0% found this document useful (0 votes)
19 views9 pages

40 MCQs

The document contains 40 multiple-choice questions (MCQs) designed for an Associate Software Engineer Internship, covering topics such as Database Management Systems (DBMS), Computer Networking, Data Structures, Operating Systems, and Programming Fundamentals. Each section includes 8 questions with an answer key and explanations provided for each answer. The questions aim to simulate the difficulty level and topics of Odessa Company's online assessment for internship candidates.

Uploaded by

vkey1405
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views9 pages

40 MCQs

The document contains 40 multiple-choice questions (MCQs) designed for an Associate Software Engineer Internship, covering topics such as Database Management Systems (DBMS), Computer Networking, Data Structures, Operating Systems, and Programming Fundamentals. Each section includes 8 questions with an answer key and explanations provided for each answer. The questions aim to simulate the difficulty level and topics of Odessa Company's online assessment for internship candidates.

Uploaded by

vkey1405
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Odessa Company - 40 MCQs for Associate Software Engineer

Internship
Practice Questions covering DBMS, Computer Networking, Data Structures, Operating Systems, and
Programming Fundamentals

DBMS (Database Management Systems) - 8 Questions


1. Which of the following is NOT a property of ACID in database transactions? a) Atomicity
b) Consistency
c) Isolation
d) Availability

2. What is the purpose of a Primary Key in a database table? a) To create indexes automatically
b) To uniquely identify each row in a table
c) To establish relationships between tables
d) To improve query performance

3. Which normal form eliminates partial dependency? a) 1NF


b) 2NF
c) 3NF
d) BCNF

4. In SQL, which command is used to remove a table from the database? a) DELETE TABLE
b) REMOVE TABLE
c) DROP TABLE
d) TRUNCATE TABLE

5. What type of join returns all rows from both tables, filling with NULL where no match
exists? a) INNER JOIN
b) LEFT JOIN
c) RIGHT JOIN
d) FULL OUTER JOIN

6. Which of the following is used to maintain data integrity in databases? a) Triggers


b) Constraints
c) Stored Procedures
d) All of the above

7. What is a Foreign Key? a) A key that is used to encrypt data


b) A key that references the primary key of another table
c) A key that is stored in external files
d) A key that cannot be modified

8. Which SQL clause is used to filter groups in aggregate functions? a) WHERE


b) GROUP BY
c) HAVING
d) ORDER BY

Computer Networking - 8 Questions


9. How many layers are there in the OSI model? a) 5
b) 6
c) 7
d) 8

10. Which protocol is used for sending emails? a) POP3


b) IMAP
c) SMTP
d) HTTP

11. What is the default port number for HTTP? a) 21


b) 23
c) 80
d) 443

12. Which layer of the OSI model is responsible for routing? a) Physical Layer
b) Data Link Layer
c) Network Layer
d) Transport Layer

13. What does TCP stand for? a) Transmission Control Protocol


b) Transport Control Protocol
c) Transfer Control Protocol
d) Terminal Control Protocol

14. Which of the following is a connectionless protocol? a) TCP


b) UDP
c) FTP
d) SMTP

15. What is the maximum length of an IPv4 address? a) 32 bits


b) 64 bits
c) 128 bits
d) 256 bits
16. Which device operates at the Network Layer of the OSI model? a) Hub
b) Switch
c) Router
d) Repeater

Data Structures - 8 Questions


17. What is the time complexity of searching an element in a balanced Binary Search Tree? a)
O(1)
b) O(log n)
c) O(n)
d) O(n log n)

18. Which data structure follows the LIFO (Last In First Out) principle? a) Queue
b) Stack
c) Array
d) Linked List

19. What is the worst-case time complexity of Quick Sort? a) O(n log n)
b) O(n²)
c) O(n)
d) O(log n)

20. In which traversal of a Binary Search Tree do we get elements in sorted order? a) Preorder
b) Inorder
c) Postorder
d) Level order

21. What is the space complexity of Merge Sort? a) O(1)


b) O(log n)
c) O(n)
d) O(n²)

22. Which of the following is NOT a linear data structure? a) Array


b) Stack
c) Queue
d) Tree

23. What is the time complexity of inserting an element at the end of a dynamic array? a)
O(1) amortized
b) O(n)
c) O(log n)
d) O(n log n)
24. In a min-heap, the parent node is: a) Greater than its children
b) Smaller than its children
c) Equal to its children
d) No specific relationship

