SYBSC IT - SEM IV - MCQ
MCQ
Multiple
Choice Questions
SAMPLE
MCQ
AS PER UNIVERSITY OF MUMBAI
SYLLABUS
Will be helpful to
regular students of Mumbai university colleges who are going to give the online
examinations of SEM II, SEM IV and SEM V
class of students.
If it is helpful to you
so also share it among your friends so that they will be also benefited from
it.
ANSWERS ARE HIGHLIGHTED IN BOLD
CLASS:
S.Y.B.SCIT-IV SEM REGULAR
SUB :COMPUTER GRAPHICS
MCQ
(50 QUESTIONS)
1) GUI stands for -
a. Graphics
uniform interaction b. Graphical user
interaction
b. Graphical
user interface d. Graphics uniform interface
2) Graphics can not be -
a.
Simulation b. Drawing
c.Movies, photographs d.Static
3) CAD stands for
-
a.
Computer art design b.Computer-aided design
b.
Car art design d.Car-aided design
4) following which
one is not components of Interactive
computer graphics are -
a.
A monitor b. Display
controller c. Frame buffer d.scanner
5) A user can make
any change in the image using -
a.Interactive
computer graphics b. Non-Interactive
computer graphics
c.
drawing d. position
6) What is a pixel
mask?
a.
a string
containing only 0's b. a string containing
only 1's
c.
a string
containing two 0's d.a string
containing both 1's and 0's
7) The higher
number of pixels gives us a ____ image -
a.
Better b.Worst c. Smaller d.Maximum
8) Which one of
the following is the primarily used output device?
a)Video monitor b)
Scanner c.Speaker d.Printer
9) Which one of
the following terms is used for the area of the computer captured by an
application?
a.
Display b. Window c. Viewport d.
surface plane
10) Aspect Ratio
can be defined as -
a.
The ratio of the
vertical points to horizontal points
b.
The ratio of the
vertical points pixels to slanting points
c.
The ratio of the
horizontal points to vertical points Of pixels
d.
The ratio of the
horizontal points to vertical points to slanting
11) Which of the
following is not the pattern of line?
a.
Dotted line b.Dashed line c. Dark line d. Plane line
12) DDA stands for
-
a.
Direct
differential analyzer b.Data differential analyzer
c. Direct difference analyzer d. Digital differential analyzer
13) VGA stands for____
a.
Visual Graph Array b. Visional Graphic Array
c. Video Graphic Array d.Video Graph
Array
14) The process of
positioning an object along a straight line path from one coordinate point to
another is called –
a.
Translation b.Reflection c. Shearing
d. Transformation
15) Which of the
following equation is used in 2D translation to move a point(x,y) to the new
point (x',y')?
a.
x' = x + ty and
y' = y + tx b. x' = x - tx and y' = y
- ty
b.
x' = x + tx and
y' = y + ty d. x' = x + tx and y' = y
- ty
16) The process of
repositioning an object along a circular path is called -
a. Translation b. Rotation c. Scaling d.Shredding
17) Which of the
following is must be specified to generate a rotation?
a. Rotational distance b. Rotation angle c. Co-ordinates d. Line on X axis
18) A positive
value of the rotation angle -
a.
rotates an object
in the clockwise direction
b.
rotates an object
in the counter-clockwise direction
c.
rotates an object
in the reverse clockwise direction
d.
rotates an object
in the anticlockwise direction
19) Which of the
following transformation is used for altering the object's size?
a.
Translation b. Rotation c. Scaling d.Shredding
20) What happens
if the values of scaling factors sx and sy less than 1
(i.e., sx<1 and sy<1)?
a. No change in the object's size b. Reduce
the object's size
c. Increase
the object's size d.Changes
on Y axis only
21) In which of
the following case, the uniform scaling will be produced?
a.
Values of scaling
factors sx and sy are unequal.
b.
Values of scaling
factors sx and sy are equal.
c.
Values of
shredding factors sx and sy are unequal
d.
