| Q 1: | When a child class inherits from more than one parent class, this type of inheritance is called .............. inheritance. |
| (1) | Hybrid |
| (2) | Hierarchical |
| (3) | Multilevel |
| (4) | Multiple |
| Correct Answer: Multiple | |
| Q 2: | Private data can be accessed by |
| (1) | Class member functions |
| (2) | Functions in derived classes |
| (3) | Public classes |
| (4) | Both (a) and (b) |
| Correct Answer: Class member functions | |
| Q 3: | Which of the following method is a static in java.lang.Thread? |
| (1) | run() |
| (2) | sleep(long) |
| (3) | Start() |
| (4) | join() |
| Correct Answer: sleep(long) | |
| Q 4: | Which of the following is a character stream? |
| (1) | FileInputStream |
| (2) | DataInputStream |
| (3) | BufferedInputStream |
| (4) | FileReader |
| Correct Answer: FileReader | |
| Q 5: | Which of the following denote ways to manage state in an ASP.Net Application? |
| (1) | Session objects |
| (2) | Application objects |
| (3) | ViewState |
| (4) | All of these |
| Correct Answer: All of these | |
| Q 6: | Which of the following is the method provided by the DataSet object to generate XML? |
| (1) | ReadXML |
| (2) | WriteXML |
| (3) | GetXML |
| (4) | All of these |
| Correct Answer: All of these | |
| Q 7: | ................. error arises due to incorrect use of syntex. |
| (1) | Compile time error |
| (2) | Linking error |
| (3) | Run time error |
| (4) | Inpur error |
| Correct Answer: Compile time error | |
| Q 8: | What is the bit size of int in java? |
| (1) | 8 |
| (2) | 16 |
| (3) | 32 |
| (4) | 64 |
| Correct Answer: 32 | |
| Q 9: | What is the extension name of a Java source code file? |
| (1) | .java |
| (2) | .obj |
| (3) | .class |
| (4) | .exe |
| Correct Answer: .java | |
| Q 10: | In visual programming, the icons are the ........... image of an object. |
| (1) | physical |
| (2) | logical |
| (3) | both (a) and (b) |
| (4) | None of the above |
| Correct Answer: both (a) and (b) | |
| Q 11: | Which is not an attribute of cookie property? |
| (1) | path |
| (2) | host |
| (3) | secure |
| (4) | domain |
| Correct Answer: host | |
| Q 12: | Unicode character set in java contains |
| (1) | 20 bits |
| (2) | 32 bits |
| (3) | 64 bits |
| (4) | 16 bits |
| Correct Answer: 16 bits | |
| Q 13: | int occupies .............. bytes in java. |
| (1) | 2 |
| (2) | 4 |
| (3) | 8 |
| (4) | 10 |
| Correct Answer: 4 | |
| Q 14: | Which of the following is not supported by C++? |
| (1) | Automatic garbage Collection |
| (2) | Multiple Inheritance |
| (3) | Smart Pointer |
| (4) | Virtual Destructor |
| Correct Answer: Automatic garbage Collection | |
| Q 15: | What are the Activation modes for .NET Remoting? |
| (1) | Singleton |
| (2) | Singlecall |
| (3) | Both |
| (4) | None |
| Correct Answer: Both | |
| Q 16: | What is the root namespace for all types? |
| (1) | Root |
| (2) | System |
| (3) | Parent |
| (4) | Web |
| Correct Answer: System | |
| Q 17: | How dows ASP.NET store SessionIDs by default? |
| (1) | In cache |
| (2) | In cookies |
| (3) | In a global variable |
| (4) | In URL string or in a database |
| Correct Answer: In cookies | |
| Q 18: | What is the maximum size of query string? |
| (1) | 384 bytes |
| (2) | 128 bytes |
| (3) | 255 bytes |
| (4) | 512 bytes |
| Correct Answer: 255 bytes | |
| Q 19: | Which of the item listed below is not one of the software engineering layers? |
| (1) | Process |
| (2) | Manufacturing |
| (3) | Methods |
| (4) | Tools |
| Correct Answer: Manufacturing | |
| Q 20: | The first step in designing a system with structured design is to identify which process are internal to the system. This is done with a(n) |
