Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

A programming technique in which the focus is on doing things.(a) object oriented(b) procedural(c) logical(d) structuralThis question was addressed to me in class test.This question is from Concepts of OOP topic in section Information Technology of Computer Fundamentals

Answer» RIGHT answer is (b) PROCEDURAL

Best EXPLANATION: In procedural programming, the focus is on doing things(functions). It follows top-down APPROACH.
2.

A basic unit of object-oriented programming.(a) module(b) block(c) object(d) tokenThe question was posed to me during an interview.This is a very interesting question from Concepts of OOP in division Information Technology of Computer Fundamentals

Answer»

Correct answer is (c) OBJECT

Easiest EXPLANATION: In OOP, the BASIC unit is an object. Objects are identified by its unique NAME.

3.

A procedural programming follows ___________ approach.(a) top-down(b) bottom-up(c) left-right(d) right-leftThis question was posed to me during an internship interview.This intriguing question comes from Concepts of OOP in division Information Technology of Computer Fundamentals

Answer» RIGHT answer is (a) top-down

Explanation: A PROCEDURAL programming follows top-down approach. The main FOCUS is on the FUNCTIONS. It has a lot of global variable.
4.

__________ represents a particular instance of a class.(a) module(b) block(c) object(d) tokenI have been asked this question at a job interview.This is a very interesting question from Concepts of OOP topic in portion Information Technology of Computer Fundamentals

Answer» RIGHT option is (C) object

The EXPLANATION is: An object is an instance of the class. The data members are accessed with the help of objects.
5.

A concept that combines data and functions into a single unit called class.(a) inheritance(b) encapsulation(c) polymorphism(d) abstractionThe question was asked in homework.I want to ask this question from Concepts of OOP in division Information Technology of Computer Fundamentals

Answer»

The correct OPTION is (b) ENCAPSULATION

Explanation: Encapsulation enables the important concept of data hiding possible. It combines data and FUNCTIONS into a single unit.

6.

The ability for programmers to use the same written and debugged existing class.(a) Reusability(b) Design(c) Debugging(d) ImplementationI had been asked this question during an online exam.Question is taken from Concepts of OOP in division Information Technology of Computer Fundamentals

Answer» CORRECT ANSWER is (a) Reusability

The explanation: The PROGRAMMER can add features to the existing class. The programmer on further developing the application, and ALLOWING users to achieve increased performance.
7.

Abstraction combines the data and functions into a single unit called a class.(a) True(b) FalseThe question was asked by my college professor while I was bunking the class.My doubt stems from Concepts of OOP in chapter Information Technology of Computer Fundamentals

Answer»

The CORRECT option is (b) False

Easiest explanation: The statement is false. Data abstraction INVOLVES hiding the DETAILS and giving only the necessary INFORMATION to the user.

8.

This concept allows routines to use data again at different times.(a) Abstraction(b) Polymorphism(c) Inheritance(d) ImplementationI got this question during an online exam.This intriguing question comes from Concepts of OOP in chapter Information Technology of Computer Fundamentals

Answer» RIGHT CHOICE is (b) Polymorphism

For explanation I WOULD say: Polymorphism is a concept in OOP WHEREIN different functions can be used again at different TIMES.
9.

The process of forming a new class from an existing class.(a) Abstraction(b) Polymorphism(c) Inheritance(d) ImplementationThe question was asked during an online interview.My question is taken from Concepts of OOP topic in division Information Technology of Computer Fundamentals

Answer»

Right answer is (c) Inheritance

Easiest explanation: The answer is inheritance. The base CLASS is the parent class and the NEW class is CALLED the CHILD class.

10.

A ______________ represents the need of information in the program without the presenting the details.(a) abstraction(b) polymorphism(c) implementation(d) classThis question was posed to me in quiz.This is a very interesting question from Concepts of OOP topic in division Information Technology of Computer Fundamentals

Answer»

Correct CHOICE is (a) abstraction

Explanation: Abstraction is a concept that INVOLVES hiding the details and giving only the necessary information to the user. It INCREASES the POWER of a programming LANGUAGE.

11.

