0% found this document useful (0 votes)
189 views104 pages

Technical MCQs for Infosys, HCL, Deloitte

capgemini

Uploaded by

naaztalath430
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
189 views104 pages

Technical MCQs for Infosys, HCL, Deloitte

capgemini

Uploaded by

naaztalath430
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Previous Year Technical MCQs

Contents
Infosys ............................................................................................................................... 1
HCL ................................................................................................................................. 26
Deloitte ............................................................................................................................ 40
Capgemini ....................................................................................................................... 76

Infosys
Pseudocodes:
1. What will be the output for input values x = 4 and y = 3?

a. 16
b. 12
c. 8
d. 20
Answer : b. 12
Explanation :

Material Copyright @knacademycourses


2. What would be its output for parameters a = 3 and b = 4?

a. 12
b. 9
c. 15
d. 10
Answer : a. 12
Explanation :

Material Copyright @knacademycourses


3. What will be the output if x = 5 and y = 3?

a. 9
b. 13
c. 10
d. 12

Material Copyright @knacademycourses


Answer : a. 9
Explanation:

4. What will be printed if initial value of n = 16?

a. 4
b. 1
c. 2
d. 8
Answer : b. 1
Explanation:

Material Copyright @knacademycourses


5. What is the output for a=7?

a. 16
b. 17
c. 15
d. 14
Answer : a. 16
Explanation:

Material Copyright @knacademycourses


6. What is the output for n=42?

a. 3

Material Copyright @knacademycourses


b. 4
c. 5
d. 6
Answer : a. 3
Explanation :

7. n=4

a. 4 stars in a line
b. 4 stars in a column
c. 10 stars in a triangle
d. 6 stars in a triangle
Answer : c. 10 stars in a triangle
Explanation:

Material Copyright @knacademycourses


8. What’s the result for arr=[1,2,3,4,5]?

a. 15
b. 6
c. 9
d. 12
Answer : c. 9
Explanation:

9. What is returned for str= “INFOSYS”?

Material Copyright @knacademycourses


a. 2
b. 3
c. 1
d. 4
Answer: a. 2
Explanation:

10. a=15 and b=12

a. 27
b. 23
c. 25
d. 24
Answer : a. 27

Material Copyright @knacademycourses


Explanation:

11. x=8

a. 21
b. 34
c. 13
d. 55
Answer: a. 21
Explanation:

Material Copyright @knacademycourses


12. n=3

a. 10
b. 9
c. 14
d. 12
Answer: c. 14
Explanation:

Material Copyright @knacademycourses


13. n=5

a. 9
b. 15
c. 10
Answer: a. 9
Explanation:

Material Copyright @knacademycourses


14. Consider x=36

a. 3
b. 2
c. 4
d. 5
Answer: a. 3
Explanation:

Material Copyright @knacademycourses


15. What is the output for arr=[2,4,6,8,10]?

a. 2
b. 3
c. 1
d. 4
Answer: a. 2
Explanation:

Material Copyright @knacademycourses


16. What is the output when number=6?

a. 1440.0
b. 1340.0
c. 1700.0
d. 1560.0
Answer: a. 1440.0
Explanation:

Material Copyright @knacademycourses


17. What will happen in below pseudo code?

a. The program will not enter the loop.


b. Code will run infinite number of times.
c. Code will execute and the value of res will be displayed once.
d. Code will execute and the value of res will be displayed twice.
Answer: b. Code will run infinite number of times.
Explanation:

Material Copyright @knacademycourses


18. What is the output of the below pseudo code?
Set value= ‘ ’*10;
Print value
a. 100
b. 320
c. 10
d. 200
Answer: b. 320
Explanation:

19.

a. Code executes successfully and the value of salary is displayed once.


b. Code executes successfully and nothing is displayed.
c. Code executes successfully the value of salary is displayed infinite times.
d. Compilation error.
Answer: c. Code executes successfully the value of salary is displayed infinite
times.
Explanation:

