Railways Exam  >  Railways Tests  >  RRB JE (Railways Junior Engineer) CBT Mock Test Series 2024  >  RRB JE IT CBT 2 Full Test 1 - Railways MCQ

RRB JE IT CBT 2 Full Test 1 - Railways MCQ


Test Description

150 Questions MCQ Test RRB JE (Railways Junior Engineer) CBT Mock Test Series 2024 - RRB JE IT CBT 2 Full Test 1

RRB JE IT CBT 2 Full Test 1 for Railways 2024 is part of RRB JE (Railways Junior Engineer) CBT Mock Test Series 2024 preparation. The RRB JE IT CBT 2 Full Test 1 questions and answers have been prepared according to the Railways exam syllabus.The RRB JE IT CBT 2 Full Test 1 MCQs are made for Railways 2024 Exam. Find important definitions, questions, notes, meanings, examples, exercises, MCQs and online tests for RRB JE IT CBT 2 Full Test 1 below.
Solutions of RRB JE IT CBT 2 Full Test 1 questions in English are available as part of our RRB JE (Railways Junior Engineer) CBT Mock Test Series 2024 for Railways & RRB JE IT CBT 2 Full Test 1 solutions in Hindi for RRB JE (Railways Junior Engineer) CBT Mock Test Series 2024 course. Download more important topics, notes, lectures and mock test series for Railways Exam by signing up for free. Attempt RRB JE IT CBT 2 Full Test 1 | 150 questions in 120 minutes | Mock test for Railways preparation | Free important questions MCQ to study RRB JE (Railways Junior Engineer) CBT Mock Test Series 2024 for Railways Exam | Download free PDF with solutions
1 Crore+ students have signed up on EduRev. Have you? Download the App
RRB JE IT CBT 2 Full Test 1 - Question 1

Which of the following statement is true about JVM?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 1

JVM (Java Virtual Machine) is an abstract machine. It is a specification that provides runtime environment in which java bytecode can be executed. JVM does not create the object of main class. Java is platform independent but JVM is platform dependent. JVM is the one that actually calls the main method present in a java code.

RRB JE IT CBT 2 Full Test 1 - Question 2

Which of the following is not a primary component of a Linux system?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 2

Linux Operating System has primarily three components:
1. Kernel
2. System libraries
3. System utilities

Kernel: The kernel is responsible for maintaining all the important abstractions of the operating system, including such things as virtual memory and processes.

System libraries: The system libraries define a standard set of functions through which applications can interact with the kernel. These functions implement much of the operating-system functionality that does not need the full privileges of kernel code.

System utilities: The system utilities are programs that perform individual, specialized management tasks.

RRB JE IT CBT 2 Full Test 1 - Question 3

Which of the following is not a valid category of “System bus” in a computer system?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 3

A bus that connects major computer components (processor, memory, I/O) is called a system bus.

Any bus the lines can be classified into three functional groups: data, address, and control lines.

The data lines provide a path for moving data among system modules. These lines, collectively, are called the data bus.

The address lines are used to designate the source or destination of the data on the data bus.

The control lines are used to control the access to and the use of the data and address lines. Because the data and address lines are shared by all components, there must be a means of controlling their use.

RRB JE IT CBT 2 Full Test 1 - Question 4

Which of the following categories of viruses normally infect executable code, such as as.com and .exe files?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 4

File infector virus is also known as a parasitic virus that usually infects memory and executable files.

A boot sector virus is a type of virus that infects the boot sector of floppy disks or the Master Boot Record (MBR) of hard disks.

A macro virus is a computer virus written in the same macro language used for software programs, including Microsoft Excel or word processors such as Microsoft Word.

RRB JE IT CBT 2 Full Test 1 - Question 5

In SQL, cursor ______

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 5

A cursor is used to iterate through a result set that was returned by a SELECT statement. Cursors can be used in stored procedures, stored functions, and triggers.

RRB JE IT CBT 2 Full Test 1 - Question 6

A ________ is the term used when a search engine return a Web page that matches the search.

Criteria.

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 6

A hit is the term used when a search engine return a Web page that matches the search criteria. Blog is the place where any article is written and published over internet. Link opens up new website.

RRB JE IT CBT 2 Full Test 1 - Question 7

In January 2019, Krishna Sobti passed away. She was a famous ________.

