • A.

      IaaS (Infrastructure as a Service)

    • B.

      PaaS (Platform as a Service)

    • C.

      SaaS (Software as a Service)

    • D.

      Serverless

    Correct Answer
    A. IaaS (Infrastructure as a Service)
    Explanation
    IaaS (Infrastructure as a Service) is the correct answer because it allows users to deploy and fully manage a virtual machine. In the IaaS model, users have control over the operating system, storage, and networking components of the virtual machine, giving them the flexibility to customize and manage their own infrastructure. PaaS (Platform as a Service) provides a platform for developers to build and deploy applications, while SaaS (Software as a Service) offers ready-to-use software applications over the internet. Serverless computing, on the other hand, is a cloud computing execution model where the cloud provider manages the infrastructure and automatically allocates resources as needed, without the need for users to manage virtual machines directly.

    Rate this question:

  • 25. 

    Which of the following types of testing is NOT considered as Functional Testing

    • A.

      Regression testing

    • B.

      Smoke testing

    • C.

      Performance testing

    • D.

      Sanity testing

    Correct Answer
    C. Performance testing
    Explanation
    Performance testing is not considered as functional testing because it focuses on evaluating the system's performance, scalability, and responsiveness under varying workloads and stress conditions. It aims to identify bottlenecks and performance issues, rather than validating the system's functionality and adherence to requirements. Functional testing, on the other hand, verifies that the system meets the specified functional requirements and performs as expected. Regression testing, smoke testing, and sanity testing are all types of functional testing that ensure the system's functionality after changes or updates.

    Rate this question:

  • 26. 

    Which of the following would be a valid measure of test progress?

    • A.

      Total number of defects in the product

    • B.

      Number of test cases not yet executed

    • C.

      Number of undetected defects

    • D.

      Effort required to fix all defects

    Correct Answer
    B. Number of test cases not yet executed
    Explanation
    A valid measure of test progress would be the number of test cases not yet executed. This measure indicates how much testing is still pending and provides an indication of the remaining work to be done. By tracking the number of test cases that are yet to be executed, testers and project managers can assess the progress of testing activities and plan accordingly. It helps in determining if the testing is on schedule or if there are delays that need to be addressed.

    Rate this question:

  • 27. 

    The main focus of acceptance testing is

    • A.

      Finding faults in the system

    • B.

      Ensuring that the system is error-prone to all users

    • C.

      Testing for a business perspective

    • D.

      Testing the system with other systems

    Correct Answer
    C. Testing for a business perspective
    Explanation
    Acceptance testing is a type of testing that evaluates whether a system meets the business requirements and is acceptable for delivery to the end users. It focuses on testing the system from a business perspective, ensuring that it aligns with the intended goals and objectives of the organization. This type of testing verifies that the system functions correctly and meets the needs of the users, rather than solely focusing on finding faults or errors in the system.

    Rate this question:

  • 28. 

    What is a ternary operator?

    • A.

      Operator a+++

    • B.

      An operator which takes three arguments

    • C.

      Every overloaded operator

    • D.

      Ternary operator doesn't exist

    Correct Answer
    B. An operator which takes three arguments
    Explanation
    A ternary operator is an operator that takes three arguments. It is used in programming languages to evaluate a condition and return one of two values based on the result of the condition. The syntax of a ternary operator typically consists of a condition followed by a question mark, followed by the value to return if the condition is true, followed by a colon, and finally the value to return if the condition is false. This allows for more concise and readable code when making simple conditional statements.

    Rate this question:

  • 29. 

    Which of the following code repositories is centralized?

    • A.

      SVN

    • B.

      GIT

    • C.

      NAV

    • D.

      All three are distributed code repositories

    Correct Answer
    A. SVN
    Explanation
    SVN (Subversion) is a centralized code repository. Unlike Git, which is a distributed version control system, SVN relies on a central server to store and manage the codebase. With SVN, developers must connect to the central server to access and update the code. This centralized approach allows for stricter control over the codebase, as changes are made directly to the central repository and can be easily managed and tracked.

