0% found this document useful (0 votes)
34 views43 pages

Technical MCQ S

Uploaded by

schakraborty9148
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views43 pages

Technical MCQ S

Uploaded by

schakraborty9148
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 43

1 Technical Aptitude MCQ Preparation

Basic 40 Question Set On Networking: b) 32-bit


c) 64-bit
Certainly, here are 40 multiple-choice questions (MCQs) on the
d) 16-bit
fundamentals of networking and networking for a technical
aptitude test:
11. Which device operates at the Data Link Layer of the OSI
model?
1. What does the acronym "LAN" stand for in the context of
a) Hub
networking?
b) Router
a) Local Area Network
c) Switch
b) Large Area Network
d) Bridge
c) Link Access Node
d) Longitudinal Address Number
12. Which protocol is used to securely transfer files over a
network?
2. Which layer of the OSI model is responsible for routing and
a) HTTP
forwarding of data?
b) SSH
a) Physical Layer
c) SMTP
b) Data Link Layer
d) FTP
c) Network Layer
d) Transport Layer
13. What is the purpose of a subnet mask in networking?
a) It defines the size of a network
3. Which protocol is used for sending and receiving emails?
b) It hides the IP address of a device
a) HTTP
c) It specifies the DNS server
b) FTP
d) It encrypts data for secure transmission
c) SMTP
d) POP3
14. Which network protocol is responsible for assigning IP
addresses dynamically?
4. What is the purpose of a MAC address?
a) DNS
a) To identify a device on a network
b) SMTP
b) To route data packets
c) DHCP
c) To determine the IP address of a device
d) FTP
d) To establish a secure connection
15. Which type of cable is commonly used for connecting a
5. Which network topology connects all devices in a linear
computer to a network switch?
sequence?
a) HDMI
a) Star
b) USB
b) Bus
c) Ethernet
c) Ring
d) VGA
d) Mesh
16. What is a firewall used for in networking?
6. In networking, what does NAT stand for?
a) To prevent unauthorized access to a network
a) Network Authentication Token
b) To boost network speed
b) Network Address Translation
c) To route data packets
c) Network Access Terminal
d) To manage DNS resolution
d) Network Application Task
17. What is the main function of a DNS server?
7. What is the default port number for the HTTP protocol?
a) To secure the network
a) 80
b) To assign IP addresses
b) 443
c) To resolve domain names to IP addresses
c) 22
d) To filter network traffic
d) 25
18. In the context of TCP/IP, what does the acronym "FTP" stand
8. Which protocol is used to resolve IP addresses to MAC
for?
addresses in a local network?
a) File Transfer Protocol
a) DNS
b) Fast Transmission Protocol
b) ARP
c) Flexible Transfer Protocol
c) DHCP
d) File Transport Protocol
d) ICMP
19. Which network protocol is used for sending and receiving
9. What does ICMP stand for in networking?
emails?
a) Internet Control Message Protocol
a) HTTP
b) Internet Connection Management Protocol
b) FTP
c) Internet Communication Media Protocol
c) SMTP
d) Internet Configuration and Monitoring Protocol
d) DNS
10. What is the maximum range of IPv4 addresses?
20. Which protocol is used to transfer web pages and their
a) 128-bit
associated files over the internet?

Linked - https://www.linkedin.com/in/tanmay-pawar-6680ab208?utm_source=share&utm_campaign=share_via&utm_content=profile&utm_medium=android_app - © PAWAR TANMAY VILAS


2 Technical Aptitude MCQ Preparation

a) HTTP 30. Which protocol is used for securely accessing and managing
b) FTP remote servers over a network?
c) SMTP a) HTTP
d) DHCP b) FTP
c) SSH
21. What is the purpose of the "subnetting" in IP networking? d) SMTP
a) To split a large network into smaller, manageable sub-
networks 31. What is the purpose of a DNS (Domain Name System)?
b) To encrypt data during transmission a) To assign IP addresses to devices
c) To establish a direct connection between two devices b) To translate domain names into IP addresses
d) To increase the speed of data transmission c) To encrypt data transmission
d) To route network traffic
22. Which layer of the OSI model is responsible for error
detection and correction? 32. Which network topology connects devices in a circular
a) Physical Layer manner, with each device connected to exactly two others?
b) Data Link Layer a) Star
c) Transport Layer b) Bus
d) Application Layer c) Ring
d) Mesh
23. Which network topology connects all devices to a central
hub or switch? 33. Which layer of the OSI model is responsible for end-to-end
a) Star communication and data flow control?
b) Bus a) Physical Layer
c) Ring b) Data Link Layer
d) Mesh c) Transport Layer
d) Network Layer
24. What is the primary function of a router in a network?
a) To connect devices within the same LAN 34. What is the primary function of a gateway in networking?
b) To connect multiple LANs and route data between them a) To connect devices within the same LAN
c) To secure data transmission b) To connect multiple LANs and route data between them
d) To connect devices to the internet c) To protect the network from external threats
d) To connect devices to the internet
25. Which protocol is used for sending and receiving files
securely over a network? 35. Which protocol is used for secure communication over the
a) HTTP internet, often indicated by "https://" in the URL?
b) SSH a) HTTP
c) SMTP b) FTP
d) FTP c) SMTP
d) HTTPS
26. Which IP address range is reserved for private networks,
such as within a home or business? 36. In networking, what does "WAN" stand for?
a) 127.0.0.0 - 127.255.255.255 a) Wireless Area Network
b) 192.168.0.0 - 192.168.255.255 b) Wide Area Network
c) 172.16.0.0 - 172.31.255.255 c) Wired Area Network
d) 10.0.0.0 - 10.255.255.255 d) Web Access Node

27. Which networking device operates at the Network Layer of 37. Which protocol is used to retrieve email messages from a
the OSI model? mail server to a client device?
a) Switch a) HTTP
b) Hub b) FTP
c) Router c) SMTP
d) Bridge d) POP3

28. What does "URL" stand for in the context of the internet? 38. What is the purpose of a proxy server in networking?
a) Uniform Resource Locator a) To hide the identity of the client device
b) Universal Resource Link b) To block access to specific websites
c) Unified Routing Link c) To manage DNS resolution
d) User Retrieval Link d) To route data packets

29. What does the acronym "VPN" stand for in networking? 39. What is a "packet" in networking?
a) Very Private Network a) A unit of data that is transmitted over a network
b) Virtual Private Network b) A security protocol
c) Visual Processing Node c) A hardware device for network connectivity
d) Validating Public Network d) A type of network cable

Linked - https://www.linkedin.com/in/tanmay-pawar-6680ab208?utm_source=share&utm_campaign=share_via&utm_content=profile&utm_medium=android_app - © PAWAR TANMAY VILAS


3 Technical Aptitude MCQ Preparation

40. Which protocol is used for automatically assigning IP c) DHCP


addresses to devices when they connect to a network? d) ICMP
a) DNS
b) ARP
2. In the context of IP addressing, what does the term "subnet
mask" represent?
Answers: a) The network address
b) The range of available IP addresses within a network
1. a) Local Area Network c) The broadcast address
2. c) Network Layer d) The loopback address
3. c) SMTP
4. a) To identify a device on a network 3. Which of the following is NOT a valid private IP address range
5. b) Bus as defined by RFC 1918?
6. b) Network Address Translation a) 10.0.0.0 - 10.255.255.255
7. a) 80 b) 172.16.0.0 - 172.31.255.255
8. b) ARP c) 192.168.0.0 - 192.168.255.255
9. a) Internet Control Message Protocol d) 169.254.0.0 - 169.254.255.255
10. b) 32-bit
11. c) Switch 4. What is the purpose of a VLAN (Virtual Local Area Network)
12. d) FTP in networking?
13. a) It defines the size of a network a) To separate physical network segments
14. c) DHCP b) To increase the speed of data transmission
15. c) Ethernet c) To enhance wireless network security
16. a) To prevent unauthorized access to a network d) To automatically assign IP addresses to devices
17. c) To resolve domain names to IP addresses
18. a) File Transfer Protocol 5. Which OSI layer is responsible for flow control and error
19. c) SMTP detection in data transmission?
20. a) HTTP a) Physical Layer
21. a) To split a large network into smaller, manageable sub- b) Data Link Layer
networks c) Transport Layer
22. c) Transport Layer d) Application Layer
23. a) Star
24. b) To connect multiple LANs and route data between them 6. What is a DNS cache poisoning attack?
25. b) SSH a) Injecting false DNS records into a resolver's cache
26. b) 192.168.0.0 - 192.168.255.255 b) Flooding a DNS server with requests
27. c) Router c) Redirecting DNS queries to a malicious server
28. a) Uniform Resource Locator d) Scanning for open DNS servers on the internet
29. b) Virtual Private Network
30. c) SSH 7. What is BGP (Border Gateway Protocol) used for in the
31. b) To translate domain names into IP addresses context of the internet?
32. c) Ring a) It is a routing protocol used within a local network.
33. c) Transport Layer b) It is a protocol for sending emails.
34. b) To connect multiple LANs and route data between them c) It is used to manage DNS resolution.
35. d) HTTPS d) It is used for routing between autonomous systems on the
36. b) Wide Area Network internet.
37. d) POP3
38. a) To hide the identity of the client device 8. What does QoS (Quality of Service) refer to in networking?
39. a) A unit of data that is transmitted over a network a) It refers to the quantity of data transmitted over a network.
40. c) DHCP b) It is a security protocol for network traffic.
These answers should help you check your understanding of the c) It refers to the ability to prioritize and manage network
networking fundamentals covered in the questions. traffic to ensure certain levels of service.
d) It is a protocol for secure file transfer.

9. Which of the following is an example of an anycast IP


Advance 20 Question Set On Networking: address?
Certainly, here are 20 slightly more advanced multiple-choice a) 192.168.1.1
questions on networking: b) 10.0.0.1
c) 224.0.0.1
1. What is the key difference between TCP (Transmission d) 192.0.2.1
Control Protocol) and UDP (User Datagram Protocol)?
a) TCP is connection-oriented, while UDP is connectionless. 10. What is the purpose of the NAT (Network Address
b) TCP is faster than UDP. Translation) protocol?
c) UDP is more reliable than TCP. a) To translate DNS names to IP addresses
d) There is no significant difference between TCP and UDP. b) To encrypt data transmission
c) To map private IP addresses to a single public IP address for
outbound internet access

Linked - https://www.linkedin.com/in/tanmay-pawar-6680ab208?utm_source=share&utm_campaign=share_via&utm_content=profile&utm_medium=android_app - © PAWAR TANMAY VILAS


4 Technical Aptitude MCQ Preparation

d) To assign IP addresses to devices automatically d) A unicast address for a single device

11. What is the purpose of the OSI model, and how many layers 20. What is the primary purpose of a load balancer in a
does it define? network?
a) It standardizes network hardware. a) To route traffic to a single server for load distribution
b) It is a protocol for securing network communications. b) To increase network latency
c) It provides a conceptual framework for understanding c) To evenly distribute network traffic across multiple servers
network protocols and is divided into seven layers. to improve performance and reliability
d) It defines the structure of IP addresses. d) To encrypt data transmission

12. In network security, what does the term "DMZ" stand for? Answers:
a) De-Militarized Zone
b) Data Management Zone 1. a) TCP is connection-oriented, while UDP is connectionless.
c) Dynamic Monitoring Zone 2. b) The range of available IP addresses within a network
d) Distributed Message Zone 3. d) 169.254.0.0 - 169.254.255.255
4. a) To separate physical network segments
13. Which routing protocol is often used within an autonomous 5. c) Transport Layer
system (AS) and is based on the Shortest Path First (SPF) 6. a) Injecting false DNS records into a resolver's cache
algorithm? 7. d) It is used for routing between autonomous systems on the
a) BGP (Border Gateway Protocol) internet.
b) OSPF (Open Shortest Path First) 8. c) It refers to the ability to prioritize and manage network
c) RIP (Routing Information Protocol) traffic to ensure certain levels of service.
d) EIGRP (Enhanced Interior Gateway Routing Protocol) 9. d) 192.0.2.1
10. c) To map private IP addresses to a single public IP address
14. What is the primary purpose of the DNSSEC (Domain Name for outbound internet access
System Security Extensions)? 11. c) It provides a conceptual framework for understanding
a) To compress DNS records for faster lookup network protocols and is divided into seven layers.
b) To enhance DNS privacy 12. a) De-Militarized Zone
c) To provide authentication and data integrity for DNS 13. b) OSPF (Open Shortest Path First)
information 14. c) To provide authentication and data integrity for DNS
d) To map domain names to IP addresses information
15. a) To translate IPv4 addresses to IPv6 addresses
15. What is the purpose of NAT64 (Network Address Translation 16. b) SSH
64)? 17. a) To hide the identity of the client device
a) To translate IPv4 addresses to IPv6 addresses 18. b) To provide SSL/TLS certificates to websites for secure data
b) To map private IP addresses to public IP addresses transfer
c) To secure email communication 19. c) A routing technique where the same IP address is used by
d) To enable Quality of Service (QoS) for network traffic multiple devices, and the closest one responds to requests
20. c) To evenly distribute network traffic across multiple
16. Which network protocol is typically used for remotely servers to improve performance and reliability
managing network devices, such as routers and switches? These questions cover advanced networking topics related to
a) Telnet network models, security, protocols, and technologies.
b) SSH
c) RDP (Remote Desktop Protocol)
d) ICMP

17. What is the primary function of a proxy server in the


context of network security?
Basic 40 Question Set On Security:
a) To hide the identity of the client device Certainly, here are 40 multiple-choice questions (MCQs) on the
b) To manage DNS resolution topic of network security for a technical aptitude test:
c) To encrypt all network traffic
d) To secure data transmission 1. What does the acronym "DDoS" stand for in the context of
network security?
18. What is the purpose of a certificate authority (CA) in the a) Distributed Denial of Service
context of secure web communication (HTTPS)? b) Data Encryption Standard
a) To assign IP addresses to devices c) Domain Name System
b) To provide SSL/TLS certificates to websites for secure data d) Digital Signature Service
transfer
c) To manage DNS resolution 2. Which of the following is NOT considered a primary goal of
d) To enforce network access policies network security?
a) Confidentiality
19. In networking, what does the term "anycast" refer to? b) Availability
a) A type of broadcast addressing c) Usability
b) A multicast group d) Integrity
c) A routing technique where the same IP address is used by
multiple devices, and the closest one responds to requests

Linked - https://www.linkedin.com/in/tanmay-pawar-6680ab208?utm_source=share&utm_campaign=share_via&utm_content=profile&utm_medium=android_app - © PAWAR TANMAY VILAS


5 Technical Aptitude MCQ Preparation

3. What is the primary purpose of a firewall in network


security? 12. Which type of malware is designed to replicate and spread
a) To filter and control network traffic to other computers or devices without user intervention?
b) To encrypt data during transmission a) Trojan
c) To assign IP addresses to devices b) Worm
d) To authenticate users c) Spyware
d) Adware
4. Which encryption protocol is commonly used to secure
wireless network communications? 13. Which of the following is NOT a common wireless network
a) WEP (Wired Equivalent Privacy) encryption method?
b) SSL (Secure Sockets Layer) a) WEP
c) SSH (Secure Shell) b) WPA2
d) WPA (Wi-Fi Protected Access) c) WPA3
d) SSL
5. What is the term for the process of converting readable data
into an unreadable form for security purposes? 14. What is the primary purpose of a security policy in an
a) Decryption organization?
b) Encoding a) To make network traffic faster
c) Encryption b) To define rules and guidelines for ensuring network
d) Hashing security
c) To monitor network traffic
6. Which type of attack involves an attacker intercepting and d) To assign IP addresses to devices
altering communication between two parties without their
knowledge? 15. Which cryptographic protocol is commonly used for secure
a) Phishing email communication?
b) Man-in-the-Middle (MitM) a) HTTPS
c) DDoS b) SMTP
d) Brute Force c) PGP (Pretty Good Privacy)
d) ICMP
7. What does "2FA" stand for in the context of authentication
and security? 16. What is a "zero-day vulnerability" in network security?
a) Two-Factor Authentication a) A vulnerability that has been known for at least a year
b) Two-Factor Authorization b) A vulnerability that is exploited on the 31st day of the
c) Two-Factor Authorization month
d) Two-Factor Access c) A vulnerability for which there is no known fix or patch
d) A vulnerability that affects zero devices
8. Which security protocol is used to establish secure
connections between a client and a web server, often indicated 17. What is the purpose of an antivirus program in network
by "https://" in the URL? security?
a) HTTP a) To prevent all unauthorized access to a network
b) SSH b) To detect and remove malicious software and viruses
c) SSL/TLS c) To manage DNS resolution
d) FTP d) To encrypt network traffic

9. What is the primary purpose of an intrusion detection system 18. What is the primary purpose of a security certificate (e.g.,
(IDS) in network security? SSL/TLS certificate) in network security?
a) To prevent all unauthorized access a) To block network traffic
b) To detect and alert on suspicious activities or security b) To manage DNS resolution
breaches c) To provide authentication and data integrity for secure
c) To encrypt network traffic communication
d) To filter spam emails d) To assign IP addresses to devices

10. What is a "honeypot" in the context of network security? 19. Which of the following is an example of a "social
a) A sweet and sticky substance used to trap intruders engineering" attack?
b) A fake network or system set up to attract and detect a) A DDoS attack
attackers b) A brute force attack
c) A secure storage facility for passwords c) A phishing attack
d) A type of network firewall d) A firewall attack

11. What is the primary function of a VPN (Virtual Private 20. What is the purpose of a security patch or update in
Network) in network security? network security?
a) To block network traffic a) To introduce new vulnerabilities
b) To ensure network usability b) To improve network performance
c) To provide secure and private communication over the c) To fix known security vulnerabilities and issues
internet d) To assign IP addresses to devices
d) To manage DNS resolution

Linked - https://www.linkedin.com/in/tanmay-pawar-6680ab208?utm_source=share&utm_campaign=share_via&utm_content=profile&utm_medium=android_app - © PAWAR TANMAY VILAS


