1.
Which application layer protocol serves traffic between a web server and an internet browser?
Correct Answer
B. HTTP
Explanation
HTTP (Hypertext Transfer Protocol) is the correct answer because it is the application layer protocol that serves traffic between a web server and an internet browser. HTTP is responsible for transmitting hypertext messages, allowing the browser to request and receive web pages, images, videos, and other resources from the web server. It is the foundation of communication on the World Wide Web and enables the retrieval and display of web content.
2.
Which of the following is not a Linux distribution?
Correct Answer
D. Redstone
Explanation
Redstone is not a Linux distribution. Debian, Ubuntu, and Red Hat are all well-known Linux distributions, but Redstone is not.
3.
Which of the following is not a routing protocol?
Correct Answer
B. RIPE
Explanation
RIPE (Réseaux IP Européens) is not a routing protocol. It is a regional internet registry responsible for allocating and managing IP address space in Europe, the Middle East, and parts of Central Asia. Routing protocols, on the other hand, are used by routers to exchange information and determine the best path for forwarding data packets in a network. RIP (Routing Information Protocol), RIPv2, and BGP (Border Gateway Protocol) are all examples of routing protocols.
4.
Which of the following is the safest access method for wireless networks?
Correct Answer
D. WPA2-AES
Explanation
WPA2-AES is the safest access method for wireless networks because it combines the strongest encryption algorithm (AES) with the latest security protocol (WPA2). AES (Advanced Encryption Standard) is a symmetric encryption algorithm that provides a high level of security, while WPA2 (Wi-Fi Protected Access 2) is the most advanced security protocol currently available for wireless networks. This combination ensures that the data transmitted over the network is highly secure and protected against unauthorized access or attacks.
5.
Which ISO/OSI layer do traditional switches operate in?
Correct Answer
A. Layer 2
Explanation
Traditional switches operate in Layer 2 of the ISO/OSI model. Layer 2, also known as the Data Link layer, is responsible for the reliable transfer of data between adjacent network nodes. Switches use MAC addresses to forward data packets within a local area network (LAN). They operate at the link layer, providing a bridge between the physical layer (Layer 1) and the network layer (Layer 3).
6.
Which network does 192.168.1.88 address belong to?
Correct Answer
B. 192.168.1.64/26
Explanation
The given IP address 192.168.1.88 falls within the range of the network 192.168.1.64/26. This is because the subnet mask of /26 indicates that the first 26 bits of the IP address are the network portion, and the remaining 6 bits are the host portion. Therefore, any IP address within the range of 192.168.1.64 to 192.168.1.127 belongs to this network. Since 192.168.1.88 falls within this range, it belongs to the 192.168.1.64/26 network.
7.
What was Opera's Desktop previous layout engine called?
Correct Answer
A. Presto
Explanation
Opera's Desktop previous layout engine was called Presto.
8.
What is the official programming language for Android development?
Correct Answer
B. Java
Explanation
Java is the official programming language for Android development. It is specifically designed to run on the Java Virtual Machine (JVM) and provides a robust and secure environment for developing Android applications. Java offers a wide range of libraries and frameworks that simplify the development process, and its object-oriented nature allows for efficient code organization and reuse. Additionally, Java has a large and active community, providing ample resources and support for Android developers.
9.
According to the C++11 standard, what is the output of this program?
#include
void f(int) { std::cout << "i"; }
void f(double) { std::cout << "d"; }
int main() {
f(1.0);
return 0;
}
Correct Answer
D. D
Explanation
The program calls the function f() with the argument 1.0, which is a double. There are two overloaded versions of f(), one that takes an int and one that takes a double. Since 1.0 is a double, the program will call the f(double) function. This function will output "d" to the console.
10.
What does HTML stand for?
Correct Answer
C. Hyper Text Markup Language
Explanation
HTML stands for Hyper Text Markup Language. It is a standard markup language used for creating and structuring the content on webpages. HTML uses tags to define the structure and elements of a webpage, such as headings, paragraphs, links, images, and more. It allows web browsers to interpret and display the content in a structured manner.
