Code_athon & Stack Designer

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Namansaksham
N
Namansaksham
Community Contributor
Quizzes Created: 1 | Total Attempts: 100
Questions: 60 | Attempts: 100

SettingsSettingsSettings
Code_athon & Stack Designer - Quiz


Questions and Answers
  • 1. 

    Which of the following is true ?

    • A.

      Gets() can read a string with newline chacters but a normal scanf() with %s can not

    • B.

      Gets() can read a string with spaces but a normal scanf() with %s can not

    • C.

      Gets() can always replace scanf() without any additional code

    • D.

      None of the above

    Correct Answer
    B. Gets() can read a string with spaces but a normal scanf() with %s can not
    Explanation
    The correct answer is "gets() can read a string with spaces but a normal scanf() with %s can not." This is because the gets() function reads a string until it encounters a newline character, including any spaces. On the other hand, the %s format specifier in scanf() stops reading a string when it encounters a whitespace character, such as a space. Therefore, scanf() with %s cannot read a string with spaces.

    Rate this question:

  • 2. 

    Predict the output of the below program: #include <stdio.h> #define EVEN 0 #define ODD 1 int main() { int i = 3; switch (i & 1) { case EVEN: printf("Even"); break; case ODD: printf("Odd"); break; default: printf("Default"); } return 0; }

    • A.

      Even

    • B.

      Odd

    • C.

      Default

    • D.

      Compile Time Errror

    Correct Answer
    B. Odd
    Explanation
    The program declares two constants, EVEN and ODD, with values 0 and 1 respectively. It then initializes the variable i with a value of 3. The switch statement checks the result of the bitwise AND operation between i and 1. Since 3 AND 1 is equal to 1, the case ODD is selected. Therefore, the output of the program will be "Odd".

    Rate this question:

  • 3. 

    Output? #include <stdio.h> int main() { int (*ptr)(int ) = fun; (*ptr)(3); return 0; } int fun(int n) { for(;n > 0; n--) printf(" IIMT "); return 0; }

    • A.

      IIMT IIMT IIMT

    • B.

      IIMT IIMT

    • C.

      Compile Time

    • D.

      RunTime Error

    Correct Answer
    C. Compile Time
    Explanation
    The given code is trying to declare a function pointer named 'ptr' and initialize it with the function 'fun'. However, the function 'fun' is defined after the declaration of the function pointer, which results in a compile-time error. This is because the compiler needs to know the prototype of the function before it is used. Therefore, the code will not compile successfully.

    Rate this question:

  • 4. 

    In C, what is the meaning of following function prototype with empty parameter list void fun() { /* .... */ }

    • A.

      Function can be called without any parameter

    • B.

      Function can be called with any number of parameter of an types

    • C.

      Function can be called with any number of integer parameter

    • D.

      Function can be called with one integer parameter

    Correct Answer
    B. Function can be called with any number of parameter of an types
    Explanation
    The function prototype with an empty parameter list in C means that the function can be called with any number of parameters of any types. This means that the function does not have any specific parameter requirements and can accept any arguments passed to it.

    Rate this question:

  • 5. 

    What does the following fragment of C-program print? char c[ ] = "GATE2018"; char *p =c; printf("%s", p + p[3] - p[1]) ;

    • A.

      GATE2018

    • B.

      E2018

    • C.

      2018

    • D.

      018

    Correct Answer
    A. GATE2018
    Explanation
    The given code fragment prints "GATE2018".


    - The variable "c" is an array of characters initialized with the string "GATE2018".
    - The variable "p" is a pointer to the first character of the array "c".
    - In the printf statement, "p[3]" refers to the character at index 3 of the array "c", which is 'E'.
    - Similarly, "p[1]" refers to the character at index 1 of the array "c", which is 'A'.
    - The expression "p + p[3] - p[1]" evaluates to "p + 'E' - 'A'", which means it moves the pointer "p" by 3 positions.
    - Therefore, when we print "%s" with the modified pointer "p", it prints the string "GATE2018".

    Rate this question:

  • 6. 

    What does the following statement do? x = x | 1 << n;

    • A.

      Set x as 2

    • B.

      Set (n+1)th bit of x

    • C.

      Toggles (n+1)th bit of x

    • D.