6 Technical Aptitude MCQ Preparation

21. What is the primary purpose of a sandbox in network that is kept secret for encryption
security?
a) To isolate and execute untrusted or potentially malicious 30. What is the purpose of a WAF (Web Application Firewall) in
code in a controlled environment network security?
b) To encrypt all network traffic a) To encrypt data during transmission
c) To manage DNS resolution b) To secure email communication
d) To store network logs c) To protect web applications from various online threats,
such as SQL injection and cross-site scripting (XSS)
22. Which type of encryption uses the same key for both d) To assign IP addresses to devices
encryption and decryption?
a) Asymmetric encryption 31. What is the primary purpose of a SIEM (Security
b) Symmetric encryption Information and Event Management) system in network
c) Public-key encryption security?
d) Hashing a) To increase network speed
b) To filter spam emails
23. What does "BYOD" stand for in the context of network c) To provide real-time monitoring, analysis, and reporting of
security? security events and incidents
a) Bring Your Own Device d) To manage DNS resolution
b) Backup Your Operating System Data
c) Block Your Online Downloads 32. What is a "salt" in the context of password hashing and
d) Buy Your Own Domain storage?
a) A type of encryption algorithm
24. What is a "packet sniffer" or "packet analyzer" used for in b) A random value added to a password before hashing to
network security? increase security
a) To increase network speed c) A security token used for authentication
b) To capture and analyze network traffic for troubleshooting d) A type of digital signature
or monitoring
c) To assign IP addresses to devices 33. Which of the following is an example of a network security
d) To secure email communication "best practice"?
a) Using the default administrator username and password
25. What does the term "phishing" refer to in network security? for network devices
a) A type of encryption protocol b) Sharing sensitive data through unencrypted email
b) A cryptographic technique c) Regularly updating and patching software and systems
c) A social engineering attack that attempts to trick d) Disabling firewalls to speed up network traffic
individuals into revealing sensitive information
d) A type of firewall 34. What does "RTO" stand for in the context of business
continuity and disaster recovery?
26. What does "IoT" stand for in the context of network a) Real-Time Operation
security? b) Return to Office
a) Internet of Technology c) Recovery Time Objective
b) Internet of Things d) Remote Task Observation
c) Internet of Traffic
d) Internet of Transactions 35. What is the primary purpose of a DMARC (Domain-based
Message Authentication, Reporting, and Conformance) record
27. What is the primary purpose of encryption in network in email security?
security? a) To increase network speed
a) To increase network speed b) To filter spam emails
b) To make data unreadable to unauthorized parties c) To define email authentication policies and provide
c) To manage DNS resolution reporting on email security practices
d) To provide authentication for users d) To manage DNS resolution

28. Which of the following is an example of a security token in 36. What is the primary purpose of a penetration test (pen test)
network security? in network security?
a) A secure email server a) To determine the maximum network speed
b) A physical device or smartphone app used for two-factor b) To monitor DNS traffic
authentication c) To simulate attacks on a network to identify vulnerabilities
c) A type of encryption protocol and weaknesses
d) A wireless access point d) To encrypt network traffic

29. What is a "public key" in the context of asymmetric 37. What is a "proxy server" used for in network security?
encryption? a) To filter and control network traffic and hide the identity of
a) The key used to encrypt data the client device
b) The key used to decrypt data b) To increase network speed
c) A key that is shared publicly for encryption c) To assign IP addresses to devices
d) A key d) To secure email communication

Linked - https://www.linkedin.com/in/tanmay-pawar-6680ab208?utm_source=share&utm_campaign=share_via&utm_content=profile&utm_medium=android_app - © PAWAR TANMAY VILAS


7 Technical Aptitude MCQ Preparation

38. What is the primary purpose of a security incident response 32. b) A random value added to a password before hashing to
plan in network security? increase security
a) To create and manage DNS records 33. c) Regularly updating and patching software and systems
b) To enforce network access policies 34. c) Recovery Time Objective
c) To provide guidelines and procedures for responding to 35. c) To define email authentication policies and provide
and mitigating security incidents reporting on email security practices
d) To increase network speed 36. c) To simulate attacks on a network to identify
vulnerabilities and weaknesses
39. Which of the following is NOT a common authentication 37. a) To filter and control network traffic and hide the identity
factor in multi-factor authentication (MFA)? of the client device
a) Something you know (e.g., a password) 38. c) To provide guidelines and procedures for responding to
b) Something you have (e.g., a smart card or security token) and mitigating security incidents
c) Something you are (e.g., fingerprint or facial recognition) 39. d) Something you can do (e.g., sing a song)
d) Something you can do (e.g., sing a song) 40. c) A security model that trusts no one and verifies
everything, even within the network perimeter
40. What is a "zero trust" security model in network security?
a) A security model that trusts all users and devices by default These questions cover various aspects of network security,
b) A security model that only trusts external devices including encryption, authentication, intrusion detection, and
c) A security model that trusts no one and verifies everything, security best practices.
even within the network perimeter
d) A security model that trusts only authenticated users

Answers: Advance 20 Question Set On Security:


Certainly, here are 20 more advanced multiple-choice
1. a) Distributed Denial of Service questions on network security:
2. c) Usability
3. a) To filter and control network traffic 41. What is the primary function of an IDS (Intrusion Detection
4. b) WPA (Wi-Fi Protected Access) System) in network security?
5. c) Encryption a) To prevent all network intrusions
6. b) Man-in-the-Middle (MitM) b) To block all network traffic
7. a) Two-Factor Authentication c) To detect and alert on suspicious activities or security
8. c) SSL/TLS breaches
9. b) To detect and alert on suspicious activities or security d) To assign IP addresses to devices
breaches
10. b) A fake network or system set up to attract and detect 42. What is the primary purpose of a digital certificate in
attackers network security?
11. c) To provide secure and private communication over the a) To assign IP addresses to devices
internet b) To provide two-factor authentication
12. b) Worm c) To identify and authenticate users or devices
13. d) SSL d) To increase network speed
14. b) To define rules and guidelines for ensuring network
security 43. What is a "zero-day exploit" in network security?
15. c) PGP (Pretty Good Privacy) a) An attack that occurs on the last day of the month
16. c) A vulnerability for which there is no known fix or patch b) An attack that targets devices with zero security measures
17. b) To detect and remove malicious software and viruses c) An attack that targets a vulnerability before a patch or fix is
18. c) To provide authentication and data integrity for secure available
communication d) An attack that occurs when the network is at its most
19. c) A phishing attack vulnerable
20. c) To fix known security vulnerabilities and issues
21. a) To isolate and execute untrusted or potentially malicious 44. What does the term "sandboxing" refer to in network
code in a controlled environment security?
22. b) Symmetric encryption a) A playground for network administrators
23. a) Bring Your Own Device b) The practice of isolating and executing untrusted code in a
24. b) To capture and analyze network traffic for controlled environment
troubleshooting or monitoring c) A type of cryptographic key exchange
25. c) A social engineering attack that attempts to trick d) A type of security token
individuals into revealing sensitive information
26. b) Internet of Things 45. What is the primary purpose of a CSIRT (Computer Security
27. b) To make data unreadable to unauthorized parties Incident Response Team) in network security?
28. b) A physical device or smartphone app used for two-factor a) To manage DNS resolution
authentication b) To increase network speed
29. c) A key that is shared publicly for encryption c) To provide a coordinated and effective response to security
30. c) To protect web applications from various online threats, incidents
such as SQL injection and cross-site scripting (XSS) d) To block all network traffic
31. c) To provide real-time monitoring, analysis, and reporting
of security events and incidents

Linked - https://www.linkedin.com/in/tanmay-pawar-6680ab208?utm_source=share&utm_campaign=share_via&utm_content=profile&utm_medium=android_app - © PAWAR TANMAY VILAS


8 Technical Aptitude MCQ Preparation

46. What is a "botnet" in network security? c) A security model that trusts no one and requires
a) A network of robots used for surveillance continuous verification, even for users inside the network
b) A network of devices infected with malware and controlled d) A security model that trusts all external users
by a single entity
c) A type of secure communication protocol 55. What is a "CAPTCHA" used for in network security?
d) A group of ethical hackers a) A type of encryption protocol
b) A security token
47. Which of the following is NOT a common security protocol c) A challenge-response test designed to determine whether
used in email communication? the user is human or a bot
a) SMTP d) A type of firewall
b) POP3
c) IMAP 56. What is the primary purpose of a VPN concentrator in
d) SNMP network security?
a) To increase network speed
48. What does the term "honeynet" refer to in network b) To encrypt network traffic
security? c) To centralize and manage multiple VPN connections
a) A network of interconnected honey-producing companies d) To manage DNS resolution
b) A network of fake servers or systems used to lure and
study attackers 57. What does the term "keylogger" refer to in network
c) A network of devices used for eavesdropping on network security?
traffic a) A device used to record network traffic
d) A network of secure web servers b) A cryptographic key exchange protocol
c) A type of malware that records keystrokes on a
49. What is the primary purpose of a security information and compromised system
event management (SIEM) system in network security? d) A type of encryption protocol
a) To provide real-time monitoring, analysis, and reporting of
security events and incidents 58. What is a "certificate revocation list (CRL)" in network
b) To manage DNS resolution security?
c) To encrypt network traffic a) A list of trusted security certificates
d) To increase network speed b) A list of revoked security certificates
c) A type of encryption protocol
50. What is a "deauthentication attack" in network security? d) A list of open ports on a firewall
a) A method of forcefully disconnecting a client device from a
Wi-Fi network 59. What does "BYOD" stand for in network security?
b) A type of distributed denial of service attack a) Bring Your Own Domain
c) An attack that targets only encrypted network traffic b) Bring Your Own Device
d) A type of VPN attack c) Backup Your Operating Data
d) Block Your Online Downloads
51. What does "IoT" stand for in the context of network
security? 60. What is the primary purpose of a content filtering system in
a) Internet of Technology network security?
b) Internet of Transactions a) To increase network speed
c) Internet of Threats b) To manage DNS resolution
d) Internet of Things c) To filter and control web content and protect against
malicious or inappropriate content
52. What is the primary purpose of a WIPS (Wireless Intrusion d) To encrypt network traffic
Prevention System) in network security?
a) To increase network speed Answers:
b) To encrypt network traffic
c) To monitor and prevent unauthorized access and attacks on 41. c) To detect and alert on suspicious activities or security
wireless networks breaches
d) To manage DNS resolution 42. c) To identify and authenticate users or devices
43. c) An attack that targets a vulnerability before a patch or fix
53. What is the primary purpose of an access control list (ACL) is available
in network security? 44. b) The practice of isolating and executing untrusted code in
a) To increase network speed a controlled environment
b) To assign IP addresses to devices 45. c) To provide a coordinated and effective response to
c) To define rules that control network traffic and access to security incidents
network resources 46. b) A network of devices infected with malware and
d) To encrypt network traffic controlled by a single entity
47. d) SNMP
54. What does the term "zero trust" refer to in network 48. b) A network of fake servers or systems used to lure and
security? study attackers
a) A security model that trusts all users by default 49. a) To provide real-time monitoring, analysis, and reporting
b) A security model that trusts only internal users of security events and incidents

Linked - https://www.linkedin.com/in/tanmay-pawar-6680ab208?utm_source=share&utm_campaign=share_via&utm_content=profile&utm_medium=android_app - © PAWAR TANMAY VILAS


9 Technical Aptitude MCQ Preparation

50. a) A method of forcefully disconnecting a client device from b) A software-based emulation of a physical computer
a Wi-Fi network c) A network device
51. d) Internet of Things d) A storage unit in the cloud
52. c) To monitor and prevent unauthorized access and attacks
on wireless networks 7. What is auto-scaling in cloud computing?
53. c) To define rules that control network traffic and access to a) The process of shutting down cloud servers to save energy
network resources b) Automatically adjusting the capacity of cloud resources to
54. c) A security model that trusts no one and requires handle varying workloads
continuous verification, even for users inside the network c) An authentication method
55. c) A challenge-response test designed to determine whether d) A security measure for cloud data
the user is human or a bot
56. c) To centralize and manage multiple VPN connections 8. What is the purpose of a load balancer in a cloud
57. c) A type of malware that records keystrokes on a infrastructure?
compromised system a) To maximize power efficiency
58. b) A list of revoked security certificates b) To increase latency
59. b) Bring Your Own Device c) To distribute network traffic across multiple servers to
60. c) To filter and control web content and protect against improve performance and reliability
malicious or inappropriate content d) To encrypt data transmission
These questions cover more advanced topics in network
security, including intrusion detection, encryption, 9. Which cloud computing service model provides a platform
authentication, and security best practices. and environment for developers to build, deploy, and manage
applications?
a) IaaS
Basic 40 Question Set On Cloud b) SaaS
c) PaaS
Computing: d) CaaS (Container as a Service)
Certainly, here are 40 multiple-choice questions (MCQs) on the
topic of cloud computing for a technical aptitude test: 10. What is the term for a physical location where cloud service
providers host their infrastructure?
1. What is cloud computing? a) Cloud hub
a) Storing data on local servers b) Data center
b) Accessing the internet c) Server farm
c) Renting and using computing resources over the internet d) Cloud city
d) A method of cooling data centers
11. What is the primary concern when it comes to data security
2. What is the most common service model in cloud computing in the cloud?
that provides virtualized computing resources? a) DDoS attacks
a) IaaS (Infrastructure as a Service) b) Data redundancy
b) SaaS (Software as a Service) c) Data sovereignty and privacy
c) PaaS (Platform as a Service) d) Network latency
d) DaaS (Desktop as a Service)
12. Which cloud computing model combines both public and
3. Which cloud deployment model provides a dedicated private cloud services to meet specific business requirements?
infrastructure for a single organization? a) Public Cloud
a) Public Cloud b) Hybrid Cloud
b) Hybrid Cloud c) Private Cloud
c) Private Cloud d) Community Cloud
d) Community Cloud
13. What is the role of a hypervisor in virtualization?
4. What is the primary advantage of using a public cloud a) Managing software licenses
service? b) Emulating hardware and managing virtual machines
a) Full control over the infrastructure c) Securing data in the cloud
b) Cost savings and scalability d) Routing network traffic
c) Isolation from other users
d) Enhanced security 14. What does "SLA" stand for in the context of cloud services?
a) Secure Local Access
5. Which cloud computing service model offers ready-to-use b) Service Level Agreement
software applications delivered over the internet? c) Secure Login Authentication
a) IaaS d) Standard License Agreement
b) SaaS
c) PaaS 15. What is serverless computing in cloud technology?
d) FaaS (Function as a Service) a) A type of cloud deployment model
b) A method of outsourcing IT tasks to external providers
6. What is a virtual machine (VM) in the context of cloud c) A model where users write and deploy code without
computing? managing servers
a) A physical server d) A type of cloud storage service

Linked - https://www.linkedin.com/in/tanmay-pawar-6680ab208?utm_source=share&utm_campaign=share_via&utm_content=profile&utm_medium=android_app - © PAWAR TANMAY VILAS


10 Technical Aptitude MCQ Preparation

b) A facility that hosts servers and data storage devices


16. What does "BYOK" stand for in cloud security? c) A virtualized network environment
a) Bring Your Own Keys d) A cloud billing system
b) Build Your Own Kubernetes
c) Backup Your Online Knowledge 26. What is the primary advantage of using a cloud-based
d) Blockchain Your Own Keywords disaster recovery solution?
a) Data loss prevention
17. What is cloud bursting in cloud computing? b) Enhanced data security
a) A data transfer method c) Cost-effectiveness and scalability
b) The sudden release of clouds during a storm d) Improved network latency
c) The process of migrating workloads to a public cloud
during high demand 27. What does "PaaS" stand for in cloud computing?
d) A network security protocol a) Platform as a Service
b) Public as a Service
18. What is the purpose of a CDN (Content Delivery Network) in c) Private as a Service
cloud computing? d) Partition as a Service
a) To archive data
b) To optimize database queries 28. What is a "lift and shift" migration strategy in cloud
c) To accelerate content delivery and improve user experience computing?
d) To store virtual machines a) A way to transport physical servers to a new location
b) A method to move an application to the cloud without
19. What is the role of a VPC (Virtual Private Cloud) in cloud significant changes
services? c) A process of converting data to a different format
a) To protect against DDoS attacks d) A strategy to reduce cloud costs
b) To provide a dedicated network space within a public cloud
c) To manage DNS resolution 29. What is the purpose of a "cloud access security broker"
d) To monitor network traffic (CASB) in cloud security?
a) To manage DNS resolution
20. What is cloud orchestration? b) To enhance cloud performance
a) A type of cloud backup c) To protect data and enforce security policies for cloud
b) The management and automation of multiple cloud applications
resources and services d) To improve server load balancing
c) A method of cloud encryption
d) A cloud disaster recovery plan 30. What is a "hyperscale data center" in cloud infrastructure?
a) A data center that operates at a small scale
21. What is the "shared responsibility model" in cloud security? b) A data center that specializes in virtualization
a) A model where all security responsibilities are entirely with c) A data center that can rapidly expand and handle massive
the cloud provider workloads
b) A model where all security responsibilities are entirely with d) A data center dedicated to storing encrypted data
the cloud customer
c) A model where security responsibilities are shared 31. What is the term for the practice of replicating data to
between the cloud provider and the customer multiple geographically dispersed data centers to ensure data
d) A model for data governance in the cloud availability and redundancy?
a) Data fragmentation
22. What does "IAC" stand for in cloud automation? b) Data duplication
a) Internet Access Control c) Data partitioning
b) Infrastructure as Code d) Data replication
c) International Accounting Compliance
d) Intelligent Authentication and Control 32. What does "FaaS" stand for in cloud computing?
a) Free as a Service
23. What is the term for the process of moving data, b) Fully Automated Service
applications, or workloads between cloud environments? c) Function as a Service
a) Cloud migration d) Framework as a Service
b) Data deletion
c) Cloud integration 33. What is the role of a cloud management platform (CMP) in
d) Data encryption cloud computing?
a) To host web applications
24. What is a "compliance-as-code" approach in cloud security? b) To manage DNS resolution
a) A method for ensuring regulatory compliance using c) To centralize and automate the management of cloud
software and automation resources
b) A technique for securely erasing data from cloud storage d) To provide DDoS protection
c) A method of cloud data compression
d) A way to enforce cloud usage policies 34. What does "DRaaS" stand for in cloud computing?
a) Disaster Recovery as a Service
25. What is a "server farm" in cloud infrastructure? b) Data Replication as a Service
a) A type of malware c) Digital Resources as a Service

Linked - https://www.linkedin.com/in/tanmay-pawar-6680ab208?utm_source=share&utm_campaign=share_via&utm_content=profile&utm_medium=android_app - © PAWAR TANMAY VILAS


