RRB JE Stage II : Computer Science & IT Quiz | 23rd August 2019

Dear Aspirants,

RRB JE Stage II exam is scheduled to be conducted from 28th August to 1st September 2019. The overall merit for the selection will be made on the basis of the marks scored in stage II, so candidates need to prepare thoroughly for the second stage. To help the aspirants, Adda247 has come up with a study plan in which we will provide you daily quizzes of all technical subjects. The below quiz will be helpful for the candidates who opted the exam group Computer Science & IT in RRB JE stage II.

Q1. What are the ways of dealing with deadlock?
(a) Deadlock prevention
(b) Deadlock recovery
(c) Deadlock detection
(d) All of the above

S1. Ans-(d)
Sol. A deadlock is a situation in which two computer programs sharing the same resource are effectively preventing each other from accessing the resource, resulting in both programs ceasing to function. There are four methods to deal with deadlock- Deadlock prevention, Deadlock recovery, Deadlock detection and ignore the problem.

Q2. Which command is use for sorting the table?
(a) Like
(b) Distinct
(c) Group By
(d) Order By

S2. Ans-(d)
Sol. ORDER BY command is used to sort the result-set in ascending or descending order. ORDER BY keyword sorts the records in ascending order by default.

Q3. which of the following is not a phases of database design methodology?
(a)Physical Database Design
(b)Conceptual Data Modeling
(c)Logical Database Design
(d)DBMS selection

S3. Ans.(d)
Sol. Database design methodology a structured approach that uses procedures, techniques, tools, and documentation aids to support and facilitate the process of design. The database design methodology is divided into three main phases. These are: Conceptual database design, Logical database design and Physical database design.

Q4.Which of the following is not a Data Definition Language Statement?
(a) Delete
(b) Create
(c) Drop
(d) Alter

Sol. DDL is short name of Data Definition Language, which deals with database schemas and descriptions, of how the data should reside in the database. DDL commands are-CREATE, ALTER, DROP, TRUNCATE, RENAME.

Q5.Which of the following testing is also known as behavioral testing?
(a) White box testing
(b) Black box testing
(c) Grey box testing
(d) Clear box testing

Sol. Black-box testing is a method of software testing that examines the functionality of an application without peering into its internal structures or workings.

Q6. Which UNIX command allows you to move and rename files?
(a) cd
(b) mv
(c) cp
(d) rm

S6. Ans.(b)

Q7.What is the solution to starvation in priority scheduling?
(a) Raising Interrupts
(b) Predicting next CPU burst
(c) Aging
(d) Adjusting the value of time quantum

Sol. Aging is a technique to avoid starvation in a scheduling system. It works by adding an aging factor to the priority of each request. The aging factor must increase the requests priority as time passes and must ensure that a request will eventually be the highest priority request

Q8.Which of the following tag is used to link the URL?
(a) <a>
(b) <style>
(c) <link>
(d) <hyperlink>

S8. Ans.(a)

Q9. _______ is the part of malware such as worms or viruses which performs the malicious action; deleting data, sending spam or encrypting data.
(a) Denial of Service
(b) Exploits
(c) Scams
(d) Payload

Sol. In computer security, the payload is the part of malware such as worms or viruses which performs the malicious action; deleting data, sending spam or encrypting data. In addition to the payload, such malware also typically has overhead code aimed at simply spreading itself, or avoiding detection.

Q10. What is the output of this program?
class main_class {
public static void main(String args[])
int a = 6;
if (a == 6) {
int a = 5;
(d)Compiler error

S10. Ans.(d)
Sol. Two variables with the same name can’t be created in a class. compiler error generates.

Register for RRB JE CBT Stage II Free Study Material

You may also like to read: