Tuesday 23 June 2020

TCS XPLORE ITIS Miscellaneous Linkedin Courses

ITIS Miscellaneous Final Assessment

Q1.The storage that is directly attached to the computer network (LAN) is called

Answer: NAS

Q2. The disk locally attached to the server is called _________.

Answer: DAS

Q3. Point-in-time copy of source volume is called _____.

Answer: Snapshot

Q4. Port no for SMTP protocol

Answer: 25

Q5. An event that is generated when a service or device is approaching a threshold is called

Answer: Warning

Q6. unsolicited bulk emails messages are known as

Answer: Spam

Q7. Which of the following backup is easy to implement

Answer: None

Q8. Which RAID level is not fault tolerant

Answer: RAID 0

Q9. The backup which takes long time to restore?

Answer: Incremental backup

Q10. Backup is used to ________.

Answer: To restore data, recover files as well as replication data between sites

Q11. Which of the following is example for physical security?

Answer: Motion or Intrusion Detectors

Q12. What is the process of creating an exact copy of data?

Answer: Replication

Q13. Which of the following is not a level security in FC SAN?

Answer: Data Firewall

Q14. Which of the following is a file system used in virtual desktop interface?

Answer: NTFS

Q15. _______ is an example for mail server.

Answer: All of the above

Q16. Which one these are not an email agent?

Answer: MVA

Q17. An attack that redirects users from the legitimate website they intended to visit and lead them to malicious ones.

Answer: Pharming

Q18. Which one is not a messaging protocol.

Answer: SNMP

Q19. Which is the minimum number of hard disk required to setup RAID 1.

Answer: Two

Q20. Display terminal connecting to a hosted virtual desktop is known as

Answer: Thin client

Q21.  Software that track your internet browsing habits and send you pop up containing advertisements known as 

Answer: Adware

Q22. Which of the following is independent malicious program that need not any host program?

Answer: Trojan horse

Q23. The collection of information stored in the database is called ______.

Answer: Instance of the database

Q24. An attack that redirects users from the legitimate website they intended to visit and lead them to malicious ones.

Answer: Pharming

Q25. Benefits of desktop centralization includes

Answer: All of the above

Wednesday 17 June 2020

TCS XPLORE ITIL Phase 5

ITIL Phase 5 Final Assessment

Q1. Which of the following is not a primary concern of Service Strategy?

Answer: Defining a Release plan

Q2. Which of the following is an objective of Problem Management?

Answer: All of the above

Q3. Consider the following list 1. Change authority 2. Change manager 3.Change advisory board (CAB Which one of the following is the BEST description of the items above.

Answer: Roles people or groups

Q4. At what frequency is the inventory of assets taken ?

Answer: Once in Six months

Q5. Which is the following process is not part of Service Operation Lifecycle

Answer: Change Management

Q6. Which of the following is NOT an objective of service transition?

Answer: To provide training and certification in project management

Q7. What are the three elements of the Service Portfolio?

Answer: Service Pipeline Service Catalogue Retired Services

Q8. How Many phases are in the ITIL lifecycle

Answer: 5

Q9. What is ECAB?

Answer: Emergency Change Advisory Board

Q10. What is ITSCM?

Answer: IT Service Continuity Management

Q11. ITIL first Published by

Answer: Office of UK government

Q12. KPI stands for

Answer: Key Performance Indicator

Q13. Which of the following is not a service desk type recognized in the service operation volume of ITIL?

Answer: Outsourced

Q14. BRM stands for

Answer: Business Relationship Management

Q15. Which of the following BEST describes a problem?

Answer: The cause of two or more incidents

Q16. The main objective of Change Management is to

Answer: Ensure that standardized methods and procedures are used for handling all changes

Q17. Which of the following activities are performed by a service desk?
1. Logging details of incidents and service requests 
2. Providing first-ine message diagnosis
3. Restoring service
4.Implementing all standard

Answer: 1, 2 and 3 only

Q18. Which is NOT an activity of Change Management Process?

Answer: Status Accounting

Q19. Demand Management is to Understand customer requirements for service and how these vary over the business cycle and Ensure the provision of approprite levels of service

Answer: TRUE

Q20. Sequence of activities combined to achieve a certain goal is called

Answer: Process

Tuesday 16 June 2020

TCS XPLORE ITIS Operating System Linkedin Courses

ITIS Operating System Final Assessment



Q1. Server manager is great tool for managing most of your server settings and configuration all in one central place Which one of the following S feature is used for Storage management, replication and searching?