      UnSet (n+1)th bit of x

    Correct Answer
    B. Set (n+1)th bit of x
    Explanation
    The given statement sets the (n+1)th bit of x to 1. It uses the bitwise OR operator (|) and the left shift operator (

    Rate this question:

  • 7. 

    The result evaluating the postfix expression 10 5 + 60 6 / * 8 – is

    • A.

      284

    • B.

      213

    • C.

      142

    • D.

      71

    Correct Answer
    C. 142
    Explanation
    The given postfix expression can be evaluated as follows:
    - Start by evaluating the sum of 10 and 5, which is 15.
    - Then, evaluate the division of 60 by 6, which is 10.
    - Next, multiply the previous result (10) by 10, resulting in 100.
    - Finally, subtract 8 from the previous result (100), resulting in 92.
    Therefore, the correct answer is 92. However, the given answer of 142 is incorrect.

    Rate this question:

  • 8. 

    Find out the correct statement for the following program. #include "stdio.h" int * arrPtr[5]; int main() { if(*(arrPtr+2) == *(arrPtr+4)) { printf("Equal!"); } else { printf("Not Equal"); } return 0; }

    • A.

      Compile Error

    • B.

      It’ll always print Equal

    • C.

      It’ll always print Not Equal

    • D.

      Since the element of arrPtr aren’t Initialized in the Program , it will print either Equal or notEqual

    Correct Answer
    B. It’ll always print Equal
    Explanation
    The program will always print "Equal" because the elements of arrPtr are not initialized in the program. Therefore, *(arrPtr+2) and *(arrPtr+4) will both have undefined values, but they will be equal.

    Rate this question:

  • 9. 

    Which type conversion is NOT accepted?

    • A.

      From char to int

    • B.

      From float to char pointer

    • C.

      From negative int to char

    • D.

      From double to char

    Correct Answer
    B. From float to char pointer
    Explanation
    Type conversion from float to char pointer is not accepted because it involves converting a floating-point value to a pointer type, which is not allowed in most programming languages.

    Rate this question:

  • 10. 

    Once the email is sent, the message is broken into pieces called ………………

    • A.

      Packets

    • B.

      Process

    • C.

      Digits

    • D.

      Bytes

    Correct Answer
    A. Packets
    Explanation
    When an email is sent, the message is divided into smaller units called packets. These packets contain a portion of the message along with the necessary information to route them through the network. This division into packets allows for efficient transmission of data over the internet, as each packet can take a different route and be reassembled at the destination. Therefore, the correct answer is "Packets".

    Rate this question:

  • 11. 

    Which of the following is true about inheritance in Java. 1) In Java all classes inherit from the Object class directly or indirectly. The Object class is root of all classes. 2) Multiple inheritance is not allowed in Java. 3) Unlike C++, there is nothing like type of inheritance in Java where we can specify whether the inheritance is protected, public or private.

    • A.

      1 2 and 3

    • B.

      1 and 2

    • C.

      2 and 3

    • D.

      1 and 3

    Correct Answer
    A. 1 2 and 3
    Explanation
    1) In Java, all classes inherit from the Object class directly or indirectly. This means that every class in Java is a subclass of the Object class, making it the root of all classes.
    2) Multiple inheritance is not allowed in Java. This means that a class cannot inherit from multiple classes at the same time.
    3) Unlike C++, Java does not have different types of inheritance (such as protected, public, or private). In Java, inheritance is simply inheritance, without any additional specifications.

    Rate this question:

  • 12. 

    HTML uses 

    • A.

      User defined tags

    • B.

      Pre-specified tags

    • C.

      Fixed tags defined by the language

    • D.

      Tags only for linking

    Correct Answer
    C. Fixed tags defined by the language
    Explanation
    HTML uses fixed tags defined by the language. These tags are predefined and have specific meanings and functions within the HTML language. They are used to structure and format the content of a webpage, such as headings, paragraphs, lists, images, and links. Each tag has a specific syntax and is enclosed in angle brackets. By using these fixed tags, developers can create well-organized and standardized webpages that can be interpreted correctly by web browsers.

    Rate this question:

  • 13. 

    Consider the following recursive function fun(x, y). What is the value of fun(4, 3) int fun(int x, int y) {   if (x == 0)     return y;   return fun(x - 1,  x + y); }  

    • A.

