Junior Instructor Software Testing Assistant Industrial Training 372/2017,377/2017 Answer Key 16/2019

computer

Post: Junior Instructor Software Testing Assistant
Department: Industrial Training
Category Code: 372/17, 377/17
Question Paper: 16/19
Qualification: SSLC + National Trade Certificate in the appropriate trade; Diploma in the appropriate branch of Engineering
Date of Test: 03-04-2019


If you find mistakes, comment below

  1. Statue of unity situated at :
    • Gujarath
    • Delhi
    • Punjab
    • Calcutta

  2. First Eye Donation Village in Kerala :
    • Pampady
    • Amballur
    • Cherukulathur
    • Poopara

  3. Which city named as City of Wind?
    • London
    • Lisbon
    • Chicago
    • Rome

  4. Who was the organiser of Desa Sevaika Sangh in Travancore?
    • Arya Pallam
    • A. V. Kuttimalu Amma
    • Mary Poonam Lukose
    • Accamma Cheriyan

  5. Rajatarangini, written by the Kalhana describes the history of :
    • Malwa
    • Punjab
    • Kashmir
    • Rajasthan

  6. The constitution of India came in to effect from :
    • 01 January 1950
    • 26 January 1950
    • 15 August 1947
    • 16 August 1947

  7. The Preamble of the Indian Constitution was for the first time amended by the :
    • 41 Amendment
    • 42 Amendments
    • 43 Amendments
    • 44 Amendment

  8. Which of the following is not a Fundamental Rights?
    • Right against exploitation
    • Right to equality
    • Right to liberty
    • Right to property

  9. What is the fees to be paid along with the application for getting information under RT I Act?
    • Rs. 10
    • Rs. 20
    • Rs. 50
    • Rs. 100

  10. Who was the first Foreign Minister of free India?
    • Jawaharlal Nehru
    • Lal Bahadur Sastri
    • Gulsari Lal Nanda
    • I.K. Gujaral

  11. __________set up printing press at Cochin and Vaipicotta.
    • English
    • French
    • Portuguese
    • Dutch

  12. Nivarthana movement was started as a protest against the constitutional reforms of :
    • Reforms of 1919
    • Reforms of 1932
    • Reforms of 1935
    • Reforms of 1946

  13. Who was the founder of Atma Vida Sangham?
    • Agamananda Swami
    • Brahmananda Sivayogi
    • Vaikunta Swami
    • Vagbhatananda Swami

  14. The first temple consecrated by Sri Narayana Guru in :
    • Aruvipuram
    • Varkkala
    • Sivagiri
    • Kollam

  15. Dalawa Kulam is associated with which historical incident of Kerala?
    • Salt Satyagraha
    • Khilafat movement
    • Kundara proclamation
    • Vaikom Satyagraha

  16. Which one of the novels depicts jail life before Indian Independence?
    • Agni kinavukal
    • Adikaram
    • Mathilukal
    • Aarachaar

  17. Who presided over the belgaum session of Indian national congress in 1924?
    • Mottilal Nehru
    • Mahatma Gandhi
    • Jawaharlal Nehru
    • Sarojini Naidu

  18. Beti Bachao Beti Padhao programme was launched at Panipat on :
    • 15 August 2014
    • 26 August 2015
    • 22 January 2015
    • 10 December 2015

  19. Kyoto protocol is related to:
    • Ozone depletion
    • Climate change
    • Water pollution
    • Nuclear energy

  20. Lionel Messi represents which country in international Foot ball?
    • Argentina
    • Portugal
    • Brazil
    • Spain

  21. Application layer provides basis for :
    • Email services
    • Frame Division
    • File Making
    • None of these

  22. UDP is ______ protocol.
    • Connection oriented
    • Connectionless
    • None of these
    • Both 'Connection oriented' and 'Connectionless'

  23. Layer that are used to deal with mechanical and electrical specifications are :
    • Data Link Layer
    • Network Layer
    • Transport Layer
    • Physical Layer

  24. If a hub fails in this type of network, the whole system will shout down :
    • Tree
    • Star
    • Mesh
    • Bus

  25. Which of the following cloud concept is related to pooling and sharing of resources?
    • Polymorphism
    • Abstraction
    • Virtualization
    • None of these

  26. ______ is used for cache memory.
    • DRAM
    • SRAM
    • EPROM
    • Flash Memory

  27. The highest data availability in which RAID level :
    • RAID 1
    • RAID 2
    • RAID 4
    • RAID 6

  28. Which of the following is lowest in memory hierarchy?
    • Cache memory
    • Secondary memory
    • Registers
    • RAM

  29. In DMA transfers, the required signals and addresses are given by the :
    • Processor
    • Device Drivers
    • DMA Controllers
    • The Program itself

  30. The ______ unit is capable of mimicking the processor and indeed of taking over control of the system from the processor.
    • Programmed 1/0
    • Interrupt driven 1/0
    • Direct Memory Access
    • Virtual Memory Access

  31. When displaying a web page, the application layer uses :
    • HTTP Protocol
    • FTP Protocol
    • SMTP Protocol
    • None of these