11 Technical Aptitude MCQ Preparation

d) Data Retrieval as a Service 15. c) A model where users write and deploy code without
managing servers
35. What is a "multi-cloud" strategy in cloud computing? 16. a) Bring Your Own Keys
a) Using multiple cloud providers for redundancy and 17. c) The process of migrating workloads to a public cloud
resilience during high demand
b) A strategy that only relies on a single cloud provider 18. c) To accelerate content delivery and improve user
c) A strategy that combines both public and private clouds experience
d) Using multiple data centers in different geographic 19. b) To provide a dedicated network space within a public
locations cloud
20. b) The management and automation of multiple cloud
36. What is a "cloud-native" application? resources and services
a) An application that can only run on traditional on-premises 21. c) A model where security responsibilities are shared
servers between the cloud provider and the customer
b) An application specifically designed to run in cloud 22. b) Infrastructure as Code
environments 23. a) Cloud migration
c) An application written in a legacy programming language 24. a) A method for ensuring regulatory compliance using
d) An application that is always offline software and automation
25. b) A facility that hosts servers and data storage devices
37. What is the term for the practice of using the public cloud 26. c) Cost-effectiveness and scalability
for burstable workloads and a private cloud for stable 27. a) Platform as a Service
workloads? 28. b) A method to move an application to the cloud without
a) Cloud isolation significant changes
b) Cloud bursting 29. c) To protect data and enforce security policies for cloud
c) Cloud convergence applications
d) Cloud consolidation 30. c) A data center that can rapidly expand and handle massive
workloads
38. What does "EBS" stand for in the context of cloud storage? 31. d) Data replication
a) Encrypted Backup Storage 32. c) Function as a Service
b) Elastic Block Store 33. c) To centralize and automate the management of cloud
c) Exabyte Storage System resources
d) External Backup Service 34. a) Disaster Recovery as a Service
35. a) Using multiple cloud providers for redundancy and
39. What is the primary goal of a cloud security posture resilience
management (CSPM) tool? 36. b) An application specifically designed to run in cloud
a) To enhance cloud provider performance environments
b) To enforce strict network access policies 37. b) Cloud bursting
c) To ensure the security of cloud environments and 38. b) Elastic Block Store
compliance with security policies 39. c) To ensure the security of cloud environments and
d) To provide cloud billing reports compliance with security policies
40. c) The legal and regulatory requirements related to where
40. What is "cloud data sovereignty"? data is stored and processed
a) The concept of storing data exclusively in private clouds
b) The idea that data is the property of the cloud provider These questions cover a range of topics related to cloud
c) The legal and regulatory requirements related to where computing, including service models, deployment models,
data is stored and processed security, and terminology.
d) The process of migrating data from one cloud to another

Advance 20 Question Set On Cloud


Answers:
Computing:
1. c) Renting and using computing resources over the internet Certainly, here are 20 more advanced multiple-choice
2. a) IaaS (Infrastructure as a Service) questions on cloud computing:
3. c) Private Cloud
4. b) Cost savings and scalability 41. What is "serverless computing" in cloud technology, and
5. b) SaaS (Software as a Service) which cloud providers popularized this concept?
6. b) A software-based emulation of a physical computer a) Running applications without servers; AWS (Amazon Web
7. b) Automatically adjusting the capacity of cloud resources to Services)
handle varying workloads b) Running applications on dedicated physical servers; Google
8. c) To distribute network traffic across multiple servers to Cloud
improve performance and reliability c) A method to reduce cloud costs; Microsoft Azure
9. c) PaaS (Platform as a Service) d) A form of virtualization; IBM Cloud
10. b) Data center
11. c) Data sovereignty and privacy 42. What is the purpose of a "cloud marketplace" in cloud
12. b) Hybrid Cloud computing?
13. b) Emulating hardware and managing virtual machines a) To buy and sell physical servers
14. b) Service Level Agreement b) To offer cloud services and applications for deployment

Linked - https://www.linkedin.com/in/tanmay-pawar-6680ab208?utm_source=share&utm_campaign=share_via&utm_content=profile&utm_medium=android_app - © PAWAR TANMAY VILAS


12 Technical Aptitude MCQ Preparation

c) To host online gaming platforms d) A type of network firewall; Check Point


d) To manage DNS resolution
52. In cloud networking, what is the role of a "cloud fabric" or
43. What does "CSP" stand for in the context of cloud "virtual fabric"?
computing security? a) To encrypt data in transit
a) Cloud Service Provider b) To manage DNS records
b) Cloud Security Protocol c) To provide an abstracted and scalable network
c) Cloud Storage Platform infrastructure for cloud services
d) Cloud Security Posture d) To optimize cloud billing

44. In cloud computing, what is "serverless architecture" often 53. What is a "serverless framework" in cloud computing, and
referred to as? which programming languages are commonly used with it?
a) Scalable computing a) A framework for managing physical servers; Python and
b) Function as a Service (FaaS) Java
c) Virtual machine management b) A framework for building serverless applications;
d) Private cloud deployment JavaScript, Python, and more
c) A framework for emulating virtual machines; Ruby and C++
45. What is "cold storage" in the context of cloud storage d) A framework for managing container deployments; Go and
services? Rust
a) Storage with very high temperature
b) Storage for rarely accessed data, typically with lower costs 54. What is a "CICD pipeline" in cloud development?
c) Storage in a refrigerated data center a) A cloud-based database service
d) Storage for frequently accessed data b) A continuous integration and continuous deployment
process for automating application delivery
46. What is a "stateless application" in cloud computing? c) A cloud-based communication protocol
a) An application that maintains user session data d) A method for securing cloud resources
b) An application that doesn't store data between user
requests 55. What is "serverless computing's" main advantage, and what
c) An application with high security requirements technology allows it to function?
d) An application hosted on a private cloud a) Low cost and scalability; AWS Lambda and Azure Functions
b) Advanced security features; Google Cloud Functions
47. What is a "cloud-native" container orchestration platform c) Full control over physical servers; On-premises data centers
developed by Google? d) Direct access to the cloud provider's hardware; Bare-metal
a) Docker servers
b) Kubernetes
c) OpenStack 56. In cloud networking, what is a "load balancer pool," and
d) Vagrant how is it used?
a) A group of malfunctioning servers; it ensures high
48. What does "HIPAA" stand for, and how does it relate to availability
cloud computing? b) A set of load balancers; it optimizes network performance
a) Health Insurance Portability and Accountability Act; it sets c) A group of target instances for distributing traffic; it
standards for handling health data in the cloud enhances application reliability
b) High-Intensity Performance and Processing Act; it defines d) A list of all cloud resources; it simplifies network
cloud infrastructure requirements management
c) Hosted Information Protection and Privacy Agreement; it
governs cloud provider contracts 57. What is "cloud bursting," and how does it differ from
d) None of the above traditional scaling?
a) The process of expanding a private cloud; it requires
49. What is "data egress" in the context of cloud pricing? significant manual intervention
a) The process of transferring data into the cloud b) Automatically increasing cloud capacity during traffic
b) The cost associated with transferring data out of the cloud spikes; it offers on-demand scalability
c) The process of securing data in the cloud c) A process of replacing traditional servers with cloud
d) A data analytics service servers; it involves downtime
d) The transfer of data from one cloud provider to another; it
50. What is the term for a distributed and fault-tolerant file is cost-efficient
storage service offered by AWS?
a) S3 (Simple Storage Service) 58. What is "immutable infrastructure," and how does it relate
b) EC2 (Elastic Compute Cloud) to cloud deployments?
c) RDS (Relational Database Service) a) An infrastructure that cannot be changed; it leads to
d) VPC (Virtual Private Cloud) security vulnerabilities
b) An infrastructure in which changes are made directly to
51. What is a "container" in cloud computing, and which production systems; it improves flexibility
technology is commonly used for containerization? c) An infrastructure that is automatically replaced rather than
a) A virtual machine; VMware updated; it enhances reliability
b) A method for secure data storage; RAID d) An infrastructure that is fully customizable; it minimizes
c) An isolated environment for running applications; Docker costs

Linked - https://www.linkedin.com/in/tanmay-pawar-6680ab208?utm_source=share&utm_campaign=share_via&utm_content=profile&utm_medium=android_app - © PAWAR TANMAY VILAS


13 Technical Aptitude MCQ Preparation

Basic 40 Question Set On C Language:


59. What is the role of a "DevOps engineer" in cloud
Certainly, here are 40 multiple-choice questions (MCQs) on the
development?
C programming language for a technical aptitude test, along
a) Managing cloud billing
with their answers at the end:
b) Implementing cloud security policies
c) Bridging the gap between development and operations
1. In C, what is the purpose of the `#include` directive?
teams to streamline application deployment
a) To declare a variable
d) Providing customer support for cloud services
b) To include a header file in the source code
c) To define a function
60. In cloud storage, what does "ACID" stand for, and how is it
d) To create a loop
related to data consistency?
a) Acidic Consistency in Data; it ensures strong data
2. Which data type is used to store a single character in C?
consistency in distributed systems
a) char
b) Atomicity, Consistency, Isolation, Durability; it defines the
b) int
properties of a transaction in a database
c) float
c) Advanced Cloud Infrastructure Deployment; it describes
d) double
cloud automation techniques
d) All-Cloud Integration and Deployment; it refers to hybrid
3. What is the correct way to declare a constant in C?
cloud solutions
a) `constant_name = value;`
b) `const constant_name = value;`
c) `constant_type constant_name = value;`
Answers: d) `#define constant_name value`

41. a) Running applications without servers; AWS (Amazon Web 4. In C, what is the escape sequence for a newline character?
Services) a) \n
42. b) To offer cloud services and applications for deployment b) \t
43. a) Cloud Service Provider c) \r
44. b) Function as a Service (FaaS) d) \a
45. b) Storage for rarely accessed data, typically with lower
costs 5. What does the `++` operator do in C?
46. b) An application that doesn't store data between user a) Adds 1 to the variable
requests b) Subtracts 1 from the variable
47. b) Kubernetes c) Multiplies the variable by 2
48. a) Health Insurance Portability and Accountability Act; it sets d) Divides the variable by 2
standards for handling health data in the cloud
49. b) The cost associated with transferring data out of the 6. What is the purpose of the `return` statement in a C
cloud function?
50. a) S3 (Simple Storage Service) a) To print a message to the console
51. c) An isolated environment for running applications; Docker b) To terminate the program
52. c) To provide an abstracted and scalable network c) To exit the function and return a value
d) To declare a new variable
infrastructure for cloud services
53. b) A framework for building serverless applications; 7. In C, which operator is used for logical AND?
JavaScript, Python, and more a) &&
54. b) A continuous integration and continuous deployment b) ||
process for automating application delivery c) !
55. a) Low cost and scalability; AWS Lambda and Azure d) &
Functions
56. c) A group of target instances for distributing traffic; it 8. What is the range of values that can be stored in a `char` data
enhances application reliability type in C?
57. b) Automatically increasing cloud capacity during traffic a) -128 to 127
spikes; it offers on-demand scalability b) 0 to 255
58. c) An infrastructure that is automatically replaced rather c) -32768 to 32767
than updated; it enhances reliability d) -2,147,483,648 to 2,147,483,647
59. c) Bridging the gap between development and operations
teams to streamline application deployment 9. Which operator is used for the multiplication of two numbers
60. b) Atomicity, Consistency, Isolation, Durability; it defines the in C?
properties of a transaction in a database a) *
These advanced questions cover more specific and in-depth b) +
aspects of cloud computing, including serverless computing, c) /
containerization, security, and best practices in cloud d) %
development.
10. What is the purpose of the `sizeof` operator in C?
a) To calculate the size of an array
b) To calculate the size of a structure

Linked - https://www.linkedin.com/in/tanmay-pawar-6680ab208?utm_source=share&utm_campaign=share_via&utm_content=profile&utm_medium=android_app - © PAWAR TANMAY VILAS


14 Technical Aptitude MCQ Preparation

c) To calculate the size of a variable or data type b) char


d) To calculate the size of a file c) float
d) double
11. What does the `%d` format specifier represent in the `printf`
function for integers? 21. What does the `&` operator do in C when applied to a
a) Double variable?
b) Decimal a) Performs addition
c) String b) Calculates the modulus
d) Character c) Returns the address of the variable
d) Converts the variable to an integer
12. In C, what is an array?
a) A pointer to a function 22. In C, what is the purpose of the `#include` directive?
b) A collection of characters a) To include a header file in the source code
c) A collection of variables of the same data type b) To declare a variable
d) A reserved keyword c) To define a function
d) To create a loop
13. What is the difference between `int` and `float` data types
in C? 23. What is a valid C variable name?
a) `int` is for integers, and `float` is for floating-point numbers a) myVar
b) There is no difference; they are used interchangeably b) 123var
c) `int` is for characters, and `float` is for numbers c) _myVar
d) `int` is for double-precision numbers, and `float` is for d) var123
single-precision numbers
24. What is the correct way to declare a constant in C?
14. What is the purpose of the `break` statement in a loop in C? a) constant_name = value;
a) Terminates the program b) const constant_name = value;
b) Exits the loop prematurely c) constant_type constant_name = value;
c) Continues to the next iteration of the loop d) #define constant_name value
d) Skips the loop completely
25. In C, what is the range of values that can be stored in a
15. What is a comment in C, and how is it denoted? `char` data type?
a) A comment is used for debugging and is denoted by %% a) -128 to 127
b) A comment is used for documentation and is denoted by // b) 0 to 255
c) A comment is used to create loops and is denoted by :: c) -32768 to 32767
d) Comments are not allowed in C d) -2,147,483,648 to 2,147,483,647

16. In C, what is the purpose of the `struct` keyword? 26. What does the `%d` format specifier represent in the `printf`
a) To define a structure or user-defined data type function for integers?
b) To declare a function a) Double
c) To declare a constant b) Decimal
d) To declare a variable c) String
d) Character
17. What is the result of the following C expression: `5 + 3 * 2`?
a) 16 27. In C, what is the purpose of the `++` operator?
b) 11 a) Adds 1 to the variable
c) 10 b) Subtracts 1 from the variable
d) 7 c) Multiplies the variable by 2
d) Divides the variable by 2
18. What is the output of the following C code?
```c 28. What is the escape sequence for a newline character in C?
int x = 5; a) \n
printf("%d\n", x++); b) \t
``` c) \r
a) 6 d) \a
b) 5
c) 7 29. What is the output of the following C code?
d) 4 ```c
int x = 5;
19. In C, what is the purpose of the `sizeof` operator? printf("%d\n", x++);
a) To calculate the size of a structure ```
b) To calculate the size of an array a) 6
c) To calculate the size of a file b) 5
d) To calculate the size of a variable or data type

20. Which data type is used to store integers in C? c) 7


a) int d) 4

Linked - https://www.linkedin.com/in/tanmay-pawar-6680ab208?utm_source=share&utm_campaign=share_via&utm_content=profile&utm_medium=android_app - © PAWAR TANMAY VILAS


15 Technical Aptitude MCQ Preparation

30. What is a comment in C, and how is it denoted? 40. What does the `++` operator do in C?
a) A comment is used for debugging and is denoted by %% a) Adds 1 to the variable
b) A comment is used for documentation and is denoted by // b) Subtracts 1 from the variable
c) A comment is used to create loops and is denoted by :: c) Multiplies the variable by 2
d) Comments are not allowed in C d) Divides the variable by 2

31. In C, what is the purpose of the `return` statement in a Answers:


function?
a) To print a message to the console 1. b) To include a header file in the source code
b) To terminate the program 2. a) char
c) To exit the function and return a value 3. b) `const constant_name = value;`
d) To declare a new variable 4. a) \n
5. a) Adds 1 to the variable
32. What is the difference between `int` and `float` data types 6. c) To exit the function and return a value
in C? 7. a) &&
a) `int` is for integers, and `float` is for floating-point numbers 8. a) -128 to 127
b) There is no difference; they are used interchangeably 9. a) *
c) `int` is for characters, and `float` is for numbers 10. c) To calculate the size of a variable or data type
d) `int` is for double-precision numbers, and `float` is for 11. b) Decimal
single-precision numbers 12. c) A collection of variables of the same data type
13. a) -128 to 127
33. What is the purpose of the `break` statement in a loop in C? 14. b) Exits the loop prematurely
a) Terminates the program 15. b) A comment is used for documentation and is denoted by
b) Exits the loop prematurely //
c) Continues to the next iteration of the loop 16. a) To define a structure or user-defined data type
d) Skips the loop completely 17. c) 10
18. b) 5
34. In C, what is an array? 19. c) To calculate the size of a variable or data type
a) A pointer to a function 20. a) int
b) A collection of characters 21. c) Returns the address of the variable
c) A collection of variables of the same data type 22. a) To include a header file in the source code
d) A reserved keyword 23. a) myVar
24. b) `const constant_name = value;`
35. What is the purpose of the `sizeof` operator in C? 25. a) -128 to 127
a) To calculate the size of an array 26. b) Decimal
b) To calculate the size of a structure 27. a) Adds 1 to the variable
c) To calculate the size of a variable or data type 28. a) \n
d) To calculate the size of a file 29. b) 5
30. b) A comment is used for documentation and is denoted by
36. What is the result of the following C expression: `5 + 3 * 2`? //
a) 16 31. c) To exit the function and return a value
b) 11 32. a) `int` is for integers, and `float` is for floating-point
c) 10 numbers
d) 7 33. b) Exits the loop prematurely
34. c) A collection of variables of the same data type
37. In C, which operator is used for logical AND? 35. c) To calculate the size of a variable or data type
a) && 36. a) 16
b) || 37. a) &&
c) ! 38. c) To exit the function and return a value
d) & 39. a) `int` is for integers, and `float` is for floating-point
numbers
38. What is the purpose of the `return` statement in a C 40. a) Adds 1 to the variable
function?
a) To print a message to the console
b) To terminate the program
c) To exit the function and return a value
d) To declare a new variable
Advance 20 Question Set On C Language:
39. What is the difference between `int` and `float` data types Certainly, here are 20 advanced multiple-choice questions
in C? (MCQs) on the C programming language, along with their
a) `int` is for integers, and `float` is for floating-point numbers answers at the end:
b) There is no difference; they are used interchangeably
c) `int` is for characters, and `float` is for numbers 1. In C, what is the purpose of a "pointer" variable?
d) `int` is for double-precision numbers, and `float` is for a) To store string values
single-precision numbers b) To hold integer values

Linked - https://www.linkedin.com/in/tanmay-pawar-6680ab208?utm_source=share&utm_campaign=share_via&utm_content=profile&utm_medium=android_app - © PAWAR TANMAY VILAS


16 Technical Aptitude MCQ Preparation

c) To store memory addresses a) It makes the variable constant and unchangeable.


d) To calculate mathematical operations b) It makes the variable local to the function or file.
c) It makes the variable a global variable.
2. Which keyword in C is used to dynamically allocate memory d) It makes the variable dynamic and resizable.
during program execution?
a) stack 10. In C, what is a "function pointer" used for?
b) static a) To point to a specific memory location in the heap.
c) malloc b) To store integer values.
d) auto c) To call a specific function at runtime.
d) To store character arrays.
3. What is the output of the following C code?
```c 11. What is the result of the following C code?
#include <stdio.h> ```c
#include <stdio.h>
int main() {
char str[] = "Hello, World!"; int main() {
printf("%c\n", str[7]); int x = 10;
return 0; int y = x++ + ++x;
} printf("%d\n", y);
``` return 0;
}
a) H ```
b) ,
c) o a) 20
d) W b) 21
c) 22
4. In C, what is the difference between `malloc()` and `calloc()` d) 23
for dynamic memory allocation?
a) `malloc()` allocates memory but does not initialize it, while 12. In C, what is the purpose of the `const` keyword when
`calloc()` allocates and initializes memory to zero. applied to a function parameter?
b) `malloc()` is used for integer allocation, and `calloc()` is a) It makes the parameter mandatory.
used for character allocation. b) It makes the parameter a pointer to a memory location.
c) `malloc()` and `calloc()` are interchangeable and can be c) It indicates that the parameter cannot be modified within
used for the same purpose. the function.
d) `malloc()` is used for stack memory allocation, and `calloc()` d) It specifies that the parameter is optional.
is used for heap memory allocation.
13. What is the role of the `sizeof` operator when applied to a
5. What is the purpose of the `free()` function in C? structure in C?
a) To release allocated memory and prevent memory leaks a) It calculates the size of the structure in bytes.
b) To allocate memory dynamically b) It calculates the number of elements in the structure.
c) To print a message to the console c) It initializes the structure with default values.
d) To perform file I/O operations d) It performs mathematical operations on structure
elements.
6. Which of the following is true about C's `struct` data type?
a) It is used for dynamic memory allocation. 14. In C, what is the purpose of the `register` keyword when
b) It is used to create user-defined data types with a mix of applied to a variable?
different data types. a) It forces the variable to be stored in a separate memory
c) It is used to define functions. location.
d) It is a reserved keyword in C. b) It indicates that the variable is a global variable.
c) It hints to the compiler to store the variable in a CPU
7. In C, what is the purpose of the `void` data type? register for faster access.
a) It is used to indicate an error. d) It makes the variable a constant.
b) It is used for floating-point arithmetic.
c) It is used as a placeholder for functions that do not return 15. Which of the following functions is used to read a character
values. from standard input in C?
d) It is used to define character data. a) `getchar()`
b) `putchar()`
8. Which of the following statements is true about C's `typedef` c) `scanf()`
keyword? d) `printf()`
a) It is used to declare global variables.
b) It is used to define functions. 16. What is the purpose of the `fgets()` function in C?
c) It is used to create aliases for existing data types. a) To copy a string from one variable to another.
d) It is used to allocate memory for arrays. b) To concatenate two strings.
c) To read a string from a file or standard input.
9. What is the purpose of the `static` keyword when applied to d) To find the length of a string.
a variable in C?