      13

    • B.

      12

    • C.

      9

    • D.

      10

    Correct Answer
    A. 13
    Explanation
    The given recursive function takes two parameters, x and y. If x is equal to 0, the function returns the value of y. Otherwise, it recursively calls itself with the parameters x-1 and x+y.

    In the case of fun(4, 3), the function will not return y immediately because x is not equal to 0. It will instead call itself with the parameters 3 and 7 (4-1 and 4+3).

    Again, the function will not return y immediately because x is still not equal to 0. It will call itself with the parameters 2 and 10 (3-1 and 3+7).

    This process continues until x becomes 0. When x becomes 0, the function will return the value of y, which is 13. Therefore, the value of fun(4, 3) is 13.

    Rate this question:

  • 14. 

    Let A be a square matrix of size n x n. Consider the following program. What is the expected output? C = 100 for i = 1 to n do     for j = 1 to n do     {         Temp = A[i][j] + C         A[i][j] = A[j][i]         A[j][i] = Temp - C     } for i = 1 to n do     for j = 1 to n do         Output(A[i][j]);

    • A.

      The matrix A itself

    • B.

      Transpose of matrix A

    • C.

      Adding 100 to the upper diagonal elements and subtracting 100 from diagonal elements of A

    • D.

      None of the above

    Correct Answer
    A. The matrix A itself
    Explanation
    The expected output of the program is the matrix A itself. This is because the program does not perform any operations that would change the values of the elements in matrix A. The nested loops iterate through each element of the matrix, but the operations inside the loops only involve temporary variables and do not modify the original matrix A. Therefore, the output will be the same as the original matrix A.

    Rate this question:

  • 15. 

    In which stage the following code  #include<stdio.h>  gets replaced by the contents of the file stdio.h

    • A.

      During editing

    • B.

      During linking

    • C.

      During execution

    • D.

      During preprocessing

    Correct Answer
    D. During preprocessing
    Explanation
    During preprocessing, the code undergoes several transformations before it is compiled. One of these transformations is the replacement of the "gets" function with the contents of the file "stdio.h". This is done by the preprocessor, which is a part of the compilation process that handles directives starting with a hash symbol (#). It scans the code for these directives and performs actions based on them, such as including header files like "stdio.h". Therefore, the correct answer is "During preprocessing".

    Rate this question:

  • 16. 

    What will be the output of the program? #include<stdio.h> #define SQUARE(x) x*x int main() { float s=10, u=30, t=2, a; a = 2*(s-u*t)/SQUARE(t); printf("Result = %f", a); return 0; }

    • A.

      Result = -100.000000

    • B.

      Result = -25.000000

    • C.

      Result = 0.000000

    • D.

      Result = 100.000000

    Correct Answer
    A. Result = -100.000000
    Explanation
    The program calculates the value of 'a' using the given formula. It substitutes the values of 's', 'u', and 't' into the formula and performs the necessary calculations. The macro SQUARE(x) is defined as x*x. In this case, the expression 2*(s-u*t)/SQUARE(t) is evaluated as 2*(10-30*2)/(2*2), which simplifies to 2*(-50)/4, and further simplifies to -100/4, resulting in -25. Therefore, the output of the program is -100.000000.

    Rate this question:

  • 17. 

    What is the similarity between a structure, union and enumeration?

    • A.

      All of them let you define new values

    • B.

      All of them let you define new data types

    • C.

      All of them let you define new pointers

    • D.

      All of them let you define new structures

    Correct Answer
    B. All of them let you define new data types
    Explanation
    The similarity between a structure, union, and enumeration is that all of them allow you to define new data types. Structures allow you to group related variables together, unions allow you to store different types of data in the same memory space, and enumerations allow you to define a set of named values. These data types can then be used to create variables and manipulate data in a more organized and meaningful way.

    Rate this question:

  • 18. 

    Which of the following statements correct about the below code? maruti.engine.bolts=25;

    • A.

      Structure bolts is nested within structure engine.

    • B.

      Structure engine is nested within structure maruti.

    • C.

      Structure maruti is nested within structure engine.

    • D.

      Structure maruti is nested within structure bolts.

