RRB JE IT CBT 2 Full Test 1


Test Description

150 Questions MCQ Test RRB JE (Railways Junior Engineer) CBT Mock Test Series | RRB JE IT CBT 2 Full Test 1

RRB JE IT CBT 2 Full Test 1 for Railways 2023 is part of RRB JE (Railways Junior Engineer) CBT Mock Test Series preparation. The RRB JE IT CBT 2 Full Test 1 questions and answers have been prepared according to the Railways exam syllabus.The RRB JE IT CBT 2 Full Test 1 MCQs are made for Railways 2023 Exam. Find important definitions, questions, notes, meanings, examples, exercises, MCQs and online tests for RRB JE IT CBT 2 Full Test 1 below.
Solutions of RRB JE IT CBT 2 Full Test 1 questions in English are available as part of our RRB JE (Railways Junior Engineer) CBT Mock Test Series for Railways & RRB JE IT CBT 2 Full Test 1 solutions in Hindi for RRB JE (Railways Junior Engineer) CBT Mock Test Series course. Download more important topics, notes, lectures and mock test series for Railways Exam by signing up for free. Attempt RRB JE IT CBT 2 Full Test 1 | 150 questions in 120 minutes | Mock test for Railways preparation | Free important questions MCQ to study RRB JE (Railways Junior Engineer) CBT Mock Test Series for Railways Exam | Download free PDF with solutions
1 Crore+ students have signed up on EduRev. Have you? Download the App
RRB JE IT CBT 2 Full Test 1 - Question 1

Which of the following statement is true about JVM?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 1

JVM (Java Virtual Machine) is an abstract machine. It is a specification that provides runtime environment in which java bytecode can be executed. JVM does not create the object of main class. Java is platform independent but JVM is platform dependent. JVM is the one that actually calls the main method present in a java code.

RRB JE IT CBT 2 Full Test 1 - Question 2

Which of the following is not a primary component of a Linux system?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 2

Linux Operating System has primarily three components:
1. Kernel
2. System libraries
3. System utilities

Kernel: The kernel is responsible for maintaining all the important abstractions of the operating system, including such things as virtual memory and processes.

System libraries: The system libraries define a standard set of functions through which applications can interact with the kernel. These functions implement much of the operating-system functionality that does not need the full privileges of kernel code.

System utilities: The system utilities are programs that perform individual, specialized management tasks.

RRB JE IT CBT 2 Full Test 1 - Question 3

Which of the following is not a valid category of “System bus” in a computer system?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 3

A bus that connects major computer components (processor, memory, I/O) is called a system bus.

Any bus the lines can be classified into three functional groups: data, address, and control lines.

The data lines provide a path for moving data among system modules. These lines, collectively, are called the data bus.

The address lines are used to designate the source or destination of the data on the data bus.

The control lines are used to control the access to and the use of the data and address lines. Because the data and address lines are shared by all components, there must be a means of controlling their use.

RRB JE IT CBT 2 Full Test 1 - Question 4

Which of the following categories of viruses normally infect executable code, such as as.com and .exe files?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 4

File infector virus is also known as a parasitic virus that usually infects memory and executable files.

A boot sector virus is a type of virus that infects the boot sector of floppy disks or the Master Boot Record (MBR) of hard disks.

A macro virus is a computer virus written in the same macro language used for software programs, including Microsoft Excel or word processors such as Microsoft Word.

RRB JE IT CBT 2 Full Test 1 - Question 5

In SQL, cursor ______

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 5

A cursor is used to iterate through a result set that was returned by a SELECT statement. Cursors can be used in stored procedures, stored functions, and triggers.

RRB JE IT CBT 2 Full Test 1 - Question 6

A ________ is the term used when a search engine return a Web page that matches the search.

Criteria.

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 6

A hit is the term used when a search engine return a Web page that matches the search criteria. Blog is the place where any article is written and published over internet. Link opens up new website.

RRB JE IT CBT 2 Full Test 1 - Question 7

In January 2019, Krishna Sobti passed away. She was a famous ________.

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 7
  • Krishna Sobti was a famous Hindi writer and essayist.
  • She had won the Sahitya Akademi Award in 1980 for her novel Zindaginama.
  • She was awarded the Jnanpith in 2017 for her contribution to Indian literature.
  • Some of her celebrated works include Daar Se Bichhudi, Mitro Marjani, Zindaginama, Dil-o-Danish etc.
RRB JE IT CBT 2 Full Test 1 - Question 8

DMA stands for ________

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 8

Direct memory access (DMA) is a method that allows an input/output (I/O) device to send or receive data directly to or from the main memory, bypassing the CPU to speed up memory operations. The process is managed by a chip known as a DMA controller (DMAC).

RRB JE IT CBT 2 Full Test 1 - Question 9

Which of the following is not an application layer protocol?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 9

In the Internet protocol stack, when data is sent from device A to device B, the 5th layer to receive data at B is Application layer. The application layer is a layer in the Open Systems Interconnection (OSI) seven-layer model and in the TCP/IP protocol suite. It consists of protocols that focus on process-to-process communication across an IP network and provides a firm communication interface and end-user services. Example: HTTP, TELNET, FTP, IMAP etc.

RRB JE IT CBT 2 Full Test 1 - Question 10

Which of following datatype can be returned by a function?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 10

A function provides a convenient way to encapsulate some computation. C makes the use of functions easy, convenient and efficient.

Functions receive either a fixed or variable amount of arguments. Functions can only return one value or return no value. A function returns all mentioned data-types,

RRB JE IT CBT 2 Full Test 1 - Question 11

In linux, man command is used to _________.

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 11

man stands for manual.
The man pages are a user manual that is by default built into most Linux distributions.
man command in Linux is used to display the user manual of any command.

RRB JE IT CBT 2 Full Test 1 - Question 12

Which electronic components were used in Fifth Generation Computers?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 12

Fifth Generation (Present and Future):

  • 5th generation computers use ULSI (Ultra-Large Scale Integration) chips
  • Millions of transistors are placed in a single IC in ULSI chips
  • 64-bit microprocessors have been developed during this period
  • Memory chips and flash memory up to 1 GB, hard disks up to 600 GB & optical disks up to 50 GB have been developed
  • Fifth generation computing devices, based on Artificial Intelligence, are still in development, though there are some applications, such as voice recognition, that is being used today

Notes:

RRB JE IT CBT 2 Full Test 1 - Question 13

________ command is used to circulate between two different file directories.

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 13

The cd command, also known as chdir (change directory), is a command-line OS shell command used to change the current working directory in operating systems.

if the user wanted to change from the home directory to the xyz directory, the input will be:

cd/xyz/

RRB JE IT CBT 2 Full Test 1 - Question 14

Which of the following cannot be an octal code?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 14

Octal number system has 8 digits from 0…. 7
Hence 8 cannot be a symbol in the octal number system
Hence option d 678 is incorrect

RRB JE IT CBT 2 Full Test 1 - Question 15

A queue implemented using arrays gets full when

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 15

A queue is an ordered list in which insertions are done at one end (rear) and deletions are done at another end (front). The first element to be inserted is the first one to be deleted. Hence, it is called First in First out (FIFO) or Last in Last out (LILO) list.

Condition for size of queue: rear = maximum_size – 1

RRB JE IT CBT 2 Full Test 1 - Question 16

Which tag are used to add row in tables?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 16

<tr> tag is used to add rows in tables
The <tr> tag defines a row in an HTML table
A <tr> element contains one or more <th> or <td> elements
The <th> tag defines a header cell in an HTML table
The <td> tag defines a standard cell in an HTML table

RRB JE IT CBT 2 Full Test 1 - Question 17

Which of the following is true about Java methods?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 17

A method must be declared within a class. It is defined with the name of the method, followed by parentheses ().

