Pre-screening Test - By Engrip

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Catherine Halcomb
C
Catherine Halcomb
Community Contributor
Quizzes Created: 1428 | Total Attempts: 5,961,110
Questions: 40 | Attempts: 434

SettingsSettingsSettings
Pre-screening Test - By Engrip - Quiz

Instructions This technical test covers basics of Java, C, RDBMS, HTML and CSS Test contains 40 questions and duration for the test is 30 minutes Each question will have only one correct answer. Every right answer will carry 1 point. Negative Marking: Wrong answer will carry -0.25 points. Decision of the EnGrip is final and binding. All the best!


Questions and Answers
  • 1. 

    What is the base class for all Exception ?

    • A.

      Java.lang.Exception

    • B.

      Java.lang.Throwable

    • C.

      Java.lang.Error

    • D.

      Java.lang.RuntimeException

    Correct Answer
    B. Java.lang.Throwable
    Explanation
    The base class for all exceptions in Java is java.lang.Throwable. This class serves as the root of the exception hierarchy and provides common methods and fields for all exceptions. It has two main subclasses: java.lang.Exception, which represents exceptional conditions that can be caught and handled, and java.lang.Error, which represents serious errors that are usually beyond the control of the program. java.lang.RuntimeException is a subclass of java.lang.Exception and represents exceptions that can occur during the execution of a program.

    Rate this question:

  • 2. 

    With x = 0, which of the following are legal lines of Java code for changing the value of x to 1?
    1. x++
    2. x=x+1
    3. x+=1
    4. x=+1

    • A.

      1, 2 & 3

    • B.

      1 & 4

    • C.

      1, 2, 3 & 4

    • D.

      2 & 3

    Correct Answer
    C. 1, 2, 3 & 4
    Explanation
    The given lines of code are all legal ways to change the value of x to 1 in Java.

    1. x++: This is the post-increment operator, which increments the value of x by 1.
    2. x = x + 1: This assigns the value of x + 1 to x, effectively incrementing x by 1.
    3. x += 1: This is the compound assignment operator, which is equivalent to x = x + 1. It also increments x by 1.
    4. x = +1: This assigns the value of +1 to x, which is equivalent to 1. It directly sets x to 1.

    Therefore, options 1, 2, 3, and 4 are all legal lines of Java code for changing the value of x to 1.

    Rate this question:

  • 3. 

    Which of these operators can be used to concatenate two or more String objects in Java?

    • A.

      +

    • B.

      +=

    • C.

      |

    • D.

      &

    Correct Answer
    A. +
    Explanation
    The + operator can be used to concatenate two or more String objects in Java. This operator is used to combine the contents of two strings and create a new string that contains both. For example, "Hello" + "World" will result in "HelloWorld".

    Rate this question:

  • 4. 

    What will be the output of the program? class PassA  {     public static void main(String [] args)      {         PassA p = new PassA();         p.start();     }     void start()      {         long [] a1 = {3,4,5};         long [] a2 = fix(a1);         System.out.print(a1[0] + a1[1] + a1[2] + " ");         System.out.println(a2[0] + a2[1] + a2[2]);     }     long [] fix(long [] a3)      {         a3[1] = 7;         return a3;     } }

    • A.

      12 15

    • B.

      15 15

    • C.

      3 4 5 3 7 5

    • D.

      3 7 5 3 7 5

    Correct Answer
    B. 15 15
    Explanation
    The program creates an instance of the PassA class and calls the start() method. Inside the start() method, an array "a1" is created and initialized with the values {3, 4, 5}. Then, the fix() method is called and the array "a1" is passed as an argument. Inside the fix() method, the second element of the array "a3" is changed to 7. The fix() method returns the modified array "a3" which is assigned to the array "a2" in the start() method. Finally, the program prints the sum of the elements in both arrays "a1" and "a2", which is 15 15.

    Rate this question:

  • 5. 

    What will be the output of the program? class Equals  {     public static void main(String [] args)      {         int x = 100;         double y = 100.1;         boolean b = (x = y);          System.out.println(b);     } }

    • A.

      True

    • B.

      False

    • C.

      Compilation error

    • D.

      Run time exception

    Correct Answer
    C. Compilation error
    Explanation
    The program will result in a compilation error. This is because the line "boolean b = (x = y);" is trying to assign a double value to an int variable, which is not allowed.

    Rate this question:

  • 6. 

