Technical Subjects (60 Questions)
1. Which layer of the OSI model is responsible for routing?
A) Data Link
B) Network
C) Transport
D) Application
2. The protocol used for secure communication over the internet is:
A) FTP
B) HTTP
C) HTTPS
D) SMTP
3. What is the purpose of a subnet mask?
A) To separate network and host portions of an IP address
B) To encrypt data packets
C) To assign MAC addresses
D) To manage port numbers
4. The process of switching between multiple programs in execution is called:
A) Multiprocessing
B) Multitasking
C) Multithreading
D) Multiprogramming
5. Which scheduling algorithm selects the process with the shortest burst time?
A) Round Robin
B) First Come First Serve
C) Shortest Job First
D) Priority Scheduling
6. Which data structure uses LIFO (Last In, First Out) principle?
A) Stack
B) Queue
C) Linked List
D) Tree
7. The time complexity of binary search in a sorted array is:
A) O(n)
B) O(log n)
C) O(n²)
D) O(n log n)
8. In assembly language, the instruction 'MOV' is used to:
A) Add two numbers
B) Subtract two numbers
C) Move data between registers
D) Multiply two numbers
9. In C++, which keyword is used to define a class?
A) Struct
B) Class
C) Object
D) Interface
10. In Python, which of the following is used to handle exceptions?
A) Try-except
B) If-else
C) For-loop
D) While-loop
11. In Java, the keyword used to inherit a class is:
A) Implements
B) Inherits
C) Extends
D) Super
12. Which SQL command is used to retrieve data from a database?
A) INSERT
B) SELECT
C) UPDATE
D) DELETE
13. The primary key in a database table is used to:
A) Uniquely identify each record
B) Link multiple tables
C) Store duplicate values
D) Index foreign keys
14. The protocol used for email transmission is:
A) HTTP
B) FTP
C) SMTP
D) DNS
15. The output of an AND gate with inputs A=1 and B=0 is:
A) 1
B) 0
C) A
D) B
16. A flip-flop is used to:
A) Store a single bit of data
B) Perform arithmetic operations
C) Amplify signals
D) Convert analog to digital
17. Which HTML tag is used to create a hyperlink?
A) <link>
B) <a>
C) <href>
D) <url>
18. In CSS, the property used to change the background color is:
A) color
B) background-image
C) background-color
D) bg-color
19. Which technology is used in blockchain for secure data storage?
A) Cryptography
B) Machine Learning
C) Data Mining
D) Cloud Computing
20. The term IoT stands for:
A) Internet of Technology
B) Internet of Things
C) Internet of Tools
D) Internet of Transactions
21. The software development model that emphasizes iterative development is:
A) Agile
B) Waterfall
C) V-Model
D) Spiral
22. The process of verifying that a system meets specifications is called:
A) Debugging
B) Testing
C) Validation
D) Compilation
23. A diagram that shows the flow of data in a system is called:
A) ER Diagram
B) Data Flow Diagram
C) UML Diagram
D) Class Diagram
24. The main function of the CPU is to:
A) Execute instructions
B) Store data
C) Manage peripherals
D) Control network traffic
25. Cache memory is used to:
A) Store permanent data
B) Increase processing power
C) Reduce access time to data
D) Manage I/O operations
26. The output of a NOT gate with input 1 is:
A) 1
B) 0
C) Undefined
D) Input-dependent
27. The process of breaking a system into smaller modules is called:
A) Modularization
B) Integration
C) Abstraction
D) Encapsulation
28. A language that can be recognized by a finite automaton is called:
A) Context-Free
B) Context-Sensitive
C) Regular
D) Recursive
29. The Turing machine is used to model:
A) Finite state machines
B) General computation
C) Pushdown automata
D) Context-free grammars
30. In networking, the term DHCP stands for:
A) Dynamic Host Configuration Protocol
B) Distributed Host Control Protocol
C) Dynamic Hyperlink Configuration Protocol
D) Direct Host Communication Protocol
31. In C, the function used to allocate memory dynamically is:
A) free()
B) malloc()
C) calloc()
D) realloc()
32. The time complexity of merge sort is:
A) O(n)
B) O(n²)
C) O(n log n)
D) O(log n)
33. In a relational database, a foreign key is used to:
A) Establish a relationship between tables
B) Uniquely identify a record
C) Store primary data
D) Index a table
34. The main component of a computer’s ALU is:
A) Register
B) Logic gates
C) Cache memory
D) Bus
35. In JavaScript, the function used to convert a string to an integer is:
