1. A class is declared inside a class but outside a method it is known as-----------------------
a. Annoymous inner class
b. Member inner class
c. Local Inner Class
d. Static nested Class
2. JVM stands for
a. Java Very Large Machine
b. Java Verified Machine
c. Java Very small machine
d. Java Virtual Machine
. What type of constructor is used to provide different values to the distinct objects?
a. Default constructor
b. Parameterized Constructor
c. Overloading Constructor
d. None of the above
4. How many types of controls does AWT support?
a. 7
b. 6
c. 5
d. 8
AWT stands for Abstract window tool kit.
5.Which type of inheritance one super-class have more than on sub-class
a. Hierarchical inheritance
b. single inheritance
c. Multiple inheritances
d. Multilevel inheritance
- Hierarchical Inheritance : In Hierarchical Inheritance, one class serves as a superclass (base class) for more than one sub class.In below image, the class A serves as a base class for the derived class B,C and D.

Which allows you to define one interface and have multiple implementations?
a. Encapsulation
b. inheritance
c. Polymorphism
d. None of the above
7. which right shift operator preserves the sign of the value?
8. ~
Unary not operator, ~, inverts all of the bits of its operand in binary representation.
9. What is it called if an object has its own lifecycle and there is no owner?
A. Aggregation
B. Composition
C. Encapsulation
D. Association
0. What is the return type of constructors ?
A. int
B. float
C. void
D. none of the mentioned
11. Which of these is an incorrect array declaration ?
A. int arr[]=new int[5]
B. int[]arr=new int[5]
C. int arr[]=int[5] new
D. int arr[]=new int[5]
Data type array name=data type and array size
12. ---------- is comparable to pair of persons in a room taking turns to speak with each other
A. Time Division Multiplexing
B. Frequency Division Multiplexing
C. Code Division Multiplexing
D. None of these
13. Which one of the following error detecting code is also known as polynomial code?
A. Checksum
B. Parity
C. Cyclic Redundancy checks
D. None of these
The encryption algorithm for WPA2 is based on
A. DES
B. AES
C. Elliptic Curve
D. EI Gamal
15. ------------------ is used to divide physical network topology into different logical topologies
A. Wimax
B. WLAN
C. Adhoc Network
D. VLAN
16. Which one of the following is not a Network layer Protocol?
A. TCP
B. ICMP
C. ARP
D. DHCP
T
SeSelect the service which is not provided by the Transport Layer.
A. Congestion Control
B. Routing
C. Flow Control
D. Error Correction
------------ is not a linux file system
A. Ext4
B. Jfs
C. XFS
D. ReFS
le
---
9. The IEEE standard for Wimax is
A. 802.11
B. 802.15
C. 802.15.1
D. 802.16
----------------- is not a web server
A. IIS
B. Apache
C. Firefox
D. Nginx
D. Nginx
21. A Denial of service attack against a network belongs to which of the following type of threat?
A. Modification
B. Interception
C. Interruption
D. None of these
---------------Caches web pages on the server hard disk so that they can be quickly retrieved later.
A. File Server
B. Proxy Server
C. Web Server
D. None of these
23. --------------- is not an active attack in Nertwork Security
A. Traffic Analysis
B. Masquerade
C. Replay
D. Denial Of Service
---. ----------- is an indication of the relative independence among the modules
A. Cohesion
B. Coupling
C. Pattern
D. Modularity
25. The test-Case design technique that complements equivalence partitioning and leads to the selection of test cases at the edges of the class
A. Orthogonal array testing
B. Model-Based Testing
C. Boundary Value analysis
D. Condition testing
T. The framework activity that presents software increment to the customer and includes delivery , support and feedback
A. Communication
B. Planning
C. Modeling
D. Deployment
27. ----------------- structures a team loosely and depends on individual initiative of the team members.
A. Random paradigm
B. Open Paradigm
C. Closed Paradigm
D. Synchronous Paradigm
28. The w5HH principle is suggested by
A. Reel
B. Grady Bosch
C. Liu
D. Barry Boehm
T. A quality metric that provides benefit at both the project and process level is called
A. Defect Removal efficiency
B. FP
C. LOC
D. Use-Case Points
30. The prioritized list of project requirements or features which provides business value for the customer
A. Sprints
B. Demos
C. Backlog
D. States
31. ----------------- is an agile process model that provides a framework for building and maintaining systems which meet tight time constraints through the use of incremental prototyping.
