1. Which of the following provides a programmer with the facility of using object of a class inside other classes?
a)Inheritance
b) Abstraction
c) Encapsulation
12
d) Composition
Ans: d
Explanation: Composition is one of the fundamental concepts in object-oriented programming. It describes a class that references one or more objects of other classes in instance variables. This allows you to model a has-a association between objects.
a)freeware
c) macros
d) none of these
2. Type of software which is designed for users to customize programs is
Ans. a
13
Explanation: Freeware is any copyrighted software, application or program that may be Explanation: Freeware is any copyrind shared. Freeware differs from free software, as the latter allows a user to modify source code for republishing or integration with other software.
3. A major challenge in mixing SQL. with a general-purpose language is mismatching in
the a) Definition of data
b) Manipulation of data
c) Execution of data
d) Output of data
Ans. b
4. In user facilities, copying of all records onto a main store from permanent store is considered as
a) delete file
b) rename file
c) save file
d) load file
Ans. d 1
Explanation: In programming, load means to copy data from main memory into a data
register.
1-
15
2 10
5. To divide a class C network into a maximum of 14 subnets - each capable of having up to 14 hosts, the subnet mask used should be:
a) 255.255.255.0
b) 255.255.255.192
)255.255.255.240
d) 255.255.255.78
1
Ans. c
6. If master and transaction file have keys in same order then it takes
a)less time
b) more time
c) many hours
d) many days
Ans.a
7. What is not the advantage of IPV6 over IPV4?
a)longer address
c) More real IP addresses
b) Classification of traffic
1
d) Jumbo Payload
Ans.a
8. What is the precedence of arithmetic operators (from highest to lowest)?
a)%,+/-
b)+,-%,*/
c)%,+,-,
d)%,*,/,+,-
Ans. d
2
9. Once connection is set up, program can send SQL commands to database by using a) SQLExcelConn
b) SQLDirect
c) SQLExcelDirect
d) SQIConnect
Ans. d
10. File used to update information in computer's master file is classified as
a) transaction file
b) direct file
c) order file
d) sequence file
Ans. a 2
11. Testing of software with actual data and in actual environment is known as?
a) Regression testing
b) Beta testing
c) Alpha testing
d) None of these
Ans. b 2
Explanation: A beta test is a type of testing period for a computer product prior to any sort of commercial or official release. Beta testing is considered the last stage of testing, and normally involves distributing the product to beta test sites and individual users ("beta testers") outside the company for real-world exposure.
12. What are the values of the following expressions: 2** (3**2), (2**3)**2, 2*3**2
a) 64, 512, 64
b)64, 64, 64
c) 512, 512, 512
d) 512, 64, 512
Ans. d
Explanation: Expression 1 is evaluated as: 2**9, which is equal to 512. Expression 2 is evaluated as 8**2, which is equal to 64. The last expression is evaluated as 2** (3**2). This is because the associativity of operator is from right to left. Hence the result of the third expression is 512.
13. Special set of characters that computer associates with specific user identification is classified as
a) password
b)identity code
c) inquiry code
d) dump code
Ans. a
14. What will be the output of the following PHP code? <?php
a)Error
d) None of this
b) Hello World
c) Nothing
"Hello World" ?>
Ans. c
%(qty)d more %(food)s' % ('qty': 1, 'food': ' 15. What is the output of the code shown?
spam')
a) Error
b) 1 more spam
c)No output
d) I more foods
Ans. b
string and key in xml. So print there value. Explanation: Here qty and food are simple
16. Number of bits in 'BCD' code used in computing are
a) seven bits
b) twelve bits
c) eighteen bits
d) six bits
Ans. d
17. To cheek to see of the Web server you command line utility should you use? are trying to reach is available or is down, which
a)PING
b) ICS
c) Telnet
d) None of these
Ans.a
18. Device which converts digital signals into sound and sound digital signals is classified as from telephone handset into
a) digital coupler
b) analogue coupler
c) acoustic coupler
d) terminal coupler
Ans. c
Explanation:
An acoustic coupler is a hardware device that enables a modem (a device that converts signals from analog to digital and from digital back to analog) to connect to a voice circuit.
