NESCOM Assistant Manager (Software)
Programming & OOP
1. In C, what is the size of int on most 32-bit compilers?
a) 2 bytes b) 4 bytes c) 8 bytes d) Compiler dependent
Ans: b
2. What will be the output?
int a=5; printf("%d", ++a + ++a);
a) 12 b) 13 c) Undefined behavior d) 14
Ans: c
3. Which of the following is not OOP principle?
a) Encapsulation b) Abstraction c) Polymorphism d) Compilation
Ans: d
4. In Java, String is:
a) Mutable class b) Immutable class c) Primitive type d) Wrapper type
Ans: b
5. Destructor in C++ is declared with:
a) ~ b) ! c) # d) None
Ans: a
6. Which of these allows function overloading?
a) Same function name, different parameters
b) Same parameters, different return type
c) Both a & b
d) None
Ans: a
Data Structures
7. Which DS works on FIFO?
a) Stack b) Queue c) Tree d) Graph
Ans: b
8. Which DS is used for recursion?
a) Queue b) Stack c) Linked List d) Array
Ans: b
9. Average case time complexity of Merge Sort?
a) O(n) b) O(n log n) c) O(n²) d) O(log n)
Ans: b
10. Best-case of Quick Sort?
a) O(n²) b) O(n log n) c) O(n) d) O(log n)
Ans: b
11. In BST, searching average complexity is:
a) O(n) b) O(log n) c) O(n²) d) O(1)
Ans: b
12. Hash table collision can be resolved using:
a) Chaining b) Open Addressing c) Double Hashing d) All
Ans: d
Database & SQL
13. Which normal form removes partial dependency?
a) 1NF b) 2NF c) 3NF d) BCNF
Ans: b
14. SQL command to remove a table?
a) DELETE b) REMOVE c) DROP d) CLEAR
Ans: c
15. Which key uniquely identifies each record?
a) Foreign Key b) Primary Key c) Candidate Key d) Super Key
Ans: b
16. Which SQL clause is used to filter rows?
a) WHERE b) HAVING c) GROUP BY d) ORDER BY
Ans: a
17. Which SQL JOIN returns only matching rows?
a) INNER JOIN b) LEFT JOIN c) RIGHT JOIN d) FULL JOIN
Ans: a
18. What does SELECT COUNT(*) FROM emp; return?
a) Sum of salary b) Number of rows c) Number of columns d) Average salary
Ans: b
Web Programming
19. HTML is a:
a) Programming language b) Markup language c) Database language d) Compiler
Ans: b
20. Which tag is used for line break?
a) <p> b) <br> c) <lb> d) <line>
Ans: b
21. JavaScript is:
a) Compiled b) Interpreted c) Both d) None
Ans: b
22. Which protocol does HTTPS use?
a) TLS/SSL b) UDP c) FTP d) SMTP
Ans: a
23. In PHP, $_POST is used to:
a) Get URL parameters b) Get form data via POST c) Handle cookies d) Store
sessions
Ans: b
Digital Logic Design (DLD)
24. Binary of (13)₁₀ = ?
a) 1101 b) 1011 c) 1110 d) 1001
Ans: a
25. 2’s complement of (1010)₂ is:
a) 0101 b) 0110 c) 0110 d) 1110
Ans: b
26. A full adder has:
a) 2 inputs, 2 outputs b) 3 inputs, 2 outputs c) 2 inputs, 1 output d) 3 inputs, 3 outputs
