
100 Sample Questions for JECA 2022
These are the most probable questions of JECA 2022. Please go through these questions and secure your career. Try to solve it on your own.
Question 1
Question 1
What is the output of the following program?
#include <stdio.h>
void main () {
const int a=4;
float b;
b=++a;
printf”%d, %f”, a, ++b);
}
(A) Compiler error
(B) 5,5
(C) 4,5
(D) 5,4
Question 2
Question 2
What is the output of the following program?
#include<stdio.h>
#define I char
void main() {
I i = 65;
printf(“sizeof(i) = %d”, sizeof(i));
}
(A) Compiler Error
(B) sizeofi) =1
(C) sizeofi) = 65
(D) sizeof(i) = 66
Question 3
Question 3
What is the output of the following program?
#include <stdio.h>
void main() {
int x=0, y=0;
if(x && y++)
printf(“%d..%d”, x++, y);
printf(“%d..%d”, x, y);
}
(A) 0..0
(B) 0..1
(C) 1..1
(D) 1..0
Question 4
Question 4
What is the output of the following program?
#include <stdio.h>
enum colors {BLACK, BLUE, CYAN):
void main () {
printf (“%d.%d.%d”, BLACK, BLUE, CYAN);
}
(A) BLACK, BLUE, CYAN
(B) 0.0.0
(C) 0.1.2
(D) No output
Question 5
Question 5
What is the output of the following program?
#include <stdio.h>
void main () {
char xy=0;
for(;xy>0;xy++);
printf(“%d\n”, xy);
}
(A) 2
(B) 0
(C) Compiler error
(D) 1
Question 6
Question 6
What is the output of the following program?
#include<stdio.h>
void main() {
int *j;
{
int i = 1000;
j=&i;
}
printf(“%d”,*j);
}
(A) 1000
(B) 0
(C) Garbage Value
(D) Compiler error
Question 7
Question 7
Which of the following statement immediately terminates the execution of a loop?
(A) else
(B) break
(C) return
(D) goto
Question 8
Question 8
An unrestricted use of the “goto” statement is harmful because ____.
(A) it is difficult to verify program
(B) memory requirement is increased
(C) it increases execution time of the program
(D) compiler generates longer machine code
Question 9
Question 9
In object oriented programming, inheritance is a technique to ____.
(A) pass arguments and improve data hiding
(B) pass arguments and add features to existing classes without rewriting them
(C) automatically acquire features from its parent object
(D) improve data hiding and encapsulation
Question 10
Question 10
In object oriented programming, the visibility mode by default is _____.
(A) public
(B) private
(C) protected
(D) anywhere
Question 11
Question 11
Which statement is false based on the concept of object-oriented programming?
(A) Method overloading is an example of compile-time polymorphism
(B) Method overriding is an example of runtime polymorphism
(C) Derived class does not need a derived class.
(D) Object oriented prgramming supports inheritance.
Question 12
Question 12
Method overloading in respect of object oriented programming is _____.
(A) overloading without argument passing
(B) overloading the method that has same name but different parameters
(C) a feature in which multiple functions with different names and same
(D) not possible parameters
Question 13
Question 13
In object-oriented programming, _____ can be declared in a class template.
(A) global data members
(B) constant data members
(C) static data members
(D) statistical data members
Question 14
Question 14
In object oriented programming, same function or object behaves different in different situations. It is known as _____.
(A) inheritance
(B) polymorphism
(C) memory addressing
(D) encapsulation
Question 15
Question 15
Which of the following class constructor will be invoked first in object oriented programming?
(A) Base class
(B) Virtual base class
(C) Abstract class
(D) Derived class
Question 16
Question 16
In object-oriented programming, public members of a base class become protected member of derived class. The situation happens in _____.
(A) Virtual inheritance
(B) Protected inheritance
(C) Private inheritance
(D) Public inheritance
Question 17
Question 17
In unix/linux platform, which vi editor command copies the curent line of the file?
(A) yy
(B) yw
(C) yc
(D) zz
Question 18
Question 18
In unix/linux platform, which command is used to delete a line in vi editor?
(A) P
(B) dd
(C) x
(D) q
Question 19
Question 19
In unix/linux platform, which set is correct to move cursor within vi editor?
(A) h – Move cursor up, k – Move cursor down, j – Move cursor left, l – Move cursor right.
(B) k – Move cursor up, j – Move cursor down, h – Move cursor left, l – Move cursor right.
(C) k – Move cursor up, l – Move cursor down, h – Move cursor left, j – Move cursor right.
(D) l – Move cursor up, j – Move cursor down, k – Move cursor left, h – Move cursor right.
Cognizant Solutions | CodeGladiators Solutions
Question 20
Question 20
In unix/linux platform, which command is used to see path of the working directory?
(A) ls
(B) dir
(C) vi
(D) pwd
Question 21
Question 21
In unix/linux platform, which command is used to view the first n number of lines of a particular file (consider the file name is “filename”)?
(A) head -n filename
(B) tail-n filename
(C) head -n -tail filename
(D) top-n filename
Question 22
Question 22
In unix/linux platform, which command is used to search for a pattern within a file?
(A) cd
(B) cp
(C) paste
(D) grep
Question 23
Question 23
In unix/linux platform, hidden file can be viewed using ____.
(A) ls -a
(B) ls -l
(C) ls -h
(D) ls -k
Question 24
Question 24
In unix/linux platform, what is the output of the following command (consider the file name is “filename”)?
grep-y ‘hello’ filename
(A) show the current directory
(B) show the patterm ignoring case
(C) show the lines which don’t match with the pattern
(D) show the line numbers at the time of result
Question 25
Question 25
In shell script, what is the output of the following program?
counter=1
while [$counter -le 10]
do
echo $counter
((counter++))
done
(A) lists all the numbers from 1 to 10
(B) lists all the odd numbers from 1 to 10
(C) lists all the even numbers from 1 to 10
(D) lists only the 10th position number
Question 26
Question 26
Stack is a ____ in data structure concept.
(A) basic data type
(B) derived data type
(C) float data type
(D) char data type
Question 27
Question 27
In data structure, the stack is a linear type of data structure in which data is stored and retrieved in a ____ manner.
(A) No out only in
(B) Last in First out
(C) First in First out
(D) Last out Last in
Question 28
Question 28
In bubble sort algorithm, worst case time complexity is ____ considering ‘n’ is the number of elements.
(A) O(1)
(B) O(n^2)
(C) O(n)
(D) O(nlogn)
Question 29
Question 29
In data structure, a binary tree with ‘n’ nodes has ____.
(A) n edges
(B) n+1 edges
(C) n-1 edges
(D) n-2 edges
Cognizant Solutions | Automata Fixing
Question 30
Question 30
Merge sort follows ____ in data structure.
(A) divide and conquer strategy
(B) back tracking approach
(C) heuristic search
(D) greedy approach
Question 31
Question 31
In data structure, maximum degree of a vertex in a typical graph with ‘n’ vertices 1s ____.
(A) n
(B) n-1
(C) n+1
(D) 2n-1
Question 32
Question 32
In data structure, a graph is represented as a pair of sets (V, E), where ____.
(A) V is the set of variables and E is the set of edges
(B) V is the set of vertices and E is the set of edges
(C) V is the set of vertices and E is the set of elements
(D) V is the set of variables and E is the set of elements
Question 33
Question 33
In binary search tree data structure, in-order traversal means the nodes are being searched in ____ order.
(A) left child node – right child node – root node
(B) right child node – root node – left child node
(C) root node – right ehild node – left child node
(D) left child node – root node – right child node
Question 34
Question 34
Queue data structure can be utilized for ____ implementation.
(A) radix sort
(B) quick sort
(C) recursion
(D) depth first search
Question 35
Question 35
The handware device used for direct memory access is known as ____.
(A) DMA schedular
(B) DMA controller
(C) DMA disk
(D) DMA monitor
Question 36
Question 36
Hit ratio means ____.
(A) [number of hit / (number of hit +number of mis)]
(B) [number of miss / (number of hit + number of miss)]
(C) a negative value based on specific software
(D) a negative value based on specific hardware
Question 37
Question 37
A suspension of a process, caused by an event external to that process and performed in such a way that the process can be resumed, is known as ____.
