Description : Match the following. a) Java 1) is a tool for debugging java program b) Javah 2) is a tool for creating C-like header files c) Javap 3) runs java bytecode d) jdb 4) prints java code representation A) a-3, b-2,c-1 B) a-3, b-1, c-4, d-2 C) a-1, b-2, c-3, d-4 D) a-2, b-1, c-3, d-4
Last Answer : B) a-3, b-1, c-4, d-2
Description : The command javac is used to A) debug a java program B) compile a java program C) interpret a java program D) execute a java program
Last Answer : B) compile a java program
Description : The third type of comment is used by a tool called .................. for automatic generation of documentation. A) Java commenting B) Java generator C) Java doc D) Java loc
Last Answer : C) Java doc
Description : Which of the following is true about Java. A) Java does not support overloading. B) Java has replaced the destructor function of C++ C) There are no header files in Java. D) All of the above.
Last Answer : D) All of the above
Description : How do you generate documentation from the C# file commented properly with a command-line compiler?
Last Answer : Compile it with the /doc switch.
Description : To create vehicle of information to provide evidence in the development process and to monitor the process. This is one of the objectives of A) Analysis B) Design C) Development D) Documentation
Last Answer : D) Documentation
Description : Which file in java uses zip compression? a) JAR b) JER c) ZAR
Last Answer : a) JAR
Description : Which one of the following statements is false regarding the Distributed Cache? a) The Hadoop framework will ensure that any files in the Distributed Cache are distributed to all map and reduce tasks. b) ... Cache on to the slave node before any tasks for the job are executed on that node.
Last Answer : MapReduce tries to place the data and the compute as close as possible
Description : Process of removing errors called a) Error Free b) Debug c) Syntax Error d) Exception
Last Answer : b) Debug
Description : Which of the following is incorrect in C++ ? (A) When we write overloaded function we must code the function for each usage. (B) When we write function template we code the function only once. (C) It is difficult to debug macros (D) Templates are more efficient than macros
Last Answer : (D) Templates are more efficient than macros
Description : Which of the following cannot be passed to a function in C++? (1) Constant (2) Structure (3) Array (4) Header file
Last Answer : Answer: 4
Description : Which button can be used in the Archive manager toolbar, to create a compressed file into uncompressed ? a) Open button b) Home button c) Extract d) Up button
Last Answer : c) Extract
Description : What is done firstly, to create a compressed and archive file into uncompressed ? a) Left clicking a file -> Open with archive manager b) Right clicking a file -> open with archive manager c) Left clicking a file -> open with Winzip d) Right clicking a file -> open with winzip
Last Answer : b) Right clicking a file -> open with archive manager
Description : Which of the following statement(s) with regard to an abstract class in JAVA is/are TRUE? I. An abstract class is one that is not used to create objects. II. An abstract class is designed only to act as a base class ... by other classes. (1) Only l (2) Only II (3) Neither I nor II (4) Both l and II
Last Answer : Both l and II
Description : A software program that infers and manipulates existing knowledge in order to generate new knowledge is known as: (A) Data Dictionary (B) Reference Mechanism (C) Inference Engine (D) Control Strategy
Last Answer : (C) Inference Engine
Description : What is significance of import java.io.* in your program?
Last Answer : A: The line imports all the classes of the java.io package into the current program.
Description : In a java program, package declaration .................... import statements. A) must precede B) must succeed C) may precede or succeed D) none
Last Answer : A) must precede
Description : State true or false for Java Program. i) Data members of an interface are by default final ii) An abstract class has implementations of all methods defined inside it. A) i-false, ii-false B) i-false, ii-true C) i-true, ii-false D) i-true, ii-true
Last Answer : C) i-true, ii-false
Description : State true or false for Java Program. i) All class variables are instance variables ii) All protected methods are friendly methods A) i-false, ii-false B) i-false, ii-true
Last Answer : B) i-false, ii-true
Description : The compiled java program can run on any ..................... plateform having Java Virtual Machine (JVM) installed on it. A) program B) java C) hardware D) non java
Last Answer : C) hardware
Description : System.in.read() is being used, the program must specify the .................. clause. A) throws.java.out.IOException B) throws.java.in.IOException C) throws.java.io.IOException D) throws.java.io.InException
Last Answer : C) throws.java.io.IOException
Description : The command javac A) Converts a java program into binary code B) Converts a java program into bytecode C) Converts a java program into machine language D) None of the above.
Last Answer : B) Converts a java program into bytecode
Description : Which one of the following is correct? (A) Java applets cannot be written in any programming language (B) An applet is not a small program. (C) An applet can be run on its own. (D) Applets are embedded in another applications.
Last Answer : (D) Applets are embedded in another applications.
