....................is the key to ........................
A) Serialization, persistence
B) Persistence, inheritance
C) Inheritance, object
D) Persistence, serialization

1 Answer

Answer :

C) Inheritance, object

Related questions

Description : ....................... is the key to .................. A) Serialization, persistence B) Persistence, inheritance C) Inheritance, object D) Persistence, serialization

Last Answer : A) Serialization, persistence

Description : Which of the following statement(s) is/are correct? (1) Persistence is the term used to describe the duration of phosphorescence. (2) The control electrode is used to turn the electron beam on and off. (3) ... which are focussed into a narrow beam directed at the face of CRT. (4) All of the above. 

Last Answer : All of the above.

Description : Module design is used to maximize cohesion and minimize coupling. Which of the following is the key to implement this rule? (A) Inheritance (B) Polymorphism (C) Encapsulation (D) Abstraction

Last Answer : (C) Encapsulation

Description : ………… enable us to hide, inside the object, both the data fields and the methods that act on that data. A) Encapsulation B) Polymorphism C) Inheritance D) Overloading

Last Answer : A) Encapsulation

Description : What is the benefit of Inheritance?

Last Answer : A: It is a very useful feature as it provides the concept of reusability. Also, it allows us to include or remove any features to an existing class without modifying it.

Description : What is Inheritance? How is it implemented in Java?

Last Answer : A: The ability of a class to adopt/share the properties (data and functions) completely or partially from another class is called Inheritance. In Java, it is implemented by the use of the keyword, extends.

Description : The concept of multiple inheritance is implemented in Java by A) extending two or more classes B) extending one class and implementing one or more interfaces C) implementing two or more interfaces D) both B and C

Last Answer : D) both B and C

Description : The concept of multiple inheritance is implemented in Java by A) extending two or more classes B) extending one class and implementing one or more interfaces C) implementing two or more interfaces D) both B and C

Last Answer : D) both B and C

Description : State true or false. i) init() is called after start() in applet ii) applets are used for networking iii) inheritance is a part of Java Foundation Classes iv) final does not prevent inheritance A) i-true, ii- ... C) i-true, ii-true, iii-true, iv-true D) i-true, ii-false, iii-false, iv-false

Last Answer : B) i-false, ii-false, iii-false, iv-false

Description : …………. Is the process of creating new classes, called derived classes from existing classes called base class. A) Inheritance B) Encapsulation C) Polymorphism D) Overloading

Last Answer : A) Inheritance

Description : The major goal of inheritance in C++ is A) To facilitate the conversion of data types B) To help modular programming C) To facilitate the reusability of code D) To extend the capabilities of a class

Last Answer : D) To extend the capabilities of a class

Description : .................. allows to create classes which are derived from other classes, so that they automatically include some of its "parent's" members, plus its own members. (A) Overloading (B) Inheritance (C) Polymorphism (D) Encapsulation 

Last Answer : (B) Inheritance

Description : When the inheritance is private, the private methods in base class are.................. in the derived class (in C++). (A) inaccessible (B) accessible (C) protected (D) public

Last Answer : (A) inaccessible

Description : Consider the following two statements: (a) A publicly derived class is a subtype of its base class. (b) Inheritance provides for code reuse. Which of the following statements is correct? (A) Both the statements ( ... ) is correct and (b) is incorrect (D) Statement (a) is incorrect and (b) is correct

Last Answer : Answer: A

Description : In C++, polymorphism requires: (A) Inheritance only (B) Virtual functions only (C) References only (D) Inheritance, Virtual functions and references

Last Answer : (D) Inheritance, Virtual functions and references 

Description : When was the last time you heard of a book being released in serialization?

Last Answer : answer:Harry Potter series. Twilight series. The Game of Thrones series (which is under a different name but I just know the first book.) Hunger Games trilogy. Serialization is pretty common.

