Qus Bank 2
Qus Bank 2
Qus Bank 2
5. When images are used as links they get a blue border ____________.
A. Always
B. Never
C. Unless border is set to zero
D. Unless border is set to one
13. What is the correct syntax for referring to an external script called "xxx.js"?
A. <script type="text/javascript" name="xxx.js">
B. <script type="text/javascript” href="xxx.js">
C. <script type="text/javascript” src="xxx.js">
D. <link type=”text/javascript” src="xxx.js">
14. Is it true that Meta tags seriously improve search engine rankings?
A. no
B. it depends language to language
C. Yes.
D. It depends on Operating system
15. HTML defines colors using hexadecimal values, while graphics programs most often use
_____________.
A. Names
B. Normal numbers
C. RGB Code
D. ash code
18. Choose the correct HTML to left-align the content inside a table cell?
A. <td valign="left">
B. <tdleft>
C. <td align="left">
D. <td leftalign>
20. One of the greatest strength of XML Schema is, it supports for ____________ .
A. images
B. graphics
C. datatypes
D. graphics
21. Which of these are not the valid XML DOM relationships?
A. parentNode
B. previousSibling
C. lastChild
D. nextNode
24. Which element can be used to compute generated text, within a template?
A. <xsl:value-of>
B. <xsl:template>
C. <xsl:select >
D. None of the above
25. How many characters can be written with 1 Kilobyte?
A. 1024
B. 1
C. Depends on the font used
D. 255
28. Which tag is used to maintain the order of elements in XML Schema?
A. <xsd:list>
B. <xsd:choice>
C. <xsd:all>
D. <xsd:sequence>
31. Which is the code that asks for the set of all div elements in a document?
A. var divs = $(div);
B. var divs = jQuery("div");
C. var divs = $("div");
D. var divs = #("div");
32. Which of the following is the correct HTML for making a checkbox?
A. <check>
B. <input type="check">
C. <checkbox>
D. <input type="checkbox">
33. Which of the following is the correct HTML for creating a hyperlink?
A. <a name="">A</a>
B. <a>B</a>
C. <a href="http://www.example.com">example</a>
D. <a url="http://www.example.com">example</a>
38. A JavaScript program can traverse and manipulate document content through _______.
A. Element Object
B. Document Object
C. Both a and b
D. None of the mentioned
40. Code between a pair of “script” tags in java script are called ________
A. Non-inline
B. External
C. Referenced
D. Inline
SADTT
1. In case of Bank, what will be the relationship between "Withdrawal" use case and "Check Balance" Use
case?
A) Uses
B) Includes
C) Extends
D) None of the above
2. Which SDLC Model is best suited for Application Development when requirements are clear and
Relationship with customer is mature?
A) Waterfall Model
B) Incremental Model
C) Prototype Model
D) Spiral Model
3. For Critical documents like estimation and proposal for any software, which of the following review is
best?
A) Peer review
B) Senior review
C) Group review
D) Brainstorming
5. The process of Correcting Production problem after analyzing any defect is known as _____________.
A) Quality Control
B) Inspection
C) Quality Assurance
D) TQM
7. ________________ is a software testing process in which the objective is to measure the reliability of the
software rather than to discover software faults.
A) Defensive programming
B) Damage assessment
C) Statistical testing
D) None of the above
8. Which of the following statements best describe comparison between CMM levels?
A) Quality and productivity increases with level
B) Time to market and risk increases with level
C) Quality and productivity decreases with level
D) Time to market and risk decreases with level
10. Please select the statements which are true for Project Planning.
I. Project Planning starts before the contract is signed.
II. Project Planning starts once the contract is signed
III. Project Initiation is the first step in Project Planning
IV. Writing Project Report is a part of Project Planning
A) I and II
B) II and III
C) III and IV
D) All statements are true
11. An effective risk management plan will need to address which of the following issues?
A) risk avoidance
B) risk monitoring
C) contingency planning
D) All of the above
19. Executing the same test case by giving the number of inputs on same build called as:
A) Regression Testing
B) Ad hoc Testing
C) Re-Testing
D) Sanity Testing
22. Which of these is not one of the phase names defined by the Unified Process model for software
development?
