18. In CSS, the property to align text to the center is:
A) text-position
B) text-align
C) align-text
D) center-text
19. Which technology is primarily used for machine learning models?
A) Blockchain
B) IoT
C) Neural Networks
D) Cryptography
20. The term ‘AR’ in technology stands for:
A) Augmented Reality
B) Artificial Reality
C) Automated Response
D) Adaptive Robotics
21. The software development model with a single sequential flow is:
A) Spiral
B) Waterfall
C) Agile
D) Scrum
22. The process of finding and fixing defects in software is called:
A) Debugging
B) Compilation
C) Validation
D) Integration
23. A diagram that represents entities and their relationships is:
A) ER Diagram
B) Data Flow Diagram
C) Flowchart
D) Sequence Diagram
24. The component that connects CPU and memory is:
A) Cache
B) Bus
C) Register
D) ALU
25. The purpose of pipelining in CPU design is to:
A) Reduce memory usage
B) Increase cache size
C) Improve instruction execution speed
D) Manage I/O operations
26. The output of an XOR gate with inputs A=1 and B=1 is:
A) 0
B) 1
C) A
D) B
27. The principle of hiding data and showing only necessary details is:
A) Modularization
B) Encapsulation
C) Abstraction
D) Inheritance
28. A pushdown automaton is used to recognize:
A) Context-Free Languages
B) Regular Languages
C) Context-Sensitive Languages
D) Recursive Languages
29. The halting problem is associated with:
A) Finite Automata
B) Turing Machines
C) Pushdown Automata
D) Regular Expressions
30. In networking, NAT stands for:
A) Network Address Translation
B) Network Authentication Token
C) Network Address Translation
D) Network Access Terminal
31. In C, the function to release dynamically allocated memory is:
A) free()
B) delete()
C) release()
D) clear()
32. The time complexity of quicksort in the average case is:
A) O(n)
B) O(n log n)
C) O(n²)
D) O(log n)
33. In a database, the JOIN operation is used to:
A) Delete records
B) Update records
C) Combine records from multiple tables
D) Sort records
34. The main function of a computer’s control unit is to:
A) Coordinate operations
B) Perform arithmetic
C) Store data
D) Manage memory
35. In JavaScript, the method to add an element to the end of an array is:
A) append()
B) push()
C) add()
D) insert()
