0

Information Technology Mixed Test - 3

Description: Information Technology Mix Test - 3
Number of Questions: 20
Created by:
Tags: Information Technology Mix Test - 3 Ecommerce Programming Data Communication & Networks Computer Hardware
Attempted 0/20 Correct 0 Score 0

Which of the c constants cannot be changed and are declared by using the keyword?

  1. Final

  2. Static

  3. Abstract

  4. Immutable


Correct Option: A
Explanation:

Final is a keyword which is used in three cases: (1) a final class means you cannot extend the class, i.e. you can't make a subclass, (2) a final method means you can not override the method, (3) a final variable means you cannot change it's value.

The number of bytes needed to store a number of double data type is

  1. Compiler dependent

  2. JVM dependent

  3. Operating system dependent

  4. 8


Correct Option: D
Explanation:

It holds 8 bytes(64-bits) memory to store a value of a variable. Its range is from -1.79769313486232E308 to -45841247E-324 for negative values and 4.94065645841247E-324 to 1.79769313486232E308 for positive values.

 

Which one is used for the Finalize method, declared with the access specifier?

  1. Public

  2. Private

  3. Protected

  4. Package


Correct Option: C
Explanation:

 Protected is an access specifier.It allows subclasses to inherit the protected thing, even if those classes are outside the package of the super class they extend means a protected class can be inherited outside the package(another package). Protected access specifier is used with finalize method for garbage collection when an object is being garbage collected, the garbage collector will call a special method called finalize in the object. It is also used for cleanup code and to avoid circular references.

How much of storage does a character (represented in Unicode) need?

  1. 1 byte

  2. 4 bytes

  3. 3 bytes

  4. 2 bytes


Correct Option: D
Explanation:

This is the char type, which holds representations of characters such as letters and numbers. The char data type holds 2 byte(16-bits), its range is 0 to 65535, for example: char i ='j'; i is a variable of char type declare and assign it the value 'j'.

 

Which type of network is used within a city?

  1. LAN

  2. CAN

  3. MAN

  4. WAN


Correct Option: C
Explanation:

It covers area larger than LAN but smaller than WAN covering an area of 2 to 100 km. Therefore, MAN allows the sharing of resources within a city.

The fact that any program can print using System.out.print, implies that

  1. system is defined in the package java.lang

  2. system is a class name

  3. out is an object

  4. all of the above

  5. print is a method


Correct Option: D
Explanation:

All of  the above options are correct. Print is a method. Methods have bodies, return types and they can take different types of arguments. Print function is defined in the System class.

Which of the following does not have a superclass in Java programming?

  1. System

  2. Object

  3. Lang

  4. Exception


Correct Option: B
Explanation:

Object is the class and this class is the mother of all classes. Every class in java extends class Object, means the superclass of everything. Any class that does not explicitly extends another class implicitly extends object class. For example: public class lion extends Object {} class lion, which extends class Object explicitly, public class dog {},in this example class dog extends class Object implicitly.

Star topology uses ___________ for connecting devices to form a hybrid network.

  1. repeater

  2. hub

  3. bridge

  4. gateway


Correct Option: B
Explanation:

Each device is connected point-to- point to central device which is called hub. Hub manages and controls all the functions of the network. It also acts a multiport repeater for the data flow.

Which of the following operators doesn't always evaluate all their operands?

  1. &&

  2. &

  3. ||

  4. All of these


Correct Option: D
Explanation:

 All the above options are correct.

The maximum size of L2 cache memory is ___________.

  1. 8 KB

  2. 64 KB

  3. 2 MB

  4. 128 KB


Correct Option: C
Explanation:

L2 cache is referred to the cache which is located outside the processor. Therefore, its size can exceed from L1 cache located inside the processor.

__________ is a high speed network having very high bandwidth, due to the transmission medium used, mainly the fiber optic cable.

  1. Backbone Network

  2. Network Access Point

  3. Regional Network

  4. Internet Service Provider


Correct Option: A
Explanation:

Backbone provider is an organization that supplies access to high speed transmission lines which connect users to the internet.

To promote encapsulation, Java provides an access modifier of ________ type.

  1. public

  2. private

  3. protected

  4. none of these


Correct Option: B
Explanation:

 It is an access modifier: private means that only code within same class can access the private data members.To encapsulate the data or hide  the data we use private instance variable and provide public getter and setter methods. For example: class dog { private int size; public int getSize(){ return size;} public void set Size(int s ){size =s; }}, mark the instance variable(size) private and make the getter(getSize()) and setter(setSize()) methods public.

 

Which end of USB cable connects to the system?

  1. A

  2. B

  3. C

  4. D


Correct Option: A
Explanation:

Because there is four pin USB port in the system and the cable end A also have four pin connector.

The _______ topology is most widely used for networks.

  1. single node

  2. mesh

  3. star

  4. bus


Correct Option: C
Explanation:

It is easy to install, configure and manage and also easy to detect a faulty device.

Single-sided dual-layered DVD, known as DVD-9, has a capacity of _________.

  1. 4.7 GB

  2. 9.5 GB

  3. 17 GB

  4. 8.5 GB


Correct Option: D
Explanation:

This is correct, because the size of single-sided, single-layered DVD is 4.7 GB. Therefore,  the size of this DVD will be just double of it.

_______________ provides each device with a point-to-point connection to every other device in the network.

  1. Star topology

  2. Mesh topology

  3. Bus topology

  4. Hybrid topology


Correct Option: B
Explanation:

Here each device is connected to each other. Data sent by the device can take any possible path to reach the destination. In mesh topology, each device is connected directly to each other.

SCM, Inventory Management, Distribution Management, Channel Management are applications of __________ category of e-commerce.

  1. B2B

  2. B2C

  3. C2B

  4. C2C


Correct Option: A
Explanation:

B2B refers to Business-to-Business in which a business firm makes transactions with other business firms.

The _______ uses IRQ 1 line.

  1. keyboard

  2. sound card

  3. floppy disk controller

  4. COM 1 port


Correct Option: A
Explanation:

 IRQ 1 enables keyboard to communicate with the microprocessor. If we assign the same IRQ to two devices, this will result in an IRQ conflict and the system or the device may malfunction.

The segmentation and re-assembly are functions of

  1. session layer

  2. transport layer

  3. presentation layer

  4. application layer


Correct Option: B
Explanation:

The data unit of the layer known as segment has the functions; segmentation and re-assembly, connection control, flow control and error control.

The CMOS battery is installed on the _____________.

  1. BIOS chip

  2. CMOS chip

  3. RAM

  4. Motherboard


Correct Option: D
Explanation:

CMOS battery is installed on the motherboard because there is a particular socket made for on-the-motherboard, which helps in showing the date and time on the system.

- Hide questions