A) Inception phase
B) Elaboration phase
C) Construction phase
D) Validation phase
23. Which of the following is not a part of Design Model?
A) Interface Design
B) Architectural Design
C) Schema Design
D) Data Design
27. The work product produced during the requirement elicitation will vary depending on the
___________________.
A) size of the product
B) size of the budget
C) Software process being used
D) Stake holder needs
33. Smoke testing is an ----- testing approach, which is used when software is being developed
A) Unit testing
B) Regression testing
C) Integration testing
D) Acceptance testing
34. ___________________ provides the maximum number of test cases that will be required to guarantee that
every statement in program has been executed at least once.
A) Independent Program paths
B) Cyclomatic complexity
C) Graph Matrices
D) None of the above
36. A method of estimating the amount of functionality required for a project is ________________.
A) WBS Estimation
B) UCP Estimation
C) FP Estimation
D) COCOMO estimation
37. Which of the following traits needs to exist among the members of an agile software team?
A. Competence
B. Decision-making ability
C. Mutual trust and respect
D. All of the above
38. Which of the following activities is not one of the four things that need to be accomplished by the
generic planning task set?
A. Develop overall project strategy
B. Identify the functionality to deliver in each software increment
C. Create a detailed schedule for the complete software project
D. Devise a means of tracking progress on a regular basis
2. Which of the following statements are correct about the program below as per C99 standard?
#include<stdio.h>
int main()
{
int size, i;
scanf("%d", &size);
int arr[size];
for(i=1; i<=size; i++)
{
scanf("%d", &arr[i]);
printf("%d", arr[i]);
}
return 0;
}
A. Syntax error, since the subscript for array used in for loop is in the range 1 to size.
B. Syntax error, since the values of array is getting scanned through the loop.
C. Syntax error, since the statement declaring array is invalid.
D. No syntax error, but output is unpredictable due to accessing array beyond limits.
4. Which of the following data structure can't store the non-homogeneous data elements?
A. structure
B. union
C. class
D. None of the above
5. What is the output of the following code?
Int main()
{
int x=87;
delete &x;
cout << x << endl;
return 0;
}
A. Garbage Value
B. Compilation Error
C. 87
D. Run Time Error
9. Destructor has the same name as the constructor and it is preceded by ______ .
A. !
B. ?
C. ~
D. $
10. Which of the following operator is overloaded for the object cout?
A. >>
B. <<
C. +
D. =
11. Which one of the following is the correct way to declare a pure virtual function?
A. virtual void Display(void){0};
B. virtual void Display = 0;
C. virtual void Display(void) = 0;
D. void Display(void) = 0;
12. Overloaded functions can differ by _______________ .
A. type of arguments
B. number of arguments
C. sequence of argument types
D. All of the above
13. Which error will be thrown when we create object of a class that needs a zero-argument constructor, but
the class contains all parameterized constructor and no default constructor?
A. Compile-time error.
B. Preprocessing error
C. Runtime error
D. Linker error
14. If a class C is derived from class B, which is derived from class A, all through public inheritance, then a class
C member function cannot access
A. Public data in A and B.
B. Protected and public data in C.
C. Private data in A and B.
D. Protected data in A and B.
15. Calling an overridden non virtual function through base class pointer binds to
A. Base or Derived version depends on address of object in pointer
B. Always Base version of the function
C. Always Derived version of the function
D. Causes run time error
16. What is the most common practice used while designing classes?
A. Member functions and member variables are both private.
B. Member functions are private, and member variables are public.
C. Member functions are public, and member variables are private.
D. Member functions and member variables are both public.
17. When allocating an array of objects, what constructor is used to initialize all of the objects in the array?
A. The automatic copy constructor.
B. The paramerized constructor.
C. The default constructor.
D. None of the above
18. Which of the following is most appropriate about Abstract base class?
A. A class with all pure virtual functions
B. A class with at least one pure virtual function
C. Functions prefixed with abstract keyword
D. A class with all virtual functions
19. Which of the following is correct about class and structure?
A. class can have member functions while structure cannot.
B. class data members are public by default while that of structure are private.
C. Pointer to structure or classes cannot be declared.
D. class data members are private by default while that of structure are public by default.
21. Which of the C++ casting operators requires run time type identification (RTTI) support?
A. static_cast
B. const_cast
C. dynamic_cast
D. reinterpret_cast
24. Which of the given STL containers can be used to store unique values?
A. map
B. set
C. vector
D. list
25. If the characters 'D', 'C', 'B', 'A' are placed in a queue (in that order), and then removed one at a time, in
what order will they be removed?
