Previous Year Technical MCQs
Contents
Infosys ............................................................................................................................... 1
HCL ................................................................................................................................. 26
Deloitte ............................................................................................................................ 40
Capgemini ....................................................................................................................... 76
Infosys
Pseudocodes:
1. What will be the output for input values x = 4 and y = 3?
a. 16
b. 12
c. 8
d. 20
Answer : b. 12
Explanation :
Material Copyright @knacademycourses
2. What would be its output for parameters a = 3 and b = 4?
a. 12
b. 9
c. 15
d. 10
Answer : a. 12
Explanation :
Material Copyright @knacademycourses
3. What will be the output if x = 5 and y = 3?
a. 9
b. 13
c. 10
d. 12
Material Copyright @knacademycourses
Answer : a. 9
Explanation:
4. What will be printed if initial value of n = 16?
a. 4
b. 1
c. 2
d. 8
Answer : b. 1
Explanation:
Material Copyright @knacademycourses
5. What is the output for a=7?
a. 16
b. 17
c. 15
d. 14
Answer : a. 16
Explanation:
Material Copyright @knacademycourses
6. What is the output for n=42?
a. 3
Material Copyright @knacademycourses
b. 4
c. 5
d. 6
Answer : a. 3
Explanation :
7. n=4
a. 4 stars in a line
b. 4 stars in a column
c. 10 stars in a triangle
d. 6 stars in a triangle
Answer : c. 10 stars in a triangle
Explanation:
Material Copyright @knacademycourses
8. What’s the result for arr=[1,2,3,4,5]?
a. 15
b. 6
c. 9
d. 12
Answer : c. 9
Explanation:
9. What is returned for str= “INFOSYS”?
Material Copyright @knacademycourses
a. 2
b. 3
c. 1
d. 4
Answer: a. 2
Explanation:
10. a=15 and b=12
a. 27
b. 23
c. 25
d. 24
Answer : a. 27
Material Copyright @knacademycourses
Explanation:
11. x=8
a. 21
b. 34
c. 13
d. 55
Answer: a. 21
Explanation:
Material Copyright @knacademycourses
12. n=3
a. 10
b. 9
c. 14
d. 12
Answer: c. 14
Explanation:
Material Copyright @knacademycourses
13. n=5
a. 9
b. 15
c. 10
Answer: a. 9
Explanation:
Material Copyright @knacademycourses
14. Consider x=36
a. 3
b. 2
c. 4
d. 5
Answer: a. 3
Explanation:
Material Copyright @knacademycourses
15. What is the output for arr=[2,4,6,8,10]?
a. 2
b. 3
c. 1
d. 4
Answer: a. 2
Explanation:
Material Copyright @knacademycourses
16. What is the output when number=6?
a. 1440.0
b. 1340.0
c. 1700.0
d. 1560.0
Answer: a. 1440.0
Explanation:
Material Copyright @knacademycourses
17. What will happen in below pseudo code?
a. The program will not enter the loop.
b. Code will run infinite number of times.
c. Code will execute and the value of res will be displayed once.
d. Code will execute and the value of res will be displayed twice.
Answer: b. Code will run infinite number of times.
Explanation:
Material Copyright @knacademycourses
18. What is the output of the below pseudo code?
Set value= ‘ ’*10;
Print value
a. 100
b. 320
c. 10
d. 200
Answer: b. 320
Explanation:
19.
a. Code executes successfully and the value of salary is displayed once.
b. Code executes successfully and nothing is displayed.
c. Code executes successfully the value of salary is displayed infinite times.
d. Compilation error.
Answer: c. Code executes successfully the value of salary is displayed infinite
times.