Values of scaling
factors x and y are unequal
22) The
Cohen-Sutherland algorithm divides the two-dimensional space in how many
regions?
a. 4 b. 8 c. 9 d. 23
23) The 4-bit code
of the bottom-region among the nine regions divided using the Cohen-Sutherland
algorithm?
a. 0000 b. 0010 c. 0110 d. 0101
24) According to
the Cohen-Sutherland algorithm, where the line lies, if the 4-bit code of both
ends is 0000, and also the logical OR gives 0000?
a.
Half outside half
inside b.
Completely inside
b.
Completely outside c.
Half inside
25) Which one of
the following is the most commonly used and basic input device?
a. Joystick
b. Printer c. Scanner d. Keyboard
26) Which of the
following device is used for the 3D positioning of an object?
a.
Trackball b. Mouse c. Spaceball d.
Scanner
27) Which is not
the input device?
a. Impact printers b.
Trackball c. Mouse
d. Keyboard
28) Which of the
following is an example of the impact device?
a. Laser printer b. Inkjet
printer c. Line printer d. Plotted printer
29) Which of the
following allows us to select the screen positions with the touch of a finger?
a. Mouse
b.
Trackball c. Touch panel d. keyboard
30) Which is a
common device for painting or selecting the object's co-ordinate positions?
a.
Digitizer
b. Touch panel
c. Image scanner d. Keyboard
31) Grayscale is
used for -
a. Random
scan display b. Monitors with color capability
c. Monitors with no color capability d.
Zooming
32) Clipping in computer
graphics is primarily used for -
a. zooming b. copying c. removing objects and lines d. for clipping
33) Random scan
systems are used for -
a. Color drawing application b. Pixel drawing application
c. Line drawing application d. Random scan display
34) How many
phosphor color dots at each pixel position in a shadow mask CRT?
a. 1 b. 7 c. 2 d. 3
35) Shadow mask
method is used in -
a. Raster scan system b.
Random scan system
c. Rotation scan system
d. Arbitrary scan
system
36) In which of
the following CRT methods, there is an occurrence of convergence problem?
a.
Shadow mask method b.
Beam penetration
c. Light penetration d. Dark mask method
37) Which of the following
uses the Beam penetration method?
a. Raster scan system b.
Random scan system
c. Rotation scan system
d. Arbitrary scan
system
38) Plasma panel
is a type of -
a. Emissive
display b.
Non-Emissive display c. Printer d. scanner
39) Which of the
following algorithm is used to fill the interior of a polygon?
a. Boundary fill algorithm b. Scan line polygon fill algorithm
c. Flood fill algorithm d.
Liang basky algorithm
40) Which of the
algorithm is used to color a pixel if it is not colored and leaves it if it is
already filled?
a. Boundary fill algorithm b. Scan line polygon fill algorithm
c. Flood fill algorithm d.
Liang basky algorithm
41) In ____
geometry lines are generally parallel.
a. Perspective
geometry b. Trimetric
geometry
c. Affine geometry d. Concave geometry
42) Which of the
following are the 2d color models?
a. RGB and CMK b. RGB and CMG
c. RGB and CMYK d.
CMG and CMYK
43) RGB color
model is used for -
a. Painting
b. Sketching c. Printing d.Computer display
44) Following
which one is stage in 3D viewing
a. clip against view volume b. modellig translation
c. project onto projection plane d.viewport
45) A _____ is used for buildings seen from above
and below.
a. One point perspective b.Three
point perspective
c. Two point perspective d.Four point perspective
46) A _____ is
used for buildings seen from front
a. One point perspective b.Three
point perspective
c. Two point perspective d.Four point perspective
47) The phase of
determining the appropriate pixels for representing images or graphics object
is called as -
a. Translation b. Transformation c. Rasterization d.