JAVA (static) method can be accessed without creating an object of the class or it can be accessed by creating objects using the corresponding class.

A constructor in Java is a special method that is used to initialize objects. Java constructor is invoked at the time of object creation. It constructs the values for the object that is why it is known as constructor.

RRB JE IT CBT 2 Full Test 1 - Question 18

Which of the following decisive battles had established the dominion of the British in India?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 18

The Battle of Buxarwas fought on 22-23 October 1764 between the forces under the command of the British East India Company led by Hector Munro and the combined armies of Mir Qasim, Nawab of Bengal till 1763; the Nawab of Awadh; and the Mughal Emperor Shah Alam.

  • The combined armies of Mughals, Awadh and MirQasim were defeated by the British army.
  • Treaty of Allahabad was signed after the battle of Buxar.
RRB JE IT CBT 2 Full Test 1 - Question 19

Which of the following examines the specification to ensure that all system requirements are error free?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 19

Requirements validation examines the specification to ensure that all system requirements have been stated unambiguously; that inconsistencies, omissions, and errors have been detected and corrected; and that the work products conform to the standards established for the process, the project, and the product.

RRB JE IT CBT 2 Full Test 1 - Question 20

Binary search algorithm cannot be applied to which of following?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 20

Binary search is also known as half-interval search. It works efficiently with a sorted list. Binary search compares the target value to the middle element of the list. If they are not equal narrow the interval to the lower half (i.e. elements appear before middle element). Otherwise, narrow it to the upper half (i.e. element appear after middle element). Repeatedly check until the target value is found.

Pre-requisite for binary search is to have a sorted array.

RRB JE IT CBT 2 Full Test 1 - Question 21

The first page of a web site is called its:

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 21

The home page is the first page that we see when a website is opened on the web browser. It is also called the start page or the main page, though home page is a more commonly used name. It is generally made attractive and contains various hyperlinks to different pages within the web site to attract visitors to its site. Some web sites require users to login to the web site to access the home page.

RRB JE IT CBT 2 Full Test 1 - Question 22

A set of programs which enables computer hardware and software to work together is called

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 22

System software is a type of computer program that is designed to run a computer's hardware and application programs. If we think of the computer system as a layered model, the system software is the interface between the hardware and user applications.

RRB JE IT CBT 2 Full Test 1 - Question 23

Which of the following operator can be used to decrease the value of variable “x” by “1”?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 23

x=-x-1 will give negative result.
x=-+x is invalid use of operator.
x = -x- - will provide negative output.
x+=-1 is equivalent to x = x+(-1), hence x = x -1.

RRB JE IT CBT 2 Full Test 1 - Question 24

Which force is required to maintain a body in Uniform circular Motion?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 24
  • The Centripetal force is required to maintain a body in Uniform Circular Motion.
  • Centripetal Force acts when a body moves around the other body, the force that causes this acceleration and keeps the body moving along a circular path is acting towards the centre
RRB JE IT CBT 2 Full Test 1 - Question 25

Which of the following is true about Java?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 25

Java is a general-purpose computer programming language that is concurrent, class-based, object-oriented, and specifically designed to have as few implementation dependencies as possible.

Java constructor is invoked at the time of object creation. It constructs the values for the object that is why it is known as constructor.

JAVA is intended to let application developers "write once, run anywhere" (WORA), meaning that compiled Java code can run on all platforms that support Java without the need for recompilation.

RRB JE IT CBT 2 Full Test 1 - Question 26

What is the correct HTML code for inserting an image?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 26

The <img> tag defines an image in an HTML page.

The <img> tag has two required attributes: src and alt.

src specifies the URL of an image and alt specifies an alternate text for an image.

RRB JE IT CBT 2 Full Test 1 - Question 27

Which of the following is the main constituent of Biogas after Methane?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 27
  • Methane and Carbon dioxide are the main constituent of Biogas.
  • Methane is produced by the anaerobic bacterial decomposition of vegetable matter under water.
  • It is also known as marsh gas or swamp gas.
  • Its chemical formula is CH4.
RRB JE IT CBT 2 Full Test 1 - Question 28

Which of the following chemical compounds is used for causing acid rain? 

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 28
  • Acid rain is caused by a chemical reaction that begins when compounds like sulfur dioxide and nitrogen oxides are released into the air.
  • These substances can rise very high into the atmosphere, where they mix and react with water, oxygen, and other chemicals to form more acidic pollutants, known as acid rain.
  • Sulfur dioxide and nitrogen oxides dissolve very easily in water and can be carried very far by the wind.
  • As a result, the two compounds can travel long distances where they become part of the rain, sleet, snow, and fog that we experience on certain days.
RRB JE IT CBT 2 Full Test 1 - Question 29

In which of the following during the emission of radioactive rays, no changes occur in the mass or charge?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 29
  • In γ-emission rays (Gamma rays), no changes occur in the mass/charge.
  • Gamma rays are electromagnetic waves of short wavelength and high frequency.
  • They are emitted by most radioactive sources along with alpha or beta particles
  • Through releasing a gamma photon it reduces to a lower energy state. Hence, Gamma rays have no electrical charge connected with them.
  • Alpha rays are released by high mass whereas beta has high energy electrons.
RRB JE IT CBT 2 Full Test 1 - Question 30

In C language, the && and | | operators:

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 30

Logical operators are used to combine and evaluate boolean expressions.

&& called Logical AND operator. If both the operands are non-zero, then the condition becomes true.

|| called Logical OR Operator. If any of the two operands is non-zero, then the condition becomes true.

RRB JE IT CBT 2 Full Test 1 - Question 31

In digital data transmission if each sample is quantized into q levels, then bits required to represent each sample value is given by:

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 31

log2 q bits are required to represent each sample value

Consider an example
If the number of levels is 4
These levels in binary can be represented by
00, 01, 10, 11
log2 4 = 2
Hence using 2 bits we can represent all 4 levels

Similarly
If the number of levels is 8, then these levels can be represented by
000, 001, 010, 011, 100, 101, 110, 111
log2 8 = 3
Thus using 3 bits we can represent all 8 levels

RRB JE IT CBT 2 Full Test 1 - Question 32

What is searched using a search engine?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 32

A search engine like Google, Bing or yahoo etc. is used by putting in some keywords which are used as a guide. The search engine picks up the keyword and using different ranking algorithms, throw back pages which contain data related to those keywords.

RRB JE IT CBT 2 Full Test 1 - Question 33

Which of the following is not an object-oriented principle?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 33

Inheritance: forming a new class from an existing class. It helps to reuse code.

Abstraction: Provide only essential information to the outside world and hide background details.

Overloading: specify more than one definition for a function name or an operator in the same scope.

Polymorphism: A call to a member function will invoke a different function depending on the type of object that invokes the function.

RRB JE IT CBT 2 Full Test 1 - Question 34

Which of the following multiplexing techniques is used for digital data transmission?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 34

RRB JE IT CBT 2 Full Test 1 - Question 35

In a software project, COCOMO (Constructive Cost Model) is used to estimate

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 35

The Constructive Cost Model (COCOMO) is a procedural software cost estimation model developed by Barry W. Boehm.

The basic COCOMO model gives an approximate estimate of the project parameters. The basic COCOMO estimation model is given by the following expressions:

Effort = a1 х (KLOC) a2 PM
Tdev = b1 x (Effort)b2 Months
Where

  • KLOC is the estimated size of the software product expressed in Kilo Lines of Code,
  • a1, a2, b1, b2 are constants for each category of software products,
  • Tdev is the estimated time to develop the software, expressed in months,
  • An effort is a total effort required to develop the software product, expressed in person months (PMs)
RRB JE IT CBT 2 Full Test 1 - Question 36

Joystick is a (an) _________

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 36

Devices that accept data from the outside computer and transfer into CPU are called input devices. An input device is a peripheral used to provide data and control signals to an information processing system such as a computer or information appliance. Examples of input devices include keyboards, mouse, scanners, digital cameras and joysticks.