Description : How did serialization of novels increased the popularity of novel and magazines? -SST 10th

Last Answer : (i) In 1836, Charles Dicken's Pickwick Papers' were serialized in a magazine. (ii) Magazines were attractive and cheaper since they were illustrated. (iii) Serialization of novels ... ) Serialization of novels not only increased the circulation of magazines but also made novels more popular.

Description : ________ is a framework for performing remote procedure calls and data serialization. a) Drill b) BigTop c) Avro d) Chukwa

Last Answer : Avro

Description : Define what is serialization?

Last Answer : Serialization is the process of converting an object into a stream of bytes. De-serialization is the opposite process of creating an object from a stream of bytes. Serialization / Deserialization is mostly used to transport objects.

Description : What is Serialization ?

Last Answer : Ans. Storing the state of an object in a file or other medium is called serialization.

Description : What is it about the concept of a deity that causes its persistence?

Last Answer : I see mainly two reasons 1) If a deity exists - and we don't know that - it would solve the paradox of existence (Einstein's deism) 2) If a deity doesn't exist - and we don't know ... on number 2 is Stephen Baxter's novel Evolution . There also seems some new neurobiological evidence for number 2.

Description : How did J K Rowling showed persistence to achieve something remarkable?

Last Answer : Feel Free to Answer

Description : Using A Temp Agency Requires Persistence?

Last Answer : Now that many people are having a really difficult time finding gainful full time employment, many are turning to temp agencies in order to keep money coming in. There are number of ... If these menial tasks are executed conscientiously, agency staff will likely offer better jobs relatively soon.

Description : Which one of the following is responsible for the working of New-ton's colour disc experiment? (1) Formation of pure spectra (2) Formation of impure spectra (3) Persistence of vision (4) Principle of complementary colour

Last Answer : (3) Persistence of vision Explanation: A Newton Disc can be created by painting a disc with the seven different colours. A combination of red, green and blue in the circular disc will yield the same result. This is due to the phenomenon called persistence of vision.

Description : Persistence of vision is the Principle behind: (1) Binocular (2) Cinema (3) Periscope (4) Camera

Last Answer : (2) Cinema Explanation: Persistence of vision is the phenomenon of the eye by which an afterimage is thought to persist for approximately one twenty-fifth of a second on the retina. In the early days of ... rate of less than 16 frames per second (frame/s) caused the mind to see flashing images.

Description : A colour-blind person cannot – (1) See distant objects (2) See black colour (3) Distinguish between certain colours (4) Have persistence of vision

Last Answer : (3) Distinguish between certain colours Explanation: Colour blindness or colour vision deficiency is the inability or decreased ability to see coluor, or perceive colour differences, under normal lighting ... to the optic nerve. This type of colour blindness is usually a sex-linked condition.

Description : What is meant by persistence actions? a) Allow a literal to remain false b) Allow a literal to remain true c) Allow a literal to remain false & true d) None of the mentioned

Last Answer : b) Allow a literal to remain true

Description : Persistence herbicides pose hazard in soil when a). High persistence herbicides are used b). Crop failure necessitate re-planting c). Susceptible crop follows a short crop d). All

Last Answer : d). All

Description : Struggle for survival and existence is called a). Critical period b). Competition c). Dormancy d). Persistence

Last Answer : b). Competition

Description : What three words define motivation? (a) Persistence, fairness, ambition ; (b) Ambition, direction, intensity (c) Desire, persistence, fairness ; (d) Intensity, direction, persistence

Last Answer :  (d) Intensity, direction, persistence

Description : Which one of the following is responsible for the working of Newton’s colour disc experiment ? (1) Formation of pure spectra (2) Formation of impure spectra (3) Persistence of vision (4) Principle of complementary colour

Last Answer : Persistence of vision

Description : A colour-blind person cannot (1) see distant objects (2) see black colour (3) distinguish between certain colours (4) have persistence of vision

Last Answer : distinguish between certain colours

Description : What is the purpose of Ctrl + I shortcut key in MS - Word: a) It converts selected text into the next larger size of the same font. b) It applies the Italic formatting to the selected text. c) It makes the selected text bold d) It adds a line break to the document. e) None of The Above

Last Answer : b) It applies the Italic formatting to the selected text.