Description : Consider the following JAVA program: public class First { public static int CBSE (int x) { if (x < 100) x = CBSE (x +10); return (x - 1); } public static void main (String[] args){ System.out.print(First.CBSE(60)); } } What does this program print? (1) 59 (2) 95 (3) 69 (4) 99
Last Answer : (2) 95
Description : What kind of documentation does MS-PowerPoint allow to create by default presentation file ( .ppt) ?
Last Answer : MS-PowerPoint allows creation of Presentation file (.ppt) by default presentation file (.ppt) .
Description : Statement of scope and objectives, opportunities and performance criteria …………. A) Problem definition B) System analysis C) System Design D) Documentation
Last Answer : A) Problem definition
Description : ………… system consists of programs, data files and documentation A) Conceptual B) Logical C) Physical D) None of the above
Last Answer : C) Physical
Description : ………………….. means coordinated effort, to communicate the information of the system written form. A) System documentation B) Resource required C) Development schedule D) User Document
Last Answer : A) System documentation
Description : Which are the following is / are the level(s) of documentation? A) Documentation for management B) Documentation for user C) Documentation for data processing department D) All of the above
Description : Which one of the following is not a step of requirement engineering ? (A) Requirement elicitation (B) Requirement analysts (C) Requirement design (D) Requirement documentation
Last Answer : (C) Requirement design
Description : How do I run a .jar (java) application on my mac?
Last Answer : I had this problem before, it has something to do with the way JavaSun scripted Java for mac. I would say do a Spotlight for Java and see what comes up, if you don't get an App called Java ... more ideas, but the wrists are starting to hurt and I think I need to call it a night with typing.
Description : Which of the following cannot be passed to a function? A) Reference variable B) Arrays C) Class objects D) Header files
Last Answer : D) Header files
Description : There is an extra element at the head of the list called a ………. A) Antinel B) Sentinel C) List header D) List head
Last Answer : B) Sentinel
Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii ... and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v
Last Answer : D) All i, ii, iii, iv and v
Description : In ………………. Mode, the authentication header is inserted immediately after the IP header. A) Tunnel B) Transport C) Authentication D) Both A and B
Last Answer : D) Both A and B
Description : The components of IP security includes …………………. A) Authentication Header (AH) B) Encapsulating Security Payload (ESP) C) Internet key Exchange (IKE) D) All of the above
Description : In IPv4 header, the field is needed to allow the destination host to determine which datagram a newly arrived fragment belongs to. (A) identification (B) fragment offset (C) time to live (D) header checksum
Last Answer : (A) identification
Description : Which of the following control fields in TCP header is used to specify the sender has no more data to transmit? (A) FIN (B) RST (C) SYN (D) PSH
Last Answer : (A) FIN
Description : In a packet switching network, if the message size is 48 bytes and each packet contains a header of 3 bytes. If 24 packets are required to transmit the message, the packet size is ................ (1) 2 bytes (2) 1 byte (3) 4 bytes (4) 5 bytes
Last Answer : (4) 5 bytes
Description : The maximum size of the data that the application layer can pass on to the TCP layer below is ......... (1) 216 bytes (2) 216 bytes + TCP header length (3) 216 bytes - TCP header length (4) 215 bytes
Last Answer : Answer: Marks to all
Description : What type of compression actually deletes data and cannot be decompressed? A. File Compression B. Lossless Compression C. Lossy Compression D. Archive Compression
Last Answer : D. Archive Compression
Description : From the following for which process ‘Archive Manager tool ‘ is used ? a) For transferring the data of file and directory b) For place compression on the file and directory c) For altering the form of file and directory d) For data compression on file and directory
Last Answer : d) For data compression on file and directory
Description : In Unix operating system, special files are used to : (A) buffer data received in its input from where a process reads (B) provide a mechanism to map physical device to file names (C ... pointers associated with i-nodes (D) store information entered by a user application program or utility program
Last Answer : (B) provide a mechanism to map physical device to file names
Description : What is the function of following UNIX command? WC - lb& (A) It runs the word count program to count the number of lines in its input, a, writing the result to b, as a foreground process. (B) It runs ... (D) It copies the l ' numbers of lines of program from file, a, and stores in file b.
Last Answer : (B) It runs the word count program to count the number of lines in its input, a, writing the result to b, but does it in the background.
Description : To generate pdf reports Define what Java API is required?
Last Answer : To generate pdf reports, you need Java API IText.
Description : What is the default java package?
Last Answer : A: java.lang
Description : Name the primitive data-types in java.
Last Answer : A: byte, short, int, long, float, double, char and boolean
Description : Mention other ways in which java handles exceptions.
Last Answer : A: Java can handle exception using the try-catch block, throws keyword and throw keyword.
Description : Why did you write java.util package? (only if you use classes like Scanner or StringTokenizer)
Last Answer : A: To include the functions of the Scanner or StringTokenizer class from the java.util package.