Jr Instructor(Information Communication Technology System Maintenance) (cat no 93/2018)
PROVISIONAL ANSWER KEY
Question Paper Code: 61/2019/OL
Category Code: 093/2018
Exam: Jr Instrctor(Information Communication
Technology System Maintenance)
Medium of Question: English
Date of Test 31-12-2019
Department Industrial Training
Alphacode A
Question1:-What are the active devices of I generation computer
A:-Vacuum tubes
B:-Transister
C:-Integrated Circuits
D:-Microprocessor
Correct Answer:- Option-A
Question2:-Which of the following is not a language translator
A:-Assembler
B:-Interpreter
C:-Compiler
D:-Application
Correct Answer:- Option-D
Question3:-1 Kilobyte = _____ bits
A:-8 bits
B:-`2^(10)`bits
C:-`8xx2^(10)` bits
D:-`8xx2^(16)` bits
Correct Answer:- Option-C
Question4:-Which one of the following is a volatile memory?
A:-ROM
B:-RAM
C:-EPROM
D:-EEPROM
Correct Answer:- Option-B
Question5:-Which of the following is an extension of image file?
A:-exe
B:-txt
C:-jpeg
D:-doc
Correct Answer:- Option-C
Question6:-The term “Pentium” relates to
A:-Operating system
B:-Microprocessor
C:-Hard disk
D:-Output device
Correct Answer:- Option-B
Question7:-Which of the following is not a flavor of Linux?
A:-Redhat
B:-Ubuntu
C:-Suse
D:-OS/2
Correct Answer:- Option-D
Question8:-Which of the following is used to keep a process running in background even after the user logout from shell?
A:-bg
B:-hup
C:-&
D:-nohup
Correct Answer:- Option-D
Question9:-On successful execution, fork returns _____ to parent process
A:-0
B:-1
C:-Child process id
D:-Parent process id
Correct Answer:- Option-C
Question10:-Which of the following is used to display the content of a file in octal format?
A:-cat
B:-oct
C:-od
D:-octal
Correct Answer:- Option-C
Question11:-What will be the output of the program?
#include
main()
{ float b=5, h=2, a;
a = 1/2 * b * h;
printf(“%f”,a);
}
A:-10
B:-10.000000
C:-0
D:-0.000000
Correct Answer:- Option-D
Question12:-Default return type of a function is
A:-null
B:-void
C:-int
D:-float
Correct Answer:- Option-C
Question13:-Which of the following is the last character of a string
A:-\0
B:-\n
C:-\t
D:-none of these
Correct Answer:- Option-A
Question14:-Name of an array returns _____
A:-First element of the array
B:-Size of the array
C:-Number of elements of the array
D:-Base address of the array
Correct Answer:- Option-D
Question15:-What will be the output of the following program segment?
#include
main()
{ int i;
for (i = 3; i <5; i++);
printf("%d",i);
}
A:-3, 4
B:-5
C:-4
D:-None of these
Correct Answer:- Option-B
Question16:-What will be the output of the following program segment
#include
main()
{ int z, x = 4, y = -10, a=4, b=2;
z = x++ – –y*b/a;
printf(%d”,z);
}
A:-6
B:-7
C:-8
D:-9
Correct Answer:- Option-D
Question17:-What will be the output?
main()
{ union stud
{ char name [10];
int regno;
int mark1;
int mark2;
} st;
printf(“%d,sizeof(st));
A:-16
B:-0
C:-12
D:-10
Correct Answer:- Option-D
Question18:-What is the return value of malloc()?
A:-size of the allocated memory
B:-base address of the allocated memory
C:-1 if memory allocation is success
D:-none of these
Correct Answer:- Option-B
Question19:-Which of the following header file must be included to use dynamic memory allocation functions?
A:-dos.h
B:-stdio.h
C:-stdlib.h
D:-memory.h
Correct Answer:- Option-C
Question20:-What will be the data type returned by the following function?
#include
int func()
{
return (float)(char)8.3;
}
A:-int
B:-float
C:-char
D:-multiple typecasting not allowed
Correct Answer:- Option-A
Question21:-What will be the output of the following program
#include
main()
{ int a=5b *3 % 6 – 8 + 3;
printf(“%d”,a);
}
A:-10
B:-2
C:–2
D:-3
Correct Answer:- Option-C
Question22:-Information on basic system configuration is stored in
A:-BIOS
B:-CMOS
C:-CONFIG.SYS
D:-ROM
Correct Answer:- Option-B
Question23:-Where do PC store CMOS settings?
A:-RAM
B:-Flash ROM
C:-South bridge
D:-NVRAM
Correct Answer:- Option-B
Question24:-How can you remove a CMOS password?