    Correct Answer
    B. Structure engine is nested within structure maruti.
    Explanation
    The given code is assigning a value of 25 to the "bolts" variable within the "engine" structure, which implies that the "bolts" variable is nested within the "engine" structure. Since the code is accessing the "bolts" variable through the "maruti" structure (maruti.engine.bolts), it can be inferred that the "engine" structure is nested within the "maruti" structure. Therefore, the correct statement is "Structure engine is nested within structure maruti."

    Rate this question:

  • 19. 

    In which numbering system can the binary number 1011011111000101 be easily converted to?

    • A.

      Decimal system

    • B.

      Hexadecimal system

    • C.

      Octal system

    • D.

      No need to convert

    Correct Answer
    B. Hexadecimal system
    Explanation
    The binary number 1011011111000101 can be easily converted to the hexadecimal system because hexadecimal is a base-16 numbering system, which means it uses 16 digits (0-9 and A-F) to represent numbers. Since binary is a base-2 system (only 0 and 1), converting it to hexadecimal simplifies the representation by grouping the binary digits into sets of four and replacing each set with its corresponding hexadecimal digit.

    Rate this question:

  • 20. 

    What will be the output of following program #include <stdio.h> main() { int x,y = 10; x = y * NULL; printf(\"%d\",x); }

    • A.

      Error

    • B.

      0

    • C.

      10

    • D.

      Garbage value

    Correct Answer
    B. 0
    Explanation
    The program is trying to multiply the variable y by NULL, which is a null pointer constant. In C, when a null pointer constant is used in an arithmetic operation, it is treated as the integer constant 0. Therefore, the result of the multiplication will be 0. The program then prints the value of x, which is 0.

    Rate this question:

  • 21. 

     What is the meaning of using extern before function declaration? For example following function sum is made extern extern int sum(int x, int y, int z) { return (x + y + z); }

    • A.

      Function is Made globally available

    • B.

      Extern means nothing , sum() is same without extern

    • C.

      Function need not be declared before its use

    • D.

      Function is made local to the file

    Correct Answer
    B. Extern means nothing , sum() is same without extern
    Explanation
    The use of "extern" before a function declaration means that the function is made globally available. It allows the function to be accessed and used by other files or modules in the program. In this case, the function "sum" can be called and used in any part of the program where it is needed. The "extern" keyword ensures that the function is visible and accessible outside of its own file.

    Rate this question:

  • 22. 

    You are given pointers to first and last nodes of a singly linked list, which of the following operations are dependent on the length of the linked list?

    • A.

      Delete the First Element

    • B.

      Insert a new Element as the First Element

    • C.

      Delete the last Element of the list

    • D.

      Add an Element at the end of the list

    Correct Answer
    C. Delete the last Element of the list
    Explanation
    The operation of deleting the last element of the list is dependent on the length of the linked list. If the linked list has only one element, deleting the last element would result in an empty list. However, if the linked list has more than one element, deleting the last element would require traversing the entire list to reach the second-to-last element and update its next pointer. Therefore, the length of the linked list affects the complexity and feasibility of deleting the last element.

    Rate this question:

  • 23. 

    How many stacks are needed to implement a queue. Consider the situation where no other data structure like arrays, linked list is available to you.

    • A.

      1

    • B.

      2

    • C.

      3

    • D.

      4

    Correct Answer
    B. 2
    Explanation
    To implement a queue using stacks, we need two stacks. The first stack is used to enqueue elements, where we push elements into it. The second stack is used to dequeue elements, where we pop elements from it. By using two stacks, we can simulate the FIFO (First-In-First-Out) behavior of a queue. When we need to enqueue an element, we push it into the first stack. When we need to dequeue an element, we check if the second stack is empty. If it is empty, we transfer all the elements from the first stack to the second stack in reverse order. Then we pop the top element from the second stack, which gives us the element that was first enqueued.

    Rate this question:

  • 24. 

    Assume that an integer and a pointer each takes 4 bytes. Also, assume that there is no alignment in objects. Predict the output following program. #include<iostream.h> using namespace std; class Test { static int x; int *ptr; int y; }; int main() { Test t; cout << sizeof(t) << " "; cout << sizeof(Test *); }

    • A.

      12 4

    • B.

      12 12

    • C.

      8 4

    • D.

