Anda di halaman 1dari 15

http://pastebin.com/5UZ8xhxz - for web technology quiz http://www.darksite.co.in/2012/12/tcs-aspire-2012-all-tests-quizzes.

html

1. TCS ASPIRE : Know your TCS quiz answers 2012 # Question 1 of 10 10.0 Points When and where was TCS founded? A. 1968, Mumbai B. 1954, Mumbai C. 1968, Jamshedpur D. 1954, Coimbatore Answer Key: A # Question 2 of 10 10.0 Points To how many industries does TCS provides its consultancy? A. 12 B. 10 C. 20 D. 15 Answer Key: A # Question 3 of 10 10.0 Points What are the values of TCS? A. Leading Change, Integrity, Responsibility, Excellence, Learning and propelling B. Leading innovation, Integrity, Respect for the colleagues, Excellence, Mentoring and Sharing C. Leading innovation, Integrity, Courteous, Certainty, Learning and Sharing Correct D. Leading Change, Integrity, Respect for individual, Excellence, Learning and Sharing Answer Key: D # Question 4 of 10 10.0 Points What is the name of the first research center established by TCS? A. Tata Institute of Social Sciences (TISS) B. Tata Research Development and Design Center (TRDDC) C. Tata Institute of Fundamental Research (TIFR) D. Indian Institute of Science (IISc) Answer Key: B

# Question 5 of 10 10.0 Points What was TCSs first onsite project? A. Automating Johannesburg Stock Exchange B. Burroughs (the first business computer manufacturer) C. Developing electronic depository, SECOM for SIS SegaInterSettle, Switzerland D. Institutional Group and Information Company (IGIC) Answer Key: D # Question 6 of 10 10.0 Points TCS is .. largest IT firm in the world? A. 8th B. 2nd C. 4th D. 6th Answer Key: A # Question 7 of 10 10.0 Points Who is TCS first General Manager? A. JRD Tata B. F.C Kohli C. Ratan Tata D. S. Ramadorai Answer Key: B # Question 8 of 10 10.0 Points TCS provides six major IT services A. Customer Development, Application Management, Migration and Re-engineering, System Integration, Testing, Performance Engineering B. Custom Application Development, Application Management, Migration and Re-engineering, Business Management, Testing, Performance Engineering C. Custom Application Development, Application Management, Migration and Re-engineering, System Integration, Testing, Performance Engineering D. Customer Development, Application Management, Migration and Re-engineering, Business Management, Testing, Performance Engineering Answer Key: B # Question 9 of 10 10.0 Points

Which model does TCS follow? A. Global Integrated Delivery Model B. World Integrated Delivery Model C. World Network Delivery Model D. Global Network Delivery Model Answer Key: D # Question 10 of 10 10.0 Points Tata Consulting Services goes public in Indias private sectors largest initial public offer in A. 2006 B. 1999 C. 2004 D. 2002 Answer Key: C TCS is listed on which stock exchanges? A. BSE and CSE B. BSE and NSE C. CSE, BSE and NSE D. BSE, NSE and Nasdaq Answer Key:B 2. TCS ASPIRE: Basic Programming Quiz # Question 1 of 10 10.0 Points What is a variable in a computer program? A. An output B. A value such as 5 C. The name given to a value D. An input argument Answer Key: C # Question 2 of 10 10.0 Points What is a semantic error ? A. A program error that is difficult to debug

B. A program error that is not so important to take care C. A program error that crashes the program D. A program error that gives wrong output Answer Key: D # Question 3 of 10 10.0 Points A variable will last until A. the value of the variable is used in the program B. The program completes and exit C. Hard disc is formatted D. Computer is switched off Answer Key: B # Question 4 of 10 10.0 Points In a Javascript program, the word preceding the . represents A. A program name B. An object C. An action by an object D. A command Answer Key: B # Question 5 of 10 10.0 Points What do you mean by a portable computer program? A. The program can be attached to the port of a computer B. The program is very small C. It can be run on computers with different types of computers D. It can be send from one computer to another computer Answer Key: C # Question 6 of 10 10.0 Points A compiler will A. Interpret the program line by line B. Compile the program to create an executable C. Link different programs written in same language together D. Correct the errors in the program Answer Key: B