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 7
  • Krishna Sobti was a famous Hindi writer and essayist.
  • She had won the Sahitya Akademi Award in 1980 for her novel Zindaginama.
  • She was awarded the Jnanpith in 2017 for her contribution to Indian literature.
  • Some of her celebrated works include Daar Se Bichhudi, Mitro Marjani, Zindaginama, Dil-o-Danish etc.
RRB JE IT CBT 2 Full Test 1 - Question 8

DMA stands for ________

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 8

Direct memory access (DMA) is a method that allows an input/output (I/O) device to send or receive data directly to or from the main memory, bypassing the CPU to speed up memory operations. The process is managed by a chip known as a DMA controller (DMAC).

RRB JE IT CBT 2 Full Test 1 - Question 9

Which of the following is not an application layer protocol?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 9

In the Internet protocol stack, when data is sent from device A to device B, the 5th layer to receive data at B is Application layer. The application layer is a layer in the Open Systems Interconnection (OSI) seven-layer model and in the TCP/IP protocol suite. It consists of protocols that focus on process-to-process communication across an IP network and provides a firm communication interface and end-user services. Example: HTTP, TELNET, FTP, IMAP etc.

RRB JE IT CBT 2 Full Test 1 - Question 10

Which of following datatype can be returned by a function?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 10

A function provides a convenient way to encapsulate some computation. C makes the use of functions easy, convenient and efficient.

Functions receive either a fixed or variable amount of arguments. Functions can only return one value or return no value. A function returns all mentioned data-types,

RRB JE IT CBT 2 Full Test 1 - Question 11

In linux, man command is used to _________.

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 11

man stands for manual.
The man pages are a user manual that is by default built into most Linux distributions.
man command in Linux is used to display the user manual of any command.

RRB JE IT CBT 2 Full Test 1 - Question 12

Which electronic components were used in Fifth Generation Computers?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 12

Fifth Generation (Present and Future):

  • 5th generation computers use ULSI (Ultra-Large Scale Integration) chips
  • Millions of transistors are placed in a single IC in ULSI chips
  • 64-bit microprocessors have been developed during this period
  • Memory chips and flash memory up to 1 GB, hard disks up to 600 GB & optical disks up to 50 GB have been developed
  • Fifth generation computing devices, based on Artificial Intelligence, are still in development, though there are some applications, such as voice recognition, that is being used today

Notes:

RRB JE IT CBT 2 Full Test 1 - Question 13

________ command is used to circulate between two different file directories.

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 13

The cd command, also known as chdir (change directory), is a command-line OS shell command used to change the current working directory in operating systems.

if the user wanted to change from the home directory to the xyz directory, the input will be:

cd/xyz/

RRB JE IT CBT 2 Full Test 1 - Question 14

Which of the following cannot be an octal code?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 14

Octal number system has 8 digits from 0…. 7
Hence 8 cannot be a symbol in the octal number system
Hence option d 678 is incorrect

RRB JE IT CBT 2 Full Test 1 - Question 15

A queue implemented using arrays gets full when

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 15

A queue is an ordered list in which insertions are done at one end (rear) and deletions are done at another end (front). The first element to be inserted is the first one to be deleted. Hence, it is called First in First out (FIFO) or Last in Last out (LILO) list.

Condition for size of queue: rear = maximum_size – 1

RRB JE IT CBT 2 Full Test 1 - Question 16

Which tag are used to add row in tables?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 16

<tr> tag is used to add rows in tables
The <tr> tag defines a row in an HTML table
A <tr> element contains one or more <th> or <td> elements
The <th> tag defines a header cell in an HTML table
The <td> tag defines a standard cell in an HTML table

RRB JE IT CBT 2 Full Test 1 - Question 17

Which of the following is true about Java methods?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 17

A method must be declared within a class. It is defined with the name of the method, followed by parentheses ().

JAVA (static) method can be accessed without creating an object of the class or it can be accessed by creating objects using the corresponding class.

A constructor in Java is a special method that is used to initialize objects. Java constructor is invoked at the time of object creation. It constructs the values for the object that is why it is known as constructor.

RRB JE IT CBT 2 Full Test 1 - Question 18

Which of the following decisive battles had established the dominion of the British in India?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 18

The Battle of Buxarwas fought on 22-23 October 1764 between the forces under the command of the British East India Company led by Hector Munro and the combined armies of Mir Qasim, Nawab of Bengal till 1763; the Nawab of Awadh; and the Mughal Emperor Shah Alam.