RRB JE IT CBT 2 Full Test 1 - Question 37

In Microsoft Excel, down arrow key stroke leads to _________ cell movement on spreadsheet.

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 37

In Microsoft Excel, down arrow key leads to One Cell down movement.

  • Just like down key, every arrow key performs the same function i.e. right arrow key when pressed leads to one cell right movement, left arrow key lead to one cell left movement etc.
RRB JE IT CBT 2 Full Test 1 - Question 38

What does TCP stand for with respect to computer networks?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 38

The Transmission Control Protocol (TCP) is one of the main protocols of the Internet protocol suite. It originated in the initial network implementation in which it complemented the Internet Protocol (IP). Therefore, the entire suite is commonly referred to as TCP/IP

RRB JE IT CBT 2 Full Test 1 - Question 39

What is the formula of Ethanoic acid?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 39
  • Acetic acid, commonly named ethanoic acid, is a colorless liquid organic compound with the chemical formula CH3COOH.
  • When undiluted, it is sometimes called glacial acetic acid.
RRB JE IT CBT 2 Full Test 1 - Question 40

Which of the following symbols is used in UNIX to run a job in the background?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 40

In UNIX & processes command in the background. If a command is terminated by the control operator &, the shell executes the command in the background in a subshell. The shell does not wait for the command to finish, and the return status is 0.

RRB JE IT CBT 2 Full Test 1 - Question 41

The only Viceroy to be assassinated in India was ________.

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 41
  • Richard Southwell Bourke, 6th Earl of Mayo also known as Lord Mayo in India was the only viceroy to be assassinated in India.
  • Sher Ali Afridi on 8th Feb 1872, assassinated Lord Mayo, the then viceroy of India, in Port Blair.
  • TRICK"Mayo" sounds like "maaro" (to kill) similar to assassination.
RRB JE IT CBT 2 Full Test 1 - Question 42

Which among the following is/are output devices?
I. Scanner
II. Speaker
III. Plotter

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 42

An input device is any hardware device that sends data to a computer, allowing you to interact with and control it.

An output device is any hardware that sends data from a computer to another device mostly in form of audio or video.

  • Scanner scans any document and sends it to computer, so it is a input device.
  • Speaker gets data from computer in form of audio. So it is a output device.
  • Plotter is printer that print vector image. It recieve data from computer and print it on paper. So it is also a output device.
RRB JE IT CBT 2 Full Test 1 - Question 43

Which of the following has the least worst time complexity?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 43

Worst time complexity is as follows:
Bubble Sort - O(N2)
Merge Sort - O(N log N)
Insertion Sort - O(N2)
Selection Sort - O(N2)

RRB JE IT CBT 2 Full Test 1 - Question 44

Which of the following living beings is most likely to produce greenhouse gases?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 44

Green plants are most likely to produce greenhouse gases.

  • Greenhouse gases consists gases such as carbon dioxide, methane, water vapour, nitrous oxide and ozone.
  • These gases absorbs heat which produced from the Sun.
  • A greenhouse is called so because it is a house which contains green things such as plants and beneficial gasses.
RRB JE IT CBT 2 Full Test 1 - Question 45

Which of the following is a critical element of software quality assurance and represents the ultimate review of specification, design, and code generation?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 45

Software testing is an investigation conducted to provide stakeholders with information about the quality of the software product or service under test.

Once source code has been generated, software must be tested to uncover as many errors as possible before delivery to the customer.
Reviews and other SQA activities can and do uncover errors, but they are not sufficient. Hence, there is a need to execute the program before it gets to the customer with the specific intent of finding and removing all errors.

RRB JE IT CBT 2 Full Test 1 - Question 46

Which of the following executes as a single statement?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 46

SQL is a single query that is used to perform DML and DDL operations. It executes as a single statement.
PL/SQL is a block of codes that used to write the entire program blocks.

RRB JE IT CBT 2 Full Test 1 - Question 47

The 9’s complement of 012398 is:

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 47

The 9’s complement is obtained by subtracting each number from 9
999999
- 012398
987602

RRB JE IT CBT 2 Full Test 1 - Question 48

Which of the following is, "A device used to connect two separate Ethernet networks into one extended Ethernet."?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 48

An Ethernet network bridge is a device which connects two different local area networks together into one extended Ethernet. For this both networks must connect using the same Ethernet protocol.

RRB JE IT CBT 2 Full Test 1 - Question 49

<a> and </a> tags are used for 

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 49

<a> tag si used to add links to webpage.

The <a> tag defines a hyperlink, which is used to link from one page to another.

Attribute ‘href’ indicates the link's destination.

RRB JE IT CBT 2 Full Test 1 - Question 50

The Laboratory apparatus are made of ________.

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 50
  • The Laboratory apparatus are made of pyrex glass. Pyrex glasses are borosilicate glasses.
  • Some of the basic laboratory apparatus comprise of a volumetric flask, graduated cylinder, funnel, and beaker.
  • Flint glasses are durable and heavy characterized by their high refractive quality, clarity, and brilliance.
  • Crookes glasses are those which are designed to diminish the transmission of UV rays.
RRB JE IT CBT 2 Full Test 1 - Question 51

"Forests" is listed in the _________ list given in the Seventh Schedule in the Constitution of India.

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 51

Through the 42nd Amendment Act of 1976 five subjects were transferred from State to Concurrent List.
They are:
1. Education
2. Forests
3. Weights & Measures
4. Protection of Wild Animals and Birds
5. Administration of Justice

RRB JE IT CBT 2 Full Test 1 - Question 52

Excess nitrate in drinking water can cause

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 52


An illness that begins when large amounts of nitrates in water are ingested by an infant and converted to nitrite by the digestive system. The nitrite then reacts with oxy-haemoglobin (the oxygen-carrying blood protein) to form metheglobin, which cannot carry oxygen. If a large enough amount of metheglobin is formed in the blood, body tissues may be deprived of oxygen, causing the infant to develop a blue coloration of their mucous membranes and possibly digestive and respiratory problems. This condition is also known as methemoglobinemia

RRB JE IT CBT 2 Full Test 1 - Question 53

Why is the Caps Lock key referred to as a toggle key?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 53

A toggle key toggles the input from other keys on the keyboard between different input modes.

  • The most commonly used toggle key is the caps lock key, which alternates the letter keys between uppercase and lowercase
  • Num lock is another toggle key which helps to input numerals from the numeric keyboard and is turned on by default
  • Scroll lock key allows arrow keys to scroll through window's contents and allows users to scroll without depending on the scroll bar
  • The insert key is another example of a toggle key, and it toggles between overtype mode and insert mode while entering text
RRB JE IT CBT 2 Full Test 1 - Question 54

Which of the following is used to retrieve the information through URL (e.g. http://XYZ.com) on the world wide web?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 54
  • web browser is a software application for accessing information on the World Wide Web
  • URL is an acronym for Uniform Resource Locator, It is a reference to the resource on the internet
  • client is a computer that connects to and uses the resources of a remote computer, or server
  • The server handles the request from the web browser and sends back a response to build a connection to provide web services
  • Cookies are messages that web servers pass to the web browser when user visit Internet sites
RRB JE IT CBT 2 Full Test 1 - Question 55

Which of the following is not a life cycle model?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 55

Capability Maturity Model (CMM) specifies an increasing series of levels of a software development organization. The higher the level, the better the software development process, hence reaching each level is an expensive and time-consuming process. Unlike other models, it is not a life cycle model.