A:-Flash the BIOS
B:-Change the system clock to 00/00/0000
C:-Sent it back to factory
D:-Remove jumper on the mother board
Correct Answer:- Option-D
Question25:-Power-on self-test checks all of the flowing except
A:-CPU
B:-Memory
C:-Modem
D:-Video
Correct Answer:- Option-C
Question26:-Which of the following is a special database that holds key information about your system including the device
drivers?
A:-BOOT.INI
B:-CONFIG.SYS
C:-SYSTEM.INI
D:-Registry
Correct Answer:- Option-D
Question27:-IDE cables have how many pins?
A:-24
B:-32
C:-40
D:-64
Correct Answer:- Option-C
Question28:-Which controller support an external CD drive?
A:-ESDI
B:-MFM
C:-SCSI
D:-ARLL
Correct Answer:- Option-C
Question29:-Which of the following describes a fragmented hard disk?
A:-Files are corrupted
B:-Clusters of data are damaged
C:-Storage media is damaged
D:-Files are not stored in consecutive clusters
Correct Answer:- Option-D
Question30:-A 16 bit address bus can generate _____ addresses.
A:-65536
B:-32768
C:-32767
D:-None of these
Correct Answer:- Option-A
Question31:-The size of registers of 8086 microprocessor.
A:-12 bits
B:-8 bits
C:-16 bits
D:-32 bits
Correct Answer:- Option-C
Question32:-If there is a carry from lowest nibble during addition, _____ flag is set.
A:-Carry flag
B:-Overflow Flag
C:-Auxiliary carry
D:-Sign flag
Correct Answer:- Option-C
Question33:-The number of address and data lines of 8086
A:-8 and 8
B:-16 and 16
C:-20 and 16
D:-16 and 20
Correct Answer:- Option-C
Question34:-Which directory contains configuration files in linux?
A:-/bin/
B:-/etc/
C:-/root/
D:-/dev/
Correct Answer:- Option-B
Question35:-On successful completion, fork() returns _____ to the parent process.
A:-0
B:-1
C:–1
D:-Process ID of child process
Correct Answer:- Option-D
Question36:-What will be the output of the following program?
static int a = 3;
void main()
{ a = 5;
{
int a = 7;
}
printf(“%d”,a);
}
A:-3
B:-5
C:-7
D:-12
Correct Answer:- Option-B
Question37:-Default storage class of a variable declaration is _____
A:-auto
B:-extern
C:-static
D:-register
Correct Answer:- Option-A
Question38:-Fast access to data items available in a database file can be provided through
A:-Index file
B:-data file
C:-data dictionary
D:-metadata file
Correct Answer:- Option-C
Question39:-The term _____ is used to refer to a row in a table
A:-fields
B:-attributes
C:-Tuple
D:-none of these
Correct Answer:- Option-C
Question40:-Which one of the follow is not a RDBMS?
A:-Foxpro
B:-Oracle
C:-Mysql
D:-Sql server
Correct Answer:- Option-A
Question41:-Which one of the following is used to create a virtual relation for storing a query?
A:-view
B:-function
C:-procedure
D:-table
Correct Answer:- Option-A
Question42:-which one of the following option clause is used with view to reject the tuples that do not satisfy the “where
condition”?
A:-with
B:-with check
C:-check
D:-none of these
Correct Answer:- Option-B
Question43:-When using Foreign Key, the _____ of one relation is referenced in another relation
A:-Foreign Key
B:-Primary Key
C:-Check constraint
D:-None of these
Correct Answer:- Option-B
Question44:-_____ is the preferred method for enforcing data integrity
A:-Constraints
B:-Triggers
C:-Cursors
D:-Stored Procedure
Correct Answer:- Option-A
Question45:-What values does the count(*)function ignore?
A:-null values
B:-Integer
C:-character
D:-none of these
Correct Answer:- Option-A
Question46:-The _____ statement is used in SQL for authorization
A:-implement
B:-revoke
C:-grant
D:-none of these
Correct Answer:- Option-C
Question47:-_____ is executed when a table is modified
A:-procedure
B:-function
C:-trigger
D:-none of these
Correct Answer:- Option-C
Question48:-Which of the following command is used to delete a particular column in a relation?
A:-DELETE
B:-ALTER
C:-UPDATE
D:-DROP
Correct Answer:- Option-B
Question49:-A transaction completes its execution is said to be
A:-Saved
B:-Rolled
C:-Committed
D:-Loaded
Correct Answer:- Option-C
Question50:-The language used in application program to request for data from DBMS is
A:-DDL
B:-DML
C:-DCL
D:-all of these
Correct Answer:- Option-B
Question51:-Which of the following is NOT related to OOP?