  • The combined armies of Mughals, Awadh and MirQasim were defeated by the British army.
  • Treaty of Allahabad was signed after the battle of Buxar.
RRB JE IT CBT 2 Full Test 1 - Question 19

Which of the following examines the specification to ensure that all system requirements are error free?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 19

Requirements validation examines the specification to ensure that all system requirements have been stated unambiguously; that inconsistencies, omissions, and errors have been detected and corrected; and that the work products conform to the standards established for the process, the project, and the product.

RRB JE IT CBT 2 Full Test 1 - Question 20

Binary search algorithm cannot be applied to which of following?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 20

Binary search is also known as half-interval search. It works efficiently with a sorted list. Binary search compares the target value to the middle element of the list. If they are not equal narrow the interval to the lower half (i.e. elements appear before middle element). Otherwise, narrow it to the upper half (i.e. element appear after middle element). Repeatedly check until the target value is found.

Pre-requisite for binary search is to have a sorted array.

RRB JE IT CBT 2 Full Test 1 - Question 21

The first page of a web site is called its:

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 21

The home page is the first page that we see when a website is opened on the web browser. It is also called the start page or the main page, though home page is a more commonly used name. It is generally made attractive and contains various hyperlinks to different pages within the web site to attract visitors to its site. Some web sites require users to login to the web site to access the home page.

RRB JE IT CBT 2 Full Test 1 - Question 22

A set of programs which enables computer hardware and software to work together is called

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 22

System software is a type of computer program that is designed to run a computer's hardware and application programs. If we think of the computer system as a layered model, the system software is the interface between the hardware and user applications.

RRB JE IT CBT 2 Full Test 1 - Question 23

Which of the following operator can be used to decrease the value of variable “x” by “1”?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 23

x=-x-1 will give negative result.
x=-+x is invalid use of operator.
x = -x- - will provide negative output.
x+=-1 is equivalent to x = x+(-1), hence x = x -1.

RRB JE IT CBT 2 Full Test 1 - Question 24

Which force is required to maintain a body in Uniform circular Motion?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 24
  • The Centripetal force is required to maintain a body in Uniform Circular Motion.
  • Centripetal Force acts when a body moves around the other body, the force that causes this acceleration and keeps the body moving along a circular path is acting towards the centre
RRB JE IT CBT 2 Full Test 1 - Question 25

Which of the following is true about Java?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 25

Java is a general-purpose computer programming language that is concurrent, class-based, object-oriented, and specifically designed to have as few implementation dependencies as possible.

Java constructor is invoked at the time of object creation. It constructs the values for the object that is why it is known as constructor.

JAVA is intended to let application developers "write once, run anywhere" (WORA), meaning that compiled Java code can run on all platforms that support Java without the need for recompilation.

RRB JE IT CBT 2 Full Test 1 - Question 26

What is the correct HTML code for inserting an image?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 26

The <img> tag defines an image in an HTML page.

The <img> tag has two required attributes: src and alt.

src specifies the URL of an image and alt specifies an alternate text for an image.

RRB JE IT CBT 2 Full Test 1 - Question 27

Which of the following is the main constituent of Biogas after Methane?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 27
  • Methane and Carbon dioxide are the main constituent of Biogas.
  • Methane is produced by the anaerobic bacterial decomposition of vegetable matter under water.
  • It is also known as marsh gas or swamp gas.
  • Its chemical formula is CH4.
RRB JE IT CBT 2 Full Test 1 - Question 28

Which of the following chemical compounds is used for causing acid rain? 

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 28
  • Acid rain is caused by a chemical reaction that begins when compounds like sulfur dioxide and nitrogen oxides are released into the air.
  • These substances can rise very high into the atmosphere, where they mix and react with water, oxygen, and other chemicals to form more acidic pollutants, known as acid rain.
  • Sulfur dioxide and nitrogen oxides dissolve very easily in water and can be carried very far by the wind.
  • As a result, the two compounds can travel long distances where they become part of the rain, sleet, snow, and fog that we experience on certain days.
RRB JE IT CBT 2 Full Test 1 - Question 29

In which of the following during the emission of radioactive rays, no changes occur in the mass or charge?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 29
  • In γ-emission rays (Gamma rays), no changes occur in the mass/charge.
  • Gamma rays are electromagnetic waves of short wavelength and high frequency.
  • They are emitted by most radioactive sources along with alpha or beta particles
  • Through releasing a gamma photon it reduces to a lower energy state. Hence, Gamma rays have no electrical charge connected with them.
  • Alpha rays are released by high mass whereas beta has high energy electrons.
RRB JE IT CBT 2 Full Test 1 - Question 30

In C language, the && and | | operators:

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 30

Logical operators are used to combine and evaluate boolean expressions.