A testing conducted at the developer’s site under validation testing.(a) alpha(b) gamma(c) lambda(d) unitThe question was asked by my college professor while I was bunking the class.Query is from Software Testing topic in section Information Technology of Computer Fundamentals

Answer» CORRECT OPTION is (a) alpha

Best EXPLANATION: Alpha testing is conducted at DEVELOPER’s site. It is conducted by customer in developer’s presence before software delivery.
12.

A ________ is tested to ensure that information properly flows into and out of the system.(a) module interface(b) local data structure(c) boundary conditions(d) pathsThe question was posed to me in a national level competition.My question is based upon Software Testing topic in section Information Technology of Computer Fundamentals

Answer»

The correct option is (a) module INTERFACE

The BEST I can explain: A module interface is TESTED to ensure that information properly FLOWS into and out of the SYSTEM.

13.

A testing strategy that tests the application in the context of an entire system.(a) System(b) Validation(c) Unit(d) Gray boxThe question was posed to me in a job interview.I would like to ask this question from Software Testing in chapter Information Technology of Computer Fundamentals

Answer»

The correct ANSWER is (a) System

The explanation: In system testing, it tests the application in the context of an entire system. The software and other system ELEMENTS are TESTED as a WHOLE.

14.

A testing strategy that test the application as a whole.(a) Requirement Gathering(b) Verification testing(c) Validation testing(d) System testingThis question was posed to me in homework.The query is from Software Testing topic in chapter Information Technology of Computer Fundamentals

Answer» RIGHT CHOICE is (d) SYSTEM testing

Easy explanation: VALIDATION testing tests the application as a whole against the user requirements. In system testing, it tests the application in the CONTEXT of an entire system.
15.

What do you call testing individual components?(a) system testing(b) unit testing(c) validation testing(d) black box testingThis question was addressed to me by my school principal while I was bunking the class.My question is taken from Software Testing in section Information Technology of Computer Fundamentals

Answer»

Correct OPTION is (b) unit testing

Explanation: The testing STRATEGY is called unit testing. It ensures a FUNCTION PROPERLY works as a unit.

16.

Which defines the role of software?(a) System design(b) Design(c) System engineering(d) ImplementationThis question was posed to me in class test.Asked question is from Software Testing in portion Information Technology of Computer Fundamentals

Answer»

Right answer is (c) System ENGINEERING

Easiest EXPLANATION: The answer is system engineering. System engineering defines the role of SOFTWARE.

17.

Locating or identifying the bugs is known as ___________(a) Design(b) Testing(c) Debugging(d) CodingI got this question during an online interview.This is a very interesting question from Software Testing topic in portion Information Technology of Computer Fundamentals

Answer»

The correct choice is (b) TESTING

For EXPLANATION I would say: Testing is conducted by the testers. They locate or identify the bugs. In debugging DEVELOPER FIXES the bug. CODING is done by the developers.

18.

Validation is computer based.(a) True(b) FalseI have been asked this question during a job interview.My question is taken from Software Testing topic in division Information Technology of Computer Fundamentals

Answer» RIGHT OPTION is (a) TRUE

Easiest explanation: The statement is true. VALIDATION is a computer based process. It uses METHODS like black box testing, gray box testing, etc.
19.

___________ is done in the development phase by the debuggers.(a) Coding(b) Testing(c) Debugging(d) ImplementationI got this question in final exam.This is a very interesting question from Software Testing in chapter Information Technology of Computer Fundamentals

Answer»

The CORRECT answer is (c) Debugging

Explanation: CODING is done by the DEVELOPERS. In debugging, the developer fixes the BUG in the development phase. Testing is conducted by the testers.

20.

A planned program if work that requires a definitive amount of time, effort and planning to complete.(a) Problem(b) Project(c) Process(d) ProgramI have been asked this question in final exam.My doubt is from Waterfall Model in chapter Information Technology of Computer Fundamentals

Answer»

Right ANSWER is (B) Project

To elaborate: The answer is Project. A project is a program which is something which is planned and needs EFFORT and time to COMPLETE.

21.

A set of activities that ensure that software correctly implements a specific function.(a) verification(b) testing(c) implementation(d) validationThis question was addressed to me in an internship interview.This intriguing question originated from Software Testing in chapter Information Technology of Computer Fundamentals

Answer»

Right option is (a) VERIFICATION

To EXPLAIN I would say: Verification ensures that software correctly IMPLEMENTS a SPECIFIC function. It is a static practice of verifying documents.