Scaling
48) The process of
displaying 3D into a 2D display unit is called as -
a. Resolution
b. Projection c. Rasterization d. Transformation
49) The video
device with reduced volume, power consumption and weight is -
a. CRT b. Flat-panel
display c. Portable display d. LED display
50) Plasma panel
is also called as -
a. Non-emissive
display b. Liquid crystal display
c. Gas discharge
display d. emissive
display
CLASS:
S.Y.B.SCIT-IV SEM REGULAR
SUB : EMBEDDED SYSTEM
MCQ
(50 QUESTIONS)
1)
An embedded system is _____ system designed to perform a specific
function and combination of hardware and software
a)
electro-digital b)
electro-mechanical
c) digital-mechanical d) internet based
2)
Wahsing Machine,Airconditioner are examples of ___
a)
Embedded system b)
general purpose system
c) computer system d) microprocessor
3)
Smart phones, mobile internet devices are ______ generation
devices
a)
First b) second c) third d)
fourth
4)
Industrial machines are_______
scale
a)
Medium b) large c) small d) complex
5)
An electronic toy is _____ scale
a)
Medium b) large c) small d) complex
6)
Which of the following is not true about embedded systems
a) Built around
specialized hardware
b) Always contain an operating
system
c) Execution behavior may
be deterministic
d) Useful for Real time system
7)
____ is silicon chip representing a critical processing for
performing arithmetic as well as logical opearation
a)
Microcontroller b) Microprocessor c) Address bus d) Data
bus
8)
____ is highly integrated chip contains CPU scratchpad RAM,
special and general purpose register
arrays on chip
a)
Microcontroller b) Microprocessor c) Adress bus d) Data bus
9)
CISC stands for
a)
Complex Instruction Set Computer
b) Command
Instruction Set Computer
c) Communication
Instruction Set Computer
d)
common Instruction Set Computer
10)
_____it posses lesser number
of instruction
a)
RISC b) CISC c) VLSI d)
DISC
11)
____is a microchip design to perform a specific and unique
application
a)
RISC b) CISC c) VLSI d) ASIC
12)
ASIC stands for ___
a)
Application Specific Integrated circuits
b)
Application Specific Internet circuits
c)
Application Specific Integrated communication
d)
Accesses Specific Integrated circuits
13)
PLD is ______
a)
Processed Logic Device
b)
Programmable Logic Device
c)
Pro Logic Device
d)
Programmable Logic Disk
14)
______ is an electronic component and it is used to construct
digital circuits which are reconfigurable.
a) Processed Logic Device
b) Programmable Logic Device
c) Pro Logic Device d)
Programmable Logic Disk
15)
___ is used for taking input
a)
Actuators b)
Sensors c) radiations d) Insulators
16)
___ is transducer that may be either mechanical or electrical
which converts signals to corresponding physical
a)
Actuators b) Sensors c) radiations d) Insulators
17)
_____ are communication interface
a)
Onboard communication and External communication
b)
Inbound communication and
External communication
c)
Onboard communication and outbound communication
d)
Inbound communication and outbound communication
18)
___ bus is synchronous
bidirectional half duplex two wire serial interface bus
a)
Inter Integrated Current
b)
Internet Integrated Circuit
c)
Inter Integrated Circuit
d)
Inter Integration Circuit
19)
SPI stands for _____
a)
Simple Peripheral Interface
b)
Serial Peripheral Interface
c)
Simplex Peripheral Interface
d)
Simple Parrallel Interface
20)
_____ is flash memory chip that stores specialized software
running in a chip in an embedded device to control its functions
a)
Embedded hardware b)
Embedded software
b)
)Embedded firmware d) hardware
21)
____ is used to restart system.
a)Oscillator unit b) Reset circuit
c)watchdog timer d) brownout protection
circuit
22) _____
causes unexpected behavior in system with digital control circuit
a)Oscillator
unit b) Reset
circuit
c)watchdog timer d) brownout protection circuit
23) _____ is an
electronic circuit that produces a periodic, oscillating electronic signal
often a sine wave or square wave.
a)Oscillator unit b) Reset circuit
c)watchdog timer d) brownout protection
circuit
24) _____ is
used as general purpose timer in some cases
a)Oscillator unit b) Reset circuit
c)watchdog timer d) brownout
protection circuit
25) following
which one is not consider as quality of embedded system
a) Reliability b) Evolvability c) portability d)
failure
26) In washing
machine _____ is used to circulate the water through the washing machine
a) tub b) water pump c) timer d)drain pipe
27)
_______performs cleaning operations of cloths in washing machine
a) tub b) agitator c) timer d)drain pipe
28) CAN stands
for in embedded system is ______
a) Controller
Area Network b)
Communication Area Network
c)
Communication Area internet d)
Complex Area Network
29) ______ is
single master multiple slave communication interface
a)CAN b)LIN
c)MOTS d)LAN
30) _______ map
is also called address book of computer.