A. ABCD
B. ABDC
C. DCAB
D. DCBA
28. The inorder traversal of a binary tree are D B E A F C G and preorder traveral is A B D E C F G,The postorder
traversal of the binary tree is:
A. D E B G G C A
B. E D B G F C A
C. E D B F G C A
D. D E F G B C A
29. The operation for removing an entry from a stack is traditionally called:
A. delete
B. peek
C. pop
D. remove
31. Adjacency matrix and Adjacency list can be used to represent which type of graphs?
A. Weighted graphs
B. Directed graphs
C. Undirected graphs
D. All the above
32. Which of the following algorithms is a graph traversal algorithm that internally uses stack for performing
the traversal?
A. Depth-First Search
B. Breadth-First Search
C. Height-First Search
D. Both A and B.
33. Assuming that the hash function for a table works well, and the size of the hash table is reasonably large
compared to the number of items in the table, the expected (average) time needed to find an item in a hash
table containing n items is
A. O(1)
B. O(log n)
C. O(n log n)
D. O(n2)
34. Stack data structure can be used for ?
A. Converting an infix expression to a postfix expression
B. Evaluating a postfix expression
C. In function calls in an application that is executing.
D. All the above.
36. Which design pattern deals with the problem of creating objects without specifying the exact class of
object that will be created?
A. Factory Pattern
B. Builder pattern
C. Composite pattern
D. Singleton pattern
39. Which design pattern provides a mechanism for building complex objects that is independent from the
ones that make up the object?
A. Factory Pattern
B. Adapter pattern
C. Builder pattern
D. Singleton pattern
2. __________ is a set of program that interacts with the database at some point in its execution.
A. A database system
B. A database application
C. Both A & B
D. None of the above
3. Which is the central component of the DBMS software that can also be termed as the database control
system?
A. Data consistency
B. Data integration
C. Data sharing
D. Data manager
8. _________ normal form says that every non-prime attribute should be fully functionally dependent on
prime key attribute.
A. First
B. Second
C. Third
D. BCNF
9. You want to delete a record from the table by prompting the user for an id number of the record. Which
of the following will serve your purpose?
A. DELETE FROM RecordX WHERE id_number = *id_number;
B. DELETE FROM RecordX WHERE id_number := &id_number;
C. DELETE FROM RecordX WHERE id_number = &id_number;
D. None of the above.
12. _________ is a general term meaning that the database is not an RDBMS which supports SQL as its
primary access language.
A. Flat File Database
B. Mysql
C. Nosql
D. Softbase
13. To find information about trigger status, which of the following views are appropriate?
A. ALL_TRIGGERS
B. ALL_OBJECTS
C. ALL_TRIGGER_COLS
D. ALL_SOURCE
22. The _____ operator takes the documents returned by the aggregation pipeline and writes them to a
specified collection.
A. $output
B. $out
C. $redirect
D. None of the above.
25. _________ will encounter when you try to assign a variable into another variable that is too small to hold
it.
A. value_error exception
B. invalid_number exception
C. invalid_value_error exception
D. None of the above.
26. Which line in the following SELECT statement will produce an error?
A. select dept, avg(salary) from emp;
B. select dept, avg(salary) from emp where dept=20;
C. select dept, avg(salary) from emp group by empid;
D. There are no errors in the above statements
27. A table can have maximum _________ number of Long Raw data type columns.
A. One
B. No limit
C. 255
D. depends on tables pace
28. The transaction control that prevents more than one user from updating data in a table is called
___________.
A. Locks
B. Commits
C. Rollbacks
D. Savepoints
29. The @ command in SQL*Plus will do which of the following with a named PL/SQL block stored in a
flat file?