A. Adaptive Software Development
B. Dynamic systems development method
C. Scrum Model
D. Crystal
The small and highly motivated and self-organizing project team is called-----------------
A. Stake holders
B. Team leaders
C. Agile
D --------------- is also called behavioral testing, focuses on the functional requirements of the software.
A. Black box testing
B. White box Testing
C. Basis Path Testing
D. Data Flow Testing
34. Used to show dynamic communications between objects during execution of a task
A. Class Diagram
B. Deployment Diagram
C. Use Case Diagram
D. Sequence Diagram
35. A new technology that emphasizes the design of test cases before the creation of source code
A. Agile Process
B. Test- driven Development
C. Postmodern design
D. Model-driven Software Development
36. Which is a technique in a java in which a class can have any number of constructors that differ in parameter lists?
A. Constructor overloading
B. Method Overloading
C. Operator Overloading
D. None of the above
37. Which method is used to change the name of thread?
A. Public string getName()
B. Public Void setName(String name)
C. Public void getName()
D. Public String setName(sting name)
38. Which statement provides an easy way to dispatch execution to different parts of your code based on the value of expression?
A. If
B. Switch
C. Nested-if
D. If-else-if
39. Which keyword is used to make the classes and interface of another package accessible to the current package?
A. Import
B. Implements
C. Instanceof
D. None of the above
40. Which method DataInputStream class reads a line from the file and returns it as a string?
A. WriteInt()
B. reading()
C. readLine()
D. writeDouble()
41. Under which package is the string class encapsulated?
A. Java.awt
B. Java.util
C. Java.io
D. Java.lang
42. Which of the following is a valid declaration of an object of class Box?
A. Box obj =new box()
B. Box obj = new Box
C. Obj=new Box()
D. new Box obj
43. What is the output of this program?
Class selection_statements
{
Public static void main(string args[])
{
Int var1=5
Int var2=6
If (var 2==1)==var1)
System.out.prin(var2);
else
System.out.print(++var2)
}
}
A. 1
B. 2
C. 3
D. 4
44. A class member declared protected becomes a member of subclass of which type?
A. Public Member
B. Static Member
C. Protected Member
D. Private Member
45. Which of these is not a bitwise operator?
A &
B &=
C!=
Dless than=
Thread priority in Java is
A. Integer
B. Float
C. double
D. long
46. Which of the method is a part of Abstract Window Toolkit (AWT)?
A. Display()
B. Paint ()
C. drawString()
D. Transient
44. The ------------------- attribute of applet tag specifies the amount of horizontal blank space the browser should leave surrounding the applet
A) SPACE=Pixel
45. b) HSPACE=Pixel
46. c)HWDTH=pixel
47. e)HBLANK=pixel
48. The --------------------method is defined by the AWT which cause the AWT runtime system to execute a call to your applet's update() method.
49. A)Update()
50. B)Paint()
51. C)repaint()
52. D)reupdate()
53. -------------------------Package in java contents language utility classes such as vectors, hash, tables, random numbers data etc.
A) Java.util
B) Java.awt
C) Java.net
54. D. Java.lang
55. HTML Stands for
56. A)Hyper Text Markup Language
57. B)Hyper Text Marking Lanuage
58. C)Hyper Text MArkup Lists
59. D)None of the above
60. The capablity to store one object inside another object is called
A) Encapsulation
B) Aggregation(Ans Key)
C) Polymorphism
D) Inheritance
61. The capability to store one object inside another object is called
A) Encapsulation
B) Aggregation(Ans Key)
C) Polymorphism
D) Inheritance
62. Result of getAIIResponseHeaders() XMLHTTP Request method is
A) Returns the complete set to HTTP headers as a string
63. B)Returns the value of the specified HTTP header
64. C) Both (A) and (B)
65. D) None of the above
66. WAMP Variant for MAC operating system is
A) LAMP
B) MAMP
C) SAMP
D) None of these
67. DNS Comprises
A) Domain Names and Name Server
B) Domain Names and Domain Name Space
C) Domain Names, Domain Name Space and Name Server
68. Latest web browser of Microsoft
69. A)Internet Explorer
70. B)Opera
71. C)Safari
72. D)Edge
73. TCP/IP Stands for
A) Transmission control protocol/Internet Protocol
B) Transfer Control Protocol/ Internet Protocol
C) Both A and B
74. Packet switching method is used in
A) TCP
B) UDP
C) Both A and B
D) None of these
75. bWhich layer uses error control mechanism in OSI?
