SYBSC IT - SEM IV - MCQ

 

MCQ 

 Multiple Choice Questions

 

SAMPLE

 MCQ

 

AS PER UNIVERSITY OF MUMBAI SYLLABUS

 

 

Will be helpful to regular students of Mumbai university colleges who are going to give the online examinations of SEM II, SEM  IV and SEM V class of students.

If it is helpful to you so also share it among your friends so that they will be also benefited from it.

 

ANSWERS ARE HIGHLIGHTED IN BOLD



CLASS: S.Y.B.SCIT-IV SEM REGULAR

 

SUB :COMPUTER GRAPHICS

 

MCQ (50 QUESTIONS)

 

1) GUI stands for -

a.    Graphics uniform interaction   b. Graphical user interaction

b.    Graphical user interface     d. Graphics uniform interface

2) Graphics can not be -

a.            Simulation     b. Drawing        c.Movies, photographs    d.Static

3) CAD stands for -

a.            Computer art design                    b.Computer-aided design

b.             Car art design                             d.Car-aided design

4) following which one is not components of Interactive computer graphics are -

a.            A monitor       b. Display controller   c. Frame buffer d.scanner

5) A user can make any change in the image using -

a.Interactive computer graphics       b.  Non-Interactive computer graphics

c. drawing                                                    d. position

6) What is a pixel mask?

a.            a string containing only 0's    b. a string containing only 1's

c.            a string containing two 0's     d.a string containing both 1's and 0's

7) The higher number of pixels gives us a ____ image -

a.            Better         b.Worst         c.  Smaller        d.Maximum

8) Which one of the following is the primarily used output device?

a)Video monitor    b) Scanner    c.Speaker   d.Printer

9) Which one of the following terms is used for the area of the computer captured by an application?

a.            Display        b. Window     c. Viewport       d.  surface plane

10) Aspect Ratio can be defined as -

a.            The ratio of the vertical points to horizontal points

b.            The ratio of the vertical points pixels  to slanting points  

c.            The ratio of the horizontal points to vertical points Of pixels

d.            The ratio of the horizontal points to vertical points to slanting

11) Which of the following is not the pattern of line?

a.            Dotted line     b.Dashed line  c. Dark line  d. Plane line

12) DDA stands for - 

a.            Direct differential analyzer   b.Data differential analyzer

c.        Direct difference analyzer  d. Digital differential analyzer

13) VGA stands for____

a.            Visual Graph Array            b.   Visional Graphic Array

c.        Video Graphic Array      d.Video  Graph Array

14) The process of positioning an object along a straight line path from one coordinate point to another is called –

a. Translation  b.Reflection   c. Shearing  d. Transformation

 

15) Which of the following equation is used in 2D translation to move a point(x,y) to the new point (x',y')?

a.            x' = x + ty and y' = y + tx         b. x' = x - tx and y' = y - ty

b.            x' = x + tx and y' = y + ty         d.   x' = x + tx and y' = y - ty

16) The process of repositioning an object along a circular path is called -

a. Translation   b.  Rotation  c. Scaling   d.Shredding

17) Which of the following is must be specified to generate a rotation?

a.  Rotational distance  b. Rotation angle  c. Co-ordinates d. Line on X axis

18) A positive value of the rotation angle -

a.            rotates an object in the clockwise direction

b.            rotates an object in the counter-clockwise direction

c.            rotates an object in the reverse clockwise direction

d.            rotates an object in the anticlockwise direction

19) Which of the following transformation is used for altering the object's size?

a.            Translation   b.  Rotation  c. Scaling   d.Shredding

20) What happens if the values of scaling factors sx and sy less than 1

 (i.e., sx<1 and sy<1)?

a.   No change in the object's size    b.  Reduce the object's size

c. Increase the object's size              d.Changes on Y axis only

21) In which of the following case, the uniform scaling will be produced?

a.            Values of scaling factors sx and sy are unequal.

b.            Values of scaling factors sx and sy are equal.

c.            Values of shredding  factors sx and sy are unequal

d.            Values of scaling factors x and y are unequal

22) The Cohen-Sutherland algorithm divides the two-dimensional space in how many regions?

a.   4                                       b. 8                             c. 9                               d. 23

23) The 4-bit code of the bottom-region among the nine regions divided using the Cohen-Sutherland algorithm?

