Escolar Documentos
Profissional Documentos
Cultura Documentos
1. Four prime numbers are written in ascending order of their magnitudes the product of
the first three is 385 and that of the last three is 1001. The largest given prime number is
a. 11
b. 13
c. 17
d. 19
2. Mahavir deposited in the bank from Monday to Saturday the amounts of Rs. 87.80, Rs.
203.63, Rs. 3677.98, Rs. 92899.01, Rs. 66 and Rs. 554945.19 respectively. Find his total
deposit for this week
a. Rs. 651879.61
b. Rs. 652779.61
c. Rs. 650879.51
d. Rs. 655889.71
3. Amar deposited in Vijay Bank Rs. 259206.16 on Monday. Rs. 201890.48 on Tuesday, Rs.
284.16 on Wednesday. He withdrew Rs. 50000.00 on Thursday. He again deposited Rs.
230.01 on Friday and Rs. 72.62 on Saturday. Find his total balance in the bank for this week
a. Rs. 501783.43
b. Rs. 501683.43
c. Rs. 511693.43
d. Rs. 511683.43
4. I was born on October 17, 1927. How old I was on Jan. 26, 1978?
Rs. 1230.79, Rs. 11368.08, Rs. 203.63, Rs. 10314.89, Rs. 64.8, Rs. 101.00 and Rs. 3677.98
a. Rs. 27961.1
b. Rs. 26961.17
c. Rs. 26951.17
d. Rs. 25961.17
6. How many pieces, each of length 4.5 m can be cut of 225 m of wire?
a. 40
b. 54
c. 56
d. 50
7. Parkash and Girish were travelling together. Prakash paid Rs. 200 for their stay in a hotel
and Girish paid taxi fare of Rs. 80. If they have to share these expenses equally, then
a. Prakash should pay Rs. 60 to Girish
a. 210
b. 110
c. 220
d. 105
a. 105 x 10 + 115 x 5
b. 11 x 515
c. 1151 x 5
d. 110 x 15 + 5 x 15
a. 0
b. 4
c. 6
d. 8
11. The smallest natural number by which the product of 3 consecutive even numbers is
always divisible is
a. 16
b. 32
c. 48
d. 96
a. 54
b. 64
c. 81
d. 91
13. The total income of Hazari and Murari is Rs. 3000. Hazari spends 60% of his income and
Murari spends 80% of his income. If their savings are equal. Find the income of Hazari
a. Rs. 2000
b. Rs. 3000
c. Rs. 1500
d. Rs. 1000
14. Bholanath save 25% if his income, but due to dearness the expenses increased by 25%,
still he saves Rs. 30. Find his income
a. Rs. 400
b. Rs. 480
c. Rs. 450
d. Rs. 475
15. In a city 40% of the people are illiterate and 60% are poor. Among the rich 10% are
illiterate. What percentage of the poor population is illiterate?
a. 36%
b. 60%
c. 40%
d. None of these
Section - II
Directions (Q 1-5): Find the missing characters from the following series
1. ab _ a _ b _ a _ bba
a. aaab b. baba
c. abba d. baab
2. _ bc _ _ bb _ aabc
a. abab b. caab
c. acac d. aaab
3. cc _ a _ cabccb _ cca _ c _ ba
a. cbaba b. bacbc
c. bcabc d. abcbc
4. cba _ cb _ ccb _ c _
a. caac b. cbca
c. cbac d. cabc
5. aa _ cb _ aa _ _ bba _ ccb _
a. cabaac b. ababab
c. cbccab d. aaabca
6. If day before yesterday was Sunday then next Monday will be after ____ days.
a. 4 b. 5
c. 6
d. 7
7. If Sept 9 was Friday then the last Tuesday of the same Month will fall on
a. 25 b. 26
c. 27
d. 28
8. If the month of May begins on Sunday then the third Friday will fall on
a. 19 b. 20
c. 21
d. 22
9. If January 31 in a particular year falls on a Saturday then January 1 will be
a. Sunday b. Tuesday
c. Thursday d. Monday
a. North b. South
c. SW
d. SE
11. A boy walked 400 m north from his home, then he turned right and walked 100 m, then
he turned left and walked 500 m. in which direction is he walking now
a. North b. South
c. NE
d. NW
12. A car starts from a point A. Then it moves 4 KM towards South. Then it turns right and
moves 3 KM. How far is it from point A now.
a. 3 KM b. 4 KM
c. 5 KM d. 0 KM
a. 137
b. 127
c. 103
d. 218
14. 41, 29, 19, 11, _
a. 5 b. 6
c. 4
d. 3
a. KMQT b. KMPU
c. LMPT d. KMPT
Answers
1. b, 2. a, 3. d, 4. c, 5. b
6. d, 7. c, 8. a, 9. d, 10. b
1. b, 2. c, 3. c, 4. a, 5. c
6. c, 7. c, 8. b, 9. c, 10. b
2. Mental Ability
3. General English
5. Basics of Engineering
B. CIVIL Engineering
C. INSTRUMENTATION Engineering
D. CHEMICAL Engineering
E. PRODUCTION Engineering
F. ELECTRICAL Engineering
1. Four prime numbers are written in ascending order of their magnitudes the product of
the first three is 385 and that of the last three is 1001. The largest given prime number is
a. 11
b. 13
c. 17
d. 19
2. Mahavir deposited in the bank from Monday to Saturday the amounts of Rs. 87.80, Rs.
203.63, Rs. 3677.98, Rs. 92899.01, Rs. 66 and Rs. 554945.19 respectively. Find his total
deposit for this week
a. Rs. 651879.61
b. Rs. 652779.61
c. Rs. 650879.51
d. Rs. 655889.71
3. Amar deposited in Vijay Bank Rs. 259206.16 on Monday. Rs. 201890.48 on Tuesday, Rs.
284.16 on Wednesday. He withdrew Rs. 50000.00 on Thursday. He again deposited Rs.
230.01 on Friday and Rs. 72.62 on Saturday. Find his total balance in the bank for this week
a. Rs. 501783.43
b. Rs. 501683.43
c. Rs. 511693.43
d. Rs. 511683.43
4. I was born on October 17, 1927. How old I was on Jan. 26, 1978?
a. 49 years and 101 days
b. 50 years and 100 days
c. 50 years and 101 days
d. 50 years and 103 days
Rs. 1230.79, Rs. 11368.08, Rs. 203.63, Rs. 10314.89, Rs. 64.8, Rs. 101.00 and Rs. 3677.98
a. Rs. 27961.1
b. Rs. 26961.17
c. Rs. 26951.17
d. Rs. 25961.17
6. How many pieces, each of length 4.5 m can be cut of 225 m of wire?
a. 40
b. 54
c. 56
d. 50
7. Parkash and Girish were travelling together. Prakash paid Rs. 200 for their stay in a hotel
and Girish paid taxi fare of Rs. 80. If they have to share these expenses equally, then
a. Prakash should pay Rs. 60 to Girish
b. Girish should pay Rs. 120 to Prakash
c. Girish should pay Rs. 60 to Prakash
d. Prakash should pay Rs. 120 to Girish
11. The smallest natural number by which the product of 3 consecutive even numbers is
always divisible is
a. 16
b. 32
c. 48
d. 96
13. The total income of Hazari and Murari is Rs. 3000. Hazari spends 60% of his income and
Murari spends 80% of his income. If their savings are equal. Find the income of Hazari
a. Rs. 2000
b. Rs. 3000
c. Rs. 1500
d. Rs. 1000
14. Bholanath save 25% if his income, but due to dearness the expenses increased by 25%,
still he saves Rs. 30. Find his income
a. Rs. 400
b. Rs. 480
c. Rs. 450
d. Rs. 475
15. In a city 40% of the people are illiterate and 60% are poor. Among the rich 10% are
illiterate. What percentage of the poor population is illiterate?
a. 36%
b. 60%
c. 40%
d. None of these
Section - II
Directions (Q 1-5): Find the missing characters from the following series
1. ab _ a _ b _ a _ bba
a. aaab
b. baba
c. abba
d. baab
2. _ bc _ _ bb _ aabc
a. abab
b. caab
c. acac
d. aaab
3. cc _ a _ cabccb _ cca _ c _ ba
a. cbaba
b. bacbc
c. bcabc
d. abcbc
4. cba _ cb _ ccb _ c _
a. caac
b. cbca
c. cbac
d. cabc
5. aa _ cb _ aa _ _ bba _ ccb _
a. cabaac
b. ababab
c. cbccab
d. aaabca
6. If day before yesterday was Sunday then next Monday will be after ____ days.
a. 4
b. 5
c. 6
d. 7
7. If Sept 9 was Friday then the last Tuesday of the same Month will fall on
a. 25
b. 26
c. 27
d. 28
8. If the month of May begins on Sunday then the third Friday will fall on
a. 19
b. 20
c. 21
d. 22
11. A boy walked 400 m north from his home, then he turned right and walked 100 m, then
he turned left and walked 500 m. in which direction is he walking now
a. North
b. South
c. NE
d. NW
12. A car starts from a point A. Then it moves 4 KM towards South. Then it turns right and
moves 3 KM. How far is it from point A now.
a. 3 KM
b. 4 KM
c. 5 KM
d. 0 KM
Answers
6. d, 7. c, 8. a, 9. d, 10. b
1. b, 2. c, 3. c, 4. a, 5. c
6. c, 7. c, 8. b, 9. c, 10. b
LinkWithin
Posted by ALL EXAM QUESTION PAPERS at 11:44 AM 76 comments Links to this post
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Google Buzz
Labels: VIZAG STEEL
Reactions:
Wednesday, January 20, 2010
Vizag Steel Plant (VSP) Management
Trainee Recruitment Exam.
Solved Sample Question Paper for Vizag Steel Plant (VSP) Management Trainee
Recruitment Exam.
Section - I
a. 11
b. 13
c. 17
d. 19
2. Mahavir deposited in the bank from Monday to Saturday the amounts of Rs. 87.80, Rs.
203.63, Rs. 3677.98, Rs. 92899.01, Rs. 66 and Rs. 554945.19 respectively. Find his total
deposit for this week
a. Rs. 651879.61
b. Rs. 652779.61
c. Rs. 650879.51
d. Rs. 655889.71
3. Amar deposited in Vijay Bank Rs. 259206.16 on Monday. Rs. 201890.48 on Tuesday, Rs.
284.16 on Wednesday. He withdrew Rs. 50000.00 on Thursday. He again deposited Rs.
230.01 on Friday and Rs. 72.62 on Saturday. Find his total balance in the bank for this week
a. Rs. 501783.43
b. Rs. 501683.43
c. Rs. 511693.43
d. Rs. 511683.43
4. I was born on October 17, 1927. How old I was on Jan. 26, 1978?
Rs. 1230.79, Rs. 11368.08, Rs. 203.63, Rs. 10314.89, Rs. 64.8, Rs. 101.00 and Rs. 3677.98
a. Rs. 27961.1
b. Rs. 26961.17
c. Rs. 26951.17
d. Rs. 25961.17
6. How many pieces, each of length 4.5 m can be cut of 225 m of wire?
a. 40
b. 54
c. 56
d. 50
7. Parkash and Girish were travelling together. Prakash paid Rs. 200 for their stay in a hotel
and Girish paid taxi fare of Rs. 80. If they have to share these expenses equally, then
a. 210
b. 110
c. 220
d. 105
a. 105 x 10 + 115 x 5
b. 11 x 515
c. 1151 x 5
d. 110 x 15 + 5 x 15
a. 0
b. 4
c. 6
d. 8
11. The smallest natural number by which the product of 3 consecutive even numbers is
always divisible is
a. 16
b. 32
c. 48
d. 96
a. 54
b. 64
c. 81
d. 91
13. The total income of Hazari and Murari is Rs. 3000. Hazari spends 60% of his income and
Murari spends 80% of his income. If their savings are equal. Find the income of Hazari
a. Rs. 2000
b. Rs. 3000
c. Rs. 1500
d. Rs. 1000
14. Bholanath save 25% if his income, but due to dearness the expenses increased by 25%,
still he saves Rs. 30. Find his income
a. Rs. 400
b. Rs. 480
c. Rs. 450
d. Rs. 475
15. In a city 40% of the people are illiterate and 60% are poor. Among the rich 10% are
illiterate. What percentage of the poor population is illiterate?
a. 36%
b. 60%
c. 40%
d. None of these
Section - II
Directions (Q 1-5): Find the missing characters from the following series
1. ab _ a _ b _ a _ bba
a. aaab b. baba
c. abba d. baab
2. _ bc _ _ bb _ aabc
a. abab b. caab
c. acac d. aaab
3. cc _ a _ cabccb _ cca _ c _ ba
a. cbaba b. bacbc
c. bcabc d. abcbc
4. cba _ cb _ ccb _ c _
a. caac b. cbca
c. cbac d. cabc
5. aa _ cb _ aa _ _ bba _ ccb _
a. cabaac b. ababab
c. cbccab d. aaabca
6. If day before yesterday was Sunday then next Monday will be after ____ days.
a. 4 b. 5
c. 6
d. 7
7. If Sept 9 was Friday then the last Tuesday of the same Month will fall on
a. 25 b. 26
c. 27
d. 28
8. If the month of May begins on Sunday then the third Friday will fall on
a. 19 b. 20
c. 21
d. 22
a. Sunday b. Tuesday
c. Thursday d. Monday
a. North b. South
c. SW
d. SE
11. A boy walked 400 m north from his home, then he turned right and walked 100 m, then
he turned left and walked 500 m. in which direction is he walking now
a. North b. South
c. NE
d. NW
12. A car starts from a point A. Then it moves 4 KM towards South. Then it turns right and
moves 3 KM. How far is it from point A now.