22.

An individual who plans and directs the work.(a) Stakeholder(b) Project manager(c) Team leader(d) ProgrammerI have been asked this question in an interview for internship.My enquiry is from Waterfall Model in portion Information Technology of Computer Fundamentals

Answer»

Correct answer is (b) PROJECT manager

The best I can explain: Project PLANNER is the one who plans and DESIGNS the project. Team leader is the one who provides guidance, instruction, direction and LEADERSHIP to a GROUP of individuals.

23.

Methodology in which project management processes were step-by step.(a) Incremental(b) Waterfall(c) Spiral(d) PrototypingThis question was addressed to me in final exam.Query is from Waterfall Model topic in division Information Technology of Computer Fundamentals

Answer»

Right choice is (b) Waterfall

The explanation: Waterfall model is BASED on STEP-by step completion of the PROJECT. Every step is DONE INDIVIDUALLY.

24.

The customer requirements are broken down into logical modules for ease of _______________(a) inheritance(b) design(c) editing(d) implementationI had been asked this question in final exam.My question is taken from Waterfall Model in division Information Technology of Computer Fundamentals

Answer»

Correct option is (d) IMPLEMENTATION

Easiest explanation: The requirements are BROKEN down for ease of implementation. Hardware and software requirements are identified and DESIGNED accordingly.

25.

What do you call a technical person who is capable of understanding the basic requirements?(a) team leader(b) analyst(c) engineer(d) stakeholderI had been asked this question in quiz.Query is from Waterfall Model in portion Information Technology of Computer Fundamentals

Answer»

Right ANSWER is (b) ANALYST

Easiest EXPLANATION: The PERSON is called an analyst. An analyst is a software engineering who is responsible for REQUIREMENTS gathering.

26.

A step in waterfall model that involves a meeting with the customer to understand the requirements.(a) Requirement Gathering(b) SRS(c) Implementation(d) Customer reviewThe question was asked by my school principal while I was bunking the class.My question is taken from Waterfall Model topic in division Information Technology of Computer Fundamentals

Answer»

Right choice is (a) Requirement GATHERING

For EXPLANATION: A waterfall model INVOLVES requirement gathering as its first step. This is the most important phase. It is important to UNDERSTAND the customer requirements.

27.

___________ is a step in which design is translated into machine-readable form.(a) Design(b) Conversion(c) Debugging(d) CodingThis question was addressed to me during an online exam.My question is from Waterfall Model in section Information Technology of Computer Fundamentals

Answer»

Correct ANSWER is (d) Coding

The EXPLANATION: Coding is the step in which design in TRANSLATED into machine-readable form. If design is EFFICIENT, coding can be done EFFECTIVELY.

28.

A stage in which individual components are integrated and ensured that they are error-free to meet customer requirements.(a) Coding(b) Testing(c) Design(d) ImplementationThe question was posed to me in examination.This interesting question is from Waterfall Model in section Information Technology of Computer Fundamentals

Answer»

Right option is (b) Testing

For explanation: Hardware and software components are TESTED individually. Testing stage in which individual components are INTEGRATED and ensured that they are error-free to MEET customer REQUIREMENTS.

29.

A _______ can be recorded using a normal light source.(a) Holograph(b) Photography(c) Holography(d) PhotographThis question was posed to me during an interview for a job.I need to ask this question from Augmented Reality topic in section Information Technology of Computer Fundamentals

Answer»

Right choice is (d) Photograph

To explain: A photograph can be captured using a normal light source. A LASER is REQUIRED to record a hologram.

30.

Maintenance is the final phase in waterfall model.(a) True(b) FalseThis question was posed to me in an interview.My question is from Waterfall Model in section Information Technology of Computer Fundamentals

Answer»

The CORRECT ANSWER is (a) True

Easiest explanation: The statement is true. This is the phase in which the completed SOFTWARE PRODUCT is handed over to the client.

31.

A model that is the demo implementation of the system.(a) waterfall(b) prototype(c) incremental(d) agileI got this question in an interview for internship.My doubt is from Waterfall Model in section Information Technology of Computer Fundamentals

Answer»

Right ANSWER is (b) prototype

For EXPLANATION: Prototype is the DEMO IMPLEMENTATION so that the customer gets a brief idea of his product. It is generally used when the customer REQUIREMENTS are not clear.

