Description : …………. Is the process of creating new classes, called derived classes from existing classes called base class. A) Inheritance B) Encapsulation C) Polymorphism D) Overloading
Last Answer : A) Inheritance
Description : ………… enable us to hide, inside the object, both the data fields and the methods that act on that data. A) Encapsulation B) Polymorphism C) Inheritance D) Overloading
Last Answer : A) Encapsulation
Description : Module design is used to maximize cohesion and minimize coupling. Which of the following is the key to implement this rule? (A) Inheritance (B) Polymorphism (C) Encapsulation (D) Abstraction
Last Answer : (C) Encapsulation
Description : Which of the following correctly describes overloading of functions? (A) Virtual polymorphism (B) Transient polymorphism (C) Ad-hoc polymorphism (D) Pseudo polymorphism
Last Answer : (C) Ad-hoc polymorphism
Description : In C++, polymorphism requires: (A) Inheritance only (B) Virtual functions only (C) References only (D) Inheritance, Virtual functions and references
Last Answer : (D) Inheritance, Virtual functions and references
Description : Which of the following differentiates between overloaded functions and overridden functions ? (A) Overloading is a dynamic or runtime binding and overridden is a static or compile time binding. ... function overloading, while redefining a function in a friend class is called function overriding.
Last Answer : (B) Overloading is a static or compile time binding and overriding is dynamic or runtime binding.
Description : Abstraction and encapsulation are fundamental principles that underlie the object oriented approach to software development. What can you say about the following two statements? I. Abstraction allows us to focus on what something ... and II are correct. (3) Only II is correct. (4) Only I is correct.
Last Answer : (1) Neither I nor II is correct.
Description : Consider the following two statements: (a) A publicly derived class is a subtype of its base class. (b) Inheritance provides for code reuse. Which of the following statements is correct? (A) Both the statements ( ... ) is correct and (b) is incorrect (D) Statement (a) is incorrect and (b) is correct
Last Answer : Answer: A
Description : When the inheritance is private, the private methods in base class are.................. in the derived class (in C++). (A) inaccessible (B) accessible (C) protected (D) public
Last Answer : (A) inaccessible
Description : Polymorphism is implemented using function overloading. Justify the statement.
Last Answer : Polymorphism is a mechanism that allows a developer to have more than one function with same name but different signature. In function overloading, one can make use of more than one function with different signature as well. Hence ... main() { int a[10],i,isum; float b[5],fsum; clrscr(); cout
Description : The concept of multiple inheritance is implemented in Java by A) extending two or more classes B) extending one class and implementing one or more interfaces C) implementing two or more interfaces D) both B and C
Last Answer : D) both B and C
Description : State true or false. i) init() is called after start() in applet ii) applets are used for networking iii) inheritance is a part of Java Foundation Classes iv) final does not prevent inheritance A) i-true, ii- ... C) i-true, ii-true, iii-true, iv-true D) i-true, ii-false, iii-false, iv-false
Last Answer : B) i-false, ii-false, iii-false, iv-false
Description : All java classes are derived from A) java.lang.Class B) java.util.Name C) java.lang.Object D) java.awt.Window
Last Answer : D) java.awt.Window
Description : Equivalence partitioning is a .................. method that divides the input domain of a program into classes of data from which test cases can be derived. (A) White-box testing (B) Black-box testing (C) Orthogonal array testing (D) Stress testing
Last Answer : (B) Black-box testing
Description : Which of the following statement(s) is/are TRUE with regard to software testing? I. Regression testing technique ensures that the software product runs correctly after the changes during maintenance. II. Equivalence partitioning is a ... (1) only I (2) only II (3) both I and II (4) neither I nor II
Last Answer : (1) only I
Description : Satellite DNA is important because it (a) does not code for proteins and is same in all members of the population (b) codes for enzymes needed for DNA replication (c) codes for proteins ... and also the same degree of polymorphism in an individual, which is heritable from parents to children.