  32. The transmission data rate is decided by which layer :
    • Network layer
    • Physical layer
    • Data link layer
    • Transport layer

  33. The DMA Controller has _______ registers.
    • 3
    • 2
    • 4
    • 1

  34. Control and Status Registers are used by the Processor to control
    • Design of the Processor
    • Execution of the Processor
    • Speed of the Processor
    • Operation of the Processor

  35. Which of the architecture is power efficient?
    • ISA
    • RISC
    • CISC
    • IANA

  36. Which feature of cloud computing that allows the service to change in size or volume in order  to meet a user's needs?
    • Scalability
    • Virtualization
    • Security
    • Cost savings

  37. Which Register is used to store values of arithmetic and logical operations?
    • Arithmetic Register
    • Accumulator
    • Logical Register
    • Controller

  38. ______ is not a true member of RAID family, because it does not include redundancy to  improve performance.
    • RAID Level 0
    • RAID Level 1
    • RAID Level 2
    • RAID Level 3

  39. End to end connectivity is provided from host to host in _______ layer.
    • Physical layer
    • Data Link layer
    • Transport layer
    • Network layer

  40. Transport layer protocol deals with:
    • Application to application communication
    • Process to process communication
    • Node to node communication
    • None of these

  41. Which type of e-commerce focuses on consumers dealing with each other?
    • B2B
    • B2C
    • C2B
    • C2C

  42. Which of the following was the first commercial Web browser?
    • Mosaic
    • Netscape Navigator
    • Mozilla
    • Internet Explorer

  43. KYC means :
    • Know your customer
    • Know your character
    • Know your chance
    • None of these

  44. What is meant by Aadhaar seeding?
    • Linking of Aadhaar with Bank Account
    • Duplicate issuance of Aadhaar
    • Transfer of Aadhaar
    • None of these

  45. Intellectual Property Rights (IPR) protect the use of information and ideas that are of :
    • Ethical Value
    • Moral Value
    • Social Value
    • Commercial Value

  46. Hall Mark is :
    • Trademark
    • Certification Mark
    • Collective Mark
    • Both Trademark  and Certification Mark

  47. Which type of firewall includes in a router to direct the flow of network traffic?
    • Packet Filtering
    • IP Spoofing
    • Circuit Level
    • Application Level

  48. A firewall is used in a system connected to wide area network to :
    • Prevent spread of fire in the network
    • Prevent unauthorized access by hackers
    • To scan for viruses in files
    • To extinguish fire spreading via network cables

  49. An encryption algorithm transforms plaintext into :
    • Cipher text
    • Simple text
    • Plain text
    • Empty text

  50. The code segment that misuses its environment is called a :
    • Internal thief
    • Code stacker
    • Trojan horse
    • None of these

  51. Certification mark can be registered in :
    • Trademark Registry
    • Certification Board
    • Quality Control Board
    • MHRD

  52. How many types of permissions a file has in UNIX?
    • 1
    • 2
    • 3
    • 4

  53. Unique identification Authority of India (UIDAI) scheme was launched in the year :
    • 2009
    • 2011
    • 2013
    • 2015

  54. UJALA scheme is related to :
    • Solar Panel distribution
    • LED Bulbs distribution
    • LPG Cylinder distribution
    • None of these

  55. Which one of the following is not an attack, but a search for vulnerabilities to attack?
    • Denial of service
    • Dumpster diving
    • Memory access violation
    • Port scanning

  56. What is a trap door in a program?
    • A security hole inserted at programming time in the system for later use
    • A type of antivirus
    • Security hole in a network
    • None of these

  57. The DMA controller is connected to the :
    • Processor bus
    • System bus
    • None of these
    • External bus

  58. Which mechanism is used by worm process?
    • Trap process
    • Fake process
    • VAX process
    • Spawn process

  59. Which of the following is used to provide a baseline measure for comparison of IDSs?
    • Crossover error rate
    • False negative rate
    • False positive rate
    • Bit error rate

  60. A method used by an IDS that involves checking for a pattern to identify unauthorized  activity :
    • Session Splicing
    • Protocol Decoding
    • Pattern Matching
    • State Table

  61. The bar which displays information about the current page number is :
    • Title bar
    • Status bar
    • Standard bar
    • Formatting bar

  62. Home key uses for :
    • Moves the cursor beginning of the document
    • Moves the cursor beginning of the paragraph
    • Moves the cursor beginning of the screen
    • Moves the cursor beginning of the line

  63. Portrait and Landscape are :
    • Page Orientation
    • Page Size
    • Page Layout
    • All of these

  64. Background color or effects applied on a document is not visible in :
    • Web Layout View
    • Print Layout View
    • Print Preview
    • Reading View

  65. Statistical calculations and preparation of tables and graphs can be done using :
    • Adobe Photoshop
    • Notepad
    • Excel
    • Power Point

  66. A subquery in an SQL SELECT statement is enclosed in :
    • braces -- {...}
    • CAPITAL LETTERS
    • parenthesis -- {...}
    • brackets -- {...}

  67. The SQL ALTER statement can be used to :
    • Change the table structure
    • Change the table data
    • Add rows to the table
    • Delete rows from the table

