RRB JE IT (CBT II) Mock Test- 3


Test Description

150 Questions MCQ Test RRB JE Mock Test Series for Computer Science Engineering | RRB JE IT (CBT II) Mock Test- 3

RRB JE IT (CBT II) Mock Test- 3 for Railways 2023 is part of RRB JE Mock Test Series for Computer Science Engineering preparation. The RRB JE IT (CBT II) Mock Test- 3 questions and answers have been prepared according to the Railways exam syllabus.The RRB JE IT (CBT II) Mock Test- 3 MCQs are made for Railways 2023 Exam. Find important definitions, questions, notes, meanings, examples, exercises, MCQs and online tests for RRB JE IT (CBT II) Mock Test- 3 below.
Solutions of RRB JE IT (CBT II) Mock Test- 3 questions in English are available as part of our RRB JE Mock Test Series for Computer Science Engineering for Railways & RRB JE IT (CBT II) Mock Test- 3 solutions in Hindi for RRB JE Mock Test Series for Computer Science Engineering course. Download more important topics, notes, lectures and mock test series for Railways Exam by signing up for free. Attempt RRB JE IT (CBT II) Mock Test- 3 | 150 questions in 120 minutes | Mock test for Railways preparation | Free important questions MCQ to study RRB JE Mock Test Series for Computer Science Engineering for Railways Exam | Download free PDF with solutions
1 Crore+ students have signed up on EduRev. Have you? Download the App
RRB JE IT (CBT II) Mock Test- 3 - Question 1

Radiation burns mainly due to _________.

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 1 Depending on the photon energy, gamma radiation can cause very deep burns, with 60Co internal burns, which are common. Beta burns tend to be shallow as beta particles are not able to penetrate deep into the person; these burns can be similar to sunburn. Alpha rays don't penetrate very deeply into the skin.
RRB JE IT (CBT II) Mock Test- 3 - Question 2

What is the frequency of alternating current which is used in the house?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 2 The frequency of A.C used in house is 50Hz which implies the change of direction of current every 50 second.
RRB JE IT (CBT II) Mock Test- 3 - Question 3

Which of the following standard library functions returns the length of the string?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 3 The internal representation of a string has a null character ‘\0’ at the end, so the physical storage required is one more than the number of characters written between the quotes.

The standard library function strlen(s) returns the length of its character string argument s, excluding the terminal ‘\0’.

RRB JE IT (CBT II) Mock Test- 3 - Question 4

The command line arguments are handled using main() function arguments where ______ refers to the number of arguments passed.

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 4 When main is called, it is called with two arguments. The first i.e. argc (argument count) is the number of command-line arguments the program was invoked with; the second i.e. argv (argument vector), is a pointer to an array of character strings that contain the arguments, one per string.
RRB JE IT (CBT II) Mock Test- 3 - Question 5

What is the default line spacing in the MS word?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 5 The line spacing is the amount of space between lines of text, or between paragraphs for an entire document or for portions of a document.

The default line spacing in Word is 1.15. By default, paragraphs are followed by a blank line and headings have a space above them.

RRB JE IT (CBT II) Mock Test- 3 - Question 6

In MS Excel, ctrl + ; is used to insert _________ in the workbook.

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 6 In MS Excel, ctrl +: is used to insert current time in the workbook.

Ctrl +; is used to insert the current date in the workbook.

Formula ‘ = TEXT (CELL, “dddd”)’ is used to get the day's name from the given date.

RRB JE IT (CBT II) Mock Test- 3 - Question 7

Which of the following is not a multitasking operating system

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 7 A disk operating system (DOS) is a computer operating system that can use a disk storage device, such as a floppy disk, hard disk drive, or optical disc.

In DOS, multiple tasks were done one after the other while windows, Linux and Unix are the multitasking and multi-threading operating systems.

RRB JE IT (CBT II) Mock Test- 3 - Question 8

Which of the following features is independent of CPU and allows certain hardware subsystems to access random access memory?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 8 Direct Memory Access (DMA) involves an additional module on the system bus. The DMA module is capable of mimicking the processor and, indeed, of taking over control of the system from the processor.

For this purpose, the DMA module must use the bus only when the processor does not need it, or it must force the processor to suspend operation temporarily.

RRB JE IT (CBT II) Mock Test- 3 - Question 9

The signed magnitude representation of 0 in 4-bit representation is:

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 9 In sign-magnitude representation, 0 can be written as +0 or – 0

+0 → 0000

-0 → 1000

RRB JE IT (CBT II) Mock Test- 3 - Question 10

Natural rubber is a polymer of __________.

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 10 Natural rubber is an additional polymer that is obtained as a milky white fluid known as latex from a tropical rubber tree. Natural rubber is from the monomer isoprene.
RRB JE IT (CBT II) Mock Test- 3 - Question 11

In MS Excel, ‘highlighting cells rule’ comes under which of the following panes?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 11 Conditional formatting is used to apply formatting automatically such as colors, icons, and data bars to one or more cells based on the cell value. Conditional formatting provides another way to visualize data and make worksheets easier to understand.

Users can quickly see which cells contain values less than 50% by using ‘Highlight Cell Rules’.

RRB JE IT (CBT II) Mock Test- 3 - Question 12

Which of the following is also called a 1 – operand machine?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 12 1-operand (one-address machines), so-called accumulator machines. Most instructions specify a single right operand, with the implicit accumulator as the left operand.

e.g. load a, add b, store c.

RRB JE IT (CBT II) Mock Test- 3 - Question 13

Which of the following is also called as transparent flip flop:

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 13 The truth table of D flip flop is shown

When the clock is high, the Output Q follows the input. Hence D flip flop is known as the transparent flip flop.

RRB JE IT (CBT II) Mock Test- 3 - Question 14

Which gate is best used as a basic comparator?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 14 Exclusive-OR can be used as a basic comparator.

The truth table of XOR gate is shown :

From the truth table, it is clear that when both the inputs are the same (either (0,0) or (1,1)) the output is zero and when both the inputs are different (either (0,1) or (1,0)), the output is 1.

RRB JE IT (CBT II) Mock Test- 3 - Question 15

Which task region in the spiral model is used to build one or more representations of the application?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 15 A spiral model is divided into several framework activities, also called task regions. Typically, there are between three and six task regions.

Customer communication - tasks required to establish effective communication between developer and customer.

Planning - tasks required to define resources, timelines, and other project related information.

Risk analysis - tasks required to assess both technical and management risks.

Engineering - tasks required to build one or more representations of the application.

Construction and release - tasks required to construct, test, install, and provide user support (e.g., documentation and training).

Customer evaluation - tasks required to obtain customer feedback based on evaluation of the software representations created during the engineering stage and implemented during the installation stage.

RRB JE IT (CBT II) Mock Test- 3 - Question 16

__________ refers to the set of activities that ensure that software correctly implements a specific function.

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 16 Verification refers to the set of activities that ensure that software correctly implements a specific function. Validation refers to a different set of activities that ensure that the software that has been built is traceable to customer requirements.

Verification and validation encompasses a wide array of software quality assurance (SQA) activities that include formal technical reviews, quality and configuration audits, performance monitoring, simulation, feasibility study, documentation review, database review, algorithm analysis, development testing, qualification testing, and installation testing.

RRB JE IT (CBT II) Mock Test- 3 - Question 17

Data and Time are available on the desktop at _______.

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 17 A taskbar is an element of a graphical user interface which has various purposes. It typically shows which programs are currently running. Data and Time are available on the desktop at taskbar
RRB JE IT (CBT II) Mock Test- 3 - Question 18

The most acceptable range of LEO (Low Earth Orbit) is________.