Last Answer : (d) shows high degree of polymorphism in population and also the same degree of polymorphism in an individual, which is heritable from parents to children
Description : Define the following: a. Aggregation among objects. b. Class. c. Repeated inheritance. d. Encapsulation. e. Scenario.
Last Answer : Ans: a).Aggregation among objects Aggregation among objects represents a relationship. It is a whole/part relationship. Aggregation may imply containment. b).Class A class is a template that specifies the ... or it can be shown as an event trace diagram in which events between objects are shown.
Description : Describe following terms: Inheritance, data abstraction, data encapsulation, dynamic binding.
Last Answer : Inheritance: 1. Inheritance is the process by which objects of one class acquire the properties of objects of another class. 2. It supports the concept of hierarchical classification. It also provides the ... with a given procedure call is not known until the time of the call at run-time.
Description : In Unix, files can be protected by assigning each one a 9-bit mode called rights bits. Now, consider the following two statements: I. A mode of 641 (octal) means that the owner can read and write the file, other ... (B) Only II is correct (C) Both I and II are correct (D) Both I and II are incorrect
Last Answer : (C) Both I and II are correct
Description : The mean-end analysis process centers around the detection of differences between the current state and the goal state. Once such a difference is isolated, an operator that can reduce the difference ... (A) backward planning (B) goal stack planning (C) operator subgoaling (D) operator overloading
Last Answer : (C) operator subgoaling
Description : Which of the following, in C++, is inherited in a derived class from base class ? (A) constructor (B) destructor (C) data members (D) virtual methods
Last Answer : (C) data members
Description : Which among the following definitions are correct: a) Object - Any entity that has state and behavior is known as an object. b) Class - Collection of objects is called class. It is logical entity. c) ... re-usability and is used to achieve run time polymorphism. d) All of the above e) None of These
Last Answer : d) All of the above
Description : What is Encapsulation? How is it implemented in Java?
Last Answer : A: Binding up of data and associated functions together into a single unit called (class) is called Encapsulation. In Java, it is implemented by the use of a class.
Description : In ……………………. mode, a common technique in packet-switched networks consists of wrapping a packet in a new one. A) Tunneling B) Encapsulation C) Both A and B D) None of the above
Last Answer : C) Both A and B
Description : The “part-whole”, or “a-part-of”, relationship in which objects representing the components of something associated with an object representing the entire assembly is called as (A) Association (B) Aggregation (C) Encapsulation (D) Generalisation
Last Answer : (B) Aggregation
Description : Which of the following cloud concept is related to pooling and sharing of resources? a) Polymorphism b) Abstraction c) Virtualization d) None of the mentioned
Last Answer : Virtualization
Description : What is Polymorphism? How is it implemented in Java?
Last Answer : A: It literally means the ability to take ‘more than one forms’. The ability of a method to behave in more than one form is called polymorphism. In Java, it is implemented by method (function) overloading (compile time polymorphism) and method overriding (runtime polymorphism).
Description : What is the difference between function overloading and function overriding?
Last Answer : A: In function overloading only the function name is same but function signature (list of parameters) is different, whereas, in function overriding both the function name as well as function ... is an example of static polymorphism, whereas, function overriding is an example of dynamic polymorphism.
Description : Which of the following is true about Java. A) Java does not support overloading. B) Java has replaced the destructor function of C++ C) There are no header files in Java. D) All of the above.
Last Answer : D) All of the above
Description : State True or False. i) While overloading operators new operator can be overloaded. ii) The binary operator such as +, -, * and must explicitly return a value. A) True, True B) True, False C) False, True D) False, False
Last Answer : C) False, True
Description : How do I create an online membership form that allows members to fill out and update their own profile?
Last Answer : Something on this list might help you. For my purposes, I created a Yahoo Group for members to sign up, which then granted them access to the full site by means of a URL.