a.  0000                     b. 0010            c. 0110           d. 0101

24) According to the Cohen-Sutherland algorithm, where the line lies, if the 4-bit code of both ends is 0000, and also the logical OR gives 0000?

a.            Half outside half inside                   b. Completely inside

b.            Completely outside                          c. Half inside

25) Which one of the following is the most commonly used and basic input device?

a.  Joystick   b. Printer        c. Scanner      d. Keyboard

26) Which of the following device is used for the 3D positioning of an object?

a.            Trackball       b.  Mouse      c. Spaceball             d. Scanner

27) Which is not the input device?

a.  Impact printers     b. Trackball       c.    Mouse    d. Keyboard

28) Which of the following is an example of the impact device?

a.  Laser printer   b.  Inkjet printer  c.  Line printer  d. Plotted printer

29) Which of the following allows us to select the screen positions with the touch of a finger?

 a. Mouse                  b. Trackball                  c. Touch panel                 d. keyboard

30) Which is a common device for painting or selecting the object's co-ordinate positions?

a.            Digitizer           b. Touch panel       c. Image scanner       d. Keyboard

31) Grayscale is used for -

 a.  Random scan display                                         b.   Monitors with color capability

c.  Monitors with no color capability      d.   Zooming

32) Clipping in computer graphics is primarily used for -

 a.  zooming    b. copying    c. removing objects and lines   d. for clipping

33) Random scan systems are used for -

a.  Color drawing application   b. Pixel drawing application

c.  Line drawing application  d.  Random scan display

34) How many phosphor color dots at each pixel position in a shadow mask CRT?

a. 1                             b.  7                 c. 2                 d. 3

35) Shadow mask method is used in -

a.  Raster scan system                 b. Random scan system 

c. Rotation  scan system                d. Arbitrary scan system

36) In which of the following CRT methods, there is an occurrence of convergence problem?

a.            Shadow mask method   b.  Beam penetration

c.        Light penetration              d. Dark mask method

37) Which of the following uses the Beam penetration method?

a.  Raster scan system                   b. Random scan system 

c. Rotation  scan system                d. Arbitrary scan system

38) Plasma panel is a type of -

a. Emissive display   b. Non-Emissive display  c. Printer  d. scanner

39) Which of the following algorithm is used to fill the interior of a polygon?

a.  Boundary fill algorithm   b. Scan line polygon fill algorithm

c.  Flood fill algorithm       d.  Liang basky algorithm

40) Which of the algorithm is used to color a pixel if it is not colored and leaves it if it is already filled?

a.  Boundary fill algorithm   b. Scan line polygon fill algorithm

c.  Flood fill algorithm       d.  Liang basky algorithm

41) In ____ geometry lines are generally parallel.

 a.  Perspective geometry                b.  Trimetric geometry 

c.  Affine geometry                                     d. Concave geometry

42) Which of the following are the 2d color models?

a. RGB and CMK                               b. RGB and CMG 

c. RGB and CMYK                          d. CMG and CMYK 

43) RGB color model is used for -

a.  Painting  b. Sketching  c. Printing  d.Computer display

44) Following which one is stage in 3D viewing

 a. clip against view volume                        b. modellig translation

 c. project onto projection plane    d.viewport

45)  A _____ is used for buildings seen from above and below.

 a. One point perspective               b.Three point perspective

c.  Two point perspective                   d.Four point perspective

 

 

46) A _____ is used for buildings seen from front

 a. One point perspective                        b.Three point perspective

c.  Two point perspective                   d.Four point perspective

47) The phase of determining the appropriate pixels for representing images or graphics object is called as -

 a. Translation   b. Transformation    c. Rasterization     d.  Scaling

48) The process of displaying 3D into a 2D display unit is called as -

a.  Resolution  b.  Projection  c. Rasterization  d. Transformation

49) The video device with reduced volume, power consumption and weight is -

a. CRT  b.  Flat-panel display  c. Portable display  d. LED display

50) Plasma panel is also called as -

a. Non-emissive display                   b. Liquid crystal display 

c. Gas discharge display          d. emissive display

 


CLASS: S.Y.B.SCIT-IV SEM REGULAR

 

SUB : EMBEDDED SYSTEM

 

MCQ (50 QUESTIONS)

 

