IT QUIZ-08




Q1. To promote encapsulation, Java provides which type of access modifier?
Public
Private
Protected
All of the above
None of the above
Solution:
Encapsulate provides contract to other object to what to hide and what to expose which can be accessed other objects. In java we use private access modifier to hide method and variable to restrict from outer world.

Q2. A distributed network configuration in which all data information pass through a central computer is________.
Bus Network
Ring Network
Star Network
Font to Point Network
None of the above
Solution:
Star networks are one of the most common computer network topologies. In its simplest form, a star network consists of one central hub which acts as a conduit to transmit messages.

Q3. A web cookie is a small piece of data________
sent from a website and stored in user’s web browser while a user is browsing a website
sent from user and stored in the server while a user is browsing a website
sent from root server to all servers
none of the mentioned
AJAX stands for
Solution:
web cookie is a small piece of data sent from a website and stored on the user's computer by the user's web browser while the user is browsing. Cookies were designed to be a reliable mechanism for websites to remember stateful information (such as items added in the shopping cart in an online store) or to record the user's browsing activity.

Q4. Which of the following page replacement algorithms suffers from Belady’s anomaly?
Shortest job first
Round robin
first-in first-out
Elevator
None of these
Solution:
Belady’s anomaly is the phenomenon in which increasing the number of page frames results in an increase in the number of page faults for certain memory access patterns. This phenomenon is commonly experienced when using the first-in first-out (FIFO) page replacement algorithm.

Q5. What is JSP?
Client-side programming
Sever side programming
Browser side programming
Both (A) and (B)
None of the above
Solution:
Java Server Pages (JSP) is a server-side programming technology that enables the creation of dynamic, platform-independent method for building Web-based applications.

Q6. ___________ is a malicious act in which a large number of email messages are sent to a single email address in a short period of time.
Flash
Gopher
E-mail bomb
Emoticon
None of these
Solution:
A malicious act where huge numbers of e-mails are directed to a specific system or a targeted user of that system. Mail bombs will usually fill the allotted space on an e-mail server for the users e-mail and can result in crashing the e-mail server, or at the very least, possibly rendering the user's computer useless as their e-mail client attempts to download the huge amounts of e-mail. Also called a mail bomb.

Q7. By using ________you can force immediate termination of a loop, by passing the conditional expression and any remaining code in the body of the loop.
Break
Continue
Terminate
Loop Close
None of these
Solution:
break statement is encountered inside a loop, the loop is immediately terminated and the program control resumes at the next statement following the loop.

Q8. Error detection at the data link level is achieve by ___________
bit stuffing
CRC
Hamming codes
Equalization
None
Solution:
A Cyclic Redundancy Check (CRC) is an error-detecting code commonly used in digital networks and storage devices to detect accidental changes to raw data. Blocks of data entering these systems get a short check value attached, based on the remainder of a polynomial division of their contents.

Q9. Which of the following is the time interval between the submission and completion of job?
Waiting time
Turnaround time
Throughput
Response time
None of these
Solution:
Turnaround time is the time interval from the time of submission of a process to the time of the completion of the process.

Q10. Which of the following is a form of virus explicitly designed to hide itself from detection by antivirus software?
Stealth Virus
Macro Virus
Polymorphic Virus
Parasitic Virus
None of these
Solution:
A stealth virus is a hidden computer virus that attacks operating system processes and averts typical anti-virus or anti-malware scans. Stealth viruses hide in files, partitions and boot sectors and are adept at deliberately avoiding detection.

Q11. The default parameter passing mechanism is_____
Call by value
Call by reference
Call by value result
Call by function
None of these
Solution:
call by value method of passing arguments to a function copies the actual value of an argument into the formal parameter of the function.

Q12. What are the qualities of good software?
Reliability
Correctness
Efficiency
Portability
All of the above
Solution:
Quality of software is not just concern with what software does, it also includes the software’s behavior while it is executing and the structure and organization of the system programs and associated documentation. Quality of good software is- reliability, correctness, efficiency, portability, flexibility, maintainability etc.

Q13. JavaScript was developed by __________ to run inside of web pages.
Microsoft
Sun
Oracle
Netscape
None of these
Solution:
Java script was developed by Netscape. JavaScript is a powerful and popular language for programming on the web.

Q14. Which SQL command used to avoid the selection of duplicate rows?
GRANT
DISTINCT
EXCLUSIVE
DISCRETE
None of these
Solution:
The SQL DISTINCT keyword is used in conjunction with the SELECT statement to eliminate all the duplicate records and fetching only unique record.

Q15. Which cloud computing service provided by Microsoft?
Azure
Elastic
Smart
Grid
None of these
Solution:
Microsoft Azure is a cloud computing service created by Microsoft for building, testing, deploying, and managing applications and services through a global network of Microsoft-managed data centers.