11.
Which of the following is the correct way of making a string in Java?
Correct Answer
D. String text = "text";
Explanation
The correct way of making a string in Java is by using the statement "string text = "text";". In Java, strings are represented using double quotes, not single quotes. Additionally, the "string" keyword should be written in lowercase, as it is a class name in Java.
12.
Which of the passwords below is the strongest?
Correct Answer
D. Correct horse battery staple strawberry
Explanation
The password "correct horse battery staple strawberry" is the strongest because it is a long and complex phrase that is difficult for hackers to guess or crack. It includes a combination of unrelated words and has a high entropy, making it harder to break through brute force attacks. Additionally, the use of spaces between words adds an extra layer of complexity.
13.
How to defend against SQL injection?
Correct Answer
A. Use parameterized queries and prepared statements
Explanation
Using parameterized queries and prepared statements is an effective way to defend against SQL injection attacks. This approach involves separating the SQL code from the user input by using placeholders in the query that are later filled with the user input. This prevents malicious input from being interpreted as part of the SQL code. Prepared statements also help by precompiling the SQL statement, making it more secure and efficient. By implementing these techniques, the risk of SQL injection attacks can be greatly reduced.
14.
Which of the following is not a feature of Object-Oriented Programming?
Correct Answer
B. Multitasking
Explanation
Multitasking is not a feature of Object-Oriented Programming. Object-Oriented Programming focuses on the concepts of encapsulation, polymorphism, and inheritance. Encapsulation refers to the bundling of data and methods within a class, allowing data hiding and access control. Polymorphism allows objects of different classes to be treated as objects of a common superclass, enabling flexibility and code reuse. Inheritance allows the creation of new classes based on existing classes, inheriting their attributes and behaviors. However, multitasking, which refers to the ability of a system to execute multiple tasks concurrently, is not a specific feature of Object-Oriented Programming.
15.
Which Linux system directory traditionally contains configuration files?
Correct Answer
C. /etc
Explanation
The correct answer is /etc. In Linux systems, the /etc directory is traditionally used to store configuration files. This directory contains various configuration files for different aspects of the system, such as network settings, user accounts, software configurations, and more. It is a common practice for system administrators to modify these configuration files to customize the behavior of the system and its installed software.
16.
Which tool can be used to get current memory utilization in Linux?
Correct Answer
D. All answers are correct
Explanation
All of the given options can be used to get the current memory utilization in Linux. The "free" command provides information about the total, used, and free memory in the system. The "top" command displays real-time information about various system resources, including memory usage. The "htop" command is an interactive process viewer that also provides information about memory usage. Therefore, all of the given answers are correct options for obtaining the current memory utilization in Linux.
17.
Which of the following project is used for application containerization?
Correct Answer
A. Docker
Explanation
Docker is the correct answer because it is a popular open-source platform used for application containerization. It allows developers to package their applications and dependencies into containers, which can then be easily deployed and run on any system. Docker provides a lightweight and portable way to isolate applications, making it easier to manage and scale them across different environments. It also provides tools for building, shipping, and running containers, making it a widely used solution in the software development industry.
18.
Traditionally, which user name by default has access to all commands and files on a Linux operating system?
Correct Answer
A. Root
Explanation
The user name "root" is traditionally assigned as the superuser in a Linux operating system. This user has complete access and control over all commands and files on the system. The root user has the highest level of privileges and can perform any administrative tasks, including modifying system files and executing sensitive commands. Other user names like "admin," "sysadmin," or "system" may have administrative privileges, but they do not possess the same level of unrestricted access as the root user.
19.
Which protocol allows name resolution in the Internet?