(A) schedhuler
(B) interrupt
(C) deadlock
(D) virtual memory
Question 38
Question 38
Operating system supports FCFS scheduling which is ____ type.
(A) viral
(B) non-preemptive
(C) preemptive
(D) multi-layer
Question 39
Question 39
Round robin is a type of ____ in context of operating system.
(A) fragmentation
(B) process scheduling
(C) process synchronization
(D) deadlock
Question 40
Question 40
In operating system, dispatcher module helps in ____ between the processes at CPU.
(A) spawning
(B) processing
(C) killing
(D) switching
Question 41
Question 41
Belady’s anomaly happens in ____ page replacement policy.
(A) FIFO
(B) LRU
(C) LFU
(D) NRU
Question 42
Question 42
In operating system, a thread is considered as ____.
(A) Heavy Weight Process
(B) Light Weight Process
(C) Process
(D) Program
Question 43
Question 43
In operating system, Inter Process Communication (IPC) is required for activity.
(A) cache
(B) DMA
(C) synchronization
(D) disk
Question 44
Question 44
Paging is a ____ management function in operating system.
(A) CPU
(B) memory
(C) disk
(D) process
Question 45
Question 45
What do you mean by best fit algorithm in memory management? Select the correct option.
(A) Allocate the program to a specific memory partition which is the smallest available partition to be able to allocate the whole program.
(B) Allocate the program to a specific disk partition which is the smallest available partition to be able to allocate the whole program.
(C) Allocate the process to a specific memory partition which is the smallest available partition to be able to allocate the whole process.
(D) Allocate the process to a specific disk partition which is the smallest available partition to be able to allocate the whole process.
Question 46
Question 46
In operating system, Banker’s algorithm is used for ____.
(A) Mutual exclusion
(B) Deadlock recovery
(C) Deadlock avoidance
(D) Cache allocation
Question 47
Question 47
In operating system, a state is considered as ____ only if the system is capable of allocating resources to each process following resource allocation methods avoiding deadlock situation.
(A) starvation
(B) greedy allocation
(C) unsafe state
(D) safe state
Question 48
Question 48
SCAN, C-SCAN, L0OK, C-LOOK are types of _____ scheduling.
(A) process
(B) CPU
(C) memory
(D) disk
Question 49
Question 49
In Computer Network, TFTP means ____.
(A) Transition File Transfer Protocol
(B) Transport File Transfer Protocol
(C) Trimmed File Transfer Protocol
(D) Trivial File Transfer Protocol
Question 50
Question 50
In Computer Network, SGMP means ____.
(A) Simplex Gateway Monitoring Protocol
(B) Simplex Gateway Memory Protocol
(C) Simple Gateway Monitoring Protocol
(D) Simple Gateway Memory Protocol
Question 51
Question 51
In computer network, Token Ring (IEEE 802.5) is a type of ____.
(A) monitoring protocol
(B) communication protocol
(C) visibility protocol
(D) chaos protocol
Question 52
Question 52
In network, a ____ device can transmit data in bi-directional way at a particular timne instance.
(A) simplex
(B) half duplex
(C) multiplex
(D) full duplex
Question 53
Question 53
IEEE 802.2 specifies LLC which means ____.
(A) logical link control
(B) logistic link control
(C) length-wise link control
(D) layer link control
Question 54
Question 54
In computer network, Open Systems Interconnection model has seven layers within which ____ layer is used for routing.
(A) application
(B) network
(C) session
(D) transport
Question 55
Question 55
In computer network, ____ helps to find out hardware address of a host from its known IP address.
(A) Address Resolution Protocol
(B) Reverse Address Resolution Protocol
(C) Simple Network Management Protocol
(D) Simple Mail Transfer Protocol
Question 56
Question 56
In computer network, error control is considered as a function of ____ layer.
(A) Application
(B) Presentation
(C) Session
(D) Data link
Question 57
Question 57
If hexadecimal notation of an IP address is F32C1483, then the equivalent decimal notation (separated by dot) is ____.