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 18 The most acceptable range of LEO (Low Earth orbit) is 160–2,000 kms. A low Earth orbit is defined by Space-Track.org as an Earth-centered orbit with at least 11.25 periods per day and an eccentricity less than 0.25. Most of the manmade objects in space are in LEO orbits.
RRB JE IT (CBT II) Mock Test- 3 - Question 19

Which of the following is Marsh Gas?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 19 Methane is called Marsh Gas. Because it is produced when vegetation decomposes naturally within some geographical marshes, swamps, and bogs. The main process for the production of methane is anaerobic digestion.
RRB JE IT (CBT II) Mock Test- 3 - Question 20

The least distance of distinct vision for a young adult with normal vision is about

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 20 The least distance of distinct vision for a young adult with normal vision is 25 cm.
RRB JE IT (CBT II) Mock Test- 3 - Question 21

The network database model can be organized as _________.

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 21 The network model is a database model conceived as a flexible way of representing objects and their relationships. Its distinguishing feature is that the schema, viewed as a graph in which object types are nodes and relationship types are arcs, is not restricted to being a hierarchy or lattice.
RRB JE IT (CBT II) Mock Test- 3 - Question 22

__________ uses a series of phases, called the systems development life cycle (SDLC), to plan, analyze, design, implement, and support an information system.

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 22 Structured analysis is a traditional systems development technique that is time-tested and easy to understand. Structured analysis uses a series of phases, called the systems development life cycle (SDLC), to plan, analyze, design, implement, and support an information system.

Structured analysis is based on an overall plan which is similar to a blueprint for constructing a building, so it is called a predictive approach.

RRB JE IT (CBT II) Mock Test- 3 - Question 23

In Microsoft Word, File, edit, view etc. are provided in _______________.

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 23 A menu bar is a graphical control element which has drop-down menus. Its purpose is to supply a common housing for window-or application-specific menus which provide access to such functions as opening files, interacting with an application, or displaying help documentation or manuals.
RRB JE IT (CBT II) Mock Test- 3 - Question 24

__________ is any combination of columns that uniquely identifies a row in a table.

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 24 A superkey is a set of one or more attributes that, collectively, allow us to identify uniquely a tuple in the relation.

The minimal set of attributes that can uniquely identify a tuple is known as the candidate key.

A relation r1 may include among its attributes the primary key of another relation r2. This attribute is called a foreign key from r1, referencing r2.

RRB JE IT (CBT II) Mock Test- 3 - Question 25

Which among the following cannot be considered as a measure of improvement or national development?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 25 National development is the ability of a country or countries to improve the social welfare of the people e.g. by providing social amenities like quality education, potable water, transportation infrastructure, medical care, etc. The HDI (Human Development Index) is a way to measure well-being within a country. The human development index, composed of three indicators: life expectancy, education (adult literacy and combined secondary and tertiary school enrollment) and real GDP per capita.
RRB JE IT (CBT II) Mock Test- 3 - Question 26

Which of the following components of Microsoft Windows provides the ability to view and change system settings?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 26 The control panel is a software module used to perform administrative and management operating system tasks and provides access to specific software features.

The control panel is used to configure and manage almost all aspects of Windows.

RRB JE IT (CBT II) Mock Test- 3 - Question 27

Bar is one of the units of __________.

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 27 A bar is a unit of pressure defined as 100 kilopascals. It is about equal to the atmospheric pressure on Earth at sea level. Other units derived from the bar are the megabar, kilobar, decibar, centibar, and millibar.
RRB JE IT (CBT II) Mock Test- 3 - Question 28

Which one of the following is not an example of a hardware device?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 28
  • Computer hardware includes the physical parts or components of a computer, such as the central processing unit, monitor, keyboard, computer data storage, graphics card, sound card, speakers, mouse, and motherboard.

  • Microsoft Office is a family of client software, server software, and services developed by Microsoft.

RRB JE IT (CBT II) Mock Test- 3 - Question 29

The stability of a pond or ecosystem depends on which of the following?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 29 A pond is an excellent example of a self-sustaining and self-sufficient ecosystem i.e. both the abiotic and biotic components of this ecosystem exist in equilibrium. The stability of a pond of ecosystem depends on producers and consumers both.
RRB JE IT (CBT II) Mock Test- 3 - Question 30

Which of the following can be used to create a new data type name in the C programming language?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 30 C provides a facility called typedef for creating new data type names.

For example, typedef int Point; makes the name Point a synonym for int. The type Point can be used in the declaration in exactly the same ways that the type int can be:

Point x, y;

Point *z[];

RRB JE IT (CBT II) Mock Test- 3 - Question 31

Which of the following commands is used to check disk errors in windows?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 31 chkdsk checks the file system and file system metadata of a volume for logical and physical errors. If used without parameters, chkdsk displays only the status of the volume and does not fix any errors. If used with the /f, /r, /x, or /b parameters, it fixes errors on the volume.
RRB JE IT (CBT II) Mock Test- 3 - Question 32

The simplification of Boolean function BC + BC’ + BA gives:

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 32

The given Boolean function is :

Y = BC + BC’ + BA

Y = B(C + C’ + A)

Using the identity C + C’ = 1

Y = B (1 + A)

Using the identity 1 + A = 1

Y = B.1 = B

RRB JE IT (CBT II) Mock Test- 3 - Question 33

The angle between the magnetic meridian and the geographical meridian at a place is _________.

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 33 The angle between the magnetic meridian and the geographic meridian at a place is called declination at that place.
RRB JE IT (CBT II) Mock Test- 3 - Question 34

Elements in a period have same-

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 34
  • A period in the periodic table is a horizontal row.

  • All elements in a row have the same number of electron shells.

  • Groups of elements in the same column have similar chemical and physical properties, reflecting the periodic law.

RRB JE IT (CBT II) Mock Test- 3 - Question 35

What is the pictorial representation of an algorithm called?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 35
  • A flowchart is the graphical or pictorial representation of an algorithm with the help of different symbols, shapes and arrows in order to demonstrate a process or a program.

  • With algorithms, we can easily understand a program.

RRB JE IT (CBT II) Mock Test- 3 - Question 36

The objective of _________ is to gather data about project usability, costs, benefits, and schedules.

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 36 The objective of fact-finding is to gather data about project usability, costs, benefits, and schedules. Depending on what information is needed to investigate the system's request, fact-finding might consume several hours, days, or weeks. During fact-finding, analysts analyze organization charts, conduct interviews, review current documentation, observe operations, and carry out a user survey.
RRB JE IT (CBT II) Mock Test- 3 - Question 37

Which of the following file system is not supported by the windows

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 37 Microsoft Windows employs two major file systems: NTFS and FAT.

NTFS (New Technology File System) was introduced in 1993 with Windows NT and is currently the most common file system for the end user computers based on Windows.

FAT (File Allocation Table) is one of the simplest file system types, which has been around since the 1980s.

ReFS (Resilient File System) file system was developed by Microsoft as a new generation file system for server computers starting from Windows Server 2012.

HFS (Hierarchical File System) is a proprietary file system developed by Apple Inc. for use in computer systems running Mac OS.

RRB JE IT (CBT II) Mock Test- 3 - Question 38

Which of the following ‘BASIC’ command wipes all the text that were printed to the screen?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 38 BASIC stands for "Beginner's All-purpose Symbolic Instruction Code." BASIC is a family of general-purpose, high-level programming languages whose design philosophy emphasizes ease of use.

Commands:

CLS:

It is an abbreviation that stands for the words CLear Screen. It is used to clear the screen or console window of commands and any output generated by them.

PRINT:

This command writes to the screen. Each new PRINT command will start printing on a new line.

