Computer Science Engineering (CSE) Exam  >  Computer Science Engineering (CSE) Tests  >  RRB JE IT (CBT II) Mock Test- 2 - Computer Science Engineering (CSE) MCQ

RRB JE IT (CBT II) Mock Test- 2 - Computer Science Engineering (CSE) MCQ


Test Description

30 Questions MCQ Test - RRB JE IT (CBT II) Mock Test- 2

RRB JE IT (CBT II) Mock Test- 2 for Computer Science Engineering (CSE) 2024 is part of Computer Science Engineering (CSE) preparation. The RRB JE IT (CBT II) Mock Test- 2 questions and answers have been prepared according to the Computer Science Engineering (CSE) exam syllabus.The RRB JE IT (CBT II) Mock Test- 2 MCQs are made for Computer Science Engineering (CSE) 2024 Exam. Find important definitions, questions, notes, meanings, examples, exercises, MCQs and online tests for RRB JE IT (CBT II) Mock Test- 2 below.
Solutions of RRB JE IT (CBT II) Mock Test- 2 questions in English are available as part of our course for Computer Science Engineering (CSE) & RRB JE IT (CBT II) Mock Test- 2 solutions in Hindi for Computer Science Engineering (CSE) course. Download more important topics, notes, lectures and mock test series for Computer Science Engineering (CSE) Exam by signing up for free. Attempt RRB JE IT (CBT II) Mock Test- 2 | 150 questions in 120 minutes | Mock test for Computer Science Engineering (CSE) preparation | Free important questions MCQ to study for Computer Science Engineering (CSE) Exam | Download free PDF with solutions
RRB JE IT (CBT II) Mock Test- 2 - Question 1

Which among the following is the capital of Belgium?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 2 - Question 1
Brussels is the capital of Belgium.
RRB JE IT (CBT II) Mock Test- 2 - Question 2

Low level language is also called ________.

Detailed Solution for RRB JE IT (CBT II) Mock Test- 2 - Question 2

Machine Language

Machine Language is the language written as strings of binary 1's and O's. It is the only language which a computer understands without using a translation program. A low-level language is a machine language.

Assembly Language

It is a high-level programming language that allows a user to write a program using alphanumeric mnemonic codes, instead of numeric codes for a set of instructions. It requires a translator known as assembler to convert assembly language into machine language so that it can be understood by the computer. It is easier to remember and write than machine language.

1 Crore+ students have signed up on EduRev. Have you? Download the App
RRB JE IT (CBT II) Mock Test- 2 - Question 3

Which type of volcano is the Popocatepetl Mountain?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 2 - Question 3
  • Volcano Popocatepetl, whose name is the Aztec word for Smoking Mountain, towers to 5426 m 70 km SE of Mexico City to form North America's 2nd-highest volcano.

  • This type of mountain is a stratovolcano or a composite volcano.

RRB JE IT (CBT II) Mock Test- 2 - Question 4

The output of an AND gate with three inputs, A, B and C, is HIGH when ______.

Detailed Solution for RRB JE IT (CBT II) Mock Test- 2 - Question 4
The truth table of three input AND gate is shown:

Inputs

Output

0 0 0

0

0 0 1

0

0 1 0

0

0 1 1

0

1 0 0

0

1 0 1

0

1 1 0

0

1 1 1

1

The Output is high only when all the inputs are high

RRB JE IT (CBT II) Mock Test- 2 - Question 5

Which is not the component of the information system.

Detailed Solution for RRB JE IT (CBT II) Mock Test- 2 - Question 5
  • An information system has five key components hardware, software, data, processes, and people.

  • Hardware consists of everything in the physical layer of the information system. For example, hardware can include servers, workstations, networks etc.

  • Software refers to the programs that control the hardware and produce the desired information or results. Software consists of system software and application software.

  • People who have an interest in an information system are called stakeholders. Stakeholders include the management group responsible for the system.