a. 3 KM b. 4 KM
c. 5 KM d. 0 KM
a. 137
b. 127
c. 103
d. 218
a. 5 b. 6
c. 4
d. 3
a. KMQT b. KMPU
c. LMPT d. KMPT
Answers
1. b, 2. a, 3. d, 4. c, 5. b
6. d, 7. c, 8. a, 9. d, 10. b
1. b, 2. c, 3. c, 4. a, 5. c
6. c, 7. c, 8. b, 9. c, 10. b
Ans: (d)
2. The process of organizing the memory into two banks to allow 8 and 16-bit data operation is
called
a. Bank Switching
b. Indexed Mapping
c. Two-way memory interleaving
d. Memory segmentation
Ans: (c)
Ans: (c)
4. The use of hardware in memory management is through segment relocation and protection is
Ans: (c)
a. too much of the time is spent in waiting to swap between memory and disk
b. two processes try to access the same resource
c. the size of the data to be inserted is less than the size of a page in memory
d. the processor's mapping table discovers that the program is trying to use an address that
doesn't currently exist
Ans: (a)
Ans: b
2. Which of the following command is used to count just the number of lines contained in a file ?
a. wc-1
b. wc-w
c.wc-c
d. wc-r
Ans: a
3. Which command is used to copy a file wb with the same name from the programs directory to
the misc. directory ?
a. copy programs/wb misc/wb
b. cp programs/wb misc
c. copy a:programs/wb b:misc/wb
d. tar programs/wb misc/wb
Ans: b
4. The commonly used UNIX commands like date, Is, cat, etc. are stored in
a. /dev directory
b. /bin and /usr/bin directories
c. /unix directory
d. /tmp directory
Ans: b
5. Which of the following directories contain all the files created by a user, including his login
directory ?
a. /tmp
b. /usr
c. /etc
d. /dev
Ans: b
6. Which command is used to copy the three files wb, colllect and mon into the misc directory,
under the same, when you were currently in the programs directory ?
a. copy wb collect mon/misc
b. cp wb collect mon ../misc
c. copy wb ../misc collect ../misc mon ../misc
d. tar wb collect mon/misc
Ans: b
7. Which of the following command is used to display the directory attributes rather than its
contents ?
a. 1s-1-d
b. Is-x
c. Is-1
d. is-F
Ans: a
Ans: c
9. Which command is used to list out all the hidden files along with the other files ?
a. Is-1
b. Is-F
c. Is-x
d Is-a
Ans: d
10. The file that contains a set of instructions which are performed when a user logs in, is
a) .exrc
b) .profile
c) autoexec.bat
d) .autoexec
Ans: b
Ans: b
2. A logical schema
a. is the entire database
b. is a standard way of organizing information into accessible parts
c. describes how data is actually stored on disk
d. all of the above
Ans: b
3. A form defines
a. where data are placed on the screen
b. the width of each field
c. both (a) and (b)
d. All of the above
Ans: c
Ans: b
Ans: b
6. A report form
a. appears on the computer monitor during data entry
b. is used during report generation to format data
c. Both a and b
d. All of the above
Ans: b
7. A list consists of last names, first names, addresses and pincodes if all people in the list have
the same last and the same pincode, a useful key would be
a. the pincode
b. the last name
c. a compound key consisting of the first name and the last name
d. all of the above
Ans: c
Ans: b
10. Which of the following contains a complete record of all activity that affected the contents of
a database during a certain period of time ?
a. Report writer
b. Query language
c. Data manipulation language
d. Transaction Log
Ans: d
What is 2NF?
ANSWER:
A relation schema R is in 2NF if it is in 1NF and every non-prime attribute A in R is fully
functionally dependent on primary key.
What is 3NF?
ANSWER:
A relation schema R is in 3NF if it is in 2NF and for every FD X A either of the following is true
• X is a Super-key of R.
• A is a prime attribute of R.
In other words, if every non prime attribute is non-transitively dependent on primary key.
What is 4NF?
ANSWER:
A relation schema R is said to be in 4NF if for every Multivalued dependency X Y that holds
over R, one of following is true
• X is subset or equal to (or) XY = R.
• X is a super key.
What is 5NF?
ANSWER:
A Relation schema R is said to be 5NF if for every join dependency {R1, R2, ..., Rn} that holds
R, one the following is true
• Ri = R for some i.
• The join dependency is implied by the set of FD, over R in which the left side is key of R.
What is Relationship?
ANSWER:
It is an association among two or more entities.
How is the data structure of System R different from the relational structure?
ANSWER:
Unlike Relational systems in System R
• Domains are not supported
• Enforcement of candidate key uniqueness is optional
• Enforcement of entity integrity is optional
• Referential integrity is not enforced
What is an Entity?
ANSWER:
It is a 'thing' in the real world with an independent existence.
What is an Entity type?
ANSWER:
It is a collection (set) of entities that have same attributes.
• Physical Data Independence : Modification in physical level should not affect the logical level.
• Logical Data Independence : Modification in logical level should affect the view level.
NOTE: Logical Data Independence is more difficult to achieve
Posted by Anil Kant at 2:19 AM 0 comments Email ThisBlogThis!Share to TwitterShare to
FacebookShare to Google Buzz
Labels: DBMS Interview Questions, SQL Server Interview Questions
• Physical level: The lowest level of abstraction describes how data are stored.
• Logical level: The next higher level of abstraction, describes what data are stored in database
and what relationship among those data.
• View level: The highest level of abstraction describes only part of entire database.
What is RDBMS ?
Relational Data Base Management Systems (RDBMS) are database management systems that
maintain data records and indices in tables. Relationships may be created and maintained
across and among the data and tables.
In a relational database, relationships between data items are expressed by means of tables.
Interdependencies among these tables are expressed by data values rather than by pointers.
This allows a high degree of data independence. An RDBMS has the capability to recombine
the data items from different files, providing powerful tools for data usage.
Posted by Anil Kant at 2:14 AM 0 comments Email ThisBlogThis!Share to TwitterShare to
FacebookShare to Google Buzz
Labels: DBMS Interview Questions, SQL Server Interview Questions
How is the data structure of System R different from the relational structure?
ANSWER:
Unlike Relational systems in System R
• Domains are not supported
• Enforcement of candidate key uniqueness is optional
• Enforcement of entity integrity is optional
• Referential integrity is not enforced
What is DBMS?
ANSWER:
• Redundancy is controlled.
• Unauthorised access is restricted.
• Providing multiple user interfaces.
• Enforcing integrity constraints.
• Providing backup and recovery.
Ans: NTFS stands for new technology file system or network technology file system. In NTSF
partition size can be of 2 TB or more. and file size can be 16 TB. file/folder encryption is done.
and it supports file name character upto 255.
FAT32 stands for File allocation table. in FAT32 partition size can be Upto 2 TB. and file size
can be 4 GB. file/folder encryption is not possible in FAT32. and it supports file name character
upto 8.3.
Ans: Windows XP is some what faster than Windows 2000, assuming you have a fast
processor and tons of memory (although it will run fine with a 300Mhz Pentium II and 128MB of
RAM).
The new Windows XP interface is more cheerful and colorful than earlier versions, although the
less-cartoony "Classic" interface can still be used if desired.
Windows XP has more bells and whistles, such as the Windows Movie Maker, built-in CD writer
support, the Internet Connection Firewall, and Remote Desktop Connection.
Windows XP has better support for games and comes with more games than Windows 2000.
Windows XP is the latest OS - If you don't upgrade now, you'll probably end up migrating to XP
eventually anyway, and we mere mortals can only take so many OS upgrades.
Ans: b
2. Which of the following command is used to count just the number of lines contained in a file ?
a. wc-1
b. wc-w
c.wc-c
d. wc-r
Ans: a
3. Which command is used to copy a file wb with the same name from the programs directory to
the misc. directory ?
a. copy programs/wb misc/wb
b. cp programs/wb misc
c. copy a:programs/wb b:misc/wb
d. tar programs/wb misc/wb
Ans: b
4. The commonly used UNIX commands like date, Is, cat, etc. are stored in
a. /dev directory
b. /bin and /usr/bin directories
c. /unix directory
d. /tmp directory
Ans: b
5. Which of the following directories contain all the files created by a user, including his login
directory ?
a. /tmp
b. /usr
c. /etc
d. /dev
Ans: b
6. Which command is used to copy the three files wb, colllect and mon into the misc directory,
under the same, when you were currently in the programs directory ?
a. copy wb collect mon/misc
b. cp wb collect mon ../misc
c. copy wb ../misc collect ../misc mon ../misc
d. tar wb collect mon/misc
Ans: b
7. Which of the following command is used to display the directory attributes rather than its
contents ?
a. 1s-1-d
b. Is-x
c. Is-1
d. is-F
Ans: a
Ans: c
9. Which command is used to list out all the hidden files along with the other files ?
a. Is-1
b. Is-F
c. Is-x
d Is-a
Ans: d
10. The file that contains a set of instructions which are performed when a user logs in, is
a) .exrc
b) .profile
c) autoexec.bat
d) .autoexec
Ans: b
Ans: c
Ans: a
3. Which of the following command can be used to get information about yourself
a. who am i
b. pwd
c. i/4
d. which
Ans: a
Ans: b
5. Which of the following commands is used to copy directory structures in and out ?
a. cp
b. cp-p
c. cpio
d. copy
Ans: c
Ans: c
Ans: a
8. Which of the following signs is used to erase or kill an entire line you have typed and start you
are on a new line(but not display a new prompt) ?
a. @
b. $
c. #
d. !
Ans: a
9. Which of the following commands is used to count the total number of lines, words and
characters contained in a file.
a. count p
b. wcount
c. wc
d. countw
Ans: c
Ans: a
2. In a paged memory system, if the page size is increased, then the internal fragmentation
generally -
Ans: Becomes more
3. An operating system contains 3 user processes each requiring 2 units of resources R. The
minimum number of units of R such that no deadlock will ever occur is -
Ans: 4
4. Critical region is -
Ans: A set of instructions that access common shared resources which exclude one another in
time
5. Kernel is -
Ans: The set of primitive functions upon which the rest of operating system functions are built up
7. In a time sharing operating system, when the time slot given to a process is completed, the
process goes from the RUNNING state to the -
Ans: READY state
8. Supervisor call -
Ans: Are privileged calls that are used to perform resource management functions, which are
controlled by the operating system
2. In a multiprogramming environment-
Ans: more than one process resides in the memory
4. Give example of Scheduling Policies in which context switching never take place-
Ans: Shortest Job First, First-cum-first-served
5. Suppose that a process is in 'BLOCKED' state waiting for some I/O service. When the service
is completed, it goes to the-
Ans: READY State
2. The page replacement policy that sometimes leads to more page faults when the size of the
memory is increased is -
Ans: FIFO
3. The only state transition that is initiated by the user process itself is -
Ans: Block
4. Fragmentation is -
Ans: fragments of memory words unused in a page
5. Overlay is
Ans: a single contiguous memory that was used in the olden days for running large programs by
swapping
What is 2NF?
ANSWER:
A relation schema R is in 2NF if it is in 1NF and every non-prime attribute A in R is fully
functionally dependent on primary key.
What is 3NF?
ANSWER:
A relation schema R is in 3NF if it is in 2NF and for every FD X A either of the following is true
• X is a Super-key of R.
• A is a prime attribute of R.
In other words, if every non prime attribute is non-transitively dependent on primary key.
What is 4NF?
ANSWER:
A relation schema R is said to be in 4NF if for every Multivalued dependency X Y that holds
over R, one of following is true
• X is subset or equal to (or) XY = R.
• X is a super key.
What is 5NF?
ANSWER:
A Relation schema R is said to be 5NF if for every join dependency {R1, R2, ..., Rn} that holds
R, one the following is true
• Ri = R for some i.
• The join dependency is implied by the set of FD, over R in which the left side is key of R.
What is Relationship?
ANSWER:
It is an association among two or more entities.
How is the data structure of System R different from the relational structure?
ANSWER:
Unlike Relational systems in System R
• Domains are not supported
• Enforcement of candidate key uniqueness is optional
• Enforcement of entity integrity is optional
• Referential integrity is not enforced
What is an Entity?
ANSWER:
It is a 'thing' in the real world with an independent existence.
• Physical Data Independence : Modification in physical level should not affect the logical level.
• Logical Data Independence : Modification in logical level should affect the view level.
NOTE: Logical Data Independence is more difficult to achieve
• Physical level: The lowest level of abstraction describes how data are stored.
• Logical level: The next higher level of abstraction, describes what data are stored in database
and what relationship among those data.
• View level: The highest level of abstraction describes only part of entire database.
What is RDBMS ?
Relational Data Base Management Systems (RDBMS) are database management systems that
maintain data records and indices in tables. Relationships may be created and maintained
across and among the data and tables.
In a relational database, relationships between data items are expressed by means of tables.
Interdependencies among these tables are expressed by data values rather than by pointers.
This allows a high degree of data independence. An RDBMS has the capability to recombine
the data items from different files, providing powerful tools for data usage.
How is the data structure of System R different from the relational structure?
ANSWER:
Unlike Relational systems in System R
• Domains are not supported
• Enforcement of candidate key uniqueness is optional
• Enforcement of entity integrity is optional
• Referential integrity is not enforced
What is DBMS?
ANSWER:
• Redundancy is controlled.
• Unauthorised access is restricted.
• Providing multiple user interfaces.
• Enforcing integrity constraints.
• Providing backup and recovery.
Ans: (d)
2. The process of organizing the memory into two banks to allow 8 and 16-bit data operation is
called
a. Bank Switching
b. Indexed Mapping
c. Two-way memory interleaving
d. Memory segmentation
Ans: (c)
Ans: (c)
4. The use of hardware in memory management is through segment relocation and protection is
Ans: (c)
a. too much of the time is spent in waiting to swap between memory and disk
b. two processes try to access the same resource
c. the size of the data to be inserted is less than the size of a page in memory
d. the processor's mapping table discovers that the program is trying to use an address that
doesn't currently exist
Ans: (a)
Ans: d
2. The values that can legally appear to the right of the assignment operator are called
a. rvalues
b. int values
c. variables
d. constants
Ans: a
Ans: d
Ans: (b)
Ans: c
6. The two statement that can be used to change the flow of control are
a. if and switch
b. if and while
c. switch and do-while
d. break and continue
Ans: a
Ans: d
8. The conversion character 's' for data input means that the data item is
a. an unsigned decimal integer
b. a short integer
c. a hexadecimal integer
d. a string followed by whitespace character
Ans: d
9. The conversion character for data input which indicates that the data item is a floating-point
values is
(a) f
(b) g
(c) e
(d) All of the above
Ans: d
10. The conversion character 'i' for data output means that the data item is displayed as -
(a) a floating point value with an exponent
(b) an unsigned decimal integer
(c) a signed decimal integer
(d) an octal integer
Ans: c
Posted by Anil Kant at 11:58 PM 0 comments Email ThisBlogThis!Share to TwitterShare to
FacebookShare to Google Buzz
Labels: Computer Science and Applications, Programing in C and C++, PSU Exam Papers, UGC Net
Ans: a
Ans: b
3. The commands that send or "redirect" output of a program to a disk file or another system
device such as the printer are
a.
b. [and]
c. /* and /*
d. ( and )
Ans: a
Ans: d
Ans: b
Ans: a
3. In a simple 'if' statement with no 'else', what happens if the condition following the 'if' is false ?
a. The program searches for the last else in the program
b. Nothing
c. Control 'falls through' to the statement folowing 'if'
d. The body of the statement is executed
Ans: c
Ans: b
Ans: a
Ans: b
2. A logical schema
a. is the entire database
b. is a standard way of organizing information into accessible parts
c. describes how data is actually stored on disk
d. all of the above
Ans: b
3. A form defines
a. where data are placed on the screen
b. the width of each field
c. both (a) and (b)
d. All of the above
Ans: c
Ans: b
Ans: b
6. A report form
a. appears on the computer monitor during data entry
b. is used during report generation to format data
c. Both a and b
d. All of the above
Ans: b
7. A list consists of last names, first names, addresses and pincodes if all people in the list have
the same last and the same pincode, a useful key would be
a. the pincode
b. the last name
c. a compound key consisting of the first name and the last name
d. all of the above
Ans: c
Ans: b
10. Which of the following contains a complete record of all activity that affected the contents of
a database during a certain period of time ?
a. Report writer
b. Query language
c. Data manipulation language
d. Transaction Log
Ans: d
a. y=x+n-1 xi i=1
b. y=xn+n xi i=1
c. y=xn+xi
d. y=xn+n-1 i=1 xi
e. none of the above
Ans: d
Ans: d
Ans: a
a. char
b. unsigned
c. float
d. double
e. none of the above
Ans: c
a. 3.3
b. 3.000000
c. 3
d. 3.1
Ans: b
Q3. A single character input from the keyboard can be obtained by using the function
a. printf()
b. getchar()
c. putchar()
d. scanf()
e. none of the above
Ans: 1. b , 2. c , 3. b , 4. c , 5. d
Ans: b
Ans: c
Q2. The math library is setup for the user by the file
a. float.h
b. limits.h
c. math.h
d. time.h
e. none of the above
Q4. Assume x, y and z are floating point variables and they have been assigned the values
x=8.8, y=3.5, z= -5.2 . The value of arithmetic expression 2*x/(3*y) is
a. 2.000000
b. 1.600000
c. 1.676190
d. 0.676190
e. none of the above
Q2. The most flexibility in how devices are wired together is provided by
a. bus networks
b. star networks
c. ring networks
d. T-switched networks
e. none of the above
Q3. The communication mode that supports two-way traffic but only one direction at a time is
a. simplex b. half duplex
c. duplex d. multiplex
e. none of the above
Q5. FDDI is a
a. ring network
b. star network
c. mesh network
d. bus based network
e. none of the above
Ans: 1. c , 2. a , 3. b , 4. c , 5. a
Q4. Devices on one network can communicate with devices on another network via a
a. file server b. printer server
c. utility server d. gateway
e. none of the above
2. A modem that is attached to the telephone system by jamming the phone's handset into two
flexible receptacles in the coupler ?
a. gateway
b. time-divison multiplexer
c. acoustic coupler
d. bridge
Ans: c
3. Which of the following allows devices on one network to communicate with devices on
another network ?
a. multiplexer
b. gateway
c. t-switch
d. modem
Ans: b
4. A station in a network forwards incoming packets by placing them on its shortest output
queue. What routing algorithm is being used ?
a. flooding
b. hot potato routing
c. static routing
d. delta routing
Ans: b
5. The communication mode that supports data in both directions at the same time is
a. simplex
b. half-simplex
c. full-duplex
d. multiplex
Ans: c
7. The signal to noise ratio for a voice grade line is 30.1 db or a power ration of 1023:1. The
maximum achievable data rate on this line whose spectrum ranges from 300 Hz to 4300 Hz is
a. 6200 bps b. 34000 bps
c. 9600 bps d. 31000 bps
ANs: d
ANs: a
10. Which of the following refers to the terms "residual error rate" ?
a. the number of bit error per twenty four hours of continuous operation on an asynchronus line
b. the probability that one or more errors will be undetected when an error detection scheme is
used
c. the probability that one or more errors will be detected when an error detection mechanism is
used
d. signal to noise ratio divided by the ratio of energy per bit to noise per hertz
Ans: b
Ans: virtual
Ans: Encapsulation.
3. What is the difference between an object and a class?
Ans: Classes and objects are separate but related concepts. Every object belongs to a class
and every class contains one or more related objects.
- A Class is static. All of the attributes of a class are fixed before, during, and after the execution
of a program. The attributes of a class don't change.
- The class to which an object belongs is also (usually) static. If a particular object belongs to a
certain class at the time that it is created then it almost certainly will still belong to that class
right up until the time that it is destroyed.
- An Object on the other hand has a limited lifespan. Objects are created and eventually
destroyed. Also during that lifetime, the attributes of the object may undergo significant change.
4. What is a class ?
Ans: Class is a user-defined data type in C++. It can be created to solve a particular kind of
problem. After creation the user need not know the specifics of the working of a class.
Ans: As the name suggests, the function acts as a friend to a class. As a friend of a class, it can
access its private and protected members. A friend function is not a member of the class. But it
must be listed in the class definition.
6. Which recursive sorting technique always makes recursive calls to sort subarrays that
are about half size of the original array?
Ans: Mergesort always makes recursive calls to sort subarrays that are about half size of the
original array, resulting in O(n log n) time.
7. What is abstraction?
Ans: Abstraction is of the process of hiding unwanted details from the user.
Answer:
Array: User need not have to keep in track of next memory allocation.
List: User has to keep in Track of next location where memory is allocated.
Ans: Yes.
Ans: Inheritance is the process of creating new classes, called derived classes, from existing
classes or base classes. The derived class inherits all the capabilities of the base class, but can
add embellishments and refinements of its own.
Ans: A copy constructor is a method that accepts an object of the same class and copies it’s
data members to the object on the left part of assignement:
Ans: Friend classes are used when two or more classes are designed to work together and
need access to each other's implementation in ways that the rest of the world shouldn't be
allowed to have. In other words, they help keep private things private. For instance, it may be
desirable for class DatabaseCursor to have more privilege to the internals of class Database
than main() has
18. Any data or instruction entered into the memory of a computer is considered as—
(A) storage
(B) output
(C) input
(D) information
(E) None of these
Ans : (A)
20. Which is the part of a computer that one can touch and feel ?
(A) Hardware
(B) Software
(C) Programs
(D) Output
(E) None of these
Ans : (A)
2. IT stands for—
(A) information Technology
(B) integrated Technology
(C) intelligent Technology
(D) interesting Technology
(E) None of these
Ans : (A)
3. Which of the following refers to the fastest, biggest and most expensive computers ?
(A) Personal Computers
(B) Supercomputers
(C) Laptops
(D) Notebooks
(E) None of these
Ans : (B)
5. The process of a computer receiving information from a server on the Internet is known as—
(A) pulling
(B) pushing
(C) downloading
(D) transferring
(E) None of these
Ans : (C)
8. The role of a………generally is to determine a buyer’s needs and match it to the correct
hardware and software.
(A) computer Scientist
(B) computer sales representative
(C) computer consultant
(D) corporate trainer
(E) None of these
Ans : (B)
10. The rectangular area of the screen that displays a program, data, and/or information is a—
(A) title bar
(B) button
(C) dialog box
(D) window
(E) None of these
Ans : (D)
Ans: (d)
2. The process of organizing the memory into two banks to allow 8 and 16-bit data operation is
called
a. Bank Switching
b. Indexed Mapping
c. Two-way memory interleaving
d. Memory segmentation
Ans: (c)
Ans: (c)
4. The use of hardware in memory management is through segment relocation and protection is
Ans: (c)
a. too much of the time is spent in waiting to swap between memory and disk
b. two processes try to access the same resource
c. the size of the data to be inserted is less than the size of a page in memory
d. the processor's mapping table discovers that the program is trying to use an address that
doesn't currently exist
Ans: (a)
Posted by Anil Kant at 1:47 AM 0 comments Email ThisBlogThis!Share to TwitterShare to
FacebookShare to Google Buzz
Labels: Bank IT Officer Exam Papers, Computer Science and Applications, PSU Exam Papers
C++ Interview
1. What is an adaptor class or Wrapper class?
Ans: A class that has no functionality of its own. Its member functions hide the use of a third
party software component or an object with the non-compatible interface or a non-object-
oriented implementation.
Method
* Provides response to a message.
* It is an implementation of an operation.
A. relationship model
B. network model
C. hicrachical model
D. none of the above
A. CODASYL committee
B. IBM
C. ECA
D. none of the above
A. objects
B, programs
C. association
D. none of the above
4. DML is intended provide operations which ope- rate upon data stored in the
A, file
B. record
C. database
D. none of the above
5. In the hierarchical model a hierarchical schema is defined by a tree whose nodes are
A. database
B. logical record types
C. links
D. none of the above
6. The set of all values in the relations represents the contents of the
A. database
B. record file
C. table
D. none of the above
A. a directed graph
B. tree structures
C. relation
D, none of the above
A. results
B. relations
c. none of the above
A. two
B. three
C. four
D. none of the above
A. project phases
B. sub projects
C. hardware
D. none of the above
A. database file
B. database life cycle
C. relation
D. none of the above
14. The term "software engineering" implies the application of scientific knowledge and
discipline to the construction of
A. database record
B. computer hardware system
C. computer software system
D. none of the above
15. Program correctness has been a strong motivation for much of the work in software
engineering and
ANS:
1. B
2. A
3. B
4. B
5. B
6. A
7. B
8. C
9. Do Yourselves
10. Do Yourselves
11. B
12. A
13. B
14. C
15. B
Ans: NTFS stands for new technology file system or network technology file system. In NTSF
partition size can be of 2 TB or more. and file size can be 16 TB. file/folder encryption is done.
and it supports file name character upto 255.
FAT32 stands for File allocation table. in FAT32 partition size can be Upto 2 TB. and file size
can be 4 GB. file/folder encryption is not possible in FAT32. and it supports file name character
upto 8.3.
Ans: Windows XP is some what faster than Windows 2000, assuming you have a fast
processor and tons of memory (although it will run fine with a 300Mhz Pentium II and 128MB of
RAM).
The new Windows XP interface is more cheerful and colorful than earlier versions, although the
less-cartoony "Classic" interface can still be used if desired.
Windows XP has more bells and whistles, such as the Windows Movie Maker, built-in CD writer
support, the Internet Connection Firewall, and Remote Desktop Connection.
Windows XP has better support for games and comes with more games than Windows 2000.
Windows XP is the latest OS - If you don't upgrade now, you'll probably end up migrating to XP
eventually anyway, and we mere mortals can only take so many OS upgrades.