A) toString()
B) parseFloat()
C) parseInt()
D) eval()
36. The purpose of a firewall in network security is to:
A) Filter incoming and outgoing traffic
B) Encrypt data
C) Store user credentials
D) Manage IP addresses
37. In Python, the keyword used to define a function is:
A) func
B) def
C) function
D) lambda
38. The data structure used to implement recursion is:
A) Queue
B) Array
C) Stack
D) Tree
39. In digital electronics, a multiplexer is used to:
A) Select one of many inputs
B) Amplify signals
C) Store data
D) Convert analog to digital
40. The term 'SQL injection' refers to:
A) A database optimization technique
B) A security vulnerability in web applications
C) A data retrieval method
D) A database backup strategy
41. In software engineering, the term 'SDLC' stands for:
A) Software Development Life Cycle
B) System Design Life Cycle
C) Software Deployment Life Cycle
D) System Development Life Cycle
42. In networking, the term 'MAC' stands for:
A) Media Access Code
B) Memory Access Control
C) Media Access Control
D) Message Authentication Code
43. The algorithm used to encrypt data in AES is:
A) Asymmetric
B) Symmetric
C) Hash-based
D) Public-key
44. In C++, the concept of hiding internal details is called:
A) Encapsulation
B) Inheritance
C) Polymorphism
D) Abstraction
45. The term 'cloud computing' refers to:
A) Local storage solutions
B) Hardware-based computing
C) On-demand computing resources over the internet
D) Offline data processing
46. In a binary tree, the maximum number of nodes at level n is:
A) 2^n
B) 2^(n+1) - 1
C) 2^(n-1)
D) n²
47. The instruction cycle in a CPU consists of:
A) Fetch, decode, execute
B) Fetch, store, execute
C) Decode, store, execute
D) Fetch, decode, store
48. In web development, AJAX stands for:
A) Asynchronous JavaScript and XML
B) Advanced JavaScript and XML
C) Asynchronous JavaScript and XHTML
D) Automated JavaScript and XML
49. The purpose of normalization in a database is to:
A) Increase data redundancy
B) Reduce data redundancy
C) Encrypt data
D) Backup data
50. In digital electronics, a half-adder performs:
A) Addition of two bits
B) Subtraction of two bits
C) Multiplication of two bits
D) Division of two bits
51. In system design, the term 'scalability' refers to:
A) System security
B) System reliability
C) Ability to handle increased load
D) System maintenance
52. In Python, a list is:
A) Immutable
B) Mutable
C) Fixed-length
D) Static
53. The purpose of DNS in networking is to:
A) Translate domain names to IP addresses
B) Encrypt network traffic
C) Assign port numbers
D) Manage routing tables
54. In software engineering, a use case diagram is part of:
A) ER Diagram
B) Data Flow Diagram
C) UML
D) Flowchart
55. In a CPU, the register that holds the address of the next instruction is:
A) Accumulator
B) Program Counter
C) Stack Pointer
D) Instruction Register
56. In Java, the keyword used to create an object is:
A) new
B) create
C) object
D) instance
57. The term 'phishing' in cybersecurity refers to:
A) Encrypting sensitive data
B) Scanning for vulnerabilities
C) Deceiving users to steal credentials
D) Monitoring network traffic
58. In a linked list, the last node points to:
A) First node
B) NULL
C) Next node
D) Previous node
59. In digital logic, the Boolean expression A + A = ?
A) A
B) 0
C) 1
D) A'
60. The term 'big data' refers to:
A) Small datasets
B) Structured data only
C) Large and complex datasets
D) Encrypted data
Reasoning, English Grammar, General Knowledge, and General Awareness (40 Questions)
61. If A is B’s sister and C is B’s mother, then C is A’s:
A) Sister
B) Mother
C) Daughter
D) Wife
62. Complete the series: 2, 6, 12, 20, ?
A) 28
B) 30
C) 30
D) 32
63. If CAT = 24, what is the value of DOG?
A) 41
B) 42
C) 43
D) 44
64. If 5 : 25 :: 7 : ?
A) 35
B) 49
C) 42
D) 56
65. Which number does not belong: 4, 9, 16, 25, 35?
A) 4
B) 9
C) 35
D) 25
66. If the day after tomorrow is Wednesday, today is:
A) Monday
B) Tuesday
C) Sunday
D) Friday
67. Find the missing term: 3, 9, 27, ?, 243
A) 54
B) 81
C) 108
D) 162
68. If P is to Q as R is to S, then S is:
A) P
B) Q
C) R’s partner
D) None
69. Which letter comes next: A, C, I, I, K, ?
A) I
B) J
C) K
D) L
70. If 2 + 3 = 7, 4 + 5 = 23, then 6 + 7 = ?
A) 37
B) 47
C) 57
D) 67
71. Choose the correct sentence:
A) She don’t like coffee.