A:-Encapsulation
B:-Data Abstraction
C:-Data Hiding
D:-Data Dictionary
Correct Answer:- Option-D
Question52:-In a class defined using an Object Oriented Programming language:
A:-All data and functions should be public to maximise flexibility and ease of use
B:-Nearly all data should be private and most functions should be public
C:-Nearly all data should be public and most functions should be private
D:-All data must be private, but functions are neither private nor public
Correct Answer:- Option-B
Question53:-Which among the following is an Object-Oriented Programming language?
A:-Java
B:-Simula 67
C:-Smalltalk
D:-All the above
Correct Answer:- Option-D
Question54:-_____ are the basic run times entities in an object-oriented system.
A:-Objects
B:-Classes
C:-Functions
D:-All the above
Correct Answer:- Option-A
Question55:-Operator Overloading
A:-Defines a new meaning to an existing operator
B:-Enables operators to work with objects
C:-Implements polymorphism
D:-All of the above
Correct Answer:- Option-D
Question56:-Virtual function in C++ implements _____
A:-Inheritance
B:-Polymorphism
C:-Data hiding
D:-None of the above
Correct Answer:- Option-B
Question57:-Multiple inheritance can be achieved in Java using _____
A:-Applets
B:-Servlets
C:-Interface
D:-Swing
Correct Answer:- Option-C
Question58:-Which of the following statements is TRUE about constructors?
A:-Constructors are automatically invoked when objects of the class are created
B:-Constructors can be overloaded
C:-The return type of constructors is void ( )
D:-Both (A) and (B)
Correct Answer:- Option-D
Question59:-Wrapping up of data and associated functions into one single unit is called
A:-Abstraction
B:-Encapsulation
C:-Data Hiding
D:-Polymorphism
Correct Answer:- Option-B
Question60:-Which among the following OOP feature promotes code reusability?
A:-Data Hiding
B:-Polymorphism
C:-Inheritance
D:-Late Binding
Correct Answer:- Option-C
Question61:-Private members of a class are accessible to:
A:-Member functions of that class
B:-Friend functions of that class
C:-All functions in the program
D:-Both (A) and (B)
Correct Answer:- Option-D
Question62:-A class which is not used to create objects, but is designed to act as a base class to be inherited by other
classes is called:
A:-Abstract class
B:-Virtual base class
C:-Template class
D:-None of the above
Correct Answer:- Option-A
Question63:-Which of the following programs in UNIX helps us to configure a machine as a proxy server?
A:-Apache
B:-Poff
C:-Synaptic
D:-Squid
Correct Answer:- Option-D
Question64:-The maximum number of class A networks possible according to the IPv4 addressing scheme is:
A:-32
B:-64
C:-126
D:-256
Correct Answer:- Option-C
Question65:-172.0.14.87 is a Class _____ address
A:-Class A
B:-Class B
C:-Class C
D:-Class D
Correct Answer:- Option-B
Question66:-In IPv6 address is a _____ bit address
A:-32
B:-64
C:-128
D:-256
Correct Answer:- Option-C
Question67:-How fast can CAT 6 cable transfer data?
A:-Upto 10 Mbps
B:-Upto 100 Mbps
C:-Upto 1 Gbps
D:-Upto 10 Gbps
Correct Answer:- Option-D
Question68:-The number of half duplex links required to connect five computers in mesh topology is:
A:-25
B:-20
C:-10
D:-15
Correct Answer:- Option-B
Question69:-A network device that connects dissimilar networks by providing the translation from one set of protocols to
another is:
A:-Switch
B:-Router
C:-Gateway
D:-Modem
Correct Answer:- Option-C
Question70:-Which among the following protocols is used for translating from IP address to MAC address?
A:-ICMP
B:-ARP
C:-RARP
D:-IGRP
Correct Answer:- Option-B
Question71:-The input and output ports of a router perform the _____ layer functions:
A:-Physical and Data link
B:-Network
C:-Both (A) and (B)
D:-None of the above
Correct Answer:- Option-A
Question72:-Transport Layer is responsible for _____ delivery of data:
A:-Node to node
B:-Process to process
C:-Hop to hop
D:-All of the above
Correct Answer:- Option-B
Question73:-A firewall is used in a network to:
A:-Prevent fire in a network
B:-To scan for viruses in files
C:-Prevent unauthorized access to the network
D:-None of the above
Correct Answer:- Option-C
Question74:-The maximum number of active devices in a Piconet is:
A:-4
B:-6
C:-7
D:-8
Correct Answer:- Option-D
Question75:-Which of the following is a private network?