32.

A technique that enables light field which is generally the product of a light source scattered off objects.(a) AES(b) Holography(c) Cryptography(d) GyrographyI have been asked this question in exam.This intriguing question originated from Augmented Reality topic in division Information Technology of Computer Fundamentals

Answer»

Correct CHOICE is (b) Holography

Explanation: Holography enables a LIGHT field. It is to be RECORDED and later reconstructed when the original light field is no longer present.

33.

SLAM stands for?(a) Simultaneous localization and mapping(b) System localization and mapping(c) Simultaneous localization and maintenance(d) System localization and maintenanceI have been asked this question in exam.I'm obligated to ask this question of Augmented Reality in section Information Technology of Computer Fundamentals

Answer»

The correct option is (a) Simultaneous localization and mapping

To ELABORATE: SLAM is abbreviated for Simultaneous localization and mapping. It is a technique USED by robots and AUTONOMOUS vehicles to build a map within the UNKNOWN environment.

34.

A tracking based on geo-location information.(a) Location based(b) Markerless(c) Marker based(d) GPSThe question was posed to me in unit test.My query is from Augmented Reality topic in chapter Information Technology of Computer Fundamentals

Answer» CORRECT CHOICE is (a) Location based

The best I can explain: Location based tracking is based on geo-location information obtained from device’s location sensors. (LONGITUDE, LATITUDE, altitude etc).
35.

Wearable computing device in the form of computerized eyeglasses.(a) HMD(b) Helmets(c) Smart Glasses(d) VR GlassesThis question was posed to me in an online interview.The above asked question is from Augmented Reality topic in chapter Information Technology of Computer Fundamentals

Answer»

Right answer is (c) Smart Glasses

For explanation I WOULD SAY: Smart glasses are also called as optical HEAD mounted displays. (OHMD), it has the capability of reflecting projected images as WELL as allowing users to see through it.

36.

A ______________________ is a display device, worn on head as a part of helmet that has a small display optic.(a) HD(b) MD(c) HMD(d) ARDThe question was asked in an interview for internship.Question is taken from Augmented Reality in division Information Technology of Computer Fundamentals

Answer» RIGHT answer is (c) HMD

Explanation: HMD is the head-mounted display, worn on head as a part of helmet that has a small display OPTIC. HTC Vive, SAMSUNG GearVR are examples of HMDs AVAILABLE TODAY.
37.

Technologies that allow the user to see the real world, with virtual objects composited in the real world.(a) AR(b) VR(c) AI(d) SRThe question was posed to me in an interview for job.This is a very interesting question from Augmented Reality in portion Information Technology of Computer Fundamentals

Answer» RIGHT answer is (a) AR

Easy explanation: Augmented Reality (AR) allows a user to SEE REAL world, with virtual OBJECTS superimposed or composited with the real world.
38.

Under DES, the data encryption standard took a 64-bit block of data and subjected it to ______ levels of encryption.(a) 64(b) 8(c) 16(d) 4This question was addressed to me by my school teacher while I was bunking the class.The origin of the question is Cryptography in division Information Technology of Computer Fundamentals

Answer»

Right answer is (C) 16

To EXPLAIN I WOULD say: The answer is 16. It was subjected to 16 levels of ENCRYPTION. DES is the data encryption standard.

39.

Technologies that completely involve a user inside a synthetic environment.(a) AR(b) VR(c) AI(d) MLThe question was posed to me during an online exam.This question is from Augmented Reality in section Information Technology of Computer Fundamentals

Answer»

Right choice is (B) VR

For explanation I would SAY: The answer is VR or Virtual REALITY. VR technologies are known for immersing a user inside a synthetic environment. While immersed, the user cannot see the real WORLD around him.

40.

AR is interactive in real-time.(a) True(b) FalseI have been asked this question in my homework.Origin of the question is Augmented Reality in chapter Information Technology of Computer Fundamentals

Answer»

Correct choice is (a) True

Best explanation: The statement is true. Augmented Reality is the field of COMPUTER research that DEALS with the COMBINATION of real-world and computer generated DATA.

41.