Answer: File Services

Q2. Which program loads the OS in to the RAM while booting?

Answer: Bootstrap program

Q3. Which among these can be used for managing devices in windows 10?

Answer: All the options

Q4. A company wants to ensure that other mail servers on the Internet can locate its company based email server. What type of record is needed?

Answer: MX

Q5. What should be used to protect data in hard drive

Answer: Bitlocker

Q6. The command to get IP Address details in Windows 7 ?

Answer: ipconfig /all

Q7. Which protocol is used in Active Directory for Authentication

Answer: LDAP

Q8. Command to view contents of file named testfile

Answer: cat textfile

Q9. Server chassis housing multiple thin modular electronic boards are

Answer: Blade server

Q10. ______ is the microsoft's voice controlled digital assistant in windows 10

Answer: Cortana

Q11. Which desktop feature has been included in windows 10 which was not included in windows 10?

Answer: Start Menu

Q12. DNS server respond will use Port number

Answer: 53

Q13. What is the function of SMPS?

Answer: regulates AC or DC input voltage to DC output voltage

Q14. What type of file system does Linux support

Answer: both ext4 and xfs

Q15. Which directory path in RHEL does files related to hardware devices present ?

Answer: /dev

Q16. John has created a local group named Engineering on a client running Windows 7. He wants to assign appropriate share permissions to the Engineering group to ensure that users are able to add modify, and delete files located in the Engineering shared folder. He does not want the members of the group to modify the Shared permissions of the folder. Which of the following share permissions should be assigned to the Engineering foldes?

Answer: Read

Q17. Which is the default bootloader in RHEL

Answer: grub

Q18. You manage a Windows Server 2012 R2 system named CorpServe. Your supervisor asks you to add a server role to a different Windows Server 2012 R2 system located in a different building named Reserve. Which feature could you use to do this from the console of CorpServer?

Answer: Server Manager

Q19. Which of the following tools can you use to determine if the applications, devices and hardware on your computer running Windows Vista are known to have problems with Windows

Answer: PEImg

Q20. The configuration file associated with user related information is


Answer: /etc/passwd

Q21. Controlling and monitoring of servers from remote location can be done using

Answer: Integrated Lights Out

Q22. ________ provides 64 bit path to the processor.

Answer: DIMM

Q23. If I want to have more than four partition on my disk which disk type would you prefer

Answer: GPT disk

Q24. How will you identify a failed service in Windows 10?

Answer: Using Event viewer

Q25. Which among the following statement is not true regarding motherboard

Answer: PCB provides an interconnect to every component present in PC

Wednesday 27 May 2020

AsCEnD Advanced Java Programming

Java Advanced & Java Part 1 Advanced Assessment

Q1. Which of the following statements are correct?

Answer: Strings in java are immutable.
              Every string is an object of class String.
              StringBuffer class is used to store string in a buffer for later use.
              Java defines a peer class of String, called StringBuffer, which allows string to be altered.

Q2. Which of the following is not a wrapper class in java?

Answer: Char

Q3. Which collection class allows you to grow or shrink its size and provides indexed access to its elements, but whose methods are not synchronized?

Answer: java util ArrayList

Q4. Which of these are runtime exceptions in JAVA ?

Answer: NullPointerException
              ArrayIndexOutOfBoundsException

Q5. Why are generics used?

Answer: Generics add stability to your code by making more of your bugs detectable at compile time.

Q6. To explicitly throw an exception, the keyword _______ is used

Answer: throw

Q7. ArrayList is synchronized

Answer: false

Q8. Which of the following statement is incorrect?

Answer: FileNotFoundException is a runtime exception

Q9. Is it possible to do both of the following. Override protected method to public Override protected method to private

Answer: Only option 1 is possible. You can override protected to public, but not protected to private.

Q10. Which of these interfaces only store unique elements?

Answer: Set

Q11. Select one or more true statements

Answer: 
List implementation dynamically grow in size, allow duplicates and are implicitly not sorted
A set does not store duplicate values
HashMap and Hashtable both store key value pairs, Hashtable we would use in case of synchronization requirements.
All Set implementations are sorted

Q12. Which of these is a correct statement?

Answer: 
Abstract class can be inherited.
Abstract class defines only the structure of the class not its implementation.
Every class containing abstract method must be declared abstract.