Linked - https://www.linkedin.com/in/tanmay-pawar-6680ab208?utm_source=share&utm_campaign=share_via&utm_content=profile&utm_medium=android_app - © PAWAR TANMAY VILAS


17 Technical Aptitude MCQ Preparation

17. In C, what does the `strcat()` function do?


a) It converts a string to lowercase. 2. Which of the following is a correct way to declare a C++
b) It compares two strings for equality. string?
c) It concatenates (appends) one string to another. a) string myString = "Hello, World!";
d) It searches for a substring in a string. b) char myString = "Hello, World!";
c) str myString = "Hello, World!";
18. In C, what does the `strcmp()` function do? d) "Hello, World!" -> myString;
a) It converts a string to uppercase.
b) It compares two strings for equality. 3. What is the purpose of the `main` function in a C++ program?
c) It concatenates (appends) one string to another. a) To declare variables
d) It searches for a substring in a string. b) To define functions
c) To execute the program
19. What is the purpose of the `exit()` function in C? d) To include header files
a) To print a message to the console.
b) To terminate the program and return an exit status code. 4. Which keyword is used to allocate memory for a C++ object
c) To close a file. on the heap?
d) To allocate memory dynamically. a) new
b) malloc
20. In C, what is a "header file" and why is it used? c) allocate
a) A header file contains program documentation. d) create
b) A header file is a reserved keyword.
c) A header file is used to include functions and declarations 5. In C++, what is the difference between a class and an object?
from external libraries. a) A class is an instance of an object.
d) A header file is used to define global variables. b) A class is a blueprint for creating objects.
c) A class and an object are the same thing.
Answers: d) An object is a member of a class.
1. c) To store memory addresses
2. c) malloc 6. What is the output of the following C++ code?
3. a) H ```cpp
4. a) `malloc()` allocates memory but does not initialize it, while #include <iostream>
`calloc()` allocates and initializes memory to zero.
5. a) To release allocated memory and prevent memory leaks int main() {
6. b) It is used to create user-defined data types with a mix of int x = 5;
different data types. std::cout << "The value of x is: " << x;
7. c) It is used as a placeholder for functions that do not return return 0;
values. }
8. c) It is used to create aliases for existing data types. ```
9. b) It makes the variable local to the function or file. a) The value of x is: 5
10. c) To call a specific function at runtime. b) 5
11. b) 21 c) The value of x is: "5"
12. c) It indicates that the parameter cannot be modified within d) 0
the function.
13. a) It calculates the size of the structure in bytes. 7. In C++, what is the purpose of the `cout` object?
14. c) It hints to the compiler to store the variable in a a) To take user input
15. a) getchar() b) To perform mathematical operations
16. c) To read a string from a file or standard input. c) To display output to the console
17. c) It concatenates (appends) one string to another. d) To open files
18. b) It compares two strings for equality.
19. b) To terminate the program and return an exit status code. 8. Which operator is used for multiplication in C++?
20. c) A header file is used to include functions and declarations a) *
from external libraries. b) +
c) /
d) %

9. In C++, what is the purpose of the `cin` object?


Basic 40 Question Set On C++ Language: a) To display output to the console
b) To read input from the console
Certainly, here are 40 multiple-choice questions (MCQs) on the
c) To perform file I/O operations
C++ programming language for a technical aptitude test, along
d) To declare variables
with their answers at the end:
10. What does the `endl` manipulator do in C++?
1. In C++, what is the extension used for C++ source files?
a) It performs a line break in the console output.
a) .h
b) It calculates the modulus of two numbers.
b) .cpp
c) It declares a new variable.
c) .c
d) It exits the program.
d) .exe

Linked - https://www.linkedin.com/in/tanmay-pawar-6680ab208?utm_source=share&utm_campaign=share_via&utm_content=profile&utm_medium=android_app - © PAWAR TANMAY VILAS


18 Technical Aptitude MCQ Preparation

11. What is the correct way to declare a constant in C++?


a) `constant_name = value;` 20. In C++, what is an array?
b) `const constant_name = value;` a) A pointer to a function.
c) `constant_type constant_name = value;` b) A collection of characters.
d) `#define constant_name value` c) A collection of variables of the same data type.
d) A reserved keyword.
12. In C++, what is the syntax to declare and initialize an integer
variable named `myVar` with the value 10? 21. Which C++ header file should be included to work with
a) `myVar = 10;` strings?
b) `int myVar = 10;` a) `<stdio.h>`
c) `myVar := 10;` b) `<math.h>`
d) `myVar (10);` c) `<string.h>`
d) `<string>`
13. Which C++ data type is used to store single characters?
a) char 22. What is the purpose of the `class` keyword in C++?
b) int a) To create a new variable.
c) float b) To define a function.
d) double c) To declare a constant.
d) To define a user-defined data type.
14. What does the `++` operator do in C++?
a) It increments the value of a variable by 1. 23. In C++, what is the difference between a class and a struct?
b) It adds 1 to the variable. a) There is no difference; they are used interchangeably.
c) It calculates the square of the variable. b) A class is a user-defined data type, while a struct is a built-
d) It performs bitwise shifting. in data type.
c) A class has private members by default, while a struct has
15. In C++, which control structure is used to repeat a block of public members by default.
code until a specified condition is met? d) A class is used for dynamic memory allocation, while a
a) for loop struct is used for static memory allocation.
b) if statement
c) switch statement 24. What is the purpose of the `static` keyword when applied to
d) while loop a member of a C++ class?
a) It makes the member a constant.
16. What is the purpose of the `break` statement in a loop in b) It makes the member local to the class instance.
C++? c) It makes the member a global variable.
a) It terminates the program. d) It makes the member dynamic and resizable.
b) It exits the loop prematurely.
c) It continues to the next iteration of the loop. 25. What is a constructor in C++?
d) It skips the loop completely. a) A member function that is called when an object is
created.
17. What is the output of the following C++ code? b) A function that is used to create a new class.
```cpp c) A function that is used to calculate mathematical
#include <iostream> operations.
d) A function that is used to read input from the console.
int main() {
int x = 5; 26. What is the purpose of the `destructor` in C++?
std::cout << "The value of x is: " << x++; a) To create new objects.
return 0; b) To initialize class members.
} c) To release resources and perform cleanup when an object
``` is destroyed.
a) The value of x is: 5 d) To perform bitwise operations.
b) The value of x is: 6
c) The value of x is: 4 27. Which C++ operator is used for logical AND?
d) 5 a) &&
b) ||
18. In C++, what is the escape sequence for a newline c) !
character? d) &
a) \n
b) \t 28. What is the result of the following C++ expression: `5 + 3 *
c) \r 2`?
d) \a a) 16
b) 11
19. What is the purpose of the `new` operator in C++? c) 10
a) To delete an object from memory. d) 7
b) To create a new object on the heap.
c) To declare a new variable. 29. In C++, how is an object created using dynamic memory
d) To perform mathematical operations. allocation?

Linked - https://www.linkedin.com/in/tanmay-pawar-6680ab208?utm_source=share&utm_campaign=share_via&utm_content=profile&utm_medium=android_app - © PAWAR TANMAY VILAS


19 Technical Aptitude MCQ Preparation

a) `MyClass object;` a) It calculates the size of a data type.


b) `new MyClass();` b) It returns the type of an object.
c) `MyClass();` c) It performs mathematical operations.
d) `create MyClass;` d) It is not a valid operator in C++.

30. What is the purpose of the `nullptr` keyword in C++? 40. In C++, what is a lambda expression?
a) To create a null object. a) A way to declare new data types.
b) To represent a null pointer. b) A way to create pointers to objects.
c) To terminate the program. c) A way to define small, anonymous functions.
d) To initialize variables with a default value. d) A way to perform file I/O operations.

31. What is operator overloading in C++? Answers:


a) A technique used to create new operators.
b) A method to add new functionalities to existing operators. 1. b) .cpp
c) A way to create pointers to objects. 2. a) string myString = "Hello, World!";
d) A way to declare functions inside a class. 3. c) To execute the program
4. a) new
32. What is the role of the `virtual` keyword in C++? 5. b) A class is a blueprint for creating objects.
a) To define a virtual function. 6. a) The value of x is: 5
b) To create a new class. 7. c) To display output to the console
c) To indicate a constant variable. 8. a) *
d) To declare a global function. 9. b) To read input from the console
10. a) It performs a line break in the console output.
33. In C++, what is the purpose of the `try`, `catch`, and `throw` 11. b) `const constant_name = value;`
keywords? 12. b) `int myVar = 10;`
a) To define a loop. 13. a) char
b) To declare a function. 14. a) It increments the value of a variable by 1.
c) To handle exceptions and errors. 15. d) while loop
d) To perform file I/O operations. 16. b) It exits the loop prematurely.
17. b) The value of x is: 6
34. What is a C++ template? 18. a) \n
a) A template for creating comments. 19. b) To create a new object on the heap.
b) A preprocessor directive. 20. c) A collection of variables of the same data type.
c) A way to create a class or function that can work with 21. d) `<string>`
different data types. 22. d) To define a user-defined data type.
d) A way to define new data types. 23. c) A class has private members by default, while a struct has
public members by default.
35. In C++, what is a friend function? 24. b) It makes the member local to the class instance.
a) A function that is not allowed to access private members of 25. a) A member function that is called when an object is
a class. created.
b) A function that is used to create new objects. 26. c) To release resources and perform cleanup when an object
c) A function that is a member of a class. is destroyed.
d) A function that is allowed to access the private members of 27. a) &&
a class. 28. a) 16
29. b) `new MyClass();`
36. What is a C++ namespace? 30. b) To represent a null pointer.
a) A reserved keyword. 31. b) A method to add new functionalities to existing
b) A way to define functions. operators.
c) A way to avoid naming conflicts by creating a separate 32. a) To define a virtual function.
scope for identifiers. 33. c) To handle exceptions and errors.
d) A way to create pointers to objects. 34. c) A way to create a class or function that can work with
different data types.
37. In C++, what is an inline function? 35. d) A function that is allowed to access the private members
a) A function that is not executed. of a class.
b) A function that is called using `new` keyword. 36. c) A way to avoid naming conflicts by creating a separate
c) A function that is expanded in place at the point of call, scope for identifiers.
instead of a function call. 37. c) A function that is expanded in place at the point of call,
d) A function that is executed only once. instead of a function call.
38. a) A constructor used to make copies of objects.
38. What is a copy constructor in C++? 39. b) It returns the type of an object.
a) A constructor used to make copies of objects. 40. c) A way to define small, anonymous functions.
b) A constructor that is used to declare variables.
c) A constructor used to create new objects.
d) A constructor that is not allowed in C++.

39. What does the `typeid` operator do in C++?

Linked - https://www.linkedin.com/in/tanmay-pawar-6680ab208?utm_source=share&utm_campaign=share_via&utm_content=profile&utm_medium=android_app - © PAWAR TANMAY VILAS


20 Technical Aptitude MCQ Preparation

Advance 20 Question Set On C++ 10. What does the `typeid` operator do in C++?
a) It calculates the size of a data type.
Language: b) It returns the type of an object.
Certainly, here are 20 advanced C++ multiple-choice questions c) It performs mathematical operations.
(MCQs) along with their answers at the end: d) It is not a valid operator in C++.

1. What is the primary purpose of the `this` pointer in C++? 11. What is a lambda expression in C++?
a) It refers to the previous object of the same class. a) A way to declare new data types.
b) It is used to access static members of a class. b) A way to create pointers to objects.
c) It refers to the current instance of a class. c) A way to define small, anonymous functions.
d) It is used to access the private members of a class. d) A way to perform file I/O operations.

2. What is operator overloading in C++? 12. In C++, what is a smart pointer?


a) A technique to create new operators. a) A pointer that is not used for memory management.
b) A method to add new functionalities to existing operators. b) A pointer that is declared with the `&` operator.
c) A way to create pointers to objects. c) A pointer that automatically manages the memory it points
d) A way to declare functions inside a class. to.
d) A pointer that is used for bitwise operations.
3. In C++, what is the purpose of the `try`, `catch`, and `throw`
keywords? 13. In C++, what is the purpose of the `const` keyword when
a) To define a loop. applied to a member function?
b) To declare a function. a) It indicates that the member function cannot be called.
c) To handle exceptions and errors. b) It makes the member function a friend function.
d) To perform file I/O operations. c) It indicates that the member function will not modify the
object.
4. What is the role of the `virtual` keyword in C++? d) It makes the member function a virtual function.
a) To define a virtual function.
b) To create a new class. 14. What is the purpose of the `auto` keyword in C++11 and
c) To indicate a constant variable. later?
d) To declare a global function. a) It is used to declare global variables.
b) It is used to define functions.
5. What is a C++ template? c) It is used to create aliases for existing data types.
a) A template for creating comments. d) It is used to infer the data type of a variable at compile
b) A preprocessor directive. time.
c) A way to create a class or function that can work with
different data types. 15. In C++, what is the role of the `const_cast` operator?
d) A way to define new data types. a) It is used to create constant variables.
b) It is used to convert a constant variable to a non-constant
6. In C++, what is a friend function? variable.
a) A function that is not allowed to access private members of c) It is used to create pointers to objects.
a class. d) It is used to perform mathematical operations.
b) A function that is used to create new objects.
c) A function that is a member of a class. 16. What is the purpose of the `new` and `delete` operators in
d) A function that is allowed to access the private members of C++?
a class. a) To create objects on the stack.
b) To declare variables.
7. What is a C++ namespace? c) To allocate and deallocate memory for objects on the heap.
a) A reserved keyword. d) To perform file I/O operations.
b) A way to define functions.
c) A way to avoid naming conflicts by creating a separate 17. In C++, what is a move constructor?
scope for identifiers. a) A constructor used to move an object's location in
d) A way to create pointers to objects. memory.
b) A constructor that is not allowed in C++.
8. In C++, what is an inline function? c) A constructor used to copy an object.
a) A function that is not executed. d) A constructor used to create new objects.
b) A function that is called using the `new` keyword.
c) A function that is expanded in place at the point of call, 18. What is the purpose of the `const` member function in a
instead of a function call. C++ class?
d) A function that is executed only once. a) To declare a friend function.
b) To define a constant variable.
9. What is a copy constructor in C++? c) To indicate that the member function will not modify the
a) A constructor used to make copies of objects. object.
b) A constructor that is used to declare variables. d) To create an abstract base class.
c) A constructor used to create new objects.
d) A constructor that is not allowed in C++. 19. What is multiple inheritance in C++?
a) A technique to create new operators.

Linked - https://www.linkedin.com/in/tanmay-pawar-6680ab208?utm_source=share&utm_campaign=share_via&utm_content=profile&utm_medium=android_app - © PAWAR TANMAY VILAS


21 Technical Aptitude MCQ Preparation

b) A way to add new functionalities to existing operators. c) @value


c) A mechanism that allows a class to inherit from more than d) class
one base class.
d) A way to declare functions inside a class. 3. What is the access modifier used for a class or method that
can be accessed from any other class in any package?
20. In C++, what is an abstract class? a) public
a) A class that cannot have any member functions. b) private
b) A class that cannot have any data members. c) protected
c) A class that cannot be inherited from. d) default
d) A class that is meant to be used as a base class and cannot
be instantiated. 4. Which keyword is used to declare a constant in Java?
a) const
Answers: b) final
c) static
1. c) It refers to the current instance of a class. d) immutable
2. b) A method to add new functionalities to existing operators.
3. c) To handle exceptions and errors. 5. What is the output of the following Java code?
4. a) To define a virtual function. ```java
5. c) A way to create a class or function that can work with int x = 5;
different data types. int y = 2;
6. d) A function that is allowed to access the private members System.out.println(x / y);
of a class. ```
7. c) A way to avoid naming conflicts by creating a separate a) 2.5
scope for identifiers. b) 2
8. c) A function that is expanded in place at the point of call, c) 2.0
instead of a function call. d) Error
9. a) A constructor used to make copies of objects.
10. b) It returns the type of an object. 6. In Java, which data type is used to represent single
11. c) A way to define small, anonymous functions. characters?
12. c) A pointer that automatically manages the memory it a) char
points to. b) int
13. c) It indicates that the member function will not modify the c) String
object. d) float
14. d) It is used to infer the data type of a variable at compile
time. 7. What is the Java keyword used to indicate that a method
15. b) It is used to convert a constant variable to a non-constant does not return any value?
variable. a) void
16. c) To allocate and deallocate memory for objects on the b) null
heap. c) empty
17. a) A constructor used to move an object's location in d) none
memory.
18. c) To indicate that the member function will not modify the 8. Which of the following is true about Java's `ArrayList`?
object. a) It is a synchronized data structure.
19. c) A mechanism that allows a class to inherit from more b) It is a resizable array that can hold objects.
than one base class. c) It can only store primitive data types.
20. d) A class that is meant to be used as a base class and d) It is not a part of the Java Standard Library.
cannot be instantiated.
9. In Java, which keyword is used to define a subclass?
a) parent
b) class
c) extends
d) implements
Basic Question Set On Java Language:
Certainly, here are 40 multiple-choice questions (MCQs) on the 10. What is the Java keyword used for dynamically allocating
Java programming language for a technical aptitude test, along memory to an object?
with their answers at the end: a) malloc
b) allocate
1. What is the Java Virtual Machine (JVM)? c) new
a) A virtual machine used for running Python programs. d) create
b) A hardware component of the computer.
c) A runtime environment for executing Java bytecode. 11. What is the role of the `super` keyword in Java?
d) A software application used for creating Java programs. a) It is used to access superclass members.
b) It is used to create new objects.
2. Which of the following is a valid Java identifier? c) It is used to declare variables.
a) 123value d) It is used to exit a loop.
b) value123

Linked - https://www.linkedin.com/in/tanmay-pawar-6680ab208?utm_source=share&utm_campaign=share_via&utm_content=profile&utm_medium=android_app - © PAWAR TANMAY VILAS


22 Technical Aptitude MCQ Preparation

12. What is the Java keyword used to handle exceptions in a 21. What is method overloading in Java?
program? a) A technique to create new methods.
a) try b) A method to add new functionalities to existing methods.
b) catch c) A way to create pointers to objects.
c) throw d) A way to declare variables.
d) throws
22. In Java, what is the `final` keyword used for when applied to
13. In Java, what is the default value for a variable of type `int`? a variable?
a) 0 a) To make the variable constant and unchangeable.
b) 0.0 b) To make the variable a global variable.
c) "0" c) To make the variable a class variable.
d) null d) To create a new object.