Ans: b
27. Flip-flop is a:
a) Combinational circuit b) Sequential circuit c) Counter d) Encoder
Ans: b
28. Which gate is universal gate?
a) AND b) OR c) NAND d) XOR
Ans: c
Computer Organization
29. CPU directly communicates with:
a) Cache b) RAM c) Hard Disk d) ROM
Ans: b
30. Which register stores address of next instruction?
a) MAR b) PC c) IR d) ACC
Ans: b
31. Cache memory is:
a) Faster than RAM
b) Slower than RAM
c) Same as Hard Disk
d) None
Ans: a
32. RISC stands for:
a) Reduced Instruction Set Computer
b) Regular Instruction Storage Computer
c) Random Internal Storage Cycle
Ans: a
Networking
33. TCP is:
a) Connection-oriented b) Connectionless c) Both d) None
Ans: a
34. UDP is:
a) Reliable b) Unreliable c) Connection-oriented d) None
Ans: b
35. Which OSI layer handles routing?
a) Network b) Data Link c) Transport d) Session
Ans: a
36. IP address is:
a) 16-bit b) 32-bit c) 64-bit d) 128-bit
Ans: b (IPv4)
37. Which protocol sends emails?
a) SMTP b) POP3 c) FTP d) HTTP
Ans: a
38. Firewall works at:
a) Application b) Transport c) Network d) All layers
Ans: d
Operating System
39. Which scheduling algorithm is preemptive?
a) FCFS b) SJF c) Round Robin d) None
Ans: c
40. Which memory is volatile?
a) ROM b) RAM c) Hard disk d) CD-ROM
Ans: b
41. Paging is a method of:
a) Process scheduling b) Memory management c) File handling d) None
Ans: b
42. Thrashing occurs when:
a) CPU bound jobs dominate
b) Too many page faults
c) Disk crash
d) None
Ans: b
43. Semaphore is used for:
a) Process synchronization
b) Deadlock removal
c) Paging
d) File sharing
Ans: a
Software Engineering
44. Waterfall model is:
a) Iterative b) Sequential c) Spiral d) Agile
Ans: b
45. SDLC phase concerned with “what system should do”?
a) Design b) Requirement analysis c) Testing d) Deployment
Ans: b
46. Cohesion refers to:
a) Dependency between modules
b) Degree a module performs single task
c) Coupling measure
d) None
Ans: b
47. Coupling means:
a) Independence of modules
b) Interdependence between modules
c) Complexity of a module
d) None
Ans: b
48. Black box testing is based on:
a) Internal code
b) External behavior
c) White box
d) None
Ans: b
49. Spiral model combines:
a) Waterfall & Incremental
b) Agile & V-model
c) Iterative & Big Bang
d) None
Ans: a
ICT Basics / Cloud
50. Which of these is an IaaS provider?
a) Google Docs b) AWS EC2 c) Gmail d) MS Office 365
Ans: b
51. SaaS example:
a) Oracle Cloud b) Gmail c) Docker d) Kubernetes
Ans: b
52. Cloud computing characteristics include:
a) On-demand self-service
b) Resource pooling
c) Scalability
d) All
Ans: d
53. In ICT, WAN stands for:
a) Wide Area Network
b) Web Access Network
c) Wireless Access Node
Ans: a
54. Which device operates at OSI Layer 2?
a) Router b) Switch c) Hub d) Gateway
Ans: b
Q56. Which of the following is a non-functional requirement?
a) User authentication
b) Response time < 2 sec
c) Login page
d) Report generation
Answer: b) Response time < 2 sec
Q57. Requirement elicitation technique that involves direct conversation with stakeholders
is:
a) Brainstorming
b) Interview
c) Questionnaire
d) Prototyping
Answer: b) Interview
Q58. Which of the following is not an SDLC model?
a) Waterfall
b) Spiral
c) V-Model
d) Agile
Answer: d) Agile (it is a methodology, not a strict SDLC model)
Q59. The main drawback of the Waterfall model is:
a) Easy to understand
b) Late testing
c) Parallel development
d) Customer involvement
Answer: b) Late testing
Q60. Which SDLC model is best for high risk projects?
a) Waterfall
b) Spiral
c) V-Model
d) Prototype
Answer: b) Spiral
Q61. Which of the following represents cohesion in software design?
a) Interdependence between modules
b) Degree to which elements of a module belong together
c) Level of redundancy in design
d) None
Answer: b) Degree to which elements of a module belong together
Q62. Which type of coupling is most desirable?