END:

It stops the program at that line; that is, anything that's added after that won't show.

RRB JE IT (CBT II) Mock Test- 3 - Question 39

Which of the following models delivers software in small but usable pieces?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 39 The incremental model combines elements of the linear sequential model with the iterative philosophy of prototyping.

The incremental model delivers software in small but usable pieces, called increments. In general, each increment builds on those that have already been delivered.

RRB JE IT (CBT II) Mock Test- 3 - Question 40

Who of the following drafted the 'Pakistan Resolution'?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 40
  • The Lahore Resolution, commonly known as the Pakistan Resolution was a political resolution, or statement drafted in March 1940, by the 25-member Working Committee of the All-India Muslim League, and then formally adopted by the Muslim League membership at its general session on 23 March 1940, held at Lahore.

  • The resolution was presented at Minto Park, in Lahore, by Maulvi A.K. Fazlul Huq on the instructions of the Working Committee.

RRB JE IT (CBT II) Mock Test- 3 - Question 41

Among the following statements, the incorrect one is:-

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 41

Among the given options all are correct except argentite and cuprite. Cuprite is not an oxide.

Calamine ZnCO3 and Siderite FeCO3 .

Argentite Ag2S and Cuprite Cu2O .

Zinc blende ZnS and Pyrites FeS2 .

Malachite CuCO3.Cu(OH)2 and Azurite Cu3(CO3)2(OH)2 .

RRB JE IT (CBT II) Mock Test- 3 - Question 42

Consider the following statements:

I. Control hierarchy represents the organization of program components.

II. It represents a procedural aspect of software such as a sequence of process

III. The control hierarchy represents connectivity and visibility

Which of the above statements is true?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 42 Control hierarchy, also called program structure, represents the organization of program components and implies a hierarchy of control. It does not represent procedural aspects of software such as a sequence of processes, occurrence or order of decisions, or repetition of operations; nor is it necessarily applicable to all architectural styles.

The control hierarchy also represents two subtly different characteristics of the software architecture: visibility and connectivity.

RRB JE IT (CBT II) Mock Test- 3 - Question 43

Which of the following is the capital cost in a nuclear power plant?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 43 Nuclear fuel in a nuclear reactor may remain for more than 5 years. So the cost of fuel injected initially is taken as capital cost and maybe a few crore rupees.
RRB JE IT (CBT II) Mock Test- 3 - Question 44

What is the end-product of the system analysis phase?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 44 The deliverable for the systems analysis phase is the system requirements specification. The system requirements specification describes management and user requirements, costs and benefits, and outlines alternative development strategies.
RRB JE IT (CBT II) Mock Test- 3 - Question 45

A system design is a ___________

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 45 Software design is both a process and a model. The design process is a sequence of steps that enable the designer to describe all aspects of the software to be built.

The design model is the equivalent of an architect’s plans for a house. The design model that is created for software provides a variety of different views of the computer software.

RRB JE IT (CBT II) Mock Test- 3 - Question 46

The Constitution of India was enforced on_______________.

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 46
  • On 29 August 1947, the Constituent Assembly set up a Drafting Committee under the Chairmanship of Dr. B.R. Ambedkar to prepare a draft Constitution for India.

  • The Constitution of India was adopted by the Constituent Assembly on 26th November, 1949 and came into force on 26th January, 1950.

RRB JE IT (CBT II) Mock Test- 3 - Question 47

Tension in the cable supporting an elevator is equal to the weight of the elevator. From this, we can conclude that the elevator is going up or down with a ______.

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 47 When tension in the cable is equal to the weight of the cable, the system is in equilibrium. It means the system is at rest or moving with uniform velocity.
RRB JE IT (CBT II) Mock Test- 3 - Question 48

Valency of an element depends on which of the following?

I. Number of losing an electron

II. Number of gaining an electron

III. Number of sharing electron

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 48 The valency of an atom is equal to the number of electrons in the outer shell if that number is four or less. The chemical properties of elements depend on an element's electron configuration. And valency depends on losing, gaining, and sharing electrons.
RRB JE IT (CBT II) Mock Test- 3 - Question 49

Which of the following types of mirrors is used in the headlamp of cars?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 49 Parabolic concave mirrors are used to collect energy from a distant source (for example, sound waves or incoming starlight). Since the principles of reflection are reversible, parabolic reflectors can also be used to focus radiation from an isotropic source into a narrow beam. In optics, parabolic mirrors are used to gather light in reflecting telescopes and solar furnaces, and project a beam of light in flashlights, searchlights, stage spotlights, and car headlights.
RRB JE IT (CBT II) Mock Test- 3 - Question 50

Coding is the process of _______.

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 50
  • Coding is the process of writing instructions that get executed by computers.

  • The instructions are written in a programming language which the computer can understand and use to perform a task or solve a problem.

RRB JE IT (CBT II) Mock Test- 3 - Question 51

Which of the following vi editor commands move the cursor to the end of the current line in the vi editor?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 51 The vi editor (visual editor) is the default text editor in many UNIX and UNIX-like Operating Systems including Linux. vi editor is an advanced text editor with many features. Command '$' moves the cursor to the end of the current line in the vi editor.
RRB JE IT (CBT II) Mock Test- 3 - Question 52

What is the difference between EPROM and ROM?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 52 EPROM and ROM both are made in hardware factories. EPROM can be erased and reprogrammed in a factory. ROM can be programmed only once and its data cannot be changed
RRB JE IT (CBT II) Mock Test- 3 - Question 53

Which of the following computer viruses actively attacks an antivirus program or programs to prevent detection?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 53 Retrovirus is a type of virus which tries to attack and disable the anti-virus application running on the computer. A retrovirus can be considered anti-antivirus. Some Retroviruses attack the anti-virus application and stop it from running or some other destroys the virus definition database.
RRB JE IT (CBT II) Mock Test- 3 - Question 54

Which of the following is a form of software that automatically displays ads such as banners or pop-ups when a user is online.

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 54 adware is a program that installs an additional component that feeds advertising, often by delivering pop-up ads or by installing a toolbar in your browser.
RRB JE IT (CBT II) Mock Test- 3 - Question 55

Which of the following is the practice of testing a computer system, network or web application to find vulnerabilities that an attacker could exploit?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 55 Penetration Testing is the name given to methodologies used to test networks, applications, and even people, for security holes. It is done by trained professionals who identify security vulnerabilities in the IT Systems of an organization, in order to eliminate them before hackers or unauthorized users exploit them.
RRB JE IT (CBT II) Mock Test- 3 - Question 56

In which of the following oops properties, different properties and functions of a real-world entity is grouped or embedded into a single element?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 56 Data Encapsulation is an Object-Oriented Programming concept that bind a group of related properties, functions, and other members are treated as a single unit.
RRB JE IT (CBT II) Mock Test- 3 - Question 57

Repeater works on which layer of OSI Model?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 57 A repeater operates at the physical layer. Its job is to regenerate the signal over the same network before the signal becomes too weak or corrupted so as to extend the length to which the signal can be transmitted over the same network. An important point to be noted about repeaters is that they do not amplify the signal. When the signal becomes weak, they copy the signal bit by bit and regenerate it at the original strength.
RRB JE IT (CBT II) Mock Test- 3 - Question 58

Which network topology is highly reliable?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 58 Mesh topology is highly reliable because it provides a diver set of transmission routes. If one segment of line fails, the rest of the lines are not affected. Because of its multiple transmission paths, mesh topology also provides a high level of availability.
RRB JE IT (CBT II) Mock Test- 3 - Question 59

Which of the following is provided by DHCP to the client?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 59 DHCP (Dynamic Host Configuration Protocol) is a network management protocol used to dynamically assign an Internet Protocol (IP) address to any device, or node, on a network so they can communicate using IP.
RRB JE IT (CBT II) Mock Test- 3 - Question 60

Which term is used to describe RAM?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 60 Dynamic RAM (DRAM), Static RAM (SRAM), Video RAM (VRAM) terms used to describe RAM.
RRB JE IT (CBT II) Mock Test- 3 - Question 61

The network that provides a constants bandwidth for the complete duration of a message transfer is:

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 61 Cell switching is associated with Asynchronous Transmission Mode (ATM) which is considered to be a high speed switching technology that attempts to overcome the speed problems faced by the shared media like Ethernet and FDDI. Cell switching uses a connection-oriented packet-switched network.
RRB JE IT (CBT II) Mock Test- 3 - Question 62

Why is the tower model of CPU most appropriate and used widely?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 62 Tower model Refers to a computer in which the power supply, motherboard, and mass storage devices are stacked on top of each other in a cabinet. The main advantage of tower models is that there are fewer space constraints, which makes installation of additional storage devices easier.
RRB JE IT (CBT II) Mock Test- 3 - Question 63

The address space of the 8086 microprocessor is.