Ans: (a)
2. Use of functions
a. help to avoid repeating a set of instructions many times
b. enhance the logical flow of the program
c. makes the debugging task easier
d. all of the above
Ans: (d)
Ans: (c)
Ans: (a)
Ans: (e)
2. Which normal form is considered adequate for normal relational database design ?
a. 2 NF b. 5 NF
c. 4 NF d. 3 NF
Ans: (d) 3 NF
3. When the result of a computation depends on the speed of the processes involved there is
said to be
a. cycle stealing b. race condition
c. a time lock d. a deadlock
5. Which of the following addresing modes permits relocation without any change
a. Indirect addressing b. Indexed Addressing
c. Base register addressing d. PC relative addressing
Ans: b
2. Which of the following command is used to count just the number of lines contained in a file ?
a. wc-1
b. wc-w
c.wc-c
d. wc-r
Ans: a
3. Which command is used to copy a file wb with the same name from the programs directory to
the misc. directory ?
a. copy programs/wb misc/wb
b. cp programs/wb misc
c. copy a:programs/wb b:misc/wb
d. tar programs/wb misc/wb
Ans: b
4. The commonly used UNIX commands like date, Is, cat, etc. are stored in
a. /dev directory
b. /bin and /usr/bin directories
c. /unix directory
d. /tmp directory
Ans: b
5. Which of the following directories contain all the files created by a user, including his login
directory ?
a. /tmp
b. /usr
c. /etc
d. /dev
Ans: b
6. Which command is used to copy the three files wb, colllect and mon into the misc directory,
under the same, when you were currently in the programs directory ?
a. copy wb collect mon/misc
b. cp wb collect mon ../misc
c. copy wb ../misc collect ../misc mon ../misc
d. tar wb collect mon/misc
Ans: b
7. Which of the following command is used to display the directory attributes rather than its
contents ?
a. 1s-1-d
b. Is-x
c. Is-1
d. is-F
Ans: a
Ans: c
9. Which command is used to list out all the hidden files along with the other files ?
a. Is-1
b. Is-F
c. Is-x
d Is-a
Ans: d
10. The file that contains a set of instructions which are performed when a user logs in, is
a) .exrc
b) .profile
c) autoexec.bat
d) .autoexec
Ans: b
Ans: c
3. Which of the following command can be used to get information about yourself
a. who am i
b. pwd
c. i/4
d. which
Ans: a
Ans: b
5. Which of the following commands is used to copy directory structures in and out ?
a. cp
b. cp-p
c. cpio
d. copy
Ans: c
Ans: c
7. Which of the following commands is used to change the working directory ?
a. cd
b. chdir
c. changedir
d. cdir
Ans: a
8. Which of the following signs is used to erase or kill an entire line you have typed and start you
are on a new line(but not display a new prompt) ?
a. @
b. $
c. #
d. !
Ans: a
9. Which of the following commands is used to count the total number of lines, words and
characters contained in a file.
a. count p
b. wcount
c. wc
d. countw
Ans: c
a. 18
b. 14
c. 1
d. 17
Ans: b
Ans: c
Ques 3. What do you understand by knowledge searching in Database ? How you relate it with
database mining ? How Data mining useful in Database and in busines ?
1. The 5-7 digits are known as the country code of the Network User Address(NUA). (T/F)
2. The physical layer, in reference to the OSI model, defines the interface between the X.25
network and the Packet mode device. (T/F)
3. The second layer of communication is the data link layer. (T/F)
4. The data link layer, in reference to the OSI model, the Recommendation X.25 specifies data
link procedures that provide for the exchange of data via frames that can be sent and recieved.
(T/F)
Ans:
(1) T
(2) T
(3) T
(4) F
(5) T
1. The First three digit of the DNIC(Data Network Identification Code) identify the city. (T/F)
2. The use of an X.25 Switch as a gateway between the public and private networks provides a
cost-effective means of sharing relatively expensive X.25 access lines to the public data
networks. (T/F)
3. The Network User Address (NUA) consist of 12 decimal digits and two optional extra digits
which are available for packet terminals only to use for sub-addressing. (T/F)
4. The first digit of Network User Address(NUA) are known as the DNIC(Data Network
Identification Code). (T/F)
5. The term 'gateway' is commonly used to define a facility which interconnects two networks so
that users on one network can communicate with user on another network. (T/F)
6. The term 'gateway' which provides interconnection between private packet switching
networks based on OSI principles and the public packet data networks based on the X-series
recommendations. (T/F)
7. The 1-4 digits are known as the country code of the Network User Address(NUA). (T/F)
8. The digits 8 to 12 are known as the terminal number of the NUA. (T/F)
10. CCITT Recommendation X.21 defines the international nubering plan for private data
networks. (T/F)
Ans:
(1). T, (2). T, (3). T, (4). F, (5). T, (6). T, (7). F, (8). T, (9). T, (10). T
2. In a paged memory system, if the page size is increased, then the internal fragmentation
generally -
Ans: Becomes more
3. An operating system contains 3 user processes each requiring 2 units of resources R. The
minimum number of units of R such that no deadlock will ever occur is -
Ans: 4
4. Critical region is -
Ans: A set of instructions that access common shared resources which exclude one another in
time
5. Kernel is -
Ans: The set of primitive functions upon which the rest of operating system functions are built up
7. In a time sharing operating system, when the time slot given to a process is completed, the
process goes from the RUNNING state to the -
Ans: READY state
8. Supervisor call -
Ans: Are privileged calls that are used to perform resource management functions, which are
controlled by the operating system
4. Give example of Scheduling Policies in which context switching never take place-
Ans: Shortest Job First, First-cum-first-served
5. Suppose that a process is in 'BLOCKED' state waiting for some I/O service. When the service
is completed, it goes to the-
Ans: READY State
2. The page replacement policy that sometimes leads to more page faults when the size of the
memory is increased is -
Ans: FIFO
3. The only state transition that is initiated by the user process itself is -
Ans: Block
4. Fragmentation is -
Ans: fragments of memory words unused in a page
5. Overlay is
Ans: a single contiguous memory that was used in the olden days for running large programs by
swapping
2. The page replacement policy that sometimes leads to more page faults when the size of the
memory is increased is -
Ans: FIFO
3. The only state transition that is initiated by the user process itself is -
Ans: Block
4. Fragmentation is -
Ans: fragments of memory words unused in a page
System Analysis and Design/Data Oriented Systems Design Multiple Choice Questions
processes
c. data dictionary
d. meaningful data
b. no value
(iii)may be binary
(iv)may be imaginary
a. (i),(ii),(iv)
b. (iii),(iv),(ii)
c. (i),(ii),(iii)
because
a. it is good to be careful
block capitals
a. i, ii, iii
b. i, ii, iv
c. i, ii
d. iii and iv
d. Eliminate forms
or misread
b. i and iii
c. ii and iii
d. iii and iv
b. add/delete data
b. add/delete data
b. add/delete data
b. key fields
b. i and iv
c. ii and iii
d. i and iii
b. is of small length
b. is of small length
b. is of small length
b. is of small length
a. Precise
b. Meaningful
c. Comprehensive
d. Difficult
(i) concise
(ii ) meaningful
(iii) expandable
(iv) comprehensive
a. i and ii
b. ii and iii
c. ii and iv
d. i and iii
(i)concise
(ii )meaningful
(iii)expandable
(iv)comprehensive
a. i and ii
b. ii and iii
c. iii and iv
d. i and iii
(i)concise
(ii)meaningful
(iii) expandable
(iv)comprehensive
a. i and ii
b. i, ii and iii
d. i, ii and iv
(i)concise
(ii)meaningful
(iii )expandable
(iv)comprehensive
a. i and ii
b. i, ii and iii
d. i, ii and iv
a. are meaningful
b. are usable
c. are significant
d. represent values
a. knowledge of mathematics
b. statistical mechanics
d. Boolean algebra
a. alphanumeric codes
b. numeric codes
c. hexadecimal codes
a. i and iii
b. i and iv
c. i and ii
d. iii and iv
a. alphanumeric codes
b. hexadecimal codes
a. 0
b. 1
c. 2
d. 3
a. 0
b. 1
c. X
d. 3
transcription error the number of digits in the codes should not exceed
a. 9
b. 10
c. 11
d. 99
a. F
b. D
c. 1
d. 0
a. i, ii
b. i, ii, iii
c. i, ii, iii, iv
d. i and iv
a. i and ii
b. i, ii, iv
c. i, ii, iii, iv
d. iii and iv
should be
a. 90
b. 60
c. 180
d. 360
7.44 If a field is known to represent days of a month, radix used to check should
a. 30
b. 31
c. 28
d. 29
a. Possible
b. not possible
c. not relevant
d. may be tried
a. 100
b. 0 to 100
c. – 99 to +99
d. 99
a. 12
b. –12 to 12
c. 1 to 12
d. 0 to 12
school
a. 5 to 15
b. 10 to 25
c. 8 to 20
d. 3 to 18
7.49 Reasonableness checks for monthly mess bill of a student if daily rate is
Rs. 40 is
a. 1200
b. 12000
c. 120
d. 2400
(ii)missing record
( iv)inconsistent data
a. i and ii
b. i, ii and iii
d. iii and iv
b. radix check
d. range check
a. age field
b. department field
c. designation field
d. increment field
Ans: a
Ans: b
3. The commands that send or "redirect" output of a program to a disk file or another system
device such as the printer are
a.
b. [and]
c. /* and /*
d. ( and )
Ans: a
Ans: d
Ans: b
Questions
Question 1.
What is the correct value to return to the operating system upon the successful completion of a
program?
A. -1
B. 1
C. 0
D. Programs do not return a value.
Question 2.
Question 3.
What punctuation is used to signal the beginning and end of code blocks?
A. { }
B. -> and <-
C. BEGIN and END
D. ( and )
Question 4.
Question 5.
Which of the following is a correct comment?
A. */ Comments */
B. ** Comment **
C. /* Comment */
D. { Comment }
Question 6.
Question 7.
Question 8.
Question 9.
Which of the following is the boolean operator for logical-and?
A. &
B. &&
C. |
D. |&
Question 10.
Answers
1. C. 0
2. C. main()
3. A. { }
4. B. ;
5. C. /* Comment */
6. B. real
7. D. ==
8. E. All of the above
9. B. &&
10. A. True
Question 1
b. All lines beginning with two slash signs are considered comments.
Question 2
Question 3
Question 4
There is a unique function in C++ program by where all C++ programs start their execution
a. Start()
b. Begin()
c. Main()
d. Output()
Question 5
a. Parameters
b. Parenthesis
Question 6
Question 7
c. A Semicolon (
d. A colon (
Question 8
Question 9
Question 10
Answers
1. b. All lines beginning with two slash signs are considered comments.
Question 1
A variable is/are
Question 2
a. Letters
b. Digits
c. Underscores
d. Spaces
Question 3
a. papername
b. writername
c. typename
d. printname
Question 4
a. bitand
b. bittand
c. biand
d. band
Question 5
a. The first one refers to a variable whose identifier is x and the second one refers to
the character constant x
Question 6
a. \t
b. \v
c. \f
d. \w
Question 7
a. String Literals can extend to more than a single line of code by putting a backslash
sign at the end of each unfinished line.
b. You can also concatenate several string constants separating them by one or several
blank spaces, tabulators, newline or any other valid blank character
c. If we want the string literal to explicitly made of wide characters, we can precede the
constant with the L prefix
Question 8
a. It is not C++ statement but the directive for the preprocessor
Question 9
Regarding following statement which of the statements is true?
d. Constructs an integer type variable with pathwidth as identifier and 100 as value
Question 10
In an assignment statement
b. The rvalue might be a constant, a variable, an expression or any combination of these
c. The assignment always takes place from right to left and never the other way
Answers
3. c. Typename
4. a. Bitand
5. a. The first one refers to a variable whose identifier is x and the second one refers to
the character constant x
6. d. \w
Questions
Question 1
In an assignment statement
a=b;
b. The value of b is assigned to variable a but the later changes on variable b will not
effect the value of variable a
c. The value of b is assigned to variable a and the later changes on variable b will effect
the value of variable a
d. The value of variable a is assigned to variable b and the value of variable b is assigned
to variable a.
Question 2
a = 2 + (b = 5);
a = b = c = 5;
a = 11 % 3
a. True
b. False
Question 3:
a. c++;
b. c = c + 1;
c. c + 1 => c;
d. c += 1
Question 4:
b = 3;
a = b++;
Question 5:
Question 6:
b. =>
c. >=
d. >=
Question 7:
What is the final value of x when the code int x; for(x=0; x<10; x++) {} is run?