a) Content coupling
b) Common coupling
c) Data coupling
d) Control coupling
Answer: c) Data coupling
Q63. UML stands for:
a) Unified Modeling Language
b) Universal Model Language
c) Unified Management Language
d) User Modeling Language
Answer: a) Unified Modeling Language
Q64. A use case diagram models:
a) Internal data structure
b) Interaction between user and system
c) Database schema
d) Algorithmic flow
Answer: b) Interaction between user and system
Q65. In software testing, white-box testing focuses on:
a) System requirements
b) Code structure
c) User interface
d) Load performance
Answer: b) Code structure
Q66. Black-box testing is also known as:
a) Structural testing
b) Functional testing
c) Regression testing
d) Performance testing
Answer: b) Functional testing
Q67. Regression testing ensures:
a) System runs fast
b) New changes do not break old functionality
c) Software is secure
d) Software is reliable
Answer: b) New changes do not break old functionality
Q68. Which is not a level of testing?
a) Unit testing
b) Integration testing
c) White-box testing
d) System testing
Answer: c) White-box testing
Q69. Which quality factor measures ease of use?
a) Maintainability
b) Usability
c) Portability
d) Reliability
Answer: b) Usability
Q70. Which quality attribute ensures software runs without failure for a long time?
a) Reliability
b) Portability
c) Efficiency
d) Flexibility
Answer: a) Reliability
Q71. ISO standard for software quality is:
a) ISO 9126
b) ISO 9001
c) ISO 27001
d) ISO 14000
Answer: a) ISO 9126
Q72. In project management, critical path is:
a) The path with minimum duration
b) The longest path with no slack
c) Path with most resources
d) The shortest path in Gantt chart
Answer: b) The longest path with no slack
Q73. Which chart is used in project scheduling?
a) Flow chart
b) Gantt chart
c) UML diagram
d) ER diagram
Answer: b) Gantt chart
Q74. Which model allows incremental delivery?
a) Waterfall
b) Spiral
c) Agile
d) V-Model
Answer: c) Agile
Q75. The primary aim of Software Configuration Management (SCM) is:
a) To improve software speed
b) To control versions and changes
c) To enhance GUI
d) To fix errors automatically
Answer: b) To control versions and changes
Q76. Cloud computing service that provides hardware resources is:
a) SaaS
b) PaaS
c) IaaS
d) DaaS
Answer: c) IaaS
Q77. Example of SaaS:
a) Microsoft Azure
b) AWS EC2
c) Google Docs
d) Docker
Answer: c) Google Docs
Q78. Cloud deployment model for single organization:
a) Public Cloud
b) Private Cloud
c) Hybrid Cloud
d) Community Cloud
Answer: b) Private Cloud
Q79. Which of the following is a functional requirement?
a) Login functionality
b) Security
c) Availability
d) Performance
Answer: a) Login functionality
Q80. Which SDLC model is most suitable for well-defined requirements?
a) Spiral
b) Agile
c) Waterfall
d) V-Model
Answer: c) Waterfall
Q81. Which testing is performed by end-users?
a) Alpha testing
b) Beta testing
c) Unit testing
d) Regression testing
Answer: b) Beta testing
Q82. Which SDLC phase consumes maximum effort?
a) Design
b) Coding
c) Testing
d) Maintenance
Answer: d) Maintenance
Q83. Which of these is not a cloud service model?
a) SaaS
b) PaaS
c) IaaS
d) CaaS
Answer: d) CaaS
Q84. In testing, equivalence partitioning is used for:
a) Coverage analysis
b) Test case design
c) Risk analysis
d) Requirement validation
Answer: b) Test case design
Q85. Agile methodology uses:
a) Sprints
b) Milestones
c) Phases
d) Waterfalls
Answer: a) Sprints
Q86. Who is responsible for managing backlog in Scrum?