    Public void foo( boolean a, boolean b) {      if( a )      {         System.out.println("A");      }      else if(a && b)     {          System.out.println( "A && B");      }      else      {          if ( !b )          {             System.out.println( "notB") ;         }          else          {             System.out.println( "ELSE" ) ;          }      }  }

    • A.

      If a is true and b is true then the output is "A && B"

    • B.

      If a is true and b is false then the output is "notB"

    • C.

      If a is false and b is true then the output is "ELSE"

    • D.

      If a is false and b is false then the output is "ELSE"

    Correct Answer
    C. If a is false and b is true then the output is "ELSE"
    Explanation
    The given code snippet contains a method named "foo" that takes two boolean parameters, "a" and "b".

    The code starts with an if statement that checks if "a" is true. If it is true, it prints "A" to the console.

    Next, there is an else if statement that checks if both "a" and "b" are true. If they are, it prints "A && B" to the console.

    If the above conditions are not met, the code enters the else block. Within the else block, there is an if statement that checks if "b" is false. If it is false, it prints "notB" to the console.

    If none of the above conditions are met, it enters the else block and prints "ELSE" to the console.

    Therefore, if "a" is false and "b" is true, the output will be "ELSE".

    Rate this question:

  • 7. 

    Switch(x)  {      default:           System.out.println("Hello");  } Which two are acceptable types for x in Java? 1. byte 2. long 3. char 4. float 5. Short 6. Long

    • A.

      1 and 3

    • B.

      3 and 5

    • C.

      2 and 4

    • D.

      4 and 6

    Correct Answer
    A. 1 and 3
    Explanation
    The given code snippet is a switch statement with a default case that prints "Hello". In Java, the switch statement can be used with byte and char types. Therefore, the acceptable types for x in this case are byte and char, which correspond to options 1 and 3.

    Rate this question:

  • 8. 

    What will be the output of the program? public class Foo  {       public static void main(String[] args)      {         try          {              return;          }          finally          {             System.out.println( "Finally" );          }      }  }

    • A.

      Finally

    • B.

      Compilation fails

    • C.

      Run time exception

    • D.

      Code runs with no out put

    Correct Answer
    A. Finally
    Explanation
    The program will output "Finally". This is because the finally block is always executed, regardless of whether there is a return statement in the try block or not. Therefore, even though there is a return statement in the try block, the finally block will still be executed and "Finally" will be printed.

    Rate this question:

  • 9. 

    You want subclasses in any package to have access to members of a superclass. Which is the most restrictive access that accomplishes this objective?

    • A.

      Public

    • B.

      Private

    • C.

      Protected

    • D.

      Transient

    Correct Answer
    C. Protected
    Explanation
    The most restrictive access that allows subclasses in any package to have access to members of a superclass is "protected". This access modifier allows the subclass to access the superclass members, but it restricts access to other classes outside the package. This ensures that only subclasses can access the superclass members, maintaining encapsulation and preventing unauthorized access from other classes.

    Rate this question:

  • 10. 

    What will be the output of the program? public class Test  {     public static int y;     public static void foo(int x)      {         System.out.print("foo ");         y = x;     }     public static int bar(int z)      {         System.out.print("bar ");         return y = z;     }     public static void main(String [] args )      {         int t = 0;         assert t > 0 : bar(7);         assert t > 1 : foo(8); /* Line 18 */         System.out.println("done ");     } }

    • A.

      Bar

    • B.

      Bar done

    • C.

      Foo done

    • D.

      Compilation fails

    Correct Answer
    D. Compilation fails
    Explanation
    The program will output "Compilation fails" because the assert statement on line 18 is not syntactically correct. The assert statement requires a boolean expression as its first argument, but in this case, the expression "t > 1" is missing. Therefore, the program fails to compile.

    Rate this question:

  • 11. 

    Suppose that in a C program snippet, followings statements are used. i) sizeof(int); ii) sizeof(int*); iii) sizeof(int**);

    • A.

      I), ii) and iii) would compile successfully and size of each would be same i.e. 4

    • B.

      I), ii) and iii) would compile successfully but the size of each would be different and would be decided at run time.

    • C.

      I), ii) and iii) would compile successfully but the size of each would be different and would be decided at run time.

    • D.

      I), ii) and iii) would compile successfully but the size of each would be different and would be decided at run time.

    Correct Answer
    B. I), ii) and iii) would compile successfully but the size of each would be different and would be decided at run time.
    Explanation
    The statements i), ii), and iii) would compile successfully because they are valid uses of the sizeof operator in C. However, the size of each would be different and would be determined at compile time, not run time. The size of int is typically 4 bytes, the size of int* (a pointer to an int) is typically 8 bytes on a 64-bit system, and the size of int** (a pointer to a pointer to an int) is also typically 8 bytes.