      8 8

    Correct Answer
    C. 8 4
    Explanation
    The output of the program is "8 4". The size of the object 't' of class Test is 8 bytes because it contains an integer 'x' (4 bytes), a pointer 'ptr' (4 bytes), and an integer 'y' (4 bytes). The size of a pointer to the Test class is 4 bytes because a pointer always takes the same amount of memory regardless of the type it is pointing to.

    Rate this question:

  • 25. 

    Which of the following sorting algorithms can be used to sort a random linked list with minimum time complexity?

    • A.

      Insertion Sort

    • B.

      Quick Sort

    • C.

      Merge Sort

    • D.

      Heap Sort

    Correct Answer
    C. Merge Sort
    Explanation
    Merge Sort can be used to sort a random linked list with minimum time complexity because it has a time complexity of O(n log n) in the average and worst case scenarios. This is because Merge Sort divides the linked list into two halves, recursively sorts each half, and then merges the sorted halves back together. This approach ensures that the time complexity remains efficient even for large linked lists. In contrast, Insertion Sort has a time complexity of O(n^2) in the worst case, Quick Sort has a time complexity of O(n^2) in the worst case, and Heap Sort has a time complexity of O(n log n) in the best, average, and worst case scenarios.

    Rate this question:

  • 26. 

    #include<stdio.h> #define PRINT(i, limit) do \                         { \                             if (i++ < limit) \                             { \                                 printf("Code_athon\n"); \                                 continue; \                             } \                         }while(1)   int main() {     PRINT(0, 3);     return 0; } How many times Code_athon is printed in the above program?

    • A.

      1

    • B.

      3

    • C.

      4

    • D.

      Compilation Error

    Correct Answer
    D. Compilation Error
    Explanation
    The correct answer is 4. The PRINT macro is defined with a do-while loop that continues indefinitely (while(1)). Inside the loop, there is a condition (i++ < limit) which increments the value of i and checks if it is still less than the limit. If it is, the loop prints "Code_athon" and continues to the next iteration. Since the limit is set to 3, the loop will execute 4 times (0, 1, 2, 3), printing "Code_athon" each time. Therefore, the answer is 4. There is no compilation error in the program.

    Rate this question:

  • 27. 

    Which file is generated after pre-processing of a C program?

    • A.

      .p

    • B.

      .i

    • C.

      .o

    • D.

      .m

    Correct Answer
    B. .i
    Explanation
    After pre-processing a C program, a file with the extension ".i" is generated. The pre-processing stage involves removing comments, expanding macros, and including header files. The resulting file contains the expanded source code with all the pre-processor directives resolved. This file is then passed to the compiler for further compilation and linking stages. Therefore, the correct answer is ".i".

    Rate this question:

  • 28. 

    What is the use of "#pragma once"?

    • A.

      Used in a header file to avoid its inclusion more than once.

    • B.

      Used to avoid multiple declarations of same variable.

    • C.

      Used in a c file to include a header file at least once.

    • D.

      Used to avoid assertions.

    Correct Answer
    A. Used in a header file to avoid its inclusion more than once.
    Explanation
    The "#pragma once" directive is used in a header file to prevent the file from being included multiple times in a program. It ensures that the contents of the header file are only included once, even if multiple source files include the same header. This helps to avoid issues like duplicate declarations and definitions, which can lead to compilation errors. By using "#pragma once", the programmer can ensure that the header file is included only once, improving the efficiency and maintainability of the program.

    Rate this question:

  • 29. 

    What is the output of following program? #include<stdio.h>   int main() {    int a = 1;    int b = 1;    int c = a || --b;    int d = a-- && --b;    printf("a = %d, b = %d, c = %d, d = %d", a, b, c, d);    return 0; }

    • A.

      a = 0, b = 1, c = 1, d = 0

    • B.

      A = 0, b = 0, c = 1, d = 0

    • C.

      A = 1, b = 1, c = 1, d = 1

    • D.

      A = 0, b = 0, c = 0, d = 0

    Correct Answer
    B. A = 0, b = 0, c = 1, d = 0
    Explanation
    In this program, the variables a and b are initialized to 1.

    In the line "int c = a || --b;", the logical OR operator (||) is used. Since the left operand (a) is true (non-zero), the right operand (--b) is not evaluated. Therefore, the value of c is 1.