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 63 Intel 8086 microprocessor is the enhanced version of Intel 8085 microprocessor. This was designed by Intel in 1976. The 8086 microprocessor is a16-bit, N-channel, HMOS microprocessor. Where the HMOS is used for "High speed Metal Oxide Semiconductor". Intel 8086 is built on a single semiconductor chip and packaged in a 40-pin IC package. The type of package is DIP (Dual In -line Package). Intel 8086 uses 20 address lines and 16 data- lines. It can directly address up to 220 = 1 Mbyte of memory. It consists of a powerful instruction set, which provides operations like division and multiplication very easily. 8086 is designed to operate in two modes, i.e. Minimum and Maximum mode.
RRB JE IT (CBT II) Mock Test- 3 - Question 64

What is wave soldering?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 64 The wave soldering technique is used to make PCBs in factories. Components are mounted on the PCB and then, a wave of solder material (a tin-and-lead mixture) is stuck on the lower side of the PCB so that all components are fixed (soldered) to the PCB in just one go.
RRB JE IT (CBT II) Mock Test- 3 - Question 65

MSI stands for

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 65 After the invention of IC chips the development of computers plunged into the next phase. Small Scale Integration and Medium Scale Integration (SSI and MSI) were used in the third generation of computers and Large Scale Integration and Very Large Scale Integration (LSI and VLSI) are being used in the fourth generation of computers. People are now expecting ULSI (Ultra Large Scale Integration) Circuits to be used for fifth generation computers.
RRB JE IT (CBT II) Mock Test- 3 - Question 66

Which data communication is used to send data over a serial communication link?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 66 Full-duplex data transmission means that data can be transmitted in both directions on a signal carrier at the same time. For example, on a local area network with a technology that has full-duplex transmission, one workstation can be sending data on the line while another workstation is receiving data.
RRB JE IT (CBT II) Mock Test- 3 - Question 67

WAN stands for

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 67 There are three different classes of computer network namely, Local Area Network (LAN) that covers a small geographical area such as a room, a building or a compound; Metropolitan Area Network (MAN) that has a citywide coverage; and Wide Area Network (WAN) that covers the whole globe or beyond the globe.
RRB JE IT (CBT II) Mock Test- 3 - Question 68

Which data structure is mainly used during shift reduction parsing?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 68 Shift Reduce parser attempts for the construction of parse in a similar manner as done in bottom up parsing i.e. the parse tree is constructed from leaves(bottom) to the root(up). A more general form of shift reduce parser is LR parser. This parser requires some data structures.
RRB JE IT (CBT II) Mock Test- 3 - Question 69

The advantage of using widgets is that they are-

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 69 Widgets are sizable so that the user can expand or shrink them as per his needs.
RRB JE IT (CBT II) Mock Test- 3 - Question 70

A full binary tree with n non leaf nodes contained.

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 70 Full Binary Tree A Binary Tree is full if every node has 0 or 2 children. Following are examples of a full binary tree. We can also say a full binary tree is a binary tree in which all nodes except leaves have two children.
RRB JE IT (CBT II) Mock Test- 3 - Question 71

What is the difference between an Applet and an Application?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 71 Applets are small programs that utilize an external API for its execution and are primarily used in internet computing. They can be transferred over the Internet from one computer to another and run using the Applet Viewer or any web browser that supports Java. An applet can support several applications such as executing arithmetic operations, the creation of animation, graphics displaying, and playing interactive games. An Application is a program which runs on an underlying operating system. These are generic in a sense and designed to perform a specific task directly for the user. The application can run with or without GUI. The application programs like spreadsheets, word processors, web browsers and compilers – describe the manners in which computer resources are utilized to resolve users’ computing issues. There are no security concerns while using an application; its cause is that applications are trustworthy.
RRB JE IT (CBT II) Mock Test- 3 - Question 72

Which of the following pair of keywords must you use when invoking a method that might throw an exception?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 72 When executing Java code, different errors can occur: coding errors made by the programmer, errors due to wrong input, or other unforeseeable things. When an error occurs, Java will normally stop and generate an error message. The technical term for this is: Java will throw an exception (throw an error). The try statement allows you to define a block of code to be tested for errors while it is being executed. The catch statement allows you to define a block of code to be executed, if an error occurs in the try block.
RRB JE IT (CBT II) Mock Test- 3 - Question 73

Databases that support OLTP are most often referred to as _____.

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 73 Databases that support OLTP are most often referred to as operational databases.
RRB JE IT (CBT II) Mock Test- 3 - Question 74

Which is a low – level language?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 74 A low-level language is a programming language that provides little or no abstraction of programming concepts and is very close to writing actual machine instructions. Two good examples of low-level languages are assembly and machine code
RRB JE IT (CBT II) Mock Test- 3 - Question 75

The shell does the following in Unix_____

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 75 A Shell provides you with an interface to the Unix system. It gathers input from you and executes programs based on that input. Shell is an environment in which we can run our commands, programs, and shell scripts.
RRB JE IT (CBT II) Mock Test- 3 - Question 76

Which one is the most important feature of a spiral model?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 76 The most important feature of the spiral model is Risk management.
RRB JE IT (CBT II) Mock Test- 3 - Question 77

What kind of Protocol is used to provide Internet access from mobile?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 77 Wireless Application Protocol (WAP) is a technical standard for accessing information over a mobile wireless network. A WAP browser is a web browser for mobile devices such as mobile phones that uses the protocol.
RRB JE IT (CBT II) Mock Test- 3 - Question 78

Default port for HTTP

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 78 HTTP means HyperText Transfer Protocol. HTTP is the underlying protocol used by the World Wide Web and this protocol defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands. HTTP uses port number 80.
RRB JE IT (CBT II) Mock Test- 3 - Question 79

What is data integrity?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 79 Data integrity is the overall completeness, accuracy and consistency of data. This can be indicated by the absence of alteration between two instances or between two updates of a data record, meaning data is intact and unchanged.
RRB JE IT (CBT II) Mock Test- 3 - Question 80

Which tracking program records every keystroke you make on the computer?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 80 Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored.
RRB JE IT (CBT II) Mock Test- 3 - Question 81

802.5 topology is called.