Correct Answer
A. DNS
Explanation
DNS (Domain Name System) is the protocol that allows name resolution in the Internet. It translates domain names (such as www.example.com) into IP addresses (such as 192.168.1.1) so that computers can communicate with each other over the network. DNS is responsible for mapping human-friendly domain names to the corresponding IP addresses, making it easier for users to access websites and services on the Internet. DHCP (Dynamic Host Configuration Protocol) is used to assign IP addresses to devices on a network, LDAP (Lightweight Directory Access Protocol) is used for accessing and managing directory information, and SMTP (Simple Mail Transfer Protocol) is used for sending emails.
20.
Abstract class in C++
Correct Answer
B. Must consist of at least one virtual function
Explanation
An abstract class in C++ must consist of at least one virtual function. This is because an abstract class is designed to be a base class and cannot be instantiated directly. It is meant to be inherited by other classes, which can then provide their own implementation for the virtual function(s) defined in the abstract class. By requiring at least one virtual function, the abstract class ensures that derived classes will have to provide their own implementation, making it necessary for the abstract class to be inherited and not instantiated directly.
21.
DOM is a set of browser features that allow developer manipulation of the content of a website. In this context DOM stands for
Correct Answer
A. Document Object Model
Explanation
The correct answer is Document Object Model. The DOM is a programming interface for HTML and XML documents. It represents the structure of a document as a tree-like model, where each node represents an element, attribute, or piece of text in the document. Developers can use the DOM to access, modify, and manipulate the content, structure, and style of a website. The other options, such as Document Objectification Method, Development Of Markup, and Development Of Methods, do not accurately describe the purpose or functionality of the DOM.
22.
Which feature is available in the newest version of Opera Desktop browser
Correct Answer
D. All mentioned features
Explanation
The newest version of Opera Desktop browser includes all the mentioned features, which are: Free VPN, Native ad-blocker with cryptojacking protection, and Currency and unit converter. This means that users can enjoy a built-in VPN for secure browsing, protection against malicious cryptojacking scripts, and the convenience of a currency and unit converter within the browser itself.
23.
The process the computer takes to convert a high-level programming language into a machine language that the computer can understand is called
Correct Answer
A. Compilation
Explanation
Compilation is the process by which a computer converts a high-level programming language into a machine language that the computer can understand. During compilation, the source code is translated into object code, which is a low-level representation of the program. This object code is then further processed to generate an executable file that can be run on the computer. Debugging, linking, and preprocessing are all important steps in the software development process, but they are not specifically related to the conversion of high-level programming language into machine language.
24.
Which cloud computing model allows user to deploy and fully manage a virtual machine
Correct Answer
A. IaaS (Infrastructure as a Service)
Explanation
IaaS (Infrastructure as a Service) is the correct answer because it allows users to deploy and fully manage a virtual machine. In the IaaS model, users have control over the operating system, storage, and networking components of the virtual machine, giving them the flexibility to customize and manage their own infrastructure. PaaS (Platform as a Service) provides a platform for developers to build and deploy applications, while SaaS (Software as a Service) offers ready-to-use software applications over the internet. Serverless computing, on the other hand, is a cloud computing execution model where the cloud provider manages the infrastructure and automatically allocates resources as needed, without the need for users to manage virtual machines directly.
25.
Which of the following types of testing is NOT considered as Functional Testing
Correct Answer
C. Performance testing
Explanation
Performance testing is not considered as functional testing because it focuses on evaluating the system's performance, scalability, and responsiveness under varying workloads and stress conditions. It aims to identify bottlenecks and performance issues, rather than validating the system's functionality and adherence to requirements. Functional testing, on the other hand, verifies that the system meets the specified functional requirements and performs as expected. Regression testing, smoke testing, and sanity testing are all types of functional testing that ensure the system's functionality after changes or updates.
26.
Which of the following would be a valid measure of test progress?
Correct Answer
B. Number of test cases not yet executed
Explanation
A valid measure of test progress would be the number of test cases not yet executed. This measure indicates how much testing is still pending and provides an indication of the remaining work to be done. By tracking the number of test cases that are yet to be executed, testers and project managers can assess the progress of testing activities and plan accordingly. It helps in determining if the testing is on schedule or if there are delays that need to be addressed.
