Description : Which of the following statements is correct? (A) Every class containing abstract method must not be declared abstract. (B) Abstract class cannot be directly initiated with ‘new’ operator. (C) Abstract class cannot be initiated. (D) Abstract class contains definition of implementation.
Last Answer : Answer: B,C
Description : What is an abstract class?
Last Answer : A: An abstract class is a class that is declared abstract—it may or may not include abstract methods. Abstract classes cannot be instantiated, but they can be subclassed.
Description : In java, string is a ............. A) primitive data type B) abstract data type C) combination of boolean D) None of the above
Last Answer : B) abstract data type
Description : Data input is A) an abstract class defined in java.io B) a class we can use to read primitive data types C) an interface that defines methods to open files. D) an interface that defines methods to read primitive data types.
Last Answer : D) an interface that defines methods to read primitive data types.
Description : The .................. and .................... classes are abstract classes that support reading and writing of byte streams. A) reader, writer B) inputstream, outputstream C) objectinputstream, objectoutputstream D) none
Last Answer : B) inputstream, outputstream
Description : State true or false for Java Program. i) Data members of an interface are by default final ii) An abstract class has implementations of all methods defined inside it. A) i-false, ii-false B) i-false, ii-true C) i-true, ii-false D) i-true, ii-true
Last Answer : C) i-true, ii-false
Description : A ………………. Is a class whose instances themselves are classes. A) Subclass B) Abstract Class C) Meta Class D) Object Class
Last Answer : C) Meta Class
Description : Which of the following is true about the characteristics of abstract data types? i) It exports a type. ii) It exports a set of operations A) True, False B) False, True C) True, True D) False, False
Last Answer : C) True, True
Description : ……………….. level is where the model becomes compatible executable code A) Abstract level B) Application level C) Implementation level D) All of the above
Last Answer : C) Implementation level
Description : Which if the following is/are the levels of implementation of data structure A) Abstract level B) Application level C) Implementation level D) All of the above
Last Answer : D) All of the above
Description : Which of the following is/are correct with reference to Abstract class and interface ? (a) A class can inherit only one Abstract class but may inherit several interfaces. (b) An Abstract class can provide complete and default ... true (C) Both (a) and (b) are true (D) Neither (a) nor (b) is true
Last Answer : Answer: C
Description : Which of the following is used to make an Abstract class ? (A) Making atleast one member function as pure virtual function (B) Making atleast one member function as virtual function (C) Declaring as Abstract class using virtual keyword (D) Declaring as Abstract class using static keyword
Last Answer : (A) Making atleast one member function as pure virtual function
Description : Given the following statements: (a) To implement Abstract Data Type, a programming language require a syntactic unit to encapsulate type definition. (b) To implement ADT, a programming language requires some primitive operations that are ... (b) and (c) are false. (D) (a), (b) and (c) are true.
Last Answer : (D) (a), (b) and (c) are true.
Description : Which of the following statement(s) with regard to an abstract class in JAVA is/are TRUE? I. An abstract class is one that is not used to create objects. II. An abstract class is designed only to act as a base class ... by other classes. (1) Only l (2) Only II (3) Neither I nor II (4) Both l and II
Last Answer : Both l and II
Description : Define what is the difference between an abstract method & virtual method?
Last Answer : An Abstract method does not provide an implementation and forces overriding to the deriving class (unless the deriving class also an abstract class), whereas the virtual method has an ... abstract method does not provide implementation & forces the derived class to override the method.
Description : What is the similarity between a method and a constructor?
Last Answer : A: Below are some of the similarities: 1) Both of them are member methods of any class. 2) Both can be parameterised or non-parameterised. 3) Both can be overloaded.
Description : Why is the main method static?
Last Answer : A: So that it be available for execution without the need of any object.
Description : Why is the main method public?
Last Answer : A: So that it be accessible to the JVM which begins to execute the program from outside of the class.
Description : What is the function of readLine() method?
Last Answer : A: readLine() method reads a line of text (which you input) and returns the result in the form of a String.
