Aspire Quiz



Comments



Description

1. When and where was TCS founded? A. 1954, Mumbai B. 1968, Jamshedpur C. 1968, Mumbai D.1954, Coimbatore Answer Key: C 2. To how many industries does TCS provides its consultancy? A. 20 B. 12 C. 10 D. 15 Answer Key: B 3.What are the values of TCS? A. Leading Change, Integrity, Respect for individual, Excellence, Learning and Sharing B. Leading innovation, Integrity, Respect for the colleagues, Excellence, Mentoring and Sharing C. Leading Change, Integrity, Responsibility, Excellence, Learning and propelling D. Leading innovation, Integrity, Courteous, Certainty, Learning and Sharing Answer Key: A 4.What is the name of the first research center established by TCS? A. Tata Institute of Social Sciences (TISS) B. Tata Institute of Fundamental Research (TIFR) C. Tata Research Development and Design Center (TRDDC) D. Indian Institute of Science (IISc) Answer Key: C 5.What was TCS‘s first onsite project? A. Automating Johannesburg Stock Exchange B. Burroughs (the first business computer manufacturer) C. Developing electronic depository, SECOM for SIS SegaInterSettle, Switzerland D. Institutional Group and Information Company (IGIC) Answer Key: D 6.TCS is ….. largest IT firm in the world? A. 4th B. 6th C. 2nd D. 8th Answer Key: D 7.Who is TCS first General Manager? A. Ratan Tata B. JRD Tata C. S. Ramadorai D. F.C Kohli Answer Key: D 8.TCS provides six major IT services A. Custom Application Development, Application Management, Migration and Re-engineering, System Integration, Testing, Performance Engineering Global Network Delivery Model C. Global Integrated Delivery Model B.Which model does TCS follow? A. Customer Development. Testing. Business Management. System Integration. Migration and Re-engineering. Performance Engineering C. Application Management.B. World Integrated Delivery Model D. Customer Development. Performance Engineering Answer Key: C 9. Application Management. Business Management. Migration and Re-engineering. World Network Delivery Model Answer Key: B . Migration and Re-engineering. Testing. Testing. Custom Application Development. Application Management. Performance Engineering D. 2004 Answer Key: D Basic Programming Question 1 of 10 10.0 Points What is a variable in a computer program? A. 1999 C. 2006 D.10.Tata Consulting Services goes public in India‘s private sector‘s largest initial public offer in A. A value such as 5 C. you will often want the program to be able to "remember" . An output Answer Key: C Feedback: When you are writing a computer program. An input argument B. The name given to a value D. 2002 B. 0 Points What is a semantic error ? A. A program error that is not so important to take care C. it will run successfully. but it will not do the right thing. Question 2 of 10 10. A program error that gives wrong output B. Question 3 of 10 10. it will do what you told it to do. in the sense that the computer will not generate any error messages. A program error that is difficult to debug Answer Key: A Feedback: If there is a semantic error in your program. You can do this by assigning the important value to a named variable. Specifically.a value.0 Points A variable will last until . A program error that crashes the program D. It will do something else. Variables are categorized by the types of data they store. A. the value of the variable is used in the program B. ― represents A. the word preceding the ― . Hard disc is formatted Answer Key: B Feedback: The lifetime of a variable in the computer memory will be same as the life of the program. A command B.0 Points In a Javascript program. An object C. Computer is switched off D. An action by an object . Question 4 of 10 10. The program completes and exit C. The memory is cleaned as soon as the program stops. 0 Points What do you mean by a portable computer program? A.―Zygot. It can be run on computers with different types of computers Answer Key: D Feedback: Portability is a characteristic attributed to a computer program if it can be used in an operating systems other than the one in which it was created without requiring major rework.move()‖. It can be send from one computer to another computer D. The program can be attached to the port of a computer C. A program name Answer Key: B Feedback: For eg. Porting is the task of doing any work necessary to make the computer program run in the .D. The program is very small B. Here ‗Zygot‘ is the object and ‗move‘ is the action requested on that object Question 5 of 10 10. Compile the program to create an executable D. The most common reason for wanting to transform source code is to create an executable program. Interpret the program line by line C.new environment. Link different programs written in same language together B.0 Points What do we mean by the performance of a program ? . Correct the errors in the program Answer Key: C Feedback: A compiler is a computer program (or set of programs) that transforms source codewritten in a programming language (the source language) into another computer language (the target language. Question 7 of 10 10. often having a binary form known as object code). Question 6 of 10 10.0 Points A compiler will A. Testing the program to identify defects C. The process of removing the identified bugs B. The number of times a program can be run Answer Key: C Feedback: Computer performance is characterized by the amount of useful work accomplished by a computer system compared to the time and resources used.A. The number of arguments that a program can handle B. Fine tuning the program for performance . Question 8 of 10 10.0 Points What is debugging ? A. The speed with which a program runs C. The utilization of resources such as CPU and memory by a program D. 0 Points Data structure enables A. Analysis of the data used in a program D.D. Connecting a program with database Answer Key: B Feedback: Data structures are generally based on the ability of a computer to fetch and store data at any place . Structuring data in a program B. or defects. Storing and organizing data in computer memory for efficient use C. The process of tracking and correcting the bugs in a program Answer Key: D Feedback: Debugging is a methodical process of finding and reducing the number of bugs. in a computer program Question 9 of 10 10. all of the same make and model. A template to create objects D.in its memory.0 Points What is class in object oriented program ? A. Question 10 of 10 10. A collection of objects B. A variable type in a program Answer Key: C Feedback: In the real world. There may be thousands of other bicycles in existence. In object-oriented terms. Each bicycle was built from the same set of blueprints and therefore contains the same components. you'll often find many individual objects all of the same kind. Category /Type of a program C. we say that your bicycle is an instance of the class of objects known as . specified by an address—a bit string that can be itself stored in memory and manipulated by the program. . All of the above D. . C..0 Points Which of the following options list the steps to convert a table to its second normal form? A. Answere of DBMS Question 1 of 10 10. Answer Key: C . Find and remove fields that are related to the only part of the key. Assign the new table with the key i.bicycles. B. part of the whole composite key.e. A class is the blueprint from which individual objects are created . Group the removed items in the another table. Change the name of the column 3. one by one. The number of deleted rows are not returned.Decrease the size of a column if table data exists. All of the above Answer Key: D Question 3 of 10 10.0 Points Following tasks can be performed when using the ALTER TABLE clause: 1. D.Change the name of the table 2. Truncate operations are not transaction safe. C. Truncate operations drop and re-create the table which is much faster than deleting rows. True False .0 Points In which of the following ways does ―TRUNCATE TABLE‖ differ from ―DELETE‖? A. B.Question 2 of 10 10. DELETE TABLE < TABLE NAME > D.0 Points Sometimes tables within particular database become obsolete and ought to be discarded.Answer Key: False Feedback: False ( all above tasks can not be performed ) Question 4 of 10 10. True False . DROP TABLE < TABLE NAME > C. Which of the following commands would you use for the same? A. REMOVE TABLE < TABLE NAME> B.0 Points A foreign key must have a corresponding primary key or unique key value in the master table. None of the above Answer Key: B Question 5 of 10 10. Answer Key: True Question 6 of 10 10.0 Points SELECT TRIM(' Hansel ' ) ―Trim both sides‖ FROM DUAL What would be the output of the above command? . True False Answer Key: True Question 8 of 10 10.0 Points Integrity constraint can be dropped if the rule that it enforces is not longer TRUE or if the constraint is no longer needed.0 Points NULL value is equivalent to a value of Zero if the data type is number True False Answer Key: False Question 7 of 10 10. None of the above B. SELECT TRANSLATE('1sct523'. 7sct 5a9 . Hansel D.A. Trim both sides Hansel Answer Key: D Question 9 of 10 10. Trim both sides C.0 Points What would be the output of following command. '7a9') ―Change‖ FROM DUAL.'123'. None of the above B. A. 7 sct C. Change 7 sct 5a9 D. Self Join Answer Key: D S/E Software Engineering .0 Points Question 1 of 10 10.0 Points .100.Answer Key: C Question 10 of 10 10. Inner join D.0 Points What is joining a Table to itself called? A. Outer join C.Quiz1 Return to Assessment List Part 1 of 1 . Left inner join B. the average number of errors made by .Experienced officers should be able to use all the system functions after a total training of two hours.0 Points Some examples of non-functional requirements are.The software should be developed using C language on a UNIX based system 4.Requirements can be classified in to two types.Number of significant digits to which accuracy should be maintained in all numerical calculations is 10 2. namely. After this training.The matrix diagonalisation routine should zero out all off-diagonal elements.The response time of the system should always be less than 5 seconds 3. 