A. Load the PL/SQL code into its processing buffer only.
B. Load PL/SQL code into its processing buffer and compile the code against the database only.
C. Load PL/SQL code into its processing buffer and compile the code on the client side only.
D. Load, compile, and run PL/SQL code against the Oracle database.
30. Which of the following options is used in the CREATE VIEW command that will prevent the updating
of data in the base table that is not accessible to the view?
A. WITH SELECT ONLY
B. WITH CHECK OPTION
C. WITH READ ONLY
D. WITH FORCE OPTION
31. If you delete a row in a table, and Oracle deletes the related entries in all other tables. This is known as
_______.
A. Referential Integrity
B. Deleting rows
C. Data Integrity
D. Cascading delete
32. Dropping a table has which of the following effects, on a non-unique index created for the table?
A. No effect
B. The index will be dropped
C. The index will be rendered invalid
D. The index will contain NULL values
35. A user can use the procedure of another user if he is having _________.
A. Read privilege
B. Write privilege
C. Execute privilege
D. Read & Write privileges
36. Which of the following choice is a valid parameter for sequence creation?
A. identified by
B. using the temporary tablespace
C. on delete cascade
D. maxvalue
<%int i=9;%>
<%i++;%>
<%out.println(i++);%>
A. 11
B. 12
C. 10
D. 9
Consider one.jsp
<jsp:useBean id=”user” class=”UserBean” scope=”request”/>
<jsp:setProperty name=”user” property=”email” value=”rama@gmail”/>
<a href=”two.jsp”>Next</a>
Consider two.jsp
Hello, ${user.email}
If Client clicks on Next link, what will be output on client browser?
A. Hello
B. Hello, rama@gmail
C. Blank page will be displayed
D. Run time error.
9. Which form of the JSP element is used to insert the content generated by other dynamic resources at the
request processing time?
A. JSP Scripting elements
B. JSP Page Directive
C. JSP Include Directive
D. JSP Include Action
10. Which of the following is an approach for state maintenance in Web applications?
A. Hidden Form Field
B. URL Rewriting
C. Cookies
D. All of the above.
12. The ________ listeners are notified when session objects are created, invalidated, or timed out.
A. Servlet context listeners
B. Session Listeners
C. Servlet context attribute
D. Session Attribute
13. Which of the following are most common configuration methods of Hibernate Configuation
A. Mapping files
B. http.conf
C. XML Configuration hibernate.cfg.xml
D. web.config
14. What is return type of execute () method?
A. void
B. String
C. int
D. ActionForward
18. Your application supports multiple client types including HTTP clients. Your business layer is implemented
using Enterprise Java Beans. Which of the following is best suited for maintaining client state?
A. Stateful session beans
B. Entity Beans
C. HttpSession attributes
D. Cookies
20. The method which sets the query parameter of the prepared statement?
A. putString().
B. insertString().
C. setString().
D. setToString().
21. What is correct sequence of Servlet life cycle?
A. Init(), doGet() , service() ,doPost(), Destroy()
B. Init(), Service(), doGet()/doPost(), Destroy()
C. Init(), doGet()/doPost(), Service(), Destroy()
D. Service(), Init(), doGet()/doPost(), Destroy()
22. Which of the following is correct jsp element type and their syntax?
A. Directives <%= %>
B. Comment <% %>
C. Declarations <%!... %>
D. Expression <%@ %>
24. Select the right statement about referring a Spring configuration file inside the package
com.example.myapp in the below example?
26. Is it possible to declare mappings for multiple classes in one mapping file?
A. True
B. False
C. Can't Say
D. None of the above
27. Which of the following servlet lifecycle method is guaranteed to run before a servlet can process any
request?
A. doGet( )
B. service( )
C. init()
D. detroy( )
28. The method getWriter returns an object of type PrintWriter. This class has println methods to generate
output. Which of these classes define the getWriter method? Select the one correct answer.