RRB JE IT CBT 2 Full Test 1 - Question 56

Which one of the following polymeric materials is used  for making bulletproof jackets?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 56
  • Kevlar is used for making bulletproof jackets.
  • Kevlar is a synthetic fiber and heat-resistant.
  • It absorbs the energy of a bullet and extends it over a larger area.
  • It consists of many application which includes racing sails, bicycle tyres, bulletproof jackets, and vests.
  • It was developed by an American scientist Stephanie Kwolek in the year 1965.

RRB JE IT CBT 2 Full Test 1 - Question 57

How many times the following loop is executed?

         for(int i = 0; i < 7; i++) {

                printf(“Hello World”);

                }

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 57

A loop is used for executing a block of statements repeatedly until a given condition returns false.

Syntax of for loop:

for (initialization; condition test; increment or decrement)

{

//Statements to be executed repeatedly

}

Loop is executed from i = 0 to 6. i.e. 7 times

RRB JE IT CBT 2 Full Test 1 - Question 58

A computer virus is a

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 58

A computer Virus is a malicious software that, when executed replicates itself by modifying other computer programs.

The full of VIRUS is Vital Information Recourse Under Siege, because they replicate and multiply and use up computer memory processing power with fake repetitive commands. It causes the system to become slow and keeps hanging.

RRB JE IT CBT 2 Full Test 1 - Question 59

Consider the following:
1. Carbon dioxide
2. Oxides of Nitrogen
3. Oxides of Sulphur

Q. Which of the above is/are the emission/emission from coal combustion at thermal power plants?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 59
  • Carbon dioxide is the emission/emission from coal combustion at thermal power plants.
  • Along with carbon dioxide, sulphur dioxide and nitrogen dioxide are also gaseous emissions which leads to global warming and acid rain.
  • These emissions are formed due to the combustion process when coal is burned to produce heat.
  • However, emissions depend on the quantity of coal used and the amount of sulphur present in the coal.
RRB JE IT CBT 2 Full Test 1 - Question 60

Fly ash is the environmental pollutant generated by

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 60

Fly ash, also known as "pulverised fuel ash" is a coal combustion product composed of fine particles that are driven out of the boiler with the flue gases in thermal power plant.

RRB JE IT CBT 2 Full Test 1 - Question 61

vi editor in UNIX is also called as ___________.

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 61

The vi editor is also called as visual editor. It is a screen-oriented text editor originally created for the Unix operating system. Using vi editor, one can edit an existing file or create a new file.

RRB JE IT CBT 2 Full Test 1 - Question 62

Accuracy of ADC can be increase by:

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 62

There are two ways to best improve the accuracy of A/D conversion:

  • increasing the resolution which improves the accuracy in measuring the amplitude of the analogue signal
  • increasing the sampling rate which increases the maximum frequency that can be measured
RRB JE IT CBT 2 Full Test 1 - Question 63

Typical Data rate for coaxial cables is:

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 63
  • The data rate of coaxial cable depends on physical properties of cable, but 10 Mbps is typical
  • The data rate for optical fibre is 1 Gbps

RRB JE IT CBT 2 Full Test 1 - Question 64

What are the different sections of PL/SQL block?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 64

PL/SQL blocks have a pre-defined structure in which the code is to be grouped. Below are different sections of PL/SQL blocks.

  • Declaration section
  • Execution section
  • Exception-Handling section

Out of which only execution section is mandatory.

RRB JE IT CBT 2 Full Test 1 - Question 65

The Gross Domestic Product of a country is defined as which among the following?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 65
  • The Gross Domestic Product is defined as the total value of the finished goods and services produced within the boundary of a country in a financial year. 
  • The GDP of India has shown a growth of 8.2% in the first quarter of the FY 2018-19. 
RRB JE IT CBT 2 Full Test 1 - Question 66

When you start MS Access, how many categories under “Available Templates” can be found?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 66
  • Total 5 categories under “Available Templates” can be found
  • These include: Blank database, Blank web database, Recent templates, Sample templates and My templates
  • MS Access is one of the applications found in the MS Office
RRB JE IT CBT 2 Full Test 1 - Question 67

Who among the following has won Australian Open Men’s Singles 2019 title at Melbourn?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 67
  • Novak Djokovic defeated Rafael Nadal to win his 7th Australian Open Men’s Singles title at Melbourn.
  • The resurgent world No. 1 outplayed the second-ranked Nadal 6-3, 6-2, 6-3 in a largely one-sided match.
  • In Women’s Singles, Japan’s Naomi Osaka clinched her maiden Australian Open Grand Slam Singles title in Melbourne.
RRB JE IT CBT 2 Full Test 1 - Question 68

Which restraining factor should be considered by a system engineer while constructing a system model?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 68

System engineering is a modelling process. It defines the processes that serve the needs of the view under consideration. It represents the behaviour of the processes and the assumptions on which the behaviour is based. It explicitly defines both exogenous and endogenous input to the model.
A system engineer considers the following factors when developing alternative solutions: assumptions, simplifications, limitations, constraints, and customer preferences.

RRB JE IT CBT 2 Full Test 1 - Question 69

Which of the following application layer protocol provides electronic mail internet service?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 69

SMTP: simple mail transfer protocol is used for sending e-mail services between the servers.
HTTP: Hypertext transfer protocol for distributed, collaborative, hypermedia information systems.
FTP: It is an application layer protocol for file transfer
SIP: The Session Initiation Protocol (SIP) is a communications protocol for signalling and controlling multimedia communication sessions.

RRB JE IT CBT 2 Full Test 1 - Question 70

Which of the following is not a PL/SQL unit?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 70

PL/SQL block contains the SQL instruction that used to interact with the database server.

All the PL/SQL units are treated as PL/SQL blocks.

Following are the different type of PL/SQL units:

  • Anonymous Block
  • Function
  • Library
  • Procedure
  • Package Body
  • Package Specification
  • Trigger
  • Type
  • Type Body
RRB JE IT CBT 2 Full Test 1 - Question 71

What is Syzygy?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 71
  • When two or more celestial bodies arrange themselves in a straight line due to their own revolution it is known as a syzygy.
  • All eclipses are syzygy but, not all syzygy are eclipses.
  • For example, the full moon and new moon are syzygy involving the lining up of the Sun, Earth and Moon so, lunar and solar eclipses are syzygy.
RRB JE IT CBT 2 Full Test 1 - Question 72

The output will be LOW for any case when one or more inputs are zero in a/an _______

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 72

The truth table of AND gate is shown:

Whenever one or more inputs are low, the output is low.

RRB JE IT CBT 2 Full Test 1 - Question 73

Which of the following functionality correctly determines the responsibility of physical layer

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 73

Line coding:
a line code is a code chosen for use within a communications system for transmitting a digital signal down a line. Line coding is often used for digital data transport.

Channel coding:
This typically involves the removal of redundancy and the correction (or detection) of errors in the transmitted data. 

Modulation:
In electronics and telecommunications, modulation is the process of varying one or more properties of a periodic waveform, called the carrier signal, with a modulating signal that typically contains information to be transmitted.

RRB JE IT CBT 2 Full Test 1 - Question 74

Which of the following keywords are used to manage execution of create trigger statement?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 74

The BEFORE or AFTER option in the CREATE TRIGGER statement specifies exactly when to fire the trigger body in relation to the triggering statement that is being run.

In a CREATE TRIGGER statement, the BEFORE or AFTER option is specified just before the triggering statement.

RRB JE IT CBT 2 Full Test 1 - Question 75

Which of the following folk/tribal dances is associated with Karnataka?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 75

Yakshagana is a popular folk-theatre form of Karnataka with a long history of nearly four hundred years. It is a unique harmony of musical tradition, eye-catching costumes, and authentic styles of dance, improvised gestures and acting with its extemporaneous dialogue appealing to a wide range of the community. It is a vibrant and vigorous living form of theatre art.