1)    An embedded system is _____ system designed to perform a specific function and combination of hardware and software

a)    electro-digital            b) electro-mechanical

c) digital-mechanical                  d) internet based

2)    Wahsing Machine,Airconditioner are examples of ___

a)    Embedded system                         b) general purpose system

c) computer system                               d) microprocessor

3)    Smart phones, mobile internet devices are ______ generation devices

a)    First                b) second                 c) third            d) fourth

4)    Industrial machines  are_______ scale

a)    Medium         b) large          c) small          d) complex

5)    An electronic toy is _____ scale

a)    Medium          b) large          c) small         d) complex

6)    Which of the following is not true about embedded systems

a)      Built around specialized hardware    

b) Always contain an operating system  

c) Execution behavior may be deterministic

  d) Useful for Real time system

7)    ____ is silicon chip representing a critical processing for performing arithmetic as well as logical opearation

a)    Microcontroller b) Microprocessor c) Address bus d) Data bus

8)    ____ is highly integrated chip contains CPU scratchpad RAM, special and general purpose register  arrays on chip 

a)    Microcontroller b) Microprocessor c) Adress bus d) Data bus

9)    CISC stands for

a)    Complex Instruction Set Computer

 b) Command  Instruction Set Computer

c) Communication Instruction Set Computer

 d)  common Instruction Set Computer

10) _____it posses lesser number  of instruction

a)    RISC              b) CISC          c) VLSI          d) DISC

11) ____is a microchip design to perform a specific and unique application

a)    RISC              b) CISC          c) VLSI          d) ASIC

12) ASIC stands for ___

a)    Application Specific Integrated circuits

b)    Application Specific Internet circuits

c)    Application Specific Integrated communication

d)    Accesses Specific Integrated circuits

13) PLD is ______

a)    Processed Logic Device

b)   Programmable Logic Device

c)    Pro Logic Device

d)    Programmable Logic Disk

 

 

14) ______ is an electronic component and it is used to construct digital circuits which are reconfigurable.

a) Processed Logic Device              b) Programmable Logic Device

c) Pro Logic Device                         d) Programmable Logic Disk

15) ___ is used for taking input

a)    Actuators       b) Sensors   c) radiations                         d) Insulators

16) ___ is transducer that may be either mechanical or electrical which converts signals to corresponding physical

a)    Actuators     b) Sensors    c) radiations             d) Insulators

17) _____ are communication interface

a)    Onboard communication and External communication

b)    Inbound  communication and External communication

c)    Onboard communication and outbound communication

d)    Inbound communication and outbound communication

18) ___ bus is synchronous  bidirectional half duplex two wire serial interface bus

a)    Inter Integrated Current

b)    Internet Integrated Circuit

c)    Inter Integrated Circuit

d)     Inter Integration Circuit

19) SPI stands for _____

a)    Simple Peripheral Interface

b)   Serial Peripheral Interface

c)    Simplex Peripheral Interface

d)    Simple Parrallel Interface 

20) _____ is flash memory chip that stores specialized software running in a chip in an embedded device to control its functions

a)    Embedded hardware           b) Embedded software

b)    )Embedded firmware        d) hardware

 

 

21) ____ is used to restart system.

a)Oscillator unit                             b) Reset circuit

c)watchdog timer                          d) brownout protection circuit

22) _____ causes unexpected behavior in system with digital control circuit

a)Oscillator unit                          b) Reset circuit

 c)watchdog timer                      d) brownout protection circuit

23) _____ is an electronic circuit that produces a periodic, oscillating electronic signal often a sine wave or square wave.

a)Oscillator unit                          b) Reset circuit

c)watchdog timer                          d) brownout protection circuit

24) _____ is used as general purpose timer in some cases

a)Oscillator unit                             b) Reset circuit

c)watchdog timer                                    d) brownout protection circuit

25) following which one is not consider as quality of embedded system

a) Reliability        b) Evolvability          c) portability              d) failure

26) In washing machine _____ is used to circulate the water through the washing machine

a) tub                  b) water pump         c) timer           d)drain pipe

27) _______performs cleaning operations of cloths in  washing machine

a) tub                 b) agitator               c) timer           d)drain pipe

28) CAN stands for in embedded system is ______

a) Controller Area Network              b) Communication Area Network

c) Communication Area internet        d) Complex Area Network

29) ______ is single master multiple slave communication interface

a)CAN                       b)LIN             c)MOTS                     d)LAN

           30) _______ map is also called address book of computer.