| (1) | Function list |
| (2) | Event table |
| (3) | Automation system boundary |
| (4) | Use case diagram |
| Correct Answer: Automation system boundary | |
| Q 21: | Which of the following is not a traditional method of collecting system requirements? |
| (1) | Interviewing |
| (2) | RAD |
| (3) | Observations |
| (4) | Documents analysis |
| Correct Answer: RAD | |
| Q 22: | Which cohesion determines the elements are all executed at the same time? |
| (1) | Functional cohesion |
| (2) | Sequential cohesion |
| (3) | Temporal cohesion |
| (4) | Logical cohesion |
| Correct Answer: Temporal cohesion | |
| Q 23: | The two classifications of inputs are |
| (1) | Maintenance and waste |
| (2) | Products and waste |
| (3) | Maintenance and signal |
| (4) | Energies and maintainance |
| Correct Answer: Maintenance and signal | |
| Q 24: | The .................. symbol is used in a flowchart to represent a calculation task |
| (1) | Inpur |
| (2) | Start |
| (3) | Output |
| (4) | Process |
| Correct Answer: Process | |
| Q 25: | SRS document is for |
| (1) | "What" of a system? |
| (2) | Casting and scheduling of a system |
| (3) | How to design the system? |
| (4) | System requirement. |
| Correct Answer: "What" of a system? | |
| Q 26: | APIs stand for: |
| (1) | Application performance interface |
| (2) | Application programming interface |
| (3) | Application programming integration |
| (4) | Application performance integration |
| Correct Answer: Application programming interface | |
| Q 27: | Estimation of software development effort for organic software is COCOMO is |
| (1) | E = 2.4(KLOC) 1.05 PM |
| (2) | E = 3.4(KLOC) 1.06 PM |
| (3) | E = 2.0(KLOC) 1.05 PM |
| (4) | E = 2.4(KLOC) 1.07 PM |
| Correct Answer: E = 2.4(KLOC) 1.05 PM | |
| Q 28: | In transform analysis, input portion is called: |
| (1) | Afferent branch |
| (2) | Efferent branch |
| (3) | Central branch |
| (4) | None of the above |
| Correct Answer: Afferent branch | |
| Q 29: | System Development Live-cycle has following stages : I : Requirement analysis II: Coding III. Design IV: Testing Which option describes the correct sequence of stages? |
| (1) | III, I, IV, II |
| (2) | II, III, I, IV |
| (3) | I, III, IV, II |
| (4) | None of these |
| Correct Answer: None of these | |
| Q 30: | Which one of the following ISO standard is used for software process? |
| (1) | ISO 9001 |
| (2) | ISO 9000 |
| (3) | ISO 9003 |
| (4) | ISO 9000-3 |
| Correct Answer: ISO 9000-3 | |
| Q 31: | In a software project, COCOMO (Constructive Cost Model) is used to estimate |
| (1) | Effort and duration based on the size of the software |
| (2) | Effort and cost based on the duration of the software |
| (3) | Size and duration based on the effort of the software |
| (4) | Size, effort and duration based on the cost of the software |
| Correct Answer: Effort and duration based on the size of the software | |
| Q 32: | CMM level 1 has |
| (1) | 6 KPAs |
| (2) | 2 KPAs |
| (3) | 0 KPAs |
| (4) | None of the above |
| Correct Answer: 0 KPAs | |
| Q 33: | For a function of n variables, boundary value analysis yields : |
| (1) | 4n + 3 test cases |
| (2) | 4n + 1 test cases |
| (3) | n + 4 test cases |
| (4) | None of the above |
| Correct Answer: 4n + 1 test cases | |
| Q 34: | FAN IN of a component A is defined as |
| (1) | Number of components that can call or pass control to component A |
| (2) | Number of components that are called by component A. |
| (3) | Number of components related to component A. |
| (4) | Number of components dependent on component A. |
| Correct Answer: Number of components that can call or pass control to component A | |
