11. Recursive functions are executed in a
(A) First in first out-order
(B) Last in first out-order
(C) Parallel fashion
(D) Load balancing
Answer: B
12. What would be the output of the following program, if run from the
command line as “myprog 1 2 3”?
main (int argc, char * argv[ ])
{ int i ;
i = argv[1] + argv[2] + argv[3] ;
printf (“% d”, i) ;
}
(A) 123
(B) 6
(C) Error
(D) “123”
Answer: C
13. A …………….. is a special method used to initialize the instance variable
of a class.
(A) Member function
(B) Destructor
(C) Constructor
(D) Structure
Answer: C
14. Encapsulation is
(A) Dynamic binding
(B) A mechanism to associate the code and data.
(C) Data abstraction
(D) Creating new class
Answer: B
15. Which of the statements are true?
I. Function overloading is done at compile time.
II. Protected members are accessible to the member of
derived class.
III. A derived class inherits constructors and
destructors.
IV. A friend function can be called like a normal
function.
V. Nested class is a derived class.
(A) I, II, III
(B) II, III, V
(C) III, IV, V
(D) I, II, IV
Answer: D
16. The E-R model is expressed in term of
I. Entities
II. The relationship among entities.
III. The attributes of the entities.
IV. Functional relationship.
(A) I, II
(B) I, II, IV
(C) II, II, IV
(D) I, II, III
Answer: D
17. Specialization is …………… process.
(A) top-down
(B) bottom up
(C) both (A) and (B)
(D) none of these
Answer: A
18. Match the following :
List-I
(1) Determinants
(2) Candidate key
(3) Non-redundancy
(4) Functional dependency
List-I
(a) No attribute can be added
(b) Uniquely identified a row
(c) A constraint between two attribute
(d) Group of attributes on the left hand side of arrow
of function dependency.
(A) 1 – d, 2 – b, 3 – a, 4 – c
(B) 2 – d, 3 – a, 1 – b, 4 – c
(C) 4 – a, 3 – b, 2 – c, 1 – d
(D) 3 – a, 4 – b, 1 – c, 2 – d
Answer: A
19. A function that has no partial functional dependencies is in …………….
form.
(A) 3 NF
(B) 2 NF
(C) 4 NF
(D) BCNF
Answer: B
20. Which of the following statement is wrong?
I. 2-phase locking protocol suffer from dead lock.
II. Time stamp protocol suffer from more aborts.
III. A block hole in a DFD is a data store with only
inbound flows.
IV. Multivalued dependency among attribute is checked
at 3 NF level.
V. An entity-relationship diagram is a tool to
represent event model.
(A) I, II, II
(B) II, III, IV
(C) III, IV, V
(D) II, IV, V
Answer: C
0 Comments