Explanation:
Material Copyright @knacademycourses
20.
a. 13
b. 90
c. 28
d. 63
Answer: b. 90
Explanation:
21. Output of the following pseudo code?
a. 5
b. 3
c. 8
d. 2
Answer: d. 2
Explanation:
Material Copyright @knacademycourses
22. n=10
a. 35.0
b. 25.0
c. 45.0
d. 55.0
Answer: a. 35.0
Explanation:
Material Copyright @knacademycourses
23.
a. None
b. 40
c. 50
d. 60
Answer: b. 40
Explanation:
Material Copyright @knacademycourses
24.
a. 1
b. 3
c. 0
d. 2
Answer: d. 2
Explanation:
25. Output for the following pseudocode?
a. 40
b. 20
c. 10
Material Copyright @knacademycourses
d.50
Answer: a. 40
Explanation:
26. What is the output?
a. 5
b. 3
c. 2
d. 1
Answer: d. 1
Explanation:
2 AND 1=>1
Material Copyright @knacademycourses
z+1=>6
1 OR 6 => 1
So, the output is 1
27. Find the output
Integer x, y, z
Set x = 4, y = 3, z = 1
if (x >> (z - 1)) && y << (z + 1))
x=x+c
else
y = x << z
End if
Print x - y + z
a. 5
b. 3
c. 8
d. None of these
Answer: d. None of these
Explanation:
28. What is the output when n=35?
Material Copyright @knacademycourses
a. 55.0
b. 50.0
c. 53.0
d. 47.0
Answer: a. 55.0
Explanation:
29. number=6
a. 1440.0
b. 1700.0
c. 1560.0
d. 1340.0
Answer: a. 1440.0
Explanation:
Material Copyright @knacademycourses
30. What will be the output?
a. 6 5 11
b. 6 6 12
c. 5 6 7
d. 6 6 11
Answer: b. 6 6 12
Explanation:
Material Copyright @knacademycourses
HCL
Computer Fundamentals
1.
a. DNS
b. Router
c. IP address
d. BIOS
Answer: a. DNS
Explanation:
When you type [Link] into your browser, the DNS (Domain Name System)
resolves it into the corresponding IP address. Only then can the computer locate and
connect to the correct web server.
2.
Answer: a. Bus
Explanation:
On the motherboard, communication between the processor, memory, and peripherals
happens through buses, which are sets of parallel electrical lines designed to transfer
data, address, and control signals efficiently.
Material Copyright @knacademycourses
3.
Answer: c. All of the mentioned options
Explanation:
4.
Answer: b. in RAM
Explanation:
5.
Answer: d. All of the mentioned options
Explanation:
Material Copyright @knacademycourses
6.
Answer : b. 2
Explanation:
7.
Answer: d. Dynamic
Explanation:
A dynamic web page displays different content depending on the time of day or user
accessing the page. Dynamic web pages are generated in real-time and can change
based on user interaction, preferences, or other external factors. In contrast, static web
pages always show the same content to every user. Therefore, the correct answer
is Dynamic.
Material Copyright @knacademycourses
8.
Answer: c. F5
Explanation:
Pressing the F5 key is the standard shortcut for refreshing content on the desktop in
Windows and in many browsers. The other keys have different functions: F1 (help), F2
(rename), F4 (address bar in Explorer or close in combination with Alt). Therefore, the
correct answer is F5.
9.
Answer: b. The computer has been infected by a Ransomware
Explanation:
When a threatening message appears demanding payment and denies access to files, it
is a classic sign of a ransomware attack. Ransomware encrypts files and demands a
ransom for their release. This is not the typical behavior for general viruses, sharing
passwords, or adware.
10.
Answer: D. Printer
Explanation:
Material Copyright @knacademycourses
A printer can be connected to a network (network printer) and shared by multiple users
or computers. Devices like a stylus, powerbank, and headphones are not typically
designed for network sharing, but a printer is commonly shared in home and office
networks.
11.
Which of the following applications stores and converts data into information and works
with large quantities of data?
1. MySQL
2. Microsoft ACCESS
Choose the correct answer from the options given below.