             a) I/O Map   b) Interrupt map        c) Memory Map        d) Timer Map

            31) It is read and write memory

             a) RAM                    b) ROM                     c)EPROM                  d) EEPROM

           32) following which is not type of ROM

            a) Masked ROM     b) PROM       c) EPROM                 d) Masked RAM

          33)____ is combination of RAM and ROM

            a) EPROM               b)PROM                    c) EEPROM              d) Hybrid

34) following which is not type of hybrid memory

a) EEPROM              b) NVRAM                 c) Flash          d) EPROM

            35) ______ is testing to confirm that each storage location in a memory

                 devices is working.

            a) Memory testing   b) I/O testing   c) Interrupt Testing   d) Peripheral testing

          36)_____ is error detecting code

         a) Cyclic Redundancy Check       b) Computer Redundancy Code

         c) Computer Redundancy Check d)  Cyclic Redundancy Code

      37) In computing ______ is component program that operates or control a   

        particular type of device i.e attached to computer

        a) Device driver  b)  control and status register c)watchdog timer d) Reset circuit

      38) following which is not consider as  peripherals in embedded system

        a) control Register  b) status register  c) watch dog timer  d) CRC

      39) CRC stands for______

         a) Cyclic Redundancy Check      b) Computer Redundancy Code

        c) Computer Redundancy Check    d)  Cyclic Redundancy Code

       40) ___ bus is synchronous  bidirectional full duplex two wire serial interface bus

         a) SPI bus  b)  I2C bus  c)  Inter Integrated Circuit   d) Inter Integration Circuit

       41) Which of the following datatypeis not used in embedded C programming

            Language

a)    Double   b) Char c) unsigned char d) unsigned int

42)  ______ is true bidirectional port

a) Port 1  b) Port 0  c) Port 2  d) Port 4

       43) _____ is used for higher external  address byte or a normal input/output port

               a) Port 1  b) Port 0  c) Port 2  d) Port 4

       44)____ is the processes in which processor asks question repeatedly at regular

              intervals to check  the device has completed the given task

a)    Interrupting  b) Controlling c) Polling d) Processing

          45) MOTS stands for _____

             a) Media Oriented System Transport System

             b) Media Operating System Transport System

            c) Media Oriented System Translation  System

            d)  Medium Oriented System Transport System

 

CLASS: S.Y.B.SCIT-IV SEM REGULAR

 

SUB : SOFTWARE ENGINEERING

 

MCQ (50 QUESTIONS)


1 Software is divided into two main categories

a)    System Software  ,Application software

b)    Generic Products, System Software 

c)    System Software  ,Generic Products

d)    Generic and customized product

2 SDLC Stands for

a)    SYSTEM DEVELOPMENT LIFE CYCLE

b)   SOFTWARE DEVELOPMENT LIFE CYCLE

c)    SOFTWARE DATA LIFE CYCLE

d)    SYSTEMATIC DEVELOPMENT LIFE CYCLE

3 The last stage of SDLC is

a)    System testing

b)    Implementation & Evaluation

c)    Maintenance

d)    Feasibility Study

4 The first stage of SDLC is

a)    System testing

b)    Implementation & Evaluation

c)    Maintenance

d)   Preliminary Investigation (Problem Identification)

 

5  A sequential linear model.

a)    waterfall model

b)    prototype model

c)    incremental model

d)    RAD

6 A Iterative linear framework

a)    waterfall model

b)    prototype model

c)    incremental model

d)    RAD

 

7 _____is an engineering discipline which Is concerned with  thc systematic development of the software.

a)    Software Engineering

b)    Software testing

c)    System engineering

d)    Waterfall model

 

 

8 A policy, guideline, standard, or regulation that defines or constrains some aspect of the business. Not a software requirement in itself, but the origin of several types of software requirements.

