Technology Questions

Q:

How to handle error in the destructor?

A) throwing B) terminate
C) both a & b D) none of the mentioned
 
Answer & Explanation Answer: B) terminate

Explanation:

It will not throw an exception from the destructor but it will the process by using terminate() function.

Report Error

View Answer Report Error Discuss

Filed Under: C++

3 7730
Q:

How many ways are there to initialize int with a constant?

A) 1 B) 2
C) 3 D) 4
 
Answer & Explanation Answer: B) 2

Explanation:

There are two formats for initializers in C++ as shown in the example that follows. The first format uses the traditional C notation. The second format uses constructor notation.

int foo = 123;

 

int bar (123);

Report Error

View Answer Report Error Discuss

Filed Under: C++
Job Role: Software Architect

1 7584
Q:

How many types of macros are there in c++?

A) 1 B) 2
C) 3 D) 4
 
Answer & Explanation Answer: B) 2

Explanation:

There are two types of macros. They are object-like and function-like.

Report Error

View Answer Report Error Discuss

Filed Under: C++

1 7529
Q:

What is SQL*Plus? Explain its features

Answer

SQL*plus allows SQL and PL/SQL scripts to interactively run in command line.

It allows three kinds of commands to run; SQL, PL/SQL and SQL * Plus commands. It’s most commonly used by DBA’s to interact with the oracle database.

Report Error

View answer Workspace Report Error Discuss

Subject: Oracle

14 7526
Q:

In OSI network architecture, the routing is performed by

A) transport layer B) session layer
C) network layer D) data link layer
 
Answer & Explanation Answer: C) network layer

Explanation:

in_osi_network_architecture_the_routing_is_performed_by1553604163.jpg image

 

In networking, the Open Systems Interconnection is commonly called as OSI model. It has a 7 layer architecture for the communication.

 

In OSI network architecture, the routing is performed by network layer which is layer number 3 with the help of intermediate routers.

Report Error

View Answer Report Error Discuss

4 7493
Q:

List the steps involved in creating the checksum.

Answer

- Divide the data into sections


- Add the sections together using 1's complement arithmetic


- Take the complement of the final sum, this is the check sum

Report Error

View answer Workspace Report Error Discuss

4 7488
Q:

Which of the following can derived class inherit?

A) members B) functions
C) both a & b D) None of the above
 
Answer & Explanation Answer: C) both a & b

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: C++

2 7485
Q:

Social engineering attacks are best identified by

A) Ransomware B) Phishing
C) Both A & B D) None of the above
 
Answer & Explanation Answer: C) Both A & B

Explanation:

Social engineering is the art of tricking users into performing certain harmful activities or attacks, users must be trained to identify social engineering. Social engineering attacks typically involve some form of psychological manipulation, fooling otherwise unsuspecting users or employees into handing over confidential or sensitive data. Commonly, social engineering involves email or other communication that invokes urgency, fear, or similar emotions in the victim, leading the victim to promptly reveal sensitive information, click a malicious link, or open a malicious file. Because social engineering involves a human element, preventing these attacks can be tricky for enterprises.

 

Report Error

View Answer Report Error Discuss

6 7449