In C a variable cannot contain
A) Blank Spaces
B) Decimal Point
C) Hyphen

1 Answer

Answer :

A) Blank Spaces

Related questions

Description : Which of the following is FALSE in C? A) Keywords can be used as variable names B) Variable names can contain a digit C) Variable names do not contain a blank space D) Capital letters can be used in variables

Last Answer : A) Keywords can be used as variable names

Description : In XML, tag names cannot contain spaces but can uses underscores. -Technology

Last Answer : True Tag name must start either with a letter or underscore (_) character.

Description : Let P = {2, 3, 4, 5, 6, 7}. Insert the correct symbol inside the given blank spaces below: (a). 2 . . . . . . . . . . P (b). 9 . . . . . . . . . P (c). 11 . . . . . . . . P (d). 4 . . . . . . . . P (e). 0 . . . . . . . . P (f). 7 . . . . . . . . P -Do You Know?

Last Answer : (i) 5 ∈ A (ii) 8 ∉ A (iii) 0 ∉ A (iv) 4 ∈ A (v) 2 ∈ A (vi) 10 ∉ A

Description : Complete the blank spaces using words from the list. You should use each word only once. -Technology

Last Answer : 1. PowerPoint2. presentation3. projector4. handouts5. slide6. Websites7. templates

Description : How can art be used to decorate blank spaces?

Last Answer : Sometimes it is difficult to imagine how a particular space can be decorated. Therefore, we need some inspiration to push us in the right direction. Your inspiration can be found here: www.theartofdecorating.co.uk/

Description : Which of the following cannot be passed to a function? A) Reference variable B) Arrays C) Class objects D) Header files

Last Answer : D) Header files

Description : A .................... architecture assigns only a few essential functions to the kernel, including address spaces, Inter process communication(IPC) and basic scheduling. A) Monolithic kernel B) Micro kernel C) Macro kernel D) Mini kernel

Last Answer : B) Micro kernel

Description : The property of binary tree is A) The first subset is called left subtree B) The second subtree is called right subtree C) The root cannot contain NULL D) The right subtree can be empty

Last Answer : D) The right subtree can be empty

Description : What can you say about the following statements? I. XML tags are case-insensitive. II. In JavaScript, identifier names are case-sensitive. III. Cascading Style Sheets (CSS) cannot be used with XML. IV. All well-formed ... IV are false. (3) only I and III are false. (4) only II and IV are false. 

Last Answer : Answer: Marks to all

Description : NULL is (A) the same as 0 for integer (B) the same as blank for character (C) the same as 0 for integer and blank for character (D) not a value

Last Answer : (D) not a value

Description : A variable is defined within a block in a body of a function. Which of the following are true? A) It is visible throughout the function. B) It is visible from the point of definition to the end ... visible from the point of definition to the end of the block. D) It is visible throughout the block.

Last Answer : D) It is visible throughout the block.

Description : Two words joined by a hyphen make a?

Last Answer : .descriptive adjective

Description : How long to stop after hyphen (-) ?

Last Answer : No need to stop after the hyphen.

Last Answer : Hyphen (-) is used to separate the parts of a compound term in a sentence.

Description : When you join two words with a hyphen, what have you created?

Last Answer : A descriptive adjective

Description : Which of the sentences is missing a hyphen?

Last Answer : That run down shack should be condemned.

Description : Which of the-following sentences correctly uses a hyphen?

Last Answer : The hand-painted doll was worth thousands of dollars.

Description : An integer constant in C must have A) At least one digit B) At least one decimal point C) A comma along with digits D) Digits separated by commas

Last Answer : A) At least one digit

Description : Which of the following statements is/are true regarding requirements for receptacle outlets aboard vessels? A. Each receptacle outlet operating at 100 volts or more must have a grounding pole. B. Outlets ... machinery with a portable light having a 50 foot flexible cord. D. All of the above.

Last Answer : Answer: A

Description : Fill in the blank. The _____ is the difference between the additional money spent on  prevention and the corresponding reduction in the cost of failure. Select one: a. cost-benefit analysis b. implicit cost c. cost of quality d. variable cost e. cost-utility analysis

Last Answer : c. cost of quality

Description : What is a class variable?

Last Answer : A: Instance variables having the keyword ‘static’ before it is a class variable. For every object there is just one copy of the variable made.

Description : How do you make a variable into a constant?

Last Answer : A: By adding the keyword ‘final’ before a variable declarations. Example: final int a = 5;

Description : What is a variable?

Last Answer : A: A variable is a named memory location whose value can change.

Description : State true of false. i) Public can only be assigned to class ii) Protected protects a statement iii) Protected method is never accessible outside the package iv) Friendly variable may be accessible outside class A) i- ... -false, ii-true, iii-false, iv-false D) i-true, ii-false, iii-false, iv-true

Last Answer : C) i-false, ii-true, iii-false, iv-false

Description : If a variable is declared final, it must include ...................... value. A) integer B) no C) initial D) float

Last Answer : C) initial

Description : In Java variables, if first increment of the variable takes place and then the assignment occurs. This operation is also called ............................. . A) pre increment B) post increment C) incrementation D) pre incrementation

Last Answer : A) pre increment

Description : Which of the following is not mandatory in variable declaration? A) a semicolon B) an identifier C) an assignment D) a data type

