1) Database: In second normal form ______________________
a. A composite attributes is converted to individual attributes.
b. Non key attributes are functional dependent on key attributes.
c. The non key attributes functionally dependent on not a part of key attributes.
d. All the above.
Answer
Explanation
|
ANSWER: Non key attributes are functional dependent on key attributes.
Explanation: A table is said to be in the second normal form when all the non-key attributes are fully functional dependent on the primary key.
|
|
2) Database: To avoid the problem of updating you can take the following principle for a good database design.
a. Unrelated data should be kept in different table.
b. Table should not contain any redundancy.
c. Table should represent constraint.
d. All the above
Answer
Explanation
|
ANSWER: All the above
Explanation: No explanation is available for this question!
|
|
3) Database: Which is not a function of aggregate function?
a. Count
b. Avg
c. Create
d. Max
Answer
Explanation
|
ANSWER: Create
Explanation: The aggregate functions are used for calculation in the database. The create is a keyword used in dbms.
|
|
4) Database: Which is the make given to the database management system which is able to handle full text data, image data, audio and video?
a. full media
b. graphics media
c. multimedia
d. hypertext
Answer
Explanation
|
ANSWER: multimedia
Explanation: multimedia is where there are collection of pictures,video,audio,text.
|
|
5) Database: Which of the following fields in a student file can be used as a primary key?
a. class
b. Social Security Number
c. GPA
d. Major
Answer
Explanation
|
ANSWER: Social Security Number
Explanation: The primary key is a unique identifier and it is unique for each record. Here the social security number is unique as each student is identified by that and there will be no duplications.
|
|
6) Database: A condition that led to the development of database was
a. A demand for more data to support information needs
b. An increase in the amount of data handled by organizations
c. The poliferation of data files
d. All of above
Answer
Explanation
|
ANSWER: All of above
Explanation: No explanation is available for this question!
|
|
7) Java: A JDBC technology-based driver ("JDBC driver") makes it possible to do
a. Establish a connection with a data source
b. Send queries and update statements to the data source
c. Process the results
d. All mentioned above
Answer
Explanation
|
ANSWER: All mentioned above
Explanation: A JDBC Driver is a component which enable a java application to interact with a database.
|
|
8) Java: In which model a Java applet or application talks directly to the data source?
a. Two-tier models
b. Three-tier models
c. Both A & B
d. None of the above
Answer
Explanation
|
ANSWER: Two-tier models
Explanation: A two-tier model is based on the client – server architecture. There is a direct communication between the client and server. It will run faster because of the tight coupling.
|
|
9) Java: In which the JDBC type represents a "single precision" floating point number that supports seven digits of mantissa?
a. REAL
b. DOUBLE
c. FLOAT
d. INTEGER
Answer
Explanation
|
ANSWER: REAL
Explanation: The corresponding SQL type REAL is defined in SQL-92 and is widely, though not universally, supported by the major databases. The SQL-92 standard leaves the precision of REAL up to the implementation.
|
|
10) Java: The struts 2 framework is used to develop MVC- based web application
a. True
b. False
Answer
Explanation
|
ANSWER: True
Explanation: The struts 2 framework is a combination of webwork framework of open symphony and struts 1.
|
|
11) Java: Which servlet does struts framework use?
a. EntryServlet
b. StrutsServlet
c. ActionServlet
d. BasicServlet
Answer
Explanation
|
ANSWER: ActionServlet
Explanation: The ActionServlet provides a "controller" in the Model-View-Controller (MVC) design pattern for web applications which is commonly known as "Model 2". Struts Flow start with ActionServlet then call to process() method of RequestProcessor.
|
|
12) Java: Which is a component in AWT that can contain another components like buttons, textfields, labels etc.?
a. Window
b. Container
c. Panel
d. Frame
Answer
Explanation
|
ANSWER: Container
Explanation: A container is a component itself and it adds a capability to add a component to itself. A container can add only a component to itself.
|
|
13) Java: AWT is used for GUI programming in java?
a. True
b. False
Answer
Explanation
|
ANSWER: True
Explanation: The AWT contains a large number of classes and methods which allows us to create and manage the windows GUI application. AWT is not only merely used because most of the GUI java programs are implemented using swing but but because of its rich implementation of the GUI controls and nature.