A. HttpServletRequest
B. HttpServletResponse
C. ServletConfig
D. ServletContext
33. URL encoding is the method of replacing all the spaces and other extra characters into their corresponding
_______ characters.
A. Hex
B. Binary
C. Octal
D. Decimal
34. Which classes we have to use for getting connected with database in spring?
A. java.lang.Class and DriverManager
B. JdbcTemplate and DriverManagerDataSource
C. Both a and b
D. None of the above
35. Which API allows spring for dependency injection?
A. IOC
B. ORM
C. OXM
D. None
36. A Java program cannot directly communicate with an ODBC driver because
A. ODBC written in C language
B. ODBC written in C# language
C. ODBC written in C++ language
D. ODBC written in Basic language
37. The................................ method executes a simple query and returns a single Result Set object.
A. executeUpdate()
B. executeQuery()
C. execute()
D. noexecute()
38. Which of the following allows substitution of code to occur at the translation time in a JSP page?
A. <jsp:include> Tag
B. <@ include> directive
C. <@ page > directive
D. Declaration block
3. The ______________ describe the behavior of converting the named class into the bits responsible for
implementing that class?
A. Loader class
B. class loader
C. bit class
D. Object class
6. ________ method of java is invoked by JVM to reclaim the inaccessible memory location?
A. reclaim
B. final
C. finalize
D. Both B and C
10. If you want to sort HashMap as per non key based criteria, what is possible solution?
A. Use TreeMap with Natural Ordering
B. Use TreeMap with Custom Ordering
C. Use TreeMap with anonymous inner class
D. Convert map into collection view & then sort.
12. Which of the following statement is true about static inner class?
A. They can access everything from outer class
B. They cannot access anything from outer class
C. Outer class can access anything from static inner class
D. To create object of static inner class we do not need outer Class object.
class SuperDemo
{
void method()
{
try
{
\\some code
}
catch(IOException e)
{
}
catch(FileNotFoundException f)
{
}
public static void main(String []args)
{
SuperDemo s = new SuperDemo();
s.method();
}
}
A. No output
B. Runtime error
C. compile time error
D. Exception
21. Which of these is a process of writing the state of an object to a byte stream?
A. Serialization
B. Externalization
C. File Filtering
D. All of the mentioned
25. Which method of the Applet class displays the result of applet code on screen
A. run() method
B. paint() method
C. drawString() method
D. main() method
26. Which of these is returned by operators &?
A. Integer
B. Boolean
C. Character
D. Float
27. Which of these can be used to fully abstract a class from its implementation?
A. Objects
B. Packages
C. Interfaces
D. None of the Mentioned.
String s1 = "xyz";
String s2 = "abc";
s1.concat("hello");
String s3 = new String("xyz");
A. 3
B. 4
C. 2
D. 1
Class Demo
{
int i;
Demo()
{
i=9;
}
public static void main(String [] args)
{
Demo d = new Demo();
System.out.println(d);
}
}
A. 9
B. garbage value
C. hashcode
D. no output
32. Which of this method of HashSet class is used to add elements to its object?
A. add(E)
B. Add(E)
C. addFirst()
D. insert()
35. Which of these method of InputStream is used to read integer representation of next available byte
input?
A. read()
B. scanf()
C. get()
D. getInteger()
36. Which of these is a method of ObjectInput interface used to deserialize an object from a stream?
A. int read()
B. void close()
C. Object readObject()
D. Object WriteObject()
Class A
{
public static void main()
{
System.out.println("Hello");
}
}
A. Hello
B. No output
C. Runtime error
D. Compile time error
38. What will be the output?
class A
{
public int method()
{
return 1;
}
}
class B extends A
{
int method()
{
return 2;
}
}
public static void main(String []args)
{
B b1 = new B();
System.out.println(b1.method());
}
A. 1
B. 2
C. no output
D. compile error
40. Which method must be overriden to print any class object using System.out.println?
A. String toString
B. int hashcode
C. Object clone
D. not required
MS.NET
3. While creating a C# Class Library project, what is the name of the supplementary file that Visual
Studio.NET creates that contains General Information about the assembly?
