Posts

Data Structure MCQs

 1) ___________ is a data organization, management, and storage format that enables efficient access and modification. A) Data Analysis B) Data structure C)Data Science D) Data Load Correct Ans: Data structure 2) An array is a collection of items stored at ___________ memory locations. A) contiguous B) permanent C) temporary D) dynamic Correct Ans: contiguous 3) The elements in a linked list are linked using ___________. A) object B) structure C) pointers D) classes Correct Ans: pointers 4) The _______ operation in Doubly Link List is more efficient if pointer to the node to be deleted is given. A) delete B) update C) insert D) modify Correct Ans:delete  5) ___________ is a linear data structure which follows a particular order in which the operations are performed. A) link list B) Stack C) array D) heap Correct Ans: Stack  6) Each element in a _________ can have only 2 children A) binary tree B) stack C) hash table D) array Correct Ans...

Introduction to Network Security MCQs

 1) ___________ is a combination of cryptography & cryptanalysis. A) Cryptology      B) readable message C) cipher text      D) plain text Correct ans: Cryptology 2) ___________ have strong security checks as to what they can do, and what they cannot. A) signed applets B) java applets C) ActiveX D) client pull Correct ans: java applets 3) __________ verifier ensures that java class files obey the rules of the java programming language. A)bitcode B) source code C) bytecode D) java compiler Correct ans: bytecode 4) Key database is a set of keys used by security manager and access controller to validate ___________. A) java classes B) loading classes C) authentication D) digital signature Correct ans: digital signature 5) __________ is a passive attack on an ongoing conversation. A) packet sniffing B) IP Spoofing C) packet spoofing D) IP sniffing Correct ans: packet sniffing 6) ___________ technique, rather than replacing o...

Python MCQs

 1) Store code in a file and use the interpreter to execute the contents of the file, which is called a ___________. A)script B) interpreter C) compiler D) object code Correct Ans:script 2) A ___________ is a sequence of instructions that specifies how to perform a computation. A)input B)output C)math D) program Correct Ans: program 3)___________Perform basic mathematical operations like addition and multiplication. A)input B)output C)math D) program Correct Ans: math 4) _______________ refers to the structure of a program and the rules about that structure. A)syntax B)runtime C)semantic D) logical Correct Ans: syntax 5) ______________ is the process of formulating a problem, finding a solution, and expressing the solution. A)problem solving B) portability C) interpret  D) compile Correct Ans: problem solving 6) A __________ is one of the basic things a program works with, like a letter or a number. A)code B)value C)algorithm D) bug Correct Ans: value 7) ___________ are ...

Linux Administration MCQs

 1) __________ command tells the user how long the system has been running since its last boot, how many users are currently logged in, and how much load the system is experiencing. A) uptime B) rpm C)bash D) cd Correct Ans: Uptime 2)__________ This is where all of the program files will reside. A) /usr B) /boot C) /var D) /tmp Correct Ans: /usr 3)The ______ command to list all the packages that are currently installed on your system A) uptime B)rpm C) bash D) cd Correct Ans: rpm 4) The _________ file stores the user’s login, encrypted password entry, UID, default GID, name (sometimes called GECOS), home directory, and login shell. A) /etc/usr /etc/login C) /etc/passwd D)/etc/id  Correct Ans:/etc/passwd 5) When users log into the system, they expect an environment that can help them be productive. This first program that users encounter is called a _________. A) shell B) Kernal C) root D) None of these Correct Ans: shell 6) The __________ com...

Software Testing & Quality Assurance MCQs, STQA

 1)____________ is the software that acts as tools to help construct or support applications software.  A) system software B) Application Software C) Web Application D) Website Correct Ans: system software 2) ____________ Systems that store and access large amounts of data, for example, an airline seat reservation system. A)real-time systems B)information systems C)embedded systems D)scientific software Correct Ans: information systems 3)An important example of a validation activity is_______________.  A)acceptance testing B)verification C)System integration D)Feasibility study Correct Ans: acceptance testing 4) The ___________ hacker who breaks into computer systems, often using the internet, to commit fraud, to cause damage or simply for fun A)Developer B) programmer C)malicious D)None of these Correct Ans: malicious 5)Money provides the ready-made metric for measuring value. This kind of investigation is called __________ or a cost-benefit analy...

Data Warehouse MCQs

 1) ______________ means must have a single, enterprise-wide view. A) Integrated     B) Data Integrity               C) Credible          D) Accessible Correct Ans: Integrated 2) The ____________ exists to answer questions users have about the business, the performance of the various operations, the business trends, and about what can be done to improve the business. A) Data Mining                  B) Data Integrity                C) Data warehouse           D) Data Science Correct Ans: Data warehouse 3) The __________________ nature of the data in a data warehouse allows for analysis of the past A) time-variant B) Subject oriented     ...

Advanced Web Programming MCQs

 1) The .Net framework is a revolutionary platform that helps you to write the following types of applications. a) Windows applications b) Web applications c) Web services d) All of These And: D 2) Built-in reference types are: a) object b) dynamic c) string d) All of these Ans: D 3)  In C#, type casting has two forms. a) Implicit  b) Explicit c) both A & B d) None of these Ans: B 4) ______________ is defined 'as the process of enclosing one or more items within a physical or logical package'. a) Encapsulation b) Inheritance c) abstraction d) polymorphism Ans: A 5) An access specifier defines the ______________ of a class member. a) scope b) visibility c) scope and visibility d) None of these Ans: B 6) The __________keyword is used for creating a structure. a) class b) interface c) struct  d) package Ans: C 7) __________...