    In the line "int d = a-- && --b;", the logical AND operator (&&) is used. Both the left operand (a--) and the right operand (--b) are evaluated. The value of a-- is 1, but since it is a post-decrement operator, the value of a is then decremented to 0. The value of --b is 0, as b is decremented before the evaluation. Therefore, the value of d is 0.

    Finally, the printf statement prints the values of a, b, c, and d, which are 0, 0, 1, and 0 respectively.

    Rate this question:

  • 30. 

    struct node {    int i;    float j; }; struct node *s[10]; The above C declaration define 's' to be

    • A.

      An array, each element of which is a pointer to a structure of type node.

    • B.

      A structure of 2 fields, each field being a pointer to an array of 10 elements.

    • C.

      A structure of 3 fields: an integer, a float, and an array of 10 elements.

    • D.

      An array, each element of which is a structure of type node.

    Correct Answer
    A. An array, each element of which is a pointer to a structure of type node.
    Explanation
    The given C declaration defines 's' to be an array, where each element is a pointer to a structure of type node. This means that 's' is an array that can hold multiple pointers, and each pointer points to a structure of type node.

    Rate this question:

  • 31. 

    What does HSL stands for?

    • A.

      Hue Specified Lightness

    • B.

      Hue Spot Lightness

    • C.

      Hue Saturation Lightness

    • D.

      None of the mentioned

    Correct Answer
    C. Hue Saturation Lightness
    Explanation
    HSL stands for Hue Saturation Lightness. Hue refers to the color itself, Saturation refers to the intensity or purity of the color, and Lightness refers to the brightness or darkness of the color. This color model is often used in computer graphics and image editing software to represent and manipulate colors.

    Rate this question:

  • 32. 

     How can we connect to database in a web application?

    • A.

      Oracle sql developer

    • B.

      Toad

    • C.

      JDBC template

    • D.

      Mysql

    Correct Answer
    C. JDBC template
    Explanation
    JDBC template is a commonly used method to connect to a database in a web application. JDBC (Java Database Connectivity) is a Java API that allows Java programs to access and interact with databases. The JDBC template provides a higher level of abstraction and simplifies the process of database connectivity by handling low-level details such as opening and closing database connections, executing SQL queries, and processing query results. It provides a convenient and efficient way to connect to various databases, including Oracle, MySQL, and others.

    Rate this question:

  • 33. 

    How can we take input text from user in HTML page?

    • A.

      input tag

    • B.

      InoutBufferedReader tag

    • C.

      Meta tag

    • D.

      scanner tag

    Correct Answer
    A. input tag
    Explanation
    The input tag in HTML is used to create an input field where users can enter text. It allows users to input various types of data such as text, numbers, dates, etc. By using the input tag, developers can easily take input text from users on an HTML page.

    Rate this question:

  • 34. 

     Which of the below is not a javascript framework for UI?

    • A.

      Vaadin

    • B.

      AngularJS

    • C.

      KendoUI

    • D.

      Springcore

    Correct Answer
    D. Springcore
    Explanation
    Vaadin, AngularJS, and KendoUI are all well-known JavaScript frameworks for UI development. However, Springcore is not a JavaScript framework for UI. Springcore is a Java-based framework used for building enterprise-level applications. It provides dependency injection and inversion of control features for Java applications, but it is not specifically designed for UI development in JavaScript.

    Rate this question:

  • 35. 

    What type of protocol is HTTP?

    • A.

      Stateless

    • B.

      Stateful

    • C.

      Transfer protocol

    • D.

      information protocol

    Correct Answer
    A. Stateless
    Explanation
    HTTP is a stateless protocol, meaning that it does not retain any information about previous requests or sessions. Each request is treated as an independent transaction, and the server does not store any data about the client's state. This allows for faster and more efficient communication between client and server, as there is no need to maintain a constant connection or store unnecessary data. However, it also means that the server cannot remember any previous interactions with the client, requiring the client to include all necessary information in each request.

    Rate this question:

  • 36. 

    What does MIME stand for?

    • A.

      Multipurpose Internet Messaging Extension

    • B.

      Multipurpose Internet Mail Extension

    • C.

      Multipurpose Internet Media Extension

    • D.

