1.
A class is declared
inside a class but outside a method it is known as-----------------------
a.
Annoymous inner class
b.
Member
inner class
c.
Local Inner Class
d.
Static nested Class
2.
JVM stands for
a.
Java Very Large Machine
b.
Java Verified Machine
c.
Java Very small machine
d.
Java
Virtual Machine
3.
What type of constructor is used to
provide different values to the distinct objects?
a.
Default constructor
b.
Parameterized
Constructor
c.
Overloading Constructor
d.
None of the above
4.
How many types of controls does AWT
support?
a.
7
b.
6
c.
5
d.
8
AWT stands for Abstract window tool kit.
5.
Which type of inheritance one
super-class have more than on sub-class
a.
Hierarchical inheritance
b.
single inheritance
c.
Multiple inheritances
d.
Multilevel inheritance
- Hierarchical Inheritance : In Hierarchical Inheritance, one class serves as a superclass (base class) for more than one sub class.In below image, the class A serves as a base class for the derived class B,C and D.

6.
Which allows you to define one
interface and have multiple implementations?
a.
Encapsulation
b.
inheritance
c.
Polymorphism
d.
None of the above
7.
which right shift operator preserves
the sign of the value?
8.
~
Unary not operator, ~, inverts all of the bits of its operand in binary representation.
9.
What is it called if an object
has its own lifecycle and there is no owner?
A.
Aggregation
B.
Composition
C.
Encapsulation
D.
Association
10.
What is the return type of
constructors ?
A.
int
B.
float
C.
void
D.
none of
the mentioned
11.
Which of these is an incorrect array
declaration ?
A.
int arr[]=new int[5]
B.
int[]arr=new int[5]
C.
int
arr[]=int[5] new
D.
int arr[]=new int[5]
Data type array name=data type and array size
12.
---------- is comparable to pair of
persons in a room taking turns to speak with each other
A.
Time
Division Multiplexing
B.
Frequency Division Multiplexing
C.
Code Division Multiplexing
D.
None of these
13.
Which one of the following error
detecting code is also known as polynomial code?
A.
Checksum
B.
Parity
C.
Cyclic
Redundancy checks
D.
None of these
14.
The encryption algorithm for WPA2 is
based on
A.
DES
B.
AES
C.
Elliptic Curve
D.
EI Gamal
15.
------------------ is used to divide
physical network topology into different logical topologies
A.
Wimax
B.
WLAN
C.
Adhoc Network
D.
VLAN
16.
Which one of the following is not a
Network layer Protocol?
A.
TCP
B.
ICMP
C.
ARP
D.
DHCP
17.
Select the service which is not
provided by the Transport Layer.
A.
Congestion Control
B.
Routing
C.
Flow Control
D.
Error Correction
18.
----------------- is not a linux
file system
A.
Ext4
B.
Jfs
C.
XFS
D.
ReFS
19.
The IEEE standard for Wimax is
A.
802.11
B.
802.15
C.
802.15.1
D.
802.16
20.
-----------------
is not a web server
A.
IIS
B.
Apache
C.
Firefox
D.
Nginx
21.
A Denial of service attack against a
network belongs to which of the following type of threat?
A.
Modification
B.
Interception
C.
Interruption
D.
None of these
22.
---------------Caches web pages on
the server hard disk so that they can be quickly retrieved later.
A.
File Server
B.
Proxy
Server
C.
Web Server
D.
None of these
23.
--------------- is not an active
attack in Nertwork Security
A.
Traffic
Analysis
B.
Masquerade
C.
Replay
D.
Denial Of Service
24.
----------- is an indication of the
relative independence among the modules
A.
Cohesion
B.
Coupling
C.
Pattern
D.
Modularity
25.
The test-Case design technique that
complements equivalence partitioning and leads to the selection of test cases
at the edges of the class
A.
Orthogonal array testing
B.
Model-Based Testing
C.
Boundary
Value analysis
D.