76. A)Network Layer
77. b) Data Link Layer
78. C) Tran spot Layer
79. D) Application Layer
80. ISDN is an exaple of --------------------network
81. A)Circuit Switched Telephone Network
82. B) Packet Switched Network
83. C) Message Switched Network
84. D) None of the above
85. What is the maximum cable length of STP
86. A)300 m
87. B) 200 m
88. c) 100 m
89. D) 150 m
90. Application layer uses the following protocols:
91. A)SMTP
92. B)FTP
93. C)HTTP
94. D)All of the above
95. To define style shee rules in header section of the HTML document called
A) Externam Style Sheet
B) Internal Style Sheet
C) Inline style sheet
96. None of the above
97. The application server for Java Web Application is
A) JBoss
B) Glassfish
C) Weblogic
98. D)Tomcat
B. White box Testing
C. Basis Path Testing
D. Data Flow Testing
34. Used to show dynamic communications between objects during execution of a task
A. Class Diagram
B. Deployment Diagram
C. Use Case Diagram
D. Sequence Diagram
35. A new technology that emphasizes the design of test cases before the creation of source code
A. Agile Process
B. Test- driven Development
C. Postmodern design
D. Model-driven Software Development
36. Which is a technique in a java in which a class can have any number of constructors that differ in parameter lists?
A. Constructor overloading
B. Method Overloading
C. Operator Overloading
D. None of the above
37. Which method is used to change the name of thread?
A. Public string getName()
B. Public Void setName(String name)
C. Public void getName()
D. Public String setName(sting name)
38. Which statement provides an easy way to dispatch execution to different parts of your code based on the value of expression?
A. If
B. Switch
C. Nested-if
D. If-else-if
39. Which keyword is used to make the classes and interface of another package accessible to the current package?
A. Import
B. Implements
C. Instanceof
D. None of the above
40. Which method DataInputStream class reads a line from the file and returns it as a string?
A. WriteInt()
B. reading()
C. readLine()
D. writeDouble()
41. Under which package is the string class encapsulated?
A. Java.awt
B. Java.util
C. Java.io
D. Java.lang
42. Which of the following is a valid declaration of an object of class Box?
A. Box obj =new box()
B. Box obj = new Box
C. Obj=new Box()
D. new Box obj
43. What is the output of this program?
Class selection_statements
{
Public static void main(string args[])
{
Int var1=5
Int var2=6
If (var 2==1)==var1)
System.out.prin(var2);
else
System.out.print(++var2)
}
}
A. 1
B. 2
C. 3
D. 4
44. A class member declared protected becomes a member of subclass of which type?
A. Public Member
B. Static Member
C. Protected Member
D. Private Member
45. Which of these is not a bitwise operator?
A &
B &=
C!=
Dless than=
Thread priority in Java is
A. Integer
B. Float
C. double
D. long
46. Which of the method is a part of Abstract Window Toolkit (AWT)?
A. Display()
B. Paint ()
C. drawString()
D. Transient
44. The ------------------- attribute of applet tag specifies the amount of horizontal blank space the browser should leave surrounding the applet
A) SPACE=Pixel
45. b) HSPACE=Pixel
46. c)HWDTH=pixel
47. e)HBLANK=pixel
48. The --------------------method is defined by the AWT which cause the AWT runtime system to execute a call to your applet's update() method.
49. A)Update()
50. B)Paint()
51. C)repaint()
52. D)reupdate()
53. -------------------------Package in java contents language utility classes such as vectors, hash, tables, random numbers data etc.
A) Java.util
B) Java.awt
C) Java.net
54. D. Java.lang
55. HTML Stands for
56. A)Hyper Text Markup Language
57. B)Hyper Text Marking Lanuage
58. C)Hyper Text MArkup Lists
59. D)None of the above
60. The capablity to store one object inside another object is called
A) Encapsulation
B) Aggregation(Ans Key)
C) Polymorphism
D) Inheritance
61. The capability to store one object inside another object is called
A) Encapsulation
B) Aggregation(Ans Key)
C) Polymorphism
D) Inheritance
62. Result of getAIIResponseHeaders() XMLHTTP Request method is
A) Returns the complete set to HTTP headers as a string
63. B)Returns the value of the specified HTTP header
64. C) Both (A) and (B)
65. D) None of the above
66. WAMP Variant for MAC operating system is
A) LAMP
B) MAMP
C) SAMP
D) None of these
67. DNS Comprises
A) Domain Names and Name Server
B) Domain Names and Domain Name Space
C) Domain Names, Domain Name Space and Name Server
68. Latest web browser of Microsoft
69. A)Internet Explorer
70. B)Opera
71. C)Safari
72. D)Edge
73. TCP/IP Stands for
A) Transmission control protocol/Internet Protocol
B) Transfer Control Protocol/ Internet Protocol
C) Both A and B
74. Packet switching method is used in
A) TCP
B) UDP
C) Both A and B
D) None of these
75. bWhich layer uses error control mechanism in OSI?
76. A)Network Layer
77. b) Data Link Layer
78. C) Tran spot Layer
79. D) Application Layer
80. ISDN is an exaple of --------------------network
81. A)Circuit Switched Telephone Network
82. B) Packet Switched Network
83. C) Message Switched Network
84. D) None of the above
85. What is the maximum cable length of STP
86. A)300 m
87. B) 200 m
88. c) 100 m
89. D) 150 m
90. Application layer uses the following protocols:
91. A)SMTP
92. B)FTP
93. C)HTTP
94. D)All of the above
95. To define style shee rules in header section of the HTML document called
A) Externam Style Sheet
B) Internal Style Sheet
C) Inline style sheet
96. None of the above
97. The application server for Java Web Application is
A) JBoss
B) Glassfish
C) Weblogic
98. D)Tomcat
The protocol used to send email from one to another
A)POP3
B)HTTP
c)SMTP
D)FTP
commonly used web application that make use of AJAX
A) Google Map
B) Yahoo Maps
C) Gmail
D)All of the above
IIS stands for
A) International information Standards
B) International Information Services
C) Internet Information Standards
D)Internet Information Services
The attribute of an HTML tag can be used to uniquely identify any element within an HTML page is
A) id
B) Title
C) Class
D) Style
gA smalla area can use the following network
A) LAN|
B) WAN
C) MAN
D) None of the above
The attribute is used to specify the URL of the document that occupies the inline frame
A) Frame
B) Sup
c) Src
D) Span
HTML form control tag is
A) File select boxes
B) Text input controls
c) Checkboxes Controls
D)All of the above
Client software that is used for email retrieval
A) IMAP
B) HTTP
C)DHCP
D)ICMP
bThe number of sub keys generated by IDEA algorithm is
A) 64
B) 32
C) 54
D) 52
---------------- is an example of public key algorithm?
A) DES
B)RSA
C)IREA
bD)RCS
DSS Signature uses which hash algorithm?
A) MD5
B) SHA-1
C) SHA-2
D) Does not use hash algorithm
In asymmetric key cryptography the private key is kept by
A) Sender
B) Receiver
C) Sender and receiver
D) Cryptoanalyst
A)POP3
B)HTTP
c)SMTP
D)FTP
commonly used web application that make use of AJAX
A) Google Map
B) Yahoo Maps
C) Gmail
D)All of the above
IIS stands for
A) International information Standards
B) International Information Services
C) Internet Information Standards
D)Internet Information Services
The attribute of an HTML tag can be used to uniquely identify any element within an HTML page is
A) id
B) Title
C) Class
D) Style
gA smalla area can use the following network
A) LAN|
B) WAN
C) MAN
D) None of the above
The attribute is used to specify the URL of the document that occupies the inline frame
A) Frame
B) Sup
c) Src
D) Span
HTML form control tag is
A) File select boxes
B) Text input controls
c) Checkboxes Controls
D)All of the above
Client software that is used for email retrieval
A) IMAP
B) HTTP
C)DHCP
D)ICMP
bThe number of sub keys generated by IDEA algorithm is
A) 64
B) 32
C) 54
D) 52
---------------- is an example of public key algorithm?