a) I/O Map b) Interrupt map c) Memory Map d) Timer Map
31) It is read
and write memory
a) RAM b) ROM c)EPROM d) EEPROM
32) following
which is not type of ROM
a) Masked ROM b) PROM c)
EPROM d) Masked RAM
33)____ is
combination of RAM and ROM
a) EPROM b)PROM c) EEPROM d)
Hybrid
34) following which is not
type of hybrid memory
a) EEPROM b) NVRAM c) Flash d)
EPROM
35) ______ is
testing to confirm that each storage location in a memory
devices
is working.
a) Memory testing b) I/O testing c) Interrupt Testing d) Peripheral testing
36)_____ is
error detecting code
a) Cyclic Redundancy Check b)
Computer Redundancy Code
c) Computer
Redundancy Check d) Cyclic Redundancy
Code
37) In computing
______ is component program that operates or control a
particular type of
device i.e attached to computer
a) Device driver b) control and status register c)watchdog timer
d) Reset circuit
38) following which
is not consider as peripherals in
embedded system
a) control
Register b) status register c) watch dog timer d) CRC
39) CRC stands
for______
a) Cyclic Redundancy Check b) Computer Redundancy Code
c) Computer
Redundancy Check d) Cyclic Redundancy Code
40) ___ bus is synchronous bidirectional full duplex two wire serial
interface bus
a) SPI bus b) I2C
bus c)
Inter Integrated Circuit d)
Inter Integration Circuit
41) Which of the
following datatypeis not used in embedded C programming
Language
a)
Double b) Char c) unsigned char
d) unsigned int
42) ______ is true bidirectional port
a) Port 1 b) Port 0
c) Port 2 d) Port 4
43) _____ is used
for higher external address byte or a
normal input/output port
a) Port
1 b) Port 0 c) Port 2
d) Port 4
44)____ is the
processes in which processor asks question repeatedly at regular
intervals to
check the device has completed the given
task
a)
Interrupting b)
Controlling c) Polling d) Processing
45) MOTS stands
for _____
a) Media
Oriented System Transport System
b) Media
Operating System Transport System
c) Media
Oriented System Translation System
d) Medium Oriented System Transport System
CLASS:
S.Y.B.SCIT-IV SEM REGULAR
SUB : SOFTWARE ENGINEERING
MCQ
(50 QUESTIONS) 1
Software is divided into two main categories a)
System Software ,Application software b)
Generic Products, System Software c)
System Software
,Generic Products d)
Generic and customized product |
2 SDLC Stands for a)
SYSTEM DEVELOPMENT LIFE CYCLE b)
SOFTWARE DEVELOPMENT LIFE CYCLE c)
SOFTWARE DATA LIFE CYCLE d)
SYSTEMATIC DEVELOPMENT LIFE CYCLE |
3 The last stage of
SDLC is a)
System testing b)
Implementation & Evaluation c)
Maintenance d)
Feasibility Study |
4 The first stage of
SDLC is a)
System testing b)
Implementation & Evaluation c)
Maintenance d)
Preliminary Investigation (Problem
Identification)
|
5 A sequential linear model. a)
waterfall model b)
prototype model c)
incremental model d)
RAD |
6 A Iterative linear
framework a)
waterfall model b)
prototype model c)
incremental model d)
RAD
|
7
_____is an engineering discipline which Is concerned with thc systematic development of the software. a)
Software Engineering b)
Software testing c)
System engineering d)
Waterfall model
|
8
A policy, guideline, standard, or regulation that defines or constrains some
aspect of the business. Not a software requirement in itself, but the origin
of several types of software requirements.