(A) 241.44.20.131
(B) 243.42.20.135
(C) 243.44.20.131
(D) 243.44.20.135
Question 58
Question 58
Based on DBMS, choose the correct option for composite attribute.
(A) Address
(B) Birth date
(C) Phone number
(D) Age
Question 59
Question 59
In DBMS, what do you mean by a tuple ?
(A) One column
(B) Two columns
(C) One row
(D) Two rows
Question 60
Question 60
Rho (p) indicates ____ in relational algebra.
(A) Selection
(B) Projection
(C) Rename
(D) Join
Question 61
Question 61
Normalization is the technique to organize data in database to ____ redundancy.
(A) maximize
(B) minimize
(C) average
(D) diffuse
Question 62
Question 62
In DBMS, a relation is having ____ Normal Form if it contains an atomic value.
(A) First
(B) Second
(C) Third
(D) Fourth
Question 63
Question 63
In software engineering, the tester does not know the internal designs of the software application in case of ____ testing.
(A) White box
(B) Black box
(C) Acceptance
(D) Beta
Question 64
Question 64
In software engineering, context diagram is termed as ____.
(A) Level 0 DFD
(B) Level 1 DFD
(C) Level 2 DFD
(D) Level 3 DFD
Question 65
Question 65
In software engineering, SRS means ____.
(A) System Requirements Specification
(B) System Readable Specification
(C) Software Requirements Specification
(D) Software Readable Specification
Question 66
Question 66
In software engineering, degree of interdependence between software modules is termed as ____.
(A) data
(B) coupling
(C) control
(D) pointer
Question 67
Question 67
In software engineering, Alpha testing is the product testing executed by ____.
(A) Development team
(B) Friendly set of customers
(C) Management team
(D) Beta Testing team
Question 68
Question 68
In Software Engineering, COCOMO means ____.
(A) Constructive Cost Model
(B) Conclusive Cost Model
(C) Constructive Cohesion Model
(D) Conclusive Cohesion Model
Question 69
Question 69
Which of the following option is not a software life cycle model?
(A) Waterfall model
(B) Prototyping model
(C) Spiral model
(D) Seed model
Question 70
Question 70
In Software Engineering, Build and Fix model has ____ number of phases.
(A) 1
(B) 2
(C) 3
(D) 4
Question 71
Question 71
In software engineering, Waterfall model maintains the sequence of stages as follows:
(A) Testing the Product -> Requirement Analysis and Planning -> Designing the Product Architecture -> Building or Developing the Product -> Feasibility Study -> Deployment in the Market and Maintenance.
(B) Requirement Analysis and Planning -> Feasibility Study -> Designing the Product Architecture -> Building or Developing the Product -> Testing the Product -> Deployment in the Market and Maintenance.
(C) Designing the Product Architecture -> Requirement Analysis and Planning -> Feasibility Study -> Building or Developing the Product -> Testing the Product -> Deployment in the Market and Maintenance.
(D) Feasibility Study -> Requirement Analysis and Planning -> Designing the Product Architecture -> Building or Developing the Product -> Testing the Product -> Deployment in the Market and Maintenance.
Question 72
Question 72
In machine learning, Bayes error rate is considered as the _____ possible error rate for a given class of classifier.
(A) highest
(B) medium
(C) lowest
(D) median
Question 73
Question 73
Markov property supports ____.
(A) only current state
(B) current & previous states
(C) only previous state
(D) only next state
Question 74
Question 74
In machine learning, ____ is considered as the generalized formula of distance measurement.
(A) Distance metric
(B) Minkowski metric
(C) Classification
(D) Clustering
Question 75
Question 75
In machine learming, Viterbi path is used in ____.
(A) dynamic programming algorithm for clustering
(B) dynamic programming algorithm for classification
(C) static programming algorithm for clustering
(D) static programming algorithm for classification
Question 76
Question 76
In machine learning, CART is a ____.
(A) classification and regression tree based algorithm
(B) clustering and regression tree based algorithm
(C) decision tree algorithm
(D) artificial neural algorithm
Question 77
Question 77
In machine learning, perceptron can be considered as artificial
(A) neutron
(B) neuron
(C) nucleus
(D) atom
Question 78
Question 78
In linear discriminant function based classifier, decision boundary is considered as ____.