1. functional requirements and non-functional requirements CorrectIncorrect Incorrect True False Answer Key: True Question 2 of 10 10. which are equal to or less than 103 5. experienced officers should not exceed two per day. and querying it. C. D. B. It has a boundary. It has processes which collaborate with each other to generate the outputs. . These processes operate on data by creating.0 Points Every software system has the following essential characteristics: A. destroying. It takes inputs from external agents and generates outputs. CorrectIncorrect Incorrect True False Answer Key: True Question 3 of 10 10. The boundary separates what is with in system scope and what is outside. modifying. 0 Points Polymorphism: . All the above Answer Key: F Question 4 of 10 10.0 Points ERD complements DFD. CorrectIncorrect Incorrect True . While DFD focuses on data and the relationships between them.It is the means by which an operation behaves differently in different contexts.E. The system may also use data stores to store data which has a life beyond the system. Correct F. ERD focuses on processes and data flow between them Incorrect CorrectIncorrect True False Answer Key: False Question 5 of 10 10. It improves security and integrity of data CorrectIncorrect Incorrect True False Answer Key: True Question 7 of 10 10.0 Points Encapsulation: This helps in controlling the visibility of internal details of the objects. Virtual machine & Coincidental. Action. CorrectIncorrect Incorrect True False Answer Key: True . namely Entity.0 Points There are 4 types of Abstraction.False Answer Key: True Question 6 of 10 10. 0 Points Concurrency refers to multiple transactions accessing the same database at the same time. some kind of control mechanism has to be in place to ensure that concurrent transactions do not interfere with each other. In a system which allows concurrency.0 Points There can be more than one hash fields on a file.Question 8 of 10 10. Incorrect CorrectIncorrect True False Answer Key: False Question 9 of 10 10.0 Points Software genetic development process contains three . CorrectIncorrect Incorrect True False Answer Key: True Question 10 of 10 10. maintenance C. Development Answer Key: B Body Languagee Question 1 of 20 10. Testing E. Coding Correct B. design. Coding. development. Intuitive . Coding. Definition.0 Points What does this Body language symbolize? [sorry this picture cant be uploaded] A. Software engineering.genetic phrases namely A. Anger C. Definition. Questioning B. Development. Design. Definition. Software engineering D. Irritated Answer Key: A Feedback: Questioning Question 2 of 20 10. A quarter of one hour.0 Points Choose the right phrase of the word. Answer Key: A Feedback: A quarter of an hour. I'll be with you in ___________ A. One quarter of an hour. D.D. C. A quarter of an hour. . A quarter of hour. B. Insulting E. Question 3 of 20 10.0 Points Choose the right vocabulary which matches its meaning. "Expressing one self readily, clearly, effectively" A. Understanding B. Comprehensive C. Eloquence D. Effective Answer Key: C Feedback: Eloquence Question 4 of 20 10.0 Points Select the right option which indicates MTI ( Mother tongue influence) in the below given statement. What is your good name? A. Name B. Your C. Your good D. Good name Answer Key: D Feedback: Good name Question 5 of 20 10.0 Points Identify the tense used in the following sentence: We built a tree house last week. A. Simple Past B. Present continuous C. Present Perfect D. Past Perfect Answer Key: A Feedback: Simple Past Question 6 of 20 10.0 Points Pick the correct option(past progressive tense): While Aaron_________ in his room, his friends________ in the pool. A. is working........................are swimming B. was working..................was swimming C. was working........................are swimming D. was working..................were swimming Answer Key: D Feedback: was working..................were swimming Question 7 of 20 10.0 Points Choose the correct verb form to complete the sentence. I ______ on my sofa all day yesterday. A. laid B. lie didn't understanding B.0 Points Identify the incorrect part of the sentence: She don't understand / didn't understands / didn't understand/didn't understanding the question yesterday. lying D.C. didn't understands Answer Key: C Feedback: didn't understand . lay Answer Key: D Feedback: lay Question 8 of 20 10. don't understand C. A. didn't understand D. 0 Points Please rewrite the following statement: We are simply loving it here. We are simply loving.how about you? B. We are simply here. A. We love it here. D. Answer Key: A Feedback: We simply love it here. We simply love it here. Question 10 of 20 10. I am fine thank you .Question 9 of 20 10.0 Points What is the right response for the phrase ― How do you do?‖ A. B. I am fine. C. introduction c.0 Points Arrange the following sections of a presentation in the correct order: a. overview b. I am not fine. summarize and conclude i.e. start new section d.h. How do you do? Answer Key: D Feedback: How do you do? Question 11 of 20 10. give examples f.d. by the way how are you? D.a.c. analyse a point e. b. paraphrase and clarify h.f. finish section g. inviting audience to ask questions/ discuss A.i .C.g. Only women should stand for handshaking and all introductions C.c.e. a.c.g. Both men and women should stand for handshaking and all introductions D.h. a.f.e. a.h.0 Points In the business arena: A.b.c.i Answer Key: A Question 12 of 20 10.b.g.i C.B.f.b.i D.d.f.g. Only men should stand for handshaking and all introductions Answer Key: C .d.d.e.h. It is not necessary for men or women to stand for handshaking and all introductions B. a C. A.an.0 Points State whether this is true or false: Every presentation has its own target audience. the.the D. the.the. the.0 Points Fill in the blanks with appropriate articles: At ____ (1) beginning of ____(2) twentieth century.a. True .Question 13 of 20 10. the.a Answer Key: B Question 14 of 20 10.the B.the. East Los Angeles became ____(3) popular immigrant destination. matching these to available vacancies and presenting them well to prospective employers. Graduates should also .False Answer Key: True Question 15 of 20 10. even in Hong Kong.0 Points Read the passage and answer the following: FINDING A JOB Not so long ago almost any student who successfully completed a university degree or diploma course could find a good career quite easily. competing with each other to recruit graduates. Companies toured the academic institutions. One area of assessment should be of their academic qualifications. However. those days are gone. Job seekers have to make a careful assessment of their own abilities. and nowadays graduates often face strong competition in the search for jobs. which would include special skills within their subject area. Most careers organizations highlight three stages for graduates to follow in the process of securing a suitable career: recognizing abilities. Job application forms and letters should. leadership and caring for others. After studying all the various options. The second stage is to study the opportunities available for employment and to think about how the general employment situation is likely to develop in the future.consider their own personal values and attitudes. Where additional information is asked for. or the relative importance to themselves of such matters as money. with examples if possible. they should be in a position to make informed comparisons between various careers. To do this. They should try to balance their own abilities with the employer's needs. An honest assessment of personal interests and abilities such as creative or scientific skills. Good personal presentation is essential in the search for a good career. of course. or skills acquired from work experience. should also be given careful thought. job seekers should describe their abilities and work experience in more depth. security. without grammar or spelling errors. explain why they are interested in a . graduates can study job vacancies and information in newspapers or they can visit a careers office. be filled in carefully and correctly. write to possible employers for information or contact friends or relatives who may already be involved in a particular profession. When graduates are asked to attend for interview. Dressing suitably and arriving for the interview on time are also obviously important. Question: In paragraph 3. they should prepare properly by finding out all they can about the prospective employer. the secret to securing a good job is to be one of them. 'three stages for graduates' refers to: A. stages for the completion of a university degree or diploma course . Interviewees should try to give positive and helpful answers and should not be afraid to ask questions about anything they are unsure about. There will always be good career opportunities for people with ability. This is much better than pretending to understand a question and giving an unsuitable answer.career with the particular company and try to show that they already know something about the company and its activities. stages in the assessment of personal interests B. skills and determination. . 0 Points Read the passage and answer the following: FINDING A JOB Not so long ago almost any student who successfully completed a university degree or diploma course could find a good career quite easily. However. Most careers organizations highlight three stages for graduates to follow in the process of securing a suitable career: recognizing abilities. even in Hong Kong.C. Job seekers have to make a careful assessment of their . Companies toured the academic institutions. matching these to available vacancies and presenting them well to prospective employers. stages in the process of securing a suitable career Answer Key: D Question 16 of 20 10. and nowadays graduates often face strong competition in the search for jobs. competing with each other to recruit graduates. all of the above Correct D. those days are gone. After studying all the various options. without grammar or spelling errors.own abilities. security. write to possible employers for information or contact friends or relatives who may already be involved in a particular profession. or the relative importance to themselves of such matters as money. leadership and caring for others. An honest assessment of personal interests and abilities such as creative or scientific skills. be filled in carefully and correctly. or skills acquired from work experience. job seekers should describe their abilities and . which would include special skills within their subject area. of course. One area of assessment should be of their academic qualifications. Good personal presentation is essential in the search for a good career. graduates can study job vacancies and information in newspapers or they can visit a careers office. The second stage is to study the opportunities available for employment and to think about how the general employment situation is likely to develop in the future. they should be in a position to make informed comparisons between various careers. To do this. Where additional information is asked for. Graduates should also consider their own personal values and attitudes. should also be given careful thought. Job application forms and letters should. they should prepare properly by finding out all they can about the prospective employer. Dressing suitably and arriving for the interview on time are also obviously important. Question: 'each other ' in paragraph 2 refers to: A.work experience in more depth. There will always be good career opportunities for people with ability. This is much better than pretending to understand a question and giving an unsuitable answer. Interviewees should try to give positive and helpful answers and should not be afraid to ask questions about anything they are unsure about. with examples if possible. the secret to securing a good job is to be one of them. skills and determination. They should try to balance their own abilities with the employer's needs. three stages . explain why they are interested in a career with the particular company and try to show that they already know something about the company and its activities. When graduates are asked to attend for interview. drived Answer Key: C Question 18 of 20 10.0 Points . drove D.B. available vacancies Correct C. job seekers Answer Key: C Question 17 of 20 10. career organizations D. drive Correct C. A.0 Points Choose the correct option. We_________ around the parking lot for 20 minutes in order to find a parking space. driven B. the computer goes off. the computer suddenly went off. Question 19 of 20 10. b Answer Key: B Feedback: Past progressive to indicate an interrupted Action in the Past. Past perfect continuous . None of the above Correct B. b) When I write letters.Choose the correct option: a)While I was writing the email. c D. a C. c) Writing letters make my computer go off A.0 Points Identify the tense: A rhinoceros was swatting flies with his tail when suddenly a fly bit him A. it expresses the idea that both actions were happening at the same time........ Question 20 of 20 10. A.. my keys since I .B. home this morning. Past Simple C... lose/had left D. The actions are parallel. Past perfect Correct D. will lose/have left B. Past Progressive Answer Key: D Feedback: Past progressive indicates two actions in the same sentence. am losing/was leaving ...0 Points Choose the correct option: Not again! This is the third time that I . had lost/left C.. 0 Points Question 1 of 10 10.Correct E. <html><title></<title><head></head><body></body></h tml> .0 Points Which of the following sequences of HTML tags is correct? A. <html><head><title></<title><body></body></head></h tml> B. have lost/left Answer Key: E WT WEB TECHNOLOGY: 100. C. Common Style Sheets . <html><head><title></<title></head><body></body></h tml> Answer Key: D Feedback: <html><head><title></<title></head><body></body></h tml> Question 2 of 10 10.0 Points What does CSS stand for? A. <html><head></head><body><title></<title></body></h tml> D. Cascading Style Sheets B. C.0 Points How would you define id selector? A. id selector as $ Answer Key: B . id selector as @ D. id selector as # C. Central Style Sheets D. Control Style Sheets Answer Key: A Question 3 of 10 10. None of the above B. In the <head> section B. In the <body> section Answer Key: A Question 5 of 10 10.Question 4 of 10 10. At the beginning of the document D. At the end of the document C.0 Points Which of the following tags would you use to insert JavaScript in an HTML page? . which is the correct place to refer to an external style sheet? A.0 Points In an HTML document. A. A. <JScript type="text/javascript"></JScript> D.JavaScript is also known as server-side JavaScript. <HTMLScript type="text/javascript"></HTMLScript> C. Navigator B. <script type="text/javascript"></script> B.0 Points The -------. Microsoft . <JavaScript type="text/javascript"></JavaScript> Answer Key: A Question 6 of 10 10. C. Native Answer Key: C Question 7 of 10 10.0 Points If para1 is the DOM object for a paragraph. LiveWire D. what is the correct syntax to change the text within the paragraph? .0 Points The following code would allow you to set background with CSS: <style type="text/css"> body {background-color: yellow} </style> True False Answer Key: True Question 8 of 10 10. nodeValue="New Text".nodeValue= "New Text".firstChild.A.0 Points How does JavaScript store date in a date object? A. C. B. para1. para1. para1. None of the above B. The number of seconds since Netscape's public stock .value="New Text". Answer Key: D Question 9 of 10 10. "New Text"? D. offering. select:pseudo-element {property: value} D. The number of days since January 1st. The number of milliseconds since January 1st. 1900 Answer Key: C Question 10 of 10 10. selector:pseudo-elements {property: values} C. C.0 Points How would you define First-line pseudo-element in CSS? A. None of the above B. selector:pseudo-element {property: value} . 1970 D. 0 Points Question 1 of 10 10. choose the four options that describe the appropriate default values for array elements of the types indicated? 1.100. int -> 0 2.Answer Key: D Java Part 1 of 1 .0f 6.boolean -> true A.0 Points Among the following options. 2. char -> '\u0000' 5. 4. 6 . 5. String -> "null" 3. Dog -> null 4. float -> 0. Int. (5) are the correct statements. 3. 5 Answer Key: D Feedback: (1). Question 2 of 10 10. continue . (2) is wrong because the default value for a String (and any other object reference) is null. 3. 5. with no quotes. (4). 1. 4. 1. 4. 2. void. 4 C. long. class. (3).0 Points Which option among the following lists only Java programming language keywords? A. if. 6 D.B. (6)is wrong because the default value for boolean elements is false. 3. byte. assert. Although goto reserved as a keyword in Java. Int. throw. . virtual. class. throws D. break. default. strictfp. implements. finally. super. instanceof. throw. volatile. void. throws are among the 49 Java keywords.B. include E. transient C. transient is wrong because "virtual" is a keyword in C++. virtual. try. constant. final. native. continue is wrong because the keyword for the primitive int starts with a lowercase i. long. switch. final. goto. if. finally. instanceof. default. try. do Answer Key: C Feedback: All the words in goto. native. but not Java. volatile. goto is not used and has no function. super. int myList [] = {4. int [] myList = {"1".7. Constants in Java are marked static and final.9. construct. D. 2). B.strictfp.0 Points Which of the following options would legally declare. assert. "3"}. include is wrong because "include" is a keyword in C. int [] myList = (5. switch. byte. 3.0}. "2". 7}. C. but not in Java. constant. int myList [] [] = {4. Question 3 of 10 10. break. implements. do is wrong because "constant" is not a keyword. Answer Key: A . and initialize an array? A. 8. Question 4 of 10 10. int [] myList = (5. int myList [] [] = {4. although the declared array is a twodimensional array. "3"}. 8.9. 2).7. "2". 3.Feedback: The only legal array declaration and assignment statement is int myList [] = {4. int [] myList = {"1".0}. 7}. private . Which is the most restrictive access that accomplishes this objective? A. is wrong because it provides initial values for only one dimension.is wrong because it use something other than curly braces for the initialization.0 Points You want subclasses in any package to have access to members of a superclass. is wrong because it initializes an int array with String literals. may access features. protected C. not which instances. Methods and variables are collectively known as members. Method and variable members are given access control in exactly the same way.B. private makes a member accessible only from within its own class protected makes a member accessible only to classes in the same package or subclass of the class default access is very similar to protected (make sure you spot the difference) default access makes a member . public D. transient Answer Key: C Feedback: Access modifiers dictate which classes. transient indicates that a variable is not part of the persistent state of an object. when applied to a variable it makes it impossible to reinitialise a variable once it has been initialised abstract declares a method that has not been implemented. After examining the above it should be obvious that the access modifier that provides the most restrictions for . volatile indicates that a thread must reconcile its working copy of the field with the master copy every time it accesses the variable. when applied to a method it prevents a method from being overridden in a subclass.accessible only to classes in the same package. can access the member (assuming the class itself is visible) final makes it impossible to extend a class. public means that all other classes regardless of the package that they belong to. Question 5 of 10 10. } 1.abstract class Class2 extends Base { public boolean m1(){ return true. byte m2(short s). }} 5. }} 3.interface Base2 implements Base {} 2.abstract class Class2 implements Base {} 4.abstract class Class2 implements Base { public boolean m1(){ return (7 > 4). private would be the answer if the constraint was the "same package" instead of "any package" in other words the subclasses clause in the question eliminates default.abstract class Class2 implements Base { protected boolean m1(){ return (5 > 7) }} .0 Points interface Base { boolean m1 (). public is also a contender but protected is more restrictive.methods to be accessed from the subclasses of the class from another package is protected. 1 and 2 B. so the methods being implemented must be public. 2 and 3 D. 1 and 5 Answer Key: B Feedback: 3) is correct because an abstract class doesn't have to implement any or all of its interface's methods. (1) is incorrect because interfaces don't implement anything. (2) is incorrect because classes don't extend interfaces. Question 6 of 10 10. (4) is correct because the method is correctly implemented ((7 > 4) is a boolean).A.0 Points . 3 and 4 C. (5) is incorrect because interface methods are implicitly public. private int a [3] 5. 3. 2. 2. 5. 2. 1.public int a [ ] 2. which three form part of correct array declarations? 1.private int [3] a [ ] 6.public final int [ ] a A.Among the 6 options provided below. 4 B. 6 Answer Key: D . 5 C.public [ ] int a 4. 6 D. 1. 4.static int [ ] a 3. Feedback: (1). (2) and (6) are valid array declarations.0 Points Which of the following is/are legal method declarations? 1. The compiler complains with: ']' expected. The compiler complains with: illegal start of type. The compiler complains with 2 errors: ']' expected. A closing bracket is expected in place of the 3 and <identifier> expected A variable name is expected after a[ ]. . Question 7 of 10 10.protected abstract void m1(). The following would work: public int[ ] a Option (4) is not a correct array declaration. The brackets are in the wrong place. The following works: private int a [] Option (5) is not a correct array declaration. A closing bracket is expected in place of the 3. Option (3) is not a correct array declaration. .2. 2 and 4 B. Question 8 of 10 10.private native void m1().0 Points Which three among the following are valid method signatures in an interface? 1. Answer Key: D Feedback: All the given statements are legal declarations. 1 only D.private int getArea(). All of them are legal declarations. 1 and 3 C. A.synchronized public final void m1() {} 4.static final void m1(){} 3. and 5 D. if it is not explicitly declared public it will be . (1).2. and (5).boolean setFlag(Boolean [] test). 2 and 4 Answer Key: B Feedback: (2). 4. 4. 5. is incorrect because an interface method must be public. 3 and 5 C. 3. 3. (3).public void main(String [] args). These are all valid interface method signatures. A. 1 and 2 B.public static void main(String [] args).public float getVol(float x). 2. 0 Points Which option among the following creates an instance of an array? A. char[ ] ca = "Some String". Answer Key: A Feedback: int[ ] ia = new int[15]. Question 9 of 10 10. (4) is incorrect because interface methods cannot be static. float fa = new float[20]. It uses correct array declaration and correct array construction. int ia[ ] [ ] = { 4.2. int[ ] ia = new int[15].made public implicitly. { 1.3 }. C. is correct. 5. 6 }. B. D. . 5. int ia[ ] [ ] = { 4. is wrong.3 }. but it is supplied with a primitive type in the declaration. whereas your intention was to create a 3 x 3 two-dimensional array.0 Points Which of the following class level (nonlocal) variable declarations will not compile? . The compiler thinks that you are trying to create two arrays because there are two array initialisers to the right of the equals. Question 10 of 10 10. char[ ] ca = "Some String". 6 }. It generates a compiler error: incompatible types because the array variable declaration is not correct. It generates a compiler error: incompatible types because a string literal is not assignable to a character type variable. is incorrect.2.float fa = new float[20]. is incorrect. The array construction expects a reference type. it generates a compiler error <identifier> expected. { 1. protected int a. private synchronized int e. protected int a. will not compile. will compile because volatile is a proper variable modifier.A. will compile because protected and transient are legal variable modifiers. volatile int d. the synchronized modifier applies only to methods. C. B. . Answer Key: A Feedback: private synchronized int e. D. volatile int d. and transient int b = 3. transient int b = 3. Compares two numerals and prints the lower value Correct C. Ls can be used with many options to display additional details Question 2 of 10 10.0 Points Which among the following is not a part of UNIX operating system A.Question 1 of 10 10. Lists the files in a directory D. Gives the currently logged session details B. Programs .0 Points ―ls‖ command in UNIX A. Compare the size of two files Answer Key: C Feedback: ―ls‖ command in UNIX lists all the contents in a directory. Operating System Answer Key: C Feedback: The shell acts as an interface between the user and the kernel. Kernel D. and then starts . the login program checks the username and password. the shell and the programs. Shell Correct D. Question 3 of 10 10. Hardware Correct C.B. When a user logs in. Kernel C. Libraries Answer Key: D Feedback: Libraries. the kernel. The UNIX operating system is made up of three parts.0 Points In UNIX. the shell act as an interface between user and A. Programs B. The shell is a command line interpreter (CLI). a file or a process B. a Process C. running compilers etc. They are created by users using text editors. It interprets the commands the user types in and arranges for them to be carried out. None D.another program called the shell. a File Answer Key: A Feedback: Everything in UNIX is either a file or a process. A file is a collection of data. Question 5 of 10 10.0 Points Everything in UNIX is Correct A. Question 4 of 10 10. A process is an executing program identified by a unique PID (process identifier).0 Points Which command is used for changing directory in UNIX? . your current position in the file-system tree. The current working directory may be thought of as the directory you are in. chgdir C. User Groups C.0 Points In UNIX. Other users B. Devices . cd Answer Key: D Feedback: The command cd directory means change the current working directory to 'directory'. cddir B. i. Question 6 of 10 10.A. User Correct D. file permissions are not set for A.e. mkdir Correct D. Type 'man' and the command D. It also has a set of permission flags which specify separate read. and 'other' (everyone else with an account on the computer) Question 7 of 10 10. type "man <command>". write and execute permissions for the 'user' (owner). Question 8 of 10 10. 'group'.Answer Key: D Feedback: Every directory and file on the system has an owner. how can you read the manual – help pages – about a command A.0 Points In Unix. and also an associated group. Type 'help' and the command Correct C. Type 'options' and the command B. This will show you the manual of the specified command. Type 'details' and the command Answer Key: C Feedback: To see what all a Linux command can do.0 Points Which is the most common text editor in UNIX ? . Question 9 of 10 10.0 Points You have created a shell script and wants to run the script. Give ownership of the file to system admin C. a product of GNU. notepad Correct D. Word C. Update the execute permission of the script B. Compile the script to create the executable . Open office B. What should you do before trying to run the script ? Correct A.A. Alternate editors for UNIX environments include pico and emacs. Visual editor Answer Key: D Feedback: The default editor that comes with the UNIX operating system is called vi (visual editor). Append mode B. Command Mode D. No action required Answer Key: A Feedback: You have to update the execute permission of the script using the command 'chmod' Question 10 of 10 10. Typing mode Answer Key: C .0 Points Which is valid mode of operation in vi editor ? A. Open mode Correct C.D.
Copyright © 2024 DOKUMEN.SITE Inc.