14. Which Java data type is used to store a sequence of 23. What is the purpose of the `instanceof` operator in Java?
characters? a) It is used to check if a variable is of a certain data type.
a) char b) It is used to create new objects.
b) int c) It is used to access class members.
c) String d) It is used to calculate mathematical operations.
d) float
24. In Java, what is the purpose of the `abstract` keyword when
15. What is the result of the following Java code? applied to a class?
a) To create an object of the class.
```java b) To indicate that the class cannot be extended.
String name = "John"; c) To indicate that the class is meant to be subclassed and
System.out.println(name.charAt(1)); cannot be instantiated.
``` d) To declare a constant.

a) John 25. What is the `this` keyword used for in Java?


b) o a) To refer to the previous object of the same class.
c) 1 b) To indicate that a method does not return a value.
d) Error c) To access static members of a class.
d) To refer to the current instance of the class.
16. In Java, what is a constructor?
a) A method that is used to destroy objects. 26. In Java, what is a package?
b) A method used to create objects and initialize their state. a) A collection of classes and interfaces.
c) A method that is used to perform file I/O operations. b) A way to declare global variables.
d) A method that is used to exit a program. c) A reserved keyword.
d) A method to add new functionalities to existing methods.
17. Which of the following is true about Java's `HashMap`?
a) It allows duplicate keys. 27. What is a Java interface?
b) It maintains elements in sorted order. a) A class that cannot be extended.
c) It is not a part of the Java Standard Library. b) A class that cannot be instantiated.
d) It does not allow null values. c) A way to declare variables.
d) A way to declare a class.
18. What is the purpose of the `break` statement in Java?
a) It terminates the program. 28. What is a Java thread?
b) It exits the loop prematurely. a) A way to create new objects.
c) It continues to the next iteration of the loop. b) A lightweight, independent path of execution.
d) It skips the loop completely. c) A method to destroy objects.
d) A reserved keyword.
19. What does the `static` keyword mean when applied to a
method in Java? 29. What is the Java keyword used to create an instance of a
a) The method cannot be accessed from other classes. class?
b) The method is executed only once during program a) new
execution. b) create
c) The method cannot be overridden by subclasses. c) instance
d) The method can only be called from an instance of the d) allocate
class.
30. In Java, what is the purpose of the `finally` block in a try-
20. In Java, what is the purpose of the `return` statement in a catch-finally statement?
method? a) To create a new object.
a) To perform mathematical operations. b) To handle exceptions.
b) To declare variables. c) To perform cleanup operations that are guaranteed to run.
c) To exit the program. d) To declare a constant variable.
d) To return a value from the method.

Linked - https://www.linkedin.com/in/tanmay-pawar-6680ab208?utm_source=share&utm_campaign=share_via&utm_content=profile&utm_medium=android_app - © PAWAR TANMAY VILAS


23 Technical Aptitude MCQ Preparation

31. Which of the following is a valid way to declare an array in


Java? Answers:
a) int[] numbers = new int[];
b) int[] numbers = new int[10]; 1. c) A runtime environment for executing Java bytecode.
c) int[] numbers = new int(10); 2. b) value123
d) int[] numbers = {1, 2, 3, 4, 5}; 3. a) public
4. b) final
32. What is the Java keyword used to indicate that a class 5. b) 2
cannot be subclassed? 6. a) char
a) sealed 7. a) void
b) final 8. b) It is a resizable array that can hold objects.
c) abstract 9. c) extends
d) static 10. c) new
11. a) It is used to access superclass members.
33. What is a Java enum? 12. a) try
a) A reserved keyword. 13. a) 0
b) A way to create new data types. 14. c) String
c) A special type used to represent a fixed set of constants. 15. b) o
d) A way to perform bitwise operations. 16. b) A method used to create objects and initialize their state.
17. a) It allows duplicate keys.
34. What is the purpose of the `throws` keyword in a Java 18. b) It exits the loop prematurely.
method declaration? 19. c) The method cannot be overridden by subclasses.
a) To declare a new variable. 20. d) To return a value from the method.
b) To indicate that the method does not return a value. 21. b) A method to add new functionalities to existing methods.
c) To specify exceptions that may be thrown by the method. 22. a) To make the variable constant and unchangeable.
d) To create a new object. 23. a) It is used to check if a variable is of a certain data type.
24. c) To indicate that the class is meant to be subclassed and
35. In Java, what is a synchronized block? cannot be instantiated.
a) A block of code that is not executed. 25. d) To refer to the current instance of the class.
b) A block of code that is executed only once. 26. a) A collection of classes and interfaces.
c) A block of code that is thread-safe and can be accessed by 27. b) A class that cannot be instantiated.
only one thread at a time. 28. b) A lightweight, independent path of execution.
d) A block of code that contains global variables. 29. a) new
30. c) To perform cleanup operations that are guaranteed to
36. What is the purpose of the `transient` keyword in Java? run.
a) To declare a constant. 31. d) int[] numbers = {1, 2, 3, 4, 5};
b) To indicate that a variable should not be serialized. 32. b) final
c) To create a new object. 33. c) A special type used to represent a fixed set of constants.
d) To define a method. 34. c) To specify exceptions that may be thrown by the method.
35. c) A block of code that is thread-safe and can be accessed by
37. In Java, what is the purpose of the `volatile` keyword? only one thread at a time.
a) To create a new object. 36. b) To indicate that a variable should not be serialized.
b) To indicate that a variable can be accessed by multiple 37. b) To indicate that a variable can be accessed by multiple
threads. threads.
c) To declare a new variable. 38. c) A class for working with arrays, providing various utility
d) To define a constant. methods.
39. b) An exception that is checked by the compiler at compile
38. What is the `java.util.Arrays` class used for in Java? time.
a) A class for defining arrays. 40. d) break
b) A class for performing mathematical operations.
c) A class for working with arrays, providing various utility
methods.
d) A class for creating objects.
Advance 20 Question On Java Language:
Certainly, here are 20 advanced Java multiple-choice questions
39. In Java, what is a checked exception? (MCQs) with their answers at the end:
a) An exception that is never checked by the compiler.
b) An exception that is checked by the compiler at compile 1. What is a lambda expression in Java?
time. a) A type of exception handling.
c) An exception that is thrown by the `throw` keyword. b) A way to create threads.
d) An exception that is not used in Java. c) A mechanism for implementing functional interfaces with
concise syntax.
40. What is the Java keyword used to exit a loop prematurely? d) A method for creating random numbers.
a) exit
b) return 2. What is a Java Stream in the context of Java 8 and later?
c) continue a) A class for reading and writing files.
d) break b) A type of exception.

Linked - https://www.linkedin.com/in/tanmay-pawar-6680ab208?utm_source=share&utm_campaign=share_via&utm_content=profile&utm_medium=android_app - © PAWAR TANMAY VILAS


24 Technical Aptitude MCQ Preparation

c) A sequence of elements that can be processed in a 11. What is the difference between a `HashSet` and a `TreeSet`
functional-style manner. in Java?
d) A mechanism for creating GUI components. a) `HashSet` allows duplicate elements, while `TreeSet` does
not.
3. In Java, what is the purpose of the `super()` constructor call b) `TreeSet` is unsorted, while `HashSet` is sorted.
within a subclass constructor? c) `TreeSet` uses a hash table for storage, while `HashSet`
a) To create a new object. uses a red-black tree.
b) To invoke the constructor of the superclass. d) `HashSet` maintains elements in natural order, while
c) To call a method in the superclass. `TreeSet` does not.
d) To exit the program.
12. In Java, what is the purpose of the `volatile` keyword when
4. What is the difference between an abstract class and an applied to a variable?
interface in Java? a) To declare a constant variable.
a) Abstract classes cannot have abstract methods, while b) To indicate that the variable should not be modified.
interfaces can. c) To specify that the variable can be accessed by multiple
b) Interfaces can have constructors, while abstract classes threads and changes are immediately visible to other threads.
cannot. d) To indicate that the variable is immutable.
c) Abstract classes can have multiple inheritance, while
interfaces cannot. 13. What is the Java `ClassLoader` used for?
d) Abstract classes cannot have fields, while interfaces can. a) To load and link class files at runtime.
b) To create objects.
5. In Java, what is the purpose of the `synchronized` keyword c) To define a new class.
when applied to a method or block of code? d) To handle exceptions.
a) To indicate that the method cannot be overridden.
b) To make the method a class method. 14. What is the purpose of the `StringBuffer` and `StringBuilder`
c) To make the method thread-safe, allowing only one thread classes in Java?
to execute it at a time. a) To define abstract methods.
d) To make the method a static method. b) To create objects.
c) To perform string manipulation efficiently by allowing
6. What is the Java `try-with-resources` statement used for? mutable strings.
a) To create a new object. d) To handle exceptions.
b) To handle exceptions.
c) To declare variables. 15. What is the Java `Reflection API` used for?
d) To create a new thread. a) To create new objects.
b) To inspect and manipulate classes, methods, fields, and
7. In Java, what is the purpose of the `enum` in a switch other program entities at runtime.
statement? c) To perform bitwise operations.
a) To define a new data type. d) To handle exceptions.
b) To indicate a constant variable.
c) To create a new object. 16. What is the role of the `System.arraycopy` method in Java?
d) To represent a set of named constants. a) To create a new object.
b) To exit the program.
8. What is the purpose of the `Object` class in Java? c) To perform array copying efficiently.
a) To create new objects. d) To handle exceptions.
b) To define an abstract base class.
c) To perform file I/O operations. 17. In Java, what is a generic type (e.g., `ArrayList<E>`) used for?
d) To serve as a root class for all Java classes. a) To create new data types.
b) To perform file I/O operations.
9. In Java, what is the difference between composition and c) To define a class.
inheritance? d) To allow the use of a single class or method with different
a) Composition allows a class to inherit from multiple classes, data types.
while inheritance does not.
b) Inheritance is a mechanism to achieve code reusability, 18. What is a Java annotation used for?
while composition is a way to create new classes. a) To create new objects.
c) Composition is used to create new objects, while b) To indicate metadata about a class, method, field, or other
inheritance is used to create relationships between classes. program elements.
d) Composition is a mechanism to reuse existing classes, while c) To define abstract methods.
inheritance is used to create new classes. d) To handle exceptions.

10. What is the purpose of the `java.lang.Math` class in Java? 19. In Java, what is the purpose of the `@Override` annotation?
a) To perform mathematical operations. a) To indicate that a method is final and cannot be
b) To create new objects. overridden.
c) To handle exceptions. b) To indicate that a method should be declared in an
d) To define abstract methods. interface.
c) To indicate that a method is inherited from a superclass.

Linked - https://www.linkedin.com/in/tanmay-pawar-6680ab208?utm_source=share&utm_campaign=share_via&utm_content=profile&utm_medium=android_app - © PAWAR TANMAY VILAS


25 Technical Aptitude MCQ Preparation

d) To ensure that a method is intended to override a method c) 9


in a superclass. d) 12

20. What is the Java `Executor` framework used for? 3. In Python, which of the following is not a valid data type?
a) To create new objects. a) int
b) To manage threads and execute tasks asynchronously. b) char
c) To perform bitwise operations. c) float
d) To define abstract methods. d) str

Answers: 4. What is the primary purpose of indentation in Python code?


a) It is used for code comments.
1. c) A mechanism for implementing functional interfaces with b) It is used to define classes.
concise syntax. c) It defines the block structure and scope of the code.
2. c) A sequence of elements that can be processed in a d) It is used for variable declaration.
functional-style manner.
3. b) To invoke the constructor of the superclass. 5. What is the correct way to comment a single-line code in
4. c) Abstract classes can have multiple inheritance, while Python?
interfaces cannot. a) /* This is a comment */
5. c) To make the method thread-safe, allowing only one thread b) // This is a comment
to execute it at a time. c) # This is a comment
6. b) To handle exceptions. d) -- This is a comment
7. d) To represent a set of named constants.
8. d) To serve as a root class for all Java classes. 6. In Python, what is the function used to get the length of a
9. d) Composition is a mechanism to reuse existing classes, list?
while inheritance is used to create new classes. a) length()
10. a) To perform mathematical operations. b) len()
11. a) `HashSet` allows duplicate elements, while `TreeSet` does c) size()
not. d) count()
12. c) To specify that the variable can be accessed by multiple
threads and changes are immediately visible to other threads. 7. What is the output of the code `print("Hello, " + "World!")` in
13. a) To load and link class files at runtime. Python?
14. c) To perform string manipulation efficiently by allowing a) "Hello, World!"
mutable strings. b) Hello, World!
15. b) To inspect and manipulate classes, methods, fields, and c) Error
other program entities at runtime. d) "Hello, " + "World!"
16. c) To perform array copying efficiently
8. Which of the following is a valid way to define a Python
. function?
17. d) To allow the use of a single class or method with different a) def my_function:
data types. b) my_function():
18. b) To indicate metadata about a class, method, field, or c) def my_function():
other program elements. d) function my_function():
19. d) To ensure that a method is intended to override a
method in a superclass. 9. What does the `range(5)` function in Python generate?
20. b) To manage threads and execute tasks asynchronously. a) [0, 1, 2, 3, 4]
b) [1, 2, 3, 4, 5]
c) [5, 4, 3, 2, 1]
d) [0, 1, 2, 3, 4, 5]

10. How do you open a file named "example.txt" in Python for


Basic 40 Question Set On Python reading?
Language: a) open("example.txt", "r")
Certainly, here are 40 multiple-choice questions (MCQs) on the b) read("example.txt", "r")
Python programming language for a technical aptitude test, c) fopen("example.txt", "read")
along with their answers at the end: d) file_open("example.txt", "read")

1. Which of the following is a valid way to declare a variable in 11. What is the result of `5 / 2` in Python?
Python? a) 2.5
a) variable 123 b) 2
b) 123_variable c) 2.0
c) _variable123 d) 2.5 with floor division
d) variable 123_
12. What is the Python keyword for defining a class?
2. What is the result of `2 ** 3` in Python? a) def
a) 8 b) class
b) 6 c) cls

Linked - https://www.linkedin.com/in/tanmay-pawar-6680ab208?utm_source=share&utm_campaign=share_via&utm_content=profile&utm_medium=android_app - © PAWAR TANMAY VILAS


26 Technical Aptitude MCQ Preparation

d) object 23. What is the Python keyword for creating an empty function
that does nothing?
13. In Python, how do you import a module named "math"? a) empty
a) include math b) void
b) require math c) pass
c) import math d) None
d) from math import
24. How do you define a Python generator function?
14. What is the correct way to create an empty list in Python? a) def my_function:
a) list = [] b) generator my_function():
b) list = {} c) def my_function():
c) list = () yield
d) list = [None] d) function my_function():

15. In Python, how do you check if a key exists in a dictionary? 25. What is the Python `None` object used for?
a) key in dict a) To represent an empty dictionary.
b) dict.hasKey(key) b) To indicate the absence of a value.
c) key.exists(dict) c) To declare a variable.
d) dict[key] d) To exit the program.

16. What is the output of the code `print("Python"[::-1])` in 26. In Python, what is a lambda function?
Python? a) A way to define a global function.
a) "Python" b) A function that is not executed.
b) "nohtyP" c) A way to create new objects.
c) ['P', 'y', 't', 'h', 'o', 'n'] d) An anonymous, small, and inline function.
d) Error
27. What is the purpose of the `global` keyword in Python?
17. How do you define a Python class variable? a) To create a global variable.
a) It is defined inside a function. b) To indicate a constant variable.
b) It is defined within a class but outside any methods. c) To declare a function.
c) It is defined as a global variable. d) To modify a variable outside of the current scope.
d) It is defined within a method.
28. What is the Python `assert` statement used for?
18. What is the result of `7 % 2` in Python? a) To create new objects.
a) 7 b) To perform file I/O operations.
b) 2 c) To define abstract methods.
c) 3.5 d) To check if a given condition is true and raise an exception
d) 1 if it is not.

19. In Python, which data type is used to represent a sequence 29. What is a Python decorator used for?
of characters? a) To declare a constant variable.
a) char b) To indicate metadata about functions or methods.
b) str c) To create a new class.
c) string d) To define a class variable.
d) character
30. What does the `not` operator do in Python?
20. How do you create a set in Python? a) It performs a logical OR operation.
a) set = {} b) It inverts the value of a boolean expression.
b) set = [] c) It checks for inequality.
c) set = () d) It creates a new object.
d) set = {1, 2, 3}
31. What is the Python keyword used to iterate over a sequence
21. What is the output of the code `print(type("Hello"))` in (e.g., list, tuple, string)?
Python? a) iterate
a) <class 'str'> b) loop
b) str c) for
c) class 'str' d) while
d) "str"
32. What is the result of `bool("False")` in Python?
22. What is the purpose of the `return` statement in a Python a) True
function? b) False
a) To declare a variable. c) Error
b) To define a function. d) None
c) To exit the program.
d) To return a value from the function. 33. In Python, how do you open a file named "example.txt" in
write mode and create it if it doesn't exist?