| Q 35: | ..................... refers to the discrepancy among a computed, observed or measured value and the true specified or theoretically correct values. |
| (1) | Defect |
| (2) | Fault |
| (3) | Failure |
| (4) | Error |
| Correct Answer: Error | |
| Q 36: | Regression testing is primarily related to |
| (1) | Functional testing |
| (2) | Development testing |
| (3) | Data flow testing |
| (4) | Maintenance testing |
| Correct Answer: Maintenance testing | |
| Q 37: | Data structure suitable for the application is discussed in |
| (1) | data design |
| (2) | procedural design |
| (3) | architectural design |
| (4) | interface design |
| Correct Answer: data design | |
| Q 38: | Software Engineering is an engineering discipline that is concerned with : |
| (1) | how computer system work. |
| (2) | theories and methods that underlie computers and software systems. |
| (3) | all aspect of software producation |
| (4) | all aspects of computer based systems development, including hardware, software and process engineering. |
| Correct Answer: all aspect of software producation | |
| Q 39: | A software system crashed 20 times in the year 2017 and for each crash, it took 2 minutes to restart. Approximately, what was the software availability in that year? |
| (1) | 96.9924% |
| (2) | 97.9924% |
| (3) | 98.9924% |
| (4) | 99.9924% |
| Correct Answer: 99.9924% | |
| Q 40: | A software design pattern often used to restrict access to an object is : |
| (1) | adapter |
| (2) | decorator |
| (3) | delegation |
| (4) | proxy |
| Correct Answer: proxy | |
| Q 41: | Which of the following JSP variables are not available within a JASP expression? |
| (1) | out |
| (2) | session |
| (3) | request |
| (4) | httpsession |
| Correct Answer: httpsession | |
| Q 42: | In prototyping |
| (1) | COBOL is used |
| (2) | 4GLs are used |
| (3) | system is documented |
| (4) | None of the above |
| Correct Answer: 4GLs are used | |
| Q 43: | In Java, a character constant's value is its integer value in the ................character set. |
| (1) | EBCDIC |
| (2) | Unicode |
| (3) | ASCII |
| (4) | Binary |
| Correct Answer: Unicode | |
| Q 44: | Which one is not a valid operator in Java? |
| (1) | <> |
| (2) | != |
| (3) | => |
| (4) | <= |
| Correct Answer: <> | |
| Q 45: | Which of the following escape sequences represents carriage return? |
| (1) | \n |
| (2) | \r |
| (3) | \\ |
| (4) | \c |
| Correct Answer: \r | |
| Q 46: | Which of the following features is available in JAVA? |
| (1) | Applets |
| (2) | Swings |
| (3) | Both of the avove |
| (4) | None of the above |
| Correct Answer: Both of the avove | |
| Q 47: | In C++, 14%4 equals to : |
| (1) | 1 |
| (2) | 2 |
| (3) | 3 |
| (4) | 4 |
| Correct Answer: 2 | |
| Q 48: | C++ was originally developed by : |
| (1) | Nicolas Wirth |
| (2) | Donalt Knuth |
| (3) | Bjarni Stroustrup |
| (4) | Ken Thompson |
| Correct Answer: Bjarni Stroustrup | |
| Q 49: | How to declare a class which has fields that are not serializable? |
| (1) | Public |
| (2) | Private |
| (3) | Protected |
| (4) | Transient |
| Correct Answer: Transient | |
| Q 50: | In C++, a destructor takes : |
| (1) | One argument |
| (2) | Two arguments |
| (3) | Three arguments |
| (4) | Zero arguments |
| Correct Answer: Zero arguments | |
| Q 51: | How many types of polymorphisms are supported by C++? |
| (1) | 1 |
| (2) | 3 |
| (3) | 2 |
| (4) | 4 |
| Correct Answer: 2 | |
| Q 52: | .................. is the OOP feature and mechanism that binds together code and the data it manipulates, and keeps both safe from outside world. |
| (1) | Data Storing |
| (2) | Data Encapsulation |
| (3) | Data Binding |
| (4) | Data Abstraction |