RRB JE IT CBT 2 Full Test 1 - Question 76

In a pointer to structure, which operator is used to access data members of a structure?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 76

Pointers to structures are so frequently used that an alternative notation is provided as a shorthand. If p is a pointer to a structure, then
p -> member-of-structure refers to the particular member.

The operator -> is a minus sign immediately followed by >.
For a pointer to structure node, data members x can be accessed as a node -> x.

RRB JE IT CBT 2 Full Test 1 - Question 77

Which one of the following is not a real time operating system?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 77

A real-time operating system (RTOS) is any operating system (OS) intended to serve real-time applications that process data as it comes in, typically without buffer delays.

Palm OS (also known as Garnet OS) is a mobile operating system initially developed by Palm, Inc., for personal digital assistants (PDAs) in 1996. Palm OS was designed for ease of use with a touchscreen-based graphical user interface. It is provided with a suite of basic applications for personal information management. 

RRB JE IT CBT 2 Full Test 1 - Question 78

The simplified Boolean expression of the output is:

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 78

Y = (A + B)’.A
Y = A’.B’.A
Y = 0 (because A.A’ = 0)

RRB JE IT CBT 2 Full Test 1 - Question 79

Which of the following is NOT desired in a good Software Requirement Specifications (SRS) document?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 79

A software requirements specification (SRS) is a description of a software system to be developed. The software requirements specification lays out functional and non-functional requirements, and it may include a set of use cases that describe user interactions that the software must provide.

RRB JE IT CBT 2 Full Test 1 - Question 80

Nowadays computers all over the world can talk to each other. What is one of the special accessories essential for this purpose?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 80

A modem is a device or program that enables a computer to transmit data over, for example, telephone or cable lines. A Modem performs modulation and demodulation of the signals. Computer information is stored digitally, whereas information transmitted over telephone lines is transmitted in the form of analogue waves.

RRB JE IT CBT 2 Full Test 1 - Question 81

Kawal Tiger Reserve is in ________

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 81

Kawal Tiger Reserve is located at Jannaram mandal of Mancherial District in Telangana state of India.

RRB JE IT CBT 2 Full Test 1 - Question 82

A command ifconfig is used to

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 82

The ifconfig command can be used from the command line either to assign an address to a network interface or to configure or display the current network interface configuration information.

The ifconfig command must be used at system startup to define the network address of each interface present on a machine.

RRB JE IT CBT 2 Full Test 1 - Question 83

In a computer, a compiler is

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 83

A Compiler is a computer program that translates code written in a high-level language to a lower level language, object/machine code. The most common reason for translating source code is to create an executable program.

An assembler translates assembly language into machine code.

RRB JE IT CBT 2 Full Test 1 - Question 84

Compiler and interpreters are examples of:

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 84

A compiler is a computer program (or a set of programs) that convert the source code (written in the high-level language) into machine language.

An interpreter is a computer program that directly executes, i.e. performs, instructions written in a programming or scripting language, without previously compiling them into a machine language program.

Application software (an application) is a set of computer programs designed to permit the user to perform a group of coordinated functions, tasks, or activities.

The programs that are part of the system software include assemblers, compilers, file management tools, system utilities, and debuggers.

RRB JE IT CBT 2 Full Test 1 - Question 85

Data is a ______ material and information is _______ data.

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 85

DATA is a raw material. Collecting data costs money and hence one must collect necessary and sufficient data. Data is generally used by machines and is useless unless it is processed to create INFORMATION.

RRB JE IT CBT 2 Full Test 1 - Question 86

What is the syntax to create a new file in vi editor?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 86

The vi editor is a screen-oriented text editor originally created for the Unix operating system. Using vi editor, one can edit an existing file or create a new file.

Syntax to create a new file: vi filename

RRB JE IT CBT 2 Full Test 1 - Question 87

Which of the following is not used to delete data from database table?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 87

The SQL DROP command is used to remove an object from the database. The DELETE Statement is used to delete rows from a table.

The truncate command removes all rows from a table or specified partitions of a table, without logging the individual row deletions. TRUNCATE TABLE is similar to the DELETE statement.

There is no clause as REMOVE in SQL.

RRB JE IT CBT 2 Full Test 1 - Question 88

How do you combine the following two statements?
char *p;
p = (char*) malloc (100);

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 88

A pointer is a group of cells (often two or four) that can hold an address. The unary operator &. gives the address of an object.

The unary operator * is the indirection or dereferencing operator; when applied to a pointer, it accesses the object the pointer points to.

Char pointers are defined as follows:
char *ptr = (char*)malloc(size)

RRB JE IT CBT 2 Full Test 1 - Question 89

The maximum size of the trigger is __________.

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 89

The size of a trigger cannot be more than 32K.

DDL statements are not allowed in the body of a trigger. Also, no transaction control statements are allowed in a trigger. ROLLBACK, COMMIT, and SAVEPOINT cannot be used.

RRB JE IT CBT 2 Full Test 1 - Question 90

A device that works in conjunction with a computer but not as part of it is called

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 90

The device that works in conjunction with a computer but not as part of it is called peripheral device e.g printer. A printer is not part of the computer, it only does the jobs as per instructed by the computer. Hence (b) is the correct option.

RRB JE IT CBT 2 Full Test 1 - Question 91

Which country has become the 124th member of the International Criminal Court (ICC)?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 91
  • Malaysia has become the 124th member of the International Criminal Court (ICC).
  • The ICC is the world's only permanent war crimes court and aims to prosecute the worst abuses when national courts are unable or unwilling.
  • The headquarters of International Criminal Court is in The Hague, Netherlands.
  • Malaysia's capital is Kuala Lumpur and its currency is Malaysian Ringgit.
RRB JE IT CBT 2 Full Test 1 - Question 92

In HTML, from which tag descriptive tag starts?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 92

HTML is a markup language for describing web documents (web pages). HTML stands for Hyper Text Markup Language. A markup language is a set of markup tags.

The <DL> tag defines a description list.

RRB JE IT CBT 2 Full Test 1 - Question 93

When the USB is connected to a system, its root hub is connected to the _________.

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 93

USB root hub is the software driver that connects multiple USB peripherals to the computer. Root hub is connected to the processor through Bus.

RRB JE IT CBT 2 Full Test 1 - Question 94

The simplified Boolean expression Y = A’(A + B’) can be implemented using a single _____ gate.

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 94

Y = A’ (A + B’)
Y = A’A + A’B’
Y = A’B’
Using Boolean law
Y = (A + B)’ = A’B’
That is the output of the NOR gate

RRB JE IT CBT 2 Full Test 1 - Question 95

Which of following is/are true about linked list?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 95

A linked list consists of a number of nodes in which each node has a next pointer to the following element. The link of the last node in the list is NULL, which indicates the end of the list.

Array occupies continues memory locations. In linked lists, it's not necessary that the nodes created are in a continues memory location so that the possibility of the cache miss is higher.

RRB JE IT CBT 2 Full Test 1 - Question 96

Which of the following is not an example of a biomass energy source?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 96

Energy resources can be classified into two categories:

  1. Renewable source (Non-conventional energy)
  2. Non-Renewable source (Conventional energy)

Renewable energy resources are natural resources which can be regenerated continuously and are inexhaustible. They can be used again and again in an endless manner. Examples are Wood, Solar energy, wind energy, hydropower, tidal energy, geothermal energy, Biomass Energy etc.

  • Biomass Energy: Energy produced by organic matter like plants and animals are called Biomass Energy
  • Examples of biomass are wood, crop residues, seeds, cattle dung, sewage, agricultural wastes etc
  • Biogas and biofuel are examples of biomass energy

Non-Renewable energy resources are natural resources which cannot be regenerated once they are exhausted. They cannot be used again. Examples are Oil, Coal, petroleum, natural gas, nuclear fuels etc.

