The following multiple-choice questions are just a Warm-up Questions for you which are as follows:
1. What is the default port number for Apache and most web servers?
A) 20
B) 27
C) 80
D) 87
2. What is the maximum character Linux supports in its filenames?
A) 8
B) 128
C) 256
D) Unlimited
3. A DNS translates a domain name into what?
A) Binary
B) Hex
C) IP
D) URL
4. Which of the following is not an example of Operating system?
A) Windows 98
B) BSD Unix
C) Microsoft Office XP
D) Red Hat Linux
5. What do you press to enter the current date in a cell?
A) CTRL + ; (Semicolon)
B) CTRL + Shift + : (Colon)
C) CTRL + F10
D) CTRL + F11
6. An Octal number 237 is equal to the binary number
A) 011 011 111
B) 010 111 011
C) 010 011 111
D) 011 000 001
7. Charles Babbage invented
A) ENIAC
B) Difference Engine
C) Electronic Computer
D) Punched Card
8. Which was the First Web browser?
A) Worldwideweb
B) Netscape Navigator
C) Internet Explorer
D) Safari
9. Which was the first ever web server software?
A) GWS
B) IIS 5.0
C) CERN httpd
D) nginx
10. Who is known as the Father of the Java Programming language?
A) Bill Board
B) James Gosling
C) Jame Smith
D) Sabeer Bhatia
11. Java is a?
A) Compiler
B) Operating System
C) Input Device
D) Programming Language
12. The way of manipulating data into information is called as?
A) Storing
B) Processing
C) Deletion
D) Organizing
13. What is CGI?
A) Computed Gateway Interface
B) Compliant Gateway Interface
C) Case Gateway Interface
D) Common Gateway Interface
14. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as:
A) Robotics
B) Computer Forensics
C) Simulation
D) Forecasting
15. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:
A) Eight Bytes
B) Eight Kilobytes
C) Eight Characters
D) Eight Bits
16. What will be the output if you will compile and execute the following code?
#include
int main(){
register int i,x;
scanf(“%d”,&i);
x=++i + ++i + ++i;
printf(“%d”,x);
return 0;
}
A) 17
B) 18
C) 21
D) Compiler Error
17. The ability to recover and read deleted or damaged files from a criminals computer is an example of a law enforcement specialty called?
A) Robotics
B) Simulation
C) Computer Forensics
D) Animation
18. What is the only function all C++ programs must contain?
A) Start ()
B) system ()
C) main ()
D) program ()
19. Which of the following is the boolean operator for logical-and?
A) &
B) &&
C) |
D) |&
20. What punctuation ends most lines of C++ code?
A) (Dot)
B) (semi-colon)
C) (colon)
D) (single quote)
21. A script is a
A) Program or sequence of instructions that is interpreted or carried out by processor directly
B) Program or sequence of instruction that is interpreted or carried out by another program
C) Program or sequence of instruction that is interpreted or carried out by web server only
D) None of above
22. Examine the following program and determine the output
#include
using namespace std;
int operate (int a, int b)
{
return (a * b);
}
float operate (float a, float b)
{
return (a/b);
}
int main()
{
int x=5, y=2;
float n=5.0, m=2.0;
cout << operate(x,y) <<“\t”;
cout << operate (n,m);
return 0;
}
A) 10.0 5.0
B) 5.0 2.5
C) 10.0 5
D) 10 2.5
23. The following piece of script will output:
<? $email=’admin@yeahhub.com’; $new=strstr($email, ‘@’ ; print $new; ?>
A) admin
B) admin@yeahhub
C) @yeahhub.com
D) Yeahhub.com
24. The memory address of the first element of an array is called
A) floor address
B) foundation address
C) first address
D) base address
25. Two dimensional arrays are also called
A) tables arrays
B) matrix arrays
C) both of above
D) none of above
26. How many steps are in the systems development life cycle (SDLC)?
A) 4
B) 5
C) 6
D) 10
27. A protocol is a set of rules governing a time sequence of events that must take place
A) between peers
B) between an interface
C) between modems
D) across an interface
28. In OSI network architecture, the dialogue control and token management are responsibility of
A) session layer
B) network layer
C) transport layer
D) data link layer
E) none of above
29. Which of the following signal is not standard RS-232-C signal?
A) VDR
B) RTS
C) CTS
D) DSR
30. Microprocessor 8085 can address location upto
A) 32K
B) 128K
C) 64K
D) 1M
31. The main purpose of data protection act is to
A) Protect personal privacy
B) Prevent Viruses
C) Increase the security of computer systems
D) Reduce Project Failures
32. Which of the following is false for switch statement in C++?
A) It uses labels instead of blocks
B) We need to put break statement at the end of the group of statement of a condition
C) We can put range for case such as case 1..3
D) None of above
33. To increase the value of c by one which of the following statement is wrong?
A) c++;
B) c = c + 1;
C) c + 1 => c;
D) c += 1
34. When following piece of code is executed, what happens?
b = 3;
a = b++;
A) a contains 3 and b contains 4
B) a contains 4 and b contains 4
C) a contains 4 and b contains 3
D) a contains 3 and b contains 3
35. Consider the following two pieces of codes and choose the best answer
Code 1:
switch (x) {
case 1:
cout <<”x is 1”;
break;
case 2:
cout <<”x is 2”;
break;
default:
cout <<”value of x unknown”;
}
Code 2:
If (x==1){
Cout <<”x is 1”;
}
Else if (x==2){
Cout << “x is 2”;
}
Else{
Cout <<”value of x unknown”;
}
A) Both of the above code fragments have the same behaviour
B) Both of the above code fragments produce different effects
C) The first code produces more results than second
D) The second code produces more results than first.
Read More: 40 Cyber Security MCQ with Answers and Explanations | 50 questions you need to know about Professional Penetration Testing | FAQ
You may also like:- Top 10 Computer Fundamentals Questions and Answers
- Quiz Time – Testing Your Knowledge on Popular Computer Questions
- 15 Important Questions Related to Computer
- Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 14
- Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 13
- Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 12
- Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 11
- Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 10
- Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 9
- Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 8
An octal no 237 – binary 010011111
OK