| Correct Answer: Data Encapsulation | |
| Q 53: | Which of the following is not a file opening mode? |
| (1) | ios::out |
| (2) | ios::in |
| (3) | ios::app |
| (4) | ios::truncate |
| Correct Answer: ios::truncate | |
| Q 54: | When a child class function is called, the compiler looks first for matching function name in the ................. |
| (1) | Class of the object using the function name |
| (2) | Immediate ancestor class |
| (3) | Base class |
| (4) | Descendant class |
| Correct Answer: Class of the object using the function name | |
| Q 55: | Generic point can be declared with ............. |
| (1) | auto |
| (2) | void |
| (3) | static |
| (4) | None of these |
| Correct Answer: void | |
| Q 56: | Delete operator is used |
| (1) | To allocate storage |
| (2) | to deallocate storage |
| (3) | To delete variable name |
| (4) | None of the above are correct |
| Correct Answer: None of the above are correct | |
| Q 57: | Dynamic memory can be allocated by the following declaration |
| (1) | new |
| (2) | volatile |
| (3) | static |
| (4) | == |
| Correct Answer: new | |
| Q 58: | What is the output of this program? |
| (1) | 10 |
| (2) | 5 |
| (3) | 15 |
| (4) | Address of b |
| Correct Answer: Address of b | |
| Q 59: | C++ is a |
| (1) | Top down programming approach |
| (2) | Procedurally oriented approach |
| (3) | Bottom-up programming approach |
| (4) | None of these |
| Correct Answer: Bottom-up programming approach | |
| Q 60: | A variable declares as private can be directly accessed by |
| (1) | Objects |
| (2) | Through a member function |
| (3) | Through another private member |
| (4) | None of these |
| Correct Answer: Through a member function | |
| Q 61: | In CPP, cin and count are the predefined stream .................... |
| (1) | Operator |
| (2) | Functions |
| (3) | Objects |
| (4) | Data types |
| Correct Answer: Objects | |
| Q 62: | Which of these is super class of all exceptional type classes? |
| (1) | String |
| (2) | Runtime exception |
| (3) | Throwable |
| (4) | Cachable |
| Correct Answer: Throwable | |
| Q 63: | Which of this access specifier can be used for a class so that it's members can be accessed by a different class in the same package? |
| (1) | Public |
| (2) | Protected |
| (3) | No modifier |
| (4) | All of the mentioned |
| Correct Answer: All of the mentioned | |
| Q 64: | Which of the following is incorrect statement about packages? |
| (1) | All variables in interface are implicitly final and static |
| (2) | Interfaces are specified public if they are to be accessed by any code in the program |
| (3) | Interfaces specify what class must do but not how it does |
| (4) | All variables are static and methods are public if interface is defined public |
| Correct Answer: All variables are static and methods are public if interface is defined public | |
| Q 65: | Execute statement, we invoke the method. |
| (1) | executeUpdate method |
| (2) | executeRel method |
| (3) | executeStmt method |
| (4) | executeConn method |
| Correct Answer: executeUpdate method | |
| Q 66: | Which of these interfaces is implemented by thread class? |
| (1) | Runnable |
| (2) | Map connections |
| (3) | Set |
| (4) | Connections |
| Correct Answer: Runnable | |
| Q 67: | Which of these method of trade class is used to suspend a trade for a period of time? |
| (1) | sleep() |
| (2) | stop() |
| (3) | suspend() |
| (4) | terminate() |
| Correct Answer: sleep() | |
| Q 68: | What will happen if two thread of same priority are called to be processed simultaneously? |
| (1) | Both of them will be executed simultaneously |
| (2) | Anyone will be executed first lexographically |