  68. What is the keyboard shortcut for creating a chart from the selected cell range?
    • F2
    • F4
    • F8
    • F11

  69. What shortcut key to enter current date in cell in excel?
    • Ctrl +;
    • Alt +;
    • Home +;
    • Shift +;

  70. Which Function is used to calculate Remainder in MS Excel?
    • INT ( )
    • FACT ( )
    • MOD ( )
    • DIV ( )

  71. Short cut "Ctrl + R" is used to :
    • Re Open the last closed document
    • Re-Print the last printed page
    • Re Apply the paragraph formatting
    • Right align the selected paragraph

  72. Which one of the following sorts rows in SQL?
    • SORT BY
    • ORDER BY
    • ALIGN BY
    • GROUP BY

  73. Tables in second normal form (2NF) :
    • Eliminate all hidden dependencies
    • Eliminate the possibility of a insertion anomalies
    • Have a composite key
    • Have all non key fields depend on the whole primary key

  74. How to select all data from student table starting the name with letter 'R'?
    • SELECT * FROM student WHERE name LIKE 'R%';
    • SELECT * FROM student WHERE name LIKE '%R';
    • SELECT * FROM student WHERE name LIKE 'R%_';
    • SELECT * FROM student WHERE name LIKE '_R%';

  75. You can detect spelling and grammar errors by :
    • Press Shift + F7
    • Press F7
    • Press Ctrl + F7
    • Press Alt + F7

  76. Functional Dependencies are the types of constraints that are based on :
    • Superset key
    • Key revisited
    • Key
    • None of these

  77. The full form of OLAP is :
    • Online Analytical Processing
    • Online Advanced Processing
    • Online Advanced Preparation
    • Online Analytical Performance

  78. Which SELECT statement will the result 'ello world' from the string 'Hello World'?
    • SELECT INITCAP (TRIM ('Hello World', 1,1) FROM dual;
    • SELECT LOWER (SUBSTR ('Hello World', 1,1) FROM dual;
    • SELECT LOWER (SUBSTR ('Hello World', 2,1) FROM dual;
    • SELECT LOWER (TRIM ('H' FROM 'Hello World')) FROM dual;

  79. The DROP TABLE statement :
    • Deletes the table structure only
    • Deletes the table structure along with the table data
    • Works whether or not referential Integrity constraints would be violated
    • Is not an SQL statement

  80. "Ctrl + W" is used to :
    • Save and Close Document
    • Save and Print the Document
    • Save and Close Word Application
    • Without Save, Close Document

  81. IPv6 addressed have a size of :
    • 32 bits
    • 64 bits
    • 128 bits
    • 256 bits

  82. to transmit information on the World Wide Web.
    • TPPH
    • HTTP
    • HTML
    • HTPT

  83. Each IP packet must contain
    • Source and destination address
    • Source or destination address
    • Only destination address
    • Only source address

  84. MIME stands for :
    • Multipurpose Internet Mail Extra
    • Multipurpose Internet Mail End
    • Multipurpose Internet Mail Email
    • Multipurpose Internet Mail Extensions

  85. Which of the following is the first web browser?
    • Netscape Navigator
    • Nexus
    • Internet Explorer
    • Mosaic

  86. Who created the first web browser?
    • Tim Berners Lee
    • Jacobs Lan
    • Marc Andreessen
    • Mozilla foundation

  87. The delay that occur during the playback of a stream is called :
    • Stream delay
    • Playback delay
    • Jitter
    • Event delay

  88. An applet is a program written in Java on the :
    • Web
    • Server
    • Domain
    • Client

  89. The _______ tag defines an Image in an HTML page.
    • <image>
    • <pic>
    • <imge>
    • <img>

  90. Software mistakes during coding are known as :
    • Errors
    • Failures
    • Bugs
    • Defects

  91. Cyclomatic Complexity method comes under which testing method :
    • Yellow box
    • White box
    • Gray box
    • Black box

  92. Which of the following is / are not a verification activity?
    • Inspection
    • Technical Review
    • Walkthrough
    • Testing

  93. Verification and Validation uses :
    • Internal and External resources respectively
    • Internal resources only
    • External resources only
    • External and Internal resources respectively

  94. What is the order of Priority Testing?
    • Unit >> Integration >> System Testing
    • Unit >> System >> Acceptance Testing
    • System>> Integration >> Acceptance Testing
    • System >> Acceptance >> Integration

  95. Validation is the responsibility of :
    • Developer
    • Designer
    • Tester
    • QA Team

  96. Choose the correct HTML tag to make the text bold :
    • <B>
    • <BOLD>
    • <STRONG>
    • Both <B> and <STRONG>

  97. For using subscription web documents which tag is used?
    • <sup></sup>
    • <sub></sub>
    • <subscript></ subscript>
    • <superscript></superscript >

  98. A web address is also called a :
    • URL
    • ULR
    • RLU
    • LUR

  99. Internet uses :
    • Circuit switching
    • Telephone switching
    • Telex switching
    • Packet switching

  100. Which of the following is used to read a HTML page and render it?
    • Web matrix
    • Web server
    • Web browser

%

No comments

Post a Comment