Create Account
Sign In
Toggle navigation
Home
Practice Exams
LMS
Courses
Pattern
Pricing
Syllabus
About Us
Contact Us
More
Blogs
FAQS
00
:
35
:
00
Q:
1
/
75
🤖
Evaluating Your Answers
Please wait while our AI system evaluates your descriptive answers...
This may take a few moments.
⏳ Processing...
We're using advanced AI to provide detailed feedback on your answers.
PAF IT Branch Initial Test
Exam Duration:
00:35:00
PAF IT Branch Initial Test
: Question
1
of 75
Wireless LANs follow which standard?
1 Mark(s)
Your Answer:
IEEE 802.11
IEEE 802.11
IEEE 802.3
IEEE 802.3
IEEE 802.5
IEEE 802.5
IEEE 802.15
IEEE 802.15
Which command shows the path packets take to a destination?
1 Mark(s)
Your Answer:
ping
ping
ipconfig
ipconfig
tracert
tracert
netstat
netstat
The complexity of accessing an element in an array is:
1 Mark(s)
Your Answer:
O(1)
O(1)
O(n)
O(n)
O(log n)
O(log n)
O(n^2)
O(n^2)
Which deadlock handling method kills a process?
1 Mark(s)
Your Answer:
Avoidance
Avoidance
Prevention
Prevention
Detection/Recovery
Detection/Recovery
Ignore
Ignore
Which cable protects best against EMI (Interference)?
1 Mark(s)
Your Answer:
UTP
UTP
Coaxial
Coaxial
STP
STP
Fiber Optic
Fiber Optic
What is a Dirty Read?
1 Mark(s)
Your Answer:
Reading uncommitted data
Reading uncommitted data
Reading committed data
Reading committed data
Writing data
Writing data
Deleting data
Deleting data
The default isolation level in SQL Server is:
1 Mark(s)
Your Answer:
Serializable
Serializable
Read Committed
Read Committed
Read Uncommitted
Read Uncommitted
Snapshot
Snapshot
The root of a heap is always:
1 Mark(s)
Your Answer:
Middle
Middle
Random
Random
Max/Min
Max/Min
Leaf
Leaf
Which sorting algorithm has O(n^2) best case?
1 Mark(s)
Your Answer:
Bubble Sort
Bubble Sort
Selection Sort
Selection Sort
Insertion Sort
Insertion Sort
Quick Sort
Quick Sort
Which Java collection stores unique elements only?
1 Mark(s)
Your Answer:
List
List
Set
Set
Vector
Vector
Map
Map
The `WHERE` clause is used to:
1 Mark(s)
Your Answer:
Sort records
Sort records
Filter records
Filter records
Group records
Group records
Join tables
Join tables
What is a Trie used for?
1 Mark(s)
Your Answer:
Prefix search
Prefix search
Sorting
Sorting
Graph traversal
Graph traversal
Numeric calculation
Numeric calculation
In binary, 1 + 1 =
1 Mark(s)
Your Answer:
1
1
10
10
11
11
2
2
In 1NF, tables must have:
1 Mark(s)
Your Answer:
Primary keys
Primary keys
Atomic values
Atomic values
Foreign keys
Foreign keys
Two columns
Two columns
Which data structure is used for Undo operation?
1 Mark(s)
Your Answer:
Stack
Stack
Queue
Queue
Tree
Tree
Graph
Graph
In C++, `std::unique_ptr` represents:
1 Mark(s)
Your Answer:
Exclusive ownership
Exclusive ownership
Shared ownership
Shared ownership
Weak reference
Weak reference
Null pointer
Null pointer
Postfix expression is also known as:
1 Mark(s)
Your Answer:
Reverse Polish Notation
Reverse Polish Notation
Polish Notation
Polish Notation
Infix Notation
Infix Notation
Prefix Notation
Prefix Notation
A 4-bit binary number is called a:
1 Mark(s)
Your Answer:
Nibble
Nibble
Byte
Byte
Bit
Bit
Word
Word
Adjacency Matrix uses memory:
1 Mark(s)
Your Answer:
O(V)
O(V)
O(E)
O(E)
O(V^2)
O(V^2)
O(V+E)
O(V+E)
The speed of Supercomputers is measured in:
1 Mark(s)
Your Answer:
FLOPS
FLOPS
MIPS
MIPS
GHz
GHz
RPM
RPM
The command `REVOKE` is part of:
1 Mark(s)
Your Answer:
DDL
DDL
DML
DML
TCL
TCL
DCL
DCL
OSI Model has how many layers?
1 Mark(s)
Your Answer:
4
4
5
5
7
7
9
9
BGP is an:
1 Mark(s)
Your Answer:
EGP
EGP
IGP
IGP
Distance Vector
Distance Vector
Link State
Link State
Which technology creates a virtual version of a resource?