RRB JE IT (CBT II) Mock Test- 2 - Question 6

________ is a Linux command that shows the running processes as a tree.

Detailed Solution for RRB JE IT (CBT II) Mock Test- 2 - Question 6
The pstree command shows running processes as a tree. The tree is rooted at either pid or init if pid is omitted. If a username is specified, all process trees rooted at processes owned by that user are shown.
RRB JE IT (CBT II) Mock Test- 2 - Question 7

HTTPS stands for

Detailed Solution for RRB JE IT (CBT II) Mock Test- 2 - Question 7
Hypertext Transfer Protocol Secure (HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP). It is used for secure communication over a computer network and is widely used on the Internet. In HTTPS, the communication protocol is encrypted using Transport Layer Security (TLS).
RRB JE IT (CBT II) Mock Test- 2 - Question 8

Which malware misleads user of its true intent?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 2 - Question 8
  • A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.

  • Ransomware is a type of malware from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid.

  • Keystroke logging often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that person using the keyboard is unaware that their actions are being monitored.

  • A Trojan horse, or Trojan, is any malware that misleads users of its true intent.

RRB JE IT (CBT II) Mock Test- 2 - Question 9

Which of the following is a Class-A IP address?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 2 - Question 9
Looking at the first octet of an IP address, one can identify the class of that address.

Class A: 1 - 126

Class B: 128 – 191

Class C: 192 - 223

Class D: 224 - 239

Class E: 240 - 254

In IP address 125.250.250.250, the first octet is 125 which lies in range 1 - 125 of class A.

RRB JE IT (CBT II) Mock Test- 2 - Question 10

What will be the integer printed in the output of the below given statements in Java?

int a = 0, b = 2;

int tb = b == 0 ? 10 : 20;

System.out.println(“Ternary operator: ” + tb);

Detailed Solution for RRB JE IT (CBT II) Mock Test- 2 - Question 10

The ?: operator is a ternary operator

expression? statement1: statement2

if the expression is true, then statement1 is the return

if the expression is false, then statement2 is the return

expression is false since b = 2, that is, b ≠ 0

∴ tb = 20

Output: Ternary operator: 20

The integer printed in the output is 20.

RRB JE IT (CBT II) Mock Test- 2 - Question 11

Which of the following are non-impact printers?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 2 - Question 11
  • Non-impact printers print the characters without using ribbons, These printers print a complete page at a time so they are also called page printers. E.g. Ink-Jet printer, Laser printer

  • The impact printers print the characters by striking them on the ribbon which is then pressed on the paper, E.g. Drum printer, chain printer, Dot matrix printer

RRB JE IT (CBT II) Mock Test- 2 - Question 12

_________ is used to repeat the last executed command.

Detailed Solution for RRB JE IT (CBT II) Mock Test- 2 - Question 12

To execute any last executed command, just type double exclamation marks, and hit ENTER:

$ !!

This will execute the last command.

Add “sudo” in front of “!!” to execute the last command as root user like below.

$ sudo !!

RRB JE IT (CBT II) Mock Test- 2 - Question 13

In _____, lack of change in the level of voltage determines the value of the bit.

Detailed Solution for RRB JE IT (CBT II) Mock Test- 2 - Question 13

NRZ – L: Non-Return to Zero – Level

NRZ – L: level of voltage decides the value of bit

NRZ – I: Non-Return to Zero - Invert

NRZ – I: Change or lack of change in the voltage level determines the value of the bit. If there is no change, the bit is 0; if there is a change, the bit is 1.

Unipolar: All the signals are on one side of the time axis, either above or below, Unipolar NRZ has only one level of voltage.

RRB JE IT (CBT II) Mock Test- 2 - Question 14

In Java, which operator dynamically allocates memory for an object and returns a reference to it?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 2 - Question 14
The new operator dynamically allocates (at run time) memory for an object and returns a reference to it

Example:

If TestBook is a class

TestBook mytestbook; // declare reference to object

mytestbook = new TestBook(); // allocate a Box object

Important Points:

In C programming language:

  • malloc() function is used to allocate a block of memory. A block of memory with a particular size is reserved and a pointer is returned which is of type void meaning that this function can be assigned to any type of pointers.

  • calloc() function is used when there is a need for multiple blocks of storage, of the same size, and then set all bytes to zero.

  • sizeof() is an operator to find the size of a variable in bytes.

RRB JE IT (CBT II) Mock Test- 2 - Question 15

What are the methods in the Applet Class that controls an applet’s execution?