Q13. A method can specify its ability to throw an exception by using the ______ keyboard.

Answer: Throws

Q14. Is it possible to define a class so that it cannot be subclassed?

Answer: Yes, by making the class final

Q15. Which of the following statement is incorrect?

Answer: final methods can be overridden

Q16. public class Test{
public static void main(String args[]){
int k=0;
try{
 int i=5/k;
}
catch (ArithmeticException e){
System.out println("1");
}
catch (RuntimeException e){
System out println("2");
return
catch (Exception e){
System.out.println("3");
}
finally{
System.out.println("4");
}
System.out println("5");
}
}
What would be the output of above program?

Answer: 145

Q17. Assume we have the following classes

class ParentClass
{
int id;
class ChildClass extends ParentClass
{
String name;
}
public class MainClass
{
{
//Withings go here
}
}
Which statements are valid to use in our main method?

Answer: ChildClass x = new ChildClass();
       ParentClass x = new ParentClass();
       ParentClass x = new ChildClass();

Q18. Would this program compile?

interface A{
public void method 1();
}
interface B{ 
public void method 1();
}
public class Test implements A, B{
public void method 1(){
}
}

Answer: Yes, It will compile successfully.

Q19. What will be the output?
try{
int x=;
int y = 5/x;
}
catch (Exception e){
System.out println("Exception");
}
Catch (ArithmeticException ae){
System.out.printin(" Arithmetic Exception
catch (ArithmeticException ae){
System.out.println(" Arithmetic Exception");
}
System.out println("finished");

Answer: Compilation fails

Q20. What will be the output?
import java.util.*;
class Output{
public static void main(String args[]){
ArrayList obj = new ArrayList();
obj.add("A");
obj.add("A");
System.out.println(obj.size());
}
}

Answer: 2

Q21. Map<String, String> obj = new HashMap<String, String>();
obi.put("City","Goa");
obj put("City","Shimla");
obj put("City","Pune");
obj put("CityName", "Shimla");

Select one or more true statements for above code

Answer: Values in a Map can be duplicated
       Following values will be stored in HashMap {CityName=Shimla, City= Pune}

Q22. What will be the output?

import java.util.HashMap;
import java.util.Map;
public class MapTest{
public static void main(String args[]) {
Map m = new HashMap();
m.put(null, "Test");
m.put(null, "Fest");
System.out.println(m);
}
}

Answer: {null=Fest}

Q23. What is the output of the below code:

public static void main(String args[])
{
ArrayList<String> myList = new ArrayList<String>();
myList.add("item I");
myList.add("Another Item");
myList.add("Last Item");
for(String s : mylist)
{
System.out.print(s.charAt(0));
}
}

Answer: IAL

Q24. What will be the output?

import.java.util.*;
class Output {
public static void main(String args])
{
ArrayList obj = new ArrayList();
obj add("A");
obj remove("A");
System.out.println(obj.size());
}
}

Answer: 0

Q25. What is the output of the below code:

public static void main(String args[]){
ArrayList myList = new ArrayList();
myList.add("item I");
myList.add("Another Item");
myList.add("Last Item");
for(String s : mylist)
{
System.out.print(s.charAt(0));
}
}

Answer: IAL

Q26. Consider the following class.
class Test
{
int x;
public static void main(String[] args)
{
this.x=5; // Currently shows an error
}
}

Answer: main cannot access this.x

Q27. What will be the output?

class exception_handling {
public static void main(String args[]){
try {
int a = args.length;
int b = 10 / a;
System.out.print(a);
try {
if (a == 1);
a = a/a-a;
if (a == 2){
int c = {1};
c[8]= 9;
}
}
catch (ArrayindexOutOfBounds Exception e) {
System.out.println("Type");
catch ArithmeticException e){
System.out.printin("TypeB");
}
}
}

Answer: Compilation error

Q28. public class Test{
public static void main(String args[]){
try{
int answer 20/0;
}
catch(ArithmeticException e) {
//some code
}
catch (Exception e) {
//some code
catch (NullPointerException e){
//some code
}
}

Answer: 
We will get a compilation error for an unreachable catch block because NullPointerException is already handled by the catch block for exception
A Try block can have multiple catch blocks but the most generalized catch block should be the last one

Q29. public class Test{
enum eColors{
Black (5),
BLUE (10),
GREEN (15),
int color Code=0;
eColors(int colorCode){
this.colorCode=colorCode;
}
}
public static void main(String args[]){
System.out.println(color.values()[1].colorCode);
}
}
What will be the output?