A. AssemblyInfo.xml
B. AssemblyInfo.cs
C. AssemblyInformation.xsd
D. AssemblyAttributes.cs
4. Which of the following is/are not the content of the assembly manifest?
A. Assembly name
B. Assembly source code
C. Version number
D. All of the above
6. Which of the following statements are correct about the Bitwise & operator used in C#.NET?
1. The ‘&’ operator can be used to put ON a bit.
2. The ‘&’ operator can be used to put OFF a bit.
3. The ‘&’ operator can be used to check whether a bit is ON.
4. The ‘&’ operator can be used to check whether a bit is OFF.
A. Only 1
B. 1 and 2
C. 1 and 3
D. 2, 3, 4
10. Which of the following option is the correct way to define and initialize an array of 3 integers?
1. int[] p = {10, 20, 30};
2. int[] p;
p = new int{10, 20, 30};
3. int[] p;
p = new int[3]{10, 20, 30};
4. int[] p;
p = new int[2];
p[0] = 10;
p[1] = 20;
p[2] = 30;
5. int[] p;
p = new int[3];
p[0] = 25;
p[1] = 30;
p[2] = 40;
A. All
B. 1 only
C. 1,3,5
D. 1,2,4
Methods Properties
A. Capacity 1. Gets the number of elements currently in the list
B. Count 2. Removes the element at the specified place
C. RemoveAt() 3. Gets or sets the number of elements in the list
A. A3, B1, C2
B. A1, B2, C3
C. A2, B3, C1
D. A1, B3, C2
using System;
namespaceIndiabixConsoleApplication
{
classMyProgram
{
static void Main(string[] args)
{
int index = 6;
int val = 15;
int[] a = new int[5];
try
{
a[index] = val ;
}
catch(IndexOutOfRangeException e)
{
Console.Write("Index out of bounds ");
}
Console.Write("C-DAC Remaining program will execute");
}
}
}
A. Value 15 will get assigned to a[6].
B. Index out of bounds
C. C-DAC Remaining program will execute
D. Index out of bounds C-DAC Remaining program will execute
14. When using aOledbParameter, OledbCommand and OledbConnection the parameter symbol would
be________.
A. Parameter Name
B. @
C. ?
D. None of the above
17. Which method do you invoke on the DataAdapter object to generate Insert, Update, Delete
commands?
A. Load()
B. Fill()
C. Update()
D. Execute()
18. Which one is the correct way to create a new row for a DataTable? (ds is DataSet variable and dt is a
DataTable variable)?
A. DataRow drow= new DataRow();
B. DataRow drow = ds.NewRow();
C. DataRow drow = dt.NewRow();
D. DataRow drow =dt.Rows.CreateRow();
B. XML
22. How do you get information from a form that is submitted using the "post" method?
A. Request.QueryString
B. Request.Form
C. Response.write
D. Response.WriteIn
25. Go through the following LINQ code and pick up the correct answer from the following options?
A. Output: 2 4
B. Output: 1 3 5
C. Output: 1 3
D. Output: 1 2 4
26. What is used to fetch values from the data source to the DataSet and also update the data source with
the values in the DataSet?
A. DataReader
B. DataAdapter
C. DataManager
D. None of the above.
27. In ASP.NET if one uses Windows authentication the current request attaches an object called as
________________ .
A. Serialization
B. WindowsPrincipal
C. WindowDataset
D. None of the Above.
28. Which value from InstanceContextMode enumeration should be chosen for a WCF service class, to
decide that a single service class object should serve all the requests from the same proxy class object?
A. PerCall
B. PerSession
C. Single
D. None of the above
29. Which of the following is/are way to host WCF services?
A. WAS (Windows Activation Service)
B. IIS
C. Self Hosting
D. All of the above.
31. You develop a Web control. The Web control consists of labels and associated text boxes. You need to
ensure that the Web control has both toolbox and visual designer support. What should you do?
A. Add a Web Control Library project to your solution. Define a class that inherits from CompositeControl.
B. Add a Windows Control Library project to your solution. Define a class that inherits from UserControl.
C. Add a Web User Control to your project. Define a class that inherits from UserControl.
D. Add a Mobile Web User Control to your project. Define a class that inherits from MobileUserControl.
33. When using a User Defined Class in WCF one has to mark the class with __________ attribute.
A. [DataMember]
B. [DataContract]
C. [ServiceContract]
D. [OperationContract]
34. Which method of the DataSet object is used to return the DataSet's contents in XML form as a string.
A. GetXml()
B. ReadXml()
C. WriteXml()
D. SetXml()
35. What Solution does .NET provide for the DLL HELL problem?
A. Garbage Collection.
B. Cyclical Reference.
C. Assembly Versioning.
D. None Above
37. Which of the following technologies is a lightweight protocol for exchange of information in a
decentralized, distributed environment?