    Rate this question:

  • 12. 

    Let x be an integer which can take a value of 0 or 1. The statement if(x = =0) x = 1; else x = 0; is equivalent to which one of the following in a C program?

    • A.

      X=1—x;

    • B.

      X=x—1;

    • C.

      X=1+x;

    • D.

      X=1%x;

    Correct Answer
    B. X=x—1;
    Explanation
    The given statement is an if-else statement that checks if the value of x is equal to 0. If it is, then x is assigned the value of 1; otherwise, x is assigned the value of 0. The equivalent statement in a C program is x = x - 1.

    Rate this question:

  • 13. 

    For 16-bit compiler allowable range for integer constants is ________?

    • A.

      -3.4e38 to 3.4e38 

    • B.

      -32767 to 32768

    • C.

      -32668 to 32667

    • D.

      -32768 to 32767

    Correct Answer
    D. -32768 to 32767
    Explanation
    The correct answer is -32768 to 32767. In a 16-bit compiler, the range for integer constants is determined by the number of bits used to represent the data. In this case, since it is a 16-bit compiler, it means that the compiler can represent numbers using 16 bits. With 16 bits, the range for signed integers is from -32768 to 32767, as one bit is used to represent the sign of the number. Therefore, any integer constant within this range can be used in the program.

    Rate this question:

  • 14. 

    What would be the output of the following C snippet: short testarray[4][3] = { {1}, {2,3}, {4,5,6}}; printf("%d", sizeof(testarray));

    • A.

      12

    • B.

      7

    • C.

      Compiler error

    • D.

      24

    Correct Answer
    C. Compiler error
    Explanation
    The code snippet initializes a 2D array called testarray with 4 rows and 3 columns. However, the initialization is incomplete as not all elements of the array are provided. This will result in a compiler error. The sizeof operator is then used to determine the size of the array, which should be the total number of elements multiplied by the size of each element. Since the array has 4 rows and 3 columns, the total number of elements is 12. The size of each element is determined by the data type, which in this case is short (2 bytes). Therefore, the correct answer is 24.

    Rate this question:

  • 15. 

    In the context of "break" and "continue" statements in C, pick the best statement.

    • A.

      “break” can be used in “for”, “while” and “do-while” loop body. “break” and “continue” can be used in “for”,

    • B.

      “break” and “continue” can be used in “for”, “while” and “do-while” loop body. But only “break” can be used in “switch” body

    • C.

      “continue” can be used in “for”, “while” and “do-while” loop body. break” and “continue” can be used in “for”

    • D.

      “continue” can be used in “for”, “while” and “do-while” loop body. break” and “continue” can be used in “for”

    Correct Answer
    B. “break” and “continue” can be used in “for”, “while” and “do-while” loop body. But only “break” can be used in “switch” body
    Explanation
    The given answer is correct because it accurately states that both "break" and "continue" can be used in the body of "for", "while", and "do-while" loops. However, only "break" can be used in the body of a "switch" statement. This means that "break" can be used to exit a loop prematurely, while "continue" can be used to skip the current iteration and move to the next iteration of the loop.

    Rate this question:

  • 16. 

    Void swap (int *x, int *y) {     static int *temp;     temp = x;     x = y;     y = temp; } void printab () {     static int i, a = -3, b = -6;     i = 0;     while (i <= 4)     {         if ((i++)%2 == 1) continue;         a = a + i;         b = b + i;     }     swap (&a, &b);     printf("a =  %d, b = %d\n", a, b); } main() {     printab();     printab(); } 

    • A.

      A = 0, b = 3 a = 0, b = 3

    • B.

      A = 3, b = 0 a = 12, b = 9

    • C.

      A = 6, b = 3 a = 15, b = 12

    • D.

      A = 6, b = 3 a = 15, b = 12

    Correct Answer
    C. A = 6, b = 3 a = 15, b = 12
    Explanation
    The function printab is called twice in the main function. In the first call, the variables a and b are incremented by 1 in each iteration of the while loop, resulting in a = 6 and b = 3. Then, the swap function is called with the addresses of a and b as arguments. However, the swap function does not actually swap the values of a and b because it only swaps the pointers x and y. Therefore, the values of a and b remain the same. In the second call to printab, the variables a and b are not reset, so they still have the values of a = 6 and b = 3. Therefore, the final output is a = 6 and b = 3.