A. 10
B. 9
C. 0
D. 1
Question 8:
D. While it wishes
Question 9:
B. do while
C. while
D. repeat until
Question 10:
A. 0
B. Infinitely
C. 1
D. Variable
Answers
1. b. The value of b is assigned to variable a but the later changes on variable b will not effect
the value of variable a
2. a. True
3. c. c + 1 => c;
6. b. =>
7. A. 10
10. C. 1
Questions
Question 1
Streams are
a. Abstraction to perform input and output operations in sequential media
b. Abstraction to perform input and output operations in direct access media
c. Objects where a program can either insert or extract characters to and from it
d. Both a and c
Question 2
Which of the following is known as insertion operator?
a. ^
b. v
c. <<
d. >>
Question 3:
Regarding the use of new line character (/n) and endl manipulator with cout statement
a. Both ways are exactly same
b. Both are similar but endl additionally performs flushing of buffer
c. endl can’t be used with cout
d. \n can’t be used with cout
Question 4:
Which of the following is output statement in C++?
a. print
b. write
c. cout
d. cin
Question 5:
Which of the following is input statement in C++?
a. cin
b. input
c. get
d. none of above
Question 6:
By default, the standard output device for C++ programs is
a. Printer
b. Monitor
c. Modem
d. Disk
Question 7:
By default, the standard input device for C++ program is
a. Keyboard
b. Mouse
c. Scanner
d. None of these
Question 8:
Which of the following statement is true regarding cin statement?
a. cin statement must contain a variable preceded by >> operator
b. cin does not process the input until user presses RETURN key
c. you can use more than one datum input from user by using cin
d. all of above
Question 9:
Which of the following is extraction operator in C++?
a. ^
b. v
c. <<
d. >>
Question 10:
When requesting multiple datum, user must separate each by using
a. a space
b. a tab character
c. a new line character
d. all of above
Answers
Question 1:
cin extraction stops execution as soon as it finds any blank space character
a. true
b. false
Question 2:
Observe the following statements and decide what do they do.
string mystring;
getline(cin, mystring);
a. reads a line of string from cin into mystring
b. reads a line of string from mystring into cin
c. cin can’t be used this way
d. none of above
Question 3:
Regarding stringstream identify the invalid statement
a. stringstream is defined in the header file <sstream>
b. It allows string based objects treated as stream
c. It is especially useful to convert strings to numerical values and vice versa.
d. None of above
Question 4:
Which of the header file must be included to use stringstream?
a. <iostream>
b. <string>
c. <sstring>
d. <sstream>
Question 5:
Which of the following header file does not exist?
a. <iostream>
b. <string>
c. <sstring>
d. <sstream>
Question 6:
If you use same variable for two getline statements
a. Both the inputs are stored in that variable
b. The second input overwrites the first one
c. The second input attempt fails since the variable already got its value
d. You can not use same variable for two getline statements
Question 7:
The “return 0;” statement in main function indicates
a. The program did nothing; completed 0 tasks
b. The program worked as expected without any errors during its execution
c. not to end the program yet.
d. None of above
Question 8:
Which of the following is not a reserve keyword in C++?
a. mutable
b. default
c. readable
d. volatile
Question 9:
The size of following variable is not 4 bytes in 32 bit systems
a. int
b. long int
c. short int
d. float
Question 10:
Identify the correct statement regarding scope of variables
a. Global variables are declared in a separate file and accessible from any program.
b. Local variables are declared inside a function and accessible within the function only.
c. Global variables are declared inside a function and accessible from anywhere in program.
d. Local variables are declared in the main body of the program and accessible only from
functions.
Answers
1. a. True
2. a. Reads a line of string from cin into mystring
3. d. None of above
4. d. <sstream>
5. c. <sstring>
6. b. The second input overwrites the first one
7. b. The program worked as expected without any errors during its execution
8. c. readable
9. c. short int
10 b. Local variables are declared inside a function and accessible within the function on
Question 1:
Find out the error in following block of code.
If (x = 100)
Question 2:
Looping in a program means
Question 3:
The difference between while structure and do structure for looping is
Question 4:
Which of the following is not a looping statement in C?
a. while
b. until
c. do
d. for
Question 5:
Which of the following is not a jump statement in C++?
a. break
b. goto
c. exit
d. switch
Question 6:
Which of the following is selection statement in C++?
a. break
b. goto
c. exit
d. switch
Question 7:
The continue statement
Question 8:
Consider the following two pieces of codes and choose the best answer
CODE 1:
switch (x) {
case 1:
break;
case 2:
break;
default:
CODE 2
If (x==1){
}
Else if (x==2){
}
Else{
}
Question 9:
Observe the following block of code and determine what happens when x=2?
switch (x){
case 1:
case 2:
case 3:
goto thirdBranch;
default:
a. Program jumps to the end of switch statement since there is nothing to do for x=2
b. The code inside default will run since there is no task for x=2, so, default task is run
c. Will display x is 3, so jumping to third branch and jumps to thirdBranch.
d. None of above
Question 10
Which of the following is false for switch statement in C++?
Answers
Question 1:
The void specifier is used if a function does not have return type.
a. True
b. False
Question 2:
You must specify void in parameters if a function does not have any arguments.
a. True
b. False
Question 3:
a. True
b. False
Question 4:
Study the following piece of code and choose the best answer
a=addition(x,y)
Question 5:
a. Any modifications to the variables x & y from inside the function will not have any effect
outside the function.
b. The variables x and y will be updated when any modification is done in the function
Question 6:
If the type specifier of parameters of a function is followed by an ampersand (& , that function
call is
a. pass by value
Question 7:
a. The values of those variables are passed to the function so that it can manipulate them
b. The location of variable in memory is passed to the function so that it can use the same
memory area for its processing
c. The function declaration should contain ampersand (& in its type declaration
Question 8:
b. One function containing another one or more functions inside it.
c. Two or more functions with the same name but different number of parameters or type.
Question 9:
Functions can be declared with default values in parameters. We use default keyword to specify
the value of such parameters.
a. True
b. False
Question 10:
#include <iostream>
int main()
return 0;
c. 10.0 5
Answers
1. a. True
5. a. Any modifications to the variables x & y from inside the function will not have any effect
outside the function
7. b. The location of variable in memory is passed to the function so that it can use the same
memory area for its processing
9. b. False
Questions
Question 1:
a. True
b. False
Question 2:
A function can be overloaded with a different return type if it has all the parameters same.
a. True
b. False
Question 3:
Inline functions involves some additional overhead in running time.
a. True
b. False
Question 4:
a. Inline Function
b. Nested Function
c. Overloaded Function
d. Recursive Function
Question 5:
a. long
b. double
c. void
d. int
Question 6:
a. comma (,)
b. semicolon (
c. colon (
d. None of these
Question 7:
a. Local
b. Global
c. Module
d. Universal
Question 8:
b. Variable a and b are of int type and the initial value of both variables is 2
Question 9:
Question 10:
a. \n
b. \t
c. \0
d. \1
Answers:
1. a. True
2. b. False
3. a. True
4. d. Recursive Function
5. c. Void
7. a. Local
9. d. Ends current line and starts a new line in cout statement
10. c. \0
Definitions
Encapsulation::
Encapsulation is the mechanism that binds together code and the data it
manipulates and keeps both safe from outside interference and misuse.
Inheritance :
Polymorphism :
Code Blocks :
Floating-point numbers:
Floating-point numbers which is also known as real numbers, are used when
evaluating expressions that require fractional precision.
Unicode:
Unicode defines a fully international character set that can represent all of the
characters found in all human languages. It is a unification of dozens of
character sets, such as Latin, Greek, Arabic and many more.
Booleans:
Java has a simple type called boolean, for logical values. It can have only on of
two possible values, true or false.
Casting:
Relational Operators:
The relational operators determine the relationship that one operand has to the
other. They determine the equality and ordering.
The secondary versions of the Boolean AND and OR operators are known as
short- circuit logical operators. It is represented by || and &&..
Switch:
Jump Statements:
Jump statements are the statements which transfer control to another part of
your program. Java Supports three jump statements: break, continue, and
return.
Instance Variables:
The data, or variable, defined within a class are called instance variable.
Top
1) The Java interpreter is used for the execution of the source code.
a) True
b) False
Ans: a.
a) True
b) False
Ans: a.
a) True
b) False
Ans: a.
a) True
b) False
Ans: a.
6) What are the two parts in executing a Java program and their purposes?
The Java Compiler is used for compilation and the Java Interpreter is used for
execution of the application.
Ans : Encapsulation, Inheritance and Polymorphism are the three OOPs Principles.
Encapsulation: Is the Mechanism that binds together code and the data it manipulates,
and keeps both safe from outside interference and misuse.
Inheritance: Is the process by which one object acquires the properties of another
object.
Polymorphism: Is a feature that allows one interface to be used for a general class of
actions.
Ans : a.
10) In order for a source code file, containing the public class Test, to successfully
compile, which of the following must be true?
Ans : b
Ans : Identifiers are used for class names, method names and variable names. An
identifier may be any descriptive sequence of upper case & lower case letters,numbers
or underscore or dollar sign and must not begin with numbers.
Ans : void
13) What is the argument type of program’s main( ) method?
Ans : A – Z, a – z, _ ,$
2) /* --
3) /** --
*/ documentation
Ans : Bin contains all tools such as javac, applet viewer, awt tool etc., whereas Lib
contains all packages and variables
Top
Ans: Variables are locations in memory that can hold values. Before assigning any
value to a variable, it must be declared.
2) What are the kinds of variables in Java? What are their uses?
Ans: Java has three kinds of variables namely, the instance variable, the local variable
and the class variable.
Instance variables are used to define attributes or the state of a particular object and
are used to store information needed by multiple methods in the objects.
Class variables are global to a class and to all the instances of the class and are useful
for communicating between different objects of all the same class or keeping track of
global states.
Ans: Variables can be declared anywhere in the method definition and can be
initialized during their declaration.They are commonly declared before usage at the
beginning of the definition.
Variables with the same data type can be declared together. Local variables must be
given a value before usage.
Ans: Variable types can be any data type that java supports, which includes the eight
primitive data types, the name of a class or interface and an array.
Ans: A literal represents a value of a certain type where the type describes how that
value behaves.There are different types of literals namely number literals, character
literals, boolean literals, string literals,etc.
7) What is an array?
a)True
b)False
Ans: a.
a)True
b)False
Ans: a.
a)True
b)False
Ans: a.
13) When a string literal is used in the program, Java automatically creates instances
of the string class.
a)True
b)False
Ans: a.
1. String[ ] s;
2. String [ ]s:
3. String[ s]:
4. String s[ ]:
Ans : a, b and d
16) What is the value of a[3] as the result of the following array declaration?
1. 1
2. 2
3. 3
4. 4
Ans : d
1. byte
2. String
3. integer
4. Float
Ans : a.
1. 0 to 2 16
2. 0 to 2 15
3. 0 to 2 16-1
4. 0 to 2 15-1
Ans. d
float, double
boolean
char
Ans :
int - 0
short - 0
byte - 0
long - 0 l
float - 0.0 f
double - 0.0 d
boolean - false
char - null
a)True
b)False
Ans: b.
Ans : The array subscript expression can be used to change the values of the elements
of the array.
Ans : If a variable is declared as final variable, then you can not change its value. It
becomes constant.
Top
Operators
1) What are operators and what are the various types of operators available in Java?
Ans: Operators are special symbols used in expressions. The following are the types
of operators:
Arithmetic operators,
Assignment operators,
Logical operators,
Biwise operators,
Conditional operators
2) The ++ operator is used for incrementing and the -- operator is used for
decrementing.
a)True
b)False
Ans: a.
a)True
b)False
Ans: a.
a)True
b)False
Ans: a.
Ans : % operator is the modulo operator or reminder operator. It returns the reminder
of dividing the first operand by second operand.
1. 3
2. 5
3. 7
4. 9
Ans : c.
Ans : No.
Ans : Yes
Ans : Order of precedence the order in which operators are evaluated in expressions.
Associativity determines whether an expression is evaluated left-right or right-left.
Ans : = operator.
13) What is the difference between prefix and postfix of -- and ++ operators?
Ans : The prefix form returns the increment or decrement operation and returns the
value of the increment or decrement operation.
The postfix form returns the current value of all of the expression and then
Ans : d
x = 5; y = ++x;
Ans : x = 6; y = 6
x = 5; z = x++;
Ans : x = 6; z = 5
Top
Control Statements
a) Sequential
2) class conditional {
int i = 20;
int j = 55;
int z = 0;
a)True
b)False
Ans: b.
a)True
b)False
Ans: a.
5) The while loop repeats a set of code while the condition is false.
a)True
b)False
Ans: b.
6) The do-while loop repeats a set of code atleast once before the condition is tested.
a)True
b)False
Ans: a.
Ans: The break keyword halts the execution of the current loop and forces control out
of the loop.
The continue is similar to break, except that instead of halting the execution of the
loop, it starts the next iteration.
8) The for loop repeats a set of statements a certain number of times until a condition
is matched.
a)True
b)False
Ans: a.
Ans : Yes.
Ans : A while statement checks at the beginning of a loop to see whether the next loop
iteration should occur.
A do statement checks at the end of a loop to see whether the next iteration of a loop
should occur. The do statement will always execute the body of a loop at least once.
Top
2) The new operator creates a single instance named class and returns a reference to
that object.
a)True
b)False
Ans: a.
a)True
b)False
Ans: a.
Ans: Methods are functions that operate on instances of classes in which they are
defined.Objects can communicate with each other using methods and can call
methods in other classes.
Method definition has four parts. They are name of the method, type of object or
primitive type the method returns, a list of parameters and the body of the method. A
method's signature is a combination of the first three parts mentioned above.
Ans: Calling methods are similar to calling or referring to an instance variable. These
methods are accessed using dot notation.
Ex: obj.methodname(param1,param2)
Ans: getClass( ) method can be used to find out what class the belongs to. This class is
defined in the object class and is available to all objects.
8) All the classes in java.lang package are automatically imported when a program is
compiled.
a)True
b)False
Ans: a.
import classname;
Ans: new.
13) Which method is used to garbage collect an object?
a)True
b)False
Ans: a.
16) Casting between primitive types allows conversion of one primitive type to
another.
a)True
b)False
Ans: a.
a)True
b)False
Ans: a.