&& called Logical AND operator. If both the operands are non-zero, then the condition becomes true.

|| called Logical OR Operator. If any of the two operands is non-zero, then the condition becomes true.

RRB JE IT CBT 2 Full Test 1 - Question 31

In digital data transmission if each sample is quantized into q levels, then bits required to represent each sample value is given by:

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 31

log2 q bits are required to represent each sample value

Consider an example
If the number of levels is 4
These levels in binary can be represented by
00, 01, 10, 11
log2 4 = 2
Hence using 2 bits we can represent all 4 levels

Similarly
If the number of levels is 8, then these levels can be represented by
000, 001, 010, 011, 100, 101, 110, 111
log2 8 = 3
Thus using 3 bits we can represent all 8 levels

RRB JE IT CBT 2 Full Test 1 - Question 32

What is searched using a search engine?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 32

A search engine like Google, Bing or yahoo etc. is used by putting in some keywords which are used as a guide. The search engine picks up the keyword and using different ranking algorithms, throw back pages which contain data related to those keywords.

RRB JE IT CBT 2 Full Test 1 - Question 33

Which of the following is not an object-oriented principle?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 33

Inheritance: forming a new class from an existing class. It helps to reuse code.

Abstraction: Provide only essential information to the outside world and hide background details.

Overloading: specify more than one definition for a function name or an operator in the same scope.

Polymorphism: A call to a member function will invoke a different function depending on the type of object that invokes the function.

RRB JE IT CBT 2 Full Test 1 - Question 34

Which of the following multiplexing techniques is used for digital data transmission?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 34

RRB JE IT CBT 2 Full Test 1 - Question 35

In a software project, COCOMO (Constructive Cost Model) is used to estimate

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 35

The Constructive Cost Model (COCOMO) is a procedural software cost estimation model developed by Barry W. Boehm.

The basic COCOMO model gives an approximate estimate of the project parameters. The basic COCOMO estimation model is given by the following expressions:

Effort = a1 х (KLOC) a2 PM
Tdev = b1 x (Effort)b2 Months
Where

  • KLOC is the estimated size of the software product expressed in Kilo Lines of Code,
  • a1, a2, b1, b2 are constants for each category of software products,
  • Tdev is the estimated time to develop the software, expressed in months,
  • An effort is a total effort required to develop the software product, expressed in person months (PMs)
RRB JE IT CBT 2 Full Test 1 - Question 36

Joystick is a (an) _________

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 36

Devices that accept data from the outside computer and transfer into CPU are called input devices. An input device is a peripheral used to provide data and control signals to an information processing system such as a computer or information appliance. Examples of input devices include keyboards, mouse, scanners, digital cameras and joysticks.

RRB JE IT CBT 2 Full Test 1 - Question 37

In Microsoft Excel, down arrow key stroke leads to _________ cell movement on spreadsheet.

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 37

In Microsoft Excel, down arrow key leads to One Cell down movement.

  • Just like down key, every arrow key performs the same function i.e. right arrow key when pressed leads to one cell right movement, left arrow key lead to one cell left movement etc.
RRB JE IT CBT 2 Full Test 1 - Question 38

What does TCP stand for with respect to computer networks?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 38

The Transmission Control Protocol (TCP) is one of the main protocols of the Internet protocol suite. It originated in the initial network implementation in which it complemented the Internet Protocol (IP). Therefore, the entire suite is commonly referred to as TCP/IP

RRB JE IT CBT 2 Full Test 1 - Question 39

What is the formula of Ethanoic acid?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 39
  • Acetic acid, commonly named ethanoic acid, is a colorless liquid organic compound with the chemical formula CH3COOH.
  • When undiluted, it is sometimes called glacial acetic acid.
RRB JE IT CBT 2 Full Test 1 - Question 40

Which of the following symbols is used in UNIX to run a job in the background?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 40

In UNIX & processes command in the background. If a command is terminated by the control operator &, the shell executes the command in the background in a subshell. The shell does not wait for the command to finish, and the return status is 0.

RRB JE IT CBT 2 Full Test 1 - Question 41

The only Viceroy to be assassinated in India was ________.