a) Scrum Master
b) Product Owner
c) Developer
d) Tester
Answer: b) Product Owner
Q87. Verification in software ensures:
a) Software meets customer needs
b) Software is built correctly
c) System testing is complete
d) Bugs are removed
Answer: b) Software is built correctly
Q88. Validation in software ensures:
a) Software is built correctly
b) Software meets customer needs
c) Testing is completed
d) Maintenance is performed
Answer: b) Software meets customer needs
Q89. Which process model uses prototypes?
a) Spiral
b) Waterfall
c) V-Model
d) Agile
Answer: a) Spiral
Q90. Which tool is used for version control?
a) Eclipse
b) Git
c) Docker
d) Jenkins
Answer: b) Git
Q91. In testing, stress testing is done to:
a) Check correctness
b) Check performance under heavy load
c) Check usability
d) Check portability
Answer: b) Check performance under heavy load
Q92. Which SDLC phase defines system constraints?
a) Requirement analysis
b) Design
c) Implementation
d) Maintenance
Answer: a) Requirement analysis
Q93. Example of a non-functional requirement is:
a) Authentication system
b) Response time of 1s
c) Report generation
d) CRUD operations
Answer: b) Response time of 1s
Q94. Which testing ensures modules work together?
a) Unit testing
b) Integration testing
c) Regression testing
d) System testing
Answer: b) Integration testing
Q95. Which cloud model mixes public and private?
a) Hybrid
b) Community
c) Shared
d) Mixed
Answer: a) Hybrid
Q96. Risk analysis is part of:
a) Design phase
b) Testing phase
c) Spiral model
d) Waterfall model
Answer: c) Spiral model
Q97. Which of the following is an advantage of Agile?
a) Rigid requirements
b) Late delivery
c) Customer collaboration
d) Sequential flow
Answer: c) Customer collaboration
Q98. Which metric measures software size?
a) Cyclomatic complexity
b) Lines of Code (LOC)
c) Function Points
d) Both b and c
Answer: d) Both b and c
Q99. Which one is not a test type?
a) Unit
b) Regression
c) Configuration
d) System
Answer: c) Configuration
Q100. Alpha testing is performed at:
a) Developer’s site
b) Client’s site
c) Production environment
d) Maintenance environment
Answer: a) Developer’s site
Q101. Which SDLC model is most customer-centric?
a) Waterfall
b) Agile
c) V-Model
d) Spiral
Answer: b) Agile
Q102. In cloud computing, scaling resources automatically is called:
a) Elasticity
b) Portability
c) Flexibility
d) Virtualization
Answer: a) Elasticity
Q91. Which of the following has O(1) average case access time?
a) Array
b) Linked List
c) Hash Table
d) Binary Search Tree
Answer: c) Hash Table
Q92. Best-case time complexity of Merge Sort is:
a) O(n)
b) O(n log n)
c) O(n²)
d) O(log n)
Answer: b) O(n log n)
Q93. Which traversal of BST gives sorted order?
a) Preorder
b) Inorder
c) Postorder
d) Level order
Answer: b) Inorder
Q94. In stack operations, if you pop from an empty stack, it is called:
a) Underflow
b) Overflow
c) Garbage collection
d) Segmentation fault
Answer: a) Underflow
Q95. Which SQL clause is used to filter records?
a) ORDER BY
b) WHERE
c) GROUP BY
d) HAVING
Answer: b) WHERE
Q96. Which of the following is not a valid SQL aggregate function?
a) COUNT
b) SUM
c) MAX
d) UPDATE
Answer: d) UPDATE
Q97. Which normal form removes transitive dependencies?
a) 1NF
b) 2NF
c) 3NF
d) BCNF
Answer: c) 3NF
Q98. In C, what will be the output of:
int a=5;
printf("%d", ++a + ++a);
a) 12
b) 13
c) Undefined behavior
d) 11
Answer: c) Undefined behavior
Q99. In Java, which keyword is used to inherit a class?
a) implements
b) extends
c) super
d) inherits
Answer: b) extends
Q100. Which access modifier in C++ makes a class member visible only inside the class?
a) public
b) private
c) protected
d) internal
Answer: b) private
Q101. What does ROM stand for?