A. Only 1
B. Both 1 and 2
C. Only 2
D. Neither 1 nor 2
Answer: B. Both 1 and 2
Explanation:
Both MySQL and Microsoft Access are database management systems that store,
manage, and allow you to convert data into information, as well as handle large
quantities of data. MySQL is widely used for large-scale, web-based databases, while
Microsoft Access is suitable for desktop and small business applications. Therefore,
the correct answer is Both 1 and 2.
12.
Answer: D. ROM
Explanation:
ROM (Read Only Memory) stores the firmware, which includes the operating system
software and other critical instructions needed for the computer to start up. RAM is
volatile and mainly stores data temporarily while the computer is running. ROM is non-
Material Copyright @knacademycourses
volatile and retains content even when the computer is powered off, making it essential
for storing system software.
13.
If you want to insert a number as a text in a cell in MS-Excel, then which of the following
should be used?
A. =
B. "
C. +
D. '
Answer: D. '
Explanation:
14.
Answer: D. All of the mentioned options
Explanation:
Material Copyright @knacademycourses
15.
Which of the following keyboard shortcut keys is used to open Windows Task Manager?
A. Ctrl + Esc
B. Ctrl + Shift + Esc
C. Ctrl + Home
D. Ctrl + Alt
Answer: B. Ctrl + Shift + Esc
Explanation:
16.
Answer: D. BIOS Chip
Explanation:
17.
Answer: C. Incognito mode
Material Copyright @knacademycourses
Explanation:
Incognito mode (or private browsing mode) is designed so that browsing history,
cookies, and site data are not saved after the window is closed. Opening a new window
does not prevent history from being saved, and browsing history is typically saved
unless specifically using Incognito mode. Therefore, using Incognito mode is the correct
choice.
18.
Answer: D. EPROM
Explanation:
EPROM (Erasable Programmable Read-Only Memory) is a type of memory chip whose
contents can be erased by exposure to ultraviolet light and then reprogrammed. None of
the other options refer to chips that are erasable by UV light.
19.
Answer: C. Only 3
Explanation:
Material Copyright @knacademycourses
20. How will you delete temporary files and folders in your Windows system?
A. Go to C drive (C:) then select the 'temp' folder and delete all the content inside that
folder
B. Type %temp% in the RUN command box and delete all the files and folders appearing
in that list
C. Press "Ctrl+Delete" and then delete all the files and folders appearing in that list
D. Type %programfiles% in the RUN command box and delete all the files and folders
appearing in that list
Answer: Option B
Explanation:
Typing %temp% in the RUN command box quickly opens the folder containing
temporary files for the current user, allowing for safe deletion. This is the standard and
proper way to remove temp files in Windows.
21.
Answer: C. All 1, 2, and 3
Material Copyright @knacademycourses
Explanation:
All the tasks listed—media download, file transfer, and financial transaction—can be
accomplished using the Internet. Downloading media, transferring files, and
conducting financial transactions online are all common uses of Internet connectivity.
22.
Answer: A. Only 3,4,5
Explanation:
23.
Answer: D. All of the mentioned
Material Copyright @knacademycourses
Explanation:
24.
Answer: Option A
Explanation:
Both USB and Bluetooth are used to establish a Personal Area Network (PAN), which
connects devices in a very limited area such as an individual workspace or between
nearby devices. Neither creates a Metropolitan Area Network (MAN).
Material Copyright @knacademycourses
25.
Answer: B. Both 1 and 2
Explanation:
A microprocessor is the central processing unit of a computer, whereas a chipset is a
group of integrated circuits that manage data flow between the processor, memory, and
peripherals, and also performs certain processing functions. Both can be classified as
processing devices.
26.
Answer: C. UPS
Explanation:
A UPS (Uninterruptible Power Supply) is an external device with a battery that supplies
power to a computer or other electronics in case of a power outage, allowing safe
shutdown or continued operation for a short time. CPU and SMPS do not serve this
function.