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 81 IEEE standard 802.5 used for token rings. Token ring is designed to use the ring topology and utilizes a token to control the transmission of data on the network.
RRB JE IT (CBT II) Mock Test- 3 - Question 82

What is the chief disadvantage of computer hardware technology, even if it is growing by leaps and bounds?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 82 Technological Obsolescence is the chief problem. Old computers are nothing but junk and their parts cannot be used. What is more, these parts are solid state devices and so they cannot degrade over time.
RRB JE IT (CBT II) Mock Test- 3 - Question 83

What is the full form of Wi-Fi?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 83 WiFi is a technology that uses radio waves to provide network connectivity. A WiFi connection is established using a wireless adapter to create hotspot area in the vicinity of a wireless router that are connected to the network and allow users to access internet services
RRB JE IT (CBT II) Mock Test- 3 - Question 84

C contains two special pointer operators.

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 84 There are two special operators that are used with pointers * and &. The & is a unary operator that returns the memory address of its operand and The second operator is *, and it is a complement of &. It is a unary operator that returns the value of the variable at the address specified by its operand.
RRB JE IT (CBT II) Mock Test- 3 - Question 85

In a star network configuration -

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 85 The star topology has one central computer and six or seven nodes connected to it directly.
RRB JE IT (CBT II) Mock Test- 3 - Question 86

Which of the following code detects and corrects errors in data?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 86 Hamming code is a set of error-correction codes that can be used to detect and correct the errors that can occur when the data is moved or stored from the sender to the receiver.
RRB JE IT (CBT II) Mock Test- 3 - Question 87

A system of concurrently processing programs submitted by different users is called:

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 87 Multiprogramming is a common approach to resource management. The essential components of a single-user operating system include a command processor, an input/ output control system, a file system, and a transient area. A multiprogramming operating system builds on this base, subdividing the transient area to hold several independent programs and adding resource management routines to the operating system's basic functions.
RRB JE IT (CBT II) Mock Test- 3 - Question 88

The ……….. is a hardware that identifies each node in a network uniquely.

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 88 A MAC (media access control) address is a unique numeric code that is permanently assigned to each unit of most types of networking hardware, such as network interface cards (NICs), by the manufacturer at the factory.
RRB JE IT (CBT II) Mock Test- 3 - Question 89

Open shortest path first (OSPF) is:

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 89 Open Shortest Path First (OSPF) is a link-state routing protocol which is used to find the best path between the source and the destination router using its own Shortest Path First). OSPF is developed by Internet Engineering Task Force (IETF) as one of the Interior Gateway Protocol (IGP), i.e, the protocol which aims at moving the packet within a large autonomous system or routing domain.
RRB JE IT (CBT II) Mock Test- 3 - Question 90

What is Jitter control?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 90 Jitter is any deviation in, or displacement of, the signal pulses in a high-frequency digital signal. The deviation can be in terms of amplitude, phase timing or the width of the signal pulse. Among the causes of jitter are electromagnetic interference (EMI) and crosstalk with other signals. Jitter can cause a display monitor to flicker, affect the ability of the processor in a desktop or server to perform as intended, introduce clicks or other undesired effects in audio signals, and loss of transmitted data between network devices. The amount of allowable jitter is highly dependent on the application.
RRB JE IT (CBT II) Mock Test- 3 - Question 91

For a violation of 2NF to occur in a table in 1NF, the following condition(s) must exist:

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 91 A relation is in 2NF, if it is in 1NF and no non prime attribute is dependent on any proper subset of any candidate key of the relation. A non prime attribute of a relation is an attribute that is not a part of any candidate key of the relation.
RRB JE IT (CBT II) Mock Test- 3 - Question 92

A data dictionary is a repository that manages_______.

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 92 The data dictionary is full of 'Metadata', information about what is going-on inside your database. The data dictionary is presented to us in the form of a number of views.
RRB JE IT (CBT II) Mock Test- 3 - Question 93

Which of the following is not a testable Web App security element?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 93 A penetration test, also known as a pen test, is a simulated cyberattack against your computer system to check for exploitable vulnerabilities. In the context of web application security, penetration testing is commonly used to augment a web application firewall (WAF).
RRB JE IT (CBT II) Mock Test- 3 - Question 94

What is Unix?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 94 UNIX is a multi-user, multi-tasking operating system. Multiple users may have multiple tasks running simultaneously.
RRB JE IT (CBT II) Mock Test- 3 - Question 95

The process of defining two or more methods within the same class that have the same name but different parameters list is _______.

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 95 Two or more methods can have the same name as long as their parameters declaration and definitions are different, the methods are said to be overloaded and the process is called method overloading. Method overloading is used when methods are required to perform similar tasks using different input parameters.
RRB JE IT (CBT II) Mock Test- 3 - Question 96

Process of removing an element from stack is called __________

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 96 Stack is an ordered list of similar data types. Stack is a LIFO structure. (Last in First out). push() function is used to insert new elements into the Stack and pop() function is used to delete an element from the stack. Both insertion and deletion are allowed at only one end of Stack called Top.
RRB JE IT (CBT II) Mock Test- 3 - Question 97

The attack that focuses on capturing small packets from the network transmitted by other computers and reading the data content in search of any type of information is ____

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 97 Network eavesdropping is a network layer attack that focuses on capturing small packets from the network transmitted by other computers and reading the data content in search of any type of information. This type of network attack is generally one of the most effective as a lack of encryption services are used. It is also linked to the collection of metadata.
RRB JE IT (CBT II) Mock Test- 3 - Question 98

Which of the following is the correct option that allows users to bring together copies of workbooks that other users have worked on independently in MS Excel?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 98 Merging allows users to bring together copies of workbooks in Excel.
RRB JE IT (CBT II) Mock Test- 3 - Question 99

Data stored in an electronic memory cell can be accessed at random and on demand using

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 99 Direct addressing eliminates the need to process a large stream of irrelevant data in order to the desired data word.
RRB JE IT (CBT II) Mock Test- 3 - Question 100

Process Control Block (PCB) of all running processes resides in which of the following?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 100 Process Control block is used for storing the collection of information about the Processes and this is also called the Data Structure which Stores the information about the process. PCB resides in the main memory.
RRB JE IT (CBT II) Mock Test- 3 - Question 101

How does deforestation cause an increase in greenhouse gases in the atmosphere?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 101
  • Tropical forest trees, like all green plants, take in carbon dioxide and release oxygen during photosynthesis

  • Plants also carry out the opposite process known as respiration, in which they emit carbon dioxide, but generally in smaller amounts than they take in during photosynthesis; The surplus carbon is stored in the plant, helping it to grow.

  • When trees are cut down and burned or allowed to rot, their stored carbon is released into the air as carbon dioxide.

  • So, the levels of carbon dioxide will increase and cause global warming

  • And this is how deforestation and forest degradation contribute to the increase in greenhouse gases and hence global warming

RRB JE IT (CBT II) Mock Test- 3 - Question 102

Which of the following Rulers founded the Nalanda Mahavihara?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 102
  • Nalanda Mahavihara was founded in the 5th century CE by Kumargupta I of the Gupta Dynasty.

  • It was an ancient Mahavihara, a Buddhist monastery.

  • The Gupta Empire was founded by Sri Gupta.

  • Chandragupta I was the first great ruler of the Gupta Empire, who assumed the title of Maharajadhiraja.

  • Samudragupta was the 2nd ruler of the Gupta Empire. He was also called Napoleon of India.

RRB JE IT (CBT II) Mock Test- 3 - Question 103

What was the theme of World Brain Day 2019?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 103
  • World Brain Day is observed on July 22 every year.

  • The day aims at promoting interest in neurology. Previously, World Brain Day has covered topics like dementia, epilepsy and stroke, in cooperation with other societies.

  • World Brain Day 2019 theme is Migraine: The Painful Truth.

  • This year, the focus is on migraine, which is known to be one of the world's most common brain diseases.