Material Copyright @knacademycourses


20.

a. 13
b. 90
c. 28
d. 63
Answer: b. 90
Explanation:

21. Output of the following pseudo code?

a. 5
b. 3
c. 8
d. 2
Answer: d. 2
Explanation:

Material Copyright @knacademycourses


22. n=10

a. 35.0
b. 25.0
c. 45.0
d. 55.0
Answer: a. 35.0
Explanation:

Material Copyright @knacademycourses


23.

a. None
b. 40
c. 50
d. 60
Answer: b. 40
Explanation:

Material Copyright @knacademycourses


24.

a. 1
b. 3
c. 0
d. 2
Answer: d. 2
Explanation:

25. Output for the following pseudocode?

a. 40
b. 20
c. 10

Material Copyright @knacademycourses


d.50
Answer: a. 40
Explanation:

26. What is the output?

a. 5
b. 3
c. 2
d. 1
Answer: d. 1
Explanation:
2 AND 1=>1

Material Copyright @knacademycourses


z+1=>6
1 OR 6 => 1
So, the output is 1

27. Find the output


Integer x, y, z
Set x = 4, y = 3, z = 1
if (x >> (z - 1)) && y << (z + 1))
x=x+c
else
y = x << z
End if
Print x - y + z
a. 5
b. 3
c. 8
d. None of these
Answer: d. None of these
Explanation:

28. What is the output when n=35?

Material Copyright @knacademycourses


a. 55.0
b. 50.0
c. 53.0
d. 47.0
Answer: a. 55.0
Explanation:

29. number=6

a. 1440.0
b. 1700.0
c. 1560.0
d. 1340.0
Answer: a. 1440.0
Explanation:

Material Copyright @knacademycourses


30. What will be the output?

a. 6 5 11
b. 6 6 12
c. 5 6 7
d. 6 6 11
Answer: b. 6 6 12
Explanation:

Material Copyright @knacademycourses


HCL
Computer Fundamentals
1.

a. DNS
b. Router
c. IP address
d. BIOS
Answer: a. DNS
Explanation:
When you type [Link] into your browser, the DNS (Domain Name System)
resolves it into the corresponding IP address. Only then can the computer locate and
connect to the correct web server.

2.

Answer: a. Bus
Explanation:
On the motherboard, communication between the processor, memory, and peripherals
happens through buses, which are sets of parallel electrical lines designed to transfer
data, address, and control signals efficiently.

Material Copyright @knacademycourses


3.

Answer: c. All of the mentioned options


Explanation:

4.

Answer: b. in RAM
Explanation:

5.

Answer: d. All of the mentioned options


Explanation:

Material Copyright @knacademycourses


6.

Answer : b. 2
Explanation:

7.

Answer: d. Dynamic
Explanation:
A dynamic web page displays different content depending on the time of day or user
accessing the page. Dynamic web pages are generated in real-time and can change
based on user interaction, preferences, or other external factors. In contrast, static web
pages always show the same content to every user. Therefore, the correct answer
is Dynamic.

Material Copyright @knacademycourses


8.

Answer: c. F5
Explanation:
Pressing the F5 key is the standard shortcut for refreshing content on the desktop in
Windows and in many browsers. The other keys have different functions: F1 (help), F2
(rename), F4 (address bar in Explorer or close in combination with Alt). Therefore, the
correct answer is F5.

9.

Answer: b. The computer has been infected by a Ransomware


Explanation:
When a threatening message appears demanding payment and denies access to files, it
is a classic sign of a ransomware attack. Ransomware encrypts files and demands a
ransom for their release. This is not the typical behavior for general viruses, sharing
passwords, or adware.

10.

Answer: D. Printer
Explanation:

Material Copyright @knacademycourses


A printer can be connected to a network (network printer) and shared by multiple users
or computers. Devices like a stylus, powerbank, and headphones are not typically
designed for network sharing, but a printer is commonly shared in home and office
networks.