# Question 7 of 10 10.0 Points What do we mean by the performance of a program ? A. The utilization of resources such as CPU and memory by a program B. The number of times a program can be run C. The number of arguments that a program can handle D. The speed with which a program runs Answer Key: A # Question 8 of 10 10.0 Points What is debugging ? A. Fine tuning the program for performance B. The process of tracking and correcting the bugs in a program C. Testing the program to identify defects D. The process of removing the identified bugs Answer Key: B # Question 9 of 10 10.0 Points Data structure enables A. Analysis of the data used in a program B. Connecting a program with database C. Storing and organizing data in computer memory for efficient use D. Structuring data in a program Answer Key: C # Question 10 of 10 10.0 Points What is class in object oriented program ? A. A collection of objects B. A template to create objects C. A variable type in a program D. Category /Type of a program Answer Key: B # Question 10 of 10 10.0 Points A loop in a computer program is used for A. Represent the beginning and end of a program B. Repeating things over and over in a program C. Used to run a program again and again D. Used to collect items together in a program Answer Key: B

What is an algorithm? A. The sequence of instructions in a program B. The general process for solving a category of problems C. The source code of a program D. The sub modules / part of the main program Answer Key:B A string in a computer program is A. used to group several related programs together B. used to store a word C. used to sequence the instructions in a program D. used to define a variable Answer Key:B What is a computer program ? A. A language B. A command C. An instruction D. A sequence of instructions Answer Key:D 3. TCS ASPIRE : UNIX quiz # Question 1 of 10 10.0 Points ls command in UNIX A. Lists the files in a directory B. Compare the size of two files C. Gives the currently logged session details D. Compares two numerals and prints the lower value Answer Key: A # Question 2 of 10 10.0 Points Which among the following is not a part of UNIX operating system A. Programs B. Libraries C. Kernel D. Shell

Answer Key: B # Question 3 of 10 10.0 Points In UNIX, the shell act as an interface between user and A. Kernel B. Operating System C. Hardware D. Programs Answer Key: A # Question 4 of 10 10.0 Points Everything in UNIX is A. None B. a Process C. a file or a process D. a File Answer Key: C # Question 5 of 10 10.0 Points Which command is used for changing directory in UNIX? A. mkdir B. cd C. chgdir D. cddir Answer Key: B # Question 6 of 10 10.0 Points In UNIX, file permissions are not set for A. User B. Other users C. Devices D. User Groups Answer Key: C # Question 7 of 10 10.0 Points In Unix, how can you read the manual help pages about a command A. Type help and the command B. Type options and the command C. Type details and the command

D. Type man and the command Answer Key: D # Question 8 of 10 10.0 Points Which is the most common text editor in UNIX ? A. Visual editor B. notepad C. Word D. Open office Answer Key: A # Question 9 of 10 10.0 Points You have created a shell script and wants to run the script. What should you do before trying to run the script ? A. No action required B. Compile the script to create the executable C. Update the execute permission of the script D. Give ownership of the file to system admin Answer Key: C # Question 10 of 10 10.0 Points Which is valid mode of operation in vi editor ? A. Typing mode B. Command Mode C. Append mode D. Open mode Answer Key: B 4. TCS ASPIRE : software engineering quiz # Question 1 of 10 10.0 Points Requirements can be classified in to two types, namely, functional requirements and non-functional requirements True False Answer Key: True # Question 2 of 10 10.0 Points Some examples of non-functional requirements are.