 

a)    constraints

b)   business rule

c)    business requirement

d)    system requirement

9 A top-level requirement for a product that contains multiple subsystems, which could be all software or software and hardware

a)    constraints

b)    business rule

c)    business requirement

d)   system requirement

 

10   A high-level business objective of the organization that builds a product or of a customer who procures it.

a)    constraints

b)    business rule

c)    business requirement

d)    system requirement

 

11  Non-functional requirements are categorized as

a)    Product Requirements, Organizational Requirements, External Requirements

b)    Business requirement, Organizational Requirements

c)    System requirement , Organizational Requirements

d)    Testing and maintenance

12    It describes functional and non-functional requirements so that they are understandable by system users who don't have detailed technical knowledge.

a)    system requirement

b)   user requirement

c)    domain requirement

d)    testing requirement

 

13    An ____ is a statement of what an architect chooses to make known about an element in order for other entities to interact with it

a)    Software requirement document

b)    System requirement

c)    Interface specification

d)    Organisation requirement

14   The three types of interface are:

 

a)    System interface ,Data structures , Data representation

b)    Procedural interface , System structures , Data representation

c)     Procedural interface ,Data structures , System representation

d)    Procedural interface ,Data structures , Data representation

15  it is based on systematic reuse where systems are integrated from existing components or COTS System

a)    component based software engineering

b)    prototype model

c)    software testing

d)    SDLC

16  COTS stands for

a)    Commercial on the shelf

b)   Commercial off the shelf

c)    component of the testers

d)    commercials tele system

17   An ____process is a repetitive process where the development begins by

specifying and implementing just a part of software which can be reviewed in order to find further requirements

a)    iterative

b)    interactive

c)    maintenance

d)    component

 

18               Model in which phases are processed and managed one at a time is

 

a)    waterfall model

b)     prototype model

c)     incremental model

d)     RAD

 

19  ____Methods are a family of development techniques designed to deliver products on time, on budget and with high quality and customer satisfaction

a)    Agile

b)    waterfall model

c)    prototype model

d)    SDLC

20  XP stands for  _____

a)    express programming

b)    extreme process

c)    extreme programming

d)    external programmer

21  In _____a list of all the deliverables for the project, named backlog, is identified and is continuously  updated.

a)    Agile

b)    waterfall model

c)    prototype model

d)    Scrum

 

22  DSDM stands for

a)    dynamic systems development methods

b)    direct software development method

c)    direct system development methods

d)    dynamic SDLC method

23  ________of methodologies is people-centric and focuses on enhancing the work of people involved ,

a)    Crystal family

b)    Scrum

c)    RAD

d)    DSDM

24  ASM Stands for

a)    aggressive scaling method

b)   agile scaling method

c)    active software method

d)    active system method

25  _____enable organizations to adjust smoothly to rapidly-changing requirements, and produce a product that meets evolving business goals

 

a)    Crystal family

b)   Scrum

c)    RAD

DSDM

26  _____ was the first SDLC model

 

a)    waterfall model

b)     prototype model

c)     incremental model

d)     RAD

 

27  __________are the· systems that include technical systems but also operational processes and people who use and interact with the technical system ,

a)      physiological system

b)     socio-technical system

c)      RAD

d)     Scrum

28  ___________are properties of the system as a whole rather than properties that can be derived from the , properties of components of a system.

a)      physiological system

b)      socio-technical system

c)      RAD

d)     emergent properties

29  _________Is a process of taking a system out of service after a Useful lifeline I.e. if the system becomes outdated then removing such system out of a service is called as the process of ________.

a)    System decommissioning

b)    system evolution

c)    system end

d)    software decompose

30  ______are socio-technical ·systems that have been developed n past often using or obsolete technology

a)    RAD

b)   Legacy system

c)    System decompose

d)    Emergent properties

31  Two types of emergent properties are

a)    functional and non functional

b)    legacy and system

c)    evolution and end

d)    decompose and non functional

32  _____ is a process of integrating independent sub-systems to accomplish the objective of the system as a whole

a)    Legacy system

b)   system integration

c)    functional properties

d)    Evolution

33  If the system failure results in significant economic losses, physical damages or

threats to human life due  to the failure in providing expected service  than the system is said to be _________

a)    Legacy system

b)    system integration

c)    Critical system

d)    Evolution

34_____Reflects the extent to which user input errors can be avoided and tolerated.

a)    reparability

b)    maintainability

c)    error tolerance

d)    agile

35  Reflects the  extent to which the system can deliver services while under hostile attack

a)      reparability

b ) maintainability

c ) error tolerance

d ) survivability

36  Development technique are used that either minimize the  possibility of mistakes or trap mistakes before they result in the introduction of system faults.