Material Copyright @knacademycourses
27.
Answer: A. Video Editors
Explanation:
Video editors require a large amount of RAM due to the need to process high-resolution
video files, rendering effects, and handling large data streams. Spreadsheets and word
processors use much less RAM compared to video editing software.
28.
Which of the following can be formed if we connect personal computers?
A. Supercomputer
B. Server
C. Enterprise
D. Network
Answer: D. Network
Explanation:
When personal computers are connected together, the resulting system is called a
network. This allows the computers to share resources and communicate with each
other.
29.
Answer: B. Software and Video
Explanation:
Material Copyright @knacademycourses
"Software and Video" is not a standard category in the Windows Control Panel, whereas
"Hardware and Sound," "Network and Internet," and "System and Security" are typical
categories found there.
30.
Answer: D. System Software
Explanation:
An operating system is classified as system software because it manages the hardware,
software resources, and provides common services for application software. It is not
utility or application software.
31.
Answer: B. Insufficient RAM
Explanation:
32.
Answer: A. Space
Material Copyright @knacademycourses
Deloitte
1. Retesting the entire application after a change has been made is defined as?
a. Retesting.
b. Regional Regression.
c. Full Regression Testing.
d. Unit Regression.
Answer: c. Full Regression Testing.
Explanation:
2. Switches are better than hubs?
1. Reducing network traffic
2. Better performance
a. Neither 1 nor 2
b. Both 1 and 2
c. Only 2
d. Only 1
Answer: b. Both 1 and 2
Explanation:
Switches are better than hubs because they reduce network traffic by sending data only
to the specific device it is intended for, rather than broadcasting to all devices like a hub
does. This targeted communication also leads to better overall network performance for
users.
3.
Material Copyright @knacademycourses
Answer: Option 1
Explanation:
4. Which of the following is not part of the Test document?
a. Test Case
b. Requirements Traceability Matrix [RTM]
c. Test strategy
d. Project Initiation Note [PIN]
Answer: d. Project Initiation Note [PIN]
Explanation:
5. Which of the following is not a valid phase of SDLC (Software Development Life
Cycle)?
a. Testing Phase
b. Requirement Phase
c. Deployment Phase
Material Copyright @knacademycourses
d. Testing Closure
Answer: d. Testing Closure
Explanation:
The valid SDLC phases are typically Requirement Analysis, Design, Development,
Testing, Deployment, and Maintenance. "Testing closure" is not considered a standard
SDLC phase; it is usually related to test process closure activities in the software testing
life cycle, not in SDLC itself.
6. Functional testing is a ------?
a. Test design technique
b. Test level
c. SDLC Model
d. Test Type
Answer: d. Test Type
Explanation:
Functional testing is categorized as a test type because it focuses on verifying that the
software performs its intended functions as specified in the requirements, without
concern for how those functions are implemented. It is not a test design technique, test
level, or SDLC model.
7.
Answer: c. HDD
Explanation:
Material Copyright @knacademycourses
8.
Answer: b. Monitor
Explanation:
9.
Answer: d. Mesh Topology
Explanation:
10.
Answer: a. Bus
Explanation:
Material Copyright @knacademycourses
A bus topology is the simplest to set up and uses the least amount of cabling compared
to star, ring, and mesh topologies, which require more complex connections and longer
cable runs.
11. What types of attack inundates a network or server with an excessive number of
requests, rendering it inaccessible for legitimate users?
a. Phishing
b. Spoofing
c. DDos
d. Brute Force
Answer: c. DDos
Explanation:
12. What is the principal purpose of a firewall in network security?
Answer: b. Access Control
Explanation:
13.
Material Copyright @knacademycourses
Answer: B) Deceptive attempt to obtain sensitive information
Explanation:
Phishing is a cyber attack where attackers use deceptive tactics—typically emails or
fake websites—to trick individuals into revealing sensitive information such as
passwords, credit card numbers, or other personal details.
