0

Information Technology Mixed Test

Description: Information Technology Mix Test
Number of Questions: 25
Created by:
Tags: Information Technology Mix Test Data Communication & Networks Information Technology OOPs Ecommerce
Attempted 0/25 Correct 0 Score 0

How can we achieve information security in a network?

  1. By cryptography

  2. By addressing

  3. By layering

  4. By grade of service


Correct Option: A
Explanation:

Cryptography is a science of securing information in the network. It converts information into some other format which would not be understood by an unauthorized person.

_____________ is also called as fast bridge.

  1. Switch

  2. Gateway

  3. Repeater

  4. Router


Correct Option: A
Explanation:

Switch is also called as fast Bridge. The common forwarding approaches include Cut through, Collision free and Fully buffered.

Which layer addresses are recognized by bridge?

  1. Data link layer

  2. Physical layer

  3. Layer 2

  4. None of these


Correct Option: C
Explanation:

Bridges are network devices which work on first two layers of OSI model with filtering and forwading capabilities.

Which of the following IP address classes uses 3 network ID bits to identify class?

  1. Class A

  2. Class B

  3. Class C

  4. None of these


Correct Option: C
Explanation:

In a class C, IP address; the first three bytes represent the network. The first three bits are 1,1 and 0 which mean that there are 221 network possibilities, i.e. 2,097,152. The networks available in class C are networks going from 192.0.0.0 to 223.255.255.0. Therefore, it uses three network IDs to identify the class.

The total number of possible networks in IP class B is

  1. 126

  2. 128

  3. 2097152

  4. 16384


Correct Option: D
Explanation:

This is the correct answer , the exact possible number of networks in class B is 16384. It is calculated as 214 = 16384. 14 is a usable network ID bits (16 - 2 = 14).

The Internet Standard used for requesting Web services, is

  1. XML

  2. SOAP

  3. HTTP

  4. UDDI


Correct Option: B
Explanation:

SOAP is the standard format for requesting Web services.

Which technology is supported only by Windows?

  1. Net

  2. Java

  3. Oracle

  4. C, C++


Correct Option: A
Explanation:

Net is a framework which is supported only by Windows.

OLTP stands for

  1. Online Transfer Protocol

  2. Online Tourist Plan

  3. Online Analytical Processing

  4. Online Analytical Programming


Correct Option: C
Explanation:

OLTP stands for Online Analytical Processing.

An enterprise resource planning is used to

  1. design and generate reports

  2. manage internal and external resources

  3. spot and analyse business data

  4. create programs


Correct Option: B
Explanation:

Enterprise resource planning is used to manage internal and external resources.

Which of the following is a Sun Certified Java Certification?

  1. Oracle Java Certification

  2. Cisco Certified Architect

  3. Java Associate

  4. Microsoft Certified Professional


Correct Option: C
Explanation:

 It is a Sun Certified Java Certification.

___________ refers to multiple name forms in C++.

  1. Inheritance

  2. Polymorphism

  3. Classes

  4. Encapsulation


Correct Option: B
Explanation:

Polymorphism is an important OOP concept. An operation may exhibit different behaviour in different instances.

_________ header file contains function prototypes for the stream manipulators that enable formatting of streams of data.

  1. Iomanip.h

  2. Iostream.h

  3. Math.h

  4. Fstream.h


Correct Option: A
Explanation:

This header file is required to make use of manipulators like setw() and endl().

__________ is a property of C++ by which classes can be reused without modifying its contents.

  1. Classes

  2. Polymorphism

  3. Inheritance

  4. Encapsulation


Correct Option: C
Explanation:

Inheritance is the property of C++ that allows the reusing of any class into another class without modifying it.

Which of the following operators cannot be overloaded with the help of friend function?

  1. =

  2. +

  3. -

  4. >>


Correct Option: A
Explanation:

The assignment operator cannot be overloaded by using friend function because the left-hand argument is responsible for invoking operator function, which is not possible with assignment operator.

The protected data members of a base class become ___________ when privately derivated in the derived class.

  1. protected

  2. public

  3. private

  4. not inherited


Correct Option: C
Explanation:

The protected data members of a class become private when privately inherited in the derived class to maintain data hiding property of OOP.

_________ is a function that can be called using class name.

  1. Member function

  2. Static member function

  3. Inline function

  4. Recursive function


Correct Option: B
Explanation:

A static member function can be called using the class name instead of its objects and it makes the use of static data members only.

Which of the following is the derived data type in C++?

  1. Structure

  2. Union

  3. Enumeration

  4. Function


Correct Option: D
Explanation:

Function is a derived data type in C++ which is used to perform some predefined tasks.

Which of the following functions moves the get pointer to a specified location?

  1. Seekp()

  2. Tellg()

  3. Seekg()

  4. Tellp()


Correct Option: C
Explanation:

Seekg() function allows the movement of get pointer to a specified location in the file.

Which of the following files modes is used to open a file for reading only?

  1. ios::app

  2. ios::out

  3. ios::nocreate

  4. ios::in


Correct Option: D
Explanation:

This mode is used to open a file for reading only. The input pointer is automatically set at the beginning.

Which of the following flags prints '+' before positive numbers?

  1. ios::showbase

  2. ios::showpoint

  3. ios::showpos

  4. ios::stdio


Correct Option: C
Explanation:

This flag is used with setf() function to print '+' before positive numbers.

________ was developed to support very low cost transaction involving digital goods.

  1. Cybercash

  2. Netbill

  3. Smart card

  4. Credit card


Correct Option: B
Explanation:

Netbill Internet commerce system helps in delivering soft goods including information.  

Which of the following operators in C++ cannot be overloaded?

  1. +

  2. -

  3. ==

  4. ?:


Correct Option: D
Explanation:

The conditional operator(?:) in C++ cannot be overloaded as it is a ternary operator and requires three arguments to operate.

__________ is an unique member function, whose task is to initialize the objects of its class.

  1. Object

  2. Class

  3. Constructor

  4. Destructor


Correct Option: C
Explanation:

Constructor is a special kind of member function, whose task is to initialize the object of its class. This is implicitly called when the object of the class is created.

Which of the following forms of inheritance follows Grandfather-Father-Child relationship?

  1. Multiple inheritance

  2. Multi level inheritance

  3. Single inheritance

  4. Hierarchical inheritance


Correct Option: B
Explanation:

This form of inheritance allows base class to be inherited into intermediate base class which can be further inherited to derived class forming chain of classes.

Which of the following stream classes provides support for simultaneous input and output operations?

  1. Fstream

  2. Ifstream

  3. Ofstream

  4. Fstreambase


Correct Option: A
Explanation:

This stream class inherits all the functions from istream and ostream classes through iostream, allowing both I/O functions.

- Hide questions