A:-LAN
B:-WAN
C:-MAN
D:-None of the above
Correct Answer:- Option-A
Question76:-The IEEE standard for Wireless LAN is:
A:-IEEE 802.3
B:-IEEE 802.4
C:-IEEE 802.11
D:-IEEE 802.7
Correct Answer:- Option-C
Question77:-A protocol that allows non-ASCII messages to be sent through e-mails:
A:-MIME
B:-IMAP
C:-POP3
D:-SMTP
Correct Answer:- Option-A
Question78:-A sniffer is
A:-A protocol
B:-A virus
C:-A program that monitors and analyzes network traffic
D:-None of the above
Correct Answer:- Option-C
Question79:-Providing, managing and maintaining hardware, software, content integrity, security and reliable high speed
connection for a website is called:
A:-Web hosting
B:-Web Browsing
C:-Web Crawling
D:-Navigation
Correct Answer:- Option-A
Question80:-The system that helps users to identify host computers in a network by their names instead of their IP
addresses is:
A:-TCP
B:-DNS
C:-PPP
D:-ARP
Correct Answer:- Option-B
Question81:-A computer virus that copies itself to the beginning of the hard disk, where it is automatically executed when
the system is turned ON is called _____
A:-Worm
B:-Trojan Horse
C:-Boot sector virus
D:-None of the above
Correct Answer:- Option-C
Question82:-What is a trap door in a program?
A:-A security hole inserted while writing the program, which is intended for later use
B:-An error in the program
C:-Security hole in a network
D:-None of the above
Correct Answer:- Option-A
Question83:-Honeypot is an example for
A:-Security auditing software
B:-Intrusion detection software
C:-Encryption software
D:-Virus
Correct Answer:- Option-B
Question84:-Which feature of cloud computing allows the service to change in size or volume in order to meet user’s needs?
A:-Scalability
B:-Security
C:-Virtualization
D:-Cost savings
Correct Answer:- Option-A
Question85:-DoS is the acronym for
A:-Denial of Security
B:-Delivery of Service
C:-Denial of Service
D:-Delivery of Security
Correct Answer:- Option-C
Question86:-Which among the following is NOT a web browser?
A:-Microsoft Edge
B:-Google Chrome
C:-Mozilla Firefox
D:-None of the above
Correct Answer:- Option-D
Question87:-URL stands for _____
A:-Universal Resource Locator
B:-Uniform Resource Locator
C:-Unified Resource Locator
D:-Universal Route Locator
Correct Answer:- Option-A
Question88:-What should be the first tag in any HTML document?
A:-
B:-
C:-
D:-
Correct Answer:- Option-D
Question89:-Domain names used by commercial establishments usually have the suffix _____
A:-.com
B:-.org
C:-.ac.in
D:-.gov.in
Correct Answer:- Option-A
Question90:-Choose the correct HTML tag to make the text bold:
A:-
B:-
C:-
D:-Both (A) and (B)
Correct Answer:- Option-D
Question91:-Marquee is a tag in HTML used to:
A:-Mark the list of items to maintain in queue
B:-Mark the text so that it is hidden in browser
C:-Display text with scrolling effect
D:-None of the Above
Correct Answer:- Option-C
Question92:-CSS is an acronym for
A:-Cascading Style Sheet
B:-Cascading Style System
C:-Cascading server Sheet
D:-None of the above
Correct Answer:- Option-A
Question93:-Which of the following statements is TRUE about JavaScript?
A:-JavaScript is designed to add style to HTML pages
B:-JavaScript is designed to add interactivity to HTML pages
C:-JavaScript is used to perform server side scripting operations
D:-None of the Above
Correct Answer:- Option-B
Question94:-_____ is a built-in JavaScript function which can be used to execute another function after a given time interval.
A:-Timeout( )
B:-TimeInterval( )
C:-setTimeout( )
D:-All of the above
Correct Answer:- Option-C
Question95:-A dynamic web page is
A:-Displayed the same every time
B:-Generated on demand by a program on a request from browser
C:-Both (A) and (B)
D:-None of the above
Correct Answer:- Option-B
Question96:-Which of the following is NOT TRUE about PHP?
A:-PHP can be used to develop web applications
B:-PHP makes a website dynamic
C:-PHP applications cannot be compiled
D:-PHP cannot be embedded into HTML
Correct Answer:- Option-D
Question97:-PHP scripts are enclosed with _____
A:-
C:-?php…?php
D:-
…
Correct Answer:- Option-B
Question98:-Which of the following is the correct statement to create an array in PHP?
(i) state[0] = “Kerala”;
(ii) $state[ ] = array(“Kerala”);
(iii) $state[0] = “Kerala”;
(iv) $state = array(“Kerala”);
A:-(iii) and (iv)
B:-(ii) and (iii)
C:-Only (iv)
D:-(ii), (iii) and (iv)
Correct Answer:- Option-A
Question99:-Which one of the following PHP functions allow user-defined functions to accept variable length argument lists?
A:-func_get_argv()
B:-func_get_args()
C:-get_argv()
D:-get_args()
Correct Answer:- Option-B
Question100:-_____ is the concatenation operator in PHP
A:-.(dot)
B:-+
C:-=
D:-^
Correct Answer:- Option-A