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 41
  • Richard Southwell Bourke, 6th Earl of Mayo also known as Lord Mayo in India was the only viceroy to be assassinated in India.
  • Sher Ali Afridi on 8th Feb 1872, assassinated Lord Mayo, the then viceroy of India, in Port Blair.
  • TRICK"Mayo" sounds like "maaro" (to kill) similar to assassination.
RRB JE IT CBT 2 Full Test 1 - Question 42

Which among the following is/are output devices?
I. Scanner
II. Speaker
III. Plotter

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 42

An input device is any hardware device that sends data to a computer, allowing you to interact with and control it.

An output device is any hardware that sends data from a computer to another device mostly in form of audio or video.

  • Scanner scans any document and sends it to computer, so it is a input device.
  • Speaker gets data from computer in form of audio. So it is a output device.
  • Plotter is printer that print vector image. It recieve data from computer and print it on paper. So it is also a output device.
RRB JE IT CBT 2 Full Test 1 - Question 43

Which of the following has the least worst time complexity?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 43

Worst time complexity is as follows:
Bubble Sort - O(N2)
Merge Sort - O(N log N)
Insertion Sort - O(N2)
Selection Sort - O(N2)

RRB JE IT CBT 2 Full Test 1 - Question 44

Which of the following living beings is most likely to produce greenhouse gases?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 44

Green plants are most likely to produce greenhouse gases.

  • Greenhouse gases consists gases such as carbon dioxide, methane, water vapour, nitrous oxide and ozone.
  • These gases absorbs heat which produced from the Sun.
  • A greenhouse is called so because it is a house which contains green things such as plants and beneficial gasses.
RRB JE IT CBT 2 Full Test 1 - Question 45

Which of the following is a critical element of software quality assurance and represents the ultimate review of specification, design, and code generation?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 45

Software testing is an investigation conducted to provide stakeholders with information about the quality of the software product or service under test.

Once source code has been generated, software must be tested to uncover as many errors as possible before delivery to the customer.
Reviews and other SQA activities can and do uncover errors, but they are not sufficient. Hence, there is a need to execute the program before it gets to the customer with the specific intent of finding and removing all errors.

RRB JE IT CBT 2 Full Test 1 - Question 46

Which of the following executes as a single statement?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 46

SQL is a single query that is used to perform DML and DDL operations. It executes as a single statement.
PL/SQL is a block of codes that used to write the entire program blocks.

RRB JE IT CBT 2 Full Test 1 - Question 47

The 9’s complement of 012398 is:

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 47

The 9’s complement is obtained by subtracting each number from 9
999999
- 012398
987602

RRB JE IT CBT 2 Full Test 1 - Question 48

Which of the following is, "A device used to connect two separate Ethernet networks into one extended Ethernet."?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 48

An Ethernet network bridge is a device which connects two different local area networks together into one extended Ethernet. For this both networks must connect using the same Ethernet protocol.

RRB JE IT CBT 2 Full Test 1 - Question 49

<a> and </a> tags are used for 

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 49

<a> tag si used to add links to webpage.

The <a> tag defines a hyperlink, which is used to link from one page to another.

Attribute ‘href’ indicates the link's destination.

RRB JE IT CBT 2 Full Test 1 - Question 50

The Laboratory apparatus are made of ________.

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 50
  • The Laboratory apparatus are made of pyrex glass. Pyrex glasses are borosilicate glasses.
  • Some of the basic laboratory apparatus comprise of a volumetric flask, graduated cylinder, funnel, and beaker.
  • Flint glasses are durable and heavy characterized by their high refractive quality, clarity, and brilliance.
  • Crookes glasses are those which are designed to diminish the transmission of UV rays.
RRB JE IT CBT 2 Full Test 1 - Question 51

"Forests" is listed in the _________ list given in the Seventh Schedule in the Constitution of India.

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 51

Through the 42nd Amendment Act of 1976 five subjects were transferred from State to Concurrent List.
They are:
1. Education
2. Forests
3. Weights & Measures
4. Protection of Wild Animals and Birds
5. Administration of Justice

RRB JE IT CBT 2 Full Test 1 - Question 52

Excess nitrate in drinking water can cause

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 52


An illness that begins when large amounts of nitrates in water are ingested by an infant and converted to nitrite by the digestive system. The nitrite then reacts with oxy-haemoglobin (the oxygen-carrying blood protein) to form metheglobin, which cannot carry oxygen. If a large enough amount of metheglobin is formed in the blood, body tissues may be deprived of oxygen, causing the infant to develop a blue coloration of their mucous membranes and possibly digestive and respiratory problems. This condition is also known as methemoglobinemia

RRB JE IT CBT 2 Full Test 1 - Question 53

Why is the Caps Lock key referred to as a toggle key?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 53

A toggle key toggles the input from other keys on the keyboard between different input modes.