RRB JE IT (CBT II) Mock Test- 3 - Question 104

A force of 20 Newton acts on a body of mass 20 kg for 5 seconds. Change in its momentum is

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 104 Change in momentum = force x time = 20 x 5 = 100 Ns
RRB JE IT (CBT II) Mock Test- 3 - Question 105

Which is not the phase of the classical waterfall model?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 105 Phases of classical waterfall model

Feasibility study

Requirements analysis and specification

Design

Coding and unit testing

Integration and system testing

Maintenance

RRB JE IT (CBT II) Mock Test- 3 - Question 106

What is the shortcut key to apply the Date format with the day, month, and year in Excel?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 106

Ctrl + Shift + $ ap.ply the Currency format with two decimal places.

Ctrl + Shift + % apply the Percentage format with no decimal places.

Ctrl + Shift + ^ apply the Scientific number format with two decimal places.

Ctrl + Shift + # apply the Date format with the day, month, and year.

RRB JE IT (CBT II) Mock Test- 3 - Question 107

he expression can be implemented using a single

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 107

Using demergers law

Y = (A + B) (A̅ + B̅)

Y = AA̅ + AB̅ + A̅B + BB̅

(AA̅ = BB̅ = 0)

Y = AB̅ + A̅B

Which is expression for EXOR gate

RRB JE IT (CBT II) Mock Test- 3 - Question 108

Which of the queries in SQL is an example of self-join?

I. SELECT a.column_name FROM table1 a, table1 b WHERE a.x = b.x;

II. SELECT b.column_name FROM table1 a, table2 b WHERE a.y = b.y;

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 108
  • A self-join is a join in which a table is joined with itself (which is also called Unary relationships), especially when the table has a FOREIGN KEY which references its own PRIMARY KEY.

  • To join a table itself means that each row of the table is combined with itself and with every other row of the table.

  • In query 1, only one relation is used, that is, table1 and hence it is a self-join but in query II, two different relations are used, that is, table1 and table2 and hence it cannot be an example of self-join.

RRB JE IT (CBT II) Mock Test- 3 - Question 109

In which case would you use a FULL OUTER JOIN?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 109
  • The FULL OUTER JOIN (FULL JOIN) keyword returns all records when there is a match in either left (table1) or right table records and the record with unmatched data from BOTH tables.

  • The LEFT OUTER JOIN (LEFT JOIN) keyword returns all records when there is a match in either left (table1) or right table records and the record with unmatched data from LEFT tables.

  • The RIGHT OUTER JOIN (RIGHT JOIN) keyword returns all records when there is a match in either left (table1) or right table records and the record with unmatched data from RIGHT tables.

RRB JE IT (CBT II) Mock Test- 3 - Question 110

A file deleted from a folder can be recovered from

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 110
  • Recycle Bin is a location where deleted files or folders are temporarily stored in every version of Microsoft Windows since Windows 95.

  • The Recycle Bin allows users to recover files that have been deleted in Windows.

  • It is located on the desktop

RRB JE IT (CBT II) Mock Test- 3 - Question 111

If the plaintext in Caesar cipher is “mumbai” then what will be its ciphertext?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 111
  • In a substitution cipher each letter or group of letters is replaced by another letter or group of letters to disguise it

  • One of the oldest known ciphers is the Caesar cipher, attributed to Julius Caesar.

  • In this method, a becomes D, b becomes E, c becomes F, ... and z becomes C

  • Plaintext’s letter is shifted by 3 positions and ciphertext is in upper case ciphertext is PXPEDL

RRB JE IT (CBT II) Mock Test- 3 - Question 112

Which is true of constructors in JAVA?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 112

Example of Java code with constructor:

public class MytestbookClass

{

int a;

public MytestbookClass(int b) //constructor has same name as class with no return type

//constructor can take parameter and type is int

{

a = b;

}

public static void main(String[] args)

{

MytestbookClass Obj = new MytestbookClass(5);

System.out.println(Obj.x);

}

}

Notes:

If Mytestbook Class constructor is not defined by user, then compiler will generate a default constructor with no parameter.

RRB JE IT (CBT II) Mock Test- 3 - Question 113

When a file is deleted _________

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 113
  • When a file is deleted, the data is not initially removed from the hard disk

  • Instead, the space on the disk that was occupied by the deleted data is "deallocated"

  • After it is deallocated, space is available for use when new data is written to the disk

  • Until space is overwritten, it is possible to recover the deleted data by using a low-level disk editor or data-recovery software

RRB JE IT (CBT II) Mock Test- 3 - Question 114

If we arrange different gases in decreasing order of their percentage available in the atmosphere. Which one of the options is correct?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 114 The atmosphere is a thin layer of gases which stays above the earth due to the force of gravitation. Its air is colourless, odourless and tasteless.

Nitrogen and oxygen are two major gases of the atmosphere. Carbon dioxide (CO2), Helium, Ozone, Argon and hydrogen are found in lesser quantities. Apart from these gases, tiny dust particles are also present in the air.

The atmospheric composition of gases are as follow

Permanent Gases of the Atmosphere

Constituent

Percent by Volume

Nitrogen (N2)

78.084

Oxygen (O2)

20.946

Argon (Ar)

0.934

Carbon dioxide (CO2)

0.036

Neon (Ne)

0.00182

Helium (He)

0.000524

Krypton (Kr)

0.000114

Hydrogen (H2)

0.00005

RRB JE IT (CBT II) Mock Test- 3 - Question 115

Which of the following rivers originates outside India?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 115
  • River Sutlej originates outside India, at Mount Kailash, Tibet.

  • It enters India through Shipki la Pass.

  • Yamuna River originates at Yamunotri Glacier, Uttarakhand.

  • Ganga River originates at Gaumukh, Gangotri Glacier, Uttarakhand.

  • Luni is the only river that flows in Rajasthan.

RRB JE IT (CBT II) Mock Test- 3 - Question 116

When a hydrocarbon is burnt it gives yellow flames with black smoke. Which of the following is true regarding hydrocarbon:

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 116

Concept:

Saturated Hydrocarbon:

Compounds of carbon, which are linked by only single bonds between the carbon atoms, are called saturated compounds.

Unsaturated Hydrocarbon:

Compounds of carbon having double or triple bonds between their carbon atoms are called unsaturated compounds.

Application:

Saturated hydrocarbons give a clean flame while unsaturated carbon compounds will give a yellow flame with lots of black smoke.

RRB JE IT (CBT II) Mock Test- 3 - Question 117

Which one of the items given below is not an item of the Menu Bar in MS Word?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 117 Microsoft Word (MS Word) is a word processor developed by Microsoft.

Options given in Menu Bar of MS Word 2000:

File, edit, view, insert, format, tools, table, windows, help

Options of file: new, open, save, save as, exit etc.

RRB JE IT (CBT II) Mock Test- 3 - Question 118

Consider an array with 6 elements starting with index 0 given below

20, 10, 9, 40, 21, 19

Find the element at index 5 after 1st iteration if bubble sort is applied on a given set of data?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 118 Bubble sort, sometimes referred to as sinking sort, is a simple sorting algorithm that repeatedly steps through the list, compares adjacent pairs and swaps them if they are in the wrong order. The pass through the list is repeated until the list is sorted.

In 1st iteration:

STEPS

20 > 10 then swap

Array: 10, 20, 9, 40, 21, 19

20 > 9 then swap

Array: 10, 9, 20, 40, 21, 19

20 < 40 no swap

Array: 10, 9, 20, 40, 21, 19

40 > 21 then swap

Array: 10, 9, 20, 21, 40, 19

40 > 19 then swap

Array: 10, 9, 20, 21, 19, 40

At 5th index, element 40 is present

RRB JE IT (CBT II) Mock Test- 3 - Question 119

Processors located in the same ____ is/are examples of LAN.

