Access to All SSC Exams Courses Buy Now
Home RRB JE Stage-II RRB JE Stage II : Computer Science & IT Quiz | 23rd...

RRB JE Stage II : Computer Science & IT Quiz | 23rd August 2019

Dear Aspirants,

RRB JE Stage II exam is scheduled to be conducted from 28th August to 1st September 2019. The overall merit for the selection will be made on the basis of the marks scored in stage II, so candidates need to prepare thoroughly for the second stage. To help the aspirants, Adda247 has come up with a study plan in which we will provide you daily quizzes of all technical subjects. The below quiz will be helpful for the candidates who opted the exam group Computer Science & IT in RRB JE stage II.

About Course:

"Did you Know? In this pack you will get All new content we launch in the next 1 months"

This is the most recommended and NRA-CET ready Pack!
Use Code 'DREAM' to avail at best price today

2000 Students are visiting this Product daily! Hurry now! Seats are Filling fast


About SSC Maha Pack
If you are preparing for more than 1 SSC exams then this is the pack we recommend you buy.

It is most cost-effective and you get access to 100% digital content for all SSC exams on Adda247.SSC Exams Covered in this Pack


SSC Maha Pack Highlights 

  • Structured course content
  • Recorded classes available if you miss any live class
  • Previous Years’ Papers of all upcoming exams.
  • Full Length Mocks based on the latest pattern with detailed solutions (video solutions for certain topics)
  • Topic level knowledge tests
  • Strategy sessions, time management & Preparation tips from the experts
  • Language: English & Hindi Medium


Validity: 1 Month

SSC Maha Pack
  1. Unlimited Live Classes & Recorded Video Courses
  2. Unlimited Tests and eBooks
  3. 1 Lakh+ Selections
  1. 15 Months
  2. 27 Months
  3. 9 Months
  4. 3 Months
  5. 1 Month
3999 266/month

Q1. What are the ways of dealing with deadlock?
(a) Deadlock prevention
(b) Deadlock recovery
(c) Deadlock detection
(d) All of the above

S1. Ans-(d)
Sol. A deadlock is a situation in which two computer programs sharing the same resource are effectively preventing each other from accessing the resource, resulting in both programs ceasing to function. There are four methods to deal with deadlock- Deadlock prevention, Deadlock recovery, Deadlock detection and ignore the problem.

Q2. Which command is use for sorting the table?
(a) Like
(b) Distinct
(c) Group By
(d) Order By

S2. Ans-(d)
Sol. ORDER BY command is used to sort the result-set in ascending or descending order. ORDER BY keyword sorts the records in ascending order by default.

Q3. which of the following is not a phases of database design methodology?
(a)Physical Database Design
(b)Conceptual Data Modeling
(c)Logical Database Design
(d)DBMS selection

S3. Ans.(d)
Sol. Database design methodology a structured approach that uses procedures, techniques, tools, and documentation aids to support and facilitate the process of design. The database design methodology is divided into three main phases. These are: Conceptual database design, Logical database design and Physical database design.

Q4.Which of the following is not a Data Definition Language Statement?
(a) Delete
(b) Create
(c) Drop
(d) Alter

Sol. DDL is short name of Data Definition Language, which deals with database schemas and descriptions, of how the data should reside in the database. DDL commands are-CREATE, ALTER, DROP, TRUNCATE, RENAME.

Q5.Which of the following testing is also known as behavioral testing?
(a) White box testing
(b) Black box testing
(c) Grey box testing
(d) Clear box testing

Sol. Black-box testing is a method of software testing that examines the functionality of an application without peering into its internal structures or workings.

Q6. Which UNIX command allows you to move and rename files?
(a) cd
(b) mv
(c) cp
(d) rm

S6. Ans.(b)

Q7.What is the solution to starvation in priority scheduling?
(a) Raising Interrupts
(b) Predicting next CPU burst
(c) Aging
(d) Adjusting the value of time quantum

Sol. Aging is a technique to avoid starvation in a scheduling system. It works by adding an aging factor to the priority of each request. The aging factor must increase the requests priority as time passes and must ensure that a request will eventually be the highest priority request

Q8.Which of the following tag is used to link the URL?
(a) <a>
(b) <style>
(c) <link>
(d) <hyperlink>

S8. Ans.(a)

Q9. _______ is the part of malware such as worms or viruses which performs the malicious action; deleting data, sending spam or encrypting data.
(a) Denial of Service
(b) Exploits
(c) Scams
(d) Payload

Sol. In computer security, the payload is the part of malware such as worms or viruses which performs the malicious action; deleting data, sending spam or encrypting data. In addition to the payload, such malware also typically has overhead code aimed at simply spreading itself, or avoiding detection.

Q10. What is the output of this program?
class main_class {
public static void main(String args[])
int a = 6;
if (a == 6) {
int a = 5;
(d)Compiler error

S10. Ans.(d)
Sol. Two variables with the same name can’t be created in a class. compiler error generates.

Register for RRB JE CBT Stage II Free Study Material

You may also like to read:


Please enter your comment!
Please enter your name here



Sign Up
Forgot Password
Enter the email address associated with your account, and we'll email you an OTP to verify it's you.

Reset Password
Please enter the OTP sent to