11.
Which of the following applications stores and converts data into information and works
with large quantities of data?
1. MySQL
2. Microsoft ACCESS
Choose the correct answer from the options given below.
A. Only 1
B. Both 1 and 2
C. Only 2
D. Neither 1 nor 2
Answer: B. Both 1 and 2
Explanation:
Both MySQL and Microsoft Access are database management systems that store,
manage, and allow you to convert data into information, as well as handle large
quantities of data. MySQL is widely used for large-scale, web-based databases, while
Microsoft Access is suitable for desktop and small business applications. Therefore,
the correct answer is Both 1 and 2.

12.

Answer: D. ROM
Explanation:
ROM (Read Only Memory) stores the firmware, which includes the operating system
software and other critical instructions needed for the computer to start up. RAM is
volatile and mainly stores data temporarily while the computer is running. ROM is non-

Material Copyright @knacademycourses


volatile and retains content even when the computer is powered off, making it essential
for storing system software.

13.

If you want to insert a number as a text in a cell in MS-Excel, then which of the following
should be used?
A. =
B. "
C. +
D. '

Answer: D. '

Explanation:

14.

Answer: D. All of the mentioned options

Explanation:

Material Copyright @knacademycourses


15.

Which of the following keyboard shortcut keys is used to open Windows Task Manager?
A. Ctrl + Esc
B. Ctrl + Shift + Esc
C. Ctrl + Home
D. Ctrl + Alt

Answer: B. Ctrl + Shift + Esc

Explanation:

16.

Answer: D. BIOS Chip


Explanation:

17.

Answer: C. Incognito mode

Material Copyright @knacademycourses


Explanation:
Incognito mode (or private browsing mode) is designed so that browsing history,
cookies, and site data are not saved after the window is closed. Opening a new window
does not prevent history from being saved, and browsing history is typically saved
unless specifically using Incognito mode. Therefore, using Incognito mode is the correct
choice.

18.

Answer: D. EPROM

Explanation:

EPROM (Erasable Programmable Read-Only Memory) is a type of memory chip whose


contents can be erased by exposure to ultraviolet light and then reprogrammed. None of
the other options refer to chips that are erasable by UV light.

19.

Answer: C. Only 3

Explanation:

Material Copyright @knacademycourses


20. How will you delete temporary files and folders in your Windows system?
A. Go to C drive (C:) then select the 'temp' folder and delete all the content inside that
folder
B. Type %temp% in the RUN command box and delete all the files and folders appearing
in that list
C. Press "Ctrl+Delete" and then delete all the files and folders appearing in that list
D. Type %programfiles% in the RUN command box and delete all the files and folders
appearing in that list

Answer: Option B
Explanation:
Typing %temp% in the RUN command box quickly opens the folder containing
temporary files for the current user, allowing for safe deletion. This is the standard and
proper way to remove temp files in Windows.

21.

Answer: C. All 1, 2, and 3

Material Copyright @knacademycourses


Explanation:
All the tasks listed—media download, file transfer, and financial transaction—can be
accomplished using the Internet. Downloading media, transferring files, and
conducting financial transactions online are all common uses of Internet connectivity.

22.

Answer: A. Only 3,4,5

Explanation:

23.

Answer: D. All of the mentioned

Material Copyright @knacademycourses


Explanation:

24.

Answer: Option A

Explanation:

Both USB and Bluetooth are used to establish a Personal Area Network (PAN), which
connects devices in a very limited area such as an individual workspace or between
nearby devices. Neither creates a Metropolitan Area Network (MAN).

Material Copyright @knacademycourses


25.

Answer: B. Both 1 and 2

Explanation:

A microprocessor is the central processing unit of a computer, whereas a chipset is a


group of integrated circuits that manage data flow between the processor, memory, and
peripherals, and also performs certain processing functions. Both can be classified as
processing devices.

26.