a) Random Only Memory
b) Read Only Memory
c) Read Online Memory
d) Ready Output Memory
Answer: b) Read Only Memory
Q102. Which OS scheduling algorithm is designed for time-sharing systems?
a) FCFS
b) SJF
c) Round Robin
d) Priority
Answer: c) Round Robin
Q103. Which memory is the fastest?
a) RAM
b) Cache
c) Hard Disk
d) ROM
Answer: b) Cache
Q104. Which protocol is used for email retrieval?
a) SMTP
b) POP3
c) HTTP
d) FTP
Answer: b) POP3
Q105. Which of the following is a connectionless protocol?
a) TCP
b) UDP
c) FTP
d) SMTP
Answer: b) UDP
Q106. What is the size of an IPv4 address?
a) 32 bits
b) 64 bits
c) 128 bits
d) 16 bits
Answer: a) 32 bits
Q107. Which layer of OSI model ensures error detection and correction?
a) Network
b) Transport
c) Data Link
d) Physical
Answer: c) Data Link
Q108. Which flip-flop is called a "memory cell"?
a) SR flip-flop
b) JK flip-flop
c) D flip-flop
d) T flip-flop
Answer: c) D flip-flop
Q109. The instruction MOV A, B in assembly means:
a) Copy A into B
b) Copy B into A
c) Add A and B
d) Move memory address
Answer: b) Copy B into A
Q110. What is Cohesion in Software Engineering?
a) Degree of dependency between modules
b) Degree to which elements of a module belong together
c) Degree of redundancy in a system
d) None
Answer: b) Degree to which elements of a module belong together
Q111. What is Coupling?
a) Dependency between modules
b) Independent modules
c) Testing approach
d) None
Answer: a) Dependency between modules
Q112. Which SDLC model is most rigid?
a) Spiral
b) Agile
c) Waterfall
d) Incremental
Answer: c) Waterfall
Q113. In White-box testing, focus is on:
a) Functionality
b) Internal logic
c) End-user requirements
d) Acceptance
Answer: b) Internal logic
Q114. Which of the following is not a software quality attribute?
a) Reliability
b) Usability
c) Maintainability
d) Syntax
Answer: d) Syntax
Q115. Which cloud type provides hardware infrastructure as a service?
a) SaaS
b) PaaS
c) IaaS
d) DaaS
Answer: c) IaaS
Q116. Which of these is an example of PaaS?
a) Google Docs
b) AWS EC2
c) Microsoft Azure App Service
d) Dropbox
Answer: c) Microsoft Azure App Service
Q117. In ICT, the term bandwidth refers to:
a) Storage capacity
b) Transmission speed of a network
c) CPU frequency
d) None
Answer: b) Transmission speed of a network
Q118. Which of the following is not a web protocol?
a) HTTP
b) FTP
c) SMTP
d) SQL
Answer: d) SQL
Q119. The main purpose of firewall in networking is:
a) Increase bandwidth
b) Prevent unauthorized access
c) Convert protocols
d) Provide IP addresses
Answer: b) Prevent unauthorized access
Q120. RAID in computer systems stands for:
a) Redundant Array of Independent Disks
b) Random Access of Independent Data
c) Read And Input Data
d) Redundant Access of Integrated Data
Answer: a) Redundant Array of Independent Disks
Q121. Which data structure is used in recursion?
a) Queue
b) Stack
c) Linked List
d) Heap
Answer: b) Stack
Q122. Which of the following is a linear data structure?
a) Binary Tree
b) Graph
c) Array
d) Hash Table
Answer: c) Array
Q123. In a max heap, the largest element is at:
a) Left child
b) Right child
c) Root node
d) Any leaf node
Answer: c) Root node
Q124. Which sorting algorithm is not comparison-based?
a) Quick Sort
b) Heap Sort
c) Merge Sort
d) Counting Sort
Answer: d) Counting Sort
Q125. Which SQL keyword is used to combine rows from two tables?