RRB JE IT CBT 2 Full Test 1 - Question 97

Which of following is stack property?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 97

A stack is an ordered list in which insertion and deletion are done at one end, called a top. The last element inserted is the first one to be deleted. Hence, it is called the Last in First out (LIFO) or First in Last out (FILO) list.

RRB JE IT CBT 2 Full Test 1 - Question 98

Time division multiplexing is used for

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 98
  • Baseband transmissions use digital signalling over a single wire
  • the transmissions themselves take the form of either electrical pulses or light
  • The digital signal used in baseband transmission occupies the entire bandwidth of the network media to transmit a single data signal
  • Baseband uses Time-Division Multiplexing (TDM), which divides a single channel into time slots
RRB JE IT CBT 2 Full Test 1 - Question 99

The intensity of light is ________ due to constructive interference.

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 99
  • The non-uniform distribution of energy due to the superposition of light waves in a media is called the interference of light.
  • Constructive interference occurs when the crest of one wave falls on the crest of other wave or the trough of one wave falls on the trough of the other wave.
  • The resultant intensity due to constructive interference is, therefore, maximum.
RRB JE IT CBT 2 Full Test 1 - Question 100

In digital data transmission if the source generates low pass analogue signals with the maximum frequency fm then the correct relation for minimum sampling frequency fto convert analogue signal to digital signal is:

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 100

The sampling frequency for low pass signals is given by Nyquist Criteria

According to which
The signal can be recovered from its samples if the sampling frequency is twice the maximum frequency

Hence
fs ≥ 2 fm
The minimum sampling frequency is given by the equality
fs = 2 fm

RRB JE IT CBT 2 Full Test 1 - Question 101

Which of the following is FALSE in case of Datagram packet switching?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 101

a, b. True. In Datagram packet switching, each network has its own independent path.
c. True. The overhead bits are used to specify the final destination
d. False. The bandwidth of transmission is dynamic and depends on the congestion.

RRB JE IT CBT 2 Full Test 1 - Question 102

Which of the following statement is correct about the value of acceleration due to gravity at the poles?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 102
  • Due to the equatorial bulge, i.e. the equator being more bulged towards the outside, the poles are nearer to the Centre of the earth, as compared to the equatorial region.
  • And as the acceleration due to gravity is inversely proportional to the distance from the Centre of the earth, as the distance is less on poles, the acceleration due to gravity(g) is more at the poles.
RRB JE IT CBT 2 Full Test 1 - Question 103

Which is/are abiotic component?
I. Sunlight
II. Plants
III. Water
IV. Animals
V. Soil
VI. Insects

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 103

The natural environment components can be classified into two

  1. Abiotic components
  2. Biotic components

Abiotic components
These components are not living but can support other living organisms. Some kinds of such organisms are given below:

  • Inorganic substances: The elements which are taken up by the plants with the help of sunlight and converted into food. The examples of such inorganic elements are like nitrogen, calcium, phosphorus, hydrogen, carbon dioxide and oxygen.
  • Organic substances: The substances which are taken in the form of inorganic materials from the food source and are again sent back to the environment after decomposition by decomposers. E.g. Carbohydrates, proteins, fats etc.
  • Physical factors: These factors have a direct effect on living organisms, which are climatic conditions like temperature, rainfall, wind, humidity, soil and light energy which is used by the plants for the preparation of food.
  • Lithosphere: The outermost layer of the earth (i.e.) soil or land.
  • Hydrosphere: Part of the earth having water resources like oceans, rivers, ponds, and lakes.
  • Atmosphere: It is a cover around the earth composed by a variety of gases which protects the living organisms from various harmful cosmic radiations.

Biotic components
The area in which life is possible is called as a biosphere. All living organism in the biosphere depends upon one another and these organisms exist in the biosphere forming the following community.

  • Producers: The green plants present on earth surface which produces their own food only once by the process of photosynthesis in sunlight, water, and carbon dioxide forms food for other organisms. E.g. Sugar, carbohydrates etc.
  • Consumer: This organisms directly (or) indirectly depend upon the green plants for the source of food. E.g. All animals including man.
  • Decomposers: These are micro-organisms which decompose the complex compounds in the dead organic matter of plants and animals and again recycle the elements into the environment. E.g. Bacteria and fungi.

​So for the given conditions:

  • Biotic Components – Plants, Animals, Fungi, Insects
  • Abiotic Components – Sunlight, Water, Soil.
RRB JE IT CBT 2 Full Test 1 - Question 104

What is the size of an array?
char str[20];

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 104

Size of each character is 1 byte. Hence, the character array of size 20 is 20 bytes.

RRB JE IT CBT 2 Full Test 1 - Question 105

Execution section in PL/SQL block always starts with keyword _______.

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 105

Execution part is the main and mandatory part which actually executes the code that is written inside it.
This section starts with the keyword 'BEGIN'.
It should be followed either by 'END' or Exception-Handling section if present.

RRB JE IT CBT 2 Full Test 1 - Question 106

Convert the hexadecimal number B2 to binary

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 106

To convert Hexadecimal into Binary
Write each symbol of hexadecimal in 4-bit binary form

B = 1110 = 1011
2 = 210 = 0010
B2 = 10110010

RRB JE IT CBT 2 Full Test 1 - Question 107

Which of the following statements about circuit switched network is true?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 107

In circuit switched network if the resources are reserved, are kept reserved till the user disconnects which wastes the resources because the user cannot use the resources fully al the time.

RRB JE IT CBT 2 Full Test 1 - Question 108

What is the full form of T-SQL?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 108

T-SQL basically stands for " Transact-SQL." This is the extension of Structured Query Language (SQL) that is used in Microsoft.

RRB JE IT CBT 2 Full Test 1 - Question 109

Which of the following PL/SQL component stores data?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 109

PL/SQL block has the actual PL/SQL code.

PL/SQL engine is the component where the actual processing of the codes takes place.

Database server is the most important component of Pl/SQL unit which stores the data.

RRB JE IT CBT 2 Full Test 1 - Question 110

Which layer of the atmosphere has the maximum concentration of Ozone gas?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 110
  • Stratosphere layer of atmosphere has the maximum concentration of Ozone gas.
  • Approximately 10 per cent of Ozone layer is present in Troposphere and rest of the 90 per cent found in Stratosphere layer of atmosphere..
  • Ozone layer in Stratosphere atmosphere absorbs most of the ultraviolet radiation from the Sun.
  • Stratosphere is the second layer of atmosphere whereas Troposphere is the lowest layer of the atmosphere.
  • The Thermosphere is the layer of the Earth's atmosphere is above the Mesosphere.
  • There are five layers of atmosphere namely- Troposphere, Stratosphere, Mesosphere, Thermosphere and Exosphere. 
RRB JE IT CBT 2 Full Test 1 - Question 111

When did Constituent Assembly adopt Constitution?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 111
  • The Constitution of India was adopted by the Constituent Assembly on 26th November, 1949 but it came into force on 26th January, 1950.
  • Constitution of India is known as the supreme law of India which consists of fundamental political codes, powers, procedures, structures and the duties of the government institutions, directive principles and the duties of the citizen.
  • It is the longest written constitution of any country in the world.
  • B.R. Ambedkar was considered to be its chief architect as he was the Chairman of the Drafting Committee
RRB JE IT CBT 2 Full Test 1 - Question 112

An increase in which of the following gases leads to global warming?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 112
  • Carbon dioxide is responsible for trapping heat energy from the Sun within the Earth's atmosphere by preventing the rays of the Sun from escaping into the atmosphere. 
  • This leads to an increase in the overall temperature and this phenomenon is called global warming.
RRB JE IT CBT 2 Full Test 1 - Question 113

Who among the following authored the book 'The Golden Threshold'?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 113
  • Sarojani Naidu became the first Indian women president of the Congress at the Kanpur session in 1925.
  • She was the first woman to become the governor of Uttar Pradesh.
  • She began writing at the age of 13. Known as the Nightingale of India, she eulogised India in her poems published in three collections, The Golden Threshold (1905), The Bird of Time (1912) and the Broken Wing (1917).
RRB JE IT CBT 2 Full Test 1 - Question 114

Which mirror is used by doctors to examine the eyes, ears, nose, and throat?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 114
  • When the object is between the centre of curvature and focus or between focus and pole of a concave mirror, the image formed is virtual, erect and magnified.
  • Therefore, doctors use concave mirrors to examine the eyes, ears, nose,and throat from a close range as the image formed is enlarged and provides a better view to the doctor.
RRB JE IT CBT 2 Full Test 1 - Question 115

Which of the following command prints the last 10 lines of a file by default?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 115

The tail command is a command-line utility for outputting the last part of files given to it via standard input. It writes results to standard output. By default, tail returns the last ten lines of each file that it is given.