Description : The statement in SQL which allows to change the definition of a table is (A) Alter. (B) Update. (C) Create. (D) select
Last Answer : (A) Alter.
Description : Which of the following statement(s) with regard to an abstract class in JAVA is/are TRUE? I. An abstract class is one that is not used to create objects. II. An abstract class is designed only to act as a base class ... by other classes. (1) Only l (2) Only II (3) Neither I nor II (4) Both l and II
Last Answer : Both l and II
Description : Which e-business model allows consumers to name their own price for products and services ? (A) B2 B (B) B2 G (C) C2 C (D) C2 B
Last Answer : (D) C2 B
Description : The friend functions are used in situations where A) We want to exchange data between classes B) We want to have access to unrelated classes C) Dynamic binding is required D) We want to create versatile overloaded operators.
Last Answer : A) We want to exchange data between classes
Description : Which of the following characteristics of constructor are true. i) They should be declared in the public section. ii) They are invoked automatically when the objects are created. iii) They do not have return type and void also. ... and v C) Only i, iii, iv and v D) All i, ii, iii, iv and v
Last Answer : D) All i, ii, iii, iv and v
Description : What is the benefit of Inheritance?
Last Answer : A: It is a very useful feature as it provides the concept of reusability. Also, it allows us to include or remove any features to an existing class without modifying it.
Description : What is Inheritance? How is it implemented in Java?
Last Answer : A: The ability of a class to adopt/share the properties (data and functions) completely or partially from another class is called Inheritance. In Java, it is implemented by the use of the keyword, extends.
Description : ....................... is the key to .................. A) Serialization, persistence B) Persistence, inheritance C) Inheritance, object D) Persistence, serialization
Last Answer : A) Serialization, persistence
Description : ....................is the key to ........................ A) Serialization, persistence B) Persistence, inheritance C) Inheritance, object D) Persistence, serialization
Last Answer : C) Inheritance, object
Description : The major goal of inheritance in C++ is A) To facilitate the conversion of data types B) To help modular programming C) To facilitate the reusability of code D) To extend the capabilities of a class
Last Answer : D) To extend the capabilities of a class
Description : An attacker can create an _____attack by sending hundreds or thousands of email with very large attachments a) Connection Attacks b) Auto responder attacks c) Attachment Overloading Attacks d) All of the above
Last Answer : c) Attachment Overloading Attacks
Description : An attacker can create an …………………………….. attack by sending hundreds or thousands of emails with very large attachment A)Attachment Overloading Attack B)Connection Attack C)Auto Responder Attack D)All of the Above
Last Answer : A)Attachment Overloading Attack
Description : An attackers can create an …....attack by sending hundreds or thousand of e-mail with very large attachment. a. Connection Attack b. Auto responder Attack c. Attachment overloading Attack d. All of the above
Last Answer : c. Attachment overloading Attack
Description : an attack can create and attack by sending hundreds or thousand of e-mail with very large attachment (a) connection attack (b) auto responder attack (c) attachment overloading attack (d) all of the above
Last Answer : (c) attachment overloading attack
Description : An attacker can create an________attack by sending hundreds or thousands of e-mails a with very large attachments. A. Connection Attack B. Auto responder Attack C. Attachment Overloading Attack D. All the above
Last Answer : B. Auto responder Attack
Description : Write a program to implement single inheritance. Declare base class employee with Emp_No. and Emp_Name. Declare derived class fitness with height and weight. Accept and display data for one employee.
Last Answer : #include<iostream.h> #include<conio.h> class employee { protected: int emp_no; char emp_name[10]; public: void gete() { cout<< enter employee details ; cin>>emp_no; cin>> ... f.gete(); f.pute(); f.getft(); f.putft(); getch(); }
Description : Which of the following malicious program do not replicate automatically? A) Trojan Horse B) Virus C) Worm D) Zombie
Last Answer : A) Trojan Horse