Description : State true of false. i) Public can only be assigned to class ii) Protected protects a statement iii) Protected method is never accessible outside the package iv) Friendly variable may be accessible outside class A) i- ... -false, ii-true, iii-false, iv-false D) i-true, ii-false, iii-false, iv-true
Last Answer : C) i-false, ii-true, iii-false, iv-false
Description : Each method in a java class must have a unique name . A) Not necessary B) True C) False D) None of the above
Last Answer : A) Not necessary
Description : Using which keyword we can access value of the instance variables and class variables of that class inside the method of that class itself. A) super B) final C) this D) either super or this
Last Answer : C) this
Description : A method name myMethod( ) that needs two integer arguments is declared as A) public void myMethod( ); B) public void myMethod(int a, int b); C) public void myMethod(int a, b); D) public int myMethod(a, b);
Last Answer : B) public void myMethod(int a, int
Description : In Java servlet method init( ) is called ..................... times. A) 1 B) 2 C) 0 D) multiple
Last Answer : A) 1
Description : Which method will a web browser call on a new applet? A) main method B) destroy method C) execute method D) init method
Last Answer : D) init method
Description : For execution of DELETE SQL query in JDBC, ............. method must be used. A) executeQuery() B) executeDeleteQuery() C) executeUpdate() D) executeDelete()
Last Answer : C) executeUpdate()
Description : What would happen if "String[]args" is not included as argument in the main method. A) No error B) Compilation error C) Program won't run D) Program exit
Last Answer : C) Program won't run
Description : break statement is used to i) get out of method ii) end aprogram iii) get out of a loop iv) get out of the system A) 1 & 2 B) 1,2 & 3 C) 1 & 3 D) 3
Last Answer : D) 3
Description : A direct method of deadlock prevention is to prevent the occurrence of ………….. A) Mutual exclusion B) Hold and wait C) Circular waits D) No preemption
Last Answer : C) Circular waits
Description : A direct method of deadlock prevention is to prevent the occurrences of ................... A) Mutual exclusion B) Hold and wait C) Circular waits D) No preemption
Description : ..................... provides a larger sized of virtual memory but require virtual memory which provides multidimensional memory. A) Paging method B) Segmentation method C) Paging and segmentation method D) None of these
Last Answer : B) Segmentation method
Description : ……………… is a tabular method for describing the logic of the decisions to be taken. A) Decision tables B) Decision tree C) Decision Method D) Decision Data
Last Answer : A) Decision tables
Description : ………………. is responsible for all aspects of data processing, operation research, organization and method, system analysis and design investments. A) Management Services Director B) Data Processing Manager C) Computer Manager D) Both B and C
Last Answer : A) Management Services Director
Description : In general, the binary search method needs no more than ……………. comparisons. A) [log2n]-1 B) [logn]+1 C) [log2n] D) [log2n]+1
Last Answer : D) [log2n]+1
Description : ………………… is preferred method for enforcing data integrity A) Constraints B) Stored Procedure C) Triggers D) Cursors
Last Answer : A) Constraints
Description : ……………. is a preferred method for enforcing data integrity A) Constraints B) Stored procedure C) Triggers D) Cursors
Description : HSAM stands for ………. A) Hierarchic Sequential Access Method B) Hierarchic Standard Access Method C) Hierarchic Sequential and Method D) Hierarchic Standard and Method
Last Answer : A) Hierarchic Sequential Access Method
Description : A simple cabling method, known as the ……………… topology allows about 30 computers on a maximum cable length of about 600 feet. A) Ring B) Bus C) Star D) Mesh
Last Answer : B) Bus
Description : Which of the following algorithm design technique is used in the quick sort algorithm? a) Dynamic programming b) Backtracking c) Divide-and-conquer d) Greedy method
Last Answer : Which of the following algorithm design technique is used in the quick sort algorithm? a) Dynamic programming b) Backtracking c) Divide-and-conquer d) Greedy method
Description : What is the output of the following code? a={1:"A",2:"B",3:"C"} b={4:"D",5:"E"} a.update(b) print(a) a) {1: ‘A’, 2: ‘B’, 3: ‘C’} b) Method update() doesn’t exist for dictionaries c) {1: ‘A’, 2: ‘B’, 3: ‘C’, 4: ‘D’, 5: ‘E’} d) {4: ‘D’, 5: ‘E’}
Last Answer : c) {1: ‘A’, 2: ‘B’, 3: ‘C’, 4: ‘D’, 5: ‘E’}
Description : What is the output of the following code? a={1:"A",2:"B",3:"C"} print(a.setdefault(3)) a) {1: ‘A’, 2: ‘B’, 3: ‘C’} b) C c) {1: 3, 2: 3, 3: 3} d) No method called setdefault() exists for dictionary
Last Answer : b) C
Description : What is the output of the following code? >>> a=(2,3,4) >>> sum(a,3) a) Too many arguments for sum() method b) The method sum() doesn’t exist for tuples c) 12 d) 9
Last Answer : c) 12
Description : The total transportation cost in an initial basic feasible solution to the following transportation problem using Vogel’s Approximation method is (A) 76 (B) 80 (C) 90 (D) 96
Last Answer : (B) 80
Description : At any iteration of simplex method, if Δj (Zj – Cj) corresponding to any nonbasic variable Xj is obtained as zero, the solution under the test is (A) Degenerate solution (B) Unbounded solution (C) Alternative solution (D) Optimal solution
Last Answer : (C) Alternative solution
Description : Equivalence partitioning is a .................. method that divides the input domain of a program into classes of data from which test cases can be derived. (A) White-box testing (B) Black-box testing (C) Orthogonal array testing (D) Stress testing
Last Answer : (B) Black-box testing
Description : The syntax of capturing events method for document object is (A) CaptureEvents() (B) CaptureEvents(Orgs eventType) (C) CaptureEvents(eventType) (D) CaptureEvents(eventVal)
Last Answer : (C) CaptureEvents(eventType)
Description : Which of the following statements is not true about disk-arm scheduling algorithms ? (A) SSTF (shortest seek time first) algorithm increases performance of FCFS. (B) The number of requests for disk ... arm movements. (D) SCAN and C-SCAN algorithms are less likely to have a starvation problem.
Last Answer : (B) The number of requests for disk service are not influenced by file allocation method.
Description : Beam-penetration and shadow-mask are the two basic techniques for producing color displays with a CRT. Which of the following is not true ? I. The beam-penetration is used with random scan monitors. II. Shadow-mask is used ... -penetration method. (A) I and II (B) II and III (C) III only (D) IV only
Last Answer : (C) III only