a ) fault avoidance

b)    fault detection

c)    fault tolerance

d)    fault availability

37  Verification and validation techniques that increase the probability of detecting and correcting errors before the system goes into service are used.

a ) fault avoidance

b ) fault detection and removal

c ) fault tolerance

d ) fault availability

38  _______ is the process of establishing the services that the customer require from a system and constraints under which it operates and developed

a)    software development

b)   requirement engineering

c)    testing

d)    software upgradation

39  _____ is a process of gathering information about the software which provides communication between the stakeholders of the software

a ) analysis

a)    problem solving

b)    elicitation

c)    instability

40  _______ ensures that the product being developed in according to the customer requirements .

a ) requirement validation

b) srs

c) analysis

d) problem solving

41  ___________ is the process of managing the changes to requirements  .

a ) requirement validation

b) srs

c) requirement management

d) problem solving

42  following are types of system models :

a)    data processing model , classification model

b)    requirement model

c)    analysis model

d)    abstract model

43   The ______graphically represents the boundary by showing the connections

between the system being developed or the problem being identified, and the outside

world.

a)    behaviour model

b)    context model

c)    oop model

d)    processing model

44   The ____ is a description of how the proposed system will interact with

the actors and with entities which is out of boundary of the system

a)    behaviour model

b)    context model

c)    oop model

d) processing model

45   _____is a graphical representation of a system, that represents the system processes , input data that originates from external sources and how these input dat pass through these processes.

 

a)     Data Flow diagram

b)     context model

c)    oop model

d)     processing model

46  DFD stands for

 

a ) data feed diagram

b ) data flow diagram

c ) description flow diagram

d ) data  fetch diagram

47 In DFD process is represented by

 

a ) square

b ) circle

c)  arrow

d ) open end box

48 In DFD  external entity is represented by

a ) square

b ) circle

c)  arrow

d ) open end box

49  In DFD data flow is represented by

a ) square

b ) circle

c)  arrow

d ) open end box

50  In DFD data store is represented by

a ) square

b ) circle

c)  arrow

d ) open end box


CLASS : S.Y.Bsc IT -VI SEM

 

SUB: CORE JAVA

 

 : 50 QUESTIONS

 

1.  Java supports ___________

a. multiple inheritance  b. template classes   c. pointers   d. multithreading

2.  _____  is a virtual machine that provides runtime environment to execute java byte code.

a. Byte Machine    b. JVM   c. JDK   d. Netbeans

3. ________ data type value range from -32768 to 32767 bits.

a. short   b. char  c. byte   d. float

4.  to find remainder of division we use _______ operator in Java

a.  /   b. mod   c. %    d. modulus

5. ________ operator multiply left operand with the right operand and assign the result to left operand.

a. ==     b.*=   c. %=   d. x=

6. ___ loop statement tests the condition before executing the loop body.

a. while    b. if-else   c. switch   d. do-while

7. ___________ specifier functions is visible to all

a. public   b. private  c. protected   d. other

8. ________________ function is use to print in Java programming language.

a. System.in   b. System.out      c. Println   d. cout

9. _______ file is used as byte code in Java programming language.

a. .java   b. .class    d. .byte             d.  .jvm

10. The following editors we use for java programming

a.  TextPad   b. JavaFile       c. JVM    d. JavaC

11. _________ data type is primitive data type in java.

a. Boolean b. Class  c. Object  d. Pointer

12. The valid float data type value is _______

a. 10.5   b. 10 5   c. 10.5f    d.10.5d

13. All identifier must start with a letter (A to Z) and ______ character in java.

a. %   b.  $   c. +    d. var

14. ______ variables are variables that are declare inside a class but outside any method, constructor or block.

a. Static     b. dynamic   c. Instance   d. global

15. Check if two operand are not equal Which operator is used ______

a. ==   b. !=   c. >=   d. <=

16.  <<  operator is ________ in Java

a. less than less than  b. left shift   c. byte  shift   d. right shift

17.  _______ operator adds right operand to the left operand and assign the result to left.

a.  ++   b. =+    c. +=    d. Plus

18.  __________ operator is known as Ternary operator.