a) JOIN
b) GROUP BY
c) UNION
d) CONNECT
Answer: a) JOIN
Q126. A foreign key in a table refers to:
a) Primary key in another table
b) Any key in another table
c) Candidate key in same table
d) Unique key in same table
Answer: a) Primary key in another table
Q127. Which SQL statement is used to remove a table?
a) DELETE
b) REMOVE
c) DROP
d) CLEAR
Answer: c) DROP
Q128. In normalization, which form eliminates multivalued dependencies?
a) 1NF
b) 2NF
c) 3NF
d) 4NF
Answer: d) 4NF
Q129. Which is not a relational algebra operation?
a) Selection
b) Projection
c) Union
d) Indexing
Answer: d) Indexing
Q130. In C, what is the size of int on a 32-bit system?
a) 2 bytes
b) 4 bytes
c) 8 bytes
d) 16 bytes
Answer: b) 4 bytes
Q131. Which of these is not a feature of OOP?
a) Encapsulation
b) Polymorphism
c) Inheritance
d) Compilation
Answer: d) Compilation
Q132. In Java, which collection allows duplicate elements?
a) Set
b) List
c) Map
d) Hashtable
Answer: b) List
Q133. In C++, destructor has the same name as constructor but is prefixed with:
a) !
b) ~
c) #
d) $
Answer: b) ~
Q134. Which OS is open source?
a) Windows
b) MacOS
c) Linux
d) Solaris (proprietary)
Answer: c) Linux
Q135. Deadlock occurs when:
a) Multiple processes share resources
b) A process waits indefinitely for a resource
c) Processes execute in parallel
d) Scheduler fails
Answer: b) A process waits indefinitely for a resource
Q136. Which algorithm is used for deadlock avoidance?
a) FIFO
b) LRU
c) Banker's algorithm
d) Round Robin
Answer: c) Banker's algorithm
Q137. Which scheduling algorithm may lead to starvation?
a) FCFS
b) Round Robin
c) Priority Scheduling
d) SJF (non-preemptive)
Answer: c) Priority Scheduling
Q138. The layer responsible for routing packets in OSI model is:
a) Transport
b) Network
c) Data Link
d) Session
Answer: b) Network
Q139. IP address 192.168.0.1 belongs to which class?
a) Class A
b) Class B
c) Class C
d) Class D
Answer: c) Class C
Q140. Which protocol is used for secure web communication?
a) HTTP
b) HTTPS
c) FTP
d) Telnet
Answer: b) HTTPS
Q141. In networking, TTL stands for:
a) Time To Learn
b) Time To Leave
c) Time To Live
d) Transmission To Link
Answer: c) Time To Live
Q142. In DLD, the circuit which selects one input out of many is called:
a) Decoder
b) Encoder
c) Multiplexer
d) Demultiplexer
Answer: c) Multiplexer
Q143. In Boolean algebra, A + A = ?
a) 0
b) 1
c) A
d) A'
Answer: c) A
Q144. Gray code is mainly used to:
a) Detect errors
b) Minimize switching errors
c) Arithmetic operations
d) Encryption
Answer: b) Minimize switching errors
Q145. In Software Engineering, prototyping is useful because:
a) Reduces cost
b) Helps in requirement validation
c) Increases complexity
d) Avoids testing
Answer: b) Helps in requirement validation
Q146. Which of the following is not a software process model?
a) Spiral
b) Waterfall
c) Agile
d) Divide & Conquer
Answer: d) Divide & Conquer
Q147. In black-box testing, tester has access to:
a) Internal code
b) System outputs only
c) Both code & output
d) Database schema
Answer: b) System outputs only
Q148. Which metric is used to measure software complexity?
a) Function Points
b) Cyclomatic Complexity
c) LOC (Lines of Code)
d) All of the above
Answer: d) All of the above
Q149. Which cloud deployment model is owned by a single organization?
a) Public
b) Private
c) Hybrid
d) Community
Answer: b) Private
Q150. Which of the following is an IoT protocol?
a) MQTT
b) FTP
c) SMTP
d) POP3
Answer: a) MQTT
Got it ✅ — I’ll continue and take you from Q151 to Q200 so you’ll have a solid 200+ MCQ
bank for NESCOM AM (Software) prep in one place.