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 119 Here, the processor refers to the system or devices operating.

Location

Network

Range

City

MAN (Metropolitan Area Network)

10 km-100 km

Country

WAN (Wide Area Network)

100 km-1000 km

Campus

LAN (Local Area Network)

Around 1 km

RRB JE IT (CBT II) Mock Test- 3 - Question 120

The vertical dimension of a sequence diagram represents-

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 120 A sequence diagram simply depicts the interaction between objects in a sequential order i.e. the order in which these interactions take place.

Time dimension → vertical axis

Object dimension → horizontal axis

Lifeline (Lines) → represents an individual participant in the Interaction.

Message → defines a particular communication between Lifelines of an Interaction.

RRB JE IT (CBT II) Mock Test- 3 - Question 121

The simultaneous transmission of data to a number of stations is known as:

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 121
  • Broadcasting is a method of transferring a message to all recipients simultaneously.

  • Bandwidth is the amount of data that can be transmitted in a fixed amount of time.

  • Aloha refers to simple communications scheme in which each source (transmitter) in a network sends data whenever there is a frame to send

  • Analog transmission is a transmission method of conveying information using a continuous signal which varies in amplitude, phase, or some other property in proportion to that information

RRB JE IT (CBT II) Mock Test- 3 - Question 122

When an applet begins, which method is called first?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 122

Methods

Description

init()

First time Applet is loaded

start()

Each time an Applet’s document is displayed

stop()

Suspend thread that don’t need to run

destroy()

When applets need to be removed completely from the memory

RRB JE IT (CBT II) Mock Test- 3 - Question 123

Thread is a _____ in Java.

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 123
  • A class is the blueprint from which individual objects are created. class classname { }

  • A class that is derived from another class is called a subclass (extended class). The class from which the subclass is derived is called a superclass (parent class)

Example:

class subclass extends superclass { }

class new thread extends Thread { }

Here new thread is subclass, and Thread is an extended class i.e., superclass.

RRB JE IT (CBT II) Mock Test- 3 - Question 124

Which one is the latest and effective means of modern communication?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 124

Fax:

  • It is the telephonic transmission of scanned-in printed material (text or images), usually to a telephone number associated with a printer or other output device.

Email (Electronic Mail):

  • Email is like sending a letter, you can send the email, and it gets to the other person's email account within seconds.

  • If you have an email address, you can email anyone else who has an email address, including government agencies and lots of different kinds of businesses.

  • This is a method to send and receive electronic messages just like traditional mail but in a much faster, simpler, and more convenient manner

The fax was the means to send documents from one place to another electronically using telephone lines, email is a method where the user types text on his computer screen and instantly sends it across using the internet to any person anywhere in the world.

Traditional mail/Postal Mail in a sealed envelope or package is delivered to a home or post office box by a mail carrier.

Traditional mail delivery is handled at distribution centers where it is sorted and delivered to regional areas for delivery by a Postal worker.

You walk out to the mailbox to retrieve your letter.

RRB JE IT (CBT II) Mock Test- 3 - Question 125

To an observer on the earth, the stars appear to twinkle, this is because:

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 125 The twinkling of a star is due to the .,atmospheric refraction of starlight. The starlight, on entering the earth’s atmosphere, undergoes refraction continuously before it reaches the earth.

The atmospheric refraction occurs in a medium of gradually changing refractive index.

Since the atmosphere bends starlight towards the normal, the apparent position of the star is slightly different from its actual position.

RRB JE IT (CBT II) Mock Test- 3 - Question 126

Which of the following print user and group information for the specified username?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 126 id command is a command which can print real and effective User ID (UID) and Group ID (GID). An UID is a single identity for a user. While Group ID (GID) can consist of more than one UID.
RRB JE IT (CBT II) Mock Test- 3 - Question 127

When was the Fourth Anglo Mysore war fought?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 127
  • The Fourth Anglo Mysore war was fought between the Mysore Kingdom and The East India Company in 1799.

  • Tipu Sultan was killed in the battle.

  • The First Anglo Mysore war was fought between Hyder Ali and The East India Company in 1767.

  • The Second Anglo Mysore war was fought between Hyder Ali and The East India Company in 1782.

  • The Third Anglo Mysore war was fought between Tipu Sultan and The East India Company in 1791.

RRB JE IT (CBT II) Mock Test- 3 - Question 128

Which of the following is an invalid identifier?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 128 In C language identifiers are the names given to variables, constants, functions and user-defined data.
  • An identifier cannot start with numbers

  • An identifier cannot start with a special symbol like ‘&’

  • An identifier can start with an underscore

Important Points:

  • continue is also a loop control statement just like the break statement. continue statement is opposite to that of break statement, instead of terminating the loop, it forces the next iteration of the loop.

RRB JE IT (CBT II) Mock Test- 3 - Question 129

In which addressing mode, the operand is specified in the instruction itself?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 129
  • Immediate Mode: In this mode the operand is specified in the instruction itself. In other words, an immediate-mode instruction has an operand field rather than an address field.

  • The operand field contains the actual operand to be used in conjunction with the operation specified in the instruction.

  • Immediate-mode instructions are useful for initializing registers to a constant value.

Example: ADD R1, 100 // 100 is operand

RRB JE IT (CBT II) Mock Test- 3 - Question 130

Which of the following is/are true?

I. last element points to head, in a single linked list

II. Binary search works efficiently on any array data structure.

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 130
  • A linked list is a data structure used for storing non-homogeneous data. In a single linked list the last element always points to null. Head always points to the 1st element of the linked list.

  • Binary search works efficiently with sorted array, but it cannot be implemented efficiently on unsorted array because binary search algorithm is based on sorted element index.

RRB JE IT (CBT II) Mock Test- 3 - Question 131

Which command displays all the abbreviations in vi editor?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 131

‘map’ command displays all created macros on the status line.

‘unmap’ command removes the macro definition for the key.

‘ab’ command displays all abbreviations.

RRB JE IT (CBT II) Mock Test- 3 - Question 132

Which method is overloaded by Java’s Math class to handle the absolute value of all numeric types?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 132 In Java, abs() method is overloaded by Java’s Math class to handle absolute value of all numeric types.

Important Points:

In C programming language,

Function

Description

fabs()

Absolute value for float data type

labs()

Absolute value for long data type

abs()

Absolute value for integer data type

ab() is not a function in Java or C or C++.

RRB JE IT (CBT II) Mock Test- 3 - Question 133

What is the cell address of the 4th row and 4th column?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 133
  • Each worksheet is made up of cells and cells are a result of the intersection of rows and columns
  • They are basic units for storing data
  • Each cell gets its name from this intersection
  • The address of a cell that is in column A and has its row number as 4 is referred to as cell A4
  • Thus the letter and number of the intersecting column and row is the cell address.
  • A group of contiguous cells is called a range
  • An example of a cell range would be G1: G3

Cell address of 4th row and 4th column is D4

RRB JE IT (CBT II) Mock Test- 3 - Question 134

When was the Battle of Ghaghra fought?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 134 The Battle of Ghaghra was fought between Sultan Muhammad Lodhi (The last claimant of the Lodhi Empire) and Babur (Founder of Mughal Empire in India) in 1529.

Muhammad Lodhi was defeated by Babur in this battle.

The Battle of Ghaghra was the decisive battle for the Mughals in India as It led to the complete control of the Mughals in North India.