a.  And    b. Or   c. ? :   d.  &&

19. _______statement terminates loop or switch statement and transfers execution to the statement immediately retest its condition prior to reitering.

a. Continue   b. Switch    c. if    d. break

20. A ________ method is special method that is used to initialize an object in Java.

a. Class   b.  Constructor   c. Object   d. recursive

21. The following statement is parameterised constructor.

a. Car c=new Car();     b.  Car c=car(name);    c. Car c=new Car(name);   d. Car c=new

22. ______ keyword is used as reference to the current object.

a. this       b. class   c. object      d. extends

23.  Method overriding is also referred to as ___________ polymorphism.

a. compile   b. runtime   c. class    d. function

24. ________ method is called as Garbage collection in java.

a. try    b. catch   c. finalize    d. destroy

25.____________ is an instance of the class or a variables of a user defined data type class.

a. Class    b. Object   c. Inheritance  d. Multithreading

26. ________ operator is used to access the method of class.

a.  , (comma)     b. + (plus)  c.  &(and)    d.  .(dot)

27. The mechanism of deriving new class from old one is called ________

a. Class    b. Object   c. Inheritance  d. Multithreading

28.  ___________ inheritance (derived from derived classes)

a. Single  b. Multiple  c. Multilevel   d. Hierarchical

29. __________ defines only abstract method and final fields.

a. Class    b. object c. Interface  d. Package

30. Interface can only use ______ access specifier.

a. Public   b. Private   c. Protected   d. Final

31. ________can be defined as a grouping of related types (classes, interfaces, enumerations and annotations) providing access protection and name space management.

a. Class    b. object c. Interface  d. Package

32.  _________ header files bundles the fundamental classes.

a. java.lang     b. java.io   c. java.util   d.java.util.scanner

33. _________ header files bundles classes for input, output functions are bundled in this package.

a. java.lang     b. java.io   c. java.util   d.java.util.scanner

34.  _____is a problem that arises during the execution of a program.

a. Class   b. Object    c. Exception    d. Thread

35. __________ Exception is an exception that is typically a user error or a problem that cannot be foreseen by the programmer.

a. Arithmetic    b. Checked    c. Runtime   d. Errors

36. _________ Exception is an exception that occurs that probably could have been avoided by programmer.

a. Arithmetic    b. Checked    c. Runtime   d. Errors

37. __________ Exception used for illegal arguments used to invoke a method.

a. illegal Arithmetic     b. illegal Argument   c. illegal monitor State  d. illegal thread

38.  ____________ exception Java unchecked Runtime Exception.

a. Arithmetic    b. Class not found      c. illegal Access    d. Instantiation

39. ____________ exception Java checked Exception.

a. Arithmetic    b. Class not found      c. Array out of Bound   d. Security

40. In Java, Strings are class object and implemented using two classes String classes and ______

a. Array     b.  Class   c.    String buffer     d. String memory

41. ________ statement used to convert the string to Str1 all lowercase.

a. str2 = str1.toLowerCase;   b. str2 = str1.toLower     c. str2 = str1.toUpperCase;     

d. str2 = str1.toUpper;

 42. The ___________ method given the length of the string.

a. trim()        b. size()        c. length()            d. array()

43.   _______ method creates a String object of the parameter p.

a. Stringof()   b. ValueOf()    c. length()   d. int()

44. _________ is the feature that allows the computer to run two or more programs concurrently.

a. Thread based         b. Process based        c. Object based         d. Class based

45. ____ that means a single program can perform two or more task simultaneously.

a. Thread based         b. Process based        c. Object based         d. Class based

46. When any kind of thread is newly created, it enters into new states is known as ______

a. Ready State   b. Running state   c. New born State  d. Block state

47. The following method invoked while entering blocked state.

a. start()   b. ready()   c. sleep()   d. stop()

48. ________ method is used to restart the Thread execution which is paused by suspend() method.

a. isAlive()   b. destroy()   c. resume()   d. sleep()

49. ___________ method is used to kill the thread.

a. isAlive()   b. destroy()   c. resume()   d. sleep()

50. This is final state of the thread life cycle.

a.  New Born State  b.  Dead State  c. Ready State   d. Blocked State

   


Comments

Popular posts from this blog

SYBMS - SEM IV - MCQ

SYBCOM - SEM III - MCQ

MU circular on current year 2020-21 examinations and practicals