1.Number of significant digits to which accuracy should be maintained in all numerical calculations is 10 2.The response time of the system should always be less than 5 seconds 3.The software should be developed using C language on a UNIX based system 4.The matrix diagonalisation routine should zero out all off-diagonal elements, which are equal to or less than 10-3 5.Experienced officers should be able to use all the system functions after a total training of two hours. After this training, the average number of errors made by experienced officers should not exceed two per day. True False Answer Key: True # Question 3 of 10 10.0 Points Every software system has the following essential characteristics: A. It has processes which collaborate with each other to generate the outputs. B. All the above C. It has a boundary. The boundary separates what is with in system scope and what is outside. D. The system may also use data stores to store data which has a life beyond the system. E. These processes operate on data by creating, modifying, destroying, and querying it. F. It takes inputs from external agents and generates outputs. Answer Key: B # Question 4 of 10 10.0 Points ERD complements DFD. While DFD focuses on data and the relationships between them, ERD focuses on processes and data flow between them True False Answer Key: False # Question 5 of 10 10.0 Points Polymorphism: It is the means by which an operation behaves differently in different contexts. True False Answer Key: True # Question 6 of 10 10.0 Points Encapsulation: This helps in controlling the visibility of internal details of the objects. It improves security and integrity of data

True False Answer Key: True # Question 7 of 10 10.0 Points There are 4 types of Abstraction, namely Entity, Action, Virtual machine & Coincidental. True False Answer Key: True # Question 8 of 10 10.0 Points There can be more than one hash fields on a file. True False Answer Key: False # Question 9 of 10 10.0 Points Concurrency refers to multiple transactions accessing the same database at the same time. In a system which allows concurrency, some kind of control mechanism has to be in place to ensure that concurrent transactions do not interfere with each other. True False Answer Key: True # Question 10 of 10 10.0 Points Software genetic development process contains three genetic phrases namely A. Software engineering, Definition, Coding B. Definition, development, maintenance C. Coding, design, Software engineering D. Design, Coding, Development E. Development, Definition, Testing Answer Key: B 5. TCS ASPIRE | Database management system quiz # Question 1 of 10 10.0 Points Which of the following options list the steps to convert a table to its second normal form? A. All of the above B. Find and remove fields that are related to the only part of the key. C. Assign the new table with the key i.e. part of the whole composite key.

D. Group the removed items in the another table. Answer Key: A # Question 2 of 10 10.0 Points In which of the following ways does TRUNCATE TABLE differ from DELETE? A. All of the above B. The number of deleted rows are not returned. C. Truncate operations are not transaction safe. D. Truncate operations drop and re-create the table which is much faster than deleting rows. one by one. Answer Key: A # Question 3 of 10 10.0 Points Following tasks can be performed when using the ALTER TABLE clause: 1.Change the name of the table 2.Change the name of the column 3.Decrease the size of a column if table data exists. True False Answer Key: False # Question 4 of 10 10.0 Points Sometimes tables within particular database become obsolete and ought to be discarded. Which of the following commands would you use for the same? A. None of the above B. REMOVE TABLE < TABLE NAME> C. DROP TABLE < TABLE NAME > D. DELETE TABLE < TABLE NAME > Answer Key: C # Question 5 of 10 10.0 Points A foreign key must have a corresponding primary key or unique key value in the master table. True False Answer Key: True # Question 6 of 10 10.0 Points NULL value is equivalent to a value of Zero if the data type is number True False

Answer Key: False # Question 7 of 10 10.0 Points Integrity constraint can be dropped if the rule that it enforces is not longer TRUE or if the constraint is no longer needed. True False Answer Key: True # Question 8 of 10 10.0 Points SELECT TRIM( Hansel ) Trim both sides FROM DUAL What would be the output of the above command? A. None of the above B. Trim both sides C. Hansel D. Trim both sides Hansel Answer Key: D # Question 9 of 10 10.0 Points What would be the output of following command. SELECT TRANSLATE(1sct523,123, 7a9) Change FROM DUAL; A. 7sct 5a9 B. None of the above C. 7 sct D. Change 7 sct 5a9 Answer Key: D # Question 10 of 10 10.0 Points What is joining a Table to itself called? A. Self Join B. Outer join C. Left inner join D. Inner join Answer Key: A 2012 TCS ASPIRE : Java quiz # Question 1 of 10 10.0 Points Among the following options, choose the four options that describe the appropriate default values for array elements of the types indicated? 1. int -> 0 2. String -> null 3. Dog -> null