Q151. Which searching algorithm works only on sorted arrays?
a) Linear Search
b) Binary Search
c) Hashing
d) BFS
Answer: b) Binary Search
Q152. Time complexity of Quick Sort in worst case is:
a) O(n log n)
b) O(n²)
c) O(log n)
d) O(n)
Answer: b) O(n²)
Q153. Which of these is not a self-balancing BST?
a) AVL Tree
b) Red-Black Tree
c) B-Tree
d) Heap
Answer: d) Heap
Q154. The maximum number of nodes in a binary tree of height h is:
a) 2^h
b) 2^(h+1) - 1
c) h²
d) h log h
Answer: b) 2^(h+1) - 1
Q155. A hash function maps keys into:
a) Stack
b) Array indices
c) Queues
d) Linked lists
Answer: b) Array indices
Q156. In SQL, HAVING is used with:
a) SELECT
b) WHERE
c) GROUP BY
d) ORDER BY
Answer: c) GROUP BY
Q157. Which SQL command is used to change a table structure?
a) MODIFY
b) UPDATE
c) ALTER
d) RENAME
Answer: c) ALTER
Q158. Which database normal form removes transitive dependencies?
a) 1NF
b) 2NF
c) 3NF
d) BCNF
Answer: c) 3NF
Q159. RAID-1 is also known as:
a) Striping
b) Mirroring
c) Parity
d) Caching
Answer: b) Mirroring
Q160. In C, which operator is used to allocate memory dynamically?
a) malloc()
b) alloc()
c) new
d) calloc()
Answer: a) malloc()
Q161. Which of these is not a valid storage class in C?
a) auto
b) static
c) register
d) volatile
Answer: d) volatile
Q162. In Java, final keyword can be applied to:
a) Variable
b) Method
c) Class
d) All of the above
Answer: d) All of the above
Q163. Which of the following is not an access modifier in C++?
a) public
b) protected
c) friend
d) private
Answer: c) friend
Q164. What is the default access modifier in a Java class?
a) public
b) private
c) protected
d) package-private (default)
Answer: d) package-private
Q165. Thrashing in an OS occurs due to:
a) High CPU usage
b) Low memory
c) Excessive page swapping
d) Deadlock
Answer: c) Excessive page swapping
Q166. Which page replacement algorithm suffers from Belady’s anomaly?
a) LRU
b) FIFO
c) Optimal
d) Clock
Answer: b) FIFO
Q167. Which disk scheduling algorithm gives minimum average seek time?
a) FCFS
b) SSTF
c) SCAN
d) C-SCAN
Answer: b) SSTF
Q168. Which of the following is not a Linux command?
a) ls
b) pwd
c) dir
d) grep
Answer: c) dir
Q169. Which is a Classless Inter-Domain Routing (CIDR) address?
a) 192.168.0.1
b) 192.168.0.1/24
c) 192.168.0.1:8080
d) 192.168.0.1-192.168.0.255
Answer: b) 192.168.0.1/24
Q170. The protocol used to send emails is:
a) SMTP
b) POP3
c) IMAP
d) FTP
Answer: a) SMTP
Q171. DNS translates:
a) IP to MAC
b) Domain names to IP addresses
c) MAC to IP
d) Packets to frames
Answer: b) Domain names to IP addresses
Q172. OSI model has:
a) 5 layers
b) 6 layers
c) 7 layers
d) 8 layers
Answer: c) 7 layers
Q173. The logical circuit used for error detection is:
a) Multiplexer
b) Parity Generator
c) Decoder
d) Encoder
Answer: b) Parity Generator
Q174. Flip-flops are used to build:
a) Combinational circuits
b) Sequential circuits
c) Gates
d) ALU
Answer: b) Sequential circuits
Q175. Which counter counts in both directions?