Operating Systems - 8 Questions


25. What is a deadlock in operating systems? a) A situation where processes are waiting
indefinitely for resources
b) A situation where the CPU is idle
c) A situation where memory is full
d) A situation where disk space is insufficient

26. Which scheduling algorithm gives the shortest average waiting time? a) FCFS (First Come
First Serve)
b) SJF (Shortest Job First)
c) Round Robin
d) Priority Scheduling

27. What is the purpose of virtual memory? a) To increase CPU speed


b) To provide more physical memory than actually available
c) To protect the kernel
d) To manage file systems

28. Which of the following is NOT a type of system call? a) Process control
b) File management
c) Memory allocation
d) Communication

29. What is thrashing in operating systems? a) High CPU utilization


b) Excessive paging activity
c) Memory leakage
d) Process synchronization issue

30. Which algorithm is used for page replacement in virtual memory? a) FIFO
b) LRU
c) Optimal
d) All of the above

31. What is a race condition? a) Competition between processes for CPU time
b) Multiple processes accessing shared data simultaneously
c) Processes running faster than expected
d) Memory access conflicts
32. Which of the following is a synchronization primitive? a) Semaphore
b) Mutex
c) Monitor
d) All of the above

Programming Fundamentals - 8 Questions


33. What is the output of the following C code?

int x = 5;
printf("%d", ++x + x++);

a) 11
b) 12
c) 13
d) Undefined behavior

34. Which of the following is NOT an object-oriented programming principle? a)


Encapsulation
b) Inheritance
c) Polymorphism
d) Compilation

35. What is the difference between '==' and '===' in JavaScript? a) No difference
b) == checks type and value, === checks only value
c) == checks only value, === checks type and value
d) === is used for strings only

36. What is method overloading? a) Multiple methods with the same name but different
parameters
b) Redefining a method in a subclass
c) Creating multiple classes with the same name
d) Using the same method in multiple files

37. What is the time complexity of binary search? a) O(1)


b) O(log n)
c) O(n)
d) O(n log n)

38. Which of the following is a compile-time error? a) Division by zero


b) Array index out of bounds
c) Missing semicolon
d) Null pointer exception

39. What is recursion? a) A function calling another function


b) A function calling itself
c) Multiple functions with the same name
d) A loop that runs indefinitely

40. In which memory area are local variables stored? a) Heap


b) Stack
c) Data segment
d) Code segment

Answer Key with Explanations

DBMS Questions (1-8)


1. Answer: d) Availability Explanation: ACID properties are Atomicity, Consistency, Isolation, and
Durability. Availability is part of CAP theorem, not ACID.

2. Answer: b) To uniquely identify each row in a table Explanation: Primary key ensures each
row has a unique identifier, preventing duplicate records and enabling efficient data retrieval.

3. Answer: b) 2NF Explanation: Second Normal Form (2NF) eliminates partial dependency by
ensuring non-key attributes depend on the entire primary key, not just part of it.

4. Answer: c) DROP TABLE Explanation: DROP TABLE permanently removes the entire table
structure and data. DELETE removes rows, TRUNCATE removes all rows but keeps structure.

5. Answer: d) FULL OUTER JOIN Explanation: FULL OUTER JOIN returns all rows from both
tables, using NULL values where no matching data exists in either table.

6. Answer: d) All of the above Explanation: Triggers, constraints, and stored procedures all help
maintain data integrity by enforcing rules and validating data.

7. Answer: b) A key that references the primary key of another table Explanation: Foreign key
creates relationships between tables by referencing the primary key of another table, ensuring
referential integrity.

8. Answer: c) HAVING Explanation: HAVING filters groups created by GROUP BY clause, while
WHERE filters individual rows before grouping.

Computer Networking Questions (9-16)


9. Answer: c) 7 Explanation: OSI model has 7 layers: Physical, Data Link, Network, Transport,
Session, Presentation, and Application.
10. Answer: c) SMTP Explanation: SMTP (Simple Mail Transfer Protocol) is used for sending
emails. POP3 and IMAP are for receiving emails.

11. Answer: c) 80 Explanation: HTTP uses port 80 by default. HTTPS uses port 443, FTP uses port
21, Telnet uses port 23.

12. Answer: c) Network Layer Explanation: Network Layer (Layer 3) handles routing between
different networks using IP addresses.

13. Answer: a) Transmission Control Protocol Explanation: TCP stands for Transmission Control
Protocol, providing reliable, connection-oriented communication.