1 Mark(s)
Your Answer:
Virtualization
Virtualization
Cloud
Cloud
Grid
Grid
Cluster
Cluster
Which mode allows data transmission in both directions but only one at a time?
1 Mark(s)
Your Answer:
Simplex
Simplex
Half-Duplex
Half-Duplex
Full-Duplex
Full-Duplex
Multiplex
Multiplex
Floyd-Warshall algorithm complexity:
1 Mark(s)
Your Answer:
O(V^2)
O(V^2)
O(E log V)
O(E log V)
O(V^3)
O(V^3)
O(V+E)
O(V+E)
Which isolation level prevents 'Dirty Reads'?
1 Mark(s)
Your Answer:
Read Uncommitted
Read Uncommitted
Read Committed
Read Committed
Serializable
Serializable
Repeatable Read
Repeatable Read
Which loop is best for iterating through a collection?
1 Mark(s)
Your Answer:
While
While
Do-While
Do-While
For
For
For-each
For-each
The maximum number of nodes at level 'L' in a binary tree is:
1 Mark(s)
Your Answer:
$2L$
$2L$
$2^L$
$2^L$
$2^{L-1}$
$2^{L-1}$
$L^2$
$L^2$
Which port is used by RDP (Remote Desktop)?
1 Mark(s)
Your Answer:
22
22
23
23
445
445
3389
3389
`TRUNCATE` is faster than `DELETE` because:
1 Mark(s)
Your Answer:
It doesn't log row deletions
It doesn't log row deletions
It uses less CPU
It uses less CPU
It is DML
It is DML
It sorts data
It sorts data
A full binary tree with N leaves has how many nodes?
1 Mark(s)
Your Answer:
2N - 1
2N - 1
2N
2N
2N + 1
2N + 1
N log N
N log N
The `diamond problem` in inheritance is solved in C++ using:
1 Mark(s)
Your Answer:
Multiple Inheritance
Multiple Inheritance
Friend Classes
Friend Classes
Virtual Inheritance
Virtual Inheritance
Abstract Classes
Abstract Classes
The keyword `static` inside a class means the member belongs to:
1 Mark(s)
Your Answer:
The Class
The Class
The Object
The Object
The Thread
The Thread
The OS
The OS
The default access modifier for interface members in Java is:
1 Mark(s)
Your Answer:
public
public
private
private
protected
protected
default
default
The keyword `virtual` is used to:
1 Mark(s)
Your Answer:
Prevent overriding
Prevent overriding
Enable dynamic binding
Enable dynamic binding
Make function static
Make function static
Hide function
Hide function
Linear Probing is a technique for:
1 Mark(s)
Your Answer:
Sorting
Sorting
Collision Resolution
Collision Resolution
Searching
Searching
Indexing
Indexing
Deadlock prevention strategy:
1 Mark(s)
Your Answer:
Deny necessary condition
Deny necessary condition
Kill process
Kill process
Add memory
Add memory
Ignore it
Ignore it
Which protocol is used for secure shell access?
1 Mark(s)
Your Answer:
SSH
SSH
Telnet
Telnet
FTP
FTP
HTTP
HTTP
The memory address of the first element of an array is called:
1 Mark(s)
Your Answer:
First address
First address
Index 0
Index 0
Base address
Base address
Reference
Reference
Hypervisor Type 1 runs on:
1 Mark(s)
Your Answer:
Bare Metal
Bare Metal
Host OS
Host OS
Cloud
Cloud
Network
Network
IoT stands for:
1 Mark(s)
Your Answer:
Input of Technology
Input of Technology
Internet of Things
Internet of Things
Intranet of Tools
Intranet of Tools
Integrated on Time
Integrated on Time
Push and Pop operations are associated with:
1 Mark(s)
Your Answer:
Stack
Stack
Queue
Queue
List
List
Graph
Graph
A thread is a:
1 Mark(s)
Your Answer:
Lightweight process
Lightweight process
Heavy process
Heavy process
System call
System call
Hardware unit
Hardware unit
The 'Heart' of the OS is called:
1 Mark(s)
Your Answer:
Kernel
Kernel
Shell
Shell
GUI
GUI
Driver
Driver
`try-catch-finally` is used for:
1 Mark(s)
Your Answer:
File Handling
File Handling
Memory Mgmt
Memory Mgmt
Exception Handling
Exception Handling
Thread Mgmt
Thread Mgmt
The complexity of Binary Search is:
1 Mark(s)
Your Answer:
O(n)
O(n)
O(n log n)
O(n log n)
O(log n)
O(log n)
O(1)
O(1)
A tree where every node has at most 2 children is:
1 Mark(s)
Your Answer:
AVL Tree
AVL Tree
B-Tree
B-Tree
Binary Tree
Binary Tree
Red-Black Tree
Red-Black Tree
A function inside a class is generally called a:
1 Mark(s)
Your Answer:
Procedure
Procedure
Subroutine
Subroutine
Method
Method
Variable
Variable
The standard input stream in C++ is:
1 Mark(s)
Your Answer:
cin
cin
stdin
stdin
input
input
scan
scan
The NOT gate is also called a:
1 Mark(s)
Your Answer:
Buffer
Buffer
Inverter
Inverter
Converter
Converter
Diverter
Diverter
The layer responsible for routing packets is:
1 Mark(s)
Your Answer:
Physical
Physical
Data Link
Data Link
Network
Network
Transport
Transport
Agile methodology emphasizes:
1 Mark(s)
Your Answer:
Documentation
Documentation
Iterative development
Iterative development
Strict planning
Strict planning
Waterfall model
Waterfall model
Which register is used for arithmetic operations?