19. What type of network provides access to the regional service providers and typically span distances greater than 100 miles?
a) LAN
b) MAN
c) WAN
d) WLAN
Ans. c
20. -Provides a connection- oriented reliable service for sending message.
a)TCP
b) IP
c) UDP
d) None of these
Explanation: Transmission Control Protocol (TCP) is a connection-oriented protocol. For connection-oriented communications, each end point must be able to transmit so that it can communicate.... Because they can keep track of a conversation, connection-oriented
protocols are sometimes described as stateful. 21. Which of the following type is not supported for mobile application viewing for Google
docs?
a) Spreadsheets
b) Word processor files
c) Database files
d) All of these
Ans. c
22. The term push and pop is related to the
a)array
Page 8
MCQ
Ans. h
c)lists bistacks 23. Type of error which occurs when data is transferred from one device to another is
d) All of these
classified as
a) transmission error b) interval error c) software error
d) discontinued error
Ans. a
24.
A Non-Functional Software testing done to check if the
user interface is easy to use ang
c) Block Box Testing
Ans. d
understand
b) Unit testing
d) Usability Testing
25. A device that allows one of several analog or digital input signals which are to be
a) Security Testing
b)multiplexer
Explanation:: a multiplexer (or mux), also known as a
c) demultiplexer d) digital transmitter data
Ans. b
a) signal changer
between several analog or digital input signals and forwards it to a single output line. A multiplexer of inputs has select lines, which are used to select which input line to send to
the output.
CATV
Ans. e
selector, is a device that selects
26. Which of the following medium is used for broadband local networks?
a) Coaxial
b) Optic fiber
d)DUTP
Explanation: CATV is one of the most common methods of transmitted television signals to through coaxial cable. recently, CATV can also be transmitted using optical fiber, which utilizes pulses of light to
transmit a signal.
c) file learning
d) searching
Ans. a
27. Interleaving of records to form one file containing all records is classified as
b) finding
d)none of these
29. Variable which use
28. Program background, program functions and computing requirements are part of
a) decision box
b) statement box same name in whole
c) operations detail program and in its
all routines thus best
classified as a) middle variable
b) default variable
c) local variable
Ans. a
d) global variable
Ans. d
Explanation: In computer programming, a global variable is a variable with global scope meaning that it is visible (hence accessible) throughout the program, unless shadowed. The set of all global variables is known as the global environment or global state.
Example:
int a =4:
int b=5;
add()(
30. The name of the testing which is done to make sure the existing features are not
return a+b;)
c) Whitebox testing
Ans. b
affected by new changes a) Recursive testing b) Regression testing
d) Unit testing
Explanation: Regression Testing is defined as a type of software testing to confirm that recent program or code change has not adversely affected existing features. Regressio Testing is nothing but a full or partial selection of already executed test cases which are re executed to ensure existing functionalities work fine. Wheather whitebox testing is tested by 1.
developer and unit testing is small portion testing. Set of numbers used to check all groups record within limits
a) variable check b) decimal check
d) range check
of data is classified as
c) type check
Ans. d
Page 9
MCQ
32. Process of converting data or information in the form of which is readily available for processing is called
a) encoding
b) decoding
c) translating
d) data organization
Ans. a
33. All decimal values and integers are included in set of
d) integers
a) whole numbers
b) natural numbers
c) real numbers
Ans. b
34. Which of the following is not a Software Development Life Cycle Phase?
a) Test Closure
b) Coding
c) Testing
d) None of these
Ans. a
during
Explanation: Test Closure is a document that gives a summary of all the tests conducted ring the software development life cycle, it also gives a detailed analysis of the bugs removed and errors found. In other words, Test Closure is a memo that is prepared prior to formally completing the testing process.