  • The most commonly used toggle key is the caps lock key, which alternates the letter keys between uppercase and lowercase
  • Num lock is another toggle key which helps to input numerals from the numeric keyboard and is turned on by default
  • Scroll lock key allows arrow keys to scroll through window's contents and allows users to scroll without depending on the scroll bar
  • The insert key is another example of a toggle key, and it toggles between overtype mode and insert mode while entering text
RRB JE IT CBT 2 Full Test 1 - Question 54

Which of the following is used to retrieve the information through URL (e.g. http://XYZ.com) on the world wide web?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 54
  • web browser is a software application for accessing information on the World Wide Web
  • URL is an acronym for Uniform Resource Locator, It is a reference to the resource on the internet
  • client is a computer that connects to and uses the resources of a remote computer, or server
  • The server handles the request from the web browser and sends back a response to build a connection to provide web services
  • Cookies are messages that web servers pass to the web browser when user visit Internet sites
RRB JE IT CBT 2 Full Test 1 - Question 55

Which of the following is not a life cycle model?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 55

Capability Maturity Model (CMM) specifies an increasing series of levels of a software development organization. The higher the level, the better the software development process, hence reaching each level is an expensive and time-consuming process. Unlike other models, it is not a life cycle model.

RRB JE IT CBT 2 Full Test 1 - Question 56

Which one of the following polymeric materials is used  for making bulletproof jackets?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 56
  • Kevlar is used for making bulletproof jackets.
  • Kevlar is a synthetic fiber and heat-resistant.
  • It absorbs the energy of a bullet and extends it over a larger area.
  • It consists of many application which includes racing sails, bicycle tyres, bulletproof jackets, and vests.
  • It was developed by an American scientist Stephanie Kwolek in the year 1965.

RRB JE IT CBT 2 Full Test 1 - Question 57

How many times the following loop is executed?

         for(int i = 0; i < 7; i++) {

                printf(“Hello World”);

                }

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 57

A loop is used for executing a block of statements repeatedly until a given condition returns false.

Syntax of for loop:

for (initialization; condition test; increment or decrement)

{

//Statements to be executed repeatedly

}

Loop is executed from i = 0 to 6. i.e. 7 times

RRB JE IT CBT 2 Full Test 1 - Question 58

A computer virus is a

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 58

A computer Virus is a malicious software that, when executed replicates itself by modifying other computer programs.

The full of VIRUS is Vital Information Recourse Under Siege, because they replicate and multiply and use up computer memory processing power with fake repetitive commands. It causes the system to become slow and keeps hanging.

RRB JE IT CBT 2 Full Test 1 - Question 59

Consider the following:
1. Carbon dioxide
2. Oxides of Nitrogen
3. Oxides of Sulphur

Q. Which of the above is/are the emission/emission from coal combustion at thermal power plants?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 59
  • Carbon dioxide is the emission/emission from coal combustion at thermal power plants.
  • Along with carbon dioxide, sulphur dioxide and nitrogen dioxide are also gaseous emissions which leads to global warming and acid rain.
  • These emissions are formed due to the combustion process when coal is burned to produce heat.
  • However, emissions depend on the quantity of coal used and the amount of sulphur present in the coal.
RRB JE IT CBT 2 Full Test 1 - Question 60

Fly ash is the environmental pollutant generated by

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 60

Fly ash, also known as "pulverised fuel ash" is a coal combustion product composed of fine particles that are driven out of the boiler with the flue gases in thermal power plant.

RRB JE IT CBT 2 Full Test 1 - Question 61

vi editor in UNIX is also called as ___________.

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 61

The vi editor is also called as visual editor. It is a screen-oriented text editor originally created for the Unix operating system. Using vi editor, one can edit an existing file or create a new file.

RRB JE IT CBT 2 Full Test 1 - Question 62

Accuracy of ADC can be increase by:

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 62

There are two ways to best improve the accuracy of A/D conversion:

  • increasing the resolution which improves the accuracy in measuring the amplitude of the analogue signal
  • increasing the sampling rate which increases the maximum frequency that can be measured
RRB JE IT CBT 2 Full Test 1 - Question 63

Typical Data rate for coaxial cables is:

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 63
  • The data rate of coaxial cable depends on physical properties of cable, but 10 Mbps is typical
  • The data rate for optical fibre is 1 Gbps

RRB JE IT CBT 2 Full Test 1 - Question 64

What are the different sections of PL/SQL block?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 64

PL/SQL blocks have a pre-defined structure in which the code is to be grouped. Below are different sections of PL/SQL blocks.

