CYBERCREST - 2K24_TECHNICAL QUIZ_ROUND_1_SET_1

CYBERCREST - 2K24_TECHNICAL QUIZ_ROUND_1_SET_1

University

30 Qs

quiz-placeholder

Similar activities

QUIZ 4

QUIZ 4

University

25 Qs

PowerShell

PowerShell

University

25 Qs

TechNextGen

TechNextGen

University

25 Qs

Computing Essentials - Chapter 8

Computing Essentials - Chapter 8

University

30 Qs

Windows Server 2012 R2

Windows Server 2012 R2

University

30 Qs

A+ Core Lesson 1 & 2 [COR2]

A+ Core Lesson 1 & 2 [COR2]

University

29 Qs

TestOut Quiz DLP L/M

TestOut Quiz DLP L/M

9th Grade - University

34 Qs

CYBERCREST - 2K24_TECHNICAL QUIZ_ROUND_1_SET_1

CYBERCREST - 2K24_TECHNICAL QUIZ_ROUND_1_SET_1

Assessment

Quiz

Computers

University

Hard

Created by

Mohammad Luqhmaan

Used 5+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Specify the 2 library functions to dynamically allocate memory

malloc() and memalloc()

alloc() and memalloc()

malloc() and calloc()

memalloc() and faralloc()

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Can we pass a variable argument list to a function at run-time in C programming?

Yes

No

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Who invented C++?

  • Dennis Ritchie

Ken Thompson

Brian Kernighan

Bjarne Stroustrup

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the correct way to open a file `example.txt` for reading in Python

`file = open("example.txt", "r")` 

`file = open("example.txt", "w")` 

`file = open("example.txt", "read")` 

`file = open("example.txt", "rb")` 

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following statements is correct about the `lambda` keyword in Python?

Used to define a multiline function

Used to create anonymous functions 

Used to declare variable names 

Used to define class methods 

 

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What do you mean by chained exceptions in Java

Exceptions occurred by the VirtualMachineError

An exception caused by other exceptions

Exceptions occur in chains with discarding the debugging information

None of the above

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The topology that covers security, robust, and eliminating the traffic factor or control is known as

Mesh

Ring

Bus

Star

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?