36. In cybersecurity, a honeypot is used to:
A) Encrypt sensitive data
B) Store user credentials
C) Attract and detect attackers
D) Filter network traffic
37. In Python, the keyword for creating a loop is:
A) for
B) loop
C) iterate
D) cycle
38. The data structure used for breadth-first search is:
A) Stack
B) Queue
C) Array
D) Tree
39. In digital electronics, a demultiplexer is used to:
A) Combine multiple inputs
B) Amplify signals
C) Route one input to multiple outputs
D) Store data
40. The term 'XSS' in web security stands for:
A) Cross-Site Scripting
B) Cross-Server Scripting
C) Cross-System Security
D) Cross-Site Storage
41. In software engineering, the term 'SRS' stands for:
A) Software Requirement System
B) Software Requirement Specification
C) System Resource Specification
D) Software Resource Standard
42. In networking, the term 'LAN' stands for:
A) Local Area Network
B) Large Area Network
C) Logical Access Network
D) Limited Access Network
43. The algorithm used in RSA encryption is:
A) Symmetric
B) Hash-based
C) Asymmetric
D) Block-based
44. In C++, the concept of multiple functions with the same name is called:
A) Encapsulation
B) Polymorphism
C) Inheritance
D) Abstraction
45. The term 'SaaS' in cloud computing stands for:
A) Software as a Service
B) System as a Service
C) Storage as a Service
D) Security as a Service
46. In a binary search tree, the left child of a node contains:
A) Larger values
B) Equal values
C) Smaller values
D) Random values
47. In a CPU, the register that holds temporary results is:
A) Program Counter
B) Accumulator
C) Stack Pointer
D) Instruction Register
48. In web development, JSON stands for:
A) JavaScript Object Notation
B) JavaScript Online Notation
C) Java Object Notation
D) JavaScript Offline Notation
49. In a database, the process of dividing a table into smaller tables is:
A) Indexing
B) Partitioning
C) Normalization
D) Aggregation
50. In digital electronics, a full-adder adds:
A) Two bits
B) Three bits
C) Four bits
D) One bit
51. In system design, the term 'load balancing' refers to:
A) Distributing workload across multiple servers
B) Encrypting network traffic
C) Compressing data
D) Backing up data
52. In Python, a tuple is:
A) Mutable
B) Dynamic
C) Immutable
D) Resizable
53. In networking, the term 'IP' stands for:
A) Internet Provider
B) Internet Protocol
C) Internal Process
D) Integrated Packet
54. In software engineering, a class diagram is part of:
A) UML
B) ER Diagram
C) Data Flow Diagram
D) Flowchart
55. In a CPU, the register that points to the top of the stack is:
A) Program Counter
B) Accumulator
C) Stack Pointer
D) Instruction Register
56. In Java, the keyword for implementing an interface is:
A) Extends
B) Implements
C) Inherits
D) Uses
57. In cybersecurity, the term 'malware' refers to:
A) Malicious software
B) Monitoring software
C) Management software
D) Maintenance software
58. In a doubly linked list, each node points to:
A) Only the next node
B) Only the previous node
C) Both next and previous nodes
D) The head node
59. In digital logic, the Boolean expression A . A = ?
A) 0
B) A
C) 1
D) A'
60. The term 'edge computing' refers to:
A) Centralized data processing
B) Cloud-based storage
C) Processing data closer to its source
D) Virtualized networking
Reasoning, English Grammar, General Knowledge, and General Awareness (40 Questions)
61. If X is Y’s brother and Z is Y’s father, then Z is X’s:
A) Brother
B) Son
C) Father
D) Husband
62. Complete the series: 1, 4, 9, 16, ?
A) 20
B) 25
C) 30
D) 36
63. If BAT = 23, what is the value of GAP?
A) 20
B) 21
C) 22
D) 23
64. If 3 : 9 :: 5 : ?
A) 15
B) 20
C) 25
D) 30
65. Which number does not belong: 2, 4, 8, 16, 31?
A) 31
B) 8
C) 16
D) 4
66. If tomorrow is Tuesday, today is:
A) Sunday
B) Monday
C) Wednesday
D) Thursday
67. Find the missing term: 2, 6, 18, ?, 162
A) 36
B) 48
C) 54
D) 72
68. If M is to N as P is to Q, then Q is:
A) M
B) P’s partner
C) N
D) None
69. Which letter comes next: B, E, I, K, I, ?
A) I
B) J
C) I
D) K
70. If 1 + 2 = 5, 3 + 4 = 25, then 5 + 6 = ?
A) 35
B) 61
C) 71
D) 81
71. Choose the correct sentence:
A) He don’t like tea.
B) He doesn’t like tea.
C) He not likes tea.
D) He doesn’t likes tea.
72. The synonym of “small” is:
A) Large
B) Big
C) Tiny
D) Huge
73. The correct form of the verb in “They ___ (play) football daily” is:
A) play
B) plays
C) playing
D) played
74. The antonym of “increase” is:
A) Grow
B) Decrease
C) Expand
D) Enlarge
75. Choose the correctly spelled word:
A) Occurence
B) Occurrance
C) Occurrence
D) Occurance
76. The plural of “mouse” (animal) is:
A) Mouses
B) Mice
C) Mouse
D) Mices
77. Identify the part of speech of “beautiful” in “She is beautiful”:
A) Adjective
B) Adverb
C) Noun
D) Verb
78. The correct form of the sentence “She is more smarter than him” is:
A) She is smarter than him.
B) She is smarter than he.
C) She is more smart than he.
D) She is most smarter than him.
79. The past tense of “run” is:
A) Runned
B) Running
C) Ran
D) Run
80. Fill in the blank: “The books ___ on the shelf.”
A) is
B) are
C) was
D) has
81. The capital of France is:
A) Paris
B) London
C) Berlin
D) Madrid
82. The currency of the United States is:
A) Euro
B) Dollar
C) Pound
D) Yen
83. The smallest planet in our solar system is:
A) Venus
B) Mars
C) Mercury
D) Pluto
84. The inventor of the telephone is:
A) Alexander Graham Bell
B) Thomas Edison
C) Nikola Tesla
D) Guglielmo Marconi
85. The highest mountain in the world is:
A) K2
B) Mount Everest
C) Kangchenjunga
D) Lhotse
86. The headquarters of NATO is located in:
A) Brussels
B) Washington D.C.
C) London
D) Paris
87. The chemical symbol for oxygen is:
A) O2
B) Ox
C) O
D) Oxy
88. The first programmable computer was called:
A) ENIAC
B) Z1
C) Colossus
D) UNIVAC
89. The term ‘HIPAA’ in cybersecurity stands for:
A) Health Insurance Portability and Accountability Act
B) Health Information Privacy and Access Act
C) Healthcare Information Protection Act
D) Health Insurance Privacy Act
90. The term ‘trojan’ in cybersecurity refers to:
A) A firewall system
B) An antivirus software
C) Malware disguised as legitimate software
D) A network protocol
91. The Kyoto Protocol is related to:
A) Nuclear energy
B) Climate change
C) Cybersecurity
D) Trade agreements
92. The term ‘ML’ in technology stands for:
A) Machine Learning
B) Mobile Learning
C) Modular Language
D) Multi-Level
93. The term ‘4G’ refers to:
A) Fourth Generation of computers
B) Fourth Generation of software
C) Fourth Generation of mobile networks
D) Fourth Generation of protocols
94. The term ‘blockchain’ refers to:
A) A centralized database
B) A decentralized ledger
C) A network protocol
D) A cloud storage system
95. The term ‘SSL’ in web security stands for:
A) Secure System Layer
B) System Security Layer
C) Secure Sockets Layer
D) Safe System Link
96. The global organization for internet standards is:
A) IETF
B) ISO
C) IEEE
D) W3C
97. The term ‘deep learning’ refers to:
A) Basic machine learning
B) A subset of machine learning with neural networks
C) Database management
D) Network optimization
98. The term ‘botnet’ in cybersecurity refers to:
A) A network of bots for automation
B) A secure network
C) A network of compromised devices
D) A cloud-based system
99. The term ‘two-factor authentication’ refers to:
A) Using two methods to verify identity
B) Encrypting data twice
C) Using two firewalls
D) Backing up data twice
100. The term ‘penetration testing’ refers to:
A) Developing secure software
B) Simulating attacks to find vulnerabilities
C) Encrypting network traffic
D) Monitoring system performance
No comments:
Post a Comment