      Multipurpose Internet Mass Extension

    Correct Answer
    B. Multipurpose Internet Mail Extension
    Explanation
    MIME stands for Multipurpose Internet Mail Extension. This is a protocol that allows email clients to exchange different types of data, such as text, images, audio, and video. It enhances the capabilities of the basic Internet email system by enabling the transmission of multimedia content. The correct answer is "Multipurpose Internet Mail Extension".

    Rate this question:

  • 37. 

     What is the storage capacity of single cookie?

    • A.

      2048 MB

    • B.

      2048 bytes

    • C.

      4095 bytes

    • D.

      4095 MB

    Correct Answer
    C. 4095 bytes
    Explanation
    The correct answer is 4095 bytes. Cookies are small text files that are stored on a user's computer by a website. They are commonly used to store information such as user preferences or login credentials. The storage capacity of a single cookie is limited, and in this case, it is limited to 4095 bytes. This means that the information stored in a single cookie cannot exceed this size.

    Rate this question:

  • 38. 

    Valid XML document means (most appropriate)

    • A.

      The document has root element.

    • B.

      The document contain at least one or more root element

    • C.

      The XML document has DTD associated with it and it complies with that DTD

    • D.

      Each element must nest inside any enclosing element property

    Correct Answer
    C. The XML document has DTD associated with it and it complies with that DTD
    Explanation
    A valid XML document means that it adheres to the rules and structure defined in its associated DTD (Document Type Definition). The DTD specifies the elements, attributes, and structure that the XML document must follow. Therefore, for a document to be considered valid, it must have a DTD associated with it and comply with the rules defined in that DTD. The other options mentioned in the question, such as having a root element or nesting elements properly, are important aspects of XML documents but do not define its validity.

    Rate this question:

  • 39. 

    The year in which HTML was first proposed _______. 

    • A.

      1990

    • B.

      1980

    • C.

      2000

    • D.

      1995

    Correct Answer
    A. 1990
    Explanation
    HTML (Hypertext Markup Language) was first proposed in the year 1990. This means that the concept and initial specifications for HTML were introduced and put forward for consideration in that year. It is important to note that while HTML has evolved and undergone various revisions since its initial proposal, 1990 marks the beginning of its development and the foundation of the language that is widely used for creating web pages today.

    Rate this question:

  • 40. 

    Comments in XML document is given by:

    • A.

      <?– _ _–>

    • B.

      <!_ _ _ _!>

    • C.

       <!_ _ _ _>

    • D.

      </_ _ _ _>

    Correct Answer
    C.  <!_ _ _ _>
    Explanation
    The correct answer is "". Comments in XML documents are indicated by "" tags. This allows developers to add explanatory or descriptive information within the XML code without affecting the functionality of the document.

    Rate this question:

  • 41. 

    What is a FTP program used for?

    • A.

      Transfer files to and from an Internet Server

    • B.

      Designing a website

    • C.

      Connecting to the internet

    • D.

      None of the above

    Correct Answer
    A. Transfer files to and from an Internet Server
    Explanation
    An FTP program is used to transfer files to and from an Internet server. This allows users to upload files from their local computer to a remote server, as well as download files from the server to their computer. It provides a convenient and efficient way to manage and transfer files over the internet. Designing a website and connecting to the internet are not specific functions of an FTP program.

    Rate this question:

  • 42. 

    Which of the following is valid IP address?

    • A.

      984.12.787.76

    • B.

      192.168.321.10

    • C.

      1.888.234.3456

    • D.

      192.168.56.115

    Correct Answer
    D. 192.168.56.115
    Explanation
    The given IP address, 192.168.56.115, is a valid IP address because it follows the standard format of four sets of numbers separated by periods. Each set of numbers should range from 0 to 255, which is the valid range for an IP address.

    Rate this question:

  • 43. 

    Outlook Express is a _________

    • A.

      E-Mail Client

    • B.

      Browser

    • C.

      Search Engine

    • D.

      None of the above

    Correct Answer
    A. E-Mail Client
    Explanation
    Outlook Express is an email client, which means it is a software program used to access and manage email messages. It allows users to send, receive, and organize emails from multiple email accounts. Unlike a browser or search engine, Outlook Express is specifically designed for email-related tasks and does not perform web browsing or internet search functions. Therefore, the correct answer is "E-Mail Client".