14.
15.
16.
Material Copyright @knacademycourses
17.
18.
Material Copyright @knacademycourses
19.
Explanation:
20.
Material Copyright @knacademycourses
21.
a. Mesh Topology
b. Bus Topology
c. Ring Topology
d. Star Topology
Answer: c. Ring Topology
Explanation:
22.
Answer: Static Analysis
Material Copyright @knacademycourses
Explanation:
Static analysis involves reviewing requirements documents like SOW (Statement of
Work) and business requirement statements during the early phases of SDLC, before
code execution, making it the appropriate activity for comprehensive analysis of
requirements.
23.
Answer: No
24.
Answer: Dual In-line Memory Module
Explanation:
DIMM stands for Dual In-line Memory Module, which is a type of computer memory
module used in desktops, laptops, and servers for RAM expansion.
Material Copyright @knacademycourses
25.
Answer: Only II) and III)
Explanation:
26.
Material Copyright @knacademycourses
27.
28.
29.
Material Copyright @knacademycourses
30.
31.
32.
Material Copyright @knacademycourses
33.
34.
35.
Material Copyright @knacademycourses
a. 10
b. 11
c. 12
d. 13
Answer: d.13
Explanation:
36. What is the output?
}
a. 4
b. 5
c. 6
d. 7
Answer: b. 5
Material Copyright @knacademycourses
Explanation:
37.
Answer: Option C
Explanation:
• In binary search, each recursive step divides the input size by 2 (hence T(n/2)),
and the extra work per step (comparing the middle element) is constant
time O(1).
Material Copyright @knacademycourses
• Thus, the recurrence relation is T(n) = T(n/2) + O(1) , with the base case
being O(1) for small input sizes.
38.
Answer: Option B
Explanation:
39. Which of the below are document-based Database services?
I) MySQL
II) MongoDB
III) Cassandra
IV) CouchDB
Options:
a. All of the options given
b. Only (III) and (II)
Material Copyright @knacademycourses
c. Only (I) and (II)
d. Only (II) and (IV)
Answer: d. Only (II) and (IV)
Explanation:
40. Choose the incorrect statement(s) regarding IPv4 protocol
Answer: b. Only (I) and (II)
Explanation:
41.
Material Copyright @knacademycourses
Answer: c. [Link]
Explanation:
42.
Answer: D. Full Outer Join
Explanation:
A FULL OUTER JOIN returns all rows from both tables. If there is no match for a row in
one table, the result contains NULL for each column of the table without a match. This
join ensures that every row from both tables appears in the result set, with NULLs where
data is missing from either side
43.
Answer: A) Worm
Explanation:
A worm is a type of malware specifically designed to replicate itself and automatically
spread across networks to infect other computers without requiring any user action.
Worms exploit vulnerabilities to propagate and can cause widespread disruptions
44.
Material Copyright @knacademycourses
Answer: B) Kubernetes
Explanation:
Kubernetes is a widely-used platform specifically designed for automating deployment,
scaling, and management of containerized applications, handling orchestration across
clusters of servers. Docker is used for container creation, Jenkins for CI/CD automation,
and Ansible for configuration management and automation, but only Kubernetes
focuses on container orchestration.
45.
Answer: B. White Box Testing
Explanation:
White box testing involves examining the internal structure, design, and coding of the
software to develop test cases and verify expected behaviors. This method requires
knowledge of the application's internal logic and implementation. The other options
focus on external functionality or previously tested behaviors, not on internal structure.
46.
Material Copyright @knacademycourses
47.
48.
49.
Material Copyright @knacademycourses
50.
51.
52.
Material Copyright @knacademycourses
53.
54.
55.
Material Copyright @knacademycourses
56.
57.
58.
Material Copyright @knacademycourses
59.
60.
61.
Material Copyright @knacademycourses
62.