Linked - https://www.linkedin.com/in/tanmay-pawar-6680ab208?utm_source=share&utm_campaign=share_via&utm_content=profile&utm_medium=android_app - © PAWAR TANMAY VILAS


27 Technical Aptitude MCQ Preparation

a) open("example.txt", "w") 14. a) list = []


b) open("example.txt", "rw") 15. a) key in dict
c) fopen("example.txt", "write") 16. b) "nohtyP"
d) file_open("example.txt", "create") 17. b) It is defined within a class but outside any methods.
18. d) 1
34. What is the purpose of the `with` statement in Python? 19. b) str
a) To declare a function. 20. d) set = {1, 2, 3}
b) To create a new object. 21. a) <class 'str'>
c) To open and close resources (e.g., files) automatically. 22. d) To return a value from the function.
d) To define a class. 23. c) pass
24. c) def my_function():
35. What is the result of `None == None` in Python? yield
a) True 25. b) To indicate the absence of a value.
b) False 26. d) An anonymous, small, and inline function.
c) None 27. d) To modify a variable outside of the current scope.
d) Error 28. d) To check if a given condition is true and raise an
exception if it is not.
36. In Python, what is the purpose of the `break` statement in a 29. b) To indicate metadata about functions or methods.
loop? 30. b) It inverts the value of a boolean expression.
a) To create a new object. 31. c) for
b) To continue to the next iteration of the loop. 32. a) True
c) To exit the loop prematurely. 33. a) open("example.txt", "w")
d) To skip the loop completely. 34. c) To open and close resources (e.g., files) automatically.
35. a) True
37. What is the purpose of the `continue` statement in a Python 36. c) To exit the loop prematurely.
loop? 37. d) To continue to the next iteration of the loop.
a) To create a new object. 38. b) o
b) To exit the loop prematurely. 39. a) True
c) To break out of the loop. 40. c) from my_module import my_package
d) To continue to the next iteration of the loop.

38. What is the output of the code `print("Python"[-1])` in Advance 20 Question Set On Python
Python?
a) "Python" Language:
b) o Certainly, here are 20 advanced Python multiple-choice
c) 1 questions (MCQs) with their answers at the end:
d) Error
1. What is the purpose of the `yield` keyword in Python?
39. What is the result of the code `2 < 3 and 4 < 5` in Python? a) To indicate a variable as constant.
a) True b) To exit a loop.
b) False c) To define a generator function.
c) Error d) To create a new object.
d) None
2. In Python, what is a generator expression?
40. How do you import a module named "my_module" from a a) A way to define a new data type.
package named "my_package" in Python? b) A way to declare a constant variable.
a) import my_module.my_package c) A concise way to create generator objects.
b) import my_module d) A method to add new functionalities to existing methods.
c) from my_module import my_package
d) import my_package.my_module 3. What is the result of `3 // 2` in Python?
a) 1.5
Answers: b) 1
c) 1.0
1. c) _variable123 d) 2
2. a) 8
3. b) char 4. What is the Python `asyncio` library used for?
4. c) It defines the block structure and scope of the code. a) To perform mathematical operations.
5. c) # This is a comment b) To define abstract methods.
6. b) len() c) To write asynchronous, non-blocking code using the `async`
7. b) Hello, World! and `await` keywords.
8. c) def my_function(): d) To handle exceptions.
9. a) [0, 1, 2, 3, 4]
10. a) open("example.txt", "r") 5. What is the purpose of the `zip()` function in Python?
11. c) 2.0 a) To compress files.
12. b) class b) To unzip files.
13. c) import math c) To combine two or more iterables element-wise into tuples.

Linked - https://www.linkedin.com/in/tanmay-pawar-6680ab208?utm_source=share&utm_campaign=share_via&utm_content=profile&utm_medium=android_app - © PAWAR TANMAY VILAS


28 Technical Aptitude MCQ Preparation

d) To create a generator object. a) To indicate that a variable is constant.


b) To define abstract methods.
6. What does the `staticmethod` decorator do in Python? c) To define a generator function.
a) It indicates that a method is a class method. d) To turn a method into a read-only property.
b) It makes a method a static method, which can be called on
the class itself. 15. What is the purpose of the `functools` module in Python?
c) It defines an abstract method. a) To create new objects.
d) It marks a method as a coroutine. b) To define a class variable.
c) To perform file I/O operations.
7. In Python, what is the difference between a shallow copy and d) To provide higher-order functions for functional
a deep copy of an object? programming.
a) A shallow copy duplicates the object, while a deep copy
creates a reference to the original object. 16. What is the result of `sorted("python")` in Python?
b) A shallow copy creates a new object with a new reference, a) "python"
while a deep copy creates a new object with new references to b) "nohtyp"
all nested objects. c) ['p', 'y', 't', 'h', 'o', 'n']
c) A shallow copy creates a reference to the original object, d) Error
while a deep copy duplicates the object and all its nested
objects. 17. What is the Python `itertools` module used for?
d) There is no difference between a shallow copy and a deep a) To create new objects.
copy. b) To define a global variable.
c) To provide a set of fast, memory-efficient tools for working
8. What is the `__init__` method used for in a Python class? with iterators.
a) To define a global variable. d) To declare constants.
b) To define a class variable.
c) To initialize the object's attributes or properties. 18. In Python, what is a metaclass conflict resolution called?
d) To create an instance of the class. a) Metaclass ambiguity
b) Metaclass resolution
9. What is the purpose of the `pickle` module in Python? c) Metaclass battle
a) To create a list of items. d) Metaclass mro (method resolution order)
b) To perform file I/O operations.
c) To serialize and deserialize Python objects. 19. What is the purpose of the `sys` module in Python?
d) To define abstract methods. a) To perform mathematical operations.
b) To define abstract methods.
10. What is a metaclass in Python? c
a) A way to create new data types.
b) A class that defines the behavior of other classes (class of a ) To provide access to Python interpreter variables and
class). functions.
c) A way to create objects. d) To define class variables.
d) A class that cannot be instantiated.
20. What is the result of `1.0 + 2` in Python?
11. In Python, what is a decorator used for? a) 3
a) To create a new class. b) 3.0
b) To indicate that a method is a class method. c) "3"
c) To modify the behavior of a function or method. d) Error
d) To define a constant variable.
Answers:
12. What is the purpose of the `*args` and `**kwargs` in Python
function parameters? 1. c) To define a generator function.
a) They are reserved keywords and cannot be used in 2. c) A concise way to create generator objects.
function parameters. 3. b) 1
b) They are used to define abstract methods. 4. c) To write asynchronous, non-blocking code using the `async`
c) They allow a function to accept a variable number of and `await` keywords.
positional and keyword arguments. 5. c) To combine two or more iterables element-wise into
d) They specify the required number of arguments for a tuples.
function. 6. b) It makes a method a static method, which can be called on
the class itself.
13. What is a Python context manager used for? 7. b) A shallow copy creates a new object with a new reference,
a) To create a new object. while a deep copy creates a new object with new references to
b) To define a generator function. all nested objects.
c) To manage resources and define setup and teardown 8. c) To initialize the object's attributes or properties.
actions using the `with` statement. 9. c) To serialize and deserialize Python objects.
d) To perform bitwise operations. 10. b) A class that defines the behavior of other classes (class of
a class).
14. What is the purpose of the `@property` decorator in 11. c) To modify the behavior of a function or method.
Python?

Linked - https://www.linkedin.com/in/tanmay-pawar-6680ab208?utm_source=share&utm_campaign=share_via&utm_content=profile&utm_medium=android_app - © PAWAR TANMAY VILAS


29 Technical Aptitude MCQ Preparation

12. c) They allow a function to accept a variable number of a) CREATE


positional and keyword arguments. b) USE
13. c) To manage resources and define setup and teardown c) INITDB
actions using the `with` statement. d) DATABASE
14. d) To turn a method into a read-only property.
15. d) To provide higher-order functions for functional 8. What does SQL stand for?
programming. a) Structured Query Language
16. b) "nohtyp" b) Simple Query Language
17. c) To provide a set of fast, memory-efficient tools for c) System Query Language
working with iterators. d) Structured Query Logic
18. d) Metaclass mro (method resolution order)
19. c) To provide access to Python interpreter variables and 9. In MySQL, what is the purpose of the `SELECT` statement?
functions. a) To insert data into a table
20. b) 3.0 b) To update data in a table
c) To retrieve data from a table
d) To delete data from a table

10. What does the `WHERE` clause do in a MySQL `SELECT`


Basic 40 Question Set On DBMS: statement?
a) It specifies the columns to be retrieved.
Certainly, here are 40 multiple-choice questions (MCQs) on
b) It specifies the order of the results.
Database Management Systems (DBMS) and MySQL for a
c) It filters rows based on a condition.
technical aptitude test, along with their answers at the end:
d) It joins two tables together.
**DBMS Concepts:**
**MySQL Queries:**
1. What does DBMS stand for?
11. Which MySQL clause is used to sort the result of a query in
a) Database Management System
ascending order?
b) Data Backup and Management System
a) ORDER BY ASC
c) Database Modeling System
b) ORDER BY DESC
d) Data Business Management System
c) SORT BY
d) ASCENDING
2. Which of the following is not a key property of a database
system?
12. What is the purpose of the `GROUP BY` clause in MySQL?
a) Data Integrity
a) To filter rows based on a condition.
b) Data Security
b) To join multiple tables.
c) Data Redundancy
c) To aggregate data and group rows with similar values.
d) Data Consistency
d) To order the result set.
3. What is the primary role of a DBMS?
13. What is an SQL JOIN?
a) Managing software applications
a) A query to extract data from a single table.
b) Managing database structures
b) A way to create new tables.
c) Managing data
c) A method for combining rows from two or more tables
d) Managing hardware infrastructure
based on a related column.
d) A function that returns the average of a numeric column.
4. What is a DBMS schema?
a) A user's password
14. Which SQL function is used to count the number of rows in
b) A collection of related database tables
a table?
c) A query language
a) SUM
d) A set of database constraints
b) AVG
c) COUNT
5. What is the purpose of a primary key in a database table?
d) MAX
a) To ensure data redundancy
b) To uniquely identify each record in the table
15. What is the purpose of the `DISTINCT` keyword in a MySQL
c) To improve data consistency
`SELECT` statement?
d) To allow NULL values
a) To retrieve only the first row of the result set.
b) To exclude duplicate values from the result set.
**MySQL Basics:**
c) To order the result set in ascending order.
d) To filter rows based on a condition.
6. MySQL is an example of which type of database system?
a) NoSQL
**Database Design:**
b) Relational Database Management System (RDBMS)
c) Document-oriented database
16. What is a foreign key in a database table?
d) Key-Value store
a) A key used to unlock the database.
b) A key that uniquely identifies each row in the table.
7. Which command is used to create a new database in MySQL?

Linked - https://www.linkedin.com/in/tanmay-pawar-6680ab208?utm_source=share&utm_campaign=share_via&utm_content=profile&utm_medium=android_app - © PAWAR TANMAY VILAS


30 Technical Aptitude MCQ Preparation

c) A key that links one table's column to another table's d) A table that combines data from multiple sources.
column.
d) A key that is used for encryption. 25. What is the purpose of the `UNION` operator in a MySQL
query?
17. Which of the following is not a valid database constraint in a) To concatenate two strings.
MySQL? b) To combine the result sets of two or more SELECT
a) NOT NULL statements.
b) UNIQUE c) To filter rows based on a condition.
c) ONLY d) To find the intersection of two sets.
d) CHECK
**Database Transactions:**
18. In a relational database, what is a one-to-many
relationship? 26. In a database, what is a transaction?
a) Each row in the first table is related to multiple rows in the a) A SQL query.
second table. b) A single database operation that is atomic and consistent.
b) Each row in the first table is related to one row in the c) A table that contains transaction history.
second table. d) A backup of the database.
c) Each row in the first table is unrelated to rows in the
second table. 27. What is the purpose of the `COMMIT` statement in a
d) Each row in the second table is related to multiple rows in database transaction?
the first table. a) To undo the changes made in the transaction.
b) To save the changes made in the transaction to the
19. What is normalization in the context of database design? database.
a) A process of making a database faster. c) To start a new transaction.
b) A process of organizing data in a database to eliminate d) To roll back the transaction.
data redundancy.
c) A process of securing the database from unauthorized 28. What does ACID stand for in the context of database
access. transactions?
d) A process of encrypting data in a database. a) Atomicity, Consistency, Isolation, Durability
b) Association, Concurrency, Integrity, Deletion
20. What is an index in a database table? c) Analysis, Collaboration, Insertion, Documentation
a) A list of unique values in a column. d) Accessibility, Complexity, Integration, Documentation
b) A type of constraint used for data validation.
c) A data structure that improves the speed of data retrieval 29. In a database, what is the purpose of the `ROLLBACK`
operations on a table. statement?
d) A foreign key relationship between two tables. a) To save the changes made in the transaction.
b) To commit the transaction.
**MySQL Advanced:** c) To undo the changes made in the transaction.
d) To start a new transaction.
21. What is the purpose of the `INNER JOIN` clause in a MySQL
query? 30. What is the purpose of the `SAVEPOINT` statement in a
a) database transaction?
a) To commit the transaction.
To retrieve only the first row of each table. b) To create a new table.
b) To include all rows from the left table and the matched c) To define a new variable.
rows from the right table. d) To set a point in the transaction to which you can later roll
c) To exclude rows that do not have matching values in both back.
tables.
d) To filter rows based on a condition. **Indexes and Optimization:**

22. Which command is used to update data in a MySQL table? 31. What is an index in the context of a database table?
a) ADD a) A list of unique values in a column.
b) INSERT b) A foreign key relationship between two tables.
c) UPDATE c) A data structure that improves the speed of data retrieval
d) MODIFY operations on a table.
d) A table that stores only index information.
23. In MySQL, which data type is used to store binary data?
a) VARCHAR 32. What is the purpose of the `EXPLAIN` statement in MySQL?
b) CHAR a) To execute a query.
c) BLOB b) To display the query result.
d) CLOB c) To obtain information about how MySQL executes a query.
d) To create a new table.
24. What is a MySQL view?
a) A virtual table that is the result of a SELECT query. 33. What is a database query optimization technique used to
b) A physical table that stores data. reduce the number of rows to be processed in a query?
c) A constraint used for data validation. a) Indexing

Linked - https://www.linkedin.com/in/tanmay-pawar-6680ab208?utm_source=share&utm_campaign=share_via&utm_content=profile&utm_medium=android_app - © PAWAR TANMAY VILAS


31 Technical Aptitude MCQ Preparation

b) Normalization 14. c) COUNT


c) Denormalization 15. b) To exclude duplicate values from the result set.
d) Subquery **Database Design:**
16. c) A key that links one table's column to another table's
34. What is a self-join in a database query? column.
a) A join between two different tables. 17. c) ONLY
b) A join between a table and itself. 18. a) Each row in the first table is related to multiple rows in
c) A join between two databases. the second table.
d) A join between a parent and child table. 19. b) A process of organizing data in a database to eliminate
data redundancy.
35. Which command is used to delete all the records from a 20. c) A data structure that improves the speed of data retrieval
table without deleting the table itself in MySQL? operations on a table.
a) DELETE **MySQL Advanced:**
b) DROP 21. c) To exclude rows that do not have matching values in both
c) TRUNCATE tables.
d) REMOVE 22. c) UPDATE
23. c) BLOB
**MySQL Security:** 24. a) A virtual table that is the result of a SELECT query.
25. b) To combine the result sets of two or more SELECT
36. In MySQL, what is the purpose of the `GRANT` statement? statements.
a) To create a new user. **Database Transactions:**
b) To execute a query. 26. b) A single database operation that is atomic and consistent.
c) To grant privileges to users and roles. 27. b) To save the changes made in the transaction to the
d) To revoke privileges from users and roles. database.
28. a) Atomicity, Consistency, Isolation, Durability
37. What is SQL injection in the context of database security? 29. c) To undo the changes made in the transaction.
a) A method to extract passwords from the database. 30. d) To set a point in the transaction to which you can later
b) A type of database query optimization. roll back.
c) A security vulnerability that occurs when untrusted data is **Indexes and Optimization:**
inserted into SQL queries. 31. c) A data structure that improves the speed of data retrieval
d) A method to bypass authentication. operations on a table.
32. c) To obtain information about how MySQL executes a
38. Which privilege allows a user to create new databases in query.
MySQL? 33. a) Indexing
a) SELECT 34. b) A join between a table and itself.
b) INSERT 35. c) TRUNCATE
c) CREATE **MySQL Security:**
d) UPDATE 36. c) To grant privileges to users and roles.
37. c) A security vulnerability that occurs when untrusted data
39. What is the purpose of the `mysql_secure_installation` is inserted into SQL queries.
script in MySQL? 38. c) CREATE
a) To create a new user. 39. c) To secure the MySQL installation by setting passwords
b) To remove MySQL from the system. and removing insecure options.
c) To secure the MySQL installation by setting passwords and
removing insecure options.
d) To create a backup of the database. Advance 20 Questions On DBMS:
Certainly, here are 20 advanced DBMS and MySQL multiple-
Answers: choice questions (MCQs) with their answers at the end:

**DBMS Concepts:** 1. What is the purpose of the SQL CASE statement in a query?
1. a) Database Management System a) To specify the order of results
2. c) Data Redundancy b) To filter rows based on a condition
3. c) Managing data c) To define the primary key
4. b) A collection of related database tables d) To perform conditional operations in the query
5. b) To uniquely identify each record in the table
**MySQL Basics:** 2. In a database, what is a composite key?
6. b) Relational Database Management System (RDBMS) a) A key composed of multiple columns to uniquely identify a
7. a) CREATE record
8. a) Structured Query Language b) A key that combines two separate tables
9. c) To retrieve data from a table c) A key that is used for encryption
10. c) It filters rows based on a condition. d) A key for composite data types
**MySQL Queries:**
11. a) ORDER BY ASC 3. What does the term "ACID properties" refer to in a DBMS?
12. c) To aggregate data and group rows with similar values. a) Atomicity, Consistency, Isolation, Durability
13. c) A method for combining rows from two or more tables b) Access, Compression, Inheritance, Deletion
based on a related column.

