Description : Object-oriented concepts are not new. The first OO language was considered to be a) ALGOL-68 B) FORTRAN 77 c) CMODULA d) SIMULA 67.
Last Answer : d) SIMULA 67.
Description : Classic OOP - Object Oriented programming can be traced back to a language called Simula, and in particular Simula 67, which was popular during the _____: a) 1930s b) 1960s c) 1950s d) None of These
Last Answer : b) 1960s
Description : Requirement Development, Organizational Process Focus, Organizational Training, Risk Management and Integrated Supplier Management are process areas required to achieve maturity level (A) Performed (B) Managed (C) Defined (D) Optimized
Last Answer : (C) Defined
Description : ................. is subject oriented, integrated, time variant, non-volatile collection of data in support of management decisions. (A) Data mining (B) Web mining (C) Data warehouse (D) Database Management System
Last Answer : (C) Data warehouse
Description : The Software Maturity Index (SMI) is defined as SMI = [Mf - (Fa + Fc + Fd)] / Mf Where Mf = the number of modules in the current release. Fa = the number of modules in the current release that have ... (A) SMI approaches 1 (B) SMI approaches 0 (C) SMI approaches -1 (D) None of the above
Last Answer : (A) SMI approaches 1
Description : In substitution, a character in the plaintext is always changed to the same character in the ciphertext, regardless of its position in the text. (A) polyalphabetic (B) monoalphabetic (C) transpositional (D) multialphabetic
Last Answer : (B) monoalphabetic
Description : In Unix, the login prompt can be changed by changing the contents of the file ............... (A) contrab (B) init (C) gettydefs (D) inittab
Last Answer : Answer: C
Description : What is StringTokenizer or Scanner and examples of similar classes (if you used it)
Last Answer : A: StringTokenizer or Scanner is a class which splits up any given string into tokens separated by delimiters.
Description : State any two IOException classes.
Last Answer : A: EOFException and FileNotFoundException.
Description : Why did you write java.util package? (only if you use classes like Scanner or StringTokenizer)
Last Answer : A: To include the functions of the Scanner or StringTokenizer class from the java.util package.
Description : State true or false. i) Jpanel is a class included in awt package. ii) Anonymous classes are mostly used for event handling. iii) Names of anonymous classes must be unique iv) JOptionPane is an inner class A) i-false ... ) i-false, ii-true, iii-false, iv-false D) i-true, ii-false, iii-false, iv-true
Last Answer : C) i-false, ii-true, iii-false, iv-false
Description : The concept of multiple inheritance is implemented in Java by A) extending two or more classes B) extending one class and implementing one or more interfaces C) implementing two or more interfaces D) both B and C
Last Answer : D) both B and C
Description : A package is a collection of A) classes B) interfaces C) editing tools D) classes and interfaces
Last Answer : D) classes and interfaces
Description : The .................. and .................... classes are abstract classes that support reading and writing of byte streams. A) reader, writer B) inputstream, outputstream C) objectinputstream, objectoutputstream D) none
Last Answer : B) inputstream, outputstream
Description : State true or false. i) init() is called after start() in applet ii) applets are used for networking iii) inheritance is a part of Java Foundation Classes iv) final does not prevent inheritance A) i-true, ii- ... C) i-true, ii-true, iii-true, iv-true D) i-true, ii-false, iii-false, iv-false
Last Answer : B) i-false, ii-false, iii-false, iv-false
Description : In JDBC ........................ imports all Java classes concerned with database connectivity. A) javax.sql.* B) java.mysql.* C) java.sql.* D) com.*
Last Answer : C) java.sql.*
Description : Inner classes are A) anonymous classes B) nested classes C) sub classe
Last Answer : B) nested classes
Description : All java classes are derived from A) java.lang.Class B) java.util.Name C) java.lang.Object D) java.awt.Window
Last Answer : D) java.awt.Window
Description : …………. Is the process of creating new classes, called derived classes from existing classes called base class. A) Inheritance B) Encapsulation C) Polymorphism D) Overloading
Last Answer : A) Inheritance
Description : A ………………. Is a class whose instances themselves are classes. A) Subclass B) Abstract Class C) Meta Class D) Object Class
Last Answer : C) Meta Class
Description : The friend functions are used in situations where A) We want to exchange data between classes B) We want to have access to unrelated classes C) Dynamic binding is required D) We want to create versatile overloaded operators.