(A) plane
(B) hypoplane
(C) hyperplane
(D) pseudoplane
Question 79
Question 79
In hierarchical clustering, CF tree is ____ tree which stores clustering features.
(A) weight balanced
(B) width balanced
(C) height balanced
(D) not a balanced
Question 80
Question 80
Loss function states ____ in Bayesian decision theory.
(A) normal distribution
(B) normal density
(C) exactly how cheap each action is
(D) exactly how costly each action is
Question 81
Question 81
What is the output of the following program?
#include <stdio.h>
void main() {
int z=50;
printf(“%d”,z++++++z);
}
(A) 53
(B) Compiler error
(C) 52
(D) lvalue required
Question 82
Question 82
Select the memory handling functions from the following options:
(A) malloc
(B) free
(C) calloc
(D) realloc
Question 83
Question 83
Which of the following are good reasons to use an object oriented language?
(A) you can define your own data types
(B) an object oriented program can be taught to correct its own errors
(C) it is easier to conceptualize an object oriented program
(D) you can use polymorphism
Question 84
Question 84
In view of object oriented programming, select the correct statement(s).
(A) Constructors return values
(B) Constructors do not return values
(C) Constructors cannot be overloaded
(D) Destructors do not have return values
Question 85
Question 85
In unix/linux platform, which of the following statement(s) is (are) not correct?
(A) vim editor is the improved version of vi editor
(B) vi editor commands are not case sensitive
(C) vi editor has two modes of operation: command mode and insert mode
(D) vi is not a text editor
Question 86
Question 86
Example of linear data structure is ____.
(A) Linked-list
(B) Graph
(C) Tree
(D) Stack
Question 87
Question 87
In operating system, process means ____.
(A) a program in high level language
(B) instance of a computer program
(C) a job in secondary memory
(D) a program in execution
Question 88
Question 88
Which type of operating system fetches data and gives response in terms of actual time?
(A) Time sharing system
(B) RTOS
(C) Real-time operating system
(D) Job processing system
Question 89
Question 89
In operating system, fork is ____.
(A) dispatching of a task
(B) creation of a child process
(C) creation of a new process
(D) increasing priority of a task
Wipro Previous Year Questions
Question 90
Question 90
In operating system, file attributes are ____.
(A) Name
(B) Type
(C) Location
(D) Processor
Question 91
Question 91
Producer-consumer is a ____ problem in operating system level.
(A) deadlock
(B) synchronization
(C) memory
(D) multi-process synchronization
Question 92
Question 92
What do you mean by binary semaphore? Select the correct option(s).
(A) Only one entity can access the critical section at any time instance.
(B) Make available several access tokens to a given critical section.
(C) It can have only two values (0, 1).
(D) It can have only three values (-1, 0, 1).
Question 93
Question 93
Select the protocol(s) utilized for delivering email over Internet.
(A) FTP
(B) SMTP
(C) POP
(D) IMAP
Question 94
Question 94
IPv4 header consists of ____.
(A) Version
(B) TTL
(C) Source IP address
(D) Destination IP address
Question 95
Question 95
Choose the correct option(s) for functions of DBMS.
(A) Concurrency
(B) Non-shareable database
(C) Backup and recovery
(D) Database schema
Question 96
Question 96
Select the correct option(s) regarding “Union” and “Union AIl” in SQL.
(A) “Union” removes duplicate rows.
(B) “Union” does not remove duplicate rows.
(C) “Union all” removes duplicate rows.
(D) “Union All” does not remove duplicate rows.
Question 97
Question 97
Choose of the correct option(s) for the type of ordered index used in DBMS.
(A) Light index
(B) Dense index
(C) Sparse index
(D) Thread index
Question 98
Question 98
Select the correct option(s) for query processing in DBMS.
(A) Parsing
(B) Translation
(C) Optimization
(D) Evaluation
Question 99
Question 99
Select the process metrics used in software engineering for typical measurements to evaluate the performance of the proposed system.
(A) Productivity
(B) Error Rate
(C) Plan
(D) Efficiency
Question 100
Question 100