The major goal of inheritance in C++ is  
A) To facilitate the conversion of data types
B) To help modular programming
C) To facilitate the reusability of code
D) To extend the capabilities of a class

1 Answer

Answer :

D) To extend the capabilities of a class

Related questions

Description : When using a function point estimation worksheet, there are 14 factors that impact the complexity of a project. These factors include _____.  a. data communications, time tradeoffs, and ... programming language  d. reports printed and PCA  e. x-rays, extensibility, and operational conversion

Last Answer : b. end-user efficiency, data communications, and reusability

Description : Consider the following two statements: (a) A publicly derived class is a subtype of its base class. (b) Inheritance provides for code reuse. Which of the following statements is correct? (A) Both the statements ( ... ) is correct and (b) is incorrect (D) Statement (a) is incorrect and (b) is correct

Last Answer : Answer: A

Description : OOP features are i) Increasing productivity ii) Reusability iii) Decreasing maintenance cost iv) High vulnerability A) 1,2 & 4 B) 1,2 & 3

Last Answer : B) 1,2 & 3

Description : A software design is highly modular if : (A) cohesion is functional and coupling is data type. (B) cohesion is coincidental and coupling is data type. (C) cohesion is sequential and coupling is content type. (D) cohesion is functional and coupling is stamp type.

Last Answer : (A) cohesion is functional and coupling is data type.

Description : The concept of multiple inheritance is implemented in Java by A) extending two or more classes B) extending one class and implementing one or more interfaces C) implementing two or more interfaces D) both B and C

Last Answer : D) both B and C

Description : The concept of multiple inheritance is implemented in Java by A) extending two or more classes B) extending one class and implementing one or more interfaces C) implementing two or more interfaces D) both B and C

Last Answer : D) both B and C

Description : …………. Is the process of creating new classes, called derived classes from existing classes called base class. A) Inheritance B) Encapsulation C) Polymorphism D) Overloading

Last Answer : A) Inheritance

Description : When the inheritance is private, the private methods in base class are.................. in the derived class (in C++). (A) inaccessible (B) accessible (C) protected (D) public

Last Answer : (A) inaccessible

Description : A ____ is a namespace for organizing classes and interfaces in a logical manner. Placing your code into ______makes large software projects easier to manage. This section explains why this is useful and ... provided by the Java Platform: a) Inheritance b) Object c) Package d) None of These

Last Answer : c) Package

Description : ………… enable us to hide, inside the object, both the data fields and the methods that act on that data. A) Encapsulation B) Polymorphism C) Inheritance D) Overloading

Last Answer : A) Encapsulation

Description : A software company needs to develop a project that is estimated as 1000 function points and is planning to use JAVA as the programming language whose approximate lines of code per function point is accepted as 50. Considering a=1. ... ? (1) 11.2 months (2) 12.2 months (3) 13.2 months (4) 10.2 months

Last Answer : Generally, any projects are measured in weeks. However, the complex project might take more time depending on the level of object re-use available.

Description : ______provides a powerful and natural mechanism for organizing and structuring your software. It also explains how classes inherit state and behavior from their super classes and explains how to derive one class ... the java programming language: a) Object b) Inheritance c) Class d) None of These

Last Answer : b) Inheritance

Description : An outstanding functionality of SQL is its support for automatic ………… to the target data. A) programming B) functioning C) navigation D) notification

Last Answer : C) navigation

Description : he primary goal of the ………………….. protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity. A) SSL B) ESP C) TSL D) PSL

Last Answer : A) SSL

Description : Forward chaining systems are ............. where as backward chaining systems are ................ (A) Data driven, Data driven (B) Goal driven, Data driven (C) Data driven, Goal driven (D) Goal driven, Goal driven

Last Answer : (C) Data driven, Goal driven 

Description : Which of the following is characteristic of an MIS? (A) Provides guidance in identifying problems, finding and evaluating alternative solutions, and selecting or comparing alternatives. (B) Draws on ... Has as its goal the efficiency of data movement and processing and interfacing different TPS. 

Last Answer : (B) Draws on diverse yet predictable data resources to aggregate and summarize data.

Description : Match the following types of variables with the corresponding programming languages: (a) Static variables (i) Local variables in Pascal (b) Stack dynamic (ii) All variables in APL (c) Explicit heap dynamic (iii) Fortran 77 (d) Implicit ... (ii) (C) (iii) (i) (iv) (ii) (D) (ii) (i) (iii) (iv)

Last Answer : (C) (iii) (i) (iv) (ii) 

Description : Which of the following statements is true (A) Abstract data types are the same as classes (B) Abstract data types do not allow inheritance (C) Classes cannot inherit from the same base class (D) Object have state and behavior

Last Answer : (B) Abstract data types do not allow inheritance

Description : What is type conversion? Name its types.

Last Answer : A: Converting a value of a particular data type into another data-type is called type conversion. It is of two types: (a) Implicit Type Conversion: When the conversion takes place on ... intervention. (b) Explicit Type Conversion: When the conversion takes place with the programmer's intervention.

Description : What is the benefit of Inheritance?

Last Answer : A: It is a very useful feature as it provides the concept of reusability. Also, it allows us to include or remove any features to an existing class without modifying it.

Description : What is Inheritance? How is it implemented in Java?

Last Answer : A: The ability of a class to adopt/share the properties (data and functions) completely or partially from another class is called Inheritance. In Java, it is implemented by the use of the keyword, extends.