Last Answer : C) an assignment

Description : Which of the following is true about the static member variable in C++. i) It is initialized to zero when the first object of its class is created. Other initialization is also permitted. ii) It is visible only within ... , ii-True B) ii-False, ii-True C) i-True, ii-False D) i-False, iii-False

Last Answer : B) ii-False, ii-True

Description : Assume that variable x resides at memory location 1234, y at 1111 and p at 2222. Int x=1, y=2, *p; p=&x; y=*p; What will be the value of y after execution of above code? A) 2 B) 1 C) 1234 D) 1111

Last Answer : C) 1234

Description : Pointer holds A) Value of variable B) Address of variable C) Value and address of variable D) Always null

Last Answer : B) Address of variable

Description : If a is an integer variable, a=7/3; will return a value A) 2.5 B) 3 C) 0 D) 2

Last Answer : D) 2

Description : ………………….. implies that all subnets obtained from the same subnet mask. A) Static subnetting B) Dynamic subnetting C) Variable length subnetting D) Both B and C

Last Answer : A) Static subnetting

Description : ........ implies that all subnets obtained from the same network use the subnet mask. A) Static subnetting B) Dynamic Subnetting C) Variable length subnetting D) Both B and C

Last Answer : A) Static subnetting

Description : At any iteration of simplex method, if Δj (Zj – Cj) corresponding to any nonbasic variable Xj is obtained as zero, the solution under the test is (A) Degenerate solution (B) Unbounded solution (C) Alternative solution (D) Optimal solution

Last Answer : (C) Alternative solution

Description : A data file of 1,00,000 characters contains only the characters g-l, with the frequencies as indicated in table:  using the variable-length code by Huffman codes, the file can be encoded with (A) 2,52,000 bits (B) 2,64,000 bits (C) 2,46,000 bits (D) 2,24,000 bits

Last Answer : (D) 2,24,000 bits 

Description : Find the false statement: (A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. (B) The Symmetric cipher DES (Data Encryption Standard) was widely used ... and 124 bits. (D) Public key algorithms use two different keys for Encryption and Decryption.

Last Answer : (C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.

Description : Which of the following is false for the programming language PROLOG? (A) A PROLOG variable can only be assigned to a value once (B) PROLOG is a Strongly Typed Language. (C) The scope of a variable in PROLOG is a single clause or rule. (D) the scope of a variable in PROLOG is a Single Query

Last Answer : (B) PROLOG is a Strongly Typed Language.

Description : A basic feasible solution of a linear programming problem is said to be ............... if at least one of the basic variable is zero. (A) degenerate (B) non-degenerate (C) infeasible (D) unbounded

Last Answer : (A) degenerate 

Description : When one object reference variable is assigned to another object reference variable then (A) a copy of the object is created. (B) a copy of the reference is created. (C) a copy of the ... not created. (D) it is illegal to assign one object reference variable to another object reference variable.

Last Answer : (B) a copy of the reference is created.

Description : There are three processes P1, P2 and P3 sharing a semaphore for synchronising a variable. Initial value of semaphore is one. Assume that negative value of semaphore tells us how many processes are waiting in queue. Processes access ... The final value of semaphore will be: (1) 0 (2) 1 (3) -1 (4) -2 

Last Answer : Answer: 1

Description : A wealthy wise old woman feared that her daughter was lazy and as a result rather stupid. When the old woman died, her will stipulated that her assets were to be liquidated and a check was to be ... only one envelope had a true statement and that the other two statements were false. The en -Riddles

Last Answer : The daughter should pick envelope 1. Unfortunately she picked envelope 3. Statements 1 and 2 were false, and the only true statement was statement 3. If the check was in envelope 1, that would make statement 1 ... both be true. If the check was in envelope 3, statements 1 and 3 would both be true.

Description : An account bag from the Head Office to Sub office contain a) The SO slip, b) A cash bag containing cash including postage stamps c) IPO, Saving certificate, for sales d) SB Slip (SB 27), BO daily account after check, Blank MO forms for sale e) All the above

Last Answer : e) All the above

Description : Book packet may contain a) News papers, publications of all kinds, b) Printed books, paper, parchment c) Cardboard either blank or printed d) All the above

Last Answer : d) All the above

Description : In the decimal 2.1738 the 7 is in the blank place?

Last Answer : hundredths

Description : What blank is a decimal system of measurement?

Last Answer : The metric system is mostly a decimal system of measurement.

Description : Some of the situations where inline expansion may not work are: A) For functions returning values, if a loop, a switch or goto exists. B) If functions contain static variables and they are re-cursive. C) For functions not returning values, if return statement exist. D) All of the above.

Last Answer : D) All of the above.

Description : One of the main features that distinguish microprocessor from microcomputers is (A) words are usually larger in microprocessors. (B) words are shorter in microprocessors. (C) microprocessor does not contain I/O devices. (D) None of the above.

Last Answer : (C) microprocessor does not contain I/O devices.

Description : The regular expression corresponding to the language L where L={x∈{0,1}* | x ends with 1 and does not contain substring 00 } is: (A) (1 + 01)* (10 + 01) (B) (1 + 01)* 01 (C) (1 + 01)* (1 + 01) (D) (10 + 01)* 01

Last Answer : (C) (1 + 01)* (1 + 01) 

Description : Consider the following database table : Create table test( one integer, two integer, primary key(one), unique(two), check(one≥1 and ≤10), check(two≥1 and ≤5) ); How many data records/tuples atmost can this table contain ?  (A) 5 (B) 10 (C) 15 (D) 50

Last Answer : (A) 5