Answer: 10

Q30. What will be the output?
public class RTExcept
{
public static void throwit ()
{
System.out.print("throw it");
throw new RuntimeException();
}
public static void main(String (] args)
{
try
{
System.out.println("hello);
}
catch (Exception re)
{
System.out.println("caught");
}
finally
{
System.out.print("finally");
}
System.out.println("after");
}
}

Answer: hello throwit caught finally after

Friday 22 May 2020

TCS Xplore Software Foundation SQL Final Assessment

SQL Final Assessment

Q1. Which SQL statement returns a numeric value?

Answer: SELECT sysdate-hire_date FROM EMP;

Q2. Which of the following is true with respect to Referential integrity ?

Answer: Every foreign key value must match a primary key value in the associated table ie Parent table.

Q3. We can use Transactional control statements in Database Triggers ? Select TRUE or FALSE

Answer: False

Q4. Select the suitable option from below to create an index on "job" column in emp table?

Answer: Create Index emp_id on emp(job);

Q5. Which of the below constraints will make sure to allow, only the values of a column (in a master) to the respective column of a child table?

Answer: foreign key

Q6. Select suitable option for Normalization importance on a Database?

Answer: To avoid redundancy
     Data would not lost
     To fetch the perfect and exact data, required
     Applying changes to the table data without effecting the other attributes

Q7. Which of the following is a type of constraint?

Answer: CHECK
     UNIQUE KEY
     DEFAULT
     PRIMARY KEY

Q8. DCL Commands are used to enforce database security in a multiple user environment.Select TRUE or False

Answer: TRUE

Q9. Which is the below statement is used to remove access or privileges on database object to users?

Answer: Revoke

Q10. Select the suitable option for SubQuery?

Answer: Inner query executes first and then based on the output of inner query the outer query executes

Q11. The formal classifications describing the level of database normalization in a data model are called Normal Forms. Select TRUE or False

Answer: TRUE

Q12. A column with reference to a record in a table should not have multiple values Which of the normal form, Talks about the above statement?

Answer: First

Q13. The DDL commands are

Answer: DROP
      ALTER
      CREATE

Q14. What is the grant statement to grant select, insert delete privileges on table: Emp to user: TestUser? Emp is the table Names; TestUser is the User Name.

Answer: Grant Select insert delete on Emp to TestUser

Q15. Types of SQL statements are

Answer: DML
       TCL
       DDL

Q16. In the below table: EmpId|EmpName|ProjId 1 a p1> 2 b p1 >> 3 c p2 >>> 4 d p1
By referring the above table, Select a suitable query which gets all employees whose project is same as project of 'd'?

Answer: SELECT * FROM EMP WHERE Projid=(SELECT Projid FROM EMP WHERE EMPNAME='d')

Q17. Table structure:
EmpId|EmpName|ProjId|MNGR-Id|Location|Designation
Assume that the respective data values / attributes referred in the options were exists in the table By referring to the above table structure, For which of the below questions, we would require to apply the concept of SubQuery?

Answer: Query to get employee whose designation is same of SWARNA'S designation
       Query to get employee details belonging to dept of RAJA

Q18. From the table below:
EmpId | EmpName | ProjId | Projname | No.ofHoursWorked
What are the probable and decomposed tables after performing second normal form?Let us assume that, an employee can work for multiple projects for the above scenario.

Answer: Table:EmpId | EmpNameTable2:ProjId | ProjNameTable3:EmpId | ProjId | No.of Hours worked

Q19. Table: Emp
EmpId | EmpName | ProjId > 1  a  p1 >> 2  b  p2 >>>3  c  p3
        Table2: Proj
Proj | ProjId | Projname > p  1  AAA >> p  2  BBB
By referring to the above table structure Select the Query which would letch EMPID EMPNAME Projld, ProjName for each employee?

Answer: SELECT EMPID.EMPNAME. B.Projld. B.ProjNAME FROM EMP A,Proj B WHEREA. PROTID=B.PROJID


Q20. From the table below:
EmpId | EmpName | ProjId | Projname | No.ofHoursWorked
Let us assume that, an employee can work for multiple projects for the above scenario. What would be the primary key to get unique record from the table?

Answer: EmpId and projId together