A field of technology that deals with a combination of real world and the data generated from computer.(a) ML(b) AI(c) AR(d) IoTI got this question in homework.This key question is from Augmented Reality in chapter Information Technology of Computer Fundamentals

Answer»

The CORRECT choice is (c) AR

Explanation: AR that is Augmented Reality is a field of TECHNOLOGY that DEALS with a combination of REAL world and the data generated from computer.

42.

An electronic document that establishes your credentials when you are performing transactions.(a) Digital code(b) OTP(c) E-mail(d) Digital certificateThe question was asked during an online interview.I'm obligated to ask this question of Cryptography topic in division Information Technology of Computer Fundamentals

Answer»

The CORRECT option is (d) Digital certificate

For EXPLANATION I WOULD say: Digital certificate is an electronic document that is responsible for secure INTERNET TRANSACTIONS.

43.

Encryption standard that is selected by the US government to replace DES.(a) AES(b) BES(c) CES(d) DESI had been asked this question in an interview.The doubt is from Cryptography in chapter Information Technology of Computer Fundamentals

Answer»

The correct CHOICE is (a) AES

For explanation: AES is Advanced ENCRYPTION STANDARD. It was SELECTED by the US government. It is USED to replace DES.

44.

Triple-DES has ______ keys.(a) 1(b) 2(c) 5(d) 4The question was posed to me during an interview.Enquiry is from Cryptography in chapter Information Technology of Computer Fundamentals

Answer»

Right choice is (b) 2

The explanation: There are 2 keys in TRIPLE DES as WELL. The private and the public key. It can also have 3 UNIQUE keys.

45.

DES stands for?(a) Data Encryption Standard(b) Data Encryption Statistics(c) Data Encryption System(d) Data Encryption SequenceI got this question in examination.I want to ask this question from Cryptography topic in section Information Technology of Computer Fundamentals

Answer»

Correct answer is (a) Data Encryption Standard

To explain I would SAY: DES stands for Data Encryption Standard. It was created in 1977 and went into OPERATION from 1990s.

46.

A type of cipher that uses multiple alphabetic strings.(a) Substitution based(b) Transposition-based(c) Polyalphabetic substitution based(d) Mono alphabetic substitution basedI got this question by my school teacher while I was bunking the class.My doubt stems from Cryptography in portion Information Technology of Computer Fundamentals

Answer»

Right answer is (c) Polyalphabetic substitution based

The best EXPLANATION: These ciphers are similar to that of mono alphabetic ciphers. Multiple STRINGS are used to encode the PLAIN TEXT.

47.

Encryption is the study of creating and using decryption techniques.(a) True(b) FalseThis question was addressed to me in class test.The query is from Cryptography in division Information Technology of Computer Fundamentals

Answer»

Correct ANSWER is (b) False

The best explanation: The statement is false. Cryptography is the study of creating and using ENCRYPTION and DECRYPTION techniques.

48.

In public key cryptography, a key that decrypts the message.(a) public key(b) unique key(c) private key(d) security keyI have been asked this question in quiz.This interesting question is from Cryptography in section Information Technology of Computer Fundamentals

Answer»

Correct answer is (c) PRIVATE key

For EXPLANATION: Public key cryptography has 2 keys. They are private key and a public key. The public key encrypts the MESSAGE. The private key decrypts the message.

49.

An encryption technique with 2 keys is ______________(a) Monoalphabetic Cipher(b) Cryptography(c) Private key cryptography(d) Public key cryptographyI got this question in final exam.My question comes from Cryptography in chapter Information Technology of Computer Fundamentals

Answer»

The correct CHOICE is (d) Public KEY CRYPTOGRAPHY

To explain I would SAY: It is CALLED as public key cryptography. It has 2 keys: a private key and a public key.

50.

These ciphers replace a character or characters with a different character or characters, based on some key.(a) Polyalphabetic substitution based(b) Transposition-based(c) Substitution based(d) Mono alphabetic substitution basedI have been asked this question in unit test.My question is from Cryptography topic in division Information Technology of Computer Fundamentals

Answer»

The correct CHOICE is (d) MONO alphabetic SUBSTITUTION based

The BEST I can explain: In mono alphabetic substitution-based cipher, a character is replaced with some other character or multiple CHARACTERS, based on some key.