I. start()

II. destroy()

III. initialize()

IV. end()

Detailed Solution for RRB JE IT (CBT II) Mock Test- 2 - Question 15
Methods in the Applet Class that controls an applet’s execution:

Methods

Description

init()

First time Applet is loaded

start()

Each time an Applet’s document is displayed

stop()

Suspend thread that don’t need to run

destroy()

When applets need to be removed completely from the memory

RRB JE IT (CBT II) Mock Test- 2 - Question 16

Which of the variable declaration or initialization in Java is not allowed?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 2 - Question 16
The variable is the basic unit of storage in a Java program. A variable is defined by the combination of an identifier, a type, and an optional initializer.

In Java, all variables must be declared before they can be used. The basic form of a variable declaration is:

type identifier [ = value ][, identifier [= value ] …];

Examples:

int a, b;

int a = 10, b = 20, c = 30;

int a, b = 20, c;

char a = ‘3’

In option 4, data type is a char but data assigned to char is not present in single quotes. Therefore, it is an invalid assignment in Java.

RRB JE IT (CBT II) Mock Test- 2 - Question 17

Which is not the development phase of the classical waterfall model?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 2 - Question 17
The phases starting from the feasibility study to the integration and system testing

the phase is known as the development phase.

Phases of classical waterfall model:

Feasibility study

Requirements analysis and specification

Design

Coding and unit testing

Integration and system testing

Maintenance

Therefore, maintenance is not the development phase of the classical waterfall model.

RRB JE IT (CBT II) Mock Test- 2 - Question 18

Sea salt, pollen, ash, smoke soot, fine soil — these are associated with:

Detailed Solution for RRB JE IT (CBT II) Mock Test- 2 - Question 18
The atmosphere is composed of gases, water vapour and dust particles.

Dust Particles

The atmosphere has a sufficient capacity to keep small solid particles, which may originate from different sources and include sea salts, fine soil, smoke-soot, ash, pollen, dust and disintegrated particles of meteors.

Dust and salt particles act as hygroscopic nuclei around which water vapour condenses to produce clouds.

RRB JE IT (CBT II) Mock Test- 2 - Question 19

The expansion of RAM is _______.

Detailed Solution for RRB JE IT (CBT II) Mock Test- 2 - Question 19
Primary Memory (Main Memory): Primary memory is also known as main memory. It holds only those data and instructions on which computer is currently working. It has limited capacity and data is lost when power is switched off.

Primary memory can be divided into RAM (Random Access Memory) and ROM (Read Only Memory)

RAM

ROM

It is Volatile or temporary memory

It is Non Volatile or permanent memory

Data gets erased when the power supply is off

Data stored permanently

Faster memory

Slow memory

It is used in the normal operations of a computer after starting up and loading the operating system

A ROM chip is used primarily in the start-up process of a computer

RRB JE IT (CBT II) Mock Test- 2 - Question 20

The e-mail program is also known as

Detailed Solution for RRB JE IT (CBT II) Mock Test- 2 - Question 20
The e-mail program is also known as an E-mail client. The email client makes you read, organize and reply to messages as well as send new emails. It also handles attachments, which lets you exchange arbitrary computer files via email.
RRB JE IT (CBT II) Mock Test- 2 - Question 21

Which of the following is termed as rancidity?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 2 - Question 21
  • When fats and oils are oxidised, they become rancid and their smell and taste change.

  • Substances which prevent oxidation (antioxidants) are added to foods containing fats and oil.

  • Manufacturers flush bags of chips with gas such as nitrogen to prevent the chips from getting oxidised.

  • Keeping food in air-tight containers helps to slow down oxidation.

RRB JE IT (CBT II) Mock Test- 2 - Question 22

Servers, workstations, networks, telecommunications equipment, fiber-optic cables, mobile devices, scanners, digital capture devices, and other technology-based infrastructure is an example of ____ component of the information system.

Detailed Solution for RRB JE IT (CBT II) Mock Test- 2 - Question 22
  • An information system has five key components: hardware, software, data, processes, and people.