Answer: C. UPS

Explanation:

A UPS (Uninterruptible Power Supply) is an external device with a battery that supplies
power to a computer or other electronics in case of a power outage, allowing safe
shutdown or continued operation for a short time. CPU and SMPS do not serve this
function.

Material Copyright @knacademycourses


27.

Answer: A. Video Editors

Explanation:

Video editors require a large amount of RAM due to the need to process high-resolution
video files, rendering effects, and handling large data streams. Spreadsheets and word
processors use much less RAM compared to video editing software.

28.

Which of the following can be formed if we connect personal computers?


A. Supercomputer
B. Server
C. Enterprise
D. Network

Answer: D. Network

Explanation:

When personal computers are connected together, the resulting system is called a
network. This allows the computers to share resources and communicate with each
other.

29.

Answer: B. Software and Video

Explanation:

Material Copyright @knacademycourses


"Software and Video" is not a standard category in the Windows Control Panel, whereas
"Hardware and Sound," "Network and Internet," and "System and Security" are typical
categories found there.

30.

Answer: D. System Software

Explanation:

An operating system is classified as system software because it manages the hardware,


software resources, and provides common services for application software. It is not
utility or application software.

31.

Answer: B. Insufficient RAM

Explanation:

32.

Answer: A. Space

Material Copyright @knacademycourses


Deloitte
1. Retesting the entire application after a change has been made is defined as?
a. Retesting.
b. Regional Regression.
c. Full Regression Testing.
d. Unit Regression.
Answer: c. Full Regression Testing.
Explanation:

2. Switches are better than hubs?


1. Reducing network traffic
2. Better performance
a. Neither 1 nor 2
b. Both 1 and 2
c. Only 2
d. Only 1
Answer: b. Both 1 and 2
Explanation:
Switches are better than hubs because they reduce network traffic by sending data only
to the specific device it is intended for, rather than broadcasting to all devices like a hub
does. This targeted communication also leads to better overall network performance for
users.

3.

Material Copyright @knacademycourses


Answer: Option 1

Explanation:

4. Which of the following is not part of the Test document?

a. Test Case

b. Requirements Traceability Matrix [RTM]

c. Test strategy

d. Project Initiation Note [PIN]

Answer: d. Project Initiation Note [PIN]

Explanation:

5. Which of the following is not a valid phase of SDLC (Software Development Life
Cycle)?

a. Testing Phase

b. Requirement Phase

c. Deployment Phase

Material Copyright @knacademycourses


d. Testing Closure

Answer: d. Testing Closure

Explanation:

The valid SDLC phases are typically Requirement Analysis, Design, Development,
Testing, Deployment, and Maintenance. "Testing closure" is not considered a standard
SDLC phase; it is usually related to test process closure activities in the software testing
life cycle, not in SDLC itself.

6. Functional testing is a ------?

a. Test design technique

b. Test level

c. SDLC Model

d. Test Type

Answer: d. Test Type

Explanation:

Functional testing is categorized as a test type because it focuses on verifying that the
software performs its intended functions as specified in the requirements, without
concern for how those functions are implemented. It is not a test design technique, test
level, or SDLC model.

7.

Answer: c. HDD

Explanation:

Material Copyright @knacademycourses


8.

Answer: b. Monitor

Explanation:

9.

Answer: d. Mesh Topology

Explanation:

10.

Answer: a. Bus

Explanation:

Material Copyright @knacademycourses


A bus topology is the simplest to set up and uses the least amount of cabling compared
to star, ring, and mesh topologies, which require more complex connections and longer
cable runs.

11. What types of attack inundates a network or server with an excessive number of
requests, rendering it inaccessible for legitimate users?

a. Phishing

b. Spoofing

c. DDos

d. Brute Force

Answer: c. DDos

Explanation:

12. What is the principal purpose of a firewall in network security?

Answer: b. Access Control

Explanation:

13.