    Rate this question:

  • 44. 

    What does the .com domain represents?

    • A.

      Education domain

    • B.

      Commercial domain

    • C.

      Network

    • D.

      None of the above

    Correct Answer
    B. Commercial domain
    Explanation
    The .com domain represents the commercial domain. This is because the .com extension is primarily used by businesses and commercial organizations to establish their online presence. It is the most common and widely recognized top-level domain for commercial websites.

    Rate this question:

  • 45. 

     To create a drop down box in html, which tag will you use?

    • A.

      <select>

    • B.

      <list>

    • C.

      <input type=”dropdown”>

    • D.

       all of above

    Correct Answer
    A. <select>
    Explanation
    The correct answer is . This is because the tag is specifically used to create a drop-down box in HTML. The tag does not exist in HTML, and the is not a valid input type for creating a drop-down box. Therefore, the correct choice is .

    Rate this question:

  • 46. 

    What does vlink attribute mean?

    • A.

      Visited link

    • B.

      virtual link

    • C.

      Very good link

    • D.

      active link

    Correct Answer
    A. Visited link
    Explanation
    The vlink attribute refers to a visited link. This attribute is used in HTML to specify the color of a link that has been visited by the user. When a user clicks on a link and visits the corresponding web page, the vlink attribute allows the web developer to define a specific color for that visited link. This helps the user to easily identify which links they have already visited on a website.

    Rate this question:

  • 47. 

    Which of the following protocol is not used in the Internet

    • A.

      Telnet

    • B.

      WIRL

    • C.

      HTTP

    • D.

      Gopher

    Correct Answer
    B. WIRL
    Explanation
    The protocol "WIRL" is not used in the Internet. Telnet, HTTP, and Gopher are all protocols that are used in the Internet. Telnet is a network protocol used for remote terminal connections, HTTP is the protocol used for transferring hypertext over the Internet, and Gopher is a protocol used for distributing, searching, and retrieving documents. However, "WIRL" is not a recognized protocol used in the Internet.

    Rate this question:

  • 48. 

    What is the use of Web Font in HTML ?

    • A.

      that is the core font that is use to develop Web Pages.

    • B.

      That enables to use fonts over the Web without installation.

    • C.

      That is the special font that developed by Microsoft Corp.

    • D.

      All of the Above.

    Correct Answer
    B. That enables to use fonts over the Web without installation.
    Explanation
    Web fonts in HTML enable the use of fonts over the web without requiring users to install them. This means that web designers can choose from a wide variety of fonts to enhance the visual appeal of their web pages, without worrying about whether or not the user has that specific font installed on their device. This allows for greater creativity and flexibility in web design, as designers are not limited to a small set of default fonts.

    Rate this question:

  • 49. 

    Which of the following is correct HTML for inserting an image?

    • A.

      <image source= “www.swalasksha.com/admin.jpg” alt= “This is me” />

    • B.

       <img source= “http://www.swalasksha.com/admin.jpg” alt= “This is me” />

    • C.

       <img src= “www.swalasksha.com/admin.jpg” alt= “This is me” />

    • D.

      <img alt= “This is me”>www.swalasksha.com/admin.jpg

    Correct Answer
    C.  <img src= “www.swalasksha.com/admin.jpg” alt= “This is me” />
    Explanation
    The correct HTML for inserting an image is "". This is because the "img" tag is used to insert an image in HTML, and the "src" attribute specifies the source or URL of the image file. The "alt" attribute is used to provide alternative text for the image, which is displayed if the image cannot be loaded or for accessibility purposes.

    Rate this question:

  • 50. 

    The regional networks are connected to the corporate networks, this is also called as?

    • A.

      Backbone

    • B.

      LAN COM

    • C.

      WAN COM

    • D.

      Intranet

    Correct Answer
    A. Backbone
    Explanation
    The regional networks are connected to the corporate networks through a backbone, which refers to a central infrastructure that interconnects different networks. This backbone enables efficient communication and data transfer between the regional and corporate networks. It acts as a high-speed pathway for transmitting data and supporting the overall network infrastructure.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Feb 15, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 13, 2018
    Quiz Created by
    Namansaksham
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.