RRB JE IT (CBT II) Mock Test- 3 - Question 135

The linker:

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 135
  • A linker is a computer utility program that takes one or more object files generated by a compiler and combines them into a single executable file, library file, or another 'object' file...the

  • The separate object modules are then combined by a linker into a load module, an executable file

  • Source code → compiler → Assembler → Object code → Linker → Executable file

RRB JE IT (CBT II) Mock Test- 3 - Question 136

_____ tag defines an HTML table.

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 136

 The <table> tag defines an HTML table and it consists of the <table> element and one or more <tr>, <th>, and <td> elements.

RRB JE IT (CBT II) Mock Test- 3 - Question 137

Which of the following represents the system in terms of data and the processes that act upon that data?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 137 Structured analysis is a traditional systems development technique that is time-tested and easy to understand. Structured analysis uses a series of phases, called the systems development life cycle (SDLC), to plan, analyze, design, implement, and support an information system.

Structured analysis uses a set of process models to describe a system graphically. Because it focuses on processes that transform data into useful information, structured analysis is called a process-centered technique.

RRB JE IT (CBT II) Mock Test- 3 - Question 138

Which are the tools not used for System Analysis?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 138

System - test data is the data that is used in tests of a software system

During Structured Analysis, various tools are used for system development

  • Data Flow Diagrams

  • Flow chart

  • Decision Table

RRB JE IT (CBT II) Mock Test- 3 - Question 139

Which operator is a unary operator in Java?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 139
  • Binary operator operates on two operands.

  • Unary operator operates on one operand.

Binary

Description

Type of operator

&

Bitwise AND

Binary

|

Bitwise OR

Binary

^

Bitwise Exclusive OR

Binary

~

Bitwise NOT

Unary

Example: ~ (1011 0100)

Output: 0100 1011

RRB JE IT (CBT II) Mock Test- 3 - Question 140

To maximize workbooks in MS Excel ___________ is used.

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 140

Ctrl + F9 minimizes a workbook window to an icon.

Ctrl + F10 maximizes or restores the selected workbook window.

Ctrl + F5 restores the window size of the selected workbook window.

Ctrl + F6 switches to the next workbook window when more than one workbook window is open.

RRB JE IT (CBT II) Mock Test- 3 - Question 141

Which of the following gain unauthorized access to the user system and demand ransom to regain access?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 141

Ransomware is a type of malicious software that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid

  • In May 2017, WannaCry ransomware targeted computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in the Bitcoin cryptocurrency

  • Around 37 incidents of ransomware attacks were reported to the Indian Computer Emergency Response Team (CERT-In), according to Minister of State for Electronics and IT.

Adware is any software application in which advertising banners are displayed while a program is running.

Spyware is mostly used for the purposes of tracking and storing internet user movements on the web and provides pop-up ads to the internet user.

Trojan horse is a program that appears harmless but,. in fact malicious which misleads user of its true intent

RRB JE IT (CBT II) Mock Test- 3 - Question 142

What is India's position in the Global Innovation Index (GII) 2019?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 142
  • Union Minister of Commerce & Industry and Railways, Piyush Goyal, launched the Global Innovation Index (GII) 2019 in New Delhi on 24 July 2019.

  • India jumped five places to improve its position from 57th last year to 52nd in 2019.

  • Switzerland remains number one in the GII index followed by Sweden, the United States of America, the Netherlands, and the United Kingdom in the top 5.

RRB JE IT (CBT II) Mock Test- 3 - Question 143

What is the purpose of the ‘whatis’ command?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 143 what displays short manual page descriptions.

Each manual page has a short description available within it. which searches the manual page names and displays the manual page descriptions of any name matched.

RRB JE IT (CBT II) Mock Test- 3 - Question 144

Which of the following is true about the heuristic technique?

I. If basic parameters are known, then other parameters can be determined using mathematical expression.

II. Heuristic technique model is broadly divided into single variables and double variables.

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 144
  • Heuristic techniques assume that the relationships that exist among the different project parameters can be satisfactorily modelled using suitable mathematical expressions.

  • Once the basic (independent) parameters are known, the other (dependent) parameters can be easily determined by substituting the values of the independent parameters in the corresponding mathematical expression.

  • Different heuristic estimation models can be divided into the following two broad categories: single variable and multivariable models.

  • Single variable estimation models assume that various project characteristics can be predicted based on a single previously estimated basic (independent) characteristic of the software such as its size.

  • A multivariable cost estimation model assumes that a parameter can be predicted based on the values of more than one independent parameter.

RRB JE IT (CBT II) Mock Test- 3 - Question 145

Chose the best appropriate answer for the below given code:

#include

int main()

{

printf("TESTBOOK");

main();

return 0;

}

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 145
  • There is no restriction of main() calling main(), that is, recursion can happen for main() function also

  • There is no explicit termination condition mentioned for main() recursion; So main() would be calling main() after printing TESTBOOK, this will go on until Stack of the program would be filled completely

Important Points:

Stack stores the calling function sequence, that is, which function has called which function so that the control can be returned when the called function returns. That’s why here in the program, main() would continue to call main() until the complete stack is over, that is, stack-overflow occurs.

RRB JE IT (CBT II) Mock Test- 3 - Question 146

Which of the following is a sequential access memory?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 146
  • Magnetic tape is secondary storage device used for storing files of data; Example: a company’s payroll record

  • Access is sequential and consists of records that can be accessed one after another as the tape moves along a stationary read-write mechanism

  • A hard disk is an electromechanical data storage device from which data is accessed in a random-access manner, individual blocks of data can be stored or retrieved in any order

  • Both sequential and random access of data is possible in hard disk

  • In random-access memory (RAM) the memory cells can be accessed for information transfer from any desired random location

  • That is, the process of locating a word in memory is the same and requires an equal amount of time no matter where the cells are located physically in memory; Hence RAM is random access

RRB JE IT (CBT II) Mock Test- 3 - Question 147

Which of the following is true?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 147
  • An Interpreter gives better error diagnostics than a compiler because it executes the source program statement by statement

  • In compiler, user input is given to assembly language produced by compiler is mapped with output, hence it is faster but in case of interpreter user input is given to source program; Therefore, it takes more time

RRB JE IT (CBT II) Mock Test- 3 - Question 148

Which command searches a file for lines that have a certain pattern?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 148

Commands

Description

ls

List down all the files

chmod

change the access permissions (read, write execute) of file

grep

Searching a file following certain pattern

mkdir

Make directory

RRB JE IT (CBT II) Mock Test- 3 - Question 149

A potential difference between two points of a wire carrying 4-ampere current is 0.5 volt. The resistance of the wire is

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 149

Potential difference = 0.5 V

I = 4 A

R = ?

R = V/I

V stands for potential difference

R = 0.5/4

R = 1/8

R = 0.125 Ω

RRB JE IT (CBT II) Mock Test- 3 - Question 150

Ethanoic acid reacts with absolute ethanol to give a compound X. The compound X is used in making perfumes and as a flavouring agent. The compound X is:

Detailed Solution for RRB JE IT (CBT II) Mock Test- 3 - Question 150

Concept:

Esterification reaction:

Esters are formed by reaction of an acid and an alcohol.

Ethanoic acid reacts with absolute ethanol in the presence of an acid catalyst to give an ester.

Esters are sweet-smelling substances. These are used in making perfumes and as flavouring agents

Reaction:

CH3 – COOH + CH3 CH2 COOH → CH3 – CO – O – CH2 – CH3

Information about RRB JE IT (CBT II) Mock Test- 3 Page
In this test you can find the Exam questions for RRB JE IT (CBT II) Mock Test- 3 solved & explained in the simplest way possible. Besides giving Questions and answers for RRB JE IT (CBT II) Mock Test- 3, EduRev gives you an ample number of Online tests for practice
Download as PDF

Download free EduRev App

Track your progress, build streaks, highlight & save important lessons and more!
(Scan QR code)