4. char -> \u0000 5. float -> 0.0f 6.boolean -> true A. 1, 2, 3, 4 B. 2, 4, 5, 6 C. 3, 4, 5, 6 D. 1, 3, 4, 5 Answer Key: 1, 3, 4, 5 # Question 2 of 10 10.0 Points Which option among the following lists only Java programming language keywords? A. goto, instanceof, native, finally, default, throws B. byte, break, assert, switch, include C. try, virtual, throw, final, volatile, transient D. strictfp, constant, super, implements, do E. class, if, void, long, Int, continue Answer Key: goto, instanceof, native, finally, default, throws # Question 3 of 10 10.0 Points Which of the following options would legally declare, construct, and initialize an array? A. int *+ myList = ,1, 2, 3}; B. int myList [] = {4, 3, 7}; C. int [] myList = (5, 8, 2); D. int myList [] [] = {4,9,7,0}; Answer Key: int myList [] = {4, 3, 7}; # Question 4 of 10 10.0 Points You want subclasses in any package to have access to members of a superclass. Which is the most restrictiveaccess that accomplishes this objective? A. private B. transient C. public D. protected Answer Key: Public # Question 5 of 10 10.0 Points interface Base { boolean m1 (); byte m2(short s); } 1.interface Base2 implements Base {} 2.abstract class Class2 extends Base { public boolean m1(){ return true; }} 3.abstract class Class2 implements Base {} 4.abstract class Class2 implements Base { public boolean m1(){ return (7 > 4); }} 5.abstract class Class2 implements Base { protected boolean m1(){ return (5 > 7) }}

A. 3 and 4 B. 1 and 5 C. 1 and 2 D. 2 and 3 Answer Key: 3 and 4 # Question 6 of 10 10.0 Points Among the 6 options provided below, which three form part of correct array declarations? 1.public int a [ ] 2.static int [ ] a 3.public [ ] int a 4.private int a [3] 5.private int [3] a [ ] 6.public final int [ ] a A. 2, 4, 5 B. 1, 3, 4 C. 2, 5, 6 D. 1, 2, 6 Answer Key: 1, 2, 6 # Question 7 of 10 10.0 Points Which of the following is/are legal method declarations? 1.protected abstract void m1(); 2.static final void m1(){} 3.synchronized public final void m1() {} 4.private native void m1(); A. All of them are legal declarations. B. 1 and 3 C. 2 and 4 D. 1 only Answer Key: All of them are legal declarations. # Question 8 of 10 10.0 Points Which three among the following are valid method signatures in an interface? 1.private int getArea(); 2.public float getVol(float x); 3.public void main(String [] args); 4.public static void main(String [] args); 5.boolean setFlag(Boolean [] test); A. 3, 4, and 5 B. 2 and 4 C. 1 and 2

D. 2, 3 and 5 Answer Key: 2, 3 and 5 # Question 9 of 10 10.0 Points Which option among the following creates an instance of an array? A. int[ ] ia = new int[15]; B. int ia[ ] [ ] = { 4, 5, 6 }, { 1,2,3 }; C. char* + ca = Some String; D. float fa = new float[20]; Answer Key: int[ ] ia = new int[15]; # Question 10 of 10 10.0 Points Which of the following class level (nonlocal) variable declarations will not compile? A. volatile int d; B. private synchronized int e; C. protected int a; D. transient int b = 3; Answer Key: private synchronized int e;

Anda mungkin juga menyukai