18) Boolean values can be cast into any other primitive type.
a)True
b)False
Ans: b.
b)False
Ans: a.
20) Which cast must be used to convert a larger value into a smaller one?
22) Which of the following features are common to both Java & C++?
Ans: a,b,c.
23) Which of the following statements accurately describe the use of access modifiers
within a class definition?
Ans: a,b,d.
24) Suppose a given instance variable has been declared private. Can this instance
variable be manipulated by methods out side its class?
a.yes
b.no
Ans: b.
25) Which of the following statements can be used to describe a public method?
d.The only way to gain access to this method is by calling one of the public class
methods
Ans: a,c.
26) Which of the following types of class members can be part of the internal part of a
class?
c.Public methods
d.Private methods
Ans: b,d.
27) You would use the ____ operator to create a single instance of a named class.
a.new
b.dot
Ans: a.
28) Which of the following statements correctly describes the relation between an
object and the instance variable it stores?
a.Each new object has its own distinctive set of instance variables
c.the instance variable of each object are seperate from the variables of other objects
d.The instance variables of each object are stored together with the variables of other
objects
Ans: a,b,c.
29) If no input parameters are specified in a method declaration then the declaration
will include __.
Ans: a.
a.It enables you to access instance variables of any objects within a class
Ans: a,b,c.
Ans: c.
b.non-static
Ans: b.
33) Which of the following operators are used in conjunction with the this and super
references?
Ans: c.
a. true
b. false
Ans: a.
b. When the name of the constructor differs from that of the class
Ans: c.
a. true
b.false
Ans: a.
37) When an object is referenced, does this mean that it has been identified by the
finalizer method for garbage collection?
a.yes
b.no
Ans: b.
38) Because finalize () belongs to the java.lang.Object class, it is present in all ___.
a.objects
b.classes
c.methods
Ans: b.
Ans: a,c.
40) When you write finalize() method for your class, you are overriding a finalizer
inherited from a super class.
a.true
b.false
Ans: a.
41) Java memory management mechanism garbage collects objects which are no
longer referenced
a true
b.false
Ans: a.
42) are objects referenced by a variable candidates for garbage collection when the
variable goes out of scope?
a yes
b. no
Ans: a.
43) Java's garbage collector runs as a ___ priority thread waiting for __priority threads
to relinquish the processor.
a.high
b.low
Ans: a,b.
44) The garbage collector will run immediately when the system is out of memory
a.true
b.false
Ans: a.
45) You can explicitly drop a object reference by setting the value of a variable whose
data type is a reference type to ___
Ans: null
46) When might your program wish to run the garbage collecter?
Ans: a,b,d
47) For externalizable objects the class is solely responsible for the external format of
its contents
a.true
b.false
Ans: a
48) When an object is stored, are all of the objects that are reachable from that object
stored as well?
a.true
b.false
Ans: a
49) The default__ of objects protects private and trancient data, and supports the __ of
the classes
a.evolution
b.encoding
Ans: b,a.
a) NULL
b) sizeof
c) friend
d) extends
e) synchronized
Ans : d and e
51) When must the main class and the file name coincide?
Ans : public, private, protected, default, static, trancient, volatile, final, abstract.
1. Inner class
2. Anonymous classes
3. Method overloading
4. Method overriding
Ans : c
Top
Ans :The package statement defines a name space in which classes are stored.If you
omit the package, the classes are put into the default package.
Use: * It specifies to which package the classes defined in a file belongs to. * Package
is both naming and a visibility control mechanism.
Ans :"java.applet.Applet" will import only the class Applet from the package
java.applet
Where as "java.applet.*" will import all the classes from java.applet package.
private: Anything declared in the private can’t be seen outside of its class.
Ans : It is similar to class which may contain method’s signature only but not bodies.
Ans : public.
Ans : Yes we can define a variable in an interface. They are implicitly final and static.
8) What is difference between interface and an abstract class?
Ans : All the methods declared inside an Interface are abstract. Where as abstract
class must have at least one abstract method and others may be concrete or abstract.
In Interface we need not use the keyword abstract for the methods.
True/False
Ans : True
10) Java compiler stores the .class files in the path specified in CLASSPATH
environmental variable.
True/False
Ans : False
11) User-defined package can also be imported just like the standard packages.
True/False
Ans : True
12) When a program does not want to handle exception, the ______class is used.
Ans : Throws
Ans : RuntimeException
Ans : Throwable
Ans : Exception
16) The catch clause of the user-defined exception class should ______ its Base class
catch clause.
Ans : Exception
17) A _______ is used to separate the hierarchy of the class while declaring an Import
statement.
Ans : Package
18) All standard classes of Java are included within a package called _____.
Ans : java.lang
19) All the classes in a package can be simultaneously imported using ____.
Ans : *
20) Can you define a variable inside an Interface. If no, why? If yes, how?
21) How many concrete classes can you have inside an interface?
Ans.: None
Ans.: Yes
Ans.: No
24) If you do not implement all the methods of an interface while implementing , what
specifier should you use for the class ?
Ans.: abstract
a)True
b) false
Ans : a.
28) Can variables be declared in an interface ? If so, what are the modifiers?
Ans : Yes. final and static are the modifiers can be declared in an interface.
29) What are the possible access modifiers when implementing interface methods?
Ans : public.
Ans : Yes.
a)True
b)False
Ans : b.
Top
Exception Handling
1) What is the difference between ‘throw’ and ‘throws’ ?And it’s application?
Ans : Exceptions that are thrown by java runtime systems can be handled by Try and
catch blocks. With throw exception we can handle the exceptions thrown by the
program itself. If a method is capable of causing an exception that it does not
handle, it must specify this behavior so the callers of the method can guard
Ans : Exception and Error are the subclasses of the Throwable class. Exception class
is used for exceptional conditions that user program should catch. With exception
class we can subclass to create our own custom exception.
Error defines exceptions that are not excepted to be caught by you program. Example
is Stack Overflow.
Ans : Freeing up other resources that might have been allocated at the beginning of a
method.
Ans :
Signature is..
True/False
Ans : True
10) The subclass exception should precede the base class exception when used within
the catch clause.
True/False
Ans : True
True/False
Ans : True
12) The statements following the throw keyword in a program are not executed.
True/False
Ans : True
Ans : True
Top
Multi Threading
Ans :
1.process-based
2.Thread-based
Ans :
Ans : run()
5) What is the data type for the method isAlive() and this method is available in which
class?
Ans :
1.isAlive()
2.join()
3.resume()
4.suspend()
5.stop()
6.start()
7.sleep()
8.destroy()
7) What are all the methods used for Inter Thread communication and what is the
class in which these methods are defined?
Ans :
2. Object class
8) What is the mechanisam defind by java for the Resources to be used by only one
Thread at a time?
Ans : Synchronisation
ob.sleep(1000)
11) What is the data type for the parameter of the sleep() method?
Ans : long
12) What are all the values for the following level?
max-priority
min-priority
normal-priority
Ans : 10,1,5
Ans : setPriority()
14) What is the default thread at the time of starting the program?
True/ False
Ans : False
16) Which priority Thread can prompt the lower primary Thread?
Ans : one
18) What are all the four states associated in the thread?
True /False
Ans : False
20) The run() method should necessary exists in clases created as subclass of thread?
True /False
Ans : True
21) When two threads are waiting on each other and can't proceed the programe is
said to be in a deadlock?
True/False
Ans : True
1) wait(),notify(),notifyall() are defined as final & can be called only from with in a
synchronized method
1. 1
2. 2
3. 3
4. 1&2
5. 1,2 & 3
Ans : D
Ans : low-priority
26) What is meant by daemon thread? In java runtime, what is it's role?
Ans : Daemon thread is a low priority thread which runs intermittently in the
background doing the garbage collection operation for the java runtime system.
Top
Inheritance
Ans : A super class is a class that is inherited whereas subclass is a class that does the
inheriting.
Ans : extends
True/False
Ans : False
True/False
Ans : True
True/False
Ans : False
8) What is inheritance?
Ans : Deriving an object from an existing class. In the other words, Inheritance is the
process of inheriting all the features from a class
Ans : Reusability of code and accessibility of variables and methods of the superclass
by subclasses.
10) Which method is used to call the constructors of the superclass from the subclass?
Ans : super(argument)
11) Which is used to execute any method of the superclass from the subclass?
Ans : super.method-name(arguments)
12) Which methods are used to destroy the objects created by the constructor
methods?
Ans : finalize()
Ans : Abstract classes are those for which instances can’t be created.
Ans: It must provide all of the methods in the interface and identify the interface in its
implements clause.
True/False
Ans : False
Ans: True
True/False
Ans : True
Ans: A class does not inherit constructors from any of it's super classes.
Ans: Two methods may not have the same name and argument list but different return
types.
Ans : Overridden methods must have the same name , argument list , and return type.
The overriding method may not limit the access of the method it overridees.The
overriding method may not throw any exceptions that may not be thrown by the
overridden method.
24) What modifiers may be used with an inner class that is a member of an outer
class?
Ans : a (non-local) inner class may be declared as public, protected, private, static,
final or abstract.
b)It's a superclass
Ans: c
a)Non-abstract
b)Implemented
c)unimplemented
Ans:c
Top
String Handling
5) Which method can be used to perform a comparison between strings that ignores
case differences?
Ans : valueOf( ) method converts data from its internal format into a human-readable
form.
Ans : The method toLowerCase( ) converts all the characters in a string from
uppercase to
lowercase.
The method toUpperCase( ) converts all the characters in a string from lowercase to
uppercase.
8) Which method can be used to find out the total allocated capacity of a StrinBuffer?
9) Which method can be used to set the length of the buffer within a StringBuffer
object?
Ans : setLength( ).
Ans : String objects are constants, whereas StringBuffer objects are not.
String class supports constant strings, whereas StringBuffer class supports growable,
modifiable strings.
Ans : Wrapper classes are classes that allow primitive types to be accessed as objects.
12) Which of the following is not a wrapper class?
1. String
2. Integer
3. Boolean
4. Character
Ans : a.
String s1 = "abc";
String s2 = "def";
String s3 = s1.concat(s2.toUpperCase( ) );
System.out.println(s1+s2+s3);
1. abcdefabcdef
2. abcabcDEFDEF
3. abcdefabcDEF
4. None of the above
ANS : c.
14) Which of the following methods are methods of the String class?
1. delete( )
2. append( )
3. reverse( )
4. replace( )
Ans : d.
15) Which of the following methods cause the String object referenced by s to be
changed?
1. s.concat( )
2. s.toUpperCase( )
3. s.replace( )
4. s.valueOf( )
Ans : a and b.
1. True
2. False
Ans : b.
17) If you run the code below, what gets printed out?
int iBegin=1;
char iEnd=3;
System.out.println(s.substring(iBegin,iEnd));
1. Bic
2. ic
3. icy
4. error: no method matching substring(int,char)
Ans : b.
Ans : a.
a)The String class is implemented as a char array, elements are addressed using the
stringname[] convention
b) Strings are a primitive type in Java that overloads the + operator for concatenation
c) Strings are a primitive type in Java and the StringBuffer is used as the matching
wrapper type
Ans : b.
Top
Exploring Java.lang
1. True
2. False
Ans : a
3) What are the constants defined by both Flaot and Double classes?
Ans : MAX_VALUE,
MIN_VALUE,
NaN ,
POSITIVE_INFINITY,
NEGATIVE_INFINITY and
TYPE.
4) What are the constants defined by Byte, Short, Integer and Long?
Ans : MAX_VALUE,
MIN_VALUE and
TYPE.
5) What are the constants defined by both Float and Double classes?
Ans : MAX_RADIX,
MIN_RADIX,
MAX_VALUE,
MIN_VALUE and
TYPE.
Ans : The purpose of the Runtime class is to provide access to the Java runtime
system.
Ans : The purpose of the System class is to provide access to system resources.
Ans : E is the base of the natural logarithm and PI is the mathematical value pi.
12) Which of the following classes is used to perform basic console I/O?
1. System
2. SecurityManager
3. Math
4. Runtime
Ans : a.
Ans : c and d.
14) Which of the following methods are methods of the Math class?
1. absolute( )
2. log( )
3. cosine( )
4. sine( )
Ans : b.
15) Which of the following are true about the Error and Exception classes?
Ans : d.
1. System.out.println(Math.floor(-4.7));
2. System.out.println(Math.round(-4.7));
3. System.out.println(Math.ceil(-4.7));
4. System.out.println(Math.Min(-4.7));
Ans : c.
Ans : e.
19) What will happen if you attempt to compile and run the following code?
System.out.println(ten + nine);
int i=1;
System.out.println(i + ten);
1. 19 followed by 20
2. 19 followed by 11
3. Error: Can't convert java lang Integer
d) 10 followed by 1
Ans : c.
Top
1) What is meant by Stream and what are the types of Streams and classes of the
Streams?
Byte Streams : Byte Streams provide a convenient means for handling input and
output of bytes.
Character Streams : Character Streams provide a convenient means for handling input
and output of characters.
Byte Stream classes : Byte Streams are defined by using two abstract classes. They
are:InputStream and OutputStream.
Character Stream classes : Character Streams are defined by using two abstract
classes. They are : Reader and Writer.
Ans : d.
3) Which of the following statements are true?
4) The File class contains a method that changes the current working directory.
1. True
2. False
Ans : b.
5) It is possible to use the File class to list the contents of the current working
directory.