Linked - https://www.linkedin.com/in/tanmay-pawar-6680ab208?utm_source=share&utm_campaign=share_via&utm_content=profile&utm_medium=android_app - © PAWAR TANMAY VILAS


32 Technical Aptitude MCQ Preparation

c) Aggregate, Connect, Invert, Distribute b) To enforce data integrity by limiting the values that can be
d) Authorization, Configuration, Implementation, Data inserted into a column
c) To create a new table
4. What is the purpose of the SQL UNION ALL operator? d) To retrieve data from a table
a) To combine rows from two or more tables, including
duplicates 14. In a DBMS, what is the purpose of the SQL GRANT
b) To perform mathematical operations on columns statement?
c) To perform a join operation a) To revoke permissions from a user
d) To create a new table b) To insert new records into a table
c) To assign specific privileges to a user or role
5. In a relational database, what is the role of the SQL TRIGGER? d) To create a new table
a) To initiate a transaction
b) To create a new database 15. What is a bitmap index in a database?
c) To run a stored procedure automatically in response to a a) An index created using the B-tree data structure
specific event b) An index used to store images and binary data
d) To retrieve data from a table c) An index that uses a bitmap to represent the presence or
absence of values
6. What is referential integrity in the context of a DBMS? d) An index that combines multiple columns into a single
a) A constraint that ensures consistency between linked tables index
through foreign keys
b) A way to optimize database queries 16. What is the SQL command used to create a unique
c) A method for compressing data constraint on a table column?
d) A mechanism for data encryption a) CREATE CONSTRAINT
b) ADD UNIQUE
7. What is the purpose of the SQL MERGE statement (also c) SET UNIQUE
known as UPSERT)? d) ALTER TABLE
a) To merge two database tables into a single table
b) To perform mathematical operations on columns 17. What is the purpose of the SQL ROLLBACK statement?
c) To update rows if they exist or insert them if they do not a) To permanently save changes made during a transaction
d) To create a new table b) To commit all pending changes to the database
c) To undo all changes made during a transaction
8. What is a self-join in SQL? d) To create a new database
a) A join operation between two separate databases
b) A join operation between tables in the same database 18. What is a recursive CTE (Common Table Expression) in SQL?
c) A join operation between a table and itself a) A type of table that cannot be queried
d) A join operation that creates a new database b) A table that can be queried only once
c) A CTE that refers to itself, allowing for recursive queries
9. In the context of a DBMS, what is a schema? d) A CTE that combines data from multiple tables
a) A collection of tables
b) A database administrator's username and password 19. What is the purpose of the SQL LIMIT clause in a SELECT
c) A database file statement?
d) A logical container for organizing and managing database a) To limit the number of rows returned by a query
objects b) To specify the number of columns to retrieve
c) To order the results in ascending order
10. What is a materialized view in a DBMS? d) To filter rows based on a specific condition
a) A virtual table that does not store data
b) A table that stores cached results of a query 20. What is the SQL command used to rename a table in a
c) A view that only contains metadata database?
d) A table that contains raw data a) RENAME TABLE
b) ALTER TABLE RENAME
11. What is the primary function of a query optimizer in a c) MODIFY TABLE
DBMS? d) UPDATE TABLE
a) To validate SQL statements
b) To organize tables and columns Answers:
c) To generate an execution plan for SQL queries
d) To enforce security permissions 1. d) To perform conditional operations in the query
2. a) A key composed of multiple columns to uniquely identify a
12. What is the SQL command used to remove an index from a record
table? 3. a) Atomicity, Consistency, Isolation, Durability
a) REMOVE INDEX 4. a) To combine rows from two or more tables, including
b) DELETE INDEX duplicates
c) DROP INDEX 5. c) To run a stored procedure automatically in response to a
d) ERASE INDEX specific event
6. a) A constraint that ensures consistency between linked
13. What is the purpose of the SQL CHECK constraint? tables through foreign keys
a) To validate the database schema 7. c) To update rows if they exist or insert them if they do not

Linked - https://www.linkedin.com/in/tanmay-pawar-6680ab208?utm_source=share&utm_campaign=share_via&utm_content=profile&utm_medium=android_app - © PAWAR TANMAY VILAS


33 Technical Aptitude MCQ Preparation

8. c) A join operation between a table and itself b) Carbon Copy


9. d) A logical container for organizing and managing database c) Copy Control
objects d) Computer Code
10. b) A table that stores cached results of a query
11. c) To generate an execution plan for SQL queries 7. In the context of web browsers, what does "URL" stand for?
12. c) DROP INDEX a) Universal Resource Locator
13. b) To enforce data integrity by limiting the values that can b) Uniform Resource Locator
be inserted into a column c) Unique Reference Link
14. c) To assign specific privileges to a user or role d) Universal Reference Locator
15. c) An index that uses a bitmap to represent the presence or
absence of values 8. Which of the following is not a popular web browser?
16. b) ADD UNIQUE a) Google Chrome
17. c) To undo all changes made during a transaction b) Microsoft Word
18. c) A CTE that refers to itself, allowing for recursive queries c) Mozilla Firefox
19. a) To limit the number of rows returned by a query d) Apple Safari
20. b) ALTER TABLE RENAME
9. Which software application is commonly used for creating,
editing, and publishing websites?
a) Adobe Acrobat
b) Adobe Dreamweaver
Basic 40 Questions On Common c) Adobe Photoshop
d) Adobe Illustrator
Application and MS Office:
Certainly, here's a set of 40 multiple-choice questions (MCQs) 10. What is the primary function of a graphics editing software
on Common Applications and MS Office for technical aptitude, like Adobe Photoshop?
along with their answers at the end: a) Creating and editing videos
b) Editing and retouching images
**Common Applications and MS Office:** c) Writing and formatting text documents
d) Managing email communication
1. Which of the following is a commonly used word processing
software? 11. Which software application is used for project management
a) Microsoft Word and task tracking?
b) Adobe Photoshop a) Microsoft Excel
c) Microsoft Excel b) Microsoft PowerPoint
d) Google Chrome c) Microsoft Project
d) Microsoft Access
2. What is the function of a spreadsheet application like
Microsoft Excel? 12. What does "HTML" stand for in the context of web
a) Creating and editing images development?
b) Managing email communication a) Hyper Text Markup Language
c) Creating and analyzing numerical data b) High Tech Modern Language
d) Writing and formatting text documents c) Hyper Transfer Markup Logic
d) Hard To Master Language
3. Which software application is used for creating and editing
presentations with slides? 13. Which software application is commonly used for video
a) Adobe Illustrator editing and production?
b) Microsoft PowerPoint a) Adobe Premiere Pro
c) Adobe InDesign b) Adobe Illustrator
d) Microsoft Access c) Adobe InDesign
d) Adobe Dreamweaver
4. What does PDF stand for in the context of document
formats? 14. What is the purpose of a database management system
a) Portable Document Format (DBMS) like Microsoft Access?
b) Pretty Document File a) Creating and editing images
c) Personal Document Folder b) Managing email communication
d) Primary Data Format c) Storing and retrieving structured data
d) Writing and formatting text documents
5. Which software application is commonly used for sending
and receiving emails? 15. In Microsoft Word, which feature is used to correct spelling
a) Microsoft Excel and grammatical errors as you type?
b) Microsoft PowerPoint a) AutoCorrect
c) Microsoft Outlook b) AutoFormat
d) Microsoft Word c) AutoSummarize
d) AutoSave
6. What does "CC" stand for in the context of email?
a) Closed Caption

Linked - https://www.linkedin.com/in/tanmay-pawar-6680ab208?utm_source=share&utm_campaign=share_via&utm_content=profile&utm_medium=android_app - © PAWAR TANMAY VILAS


34 Technical Aptitude MCQ Preparation

16. Which MS Office application is suitable for creating and Dreamweaver


maintaining a database? c) Adobe Photoshop
a) Microsoft Word d) Adobe Illustrator
b) Microsoft PowerPoint
c) Microsoft Outlook 26. What is the function of a project management software like
d) Microsoft Access Microsoft Project?
a) Creating and editing images
17. In Microsoft Excel, what is the function of a pivot table? b) Managing email communication
a) Creating charts and graphs c) Planning and tracking project tasks
b) Sorting data alphabetically d) Writing and formatting text documents
c) Analyzing and summarizing data
d) Creating hyperlinks 27. In Microsoft PowerPoint, what is the "Slide Sorter" view
used for?
18. Which function is used to create formulas in Microsoft a) Editing slide content
Excel? b) Organizing slides and changing their order
a) Function Wizard c) Applying slide transitions
b) Formula Generator d) Adding animations
c) Equation Builder
d) Formula Bar 28. Which MS Office application is used for creating and editing
publications, such as newsletters and brochures?
19. In Microsoft PowerPoint, what is a slide master? a) Microsoft Word
a) A slide with animated effects b) Microsoft Excel
b) A slide used for printing handouts c) Microsoft PowerPoint
c) A slide that serves as a template for other slides d) Microsoft Publisher
d) A slide with speaker notes
29. What is the purpose of a formula bar in Microsoft Excel?
20. What does "PDF" stand for in the context of document a) Displaying the sum of all data in the spreadsheet
formats? b) Editing and entering formulas
a) Portable Document Format c) Changing cell background colors
b) Pretty Document File d) Adding comments to cells
c) Personal Document Folder
d) Primary Data Format 30. In Microsoft Outlook, what is the purpose of the "Inbox"
folder?
21. Which MS Office application is suitable for creating and a) Storing sent emails
editing vector graphics? b) Organizing and managing contacts
a) Microsoft Excel c) Receiving and managing incoming emails
b) Microsoft PowerPoint d) Drafting new emails
c) Microsoft Publisher
d) Microsoft Visio 31. Which software application is commonly used for creating
and editing music and audio files?
22. In Microsoft Word, what is the purpose of the "Styles" a) Adobe Premiere Pro
feature? b) Adobe Audition
a) Changing the font size c) Adobe InDesign
b) Applying consistent formatting to text d) Adobe Illustrator
c) Adding hyperlinks to text
d) Creating tables 32. In Microsoft Word, what is the "Find and Replace" feature
used for?
23. Which MS Office application is used for scheduling a) Changing page orientation
appointments, meetings, and tasks? b) Searching for specific text and replacing it with another
a) Microsoft Word c) Inserting images
b) Microsoft PowerPoint d) Applying formatting to text
c) Microsoft Outlook
d) Microsoft Excel 33. Which MS Office application is suitable for creating and
editing business cards and labels?
24. In Microsoft Excel, which function is used to find the highest a) Microsoft Word
value in a range? b) Microsoft Excel
a) MAX c) Microsoft PowerPoint
b) MIN d) Microsoft Publisher
c) AVERAGE
d) SUM 34. What is the function of a document management system
(DMS)?
25. Which software application is commonly used for creating a) Creating and editing images
and editing vector graphics? b) Managing email communication
a) Adobe Acrobat c) Organizing, storing, and retrieving documents
b) Adobe d) Writing and formatting text documents

Linked - https://www.linkedin.com/in/tanmay-pawar-6680ab208?utm_source=share&utm_campaign=share_via&utm_content=profile&utm_medium=android_app - © PAWAR TANMAY VILAS


35 Technical Aptitude MCQ Preparation

35. In Microsoft Excel, what is the function of the "AutoSum" 24. a) MAX
button? 25. d) Adobe Illustrator
a) Creating charts and graphs 26. c) Planning and tracking project tasks
b) Sorting data alphabetically 27. b) Organizing slides and changing their order
c) Automatically summing selected data 28. d) Microsoft Publisher
d) Inserting hyperlinks 29. b) Editing and entering formulas
30. c) Receiving and managing incoming emails
36. Which software application is commonly used for video 31. b) Adobe Audition
conferencing and online meetings? 32. b) Searching for specific text and replacing it with another
a) Adobe Premiere Pro 33. d) Microsoft Publisher
b) Adobe Illustrator 34. c) Organizing, storing, and retrieving documents
c) Zoom 35. c) Automatically summing selected data
d) Adobe Dreamweaver 36. c) Zoom
37. a) Previewing the printed document before printing
37. What is the purpose of the "Print Preview" feature in 38. b) Storing sent emails
Microsoft Word? 39. c) Comma-Separated Values
a) Previewing the printed document before printing 40. c) Creating visual representations of data
b) Changing the page layout
c) Converting the document to a PDF format
d) Sending the document by email Advance 30 Question Set On Common
38. In Microsoft Outlook, what is the "Sent Items" folder used Application and MS Office:
for? Certainly, here are 30 more advanced multiple-choice
a) Receiving and managing incoming emails questions on Common Applications and MS Office:
b) Storing sent emails
c) Organizing and managing contacts **Advanced Common Applications and MS Office:**
d) Drafting new emails
1. In Microsoft Excel, what is the purpose of the VLOOKUP
39. What does "CSV" stand for in the context of file formats? function?
a) Computer Software Version a) To create pivot tables
b) Compressed and Secured Video b) To perform vertical data lookup and retrieval
c) Comma-Separated Values c) To calculate standard deviation
d) Centralized Storage Volume d) To insert hyperlinks

40. In Microsoft Excel, what is the purpose of the "Chart" 2. Which software application is commonly used for 3D
feature? modeling and design?
a) Creating tables and lists a) Adobe Illustrator
b) Sorting data b) Adobe InDesign
c) Creating visual representations of data c) Autodesk AutoCAD
d) Formatting text documents d) Adobe Premiere Pro

Answers: 3. In Microsoft Word, what is the "Track Changes" feature used


for?
1. a) Microsoft Word a) Creating footnotes
2. c) Creating and analyzing numerical data b) Collaborative editing and reviewing of documents
3. b) Microsoft PowerPoint c) Changing document margins
4. a) Portable Document Format d) Applying text formatting
5. c) Microsoft Outlook
6. b) Carbon Copy 4. Which MS Office application is used for creating and editing
7. b) Uniform Resource Locator mathematical equations and formulas?
8. d) Apple Safari a) Microsoft Word
9. b) Adobe Dreamweaver b) Microsoft PowerPoint
10. b) Editing and retouching images c) Microsoft Access
11. c) Microsoft Project d) Microsoft Equation Editor
12. a) Hyper Text Markup Language
13. a) Adobe Premiere Pro 5. What is the primary function of a note-taking application like
14. c) Storing and retrieving structured data Microsoft OneNote?
15. a) AutoCorrect a) Video editing
16. d) Microsoft Access b) Creating and editing spreadsheets
17. c) Analyzing and summarizing data c) Organizing and storing notes, ideas, and information
18. d) Formula Bar d) Sending and receiving emails
19. c) A slide that serves as a template for other slides
20. a) Portable Document Format 6. In Microsoft Excel, what is the purpose of the CONCATENATE
21. d) Microsoft Visio function?
22. b) Applying consistent formatting to text a) Sorting data
23. c) Microsoft Outlook b) Merging text from multiple cells into one cell

Linked - https://www.linkedin.com/in/tanmay-pawar-6680ab208?utm_source=share&utm_campaign=share_via&utm_content=profile&utm_medium=android_app - © PAWAR TANMAY VILAS


36 Technical Aptitude MCQ Preparation

c) Creating pivot tables d) Applying text formatting


d) Calculating percentages
16. Which MS Office application is suitable for creating and
7. Which software application is commonly used for desktop editing diagrams and flowcharts?
publishing and layout design? a) Microsoft Word
a) Adobe Photoshop b) Microsoft PowerPoint
b) Adobe Dreamweaver c) Microsoft Excel
c) Adobe InDesign d) Microsoft Visio
d) Adobe Illustrator
17. In Microsoft Excel, what is the "What-If Analysis" feature
8. In Microsoft Word, what is the "Mail Merge" feature used used for?
for? a) Sorting data
a) Sending and receiving emails b) Analyzing data trends and scenarios
b) Merging contact information into form letters and c) Creating pivot tables
documents d) Calculating averages
c) Creating spreadsheets
d) Applying text formatting 18. Which software application is commonly used for screen
recording and video capture?
9. Which MS Office application is suitable for creating and a) Adobe Premiere Pro
editing technical drawings and diagrams? b) Adobe Illustrator
a) Microsoft Excel c) Camtasia
b) Microsoft PowerPoint d) Adobe Dreamweaver
c) Microsoft Visio
d) Microsoft Publisher 19. In Microsoft Word, what is the purpose of the "SmartArt"
feature?
10. In Microsoft Outlook, what is the purpose of the "Calendar" a) Creating footnotes
feature? b) Adding hyperlinks to text
a) Storing sent emails c) Inserting clip art images
b) Organizing and managing contacts d) Creating and formatting graphical representations
c) Scheduling appointments, meetings, and tasks
d) Drafting new emails 20. What does "CSV" stand for in the context of file formats?
a) Centralized Storage Volume
11. Which software application is commonly used for audio b) Compressed and Secured Video
editing and production, including multitrack recording? c) Comma-Separated Values
a) Adobe Photoshop d) Computer Software Version
b) Adobe Audition
c) Adobe InDesign 21. In Microsoft Excel, what is the purpose of the "Solver" add-
d) Adobe Premiere Pro in?
a) Creating pivot tables
12. In Microsoft Excel, what is the function of the "PMT" b) Sorting data
function? c) Solving complex optimization and equation problems
a) Creating charts and graphs d) Creating charts and graphs
b) Sorting data
c) Calculating monthly loan payments 22. Which software application is commonly used for
d) Inserting hyperlinks professional video editing and post-production?
a) Adobe Photoshop
13. Which MS Office application is suitable for creating and b) Adobe Audition
editing Gantt charts and project timelines? c) Adobe Premiere Pro
a) Microsoft Word d) Adobe InDesign
b) Microsoft PowerPoint
c) Microsoft Excel 23. In Microsoft Word, what is the "References" tab used for?
d) Microsoft Project a) Formatting page layout
b) Adding hyperlinks to
14. What is the purpose of a virtual machine (VM) software like
Oracle VirtualBox? text
a) Creating and editing images c) Managing references, citations, and bibliography
b) Running multiple operating systems on a single computer d) Creating tables
c) Managing email communication
d) Writing and formatting text documents 24. Which MS Office application is suitable for creating and
editing vector graphics for technical illustrations?
15. In Microsoft Word, what is the "Table of Contents" feature a) Microsoft Word
used for? b) Microsoft Excel
a) Adding hyperlinks to text c) Microsoft PowerPoint
b) Creating and editing tables d) Microsoft Visio
c) Generating an automated table of contents based on
document headings

Linked - https://www.linkedin.com/in/tanmay-pawar-6680ab208?utm_source=share&utm_campaign=share_via&utm_content=profile&utm_medium=android_app - © PAWAR TANMAY VILAS


37 Technical Aptitude MCQ Preparation

25. In Microsoft Excel, what is the "PivotTable" feature used 21. c) Solving complex optimization and equation problems
for? 22. c) Adobe Premiere Pro
a) Sorting data 23. c) Managing references, citations, and bibliography
b) Analyzing and summarizing large sets of data 24. d) Microsoft Visio
c) Calculating monthly loan payments 25. b) Analyzing and summarizing large sets of data
d) Creating tables and lists 26. b) Adobe Audition
27. b) Merging contact information into documents
26. Which software application is commonly used for recording 28. d) Microsoft Access
and editing podcasts? 29. b) Ensuring data entered into cells meets specific criteria or
a) Adobe Premiere Pro rules
b) Adobe Audition 30. c) Autodesk Maya
c) Adobe InDesign
d) Adobe Illustrator