Last Answer : A) We want to exchange data between classes
Description : …………. Refer to the names of variables, functions, arrays, classes etc. created by the programmer. A) Keywords B) Identifiers C) Constraints D) Strings
Last Answer : B) Identifiers
Description : Equivalence partitioning is a .................. method that divides the input domain of a program into classes of data from which test cases can be derived. (A) White-box testing (B) Black-box testing (C) Orthogonal array testing (D) Stress testing
Last Answer : (B) Black-box testing
Description : .................. allows to create classes which are derived from other classes, so that they automatically include some of its "parent's" members, plus its own members. (A) Overloading (B) Inheritance (C) Polymorphism (D) Encapsulation
Last Answer : (B) Inheritance
Description : All the classes necessary for windows programming are available in the module : (A) win.txt (B) win.main (C) win.std (D) MFC
Last Answer : (A) win.txt
Description : Consider the two class classification task that consists of the following points: Class C1: [1 1.5] [1 -1.5] Class C2: [-2 2.5] [-2 -2.5] The decision boundary between the two classes using single perceptron is given by: (A) x1+x2+1.5=0 (B) x1+x2-1.5=0 (C) x1+1.5=0 (D) x1-1.5=0
Last Answer : (C) x1+1.5=0
Description : Let L be the language generated by regular expression 0*10* and accepted by the deterministic finite automata M. Consider the relation RM defined by M. As all states are reachable from the start state, RM has ................ equivalence classes. (A) 2 (B) 4 (C) 5 (D) 6
Last Answer : (D) 6
Description : Which of the following statements is correct? (A) Aggregation is a strong type of association between two classes with full ownership. (B) Aggregation is a strong type of association between two ... ownership. (D) Aggregation is a weak type of association between two classes with full ownership.
Last Answer : (C) Aggregation is a weak type of association between two classes with partial ownership.
Description : It is possible to define a class within a class termed as nested class. There are ............ types of nested classes. (A) 2 (B) 3 (C) 4 (D) 5
Last Answer : Answer: A, C
Description : How many different equivalence relations with exactly three different equivalence classes are there on a set with five elements? (A) 10 (B) 15 (C) 25 (D) 30
Last Answer : (C) 25
Description : Which of the following statement(s) is/are TRUE with regard to software testing? I. Regression testing technique ensures that the software product runs correctly after the changes during maintenance. II. Equivalence partitioning is a ... (1) only I (2) only II (3) both I and II (4) neither I nor II
Last Answer : (1) only I
Description : Which of the following statement(s) with regard to an abstract class in JAVA is/are TRUE? I. An abstract class is one that is not used to create objects. II. An abstract class is designed only to act as a base class ... by other classes. (1) Only l (2) Only II (3) Neither I nor II (4) Both l and II
Last Answer : Both l and II
Description : Which of the following storage classes have global visibility in C/C++? (1) Auto (2) Extern (3) Static (4) Register
Last Answer : Answer: 2
Description : In the …………….. traversal we process all of a vertex’s descendents before we move to an adjacent vertex. A) Depth First B) Breadth First C) With First D) Depth Limited
Last Answer : A) Depth First
Description : Suppose you want to delete the name that occurs before “Vivek” in an alphabetical listing. Which of the following data structures shall be most efficient for this operation? (A) Circular linked list (B) Doubly linked list (C) Linked list (D) Dequeue
Last Answer : (B) Doubly linked list
Description : ............... is a process model that removes defects before they can precipitate serious hazards. (A) Incremental model (B) Spiral model (C) Cleanroom software engineering (D) Agile model
Last Answer : (C) Cleanroom software engineering
Description : Consider the following two statements : (a) Data scrubling is a process to upgrade the quality of data, before it is moved into Data warehouse. (b) Data scrubling is a process of rejecting data from data warehouse to create ... true (C) Both (a) and (b) are false (D) Both (a) and (b) are true
Last Answer : (A) (a) is true, (b) is false