  • Declaration section
  • Execution section
  • Exception-Handling section

Out of which only execution section is mandatory.

RRB JE IT CBT 2 Full Test 1 - Question 65

The Gross Domestic Product of a country is defined as which among the following?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 65
  • The Gross Domestic Product is defined as the total value of the finished goods and services produced within the boundary of a country in a financial year. 
  • The GDP of India has shown a growth of 8.2% in the first quarter of the FY 2018-19. 
RRB JE IT CBT 2 Full Test 1 - Question 66

When you start MS Access, how many categories under “Available Templates” can be found?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 66
  • Total 5 categories under “Available Templates” can be found
  • These include: Blank database, Blank web database, Recent templates, Sample templates and My templates
  • MS Access is one of the applications found in the MS Office
RRB JE IT CBT 2 Full Test 1 - Question 67

Who among the following has won Australian Open Men’s Singles 2019 title at Melbourn?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 67
  • Novak Djokovic defeated Rafael Nadal to win his 7th Australian Open Men’s Singles title at Melbourn.
  • The resurgent world No. 1 outplayed the second-ranked Nadal 6-3, 6-2, 6-3 in a largely one-sided match.
  • In Women’s Singles, Japan’s Naomi Osaka clinched her maiden Australian Open Grand Slam Singles title in Melbourne.
RRB JE IT CBT 2 Full Test 1 - Question 68

Which restraining factor should be considered by a system engineer while constructing a system model?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 68

System engineering is a modelling process. It defines the processes that serve the needs of the view under consideration. It represents the behaviour of the processes and the assumptions on which the behaviour is based. It explicitly defines both exogenous and endogenous input to the model.
A system engineer considers the following factors when developing alternative solutions: assumptions, simplifications, limitations, constraints, and customer preferences.

RRB JE IT CBT 2 Full Test 1 - Question 69

Which of the following application layer protocol provides electronic mail internet service?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 69

SMTP: simple mail transfer protocol is used for sending e-mail services between the servers.
HTTP: Hypertext transfer protocol for distributed, collaborative, hypermedia information systems.
FTP: It is an application layer protocol for file transfer
SIP: The Session Initiation Protocol (SIP) is a communications protocol for signalling and controlling multimedia communication sessions.

RRB JE IT CBT 2 Full Test 1 - Question 70

Which of the following is not a PL/SQL unit?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 70

PL/SQL block contains the SQL instruction that used to interact with the database server.

All the PL/SQL units are treated as PL/SQL blocks.

Following are the different type of PL/SQL units:

  • Anonymous Block
  • Function
  • Library
  • Procedure
  • Package Body
  • Package Specification
  • Trigger
  • Type
  • Type Body
RRB JE IT CBT 2 Full Test 1 - Question 71

What is Syzygy?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 71
  • When two or more celestial bodies arrange themselves in a straight line due to their own revolution it is known as a syzygy.
  • All eclipses are syzygy but, not all syzygy are eclipses.
  • For example, the full moon and new moon are syzygy involving the lining up of the Sun, Earth and Moon so, lunar and solar eclipses are syzygy.
RRB JE IT CBT 2 Full Test 1 - Question 72

The output will be LOW for any case when one or more inputs are zero in a/an _______

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 72

The truth table of AND gate is shown:

Whenever one or more inputs are low, the output is low.

RRB JE IT CBT 2 Full Test 1 - Question 73

Which of the following functionality correctly determines the responsibility of physical layer

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 73

Line coding:
a line code is a code chosen for use within a communications system for transmitting a digital signal down a line. Line coding is often used for digital data transport.

Channel coding:
This typically involves the removal of redundancy and the correction (or detection) of errors in the transmitted data. 

Modulation:
In electronics and telecommunications, modulation is the process of varying one or more properties of a periodic waveform, called the carrier signal, with a modulating signal that typically contains information to be transmitted.

RRB JE IT CBT 2 Full Test 1 - Question 74

Which of the following keywords are used to manage execution of create trigger statement?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 74

The BEFORE or AFTER option in the CREATE TRIGGER statement specifies exactly when to fire the trigger body in relation to the triggering statement that is being run.