Material Copyright @knacademycourses


Answer: B) Deceptive attempt to obtain sensitive information

Explanation:

Phishing is a cyber attack where attackers use deceptive tactics—typically emails or


fake websites—to trick individuals into revealing sensitive information such as
passwords, credit card numbers, or other personal details.

14.

15.

16.

Material Copyright @knacademycourses


17.

18.

Material Copyright @knacademycourses


19.

Explanation:

20.

Material Copyright @knacademycourses


21.

a. Mesh Topology

b. Bus Topology

c. Ring Topology

d. Star Topology

Answer: c. Ring Topology

Explanation:

22.

Answer: Static Analysis

Material Copyright @knacademycourses


Explanation:

Static analysis involves reviewing requirements documents like SOW (Statement of


Work) and business requirement statements during the early phases of SDLC, before
code execution, making it the appropriate activity for comprehensive analysis of
requirements.

23.

Answer: No

24.

Answer: Dual In-line Memory Module

Explanation:

DIMM stands for Dual In-line Memory Module, which is a type of computer memory
module used in desktops, laptops, and servers for RAM expansion.

Material Copyright @knacademycourses


25.

Answer: Only II) and III)

Explanation:

26.

Material Copyright @knacademycourses


27.

28.

29.

Material Copyright @knacademycourses


30.

31.

32.

Material Copyright @knacademycourses


33.

34.

35.

Material Copyright @knacademycourses


a. 10
b. 11
c. 12
d. 13
Answer: d.13
Explanation:

36. What is the output?

}
a. 4
b. 5
c. 6
d. 7
Answer: b. 5

Material Copyright @knacademycourses


Explanation:

37.

Answer: Option C
Explanation:
• In binary search, each recursive step divides the input size by 2 (hence T(n/2)),
and the extra work per step (comparing the middle element) is constant
time O(1).

Material Copyright @knacademycourses


• Thus, the recurrence relation is T(n) = T(n/2) + O(1) , with the base case
being O(1) for small input sizes.

38.

Answer: Option B
Explanation:

39. Which of the below are document-based Database services?


I) MySQL
II) MongoDB
III) Cassandra
IV) CouchDB

Options:
a. All of the options given
b. Only (III) and (II)

Material Copyright @knacademycourses


c. Only (I) and (II)
d. Only (II) and (IV)

Answer: d. Only (II) and (IV)

Explanation:

40. Choose the incorrect statement(s) regarding IPv4 protocol

Answer: b. Only (I) and (II)

Explanation:

41.

Material Copyright @knacademycourses


Answer: c. [Link]
Explanation:

42.

Answer: D. Full Outer Join


Explanation:
A FULL OUTER JOIN returns all rows from both tables. If there is no match for a row in
one table, the result contains NULL for each column of the table without a match. This
join ensures that every row from both tables appears in the result set, with NULLs where
data is missing from either side

43.

Answer: A) Worm
Explanation:
A worm is a type of malware specifically designed to replicate itself and automatically
spread across networks to infect other computers without requiring any user action.
Worms exploit vulnerabilities to propagate and can cause widespread disruptions

44.

Material Copyright @knacademycourses


Answer: B) Kubernetes
Explanation:
Kubernetes is a widely-used platform specifically designed for automating deployment,
scaling, and management of containerized applications, handling orchestration across
clusters of servers. Docker is used for container creation, Jenkins for CI/CD automation,
and Ansible for configuration management and automation, but only Kubernetes
focuses on container orchestration.

45.

Answer: B. White Box Testing

Explanation:

White box testing involves examining the internal structure, design, and coding of the
software to develop test cases and verify expected behaviors. This method requires
knowledge of the application's internal logic and implementation. The other options
focus on external functionality or previously tested behaviors, not on internal structure.

46.

Material Copyright @knacademycourses


47.

48.

49.

Material Copyright @knacademycourses


50.

51.

52.

Material Copyright @knacademycourses


53.

54.

55.

Material Copyright @knacademycourses


56.

57.

58.