Condition testing
26.
The framework activity that presents
software increment to the customer and includes delivery , support and feedback
A.
Communication
B.
Planning
C.
Modeling
D.
Deployment
27.
-----------------
structures a team loosely and
depends on individual initiative of the team members.
A.
Random
paradigm
B.
Open Paradigm
C.
Closed Paradigm
D.
Synchronous Paradigm
28.
The w5HH principle is
suggested by
A.
Reel
B.
Grady Bosch
C.
Liu
D.
Barry
Boehm
29.
A quality metric that provides
benefit at both the project and process level is called
A.
Defect
Removal efficiency
B.
FP
C.
LOC
D.
Use-Case Points
30.
The prioritized list of project
requirements or features which provides business value for the customer
A.
Sprints
B.
Demos
C.
Backlog
D.
States
31.
----------------- is an agile
process model that provides a framework for building and maintaining
systems which meet tight time constraints through the use of incremental
prototyping.
A.
Adaptive Software Development
B.
Dynamic
systems development method
C.
Scrum Model
D.
Crystal
32.
The small and highly motivated and
self-organizing project team is called-----------------
A.
Stake holders
B.
Team leaders
C.
Agile
D.
Mavericks
33.
--------------- is also called
behavioral testing, focuses on the functional requirements of the
software.
A.
Black box
testing
B.
White box Testing
C.
Basis Path Testing
D.
Data Flow Testing
34.
Used to show dynamic communications
between objects during execution of a task
A.
Class
Diagram
B.
Deployment Diagram
C.
Use Case Diagram
D.
Sequence Diagram
35.
A new technology that emphasizes the
design of test cases before the creation of source code
A.
Agile Process
B.
Test-
driven Development
C.
Postmodern design
D.
Model-driven Software Development
36.
Which is a technique in a java in
which a class can have any number of constructors that differ in
parameter lists?
A.
Constructor
overloading
B.
Method Overloading
C.
Operator Overloading
D.
None of the above
37.
Which method is used to change the
name of thread?
A.
Public string getName()
B.
Public
Void setName(String name)
C.
Public void getName()
D.
Public String setName(sting name)
38.
Which statement provides an easy way
to dispatch execution to different parts of your code based on the value of
expression?
A.
If
B.
Switch
C.
Nested-if
D.
If-else-if
39.
Which keyword is used to make the classes
and interface of another package accessible to the current package?
A.
Import
B.
Implements
C.
Instanceof
D.
None of the above
40.
Which method DataInputStream class
reads a line from the file and returns it as a string?
A.
WriteInt()
B.
reading()
C.
readLine()
D.
writeDouble()
41.
Under which package is the string
class encapsulated?
A.
Java.awt
B.
Java.util
C.
Java.io
D.
Java.lang
42.
Which of the following is a valid
declaration of an object of class Box?
A.
Box obj
=new box()
B.
Box obj = new Box
C.
Obj=new Box()
D.
new Box obj
43.
What is the output of this program?
Class
selection_statements
{
Public
static void main(string args[])
{
Int var1=5
Int var2=6
If (var
2==1)==var1)
System.out.prin(var2);
else
System.out.print(++var2)
}
}
A.
1
B.
2
C.
3
D.
4
44. A
class member declared protected becomes a member of subclass of which type?
A.
Public Member
B.
Static Member
C.
Protected Member
D.
Private
Member
45. Which
of these is not a bitwise operator?
A &
B &=
C!=
Dless
than=
Thread
priority in Java is
A.
Integer
B.
Float
C.
double
D.
long
46. Which
of the method is a part of Abstract Window Toolkit (AWT)?
A.
Display()
B.
Paint ()
C.
drawString()
D.
Transient
44.
The ------------------- attribute of
applet tag specifies the amount of horizontal blank space the browser should
leave surrounding the applet
A) SPACE=Pixel
45.
b) HSPACE=Pixel
46.
c)HWDTH=pixel
47.
e)HBLANK=pixel
48.