Description : ....................... is the key to .................. A) Serialization, persistence B) Persistence, inheritance C) Inheritance, object D) Persistence, serialization

Last Answer : A) Serialization, persistence

Description : State true or false. i) init() is called after start() in applet ii) applets are used for networking iii) inheritance is a part of Java Foundation Classes iv) final does not prevent inheritance A) i-true, ii- ... C) i-true, ii-true, iii-true, iv-true D) i-true, ii-false, iii-false, iv-false

Last Answer : B) i-false, ii-false, iii-false, iv-false

Description : ....................is the key to ........................ A) Serialization, persistence B) Persistence, inheritance C) Inheritance, object D) Persistence, serialization

Last Answer : C) Inheritance, object

Description : .................. allows to create classes which are derived from other classes, so that they automatically include some of its "parent's" members, plus its own members. (A) Overloading (B) Inheritance (C) Polymorphism (D) Encapsulation 

Last Answer : (B) Inheritance

Description : Module design is used to maximize cohesion and minimize coupling. Which of the following is the key to implement this rule? (A) Inheritance (B) Polymorphism (C) Encapsulation (D) Abstraction

Last Answer : (C) Encapsulation

Description : In C++, polymorphism requires: (A) Inheritance only (B) Virtual functions only (C) References only (D) Inheritance, Virtual functions and references

Last Answer : (D) Inheritance, Virtual functions and references 

Description : Which of the following statements about the Crime and Criminal Tracking Network System (CCTNS) is/are correct? 1. It will facilitate real time access of classified criminal data to the law enforcement authorities. 2. National Crime ... below- 1) 1 only 2) 2 only 3) Both 1 and 2 4) Neither 1 nor 2

Last Answer : 1) 1 only

Description : Data input is A) an abstract class defined in java.io B) a class we can use to read primitive data types C) an interface that defines methods to open files. D) an interface that defines methods to read primitive data types.

Last Answer : D) an interface that defines methods to read primitive data types.

Description : Data input is A) an abstract class defined in java.io B) a class we can use to read primitive data types C) an interface that defines methods to open files. D) an interface that defines methods to read primitive data types.

Last Answer : D) an interface that defines methods to read primitive data types.

Description : Which among the following definitions are correct: a) Object - Any entity that has state and behavior is known as an object. b) Class - Collection of objects is called class. It is logical entity. c) ... re-usability and is used to achieve run time polymorphism. d) All of the above e) None of These

Last Answer : d) All of the above

Description : Choose an internal quality from given below: a) scalability b) usability c) reusability d) reliability

Last Answer : c) reusability

Description : Software Reusability:

Last Answer : When behavior is inherited from another class, the code that provides that behavior does not have to be rewritten. This may seem obvious, but the implications are important. Many programs send much of their ... before-for example , to search for a pattern in string or to insert a new element into

Description : Which of the following characteristics is primarily associated with software reusability? A. The extent to which the software can be used in other applications B. The extent to which the software can ... moved to a different platform D. The capability of one system to be coupled with another system

Last Answer : B. The extent to which the software can be used by many different users

Description : Which one of the following OOP concepts enables reusability of components?  (1) Inheritance (2) Encapsulation (3) Polymorphism (4) All of the above 

Last Answer : 2. Encapsulation 

Description : Which of the following is/are correct with reference to Abstract class and interface ? (a) A class can inherit only one Abstract class but may inherit several interfaces. (b) An Abstract class can provide complete and default ... true (C) Both (a) and (b) are true (D) Neither (a) nor (b) is true

Last Answer : Answer: C

Description : C++ is an extension of C with a major addition of the class construct feature of …………….. A) Simula67 B) Simula57 C) Simula47 D) Simula87

Last Answer : A) Simula67

Description : Java has its origin in A) C programming language B) PERRL C) COBOL D) Oak programming language

Last Answer : D) Oak programming language

Description : The two central themes of modern operating system are ............... A) Multiprogramming and Distributed processing B) Multiprogramming and Central Processing C) Single Programming and Distributed processing D) None of above

Last Answer : A) Multiprogramming and Distributed processing

Description : .......... is a special type of programming language used to provide instructions to the monitor simple batch processing schema. A) Job control language (JCL) B) Processing control language (PCL) C) Batch control language (BCL)

Last Answer : A) Job control language (JCL)

Description : Which of the following algorithm design technique is used in the quick sort algorithm? a) Dynamic programming b) Backtracking c) Divide-and-conquer d) Greedy method

Last Answer : Which of the following algorithm design technique is used in the quick sort algorithm? a) Dynamic programming b) Backtracking c) Divide-and-conquer d) Greedy method

Description : If the primal Linear Programming problem has unbounded solution, then it’s dual problem will have (A) feasible solution (B) alternative solution (C) no feasible solution at all (D) no bounded solution at all 

Last Answer : (C) no feasible solution at all

Description : The pure object oriented programming language with extensive metadata available and modifiable at run time is (A) Small talk (B) C++ (C) Java (D) Eiffel

Last Answer : (A) Small talk

Description : All the classes necessary for windows programming are available in the module : (A) win.txt (B) win.main (C) win.std (D) MFC

Last Answer : (A) win.txt

Description : Which one of the following set of attributes should not be encompassed by effective software metrics ? (A) Simple and computable (B) Consistent and objective (C) Consistent in the use of units and dimensions (D) Programming language dependent

Last Answer : (D) Programming language dependent

Description : Which of the following statements is true for Branch-and-Bound search? (A) Underestimates of remaining distance may cause deviation from optimal path. (B) Overestimates can't cause right path to be ... Dynamic programming principle can be used to discard redundant partial paths. (D) All of the above

Last Answer : (C) Dynamic programming principle can be used to discard redundant partial paths.

Description : Which one of the following is correct? (A) Java applets cannot be written in any programming language (B) An applet is not a small program. (C) An applet can be run on its own. (D) Applets are embedded in another applications. 

Last Answer : (D) Applets are embedded in another applications.