63.
64.
Material Copyright @knacademycourses
65.
66.
67.
Material Copyright @knacademycourses
68.
69. What is the output of the following code snippet?
Python
x = [1, 2, 3]
print(x[1])
A) 1
B) 2
C) 3
D) Index Error
Answer: B) 2
Explanation:
Lists in Python are zero-indexed. So, x accesses the second element of the list x, which
is 2. No error occurs, and the output is 2.
70.
Material Copyright @knacademycourses
71.
72.
73.
Material Copyright @knacademycourses
74.
Answer : All the options
Explanation:
Putty does support SSH-2 RSA keys for secure connections. Its private keys use the .ppk
(PuTTY Private Key) extension. These keys are not compatible with other clients unless
converted to the appropriate format, so all the statements are correct.
75.
Answer: Option 2
Explanation:
In public key cryptography, the sender uses the receiver’s public key to encrypt the
message so that only the receiver, who possesses the corresponding private key, can
decrypt and read the secret message.
76. An authentication method that enables users to authenticate with multiple
applications or websites using a single set of credentials is known as
Material Copyright @knacademycourses
A) None of the options
B) Single Sign On
C) Single Sync On
D) Secure Sign-On
Answer:
Single Sign On
Explanation:
Single Sign On (SSO) allows users to access multiple applications or websites using just
one set of login credentials, improving convenience and reducing password fatigue by
removing the need to remember multiple passwords for different services.
77.
78.
Answer: 12
Material Copyright @knacademycourses
79.
Answer: Conditional Formatting
Explanation:
Conditional formatting is a feature in spreadsheet applications like MS Excel that allows
users to automatically change the appearance of cells (such as coloring) based on
specific conditions or criteria, making data analysis more visual and effective.
80.
Answer: Only I and II
Explanation:
Statement I correctly defines Software Quality Assurance (SQA) as activities focused on
process quality. Statement II correctly defines Software Quality Control (SQC) as
activities focused on product quality. Statement III is incorrect because SQA focuses on
processes to prevent defects, not on identifying defects in products (which is SQC's
role).
Material Copyright @knacademycourses
81.
Answer : MOM Model
Explanation:
82.
Answer: Charts
83.
#include <stdio.h>
void s();
int main()
{
int i;
for (i = 1; i < 3; i++)
Material Copyright @knacademycourses
s();
return 0;
}
void s() {
int var = 0;
static int var1 = 0;
printf("%d %d\n", var, var1);
++var;
++var1; }
Answer :
00
01
Explanation:
84.
Material Copyright @knacademycourses
Answer: No output will be printed
Explanation:
85.
Answer: 6
Explanation:
Material Copyright @knacademycourses
86.
Answer: &&
Explanation:
87.
Answer: Path Testing
Explanation:
A control flow graph visually represents all possible execution paths through a program.
Path testing uses this graph to design test cases that ensure every possible path is
executed at least once, uncovering errors in logic and structure. It is not related to
monkey, gorilla, or negative testing approaches.
Material Copyright @knacademycourses
Capgemini
1.
Answer: Option B
Explanation:
2.
Answer : Network Layer
Explanation:
Material Copyright @knacademycourses
3.
Answer : Class D
Explanation:
4.
Answer: Class D
Explanation:
5.
Material Copyright @knacademycourses
6.
7.
8.
Material Copyright @knacademycourses
9.
10.
Material Copyright @knacademycourses
11.
12.
13. Which of the following should be replaced with the question mark in the following
figure?
Material Copyright @knacademycourses
14.
Answer: c) 3
Explanation:
Strategy Phase, Planning Phase and Deployment Phase are the three phases of Cloud
Planning.
15.
Answer: b. O(n)
Explanation:
Searching for an element in a linked list requires traversing each node sequentially until
the desired element is found or the end of the list is reached. Therefore, the time
complexity is linear, or O(n), where n is the number of nodes.