1 Mark(s)
Your Answer:
Accumulator
Accumulator
PC
PC
IR
IR
MAR
MAR
A transaction that has completed successfully is called:
1 Mark(s)
Your Answer:
Committed
Committed
Aborted
Aborted
Active
Active
Rolled back
Rolled back
Which attack involves flooding a network with traffic?
1 Mark(s)
Your Answer:
DDoS
DDoS
Phishing
Phishing
Spoofing
Spoofing
Sniffing
Sniffing
Which data structure is best for Breadth First Search?
1 Mark(s)
Your Answer:
Stack
Stack
Queue
Queue
Heap
Heap
Hash Map
Hash Map
USB stands for:
1 Mark(s)
Your Answer:
Universal Serial Bus
Universal Serial Bus
Unified System Bus
Unified System Bus
Universal System Board
Universal System Board
Unique Serial Bus
Unique Serial Bus
A linked list consists of:
1 Mark(s)
Your Answer:
Blocks
Blocks
Nodes
Nodes
Indexes
Indexes
Vectors
Vectors
The length of an IPv4 address is:
1 Mark(s)
Your Answer:
16 bits
16 bits
32 bits
32 bits
64 bits
64 bits
128 bits
128 bits
Which operator cannot be overloaded as a friend function?
1 Mark(s)
Your Answer:
=
=
+
+
-
-
<<
<<
Which layer of OSI does IPSec operate?
1 Mark(s)
Your Answer:
Application
Application
Transport
Transport
Network
Network
Data Link
Data Link
Which constructor is called when an object is copied to another?
1 Mark(s)
Your Answer:
Default Constructor
Default Constructor
Copy Constructor
Copy Constructor
Parameterized Constructor
Parameterized Constructor
Static Constructor
Static Constructor
Which of the following is a DDL command?
1 Mark(s)
Your Answer:
CREATE
CREATE
INSERT
INSERT
SELECT
SELECT
UPDATE
UPDATE
Virtual functions are used to achieve:
1 Mark(s)
Your Answer:
Compile-time polymorphism
Compile-time polymorphism
Run-time polymorphism
Run-time polymorphism
Encapsulation
Encapsulation
Data Hiding
Data Hiding
A multiplexer with n selection lines has:
1 Mark(s)
Your Answer:
n inputs
n inputs
$2^n$ inputs
$2^n$ inputs
$n^2$ inputs
$n^2$ inputs
2n inputs
2n inputs
Which topology is most expensive to implement?
1 Mark(s)
Your Answer:
Bus
Bus
Star
Star
Ring
Ring
Mesh
Mesh
The width of the data bus determines:
1 Mark(s)
Your Answer:
Memory capacity
Memory capacity
Word size
Word size
Processing speed
Processing speed
Clock rate
Clock rate
Which join returns all rows from the right table?
1 Mark(s)
Your Answer:
Left Join
Left Join
Right Join
Right Join
Inner Join
Inner Join
Cross Join
Cross Join
Degree of a relation is:
1 Mark(s)
Your Answer:
Number of rows
Number of rows
Table size
Table size
Number of columns
Number of columns
Number of keys
Number of keys
DNS maps Domain Names to:
1 Mark(s)
Your Answer:
IP Addresses
IP Addresses
MAC Addresses
MAC Addresses
Port Numbers
Port Numbers
URL
URL
Pipeline hazards cause:
1 Mark(s)
Your Answer:
Speed up
Speed up
Stalls
Stalls
Errors
Errors
Heat
Heat
CSMA/CD is used in:
1 Mark(s)
Your Answer:
Ethernet LAN
Ethernet LAN
Wireless LAN
Wireless LAN
WAN
WAN
Bluetooth
Bluetooth
Type casting `(int) 3.14` results in:
1 Mark(s)
Your Answer:
3
3
4
4
3.14
3.14
Error
Error
Stored Procedures reside in the:
1 Mark(s)
Your Answer:
Database Server
Database Server
Client App
Client App
Web Server
Web Server
File System
File System
Previous
Mark For Review & Next
Next
Clear Answer
Finish
© Copyright © 2020 ALGOPK . All Rights Reserved.