a) Ring counter
b) Ripple counter
c) Up-Down counter
d) Mod-N counter
Answer: c) Up-Down counter
Q176. K-map is used for:
a) Code conversion
b) Boolean simplification
c) Arithmetic operations
d) Memory addressing
Answer: b) Boolean simplification
Q177. Which of the following is an SDLC model?
a) Waterfall
b) V-Model
c) Agile
d) All of the above
Answer: d) All of the above
Q178. Which software testing ensures that new code changes do not break existing
functionality?
a) Unit testing
b) Regression testing
c) Acceptance testing
d) Smoke testing
Answer: b) Regression testing
Q179. Which of the following is a white-box testing technique?
a) Boundary value analysis
b) Control flow testing
c) Equivalence partitioning
d) Random testing
Answer: b) Control flow testing
Q180. Which metric measures software reliability?
a) MTBF (Mean Time Between Failures)
b) LOC
c) Function points
d) Defect density
Answer: a) MTBF
Q181. Which cloud model provides hardware as a service?
a) SaaS
b) PaaS
c) IaaS
d) DaaS
Answer: c) IaaS
Q182. Google Docs is an example of:
a) SaaS
b) PaaS
c) IaaS
d) DaaS
Answer: a) SaaS
Q183. Virtualization is primarily used in:
a) Distributed systems
b) Cloud computing
c) OS security
d) Compiler design
Answer: b) Cloud computing
Q184. Which of the following is not an IoT device?
a) Smart thermostat
b) Smart fridge
c) Smart light bulb
d) Standalone desktop PC
Answer: d) Standalone desktop PC
Q185. The full form of ICT is:
a) International Computer Technology
b) Information and Communication Technology
c) Interconnected Communication Tools
d) Internet Computing Trends
Answer: b) Information and Communication Technology
Q186. ASCII code uses:
a) 7 bits
b) 8 bits
c) 16 bits
d) 32 bits
Answer: a) 7 bits
Q187. Which number system is base-16?
a) Binary
b) Octal
c) Hexadecimal
d) Decimal
Answer: c) Hexadecimal
Q188. 1 KB = ?
a) 1000 bytes
b) 1024 bytes
c) 100 bytes
d) 2048 bytes
Answer: b) 1024 bytes
Q189. Which data structure is best for BFS?
a) Stack
b) Queue
c) Heap
d) Tree
Answer: b) Queue
Q190. Which data structure is best for DFS?
a) Stack
b) Queue
c) Hashing
d) Heap
Answer: a) Stack
Q191. Which of the following is a non-volatile memory?
a) RAM
b) ROM
c) Cache
d) Register
Answer: b) ROM
Q192. Which of the following is fastest?
a) Hard disk
b) Cache
c) RAM
d) Virtual memory
Answer: b) Cache
Q193. RAID-0 is also known as:
a) Mirroring
b) Striping
c) Parity
d) Backup
Answer: b) Striping
Q194. Which addressing mode uses displacement?
a) Immediate
b) Direct
c) Indexed
d) Register
Answer: c) Indexed
Q195. The CPU component that performs arithmetic and logic operations is:
a) CU
b) ALU
c) Registers
d) Cache
Answer: b) ALU
Q196. Which of the following is a NoSQL database?
a) MySQL
b) MongoDB
c) PostgreSQL
d) Oracle
Answer: b) MongoDB
Q197. Which key uniquely identifies each row in a table?
a) Candidate key
b) Primary key
c) Foreign key
d) Alternate key
Answer: b) Primary key
Q198. Which of the following is an iterative model?
a) Agile
b) Waterfall
c) Spiral
d) Both a & c
Answer: d) Both a & c
Q199. Which testing is performed by end users?
a) Unit testing
b) Regression testing
c) Alpha/Beta testing
d) Integration testing
Answer: c) Alpha/Beta testing
Q200. Which of the following is an example of middleware?
a) Database driver
b) API Gateway
c) Message broker
d) All of the above
Answer: d) All of the above