    Rate this question:

  • 17. 

    What’s going to happen when we compile and run the following C program snippet? #include <stdio.h> int main() {  int a = 10;  int b = 15;    printf("%d",(a+1),(b=a+2));  printf(" %d",b);    return 0; }  

    • A.

      11 15

    • B.

      11 12

    • C.

      Compilation error

    • D.

      None of the above

    Correct Answer
    B. 11 12
    Explanation
    The given program snippet will compile and run without any errors. The first printf statement will print the value of (a+1), which is 11. The second printf statement will print the value of b, which is 12 because b is assigned the value of (a+2), which is 12. Therefore, the output of the program will be "11 12".

    Rate this question:

  • 18. 

    As per C language standard, which of the followings is/are not keyword(s)? auto make mainsizeof elseif Pick the best statement.

    • A.

      Make main elseif

    • B.

      Make main

    • C.

      Auto man

    • D.

      Size of make

    Correct Answer
    A. Make main elseif
    Explanation
    The keywords in the C language are reserved words that have predefined meanings and cannot be used as identifiers. In this case, "make" and "elseif" are not keywords in C. Therefore, the correct answer is "make main elseif" because all three words are not keywords in the C language.

    Rate this question:

  • 19. 

    What will be the output of the following C program: int incr (int i) {    static int count = 0;    count = count + i;    return (count); } main () {    int i,j;    for (i = 0; i <=4; i++)       j = incr(i); }

    • A.

      10

    • B.

      4

    • C.

      6

    • D.

      7

    Correct Answer
    A. 10
    Explanation
    The program defines a function called incr that takes an integer parameter i. Inside the function, there is a static variable called count that is initialized to 0. The function increments the count by the value of i and returns the updated count.

    In the main function, there are two variables i and j. The program enters a for loop that iterates from 0 to 4. In each iteration, the incr function is called with the current value of i, and the returned value is assigned to j.

    Since the count variable is static, it retains its value across multiple function calls. In this case, the count variable starts at 0 and is incremented by i in each iteration of the loop.

    Therefore, the final value of count after the loop is 10. Since the value of count is assigned to j in each iteration, the final value of j is also 10.

    Rate this question:

  • 20. 

    The following C declarations struct node  {     int i;     float j;  };  struct node *s[10] ;  define s to be: 

    • A.

      An array, each element of which is a pointer to a structure of type node

    • B.

      A structure of 3 fields: an integer, a float, and an array of 10 elements

    • C.

      An array, each element of which is a structure of type node.

    • D.

      A structure of 2 fields, each field being a pointer to an array of 10 elements

    Correct Answer
    A. An array, each element of which is a pointer to a structure of type node
    Explanation
    The given C declarations define 's' to be an array, where each element of the array is a pointer to a structure of type node. This means that 's' is an array that can hold multiple pointers, and each pointer points to a structure of type node.

    Rate this question:

  • 21. 

    To add a new column in an existing relation use

    • A.

      Create table

    • B.

      Alter table

    • C.

      Modify table

    • D.

      Truncate table

    Correct Answer
    B. Alter table
    Explanation
    The correct answer is "alter table" because it is the SQL command used to modify the structure of an existing table. By using the "alter table" command, you can add a new column to an existing relation.

    Rate this question:

  • 22. 

    Which of the following is not a integrity constraint ?

    • A.

      Not null

    • B.

      Positive

    • C.

      Unique

    • D.

      Check predicate

    Correct Answer
    B. Positive
    Explanation
    The "positive" constraint is not an integrity constraint. Integrity constraints are used to enforce rules and maintain the integrity of the data in a database. The "not null" constraint ensures that a column cannot have null values, the "unique" constraint ensures that each value in a column is unique, and the "check predicate" constraint allows for custom conditions to be specified for data validation. However, the "positive" constraint is not a standard integrity constraint as it does not enforce any specific rule related to data integrity.

    Rate this question:

  • 23. 

    A table on the many side of a one to many or many to many relationship must:

    • A.

      Be in Second Normal Form (2NF)

    • B.

      Be in Third Normal Form (3NF)

    • C.

      Have a single attribute

    • D.

      Have a composite

    Correct Answer
    D. Have a composite
    Explanation
    A table on the many side of a one to many or many to many relationship must have a composite key. This means that the primary key of the table should consist of multiple attributes that together uniquely identify each record. Having a composite key ensures that each record in the table is uniquely identifiable and avoids any potential data duplication or inconsistencies in the relationship.