a)
constraints b)
business rule c)
business requirement d)
system requirement |
9
A top-level requirement for a product that contains multiple subsystems,
which could be all software or software and hardware a)
constraints b)
business rule c)
business requirement d)
system requirement
|
10 A high-level business objective of the
organization that builds a product or of a customer who procures it. a)
constraints b)
business rule c)
business requirement d)
system requirement
|
11 Non-functional requirements are categorized
as a)
Product Requirements, Organizational
Requirements, External Requirements b)
Business requirement, Organizational Requirements c)
System requirement , Organizational Requirements d)
Testing and maintenance |
12
It describes functional and non-functional requirements
so that they are understandable by system users who don't have detailed
technical knowledge. a)
system requirement b)
user requirement c)
domain requirement d)
testing requirement
|
13
An ____ is a statement of what an architect chooses to
make known about an element in order for other entities to interact with it a)
Software requirement document b)
System requirement c)
Interface specification d)
Organisation requirement |
14 The
three types of interface are:
a)
System interface ,Data structures , Data representation b)
Procedural interface , System structures , Data
representation c)
Procedural
interface ,Data structures , System representation d)
Procedural
interface ,Data structures , Data representation |
15
it is based on systematic reuse where systems are
integrated from existing components or COTS System a)
component based software engineering b)
prototype model c)
software testing d)
SDLC |
16
COTS stands for a)
Commercial on the shelf b)
Commercial off the shelf c)
component of the testers d)
commercials tele system |
17 An ____process is a repetitive process
where the development begins by specifying and
implementing just a part of software which can be reviewed in order to find further
requirements a)
iterative b)
interactive c)
maintenance d)
component
|
18
Model in which phases are processed and managed one at a
time is
a)
waterfall model b)
prototype model c)
incremental model d)
RAD
|
19 ____Methods are a
family of development techniques designed to deliver products on time,
on budget and with high quality and customer satisfaction a)
Agile b)
waterfall model c)
prototype model d)
SDLC |
20
XP stands for _____ a)
express programming b)
extreme process c)
extreme programming d)
external programmer |
21 In _____a list of all
the deliverables for the project, named backlog, is identified and is
continuously updated. a)
Agile b)
waterfall model c)
prototype model d)
Scrum
|
22
DSDM stands for a)
dynamic systems development methods b)
direct software development method c)
direct system development methods d)
dynamic SDLC method |
23 ________of
methodologies is people-centric and focuses on enhancing the work of people
involved , a)
Crystal family b)
Scrum c)
RAD d)
DSDM |
24
ASM Stands for a)
aggressive scaling method b)
agile scaling method c)
active software method d)
active system method |
25 _____enable
organizations to adjust smoothly to rapidly-changing requirements, and
produce a product that meets evolving business goals
a)
Crystal family b)
Scrum c)
RAD DSDM |
26
_____ was the first SDLC model
a)
waterfall model b)
prototype model c)
incremental model d)
RAD
|
27 __________are the· systems that include
technical systems but also operational processes and people who use and
interact with the technical system , a)
physiological system b) socio-technical
system c)
RAD d)
Scrum |
28 ___________are
properties of the system as a whole rather than properties that can be
derived from the , properties of components of a system. a) physiological system b) socio-technical
system c) RAD d) emergent properties |
29 _________Is a process
of taking a system out of service after a Useful lifeline I.e. if the system
becomes outdated then removing such system out of a service is called as the
process of ________. a)
System decommissioning b)
system evolution c)
system end d)
software decompose |
30 ______are socio-technical
·systems that have been developed n past often using or obsolete technology a)
RAD b)
Legacy system c)
System decompose d)
Emergent properties |
31
Two types of emergent properties are a)
functional and non functional b)
legacy and system c)
evolution and end d)
decompose and non functional |
32 _____ is a process of
integrating independent sub-systems to accomplish the objective of the system
as a whole a)
Legacy system b)
system integration c)
functional properties d)
Evolution |
33 If the system failure results in
significant economic losses, physical damages or threats
to human life due to the failure in
providing expected service than the
system is said to be _________ a)
Legacy system b)
system integration c)
Critical system d)
Evolution |
34_____Reflects
the extent to which user input errors can be avoided and tolerated. a)
reparability b)
maintainability c)
error tolerance d)
agile |
35 Reflects the extent to which the system can deliver
services while under hostile attack a)
reparability b )
maintainability c ) error tolerance d ) survivability |
36 Development technique
are used that either minimize the
possibility of mistakes or trap mistakes before they result in the
introduction of system faults. a ) fault avoidance b)
fault detection c)
fault tolerance d)
fault availability |
37 Verification and
validation techniques that increase the probability of detecting and
correcting errors before the system goes into service are used. a ) fault avoidance b ) fault detection and removal c ) fault tolerance d ) fault availability |
38
_______ is the process of establishing the services that
the customer require from a system and constraints under which it operates
and developed a)
software development b)
requirement engineering c)
testing d)
software upgradation |
39
_____ is a process of gathering information about the
software which provides communication between the stakeholders of the
software a ) analysis a)
problem solving b) elicitation c)
instability |
40
_______ ensures that the product being developed in
according to the customer requirements . a ) requirement
validation b) srs c) analysis d) problem solving |
41
___________ is the process of managing the changes to
requirements . a ) requirement
validation b) srs c) requirement
management d) problem solving |
42
following are types of system models : a)
data processing model , classification model b)
requirement model c)
analysis model d)
abstract model |
43 The ______graphically represents the
boundary by showing the connections between
the system being developed or the problem being identified, and the outside world. a)
behaviour model b)
context model c)
oop model d)
processing model |
44 The ____ is a description of how the
proposed system will interact with the actors and with
entities which is out of boundary of the system a)
behaviour model b)
context model c)
oop model d) processing model |
45 _____is a graphical representation of a
system, that represents the system processes , input data that originates
from external sources and how these input dat pass through these processes.
a)
Data Flow
diagram b)
context model c)
oop model d)
processing model |
46 DFD stands for
a ) data feed diagram b ) data flow
diagram c ) description flow
diagram d ) data fetch diagram |
47 In DFD process is
represented by
a ) square b ) circle c) arrow d ) open end box |
48 In DFD external entity is represented by a ) square b ) circle c) arrow d ) open end box |
49 In DFD data flow is represented by a ) square b ) circle c) arrow d ) open end box |
50 In DFD data store is represented by a ) square b ) circle c) arrow d ) open end box |
CLASS
: S.Y.Bsc IT -VI SEM
SUB: CORE JAVA
: 50 QUESTIONS
1. Java supports ___________
a.
multiple inheritance b. template
classes c. pointers d. multithreading
2. _____
is a virtual machine that provides runtime environment to execute java
byte code.
a.
Byte Machine b. JVM c. JDK
d. Netbeans
3.
________ data type value range from -32768 to 32767 bits.
a. short b. char
c. byte d. float
4. to find remainder of division we use _______
operator in Java
a. / b.
mod c. % d. modulus
5.
________ operator multiply left operand with the right operand and assign the
result to left operand.
a.
== b.*= c. %=
d. x=
6. ___
loop statement tests the condition before executing the loop body.
a. while b. if-else
c. switch d. do-while
7. ___________
specifier functions is visible to all
a. public b. private
c. protected d. other
8.
________________ function is use to print in Java programming language.
a.
System.in b. System.out c. Println d. cout
9.
_______ file is used as byte code in Java programming language.
a.
.java b. .class d. .byte d.
.jvm
10.
The following editors we use for java programming
a. TextPad
b. JavaFile c. JVM
d. JavaC
11. _________
data type is primitive data type in java.
a. Boolean
b. Class c. Object d. Pointer
12.
The valid float data type value is _______
a.
10.5 b. 10 5 c. 10.5f d.10.5d
13.
All identifier must start with a letter (A to Z) and ______ character in java.
a.
% b.
$ c. + d. var
14.
______ variables are variables that are declare inside a class but outside any
method, constructor or block.
a.
Static b. dynamic c. Instance d. global
15.
Check if two operand are not equal Which operator is used ______
a.
== b. != c. >=
d. <=
16. <<
operator is ________ in Java
a. less
than less than b. left shift c. byte
shift d. right shift
17. _______ operator adds right operand to the
left operand and assign the result to left.
a. ++ b.
=+ c. += d. Plus
18. __________ operator is known as Ternary
operator.
a. And
b. Or c. ? : d.