A. XML
B. WSDL
C. XSD
D. SOAP
38. ADO.NET provides the ability to create and process in-memory databases called
A. Views
B. Relations
C. Datasets
D. Tables
39. Consider you are developing a web page to collect an Employee's data and one TextBox control in
particular is used to accept Indian Postal Code of employee's area which will contain six digits without
any special character between the digits. You have used a RegularExpressionValidator control to validate
the TextBox value. What will be the custom expression for ValidationExpression property of the validator
control?
A. The custom expression should \d{3}+\d{3}
B. The custom expression should be \d{6}
C. The custom expression should be /d{6}
D. The custom expression should be d{6}
1. _________ format specifier can be supplied as argument to date command to display current date in
DD/MM/YY format.
A. +%S
B. +%D
C. +%d/%m/%y
D. +%d/%m/%Y
4. Which command is used in the vi editor to save file and remain in the editing mode?
A. :x
B. q!
C. :w
D. :q
6. Which command is used to print the name of current shell for logged in user?
A. echo $SHELL
B. echo $SH
C. echo $LSHELL
D. None of the Above
8. ________ control structure is used to run the loop as long as condition is false and stops when condition
becomes true
A. For
B. While
C. until
D. None of the above
9. Which of the following variable return the exit status of last command?
A. $!
B. $?
C. $$
D. $#
10. Which command is used to assign read-write permission to the owner of a file?
A. chmod a+r file
B. chmod o+r file
C. chmod u=rw file
D. chmod og-r file
11. _______________ acts as interface between user space and kernel space.
A. Interrupt
B. Threading
C. IPC
D. System call
12. ____________ System call is used to create a new process in linux OS.
A. create
B. fork
C. execl
D. yield
13. Number of processes that complete their execution per unit of time is called as _______
A. Throughput
B. Turnaround time
C. Response time
D. None of the above
14. ___________ threading model is used in modern operating systems like linux.
A. One to one
B. Many to One
C. Many to man
D. All of the above
16. A situation where two or more processes blocked for infinite time due to circular dependency is known as
_______________ .
A. Starvation
B. Deadlock
C. Livelock
D. Preemption
17. Which of the following page replacement algorithms suffers from Belady’s anomaly?
A. FIFO
B. LRU
C. Optimal
D. Random
21. _________ disk scheduling algorithm has least seek time for a given data set
A. SCAN
B. SSTF
C. FCFS
D. LOOK
26. A process which never gets scheduled for an infinite time ,where other processes are getting scheduled is
known as
A. Starvation
B. Deadlock
C. Livelock
D. None of the above.
28. Two or more file names pointing to same inode number are known as
A. Hard links
B. Soft links
C. Symbolic links
D. None of the above
31. _______________ Principle ensures that shared resources are accessed by only one thread at a time.
A. Synchronization
B. Mutual Exclusion
C. Dead lock
D. Starvation
32. The time taken to move the disk arm from one cylinder to the desired cylinder is called
A. positioning time
B. random access time
C. seek time
D. rotational latency
33. ___________ is not part of inode.
A. File size
B. File Name
C. Permissions
D. None of the above
34. ____________ Scheduling algorithm can guarantee fairness among all processes.
A. FCFS
B. Priority Based
C. Round Robin
D. None of the above
35. Piece of code that only one thread can execute at a time is called as
A. Entry section
B. Critical Section
C. Exit Section
D. None of the above
36. Bring a page into physical memory only when it is referenced is called as
A. Copy on write
B. Demand Paging
C. Page Fault
D. Thrashing
40. Which of the following is a preferred scheduling algorithm for Real time systems?
A. FCFS
B. Round Robin
C. Priority Based
D. None of the above