The --------------------method is
defined by the AWT which cause the AWT runtime system to execute a call to your
applet's update() method.
49.
A)Update()
50.
B)Paint()
51.
C)repaint()
52.
D)reupdate()
53.
-------------------------Package in java contents language utility classes such as
vectors, hash, tables, random numbers data etc.
A) Java.util
B) Java.awt
C) Java.net
54.
D. Java.lang
55.
HTML Stands for
56.
A)Hyper Text Markup Language
57.
B)Hyper Text Marking Lanuage
58.
C)Hyper Text MArkup Lists
59.
D)None of the above
60.
The capablity to store one object
inside another object is called
A) Encapsulation
B) Aggregation(Ans Key)
C) Polymorphism
D) Inheritance
61.
The capability to store one object
inside another object is called
A) Encapsulation
B) Aggregation(Ans Key)
C) Polymorphism
D) Inheritance
62.
Result of getAIIResponseHeaders()
XMLHTTP Request method is
A) Returns the complete set to HTTP headers as a string
63.
B)Returns the value of the specified
HTTP header
64.
C) Both (A) and (B)
65.
D) None of the above
66.
WAMP Variant for MAC operating
system is
A) LAMP
B) MAMP
C) SAMP
D) None of these
67.
DNS Comprises
A) Domain Names and Name Server
B) Domain Names and Domain Name Space
C) Domain Names, Domain Name Space and Name Server
68.
Latest web browser of Microsoft
69.
A)Internet Explorer
70.
B)Opera
71.
C)Safari
72.
D)Edge
73.
TCP/IP Stands for
A) Transmission control protocol/Internet Protocol
B) Transfer Control Protocol/ Internet Protocol
C) Both A and B
74.
Packet switching method is used in
A) TCP
B) UDP
C) Both A and B
D) None of these
75.
bWhich layer uses error control mechanism in OSI?
76.
A)Network Layer
77.
b) Data Link Layer
78.
C) Tran spot Layer
79.
D) Application Layer
80.
ISDN is an exaple of
--------------------network
81.
A)Circuit
Switched Telephone Network
82.
B) Packet Switched Network
83.
C) Message Switched Network
84.
D) None of the above
85.
What is the maximum cable length of
STP
86.
A)300 m
87.
B) 200 m
88.
c) 100 m
89.
D) 150 m
90.
Application layer uses the following
protocols:
91.
A)SMTP
92.
B)FTP
93.
C)HTTP
94.
D)All of
the above
95.
To define style shee rules in header
section of the HTML document called
A) Externam Style Sheet
B) Internal Style Sheet
C) Inline style sheet
96.
None of the above
97.
The application server for Java Web
Application is
A) JBoss
B) Glassfish
C) Weblogic
98.
D)Tomcat
99.
The protocol used to send email from
one to another
100.
A)POP3
101.
B)HTTP
102.
c)SMTP
103.
D)FTP
104.
commonly used web application that
make use of AJAX
A) Google Map
B) Yahoo Maps
C) Gmail
105.
D)All of the above
106.
IIS stands for
A) International information Standards
B) International Information Services
C) Internet Information Standards
107.
D)Internet Information Services
108.
The attribute of an HTML tag can be used to uniquely identify any element within an HTML page is
The attribute of an HTML tag can be used to uniquely identify any element within an HTML page is
A) id
B) Title
C) Class
D) Style
109.
gA smalla area can use the following
network
A) LAN|
B) WAN
C) MAN
D) None of the above
110.
The attribute is used to specify the
URL of the document that occupies the inline frame
A) Frame
B) Sup
111.
c) Src
112.
D) Span
113.
HTML form control tag is
A) File select boxes
B) Text input controls
114.
c) Checkboxes Controls
115.
D)All of the above
116.
Client software that is used for
email retrieval
A) IMAP
B) HTTP
117.
C)DHCP
118.