RRB JE IT CBT 2 Full Test 1 - Question 116

The Output of the assembler in machine codes is generally referred as

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 116

Input to an assembler is the source program and assembler converts it into object program.

RRB JE IT CBT 2 Full Test 1 - Question 117

Generally, TCP is reliable and UDP is not reliable. DNS which has to be reliable uses UDP because

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 117

UDP is much faster. TCP is slow as it requires 3-way handshake. The load on DNS servers is also an important factor. DNS servers (since they use UDP) don’t have to keep connections.

DNS requests are generally very small and fit well within UDP segments.

UDP is not reliable, but reliability can be added on the application layer. An application can use UDP and can be reliable by using a timeout and resend at the application layer.

RRB JE IT CBT 2 Full Test 1 - Question 118

What is the tagline for ‘Pradhan Mantri Krishi Sinchayee Yojana’?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 118
  • “More Crop per Drop” is the tagline for ‘Pradhan Mantri Krishi Sinchayee Yojana’.
  • The policy was launched in the year 2015-2016 to promote farming and irrigation.
  • The main objective of the scheme is to converge the investments in irrigation at the farm level and provide end to end solutions to the farmers.
RRB JE IT CBT 2 Full Test 1 - Question 119

LAN Topology contains

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 119

LAN Topology contains Bus, star, and rings.

A star topology is a topology for a Local Area Network (LAN) in which all nodes are individually connected to a central connection point, like a hub or a switch.

In networking a bus is the central cable i.e. the main wire that connects all devices on a local area network (LAN).

A ring topology is a topology for a Local Area Network (LAN) in which every device has exactly two ​neighbors for communication purposes.

RRB JE IT CBT 2 Full Test 1 - Question 120

Which of the following is a type of E-commerce?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 120

Sharing business information, maintaining business relationships and conducting business transactions using computers connected to a telecommunication network is called E-Commerce

It can be classified as:
BUSINESS TO BUSINESS (B2B)
BUSINESS TO CUSTOMER (B2C)
CUSTOMER TO CUSTOMER (C2C)

RRB JE IT CBT 2 Full Test 1 - Question 121

The simplified Boolean expression for Z = (X + X) (X + Y’) is:

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 121

The given Boolean function can be simplified as :
Z = (X + X) (X + Y’)
Z = X ( X + Y’)
Z = X + XY’
Z = X ( 1 + Y’)
Z = X

RRB JE IT CBT 2 Full Test 1 - Question 122

Twisting of cables in twisted pair cable is done to:

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 122
  • If twisting is not done, then the two wires are parallel
  • The effect of these unwanted signals is not the same in both wires because they are at different locations relative to the noise or crosstalk sources (e.g., one is closer and the other is farther)
  • This results in a difference at the receiver; By twisting the pairs, a balance is maintained
RRB JE IT CBT 2 Full Test 1 - Question 123

Ramon Magsaysay Award is named after the former President of ________.

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 123
  • The Ramon Magsaysay Award is an annual award established to perpetuate former Philippine President Ramon Magsaysay's example of integrity in governance, courageous service to the people, and pragmatic idealism within a democratic society.
  • The prize was established in April 1957 by the trustees of the Rockefeller Brothers Fund based in New York City with the concurrence of the Philippine government.
RRB JE IT CBT 2 Full Test 1 - Question 124

Duralumin alloy consists of Al, Mn, ________.

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 124
  • Duralumin alloy consists of Mg, Mn, Al, and Cu.
  • Duralumin is a lightweight, strong, and hard alloy of aluminium, used widely in aircraft construction.
  • It is workable, ductile, and relatable in the normal state and can be drawn and rolled into a variety of shapes.
RRB JE IT CBT 2 Full Test 1 - Question 125

Candela is the unit of ________.

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 125
  • Candela (Cd) is the SI unit of luminous intensity.
  • Luminous intensity is a measure of the amount of visible light emitted from a point source per unit time per unit solid angle.
RRB JE IT CBT 2 Full Test 1 - Question 126

Error detection at data link layer is achieved by

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 126

CRC is used in digital networks and storage devices to detect accidental changes to raw data.

Error detection at the data link layer is achieved by cyclic redundancy codes which means adding extra bits for detection errors at the destination.

RRB JE IT CBT 2 Full Test 1 - Question 127

Which of the following data structure stores items in ‘key-value’ pairs?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 127

Java HashMap is a hash table-based implementation of Java’s Map interface.
It is a collection of key-value pairs. It maps keys to values.
A HashMap cannot contain duplicate keys.
Java HashMap allows null values and the null key.

RRB JE IT CBT 2 Full Test 1 - Question 128

What is the process of digital communication where a threshold value is set at the receiver to reduce noise?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 128

In digital data transmission, the transmitted bit undergoes attenuation with the distance.

Also, the effect of noise may alter the voltage levels of the transmitted bit

Thus, a threshold voltage is set at the receiver to decide whether the received bit is 0 or 1

Example:
Suppose the voltage level of transmitted bit for logic 1 is 5V

And for logic 0 is 0 V
Now threshold Voltage is set at 2.5 V

If the received voltage level is greater than 2.5 V bit is decoded as 1 else 0

RRB JE IT CBT 2 Full Test 1 - Question 129

Which key is used to move from one column to another without using the mouse in Excel?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 129

Tab key is used to move from one column to the next.

RRB JE IT CBT 2 Full Test 1 - Question 130

Which of the following is not a Web browser?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 130

A web browser is a software application used to locate, retrieve and display content of Web pages, images, video and other files. The browser contacts the Web server and requests information and Web server sends the information back to the Web browser which displays the results on the computer.

e.g. Internet Explorer, Firefox, Google Chrome, Opera, Netscape, Safari

Hypertext Markup Language is the standard markup language for creating web pages and web applications.

RRB JE IT CBT 2 Full Test 1 - Question 131

Which command is used in UNIX to uncompress files?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 131

The uncompress command will restore files to their original state after they have been compressed using the compress command.

If no files are specified, the standard input will be uncompressed to the standard output.

RRB JE IT CBT 2 Full Test 1 - Question 132

Which of the following is not a guided media?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 132

Various guided media and unguided media are shown:

RRB JE IT CBT 2 Full Test 1 - Question 133

In networks, a small message used to pass between one station to another is known as ________

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 133

Token ring local area network (LAN) technology is a communications protocol for local area networks. It uses a special three-byte frame called a "token" that travels around a logical "ring" of workstations or servers.

RRB JE IT CBT 2 Full Test 1 - Question 134

Which of the following is not a property of JAVA?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 134

All are the above are properties of JAVA.

Polymorphism: A call to a member function will invoke a different function depending on the type of object that invokes the function.

Inheritance is forming a new class from an existing class. It helps to reuse code.