B) She doesn’t likes coffee.
C) She doesn’t like coffee.
D) She not like coffee.
72. The synonym of “big” is:
A) Small
B) Large
C) Tiny
D) Short
73. The correct form of the verb in “She ___ (go) to school daily” is:
A) goes
B) go
C) going
D) gone
74. The antonym of “expand” is:
A) Grow
B) Increase
C) Shrink
D) Enlarge
75. Choose the correctly spelled word:
A) Recieve
B) Receive
C) Receeve
D) Recive
76. The plural of “child” is:
A) Children
B) Childs
C) Childes
D) Childrens
77. Identify the part of speech of “quickly” in “She runs quickly”:
A) Adjective
B) Verb
C) Adverb
D) Noun
78. The correct form of the sentence “He is more taller than me” is:
A) He is taller than me.
B) He is taller than I.
C) He is more tall than I.
D) He is most taller than me.
79. The past tense of “write” is:
A) Wrote
B) Written
C) Writed
D) Writing
80. Fill in the blank: “The book ___ on the table.”
A) are
B) were
C) is
D) have
81. The capital of India is:
A) Mumbai
B) New Delhi
C) Kolkata
D) Chennai
82. The currency of Japan is:
A) Yen
B) Yuan
C) Won
D) Dollar
83. The largest planet in our solar system is:
A) Earth
B) Mars
C) Jupiter
D) Saturn
84. The inventor of the World Wide Web is:
A) Bill Gates
B) Tim Berners-Lee
C) Steve Jobs
D) Mark Zuckerberg
85. The longest river in the world is:
A) Nile
B) Amazon
C) Yangtze
D) Mississippi
86. The headquarters of the United Nations is located in:
A) Geneva
B) Paris
C) New York
D) London
87. The chemical symbol for gold is:
A) Ag
B) Au
C) Fe
D) Cu
88. The first computer “bug” was an actual:
A) Insect
B) Virus
C) Software error
D) Hardware failure
89. The term ‘GDPR’ in cybersecurity stands for:
A) General Data Privacy Regulation
B) Global Data Protection Rule
C) General Data Protection Regulation
D) Generic Data Privacy Rule
90. The term ‘ransomware’ refers to:
A) A type of antivirus software
B) Malware that encrypts data and demands payment
C) A network protocol
D) A database management system
91. The Paris Agreement is related to:
A) Climate change
B) Trade regulations
C) Cybersecurity
D) Nuclear disarmament
92. The term ‘AI’ stands for:
A) Automated Intelligence
B) Advanced Integration
C) Artificial Intelligence
D) Adaptive Intelligence
93. The term ‘5G’ refers to:
A) Fifth Generation of computers
B) Fifth Generation of mobile networks
C) Fifth Generation of software
D) Fifth Generation of protocols
94. The term ‘cryptocurrency’ refers to:
A) Digital currency secured by cryptography
B) Physical currency
C) Centralized banking system
D) Paper-based currency
95. The term ‘VPN’ stands for:
A) Virtual Private Network
B) Visual Processing Network
C) Virtual Private Network
D) Virtual Public Network
96. The global organization for cybersecurity standards is:
A) WHO
B) ISO
C) UNESCO
D) WTO
97. The term ‘quantum computing’ refers to computing using:
A) Quantum mechanical phenomena
B) Classical algorithms
C) Binary systems
D) Analog signals
98. The term ‘DDoS’ in cybersecurity stands for:
A) Direct Denial of Service
B) Distributed Data Service
C) Distributed Denial of Service
D) Dynamic Data Service
99. The term ‘biometrics’ in security refers to:
A) Password-based authentication
B) Physical or behavioral characteristics
C) Network encryption
D) Token-based systems
100. The term ‘ethical hacking’ refers to:
A) Authorized testing of system vulnerabilities
B) Illegal system access
C) Software piracy
D) Data theft
No comments:
Post a Comment