27. In Microsoft Word, what is the "Mailings" tab used for?


a) Creating footnotes Basic 30 Question Set On Pseudo Code:
b) Merging contact information into documents
Certainly! Here are 40 moderate-level multiple-choice
c) Inserting clip art images
questions based on pseudo code for technical aptitude, along
d) Applying text formatting
with answers at the end:
28. Which MS Office application is used for creating and
**Pseudo Code Questions:**
managing databases with a graphical interface?
a) Microsoft Word
1. What does the following pseudo code segment do?
b) Microsoft Excel
```
c) Microsoft PowerPoint
x=5
d) Microsoft Access
y = 10
z=x+y
29. In Microsoft Excel, what is the "Data Validation" feature
Print z
used for?
```
a) Creating charts and graphs
a) Sets x and y to 5 and 10, respectively, and prints their sum
b) Ensuring data entered into cells meets specific criteria or
b) Sets x and y to 5 and 10, respectively, and assigns their sum
rules
to z
c) Sorting data
c) Sets z to 5 and 10, and prints the result
d) Creating pivot tables
d) Assigns 5 to z and prints it
30. Which software application is commonly used for creating
2. What is the purpose of the following pseudo code snippet?
and editing 3D models, animations, and visual effects?
```
a) Adobe Illustrator
if x > 10 then
b) Adobe InDesign
Print "x is greater than 10"
c) Autodesk Maya
else
d) Adobe Premiere Pro
Print "x is less than or equal to 10"
end if
Answers: ```
a) It checks if x is greater than 10 and prints a message
1. b) To perform vertical data lookup and retrieval accordingly
2. c) Autodesk AutoCAD b) It always prints "x is greater than 10"
3. b) Collaborative editing and reviewing of documents c) It always prints "x is less than or equal to 10"
4. d) Microsoft Equation Editor d) It assigns the value of x to 10 and prints the result
5. c) Organizing and storing notes, ideas, and information
6. b) Merging text from multiple cells into one cell 3. In the pseudo code, what does the "FOR" loop typically use
7. c) Adobe InDesign to control its iterations?
8. b) Merging contact information into form letters and a) A condition
documents b) A counter variable
9. c) Microsoft Visio c) A boolean value
10. c) Scheduling appointments, meetings, and tasks d) A nested loop
11. b) Adobe Audition
12. c) Calculating monthly loan payments 4. What is the output of the following pseudo code segment?
13. d) Microsoft Project ```
14. b) Running multiple operating systems on a single computer x=5
15. c) Generating an automated table of contents based on y=7
document headings while x < 10 do
16. d) Microsoft Visio y=y+x
17. b) Analyzing data trends and scenarios x=x+1
18. c) Camtasia end while
19. d) Creating and formatting graphical representations Print y
20. c) Comma-Separated Values

Linked - https://www.linkedin.com/in/tanmay-pawar-6680ab208?utm_source=share&utm_campaign=share_via&utm_content=profile&utm_medium=android_app - © PAWAR TANMAY VILAS


38 Technical Aptitude MCQ Preparation

``` d) Does nothing, as it's not a valid pseudo code


a) 35
b) 12 10. In pseudo code, what does the "AND" operator typically
c) 50 represent?
d) 17 a) Logical AND operation
b) String concatenation
5. What does the following pseudo code segment do? c) Bitwise addition
``` d) Division operation
x = 15
y=7 11. What is the purpose of the "IF-ELSE" statement in pseudo
z=x%y code?
Print z a) To perform a loop operation
``` b) To make decisions and execute different code blocks based
a) Sets x and y to 15 and 7, respectively, and prints their sum on a condition
b) Sets x and y to 15 and 7, respectively, and assigns their sum c) To assign values to variables
to z d) To perform mathematical calculations
c) Sets z to the remainder of dividing 15 by 7, and prints the
result 12. In pseudo code, what does the "WHILE" loop use to control
d) Assigns 15 to z and prints it its iterations?
a) A counter variable
6. In pseudo code, what does the "MOD" operator do? b) A fixed number of iterations
a) Performs a logical AND operation c) A boolean value
b) Finds the absolute value of a number d) A condition
c) Computes the modulus (remainder) of a division operation
d) Multiplies two numbers 13. What is the output of the following pseudo code segment?
```
7. What does the following pseudo code segment do? x = 10
``` y=3
x=5 if x % y = 1 then
y = 10 Print "True"
if x > y then else
Print "x is greater than y" Print "False"
else if x < y then end if
Print "x is less than y" ```
else a) True
Print "x is equal to y" b) False
end if c) 1
``` d) 0
a) Prints "x is greater than y"
b) Prints "x is less than y" 14. What does the following pseudo code segment do?
c) Prints "x is equal to y" ```
d) Does nothing, as it's not a valid pseudo code x=5
y=7
8. What is the output of the following pseudo code segment? if x > y then
``` Print "x is greater than y"
total = 0 else
for i = 1 to 5 Print "y is greater than or equal to x"
total = total + i end if
end for ```
Print total a) Prints "x is greater than y"
``` b) Prints "y is greater than or equal to x"
a) 5 c) Prints both messages
b) 10 d) Does nothing, as it's not a valid pseudo code
c) 15
d) 30 15. What is the purpose of the "REPEAT UNTIL" loop in pseudo
code?
9. What does the following pseudo code segment do? a) To perform a loop operation until a specified condition is
``` met
x=3 b) To perform a loop operation a fixed number of times
y=4 c) To repeat a loop indefinitely
x=x*y d) To perform a loop operation in reverse order
Print x
``` 16. In pseudo code, what is the role of the "CASE" statement?
a) Multiplies 3 and 4 and assigns the result to x a) To perform a mathematical calculation
b) Adds 3 and 4 and assigns the result to x b) To make decisions based on a condition
c) Prints 3 and 4 separately c) To assign values to variables

Linked - https://www.linkedin.com/in/tanmay-pawar-6680ab208?utm_source=share&utm_campaign=share_via&utm_content=profile&utm_medium=android_app - © PAWAR TANMAY VILAS


39 Technical Aptitude MCQ Preparation

d) To execute different code blocks based on a specific value else


Print "Odd"
17. What is the output of the following pseudo code segment? end if
``` ```
x=5 a) Prints "Even"
y=7 b) Prints "Odd"
if x > 5 then c) Prints 0
Print "x is greater than 5" d) Does nothing, as it's not a valid pseudo code
else if x < 5 then
Print "x is less than 5" 23. In pseudo code, what does the "REPEAT UNTIL" loop do
else differently from the "WHILE" loop?
Print "x is equal to 5" a) The "REPEAT UNTIL" loop is used for mathematical
end if calculations.
``` b) The "REPEAT UNTIL" loop reverses the order of execution.
a) Prints "x is greater than 5" c) The "REPEAT UNTIL" loop always executes its block at least
b) Prints "x is less than 5" once before checking the condition.
c) Prints "x is equal to 5" d) The "REPEAT UNTIL" loop always executes its block a fixed
d) Does nothing, as it's not a valid pseudo code number of times.

18. In pseudo code, what is the role of the "DO-WHILE" loop? 24. What is the output of the following pseudo code segment?
a) To perform a loop operation while a specified condition is ```
met total = 0
b) To perform a loop operation a fixed number of times for i = 1 to 5
c) To repeat a loop indefinitely if i mod 2 = 0 then
d) To perform a loop operation in reverse total = total + i
end if
order end for
Print total
19. What does the following pseudo code segment do? ```
``` a) 1
x=2 b) 6
y=3 c) 5
while x < 10 do d) 9
y=y*2
x=x+1 25. In pseudo code, what is the role of the "BREAK" statement
end while within a loop?
Print y a) To execute a specific code block
``` b) To exit the loop prematurely
a) Doubles the value of y until x is greater than or equal to 10 c) To start a new loop iteration
and then prints y d) To increment a counter variable
b) Doubles the value of x until y is greater than or equal to 10
and then prints x 26. What does the following pseudo code segment do?
c) Prints 3 ```
d) Does nothing, as it's not a valid pseudo code x=1
while x < 5 do
20. What is the purpose of the "FOR-EACH" loop in pseudo x=x+1
code? end while
a) To perform a loop operation for a fixed number of times Print x
b) To iterate through elements in a collection or array ```
c) To perform a loop operation until a specified condition is a) Sets x to 1 and prints it
met b) Sets x to 5 and prints it
d) To perform a loop operation in reverse order c) Sets x to 2 and prints it
d) Does nothing, as it's not a valid pseudo code
21. In pseudo code, what is the role of the "SWITCH"
statement? 27. In pseudo code, what is the purpose of the "CONTINUE"
a) To perform a mathematical calculation statement within a loop?
b) To make decisions based on a condition a) To exit the loop prematurely
c) To assign values to variables b) To start a new loop iteration
d) To execute different code blocks based on a specific value c) To execute a specific code block
d) To decrement a counter variable
22. What does the following pseudo code segment do?
``` 28. What is the output of the following pseudo code segment?
x=8 ```
y=2 x=1
if x mod y = 0 then while x <= 5 do
Print "Even" if x mod 2 = 0 then

Linked - https://www.linkedin.com/in/tanmay-pawar-6680ab208?utm_source=share&utm_campaign=share_via&utm_content=profile&utm_medium=android_app - © PAWAR TANMAY VILAS


40 Technical Aptitude MCQ Preparation

Print x 26. a) Sets x to 1 and prints it


end if 27. b) To start a new loop iteration
x=x+1 28. b) 2
end while 39. d) To jump to a specific label or line of code
``` 30. c) 1
a) 1
b) 2
c) 3 Advance 30 Question Set On Pseudo Set:
d) 4
Certainly, here are 30 more advanced pseudo code questions
for technical aptitude:
29. In pseudo code, what is the role of the "GOTO" statement?
a) To repeat a loop indefinitely
1. In pseudo code, what is the purpose of the "CASE"
b) To execute a specific code block
statement?
c) To make decisions based on a condition
a) To perform mathematical calculations
d) To jump to a specific label or line of code
b) To make decisions based on a condition
c) To execute a specific code block
30. What is the output of the following pseudo code segment?
d) To declare variables
```
x=5
2. What does the following pseudo code segment do?
y=3
```
while y > 0 do
x = 10
x=x-1
y=0
y=y-1
repeat
end while
y=y+1
Print x
if y = 5 then
```
exit
a) 5
end if
b) 3
until x = 5
c) 1
Print y
d) 0
```
a) Sets y to 5 and prints it
Answers: b) Sets y to 4 and prints it
c) Sets y to 0 and prints it
1. b) Sets x and y to 5 and 10, respectively, and assigns their d) Does nothing, as it's not a valid pseudo code
sum to z
2. a) It checks if x is greater than 10 and prints a message 3. In pseudo code, what is the role of the "TRY...CATCH"
accordingly construct?
3. b) A counter variable a) To perform mathematical calculations
4. c) 50 b) To handle exceptions and errors
5. c) Sets z to the remainder of dividing 15 by 7, and prints the c) To execute a specific code block
result d) To declare variables
6. c) Computes the modulus (remainder) of a division operation
7. b) Prints "x is less than or equal to 10" 4. What is the purpose of the "DO...WHILE" loop in pseudo
8. c) 15 code?
9. a) Multiplies 3 and 4 and assigns the result to x a) To perform a loop operation until a specified condition is
10. a) Logical AND operation met
11. b) To make decisions and execute different code blocks b) To perform a loop operation for a fixed number of times
based on a condition c) To iterate through elements in an array
12. d) A condition d) To execute a specific code block
13. a) True
14. b) Prints "y is greater than or equal to x" 5. In pseudo code, what does the "FINALLY" block within an
15. a) To perform a loop operation until a specified condition is exception handling construct do?
met a) It is used to define variables
16. d) To execute different code blocks based on a specific value b) It is executed regardless of whether an exception occurs or
17. c) Prints "x is equal to 5" not
18. a) To perform a loop operation while a specified condition is c) It is used to perform mathematical calculations
met d) It is executed only when an exception occurs
19. a) Doubles the value of y until x is greater than or equal to
10 and then prints y 6. What is the output of the following pseudo code segment?
20. b) To iterate through elements in a collection or array ```
21. d) To execute different code blocks based on a specific value x=1
22. a) Prints "Even" for i = 1 to 5
23. c) The "REPEAT UNTIL" loop always executes its block at for j = 1 to 3
least once before checking the condition. x=x*i
24. b) 6 end for
25. b) To exit the loop prematurely

Linked - https://www.linkedin.com/in/tanmay-pawar-6680ab208?utm_source=share&utm_campaign=share_via&utm_content=profile&utm_medium=android_app - © PAWAR TANMAY VILAS


41 Technical Aptitude MCQ Preparation

end for x=1


Print x y=2
``` z=0
a) 1 while x < 10 do
b) 15 if x mod 2 = 0 then
c) 30 z=z+x
d) 45 end if
x=x+1
7. In pseudo code, what is the purpose of the "RAISE" end while
statement within an exception handling construct? Print z
a) To lower an exception ```
b) To handle exceptions and errors a) 0
c) To declare variables b) 20
d) To exit a loop c) 25
d) 30
8. What does the following pseudo code segment do?
``` 14. In pseudo code, what is the role of the "THREAD" construct?
x=1 a) To declare variables
y=5 b) To group related procedures and functions
for i = 1 to 5 c) To perform mathematical calculations
x=x*y d) To introduce parallel execution
end for
Print x 15. What does the following pseudo code segment do?
``` ```
a) Calculates the factorial of 5 and prints it x=1
b) Calculates 1 to the power of 5 and prints it y=2
c) Calculates 5 to the power of 5 and prints it for i = 1 to 4
d) Prints 5 for j = 1 to 3
x=x*y
9. In pseudo code, what is the role of the "PACKAGE" construct? end for
a) To perform mathematical calculations end for
b) To group related procedures and functions Print x
c) To declare variables ```
d) To make decisions based on a condition a) Calculates 1 to the power of 12 and prints it
b) Calculates 2 to the power of 4 and prints it
10. What is the purpose of the "UNTIL" loop in pseudo code? c) Calculates 2 to the power of 12 and prints it
a) To perform a loop operation for a fixed number of times d) Prints 2
b) To perform a loop operation until a specified condition is
met 16. In pseudo code, what is the purpose of the "THROW"
c) To iterate through elements in an array statement within an exception handling construct?
d) To execute a specific code block a) To handle exceptions and errors
b) To declare variables
11. What does the following pseudo code segment do? c) To exit a loop
``` d) To raise an exception
x = 10
repeat 17. What is the output of the following pseudo code segment?
x=x-1 ```
if x < 5 then x=5
exit y=3
end if while y > 0 do
until x = 5 x=x-1
Print x y=y-1
``` end while
a) Sets x to 5 and prints it Print x
b) Sets x to 4 and prints it ```
c) Sets x to 0 and prints it a) 5
d) Does nothing, as it's not a valid pseudo code b) 3
c) 1
12. In pseudo code, what is the role of the "FOREACH" loop? d) 0
a) To perform a loop operation for a fixed number of times
b) To iterate through elements in an array or collection 18. In pseudo code, what is the role of the "TRY...FINALLY"
c) To declare variables construct?
d) To execute a specific code block a) To declare variables
b) To group related procedures and functions
13. What is the output of the following pseudo code segment? c) To handle exceptions and errors
``` d) To perform mathematical calculations

Linked - https://www.linkedin.com/in/tanmay-pawar-6680ab208?utm_source=share&utm_campaign=share_via&utm_content=profile&utm_medium=android_app - © PAWAR TANMAY VILAS


42 Technical Aptitude MCQ Preparation

a) To group related procedures and functions


19. What does the following pseudo code segment do? b) To declare variables
``` c) To handle exceptions and errors
x=1 d) To exit a loop
y = 10
while x < 5 do 25. What is the output of the following pseudo code segment?
x=x+1 ```
y=y-2 x=1
end while for i = 1 to 4
Print y for j = 1 to 3
``` x=x*i
a) Prints 2 end for
b) Prints 1 end for
c) Prints 6 Print x
d) Does nothing, as it's not a valid pseudo ```
a) 1
code b) 24
c) 72
20. In pseudo code, what is the purpose of the "FINALLY" d) 120
statement within an exception handling construct?
a) To lower an exception 26. In pseudo code, what is the role of the "THREAD" statement
b) To handle exceptions and errors within a parallel execution construct?
c) To declare variables a) To group related procedures and functions
d) To exit a loop b) To declare variables
c) To perform mathematical calculations
21. What is the output of the following pseudo code segment? d) To introduce parallel execution
```
x=1 27. What does the following pseudo code segment do?
for i = 1 to 5 ```
for j = 1 to 3 x=1
x=x+i y=2
end for repeat
end for x=x*y
Print x y=y+1
``` if y > 5 then
a) 5 exit
b) 15 end if
c) 30 until x > 100
d) 45 Print x
```
22. In pseudo code, what is the purpose of the "FINALLY" a) Sets x to 20 and prints it
construct within an exception handling construct? b) Sets x to 100 and prints it
a) To group related procedures and functions c) Sets x to 120 and prints it
b) To declare variables d) Does nothing, as it's not a valid pseudo code
c) To exit a loop
d) To specify code that must be executed regardless of 28. In pseudo code, what is the purpose of the "JOIN"
whether an exception occurs or not statement within a parallel execution construct?
a) To group related procedures and functions
23. What does the following pseudo code segment do? b) To declare variables
``` c) To perform mathematical calculations
x=5 d) To wait for parallel threads to finish execution
repeat
x=x-1 29. What is the output of the following pseudo code segment?
if x < 0 then ```
exit x=1
end if y = 10
until x = 1 while y > 0 do
Print x x=x*2
``` y=y-1
a) Sets x to 1 and prints it end while
b) Sets x to 0 and prints it Print x
c) Sets x to -1 and prints it ```
d) Does nothing, as it's not a valid pseudo code a) 1024
b) 512
24. In pseudo code, what is the purpose of the c) 256
"TRY...CATCH...FINALLY" construct? d) 128

Linked - https://www.linkedin.com/in/tanmay-pawar-6680ab208?utm_source=share&utm_campaign=share_via&utm_content=profile&utm_medium=android_app - © PAWAR TANMAY VILAS


43 Technical Aptitude MCQ Preparation

30. In pseudo code, what is the role of the "SPAWN" statement


within a parallel execution construct?
a) To declare variables
b) To group related procedures and functions
c) To perform mathematical calculations
d) To start a new parallel thread of execution

Answers:

1. b) To make decisions based on a condition


2. a) Sets y to 5 and prints it
3. b) To handle exceptions and errors
4. a) To perform a loop operation until a specified condition is
met
5. b) It is executed regardless of whether an exception occurs or
not
6. c) 30
7. b) To handle exceptions and errors
8. c) Calculates 2 to the power of 12 and prints it
9. b) To group related procedures and functions
10. b) To perform a loop operation until a specified condition is
met
11. b) Sets x to 4 and prints it
12. b) To iterate through elements in an array or collection
13. a) 0
14. d) To introduce parallel execution
15. b) Calculates 2 to the power of 4 and prints it
16. d) To raise an exception
17. c) 1
18. d) To perform mathematical calculations
19. a) Prints 2
20. d) To exit a loop
21. d) 45
22. d) To specify code that must be executed regardless of
whether an exception occurs or not
23. a) Sets x to 1 and prints it
24. c) To handle exceptions and errors
25. d) 120
26. d) To introduce parallel execution
27. b) Sets x to 100 and prints it
28. d) To wait for parallel threads to finish execution
29. a) 1024
30. d) To start a new parallel thread of execution

Linked - https://www.linkedin.com/in/tanmay-pawar-6680ab208?utm_source=share&utm_campaign=share_via&utm_content=profile&utm_medium=android_app - © PAWAR TANMAY VILAS

You might also like