    Rate this question:

  • 24. 

     Which forms simplifies and ensures that there is minimal data aggregates and repetitive groups?

    • A.

      1NF

    • B.

      2NF

    • C.

      3NF

    • D.

      ALL OF THESE

    Correct Answer
    C. 3NF
    Explanation
    3NF (Third Normal Form) is the correct answer because it is a form of database normalization that eliminates data redundancy and ensures that there are minimal data aggregates and repetitive groups. In 3NF, all non-key attributes are dependent on the primary key, and there are no transitive dependencies between non-key attributes. This helps to organize the data in a structured and efficient manner, reducing the chances of data anomalies and improving data integrity.

    Rate this question:

  • 25. 

    Which of the join operations do not preserve non matched tuples?

    • A.

      Left outer join

    • B.

      Right outer join

    • C.

      Inner join

    • D.

      None

    Correct Answer
    C. Inner join
    Explanation
    An inner join only includes the matched tuples from both tables, excluding any non-matched tuples. This means that non-matched tuples are not preserved in the result of an inner join. On the other hand, left outer join and right outer join preserve non-matched tuples by including them in the result with NULL values for the attributes from the other table. Therefore, the correct answer is inner join.

    Rate this question:

  • 26. 

    The operation which is not considered a basic operation of relational algebra is

    • A.

      Join

    • B.

      Selection

    • C.

      Union

    • D.

      Cross product

    Correct Answer
    A. Join
    Explanation
    Join is considered a basic operation of relational algebra. It combines tuples from two different relations based on a common attribute. Selection is also a basic operation that retrieves tuples from a relation based on a specified condition. Union is a basic operation that combines tuples from two relations into a single relation. Cross product is also a basic operation that combines every tuple from one relation with every tuple from another relation. Therefore, the operation that is not considered a basic operation of relational algebra is not join.

    Rate this question:

  • 27. 

    Triggers are supported in

    • A.

      Delete

    • B.

      Update

    • C.

      Views

    • D.

      None

    Correct Answer
    C. Views
    Explanation
    Triggers are supported in views. Views are virtual tables that are created based on the result set of a SELECT statement. Triggers are used to automatically execute a set of actions when certain events occur, such as inserting, updating, or deleting data in a table. Therefore, it is possible to create triggers on views to perform actions based on the changes made to the underlying tables that the view is based on.

    Rate this question:

  • 28. 

    For each attribute of a relation, there is a set of permitted values, called the ________ of that attribute.

    • A.

      Domain

    • B.

      Relation

    • C.

      Set

    • D.

      Schema

    Correct Answer
    A. Domain
    Explanation
    The correct answer is "domain". In the context of a relation, the domain refers to the set of permitted values for each attribute. It defines the range of values that can be stored in a particular attribute column of a relation. The domain ensures that only valid and meaningful data is stored in the relation, helping to maintain data integrity and consistency.

    Rate this question:

  • 29. 

    Select * from employee What type of statement is this?

    • A.

      DML

    • B.

      DDL

    • C.

      View

    • D.

      Integrity Constraint

    Correct Answer
    A. DML
    Explanation
    The given statement "select * from employee" is an example of a Data Manipulation Language (DML) statement. DML statements are used to retrieve, insert, update, and delete data in a database. In this case, the statement is retrieving all the data from the "employee" table. DML statements do not make any changes to the structure of the database, which is why it is not a Data Definition Language (DDL) statement. It is also not a view or an integrity constraint.

    Rate this question:

  • 30. 

    SQL applies predicates in the _______ clause after groups have been formed, so aggregate functions may be used.

    • A.

      GROUP BY

    • B.

      WITH

    • C.

      WHERE

    • D.

      HAVING

    Correct Answer
    B. WITH
  • 31. 

    Which of the following selector selects an element that has no children?

    • A.

      :empty

    • B.

      :no child

    • C.

      :inheritance

    • D.

      :no-child

    Correct Answer
    A. :empty
    Explanation
    The :empty selector selects an element that has no children. It targets elements that do not have any content or child elements within them. This selector is useful for styling or targeting specific elements that are empty, allowing for customization or manipulation of their appearance or behavior.

    Rate this question:

  • 32. 

    P {line-height: 150%;} What type of selector is used in this case?

    • A.

      Class selector

    • B.

      Element selector

    • C.

      Id selector

    • D.

      None of the above

    Correct Answer
    B. Element selector
    Explanation
    The correct answer is "element selector." In CSS, an element selector is used to select and apply styles to specific HTML elements. It targets all instances of a particular element on a webpage. In this case, the question is asking about the type of selector being used, and the correct answer is the element selector.