A) DES
B)RSA
C)IREA
bD)RCS
DSS Signature uses which hash algorithm?
A) MD5
B) SHA-1
C) SHA-2
D) Does not use hash algorithm
In asymmetric key cryptography the private key is kept by
A) Sender
B) Receiver
C) Sender and receiver
D) Cryptoanalyst
What is Data Encryption Standard (DES) ?
A. Block Cipher
B.
Stream Cipher
C.
Bit Cipher
D.
None of the above
In Cryptography , the order of the letters
in a message is rearranged by
A. Transposition Ciphers
B.
Substitution Ciphers
C.
Both A and B
D.
None of the above
Using RSA algorithm,
What is the value of cipher text C, If the plain text M=5 and P=3 , q=11
and d=7
A.
24
B.
25
C. 26
D.
32
---------------- is used for hiding the payment information
from the merchant
A. SET
B.
SSL
C.
SHTTP
D.
TSP
The URL Property belongs to which of the following object?
A. Document
B.
Element
C.
Location
D.
Event
Which of the following attribute can hold the JavaScript
version?
A. Language
B.
Script
C.
Version
D.
None of the above
Which event occurs when user click on an HTML element?
A. onclick()
B.
onmouceclick()
C.
onchange()
D.
onmouseover
<Script language ="javascript">
function x()
{
Document.write(2+0+"4");
}
</scipt>
A.
204
B.
2
C.
Error
D. 24
What is the value of $a and $b after the function call ?
<?php
function doSomething(&$arg)
{
$fruit=$arg;
$arg +=1;
return $fruit;
}
$a=3;
$b=doSomething($a);
?>
A.
a is 3 and b is 4
B.
a is 4 and b is 3
C. both are 3
D.
both are 4
which version of PHP was added with Exception handling?
A.
PHP 4
B. PHP 5
C.
PHP 5.3
D.
PHP
Which one of the following way can you embed PHP code in an
HTML page?
A.
<?php PHP code goes here ?>
B.
<?PHP code goes here?>
C.
<script language="php"> PHP code
goes here </script>
D. All of the above
is php case sensitive?
Referential Integrity is directly related to
A.
Relation Key
B. Foreign Key
C.
Primary Key
D.
Candidate Key
Consider a schema R(P,Q,R,S) and functional dependencies
P->Q and R->S. Then the
decomposition R1(P,Q) and R2(R,S) is
A.
Dependency Preserving and lossless join
B.
Lossless join but not dependency preserving
C.
Lossless Join
D. Dependency preserving but not lossless join
The normalization if 1 NF relations to 2NF involves
A.
Removal of full dependencies
B.
Removal of Transitive dependencies
C. Removal of partial dependencies
D.
Removal of multivalued dependencies
An attribute A of data type Varchar(20) has the value
"Ram". the attribure of data type char(20) has value
"Ramu". Here attribute A has --------- Spaces and attribute B ahs
----------------- spaces.
- 3,4
- 20,4
- 20,20
- 3,20
E-R model uses this symbol to represent weak entity set.
Dotted Rectangle
Doubly Dotted Rectangle
Double lined
Rectangle
Rectangle
Data mining is used to aid in
Operational management
analyzing past decision made by managers
detecting patterns in
operational data
retrieving archival data
------------- helps solve concurrency problem
two -phase commit
transaction serializablity
locking
transaction monitor
------------------cursor are declared by ORACLE for each
UPDATE, DELETE and INSERT SQL commands
internal
External
Implicit
Explicit
Comments
Post a Comment