Material Copyright @knacademycourses
16.
Answer: Option C
Explanation:
17.
Answer : b. Output restricted queue
Explanation:
Material Copyright @knacademycourses
18.
19.
Answer : b. 50,10,30
Material Copyright @knacademycourses
20.
Answer : d. Single ended Queue
Explanation:
Linear, circular, and double ended queue (deque) are all actually types of queues used
in data structures. However, "Single ended queue" is not a recognized or standard type
of queue; it is not a formal classification used in queue data structures.
21.
22.
Material Copyright @knacademycourses
23.
a. 56
b. 88
c. 72
d. 65
Answer : c. 72
Explanation:
Material Copyright @knacademycourses
24.
The below query can be replaced with,
Answer : Option C
Explanation:
25.
Answer : Physical level
Material Copyright @knacademycourses
26.
Answer : Data Manipulation Language
Explanation:
DML includes commands like SELECT, INSERT, UPDATE and DELETE, specifically
designed for data access and modification.
27.
Answer: b. Virtualization
Explanation:
28.
Material Copyright @knacademycourses
Answer : B. Memory Allocation from stack
Explanation:
29.
Answer : B. 225
Explanation:
30.
Material Copyright @knacademycourses
Answer : B. 4
Explanation:
The height is 4 edges from root (1) to deepest leaf (9).
31.
Answer : A) 4565
Explanation:
32.
Material Copyright @knacademycourses
33. What is the output for the below code?
a. 3
b. 4
c. 5
d. 6
34. What is the output for the code below?
#include <stdio.h>
Material Copyright @knacademycourses
int main() {
int a = 11, b = 4, c = 3;
b != !a;
c = !!a;
printf("%d %d",b, c);
return 0;
}
a. 4 1
b. 3 2
c. 2 4
d. 4 2
Answer : a. 4 1
Explanation:
35.
Material Copyright @knacademycourses
Answer: Option C
Explanation:
36.
Explanation:
Material Copyright @knacademycourses
37.
Explanation:
It is because , 2^3=8
38.
Explanation:
Material Copyright @knacademycourses
39.
Explanation:
Convert 368 into binary using division by 2 method. The binary form is 101110000
40. What will be the output of the following code?
Answer: A. None of these
Explanation:
41.
Material Copyright @knacademycourses
42.
43.
Material Copyright @knacademycourses
44.
45.
46.
Material Copyright @knacademycourses
47.
48. Predict the output for the code below
Material Copyright @knacademycourses
49. Output of the below code?
50. Predict the output for the below code:
#include <stdio.h>
int main()
{
printf("%c ", 5["CapGemini"]);
return 0;
}
Material Copyright @knacademycourses
51.
52.
Material Copyright @knacademycourses
53. A subnet has been assigned a subnet mask of [Link]. What is the
maximum number of hosts that can belong to this subnet?
A. 63
B. 128
C. 64
D. 62
Answer : D.62
Explanation:
54.
Material Copyright @knacademycourses
Explanation:
55.
Explanation:
56. Output for the following code is?
Material Copyright @knacademycourses
a. 2
b. 13
c. 26
d. 5
Answer : b. 13
Explanation:
57. What would be the output of the following pseudocode?
#include <stdio.h>
int main()
{
float x = 0.0;
long int y = 10;
Material Copyright @knacademycourses
printf("%d", sizeof(y) == sizeof(x+y));
return 0;
}
a. Error
b. 1
c. No output
d. 0
Answer : d. 0
Explanation:
58. What would be the output of the following pseudocode?
59. Find out the number of vertices in a simple graph, if there are 24 edges, 5 vertices of
degree 6 and all others of degree 3.
Material Copyright @knacademycourses
A. 11
B. 10
C. 12
D. 13
Answer
A. 11
Explanation:
60.
Answer : c) 18
Explanation:
Material Copyright @knacademycourses