    Rate this question:

  • 33. 

    Which of the following elements are block and inline elements, respectively, that have no particular rendering?

    • A.

      Div

    • B.

      Span

    • C.

      Box model

    • D.

      Div & span

    Correct Answer
    D. Div & span
    Explanation
    Div and span are both HTML elements. Div is a block-level element, which means it takes up the full width available and starts on a new line. Span, on the other hand, is an inline-level element, which means it does not start on a new line and only takes up the necessary width to display its content. Both div and span do not have any particular rendering by default, and their appearance can be modified using CSS. The "box model" is not an element, but rather a concept that describes how elements are rendered in terms of their content, padding, border, and margin.

    Rate this question:

  • 34. 

    What should be the first tag in any HTML document?

    • A.

      Head

    • B.

      Title

    • C.

      Html

    • D.

      Document

    Correct Answer
    D. Document
    Explanation
    The first tag in any HTML document should be the "document" tag. This tag represents the root element of the HTML document and encloses all other elements within it. It is essential for the structure and organization of the HTML document. The "document" tag is placed at the beginning of the document and serves as the starting point for the HTML code.

    Rate this question:

  • 35. 

    Which tag creates a check box for a form in HTML?

    • A.

      <checkbox>

    • B.

      <input type="checkbox">

    • C.

      <input=checkbox>

    • D.

      <input checkbox>

    Correct Answer
    B. <input type="checkbox">
    Explanation
    The correct answer is . This tag creates a check box for a form in HTML. The "input" tag is used to create input fields in HTML forms, and the "type" attribute specifies the type of input field to be created. In this case, "type="checkbox"" creates a check box input field. The other options mentioned - , , and - are not valid HTML tags or attributes for creating a check box input field.

    Rate this question:

  • 36. 

    The _____ character tells browsers to stop tagging the text

    • A.

      ?

    • B.

      /

    • C.

    • D.

      %

    Correct Answer
    B. /
    Explanation
    The forward slash character "/" is used to indicate the end of a tag in HTML. It tells browsers to stop tagging the text that comes after it.

    Rate this question:

  • 37. 

    Which attribute is used to name an element uniquely?

    • A.

      Class

    • B.

      Dot

    • C.

      Id

    • D.

      All of these

    Correct Answer
    C. Id
    Explanation
    The attribute used to name an element uniquely is "id". The id attribute provides a unique identifier for an HTML element, allowing it to be easily targeted and manipulated using JavaScript or CSS. This attribute is used when there is a need to select a specific element on a webpage and apply specific styles or functionality to it. The class attribute, on the other hand, is used to define a group or category of elements that share the same styles or functionality. The dot is not an attribute, but a character used in CSS to select elements with a specific class. Therefore, the correct answer is "id".

    Rate this question:

  • 38. 

    Which of the following is an appropriate value for overflow element?

    • A.

      Auto

    • B.

      Hidden

    • C.

      Scroll

    • D.

      All of these

    Correct Answer
    D. All of these
    Explanation
    The value "all of these" is the correct answer because all of the options listed (hidden, auto, and scroll) are appropriate values for the overflow element. The overflow property is used to control what happens when the content of an element exceeds the dimensions of that element. "hidden" hides any content that overflows, "auto" adds scrollbars when necessary, and "scroll" always adds scrollbars. Therefore, all three options are valid choices for the overflow element.

    Rate this question:

  • 39. 

    How can you make bulleted list?

    • A.

      <bullet>

    • B.

      <list>

    • C.

      <ul>

    • D.

      <ol>

    Correct Answer
    C. <ul>
    Explanation
    To create a bulleted list, the HTML tag used is (unordered list). This tag is used to define an unordered list of items. The tag is followed by (list item) tags, which are used to define each item in the list. The tag creates a bullet point for each item in the list, making it easy to visually distinguish between different items.

    Rate this question:

  • 40. 

    The ___________ property specifies if/how an element is displayed

    • A.

      Background

    • B.

      Show

    • C.

      Border

    • D.

      Display

    Correct Answer
    D. Display
    Explanation
    The display property in CSS specifies how an element should be displayed on the webpage. It controls the layout and visibility of the element. It can be set to various values such as "block", "inline", "inline-block", etc., to determine how the element should be positioned and interact with other elements on the page.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 18, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 28, 2018
    Quiz Created by
    Catherine Halcomb
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.