| (3) | Name of dam will be executed |
| (4) | It is dependent on the operating system |
| Correct Answer: It is dependent on the operating system | |
| Q 69: | Which of these is necessary to specify at time of array initialization? |
| (1) | Row |
| (2) | Column |
| (3) | Both row and column |
| (4) | None of the above |
| Correct Answer: Row | |
| Q 70: | Which of the following are interface? 1. ServletContext 2. Servlet 3. Generic servlet 4. HttpServlet |
| (1) | 1,3,4 |
| (2) | 1,2 |
| (3) | 1,2,3,4 |
| (4) | 1,4 |
| Correct Answer: 1,2 | |
| Q 71: | Which of the following are the valid scops in JSP. |
| (1) | Request, page, session, application |
| (2) | Response, page, session, application |
| (3) | Request, page, session, global |
| (4) | Request, page, context, application |
| Correct Answer: Request, page, session, application | |
| Q 72: | Every method of a ...................... is Implicitly final. |
| (1) | Static class |
| (2) | Dynamic class |
| (3) | Final class |
| (4) | Abstract class |
| Correct Answer: Final class | |
| Q 73: | What is the range of the char type? |
| (1) | 0 to 215 |
| (2) | 0 to 216 |
| (3) | 0 to 32767 |
| (4) | 0 to 65535 |
| Correct Answer: 0 to 65535 | |
| Q 74: | The development of a/an ............ Is a key step in solving a problem. |
| (1) | Structure |
| (2) | Program |
| (3) | Algorithm |
| (4) | None of these |
| Correct Answer: Algorithm | |
| Q 75: | Java is a ........... Language. This means that you must explicit about what type of data you are working with |
| (1) | loosely typed |
| (2) | strongly typed |
| (3) | dynamically typed |
| (4) | weakly typed |
| Correct Answer: strongly typed | |
| Q 76: | In Java, ..................... can only test for equality, whereas .................... can evaluate any type of the Boolean expression. |
| (1) | switch, if |
| (2) | continue, if |
| (3) | if, break |
| (4) | if, switch |
| Correct Answer: switch, if | |
| Q 77: | The compiled Java program can run on any ....................... platform having Java Virtual Machine (JVM) installed on it. |
| (1) | Program |
| (2) | Non Java |
| (3) | Hardware |
| (4) | Java |
| Correct Answer: Hardware | |
| Q 78: | What will be output of the following code? byte x = 64, y; y = (byte) (x<<2); System.out.printIn(y); |
| (1) | 0 |
| (2) | 2 |
| (3) | 1 |
| (4) | 64 |
| Correct Answer: 0 | |
| Q 79: | What is the type and value of the following expression? (Notice the integer division) - 4 + 1/2 + 2* -3 + 5.0 |
| (1) | double 4.5 |
| (2) | int -5 |
| (3) | int -4 |
| (4) | double -5.0 |
| Correct Answer: double -5.0 | |
| Q 80: | Which of these is an incorrect array declaration? |
| (1) | int[] arr = new int[5] |
| (2) | int []arr = new int[5] |
| (3) | int arr[] arr = new int[5] |
| (4) | int arr[] = new int[5] |
| Correct Answer: int arr[] arr = new int[5] | |
| Q 81: | In Java, element of an array are automatically initialized to some default value. What is the default value for the elements of an array of integers? |
| (1) | 0 |
| (2) | "0" |
| (3) | 1 |
| (4) | Null |
| Correct Answer: 0 | |
| Q 82: | From the following Java code determine the attributes of the class student: class student [ string name; int marks; } public static void main() { student S1=new student(); student S2=new student(); } |
| (1) | Only name |
| (2) | Both name and marks |
| (3) | Only S1 |
| (4) | Both S1 and S2 |
| Correct Answer: Both name and marks | |
| Q 83: | What is printed by the following code fragment? int []a = {0,1,2,3,4,5,6}; System.out.printIn(a.length); |
| (1) | 6 |
| (2) | 5 |
| (3) | 7 |
| (4) | 8 |
| Correct Answer: 7 | |