1. True
2. False
Ans : a.
6) Readers have methods that can read and return floats and doubles.
1. True
2. False
Ans : b.
7) You execute the code below in an empty directory. What is the result?
Ans : e.
8) What is the difference between the Reader/Writer class hierarchy and the
InputStream/OutputStream class hierarchy?
Ans : An I/O filter is an object that reads from one stream and writes to another,
usually altering the data in some way as it is passed from one stream to another.
Ans : The File class is used to create objects that provide access to the files and
directories of a local file system.
11) What interface must an object implement before it can be written to a stream as an
object?
12) What is the difference between the File and RandomAccessFile classes?
Ans : The File class encapsulates the files and directories of the local file system. The
RandomAccessFile class provides the methods needed to directly access data
contained in any part of a file.
13) What class allows you to read objects directly from a stream?
Ans : The ObjectInputStream class supports the reading of objects from input streams.
14) What value does read( ) return when it has reached the end of a file?
Ans : The read( ) method returns – 1 when it has reached the end of a file.
15) What value does readLine( ) return when it has reached the end of a file?
Ans : The readLine( ) method returns null when it has reached the end of a file.
16) How many bits are used to represent Unicode, ASCII, UTF-16 and UTF-8
characters?
Ans : Unicode requires 16-bits and ASCII requires 8-bits. Although the ASCII
character set uses only 1-bits, it is usually represented as 8-bits. UTF-8 represents
characters using 8, 16 and 18-bit patterns. UTF-16 uses 16-bit and larger bit patterns.
Ans : a and c.
Ans : c and d.
Ans : a and b.
Ans : a, b and d.
21) Which of the following are true about the File class?
Ans : b, d and e.
Ans : c.
Ans : a and b.
24) The isFile( ) method returns a boolean value depending on whether the file object
is a file or a directory.
1. True.
2. False.
Ans : a.
25) Reading or writing can be done even after closing the input/output source.
1. True.
2. False.
Ans : b.
Ans : flush( ).
1. True.
2. False.
Ans : a.
Ans : StreamTokenizer breaks up InputStream into tokens that are delimited by sets of
characters.
Ans : Serialization is the process of writing the state of an object to a byte stream.
30) Which of the following can you perform using the File class?
Ans : b and c.
31) How can you change the current working directory using an instance of the File
class called FileName?
1. FileName.chdir("DirName").
2. FileName.cd("DirName").
3. FileName.cwd("DirName").
4. The File class does not support directly changing the current
directory.
Ans : d.
Top
Applets
Ans : Applet is a dynamic and interactive program that runs inside a Web page
displayed by a Java capable browser. We don’t have the concept of Constructors in
Applets.
3) How can I arrange for different applets on a web page to communicate with each
other?
Ans : Name your applets inside the Applet tag and invoke AppletContext’s
getApplet() method in your applet code to obtain references to the other applets on the
page.
4) How do I select a URL from my Applet and send the browser to that page?
Ans : Ask the applet for its applet context and invoke showDocument() on that
context object.
String URLString
try{
Ans : No. Not Directly. The applets will exchange the information at one meeting
place
Ans : Use the getSize() method, which the Applet class inherits from the Component
class in the Java.awt package. The getSize() method returns the size of the applet as
a Dimension object, from which you extract separate width, height fields.
Ans : The applet stub interface provides the means by which an applet and the
browser communicate. Your code will not typically implement this interface.
9) It is essential to have both the .java file and the .html file of an applet in the same
directory.
1. True.
2. False.
Ans : 2.
10) The <PARAM> tag contains two attributes namely _________ and _______.
Ans : .html.
12) What tags are mandatory when creating HTML to display an applet
Ans : 4.
1. True.
2. False.
Ans : a.
14) What are the Applet’s Life Cycle methods? Explain them?
stop( ) method - Can be called when the browser moves off the applet’s page.
destroy( ) method - Can be called when the browser is finished with the applet.
Ans : getAppletInfo( ) method : Returns a string describing the applet, its author ,copy
1. True.
2. False.
Ans : a.
17) All Applets must import java.applet and java.awt.
1. True.
2. False.
Ans : a.
c) Execute the appletviewer, specifying the name of your applet’s source file.
19) Applets are executed by the console based Java run-time interpreter.
1. True.
2. False.
Ans : b.
Ans : Applet class consists of a single class, the Applet class and three interfaces:
AppletContext,
21) What is the sequence for calling the methods by AWT for applets?
Ans : When an applet begins, the AWT calls the following methods, in this sequence.
1. init( )
2. start( )
3. paint( )
22) When an applet is terminated, the following sequence of method cals takes place :
1. stop( )
2. destroy( )
1. True.
2. False
Ans : a.
Top
Event Handling
1) The event delegation model, introduced in release 1.1 of the JDK, is fully
compatible with the event model.
1. True
2. False
Ans : b.
1. True
2. False
Ans : b.
Ans : The ActionEvent event is generated as the result of the clicking of a button.
8) In which package are most of the AWT events that support the event-delegation
model defined?
Ans : Most of the AWT–related events of the event-delegation model are defined in
the java.awt.event package. The AWTEvent class is defined in the java.awt package.
9) What is the advantage of the event-delegation model over the earlier event-
inheritance model?
Ans : The event-delegation has two advantages over the event-inheritance model.
They are :
Ans :The enableEvents( ) method is used to enable an event for a particular object.
Ans : c.
12) Which of the following is the highest class in the event-delegation model?
1. java.util.EventListener
2. java.util.EventObject
3. java.awt.AWTEvent
4. java.awt.event.AWTEvent
Ans : b.
13) When two or more objects are added as listeners for the same event, which
listener is first invoked to handle the event?
Ans : c.
1. Buttons
2. Labels
3. Check boxes
4. Windows
Ans : a.
Ans : a and d.
17) Suppose that you want to have an object eh handle the TextEvent of a TextArea
object t. How should you add eh as the event handler for t?
1. t.addTextListener(eh);
2. eh.addTextListener(t);
3. addTextListener(eh.t);
4. addTextListener(t,eh);
Ans : a.
Ans : b.
Ans : a and b.
20) How many types of events are provided by AWT? Explain them?
21) Low-level event : A low-level event is the one that represents a low-level input or
window-system occurrence on a visual component on the screen.
Ans : source.
24) The event listener corresponding to handling keyboard events is the _________ .
Ans : KeyListener.
a) mousePressed(MouseEvent e){}
b) MousePressed(MouseClick e){}
c) functionKey(KeyPress k){}
d) componentAdded(ContainerEvent e){}
Ans : a and d.
Top
1) How would you set the color of a graphics context called g to cyan?
1. g.setColor(Color.cyan);
2. g.setCurrentColor(cyan);
3. g.setColor("Color.cyan");
4. g.setColor("cyan’);
5. g.setColor(new Color(cyan));
Ans : a.
g.setColor(Color.red.green.yellow.red.cyan);
g.drawLine(0, 0, 100,100);
1. Red
2. Green
3. Yellow
4. Cyan
5. Black
Ans : d.
g.setColor(Color.black);
g.setColor(Color.RED);
Ans : b.
Ans : b, d and e.
5) What code would you use to construct a 24-point bold serif font?
Ans : 4.
g.drawString("question #6",10,0);
}
Ans : 2.
g.drawString("question #6",10,0);
Ans : 4.
8) What is relationship between the Canvas class and the Graphics class?
Ans : A Canvas object provides access to a Graphics object via its paint( ) method.
Ans : The Canvas, Frame, Panel and Applet classes support painting.
10) What is the difference between the paint( ) and repaint( ) method?
Ans : The paint( ) method supports painting via a Graphics object. The repaint( )
method is used to cause paint( ) to be invoked by the AWT painting method.
11) What is the difference between the Font and FontMetrics classes?
12) Which of the following are passed as an argument to the paint( ) method?
1. A Canvas object
2. A Graphics object
3. An Image object
4. A paint object
Ans : b.
13) Which of the following methods are invoked by the AWT to support paint and
repaint operations?
1. paint( )
2. repaint( )
3. draw( )
4. redraw( )
Ans : a.
1. Canvas
2. Image
3. Frame
4. Graphics
Ans : a and c.
1. drawRect( )
2. drawImage( )
3. drawPoint( )
4. drawString( )
Ans : a, b and d.
16) Which Font attributes are available through the FontMetrics class?
1. ascent
2. leading
3. case
4. height
Ans : a, b and d.
Ans : a and b.
18) Which method is used to size a graphics object to fit the current size of the
window?
19) What are the methods to be used to set foreground and background colors?
20) You have created a simple Frame and overridden the paint method as follows
g.drawString("Dolly",50,10);
What will be the result when you attempt to compile and run the program?
21) Where g is a graphics instance what will the following code draw on the screen.
g.fillArc(45,90,50,50,90,180);
a) An arc bounded by a box of height 45, width 90 with a centre point of 50,50,
starting
at an angle of 90 degrees traversing through 180 degrees counter clockwise.
b) An arc bounded by a box of height 50, width 50, with a centre point of 45,90
starting
at an angle of 90 degrees traversing through 180 degrees clockwise.
c) An arc bounded by a box of height 50, width 50, with a top left at coordinates of
45,
90, starting at 90 degrees and traversing through 180 degrees counter clockwise.
Ans : c.
a)s.setBackground(Color.pink);
b)s.setColor(PINK);
c)s.Background(pink);
d)s.color=Color.pink
Ans : a.
Top
Ans : Controls are componenets that allow a user to interact with your application.
Labels
Push buttons
Check boxes
Choice lists
Lists
Scroll bars
Text components
2) You want to construct a text area that is 80 character-widths wide and 10 character-
heights tall. What code do you use?
Ans: b.
Ans : c.
4) The CheckboxGroup class is a subclass of the Component class.
1. True
2. False
Ans : b.
1. a) Container class
2. b) MenuComponent class
3. c) Dialog class
4. d) Applet class
5. e) Menu class
b) MenuComponent - Object
c) Dialog - Window
d) Applet - Panel
e) Menu - MenuItem
7) Which method of the component class is used to set the position and the size of a
component?
Ans : setBounds()
Ans : setEditable()
Ans : getState()
1. getVisible()
2. getImmediate
3. getParent()
4. getContainer
Ans : c.
12) What methods are used to get and set the text label displayed by a Button object?
Ans : A Choice is displayed in a compact form that requires you to pull it down to see
the list of available choices. Only one item may be selected from a Choice.
A List may be displayed in such a way that several List items are visible. A List
supports the selection of one or more List items.
14) Which Container method is used to cause a container to be laid out and
redisplayed?
Ans : validate( )
A Scrollpane is a Container and handles its own events and performs its own
scrolling.
Ans : Canvas.
Ans : a, b and e.
1. Frame
2. TextArea
3. MenuBar
4. FileDialog
5. Applet
1. setText( )
2. setLabel( )
3. setTextLabel( )
4. setLabelText( )
Ans : a.
Ans : a.
21) Which of the following creates a List with 5 visible items and multiple selection
enabled?
Ans : a.
Ans : a, b and d.
23) Suppose a Panel is added to a Frame and a Button is added to the Panel. If the
Frame’s font is set to 12-point TimesRoman, the Panel’s font is set to 10-point
TimesRoman, and the Button’s font is not set, what font will be used to dispaly the
Button’s label?
1. 12-point TimesRoman
2. 11-point TimesRoman
3. 10-point TimesRoman
4. 9-point TimesRoman
Ans : c.
1. Colr.Yellow
2. Color.Blue
3. Color.Green
4. Color.White
Ans : a.
25) Which method will cause a Frame to be displayed?
1. show( )
2. setVisible( )
3. display( )
4. displayFrame( )
Ans : a and b.
26) All the componenet classes and container classes are derived from _________
class.
Ans : Object.
27) Which method of the container class can be used to add components to a Panel.
Ans : The Container class has three major subclasses. They are :
1. Window
2. Panel
3. ScrollPane
1. True.
2. False.
Ans : b.
1. True.
2. False.
Ans : b.
31) Which components are used to get text input from the user.
Ans : CheckboxGroup.
1. Non-exclusive Checkboxes.
2. Radio buttons.
3. Choice.
4. List.
Ans : a and d.
34) What are the types of Checkboxes and what is the difference between them?
Ans : Java supports two types of Checkboxes. They are : Exclusive and Non-
exclusive.
In case of exclusive Checkboxes, only one among a group of items can be selected at
a time. I f an item from the group is selected, the checkbox currently checked is
deselected and the new selection is highlighted. The exclusive Checkboxes are also
called as Radio buttons.
The non-exclusive checkboxes are not grouped together and each one can be selected
independent of the other.
35) What is a Layout Manager and what are the different Layout Managers available
in java.awt and what is the default Layout manager for the panal and the panal
subclasses?
The default Layout Manager of Panal and Panal sub classes is FlowLayout".
36) Can I exert control over the size and placement of components in my interface?
Ans : Yes.
myPanal.setLayout(null);
myPanal.setbounds(20,20,200,200);
37) Can I add the same component to more than one container?
setBounds(Rectangle r)
setSize(Dimension d)
setLocation(int x, int y)
setLocation(Point p)
Ans : Create an instance of the Window class, give it a size, and show it on the screen.
aWindow.setLayout(new FlowLayout());
aWindow.getBounds(50,50,200,200);
aWindow.show();
40) Can I create a non-resizable windows? If so, how?