14. Answer: b) UDP Explanation: UDP (User Datagram Protocol) is connectionless - it sends data
without establishing a connection first.

15. Answer: a) 32 bits Explanation: IPv4 addresses are 32 bits long, written as four 8-bit numbers
(e.g., 192.168.1.1). IPv6 uses 128 bits.

16. Answer: c) Router Explanation: Routers operate at Network Layer, making routing decisions
based on IP addresses. Hubs/repeaters work at Physical Layer, switches at Data Link Layer.

Data Structures Questions (17-24)


17. Answer: b) O(log n) Explanation: In a balanced BST, search divides the problem in half at each
step, resulting in logarithmic time complexity.

18. Answer: b) Stack Explanation: Stack follows LIFO - the last element added is the first one
removed. Queue follows FIFO.

19. Answer: b) O(n²) Explanation: Quick Sort's worst case occurs when pivot is always the
smallest/largest element, leading to quadratic time.

20. Answer: b) Inorder Explanation: Inorder traversal of BST visits nodes in ascending order: left
subtree → root → right subtree.

21. Answer: c) O(n) Explanation: Merge Sort needs extra space to store the divided arrays during
merging, requiring linear space.

22. Answer: d) Tree Explanation: Trees are hierarchical (non-linear) structures. Arrays, stacks, and
queues are linear data structures.

23. Answer: a) O(1) amortized Explanation: Most insertions at end are O(1), but occasionally
array needs resizing (O(n)). Averaged over many operations, it's O(1).

24. Answer: b) Smaller than its children Explanation: In min-heap, parent is always smaller than
its children. In max-heap, parent is larger than children.
Operating Systems Questions (25-32)

25. Answer: a) A situation where processes are waiting indefinitely for resources Explanation:
Deadlock occurs when processes form a circular wait for resources, causing all to wait forever.

26. Answer: b) SJF (Shortest Job First) Explanation: SJF minimizes average waiting time by
executing shorter jobs first, proven mathematically optimal.

27. Answer: b) To provide more physical memory than actually available Explanation: Virtual
memory uses disk space to simulate more RAM, allowing larger programs to run on systems with
limited physical memory.

28. Answer: c) Memory allocation Explanation: Memory allocation is handled by system calls like
malloc(), but it's not a separate category. The main categories are process control, file management,
and communication.

29. Answer: b) Excessive paging activity Explanation: Thrashing occurs when system spends
more time swapping pages than executing processes, severely degrading performance.

30. Answer: d) All of the above Explanation: FIFO, LRU (Least Recently Used), and Optimal are all
valid page replacement algorithms used in virtual memory management.

31. Answer: b) Multiple processes accessing shared data simultaneously Explanation: Race
condition occurs when multiple processes access shared resources concurrently, leading to
unpredictable results.

32. Answer: d) All of the above Explanation: Semaphores, mutexes, and monitors are all
synchronization primitives used to coordinate access to shared resources.

Programming Fundamentals Questions (33-40)


33. Answer: d) Undefined behavior Explanation: The expression ++x + x++ modifies variable x
twice without an intervening sequence point, causing undefined behavior in C.

34. Answer: d) Compilation Explanation: The main OOP principles are Encapsulation, Inheritance,
Polymorphism, and Abstraction. Compilation is a process, not a principle.

35. Answer: c) == checks only value, === checks type and value Explanation: In JavaScript, ==
performs type coercion (converts types), while === checks both type and value without conversion.

36. Answer: a) Multiple methods with the same name but different parameters Explanation:
Method overloading allows same method name with different parameter types/counts. Overriding
is redefining in subclass.

37. Answer: b) O(log n) Explanation: Binary search divides search space in half at each step,
resulting in logarithmic time complexity.
38. Answer: c) Missing semicolon Explanation: Missing semicolon is detected during
compilation. Others (division by zero, array bounds, null pointer) occur during runtime.

39. Answer: b) A function calling itself Explanation: Recursion is when a function calls itself with
modified parameters, often used to solve problems that can be broken into smaller similar
problems.

40. Answer: b) Stack Explanation: Local variables are stored in stack memory, which is
automatically managed and cleaned up when function ends. Heap stores dynamically allocated
memory.

Note: These questions are designed to simulate the difficulty level and topics covered in Odessa
Company's online assessment for Associate Software Engineer Internship positions. Practice these
concepts thoroughly and understand the reasoning behind each answer.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy