11.
The storage class specification in 'C'
programming language is :
(A) Automatic
(B) Static
(C) External
(D) All of
these
Answer: D
12. After
function has returned, the values stored in its local variables are copied into
variables in the main function with the same name.
(A) True
(B) False
(C) Can't
say
(D) Error
Answer: A
13. If
the variable of double type is converted into float, then :
(A) Truncation
takes place
(B) The
lower order bits are dropped
(C) Rounding
takes place
(D) None of
the above
Answer: C
14. The
programming language which has the capability to produce new data types, it is
said to be :
(A) Extensible
(B) Encapsulated
(C) Reprehensible
(D) None of
these
Answer: A
15. A
virtual function allows you to :
(A) Create a
function that have no body.
(B) Create
an array of type pointer to base calls that can hold pointers to derived class
(C) Group
objects of different classes so, they can all be accessed by the same function
code.
(D) Use the
same function call to execute member function of objects from different
classes.
Answer: D
16. To
perform look up operation using form, you have to :
(A) Search each
form sequentially, until get the required.
(B) Type the
key in entry line, and correct form is displayed.
(C) Enter
the search value into form.
(D) Put the
key and correct form is displayed.
Answer: *
17. Consider
the case that, a primary key is combined with foreign key, it will create :
(A) Many to
many relationship between the table that connects them.
(B) Parent
child relationship between the table that connects them.
(C) Network
model between the tables.
(D) Hierarchical
model between the tables.
Answer: B
18. One
of the following situations represents true network structure, which :
(A) allows
many to many relationship
(B)
indicates physical representation of data
(C) is
conceptually simple
(D) is
dominant database
Answer: A
19. The
third normal is adequate if the relation is having :
(A) non-composite
and non-overlapped candidate keys
(B) non-composite
candidate keys
(C) non-overlapped
candidate keys
(D) multiple
candidate keys
Answer: D
20. An
audit trial can be used for :
(A) recorded
history of operations performed on file
(B) making
back up copies
(C) making
record copies
(D) restoring
lost information
Answer: A
0 Comments