&&
19.
_______statement terminates loop or switch statement and transfers execution to
the statement immediately retest its condition prior to reitering.
a.
Continue b. Switch c. if
d. break
20. A
________ method is special method that is used to initialize an object in Java.
a.
Class b. Constructor c. Object
d. recursive
21.
The following statement is parameterised constructor.
a. Car
c=new Car(); b. Car c=car(name); c. Car c=new Car(name); d. Car c=new
22.
______ keyword is used as reference to the current object.
a.
this b. class c. object d. extends
23. Method overriding is also referred to as
___________ polymorphism.
a.
compile b. runtime c. class
d. function
24.
________ method is called as Garbage collection in java.
a.
try b. catch c. finalize d. destroy
25.____________
is an instance of the class or a variables of a user defined data type class.
a.
Class b. Object c. Inheritance d. Multithreading
26.
________ operator is used to access the method of class.
a. , (comma)
b. + (plus) c. &(and)
d. .(dot)
27.
The mechanism of deriving new class from old one is called ________
a.
Class b. Object c. Inheritance d. Multithreading
28. ___________ inheritance (derived from derived
classes)
a.
Single b. Multiple c. Multilevel d. Hierarchical
29.
__________ defines only abstract method and final fields.
a.
Class b. object c. Interface d. Package
30.
Interface can only use ______ access specifier.
a. Public
b. Private c. Protected d. Final
31.
________can be defined as a grouping of related types (classes, interfaces,
enumerations and annotations) providing access protection and name space
management.
a.
Class b. object c. Interface d. Package
32. _________ header files bundles the
fundamental classes.
a. java.lang b. java.io c. java.util d.java.util.scanner
33.
_________ header files bundles classes for input, output functions are bundled
in this package.
a. java.lang b. java.io c. java.util d.java.util.scanner
34. _____is a problem that arises during the
execution of a program.
a.
Class b. Object c. Exception d. Thread
35.
__________ Exception is an exception that is typically a user error or a
problem that cannot be foreseen by the programmer.
a.
Arithmetic b. Checked c. Runtime
d. Errors
36.
_________ Exception is an exception that occurs that probably could have been
avoided by programmer.
a.
Arithmetic b. Checked c. Runtime
d. Errors
37.
__________ Exception used for illegal arguments used to invoke a method.
a.
illegal Arithmetic b. illegal
Argument c. illegal monitor
State d. illegal thread
38. ____________ exception Java unchecked Runtime
Exception.
a. Arithmetic
b. Class not found c. illegal Access d. Instantiation
39.
____________ exception Java checked Exception.
a. Arithmetic
b. Class not found c. Array out of Bound d. Security
40. In
Java, Strings are class object and implemented using two classes String classes
and ______
a.
Array b. Class
c. String buffer d. String memory
41.
________ statement used to convert the string to Str1 all lowercase.
a. str2
= str1.toLowerCase; b. str2 =
str1.toLower c. str2 = str1.toUpperCase;
d.
str2 = str1.toUpper;
42. The ___________ method given the length of
the string.
a.
trim() b. size() c. length() d. array()
43. _______ method creates a String object of
the parameter p.
a.
Stringof() b. ValueOf() c. length() d. int()
44.
_________ is the feature that allows the computer to run two or more programs
concurrently.
a.
Thread based b. Process based c. Object based d. Class based
45.
____ that means a single program can perform two or more task simultaneously.
a. Thread
based b. Process based c. Object based d. Class based
46.
When any kind of thread is newly created, it enters into new states is known as
______
a.
Ready State b. Running state c. New born State d. Block state
47.
The following method invoked while entering blocked state.
a.
start() b. ready() c. sleep() d. stop()
48.
________ method is used to restart the Thread execution which is paused by
suspend() method.
a.
isAlive() b. destroy() c. resume() d. sleep()
49.
___________ method is used to kill the thread.
a.
isAlive() b. destroy() c. resume() d. sleep()
50.
This is final state of the thread life cycle.
a. New Born State b. Dead
State c. Ready State d. Blocked State
Comments
Post a Comment