27.
The main focus of acceptance testing is
Correct Answer
C. Testing for a business perspective
Explanation
Acceptance testing is a type of testing that evaluates whether a system meets the business requirements and is acceptable for delivery to the end users. It focuses on testing the system from a business perspective, ensuring that it aligns with the intended goals and objectives of the organization. This type of testing verifies that the system functions correctly and meets the needs of the users, rather than solely focusing on finding faults or errors in the system.
28.
What is a ternary operator?
Correct Answer
B. An operator which takes three arguments
Explanation
A ternary operator is an operator that takes three arguments. It is used in programming languages to evaluate a condition and return one of two values based on the result of the condition. The syntax of a ternary operator typically consists of a condition followed by a question mark, followed by the value to return if the condition is true, followed by a colon, and finally the value to return if the condition is false. This allows for more concise and readable code when making simple conditional statements.
29.
Which of the following code repositories is centralized?
Correct Answer
A. SVN
Explanation
SVN (Subversion) is a centralized code repository. Unlike Git, which is a distributed version control system, SVN relies on a central server to store and manage the codebase. With SVN, developers must connect to the central server to access and update the code. This centralized approach allows for stricter control over the codebase, as changes are made directly to the central repository and can be easily managed and tracked.
30.
How many instances can be created for an abstract class?
Correct Answer
D. 0
Explanation
An abstract class cannot be instantiated directly, meaning that objects cannot be created from it. It is meant to be subclassed and serve as a blueprint for other classes. Therefore, the correct answer is 0, as no instances can be created for an abstract class.
31.
What is the full form of SQL?
Correct Answer
A. Structured Query Language
Explanation
SQL stands for Structured Query Language. It is a programming language used for managing relational databases. SQL allows users to create, modify, and retrieve data from databases. It is widely used in database management systems and is considered the standard language for interacting with relational databases.
32.
int sum(int num)
{
if (num!=0)
return num + sum(num-1);
else
return num;
}
Above code is
Correct Answer
D. All answers are correct
Explanation
The given code is an example of recursion because it calls itself within the function. It will sum the first n natural numbers because it starts with a given number and recursively adds the previous number until it reaches 0. It may cause stack overflow if the input number is too large, as each recursive call adds another frame to the stack. All of the given answers are correct.
33.
In test-driven development
Correct Answer
B. Test are being written before the actual software code
Explanation
In test-driven development, tests are written before the actual software code is written. This approach helps ensure that the code meets the desired requirements and functions correctly. By writing tests first, developers can clearly define the expected behavior of the code and then implement the code to pass those tests. This helps in identifying any potential issues early in the development process and ensures that the code is thoroughly tested.
34.
Which is NOT a design pattern
Correct Answer
B. Lambda
Explanation
The design patterns mentioned in the options are Bridge, Factory, and Facade. These are well-known design patterns used in software development to solve common design problems. However, "Lambda" is not a design pattern. Lambda refers to a concept in programming languages, particularly in functional programming, where anonymous functions can be created and used as values. It is not specifically categorized as a design pattern.
35.
What is the result of the JavaScript code presented below?
x = 1 + "2";
document.write(x);
Correct Answer
A. 12
Explanation
The JavaScript code presented above assigns the value of "1" plus "2" to the variable x. Since "1" and "2" are both strings, the + operator concatenates them together, resulting in the string "12". The document.write(x) statement then outputs the value of x, which is "12".
36.
A process of reclaiming memory occupied by objects that are no longer in use by the program is
Correct Answer
A. Garbage collection
Explanation
Garbage collection is the process of automatically reclaiming memory occupied by objects that are no longer in use by the program. It identifies and frees up memory that is no longer referenced by any part of the program, preventing memory leaks and improving memory management efficiency. This process is essential in languages with automatic memory management, such as Java, where developers do not have to manually allocate and deallocate memory. Memory laundrying, defragmentation, and object sweeping are not accurate terms for this process.