    Rate this question:

  • 30. 

     How many instances can be created for an abstract class?

    • A.

      1

    • B.

      Unlimited number of instances

    • C.

      2

    • D.

      0

    Correct Answer
    D. 0
    Explanation
    An abstract class cannot be instantiated directly, meaning that objects cannot be created from it. It is meant to be subclassed and serve as a blueprint for other classes. Therefore, the correct answer is 0, as no instances can be created for an abstract class.

    Rate this question:

  • 31. 

    What is the full form of SQL?

    • A.

      Structured Query Language

    • B.

      Simple Query Language

    • C.

      Serialized Query Language

    • D.

      None of these

    Correct Answer
    A. Structured Query Language
    Explanation
    SQL stands for Structured Query Language. It is a programming language used for managing relational databases. SQL allows users to create, modify, and retrieve data from databases. It is widely used in database management systems and is considered the standard language for interacting with relational databases.

    Rate this question:

  • 32. 

    int sum(int num) { if (num!=0) return num + sum(num-1); else return num; } Above code is

    • A.

      An example of recurrency

    • B.

      Will sum first n natural numbers

    • C.

      May cause stack overflow

    • D.

      All answers are correct

    Correct Answer
    D. All answers are correct
    Explanation
    The given code is an example of recursion because it calls itself within the function. It will sum the first n natural numbers because it starts with a given number and recursively adds the previous number until it reaches 0. It may cause stack overflow if the input number is too large, as each recursive call adds another frame to the stack. All of the given answers are correct.

    Rate this question:

  • 33. 

    In test-driven development

    • A.

      Is a process of identifying test coverage ratio

    • B.

      Test are being written before the actual software code

    • C.

      A single and complex test is written for the whole software code

    • D.

      Bugs are automatically removed from the code

    Correct Answer
    B. Test are being written before the actual software code
    Explanation
    In test-driven development, tests are written before the actual software code is written. This approach helps ensure that the code meets the desired requirements and functions correctly. By writing tests first, developers can clearly define the expected behavior of the code and then implement the code to pass those tests. This helps in identifying any potential issues early in the development process and ensures that the code is thoroughly tested.

    Rate this question:

  • 34. 

    Which is NOT a design pattern

    • A.

      Bridge

    • B.

      Lambda

    • C.

      Factory

    • D.

      Facade

    Correct Answer
    B. Lambda
    Explanation
    The design patterns mentioned in the options are Bridge, Factory, and Facade. These are well-known design patterns used in software development to solve common design problems. However, "Lambda" is not a design pattern. Lambda refers to a concept in programming languages, particularly in functional programming, where anonymous functions can be created and used as values. It is not specifically categorized as a design pattern.

    Rate this question:

  • 35. 

    What is the result of the JavaScript code presented below?   x = 1 + "2"; document.write(x);

    • A.

      12

    • B.

      3

    • C.

      1"2"

    • D.

      Error output

    Correct Answer
    A. 12
    Explanation
    The JavaScript code presented above assigns the value of "1" plus "2" to the variable x. Since "1" and "2" are both strings, the + operator concatenates them together, resulting in the string "12". The document.write(x) statement then outputs the value of x, which is "12".

    Rate this question:

  • 36. 

    A process of reclaiming memory occupied by objects that are no longer in use by the program is

    • A.

      Garbage collection

    • B.

      Memory laundrying

    • C.

      Defragmentation

    • D.

      Object sweeping

    Correct Answer
    A. Garbage collection
    Explanation
    Garbage collection is the process of automatically reclaiming memory occupied by objects that are no longer in use by the program. It identifies and frees up memory that is no longer referenced by any part of the program, preventing memory leaks and improving memory management efficiency. This process is essential in languages with automatic memory management, such as Java, where developers do not have to manually allocate and deallocate memory. Memory laundrying, defragmentation, and object sweeping are not accurate terms for this process.

    Rate this question:

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.