|
|
14) ______________are used to format the data display in CPP?
a. Iterators
b. Punctuators
c. Manipulators
d. Allocators
Answer
Explanation
|
ANSWER: Manipulators
Explanation: Manipulators are functions which are specifically designed to be used with conjunction with the insertion (<<) and extraction (>>) operators. They are used to change the formatting parameters on streams and insert or extract certain special characters.
|
|
15) Java: Predict the output:
int x = 786; cout << setfill(‘*’) << setw(6) << x;
a. 786***
b. **786
c. ***786
d. ******
Answer
Explanation
|
ANSWER: ***786
Explanation: When set() manipulator is used, then output is right justified. So Out of 6 width, 3 are used by variable x and remaining 3 width (Spaces) are filled with char * due to setfill().
|
|
16) Java: Generic pointers can be declared with__________
a. auto
b. void
c. asm
d. None of these
Answer
Explanation
|
ANSWER: void
Explanation: When a variable is declared as being a pointer to type void it is known as a generic pointer. We cannot have a void type of variable so the pointer will not point to any data and therefore it cannot be dereferenced. Still it is a pointer and to use it you just need to cast it to another kind of pointer.
|
|
17) C++: During a class inheritance in CPP, if the visibility mode or mode of derivation is not provided, then by default visibility mode is___________.
a. public
b. protected
c. private
d. friend
Answer
Explanation
|
ANSWER: private
Explanation: The private keyword specifies that the members are accessible only from member functions and friends of the class.
|
|
18) C++: The derivation of Child class from Base class is indicated by ____ symbol.
a. ::
b. :
c. ;
d. |
Answer
Explanation
|
ANSWER: :
Explanation: No explanation is available for this question!
|
|
19) Software Engineering: Which model gives the overall reliability of the system that is projected and certified?
a. Sampling model
b. Component model
c. Certification model
d. Both A & B
Answer
Explanation
|
ANSWER: Certification model
Explanation: No explanation is available for this question!
|
|
20) Software Engineering: Which subsystem implements a repository that encompasses the following elements?
1) Content database 2) Database capabilities 3) Configuration management functions
a. The publishing subsystem
b. The management subsystem
c. The collection subsystem
d. None of the above
Answer
Explanation
|
ANSWER: The management subsystem
Explanation: The content must be stored in a repository catalogued for subsequent acquisition and use and labelled to define 1) current status 2) appropriate version of the current object and 3) related content object. Therefore, we use the management system.
|
|
21) Software Engineering: Abbreviate the term BSS.
a. Box Structure Specification
b. Box Statistical Specification
c. Box Statistical System
d. Box Structure Sampling
Answer
Explanation
|
ANSWER: Box Structure Specification
Explanation: The box structure provides a stepwise refinement and verification methodology for information system analysis and design. They are used for recording and decomposing requirement specification. It helps in making the requirement clear to readers,complete and provide an artifact that will enhance the tracebility of the requirements.
|
|
22) Software Engineering: Each metric should be validated empirically in a wide variety of contexts before being published and that are used to make decisions.
a. True
b. False
Answer
Explanation
|
ANSWER: True
Explanation: The above line is one of the metric principle.
|
|
23) Software Engineering: Threat is the probability that can attack a specific type and it also occur within a given time.
a. Yes
b. No
Answer
Explanation
|
ANSWER: Yes
Explanation: No explanation is available for this question!
|
|
24) Software Engineering: The Phases of formal review process are mentioned below. Arrange them in the correct order
i. Planning ii. Review Meeting iii. Rework iv. Individual Preparations v. Kick Off vi. Follow Up
a. i,ii,iii,iv,v,vi
b. vi,i,ii,iii,iv,v
c. i,v,iv,ii,iii,vi
d. i,ii,iii,v,iv,vi
Answer
Explanation
|
ANSWER: i,v,iv,ii,iii,vi
Explanation: No explanation is available for this question!
|
|
25) Software Engineering: What can static analysis NOT find?
a. the use of a variable before it has been defined
b. unreachable (“dead”) code
c. memory leaks
d. array bound violations
Answer
Explanation
|
ANSWER: memory leaks
Explanation: The static analysis is the analysis of a computer software that is performed without executing the programs.
|
|