Description : If you are to use [Control-c] as the interrupt key instead of [Del], then you will have to use A. tty ^c B. stty intr \^c C. stty echoe D. stty echo \^a E. None of the above

Last Answer : B. stty intr \^c

Description : Java Servlet i) is key component of server side java development ii) is a small pluggable extension to a server that enhances functionality iii) runs only in Windows Operating System iv) allows developers to customize any java ... & iv are true C) ii, iii & iv are true D) i, ii & iv are true

Last Answer : D) i, ii & iv are true

Description : A portion of the Polymorphic virus, generally called a …………………….. , creates, a random encryption, key to encrypt the remainder of the virus. A) mutual engine B) mutation engine C) multiple engine D) polymorphic engine

Last Answer : C) multiple engine

Description : The key considerations involved in the feasibility analysis is include i) Economical ii) Technical iii) Behavioral iv) Personal A) i, ii, iv B) i, ii, iii C) ii, iii, iv D) All of the above

Last Answer : B) i, ii, iii

Description : The Key considerations involved in the feasibility analysis is / are ………………. A) Economic B) Technical C) Behavioral D) A, B, C

Last Answer : D) A, B, C

Description : Drop Table cannot be used to drop a table referenced by a …………… constraint. A) Local Key B) Primary Key C) Composite Key D) Foreign Key

Last Answer : D) Foreign Key

Description : ............. is a combination of two of more attributes used as a primary key A) Composite Key B) Alternate Key C) Candidate Key D) Foreign Key

Last Answer : A) Composite Key

Description : If an attribute of a composite key is dependent on an attribute of the other composite key, a normalization called ................ is needed. A) DKNF B) BCNF C) Fourth D) Third

Last Answer : B) BCNF

Description : A .................. normal form normalization will be needed where all attributes in a relation tuple are not functionally dependent only on the key attribute. A) First B) Second C) Third D) Fourth

Last Answer : C) Third

Description : Which if the following is not the type of data integrity. A) Key integrity B) Domain integrity C) Entity integrity D) Referential integrity

Last Answer : A) Key integrity

Description : State true or false i) A candidate key is a minimal super key. ii) A candidate key can also refer to as surrogate key. A) i-true, ii-false B) i-false, ii-true C) i-true, ii-true D) i-false, ii-false

Last Answer : C) i-true, ii-true

Description : The candidate key is that you choose to identify each row uniquely is called …………….. A) Alternet Key B) Primary Key C) Foreign Key D) None of the above

Last Answer : B) Primary Key

Description : ………..defines the structure of a relation which consists of a fixed set of attribute-domain pairs. A) Instance B) Schema c) Program D) Super Key

Last Answer : B) Schema

Description : The components of IP security includes …………………. A) Authentication Header (AH) B) Encapsulating Security Payload (ESP) C) Internet key Exchange (IKE) D) All of the above

Last Answer : D) All of the above

Description : The short cut key to start a new line without starting a new paragraph is ...... A) Ctrl+Enter B) Shift+Enter C) Alt+Enter D) Ente

Last Answer : B) Shift+Enter

Description : ey to represent relationship between tables is called (A) Primary key (B) Secondary Key (C) Foreign Key (D) None of these

Last Answer : (C) Foreign Key

Description : Suppose d = { john :40, peter :45}, what happens when we try to retrieve a value using the expression d[ susan ]? a) Since susan is not a value in the set, Python raises a KeyError ... Python raises a KeyError exception d) Since susan is not a key in the set, Python raises a syntax error

Last Answer : c) Since “susan” is not a key in the set, Python raises a KeyError exception