Material Copyright @knacademycourses


59.

60.

61.

Material Copyright @knacademycourses


62.

63.

64.

Material Copyright @knacademycourses


65.

66.

67.

Material Copyright @knacademycourses


68.

69. What is the output of the following code snippet?


Python
x = [1, 2, 3]
print(x[1])
A) 1
B) 2
C) 3
D) Index Error

Answer: B) 2
Explanation:
Lists in Python are zero-indexed. So, x accesses the second element of the list x, which
is 2. No error occurs, and the output is 2.

70.

Material Copyright @knacademycourses


71.

72.

73.

Material Copyright @knacademycourses


74.

Answer : All the options


Explanation:
Putty does support SSH-2 RSA keys for secure connections. Its private keys use the .ppk
(PuTTY Private Key) extension. These keys are not compatible with other clients unless
converted to the appropriate format, so all the statements are correct.

75.

Answer: Option 2
Explanation:
In public key cryptography, the sender uses the receiver’s public key to encrypt the
message so that only the receiver, who possesses the corresponding private key, can
decrypt and read the secret message.

76. An authentication method that enables users to authenticate with multiple


applications or websites using a single set of credentials is known as

Material Copyright @knacademycourses


A) None of the options
B) Single Sign On
C) Single Sync On
D) Secure Sign-On

Answer:
Single Sign On

Explanation:

Single Sign On (SSO) allows users to access multiple applications or websites using just
one set of login credentials, improving convenience and reducing password fatigue by
removing the need to remember multiple passwords for different services.

77.

78.

Answer: 12

Material Copyright @knacademycourses


79.

Answer: Conditional Formatting

Explanation:

Conditional formatting is a feature in spreadsheet applications like MS Excel that allows


users to automatically change the appearance of cells (such as coloring) based on
specific conditions or criteria, making data analysis more visual and effective.

80.

Answer: Only I and II

Explanation:

Statement I correctly defines Software Quality Assurance (SQA) as activities focused on


process quality. Statement II correctly defines Software Quality Control (SQC) as
activities focused on product quality. Statement III is incorrect because SQA focuses on
processes to prevent defects, not on identifying defects in products (which is SQC's
role).

Material Copyright @knacademycourses


81.

Answer : MOM Model


Explanation:

82.

Answer: Charts

83.
#include <stdio.h>
void s();
int main()
{
int i;
for (i = 1; i < 3; i++)

Material Copyright @knacademycourses


s();
return 0;
}
void s() {
int var = 0;
static int var1 = 0;
printf("%d %d\n", var, var1);
++var;
++var1; }
Answer :
00
01
Explanation:

84.

Material Copyright @knacademycourses


Answer: No output will be printed
Explanation:

85.

Answer: 6
Explanation:

Material Copyright @knacademycourses


86.

Answer: &&
Explanation:

87.

Answer: Path Testing


Explanation:
A control flow graph visually represents all possible execution paths through a program.
Path testing uses this graph to design test cases that ensure every possible path is
executed at least once, uncovering errors in logic and structure. It is not related to
monkey, gorilla, or negative testing approaches.

Material Copyright @knacademycourses


Capgemini
1.

Answer: Option B
Explanation:

2.

Answer : Network Layer


Explanation:

Material Copyright @knacademycourses


3.

Answer : Class D
Explanation:

4.

Answer: Class D
Explanation:

5.

Material Copyright @knacademycourses


6.

7.

8.

Material Copyright @knacademycourses


9.

10.

Material Copyright @knacademycourses


11.

12.

13. Which of the following should be replaced with the question mark in the following
figure?

Material Copyright @knacademycourses


14.

Answer: c) 3
Explanation:
Strategy Phase, Planning Phase and Deployment Phase are the three phases of Cloud
Planning.

15.

Answer: b. O(n)

Explanation:
Searching for an element in a linked list requires traversing each node sequentially until
the desired element is found or the end of the list is reached. Therefore, the time
complexity is linear, or O(n), where n is the number of nodes.