Java’s multithreading system is built upon the Thread class, its methods, and its companion interface, Runnable.

RRB JE IT CBT 2 Full Test 1 - Question 135

_______ uses garbage collection to automatically handle allocating memory.

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 135

Garbage collection is the method Java uses to automatically handle allocating memory.

Java uses two types of garbage collection tools.

One is compaction, which is merely another word for defragmenting memory.

Marking and sweeping is the other technology Java uses as part of its garbage collection tools. Marking and sweeping is a recursive process that marks objects in use; if at the end of this marking an object is not marked, it is swept or destroyed.

RRB JE IT CBT 2 Full Test 1 - Question 136

Correct HTML tag for largest heading is

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 136

The <h1> to <h6> tags are used to define HTML headings.
<h1> defines the most important heading. <h6> defines the least important heading.
h1 is a largest heading
h6 is a smallest heading

RRB JE IT CBT 2 Full Test 1 - Question 137

What is the total number of comparison in a bubble sort for ‘n’ elements?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 137

Bubble sort algorithm requires a pair of nested loops. The outer loop must iterate once for each element for the given elements i.e. n times while the inner loop iterates n times for first iteration, n-1 times for the second iteration, n-2 times for the third iteration and this process continues.

Total number of comparison = (n – 1) + (n - 2) + (n - 3) + … = n(n - 1)/2

RRB JE IT CBT 2 Full Test 1 - Question 138

Chlorofluorocarbons which damage the ozone layer of the atmosphere are not used in which of the following?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 138
  • Chlorofluorocarbons (CFC) are used in Refrigerator, Air conditioner and Aerosol spray.
  • Chlorofluorocarbons (CFCs) are nontoxic, nonflammable chemicals containing atoms of carbon, chlorine, and fluorine.
RRB JE IT CBT 2 Full Test 1 - Question 139

Which Pass connects the Kashmir valley with the Deosai Plains of Ladakh?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 139
  • Burzail Pass connects the Kashmir valley with Deosai Plains of Ladakh.
  • It remains covered in snow during the winter.
RRB JE IT CBT 2 Full Test 1 - Question 140

Which of the following is not type of SQL?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 140

SQL is only categorized in three languages: DDL, DML, and Data Control Language

The set of relations in a database must be specified to the system by means of a data-definition language (DDL).

DML (Data Manipulation Language) – is used for manipulating the database. Manipulation means insert, modify, delete or query the data in the database. It enables users to access or manipulate the data as organised by the appropriate data model.

DCL (Data Control Language) which includes commands that are mostly concerned with rights, permissions and other controls of the database system.

RRB JE IT CBT 2 Full Test 1 - Question 141

The following equation is a representation of which law?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 141
  • V is, is a representation of the Combined Gas Law.
  • This law is obtained by combining Gay-Lussac's Law, Boyles's Law and Charles's Law.
  • Boyle's Law is represented as P 1V= P2V2, P is pressure and V is the volume. 
  • Charles' Law is represented as V1T= V2T1,  V is the volume whereas T is the temperature. 
  • Graham's Law states that the rate of effusion of a gas is inversely proportional to the square root of the mass of its particles.
RRB JE IT CBT 2 Full Test 1 - Question 142

What is a Modem?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 142

A modem (modulator-demodulator) is a network hardware device that modulates one or more carrier wave signals to encode digital information for transmission and demodulates signals to decode the transmitted information. The goal is to produce a signal that can be transmitted easily and decoded to reproduce the original digital data.

RRB JE IT CBT 2 Full Test 1 - Question 143

What are the duties of system administrator?
I. Monitor system performance
II. setup and maintaining an account
III. Monitor network communication

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 143

The person who is responsible for setting up and maintaining the system or server is called as the system administrator.

Responsibilities:

  • User administration (setup and maintaining an account)
  • Maintaining system
  • Verify that peripherals are working properly
  • Quickly arrange repair for hardware in occasion of hardware failure
  • Monitor system performance
  • Create file systems
  • Install software
  • Create a backup and recovery policy
  • Monitor network communication
RRB JE IT CBT 2 Full Test 1 - Question 144

Which of the following is used in the form of an electrolyte of the dry cell (battery)?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 144
  • Ammonium chloride and zinc chloride is used in the form of an electrolyte of the dry cell (battery).
  • Ammonium chloride is mixed with Plaster of Paris to form a paste, with a small amount of zinc chloride added to increase the shelf life of the battery.
  • Ammonium chloride paste allows current to flow.
  • Zinc chloride paste allows a dry-cell to conduct the electricity and provide electrical power to various substances.
  • Zinc chloride paste used between the space of anode and cathode electrodes in a dry cell along with moist paste of ammonium chloride where zinc chloride acts as an electrolyte.
RRB JE IT CBT 2 Full Test 1 - Question 145

Which of the following is not a primitive data type in C?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 145

The data type of a variable is an attribute that tells what kind of data that variable can have.

Data types can be divided into two major categories:

1. Primitive data type (predefined)
2. Non - primitive data type (user defined)

Primitive data type:
It is predefined types of data, which are supported by the programming language. For example, int, char, double, string etc. are all primitive data types.

Non - primitive data type:
They are not defined by the programming language but are instead created by the programmer.
For example, objects, interfaces etc.

RRB JE IT CBT 2 Full Test 1 - Question 146

Which quantum number is associated with the angular momentum of the electron?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 146
  • The quantum mechanical state of an electron is identified by the following quantum numbers:
  1. Denoted by n, the principal quantum number is always an integer and describes the electron's state.
  2. The Orbital quantum number / azimuthal quantum number is denoted by l and is associated with the angular momentum (L) of the electron due to its orbital motion. It is given by l = n - 1
  3.  The energy of an electron in a hydrogen atom is affected by a strong magnetic field and the quantum number which describes this magnetic effect is called magnetic quantum number. It is denoted by ml.
  4.  Denoted by ms, the spin quantum number is associated with the intrinsic angular momentum of the electron.
RRB JE IT CBT 2 Full Test 1 - Question 147

Which of the following type of information is less structured?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 147

Types of information:
STRATEGIC: Needed for long-range planning and directions. This is less structured.
TACTICAL: Needed to take short-range decisions to improve profitability and performance.
OPERATIONAL: Needed for day to day operations of the organization. Eg: Daily Sales, Billing.
STATUTORY: Needed by law to sent to government authorities. Eg: Sales tax return

RRB JE IT CBT 2 Full Test 1 - Question 148

______ can be used to connect two or more service providers.

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 148

NAP is a public network exchange facility where Internet Service Providers (ISPs) can connect with one another in peering arrangements. The NAPs are a key component of the Internet backbone because the connections within them determine how traffic is routed.

RRB JE IT CBT 2 Full Test 1 - Question 149

The rotational effect of an applied force can be measured by ________. 

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 149
  • Moment of Force is defined as the rotational effect of a force on a body about an axis of rotation and its unit is Newton metre. 
  • Centripetal Force acts towards the centre of the circular path in which a body is moving. 
  • Impulse is the product of force and time since it is the reaction when a large force acts on a body for a very small time. 
RRB JE IT CBT 2 Full Test 1 - Question 150

In Linux and Unix CTRL+D is used to _______.

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 150

CTRL + D closes the command line shell. This sends an EOF (End of file) marker to shell, and shell exits when it receives this marker. This is similar to running the exit command.

19 tests
Information about RRB JE IT CBT 2 Full Test 1 Page
In this test you can find the Exam questions for RRB JE IT CBT 2 Full Test 1 solved & explained in the simplest way possible. Besides giving Questions and answers for RRB JE IT CBT 2 Full Test 1, EduRev gives you an ample number of Online tests for practice
Download as PDF

Download free EduRev App

Track your progress, build streaks, highlight & save important lessons and more!
(Scan QR code)