  • Hardware consists of everything in the physical layer of the information system. For example, hardware can include servers, workstations, networks, telecommunications equipment, fiber-optic cables, mobile devices, scanners, digital capture devices, and other technology-based infrastructure.

RRB JE IT (CBT II) Mock Test- 2 - Question 23

Which directory contain configuration files?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 2 - Question 23

Linux Directories

/ is the root directory.

/bin and /usr/bin store user commands.

/boot contains files used for system startup including the kernel.

/dev contains device files.

/etc is where configuration files and directories are located.

/home is the default location for users’ home directories.

RRB JE IT (CBT II) Mock Test- 2 - Question 24

In the circuit shown in figure, the voltmeter reading would be

Detailed Solution for RRB JE IT (CBT II) Mock Test- 2 - Question 24
The voltmeter is connected in parallel with an ammeter

The ideal resistance of ammeter is zero, Hence voltage drop across it (IR=0)

Thus voltmeter shows 0 reading

RRB JE IT (CBT II) Mock Test- 2 - Question 25

Which system privilege a user must have to create a function in their own schema or in another user’s schema or to replace a function in another user’s schema?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 2 - Question 25
  • To create a function in user schema, user must have the CREATE PROCEDURE system privilege

  • To create a function in another user's schema, user must have the CREATE ANY PROCEDURE system privilege

  • To replace a function in another user's schema, user must have the ALTER ANY PROCEDURE system privilege

RRB JE IT (CBT II) Mock Test- 2 - Question 26

Who has been appointed as the head coach of the Indian table tennis team in July 2019?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 2 - Question 26
  • The Table Tennis Federation of India (TTFI) has appointed the Canadian Dejan Papic as the head coach of the Indian table tennis team.

  • He has signed a one-year contract and will be in charge through the 2020 Tokyo Olympics.

  • Papic will be paid USD 7000 per month and his contract will be up for renewal after the Olympics.

RRB JE IT (CBT II) Mock Test- 2 - Question 27

Cookies are used to do which of the following?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 2 - Question 27
Cookies are small files which are stored on a user's computer. They are designed to hold a modest amount of data specific to a particular client and website and can be accessed either by the web server or the client computer.

For example, the first time a user visits a site they may choose a username which is stored in the cookie, and then provide data such as password, name, address etc.

RRB JE IT (CBT II) Mock Test- 2 - Question 28

In MS Paint, which extension is not supported?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 2 - Question 28
Paint is a simple graphics painting program that has been included with all versions of Microsoft Windows. It is often referred to as MS Paint.

The programs open and save files as windows bitmaps.

  • JPEG: Joint Photographic Experts Group

  • GIF: Graphics Interchange Format

  • PNG: Portable Network Graphics

  • TIFF: Tagged Image File Format

.doc is a filename extension for word processing documents (MS Word).

RRB JE IT (CBT II) Mock Test- 2 - Question 29

Who predicted that the number of transistors on an integrated circuit chip would double about every 24 months? What are his concepts called?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 2 - Question 29
In 1965, Gordon Moore, a cofounder of Intel, predicted that the number of transistors on an integrated circuit chip would double about every 24 months. His concept, called Moore's Law, has remained valid for almost 50 years.
RRB JE IT (CBT II) Mock Test- 2 - Question 30

Which is not the valid identifier in C++?

Detailed Solution for RRB JE IT (CBT II) Mock Test- 2 - Question 30
  • Combination of letter (A-Z) and digit (0-9) are used as identifier but identifier should not start with digit

Example: ext321ern and extern21 are valid identifier

  • extern is a reserved word in C programming language, hence it cannot be used as an identifier

  • Underscore “_” is counted as a letter so it can be used as a variable name

  • extern is reserved word in C but _extern is not reserved hence could be used as a variable name

e.g. int extern; // is not a valid variable name

View more questions
Information about RRB JE IT (CBT II) Mock Test- 2 Page
In this test you can find the Exam questions for RRB JE IT (CBT II) Mock Test- 2 solved & explained in the simplest way possible. Besides giving Questions and answers for RRB JE IT (CBT II) Mock Test- 2, EduRev gives you an ample number of Online tests for practice

Top Courses for Computer Science Engineering (CSE)

Download as PDF

Top Courses for Computer Science Engineering (CSE)