In a CREATE TRIGGER statement, the BEFORE or AFTER option is specified just before the triggering statement.

RRB JE IT CBT 2 Full Test 1 - Question 75

Which of the following folk/tribal dances is associated with Karnataka?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 75

Yakshagana is a popular folk-theatre form of Karnataka with a long history of nearly four hundred years. It is a unique harmony of musical tradition, eye-catching costumes, and authentic styles of dance, improvised gestures and acting with its extemporaneous dialogue appealing to a wide range of the community. It is a vibrant and vigorous living form of theatre art.

RRB JE IT CBT 2 Full Test 1 - Question 76

In a pointer to structure, which operator is used to access data members of a structure?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 76

Pointers to structures are so frequently used that an alternative notation is provided as a shorthand. If p is a pointer to a structure, then
p -> member-of-structure refers to the particular member.

The operator -> is a minus sign immediately followed by >.
For a pointer to structure node, data members x can be accessed as a node -> x.

RRB JE IT CBT 2 Full Test 1 - Question 77

Which one of the following is not a real time operating system?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 77

A real-time operating system (RTOS) is any operating system (OS) intended to serve real-time applications that process data as it comes in, typically without buffer delays.

Palm OS (also known as Garnet OS) is a mobile operating system initially developed by Palm, Inc., for personal digital assistants (PDAs) in 1996. Palm OS was designed for ease of use with a touchscreen-based graphical user interface. It is provided with a suite of basic applications for personal information management. 

RRB JE IT CBT 2 Full Test 1 - Question 78

The simplified Boolean expression of the output is:

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 78

Y = (A + B)’.A
Y = A’.B’.A
Y = 0 (because A.A’ = 0)

RRB JE IT CBT 2 Full Test 1 - Question 79

Which of the following is NOT desired in a good Software Requirement Specifications (SRS) document?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 79

A software requirements specification (SRS) is a description of a software system to be developed. The software requirements specification lays out functional and non-functional requirements, and it may include a set of use cases that describe user interactions that the software must provide.

RRB JE IT CBT 2 Full Test 1 - Question 80

Nowadays computers all over the world can talk to each other. What is one of the special accessories essential for this purpose?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 80

A modem is a device or program that enables a computer to transmit data over, for example, telephone or cable lines. A Modem performs modulation and demodulation of the signals. Computer information is stored digitally, whereas information transmitted over telephone lines is transmitted in the form of analogue waves.

RRB JE IT CBT 2 Full Test 1 - Question 81

Kawal Tiger Reserve is in ________

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 81

Kawal Tiger Reserve is located at Jannaram mandal of Mancherial District in Telangana state of India.

RRB JE IT CBT 2 Full Test 1 - Question 82

A command ifconfig is used to

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 82

The ifconfig command can be used from the command line either to assign an address to a network interface or to configure or display the current network interface configuration information.

The ifconfig command must be used at system startup to define the network address of each interface present on a machine.

RRB JE IT CBT 2 Full Test 1 - Question 83

In a computer, a compiler is

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 83

A Compiler is a computer program that translates code written in a high-level language to a lower level language, object/machine code. The most common reason for translating source code is to create an executable program.

An assembler translates assembly language into machine code.

RRB JE IT CBT 2 Full Test 1 - Question 84

Compiler and interpreters are examples of:

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 84

A compiler is a computer program (or a set of programs) that convert the source code (written in the high-level language) into machine language.

An interpreter is a computer program that directly executes, i.e. performs, instructions written in a programming or scripting language, without previously compiling them into a machine language program.

Application software (an application) is a set of computer programs designed to permit the user to perform a group of coordinated functions, tasks, or activities.

The programs that are part of the system software include assemblers, compilers, file management tools, system utilities, and debuggers.

RRB JE IT CBT 2 Full Test 1 - Question 85

Data is a ______ material and information is _______ data.

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 85

DATA is a raw material. Collecting data costs money and hence one must collect necessary and sufficient data. Data is generally used by machines and is useless unless it is processed to create INFORMATION.

RRB JE IT CBT 2 Full Test 1 - Question 86

What is the syntax to create a new file in vi editor?

Detailed Solution for RRB JE IT CBT 2 Full Test 1 - Question 86

The vi editor is a screen-oriented text editor originally created for the Unix operating system. Using vi editor, one can edit an existing file or create a new file.

Syntax to create a new file: vi filename

RRB JE IT CBT 2 Full Test 1 - Question 87

Which of the following is not used to delete data from database table?