Project Manager Questions


Q:

what will be the output of the following code?

class Value
{
    public int i = 15;
}
public class Test
{
    public static void main(String argv[])
    {
        Test t = new Test();
        t.first();
    }
    public void first()
    {
        int i = 5;
        Value v = new Value();
        v.i = 25;
        second(v, i);
        System.out.println(v.i);
    }
    public void second(Value v, int i)
    {
        i = 0;
        v.i = 20;
        Value val = new Value();
        v =  val;
        System.out.println(v.i + " " + i);
    }
}

A) 15 0 2 B) 15 0 0
C) 15 20 0 D) 15 0 20
 
Answer & Explanation Answer: D) 15 0 20

Explanation:
Report Error

View Answer Report Error Discuss

4 8827
Q:

Word length of a personal computer is

A) 32 bit B) 16 bit
C) 8 bit D) 4 bit
 
Answer & Explanation Answer: C) 8 bit

Explanation:

Word length refers to the number of bits processed by a computer's CPU in one go. These days, typically 32 bits or 64 bits are used.

Data bus size, instruction size, address size are usually multiples of the word size.

Report Error

View Answer Report Error Discuss

11 8310
Q:

19 persons do 19 programs in 19 hours . If they take 15 mins interval and then how much time they need to do 52 programs.

A) 23 hours B) 47 hrs 15 min
C) 52 hrs 15 min D) 22 hrs 15 min
 
Answer & Explanation Answer: C) 52 hrs 15 min

Explanation:

Since they can do 19 programs in 19 hours, Then 52 programs in 52 hours respectively.
And a 15 min interval
Total time they take to do 52 programs is 52 hours 15 minutes.

Report Error

View Answer Report Error Discuss

11 8091
Q:

How many 3-digit numbers can be formed from the digits 2, 3, 5, 6, 7 and 9 which are divisible by 5 and none of the digits is repeated ?

A) 15 B) 20
C) 5 D) 10
 
Answer & Explanation Answer: B) 20

Explanation:

Since each number to be divisible by 5, we must have 5 0r 0 at the units place. But in given digits we have only 5.

 

So, there is one way of doing it.

 

Tens place can be filled by any of the remaining 5 numbers.So, there are 5 ways of filling the tens place.

 

The hundreds place can now be filled by any of the remaining 4 digits. So, there are 4 ways of filling it.

 

Required number of numbers = (1 x 5 x 4) = 20.

Report Error

View Answer Report Error Discuss

12 8077
Q:

Processor's speed of a computer is measured in

A) Hertz B) Baud
C) MIPS D) BPS
 
Answer & Explanation Answer: A) Hertz

Explanation:

CPU speed is the central factor in a computer's performance. And this CPU speed depends on the processor in the CPU chip. In a computer, clock speed refers to the number of pulses per second generated by an oscillator that sets the tempo for the processor. Clock speed is usually measured in Hertz (Hz).

 

But now-a-days, a pure processor's performance is measured in MIPS (Millions of Instructions Per Second). As here in the question, how a processor's speed is measured is asked and it is Hertz. 

 

Hence, Processor's speed of a computer is measured in Hertz(Hz) [MHz, GHz].

Report Error

View Answer Report Error Discuss

10 7410
Q:

Which of the following is Not an Operating System?

A) UNIX B) Windows NT
C) C++ D) DOS
 
Answer & Explanation Answer: C) C++

Explanation:

C++ is not an Operating System.

 

An Operating System is a collection of system programs that manages all the other programs application programs in a computer as well as the allocation and use of hardware resources such as the CPU, Memory and the Hard Disk Drive.

It acts as an interface between the hardware and the user level program.

It controls and facilitates the overall operation of a computer. 

 

Here

UNIX : UNIX is a popular multi-user, multitasking operating system (OS) developed at Bell Labs.

 

Windows NT : Windows NT is a family of operating systems produced by Microsoft, the first version of which was released in July 1993.

 

DOS : DOS is Disk Operating System. The term DOS can refer to any operating system.

 

C++ : C++ is a programming language and computing platform.

 

Hence, C++ is not an Operating System.

Report Error

View Answer Report Error Discuss

10 6878
Q:

Social engineering attacks are best identified by

A) Ransomware B) Phishing
C) Both A & B D) None of the above
 
Answer & Explanation Answer: C) Both A & B

Explanation:

Social engineering is the art of tricking users into performing certain harmful activities or attacks, users must be trained to identify social engineering. Social engineering attacks typically involve some form of psychological manipulation, fooling otherwise unsuspecting users or employees into handing over confidential or sensitive data. Commonly, social engineering involves email or other communication that invokes urgency, fear, or similar emotions in the victim, leading the victim to promptly reveal sensitive information, click a malicious link, or open a malicious file. Because social engineering involves a human element, preventing these attacks can be tricky for enterprises.

 

Report Error

View Answer Report Error Discuss

1 6757
Q:

Which dml command is used in conjunction with @@identity?

A) INSERT and UPDATE B) UPDATE and DELETE
C) SCOPE_IDENTITY and IDENT_CURRENT D) Commit and rollback
 
Answer & Explanation Answer: C) SCOPE_IDENTITY and IDENT_CURRENT

Explanation:

Using automatically incrementing IDENTITY columns is very popular with database developers. You don’t need to explicitly calculate unique surrogate keys when inserting new data, the IDENTITY column functionality does that for you. The IDENTITY feature also allows you to specify useful Seed and Increment properties. When you use an INSERT statement to insert data into a table with an IDENTITY column defined, SQL Server will generate a new IDENTITY value.

 

You can use the @@IDENTITY variable and the SCOPE_IDENTITY and IDENT_CURRENT functions to return the last IDENTITY value that has been generated by SQL Server. This is very useful when you need to return the key for the row that has just been inserted, back to the caller.

Report Error

View Answer Report Error Discuss

9 6620