| Q 84: | Which of the following are legal array declarations? I. int[] myScore []; II. char[] myChars; III. int[6]myScores; |
| (1) | I, II |
| (2) | I, III |
| (3) | II, III |
| (4) | All of these |
| Correct Answer: I, II | |
| Q 85: | Which statement does not create an object of class Student {}? |
| (1) | Student s1 = new Student (); |
| (2) | new Student (); |
| (3) | Student S1; |
| (4) | Student ss = new Student (); |
| Correct Answer: Student S1; | |
| Q 86: | For a program with large numbers of inserts and deletes, it is better to use the .......................... |
| (1) | Array |
| (2) | ArrayList |
| (3) | Linked List |
| (4) | Stack |
| Correct Answer: Linked List | |
| Q 87: | Which is the output of this code? List<String> list = new ArrayList<String>(); list.add("b"); list.add("a"); list.add("c"); Collections.sort(list); System.out.printIn(list.get(0)); |
| (1) | a |
| (2) | c |
| (3) | b |
| (4) | abc |
| Correct Answer: a | |
| Q 88: | Which class can be used for reading files? |
| (1) | ArrayList |
| (2) | HashMap |
| (3) | Scanner |
| (4) | Set |
| Correct Answer: Scanner | |
| Q 89: | Which of the following is FALSE about arrays on Java? |
| (1) | Arrays in Java are always allocated on heap |
| (2) | Length of array can be changed after creation of array |
| (3) | A Java array is always an object |
| (4) | None of these |
| Correct Answer: Length of array can be changed after creation of array | |
| Q 90: | Find the output of the following Java code line System.out.printIn(match.floor(-7.4)) |
| (1) | -7 |
| (2) | -8 |
| (3) | -7.4 |
| (4) | -7.0 |
| Correct Answer: -8 | |
| Q 91: | What is the output of the following code? int f=1, i=2; while(++i<5) f*=i; System.out.printIn(f); |
| (1) | 2 |
| (2) | 3 |
| (3) | 12 |
| (4) | 60 |
| Correct Answer: 12 | |
| Q 92: | Type IV JDBC driver is a driver |
| (1) | Which requires an intermediate layer |
| (2) | Which is written in C++ |
| (3) | Which communicates through Java sockets |
| (4) | Which translate JDBC function calls into API not native to DBMS |
| Correct Answer: Which communicates through Java sockets | |
| Q 93: | The process of subdividing a computer program into separate sub programs is known as |
| (1) | Modular programming |
| (2) | Object-oriented programming |
| (3) | Object-based programming |
| (4) | Event-driven programming |
| Correct Answer: Modular programming | |
| Q 94: | Which of the following Programming technique do not support inheritance and dynamic binding? |
| (1) | Event-Driven |
| (2) | Object-based |
| (3) | Object-Oriented |
| (4) | Procedure-Oriented |
| Correct Answer: Object-based | |
| Q 95: | In Visual Basic .................. is the extension to represent project file. |
| (1) | .frm |
| (2) | .vbp |
| (3) | .cls |
| (4) | .vb |
| Correct Answer: .vbp | |
| Q 96: | In Visual Basic, a variable name cannot be more than ...................... characters. |
| (1) | 255 |
| (2) | 355 |
| (3) | 300 |
| (4) | 200 |
| Correct Answer: 255 | |
| Q 97: | The Boolean data type : |
| (1) | has two states |
| (2) | is unsigned |
| (3) | is displayed by the program as yes or no |
| (4) | Both (a) and (b) |
| Correct Answer: Both (a) and (b) | |
| Q 98: | Which symbol creates an access key in the next of a menu item? |
| (1) | % |
| (2) | & |
| (3) | $ |
| (4) | @ |
| Correct Answer: & | |
| Q 99: | In ..................., we can write code. |
| (1) | Locals window |
| (2) | IMMEDIATE WINDOW |
| (3) | Code Editor window |
| (4) | None of these |
| Correct Answer: Code Editor window | |
| Q 100: | In Visual Basic, the declaration of variables is done by ...................... Keyword. |
| (1) | Declare |
| (2) | Dim |
| (3) | Static |
| (4) | Int |
| Correct Answer: Dim | |