Material Copyright @knacademycourses


16.

Answer: Option C
Explanation:

17.

Answer : b. Output restricted queue


Explanation:

Material Copyright @knacademycourses


18.

19.

Answer : b. 50,10,30

Material Copyright @knacademycourses


20.

Answer : d. Single ended Queue


Explanation:
Linear, circular, and double ended queue (deque) are all actually types of queues used
in data structures. However, "Single ended queue" is not a recognized or standard type
of queue; it is not a formal classification used in queue data structures.

21.

22.

Material Copyright @knacademycourses


23.

a. 56
b. 88
c. 72
d. 65
Answer : c. 72
Explanation:

Material Copyright @knacademycourses


24.
The below query can be replaced with,

Answer : Option C
Explanation:

25.

Answer : Physical level

Material Copyright @knacademycourses


26.

Answer : Data Manipulation Language


Explanation:
DML includes commands like SELECT, INSERT, UPDATE and DELETE, specifically
designed for data access and modification.

27.

Answer: b. Virtualization

Explanation:

28.

Material Copyright @knacademycourses


Answer : B. Memory Allocation from stack

Explanation:

29.

Answer : B. 225
Explanation:

30.

Material Copyright @knacademycourses


Answer : B. 4
Explanation:

The height is 4 edges from root (1) to deepest leaf (9).

31.

Answer : A) 4565
Explanation:

32.

Material Copyright @knacademycourses


33. What is the output for the below code?

a. 3
b. 4
c. 5
d. 6

34. What is the output for the code below?


#include <stdio.h>

Material Copyright @knacademycourses


int main() {
int a = 11, b = 4, c = 3;
b != !a;
c = !!a;
printf("%d %d",b, c);
return 0;
}
a. 4 1
b. 3 2
c. 2 4
d. 4 2
Answer : a. 4 1
Explanation:

35.

Material Copyright @knacademycourses


Answer: Option C
Explanation:

36.

Explanation:

Material Copyright @knacademycourses


37.

Explanation:
It is because , 2^3=8

38.

Explanation:

Material Copyright @knacademycourses


39.

Explanation:
Convert 368 into binary using division by 2 method. The binary form is 101110000

40. What will be the output of the following code?

Answer: A. None of these


Explanation:

41.

Material Copyright @knacademycourses


42.

43.

Material Copyright @knacademycourses


44.

45.

46.

Material Copyright @knacademycourses


47.

48. Predict the output for the code below

Material Copyright @knacademycourses


49. Output of the below code?

50. Predict the output for the below code:


#include <stdio.h>
int main()
{
printf("%c ", 5["CapGemini"]);
return 0;
}

Material Copyright @knacademycourses


51.

52.

Material Copyright @knacademycourses


53. A subnet has been assigned a subnet mask of [Link]. What is the
maximum number of hosts that can belong to this subnet?

A. 63
B. 128
C. 64
D. 62

Answer : D.62

Explanation:

54.

Material Copyright @knacademycourses


Explanation:

55.

Explanation:

56. Output for the following code is?

Material Copyright @knacademycourses


a. 2
b. 13
c. 26
d. 5
Answer : b. 13
Explanation:

57. What would be the output of the following pseudocode?


#include <stdio.h>
int main()
{
float x = 0.0;
long int y = 10;

Material Copyright @knacademycourses


printf("%d", sizeof(y) == sizeof(x+y));
return 0;
}
a. Error
b. 1
c. No output
d. 0
Answer : d. 0
Explanation:

58. What would be the output of the following pseudocode?

59. Find out the number of vertices in a simple graph, if there are 24 edges, 5 vertices of
degree 6 and all others of degree 3.

Material Copyright @knacademycourses


A. 11
B. 10
C. 12
D. 13
Answer
A. 11
Explanation:

60.

Answer : c) 18
Explanation:

Material Copyright @knacademycourses

You might also like