communicate is classified as 35. Any hardware or software which is used to connect two devices by enabling them to
a) analogue modem
b) digital modem
c) analogue interface
d) interface
Ans. d
36. Waterfall model phase in which system design is prepared and this system design helps in specifying system requirements and define overall system architecture is
a) planning
b) modeling
c) construction
d) communication
Ans. b
37. Language compilers and interpreters does not translate statements correctly when they have
a) transcription error
b) base errors
c) syntax error
d) logical error
Ans. c
38. Which of the following web service can be controlled by an iPhone? iAWSManager cloud app from
a) EC2
b) ELB
c) SQS
d) All of these
Ans, d
39. Issuance of cash through terminal outside bank is an example of
a) terminals
b) interfaces
c) hardware devices
d) telecommunication
Ans. a
40. Five components that make up a data communications system are message, sender, receiver, medium and
a) Code
b) connecting device
c) protocol
d) All of these
Ans. c
Explanation: It is a digital language through which we communicate with others on the Internet, Protocol meaning is that it a set of mutually accepted and implemented rules at both ends of the communications channel for the proper exchange of information
00:35:07:59
Probashi Kallyan Bank
Assistant Programmer (MCQ Test-20-09-2019)
Exam Taker: AUST
1. Link list can be implemented using?
a) Array
b) Pointers
c) Both A & B
d) None of these
Ans. b
2. Which of the following is a design pattern?
a) Factory
b) List
c) Queue
d) All of these
Ansa
3. Method used in writing and designed of a program is termed as
a)
bottom-up method b) top-down method
c) split method
d) None of these
Ans. b
Page 10
MCQ
d) backing store
Ans. d
4. Place where large amount of data are stored outside central processing unit is called c) AL unit
a) peripherals
b) control unit
will retain
Explanation: The term backing storage refers to any non-volatile data storage that a computer's data, even after the computer is powered off. Common types of backing storage devices are hard drives, SSD, external hard disk drives, optical media such as CD or DVD, and flash media such as thumb drives and memory sticks.
5. Which of the following programme helps you to learn
Android programming
b)SQL
c) Java
d) Python
Ans. c
6. Which one is modern light weight message exchange format? a)C
c)MX
d)HTML
JSON
b)XML
b)encapsulation c)recursion
d)polymorphism
Ans. b
7. In C++, the idea to hiding the details of how something is implemented is known as
Ans. b
ajinheritance
8. The only language understood by a digital computer is called
d) None of these
Ans. c
a)Assembly language b)High level language c)Binary language
9 . Which of the following is a project scheduling method that can be applied to software
development?
c) Both A & B
d)CMM
Ans. c
Explanation: Program evaluation and review technique (PERT) (CPM) are two project scheduling methods that can be applied to software development. 10. "The time to communicate between Bangladesh and USA is the same as that to nicate between two adjacent houses in Bangladesh."-In which case is the above true?
and critical path method
)PERT
b)Fiber optic
c)Twisted pair
commu-
a) Satellite
d)Radio link
11. Which kind of software testing strategy starts with testing the fundamental components
first?
b)Bottom-up testing
Ans.a
a)Top-down testing
c) Stress testing
b)Channel
d)Back to back testing
12. A path for carrying signals between a source and a destination is known as
13. Which of the standard protocol for network management features?
c) Link
d) Block
a) Router
c)FTP
d)SMTP
a)SNMP
b)SNA
recompile a view
Ans. b
Ans.a
a)
COMPILE VIEW 6)DEFINE VIEW
14. In SQL,the-command is used to
c)ALTER VIEW
d) CREATE VIEW
Ans. c
15. Which of the following is not a standard synchronous communication protocol?
a)SDLC
b)SNA
c)FTP
d)SMTP
Ans. c
16. In Java, which operator is
used to create an object
d) None of these
Ans. d
a) class
b)scanf
is used to create an object.
c)print
Explanation: new ()
17. Which of the following term refers to the degree to which data in a database system are
accurate and correct?
a) Data integrity b)Data security
18. The complexity of Bubble sort algorithm is
c) Data validity
d) None of these
a)0(n)
b)O(log n)
Remaining
c) O(n²)
d) O(n log n)
Ans.a
all the questions are same as which is
taken by AUST.
Ans. c
>>>