41) What is the default Layout Manager for the Window and Window subclasses
(Frame,Dialog)?
Ans : BorderLayout().
container.
CardLayout : The elements of a CardLayout are stacked, one on top of the other, like
a deck of cards.
GridLayout : The elements of a GridLayout are of equal size and are laid out using the
square of a grid.
more than one row or column of the grid. In addition, the rows and columns may have
different sizes.
Ans : The Window, Frame and Dialog classes use a BorderLayout as their default
layout.
Ans : The Panel and the Applet classes use the FlowLayout as their default layout.
1. startLayout( )
2. initLayout( )
3. layoutContainer( )
4. setLayout( )
Ans : d.
1. getPreferredSize( )
2. getPreferred( )
3. getRequiredSize( )
4. getLayout( )
Ans : a.
48) Which layout should you use to organize the components of a container in a
tabular form?
1. CardLayout
2. BorederLayout
3. FlowLayout
4. GridLayout
Ans : d.
49) An application has a frame that uses a Border layout manager. Why is it probably
not a good idea to put a vertical scroll bar at North in the frame?
1. The scroll bar’s height would be its preferred height, which is not
likely to be enough.
2. The scroll bar’s width would be the entire width of the frame,
which would be much wider than necessary.
3. Both a and b.
4. Neither a nor b. There is no problem with the layout as described.
Ans : c.
50) What is the default layouts for a applet, a frame and a panel?
Ans : For an applet and a panel, Flow layout is the default layout, whereas Border
layout is default layout for a frame.
51) If a frame uses a Grid layout manager and does not contain any panels, then all the
components within the frame are the same width and height.
1. True
2. False.
Ans : a.
52) If a frame uses its default layout manager and does not contain any panels, then all
the components within the frame are the same width and height.
1. True
2. False.
Ans : b.
53) With a Border layout manager, the component at Center gets all the space that is
left over, after the components at North and South have been considered.
1. True
2. False
Ans : b.
54) An Applet has its Layout Manager set to the default of FlowLayout. What code
would be the correct to change to another Layout Manager?
1. setLayoutManager(new GridLayout());
2. setLayout(new GridLayout(2,2));
3. setGridLayout(2,2,))
4. setBorderLayout();
Ans : b.
a) North, South,East,West
b) Assign a row/column grid reference
c) Pass a X/Y percentage parameter to the add method
d) Do nothing, the FlowLayout will position the component
Ans :d.
Ans :a.
57)When using the GridBagLayout manager, each new component requires a new
instance of the GridBagConstraints class. Is this statement true or false?
a) true
b) false
Ans : b.
Ans : a and d.
59) Which method does display the messages whenever there is an item selection or
deselection of the CheckboxMenuItem menu?
Ans : CheckboxMenuItem.
1. A separator
2. A check box
3. A menu
4. A button
5. A panel
Ans : a and c.
1. A panel
2. A frame
3. An applet
4. A menu bar
5. A menu
Ans : b
Ans : The CheckboxMenuItem class extends the MenuItem class to support a menu
item
Ans : c and d.
Top
Utility Package
ANSWER : The Vector class provides the capability to implement a growable array
of objects.
ANSWER : The Set interface provides methods for accessing the elements of a finite
mathematical set.Sets do not allow duplicate elements.
ANSWER : The Dictionary class is the abstarct super class of Hashtable and
Properties class.Dictionary provides the abstarct functions used to store and retrieve
objects by key-value.This class allows any object to be used as a key or value.
ANSWER : The Hashtable class implements a hash table data structure. A hash table
indexes and stores objects in a dictionary using hash codes as the objects' keys. Hash
codes are integer values that identify objects.
Answer : The properties class is a subclass of Hashtable that can be read from or
written to a stream.It also provides the capability to specify a set of default values to
be used if a specified key is not found in the table. We have two methods load() and
save().
import java.util.*;
class Ques{
String s1 = "abc";
String s2 = "def";
Vector v = new Vector();
v.add(s1);
v.add(s2);
System.out.println(s3);
D) Import java.lang
import java.util.*;
class Ques{
String s1 = "abc";
String s2 = "def";
stack.push(s1);
stack.push(s2);
try{
String s3 = (String) stack.pop() + (String) stack.pop() ;
System.out.println(s3);
A) abcdef
B) defabc
C) abcabc
D) defdef
A)Collection
B) List
C) Map
D) Set
ANSWER : A and B Neither a Map nor a Set may have duplicate elements.
import java.util.*;
class Ques{
String s1 = "abc";
String s2 = "def";
String s3 = "";
set.add(s1);
set.add(s2);
set.add(s1);
set.add(s2);
Iterator i = set.iterator();
while(i.hasNext())
s3 += (String) i.next();
System.out.println(s3);
ANSWER : A and B . Country and Language are not java.util classes.
14) How are Observer Interface and Observable class, in java.util package, used?
ANSWER : Objects that subclass the Observable class maintain a list of Observers.
When an Observable object is updated it invokes the update() method of each of its
observers to notify the observers that it has changed state. The Observer interface is
implemented by objects that observe Observable objects.
ANSWER : The EventObject class and the EventListener interface support event
processing.
16) Does java provide standard iterator functions for inspecting a collection of
objects?
boolean hasMoreElements();
Object nextElement();
17) The Math.random method is too limited for my needs- How can I generate
random numbers more flexibly?
ANSWER : The random method in Math class provide quick, convienient access to
random numbers, but more power and flexibility use the Random class in the java.util
package.
nextGaussian() // type double; has Gaussian("normal") distribution with mean 0.0 and
standard deviation 1.0)
Top
JDBC
ANSWER : This involves two steps: (1) loading the driver and (2) making the
connection.
Eg.
Class.forName("sun.jdbc.odbc.JdbcOdbcDriver");
Your driver documentation will give you the class name to use. For instance, if the
class name is jdbc.DriverXYZ , you would load the driver with the following line of
code:
Eg.
Class.forName("jdbc.DriverXYZ");
ANSWER : It is used to create an instance of a driver and register it with the
DriverManager.
When you have loaded a driver, it is available for making a connection with a DBMS.
Eg.
ANSWER : A Statement object is what sends your SQL statement to the DBMS. You
simply create a Statement object and then execute it, supplying the appropriate
execute method with the SQL statement you want to send. For a SELECT statement,
the method to use is executeQuery. For statements that create or modify tables, the
method to use is executeUpdate.
Eg.
It takes an instance of an active connection to create a Statement object. In the
following example, we use our Connection object con to create the Statement object
stmt :
ANSWER : Step 1.
Eg.
Step2.
String s = rs.getString("COF_NAME");
The method getString is invoked on the ResultSet object rs , so getString will retrieve
(get) the value stored in the column COF_NAME in the current row of rs
ANSWER : This special type of statement is derived from the more general class,
Statement.If you want to execute a Statement object many times, it will normally
reduce execution time to use a PreparedStatement object instead.
The advantage to this is that in most cases, this SQL statement will be sent to the
DBMS right away, where it will be compiled. As a result, the PreparedStatement
object contains not just an SQL statement, but an SQL statement that has been
precompiled. This means that when the PreparedStatement is executed, the DBMS
can just run the PreparedStatement 's SQL statement without having to compile it
first.
Eg.
Eg.
con.setAutoCommit(false);
Once auto-commit mode is disabled, no SQL statements will be committed until you
call the method commit explicitly.
Eg.
con.setAutoCommit(false);
updateSales.setInt(1, 50);
updateSales.setString(2, "Colombian");
updateSales.executeUpdate();
updateTotal.setInt(1, 50);
updateTotal.setString(2, "Colombian");
updateTotal.executeUpdate();
con.commit();
con.setAutoCommit(true);
Eg.
ResultSet rs = cs.executeQuery();
Eg.
if (warning != null) {
System.out.println("\n---Warning---\n");
System.out.println(warning.getErrorCode());
System.out.println("");
warning = warning.getNextWarning();
12) How can you Move the Cursor in Scrollable Result Sets ?
ANSWER : One of the new features in the JDBC 2.0 API is the ability to move a
result set's cursor backward as well as forward. There are also methods that let you
move the cursor to a particular row and check the position of the cursor.
Eg.
ResultSet.CONCUR_READ_ONLY);
The first argument is one of three constants added to the ResultSet API to indicate the
type of a ResultSet object: TYPE_FORWARD_ONLY,
TYPE_SCROLL_INSENSITIVE , and TYPE_SCROLL_SENSITIVE .
The second argument is one of two ResultSet constants for specifying whether a result
set is read-only or updatable: CONCUR_READ_ONLY and
CONCUR_UPDATABLE . The point to remember here is that if you specify a type,
you must also specify whether it is read-only or updatable. Also, you must specify the
type first, and because both parameters are of type int , the compiler will not complain
if you switch the order.
Eg.
srs.afterLast();
while (srs.previous()) {
ANSWER : Another new feature in the JDBC 2.0 API is the ability to update rows in
a result set using methods in the Java programming language rather than having to
send an SQL command. But before you can take advantage of this capability, you
need to create a ResultSet object that is updatable. In order to do this, you supply the
ResultSet constant CONCUR_UPDATABLE to the createStatement method.
Eg.
Connection con =
DriverManager.getConnection("jdbc:mySubprotocol:mySubName");
Top
Networking Concepts
1) The API doesn't list any constructors for InetAddress- How do I create an
InetAddress instance?
E.g.
InetAddress add1;
InetAddress add2;
try{
add1 = InetAddress.getByName("java.sun.com");
add2 = InetAddress.getByName("199.22.22.22");
}catch(UnknownHostException e){}
ANSWER : These two protocols differ in the way they carry out the action of
communicating. A TCP protocol establishes a two way connection between a pair of
computers, while the UDP protocol is a one-way message sender. The common
analogy is that TCP is like making a phone call and carrying on a two-way
communication, while UDP is like mailing a letter.
ANSWER : A proxy server speaks the client side of a protocol to another server. This
is often required when clients have certain restrictions on which servers they can
connect to. And when several users are hitting a popular web site, a proxy server can
get the contents of the web server's popular pages once, saving expensive
internetwork transfers while providing faster access to those pages to the clients.
ANSWER : It ensures that the mail gets to its destination. If a packet fails to get its
destination, it handles the process of notifying the sender and requesting that another
packet be sent.
8) What is DHCP?
9) What is SMTP?
ANSWER : Simple Mail Transmission Protocol, the TCP/IP Standard for Internet
mails. SMTP exchanges mail between servers; contrast this with POP, which
transmits mail between a server and a client.
10) In OSI N/w architecture, the dialogue control and token management are
responsibilities of...
a) Network b) Session c) Application d) DataLink
Top
Networking
ANSWER : You obtain a URL instance and then invoke openConnection on it.
URLConnection is an abstract class, which means you can't directly create instances
of it using a constructor. We have to invoke openConnection method on a URL
instance, to get the right kind of connection for your URL.
Eg. URL url;
URLConnection connection;
conection = url.openConnection();
}catch (MalFormedURLException e) { }
3) What Is a Socket?
A socket is one end-point of a two-way communication link between two programs
running on the network. A socket is bound to a port number so that the TCP layer can
identify the application that data is destined to be sent.Socket classes are used to
represent the connection between a client program and a server program. The java.net
package provides two classes--Socket and ServerSocket--which implement the client
side of the connection and the server side of the connection, respectively.
ANSWER : The Local System’s IP Address and Port Number. And the Remote
System's IPAddress and Port Number.
ServerSocket is used for normal two-way socket communication. Socket class allows
us to read and write through the sockets. getInputStream() and getOutputStream() are
the two methods available in Socket class.
ANSWER : When the specified URL is not connected then the URL throw
MalformedURLException and If InetAddress’ methods getByName and getLocalHost
are unabletoresolve the host name they throwan UnknownHostException.
Top
Servlets
Servlets are to servers what applets are to browsers. Unlike applets, however, servlets
have no graphical user interface.
ANSWER : A servlet can handle multiple requests concurrently, and can synchronize
requests. This allows servlets to support systems such as on-line conferencing.
Servlets can forward requests to other servers and servlets.Thus servlets can be used
to balance load among several servers that mirror the same content, and to partition a
single logical service over several servers, according to task type or organizational
boundaries.
ANSWER : javax
ANSWER : The central abstraction in the Servlet API is the Servlet interface. All
servlets implement this interface, either directly or, more commonly, by extending a
class that implements it such as HttpServlet.
Servlets-->Generic Servlet-->HttpServlet-->MyServlet.
The Servlet interface declares, but does not implement, methods that manage the
servlet and its communications with clients. Servlet writers provide some or all of
these methods when developing a servlet.
6) When a servlet accepts a call from a client, it receives two objects- What are
they?
7) What information that the ServletRequest interface allows the servlet access
to?
ANSWER : Information such as the names of the parameters passed in by the client,
the protocol (scheme) being used by the client, and the names of the remote host that
made the request and the server that received it.
The input stream, ServletInputStream.Servlets use the input stream to get data from
clients that use application protocols such as the HTTP POST and PUT methods.
8) What information that the ServletResponse interface gives the servlet methods
for replying to the client?
ANSWER : It Allows the servlet to set the content length and MIME type of the
reply.
ANSWER : An HTTP Servlet handles client requests through its service method. The
service method supports standard HTTP client requests by dispatching each request to
a method designed to handle that request.