D)ICMP
119.
bThe number of sub keys generated by
IDEA algorithm is
A) 64
B) 32
C) 54
D) 52
120.
---------------- is an example of
public key algorithm?
A) DES
121.
B)RSA
122.
C)IREA
123.
bD)RCS
124.
DSS Signature uses which hash
algorithm?
A) MD5
B) SHA-1
C) SHA-2
D) Does not use hash algorithm
125.
In asymmetric key cryptography the
private key is kept by
A) Sender
B) Receiver
C) Sender and receiver
D) Cryptoanalyst
126.
What is Data Encryption Standard
(DES) ?
A.
Block
Cipher
B.
Stream Cipher
C.
Bit Cipher
D.
None of the above
127.
In Cryptography , the order of the
letters in a message is rearranged by
A.
Transposition
Ciphers
B.
Substitution Ciphers
C.
Both A and B
D.
None of the above
128.
Using RSA algorithm, What is
the value of cipher text C, If the plain text M=5 and P=3 , q=11 and d=7
A.
24
B.
25
C.
26
D.
32
129.
---------------- is used for hiding
the payment information from the merchant
A.
SET
B.
SSL
C.
SHTTP
D.
TSP
130.
The URL Property belongs to which of
the following object?
A.
Document
B.
Element
C.
Location
D.
Event
131.
Which of the following attribute can
hold the JavaScript version?
A.
Language
B.
Script
C.
Version
D.
None of the above
132.
Which event occurs when user click
on an HTML element?
A.
onclick()
B.
onmouceclick()
C.
onchange()
D.
onmouseover
133.
<Script language
="javascript">
134.
function x()
135.
{
136.
Document.write(2+0+"4");
137.
}
138.
</scipt>
A.
204
B.
2
C.
Error
D.
24
139.
What is the value of $a and $b after
the function call ?
140.
<?php
141.
function doSomething(&$arg)
142.
{
143.
$fruit=$arg;
144.
$arg +=1;
145.
return $fruit;
146.
}
147.
$a=3;
148.
$b=doSomething($a);
149.
?>
A.
a is 3 and b is 4
B.
a is 4 and b is 3
C.
both are 3
D.
both are 4
150.
which version of PHP was added with
Exception handling?
A.
PHP 4
B.
PHP 5
C.
PHP 5.3
D.
PHP
151.
Which one of the following way can
you embed PHP code in an HTML page?
A.
<?php PHP code goes here ?>
B.
<?PHP code goes here?>
C.
<script
language="php"> PHP code goes here </script>
D.
All of the
above
152.
is php case sensitive?
153.
Referential Integrity is directly
related to
A.
Relation Key
B.
Foreign
Key
C.
Primary Key
D.
Candidate Key
154.
Consider a schema R(P,Q,R,S) and
functional dependencies P->Q and R->S. Then the decomposition
R1(P,Q) and R2(R,S) is
A.
Dependency Preserving and lossless
join
B.
Lossless join but not dependency
preserving
C.
Lossless Join
D.
Dependency
preserving but not lossless join
155.
The normalization if 1 NF relations
to 2NF involves
A.
Removal of full dependencies
B.
Removal of Transitive dependencies
C.
Removal of
partial dependencies
D.
Removal of multivalued dependencies
156.
157.
An attribute A of data type
Varchar(20) has the value "Ram". the attribure of data type char(20)
has value "Ramu". Here attribute A has --------- Spaces and attribute
B ahs ----------------- spaces.
- 3,4
- 20,4
- 20,20
- 3,20
162.
E-R model uses this symbol to
represent weak entity set.
163.
Dotted Rectangle
164.
Doubly Dotted Rectangle
165.
Double
lined Rectangle
166.
Rectangle
167.
Data mining is used to aid in
168.
Operational management
169.
analyzing past decision made by
managers
170.
detecting
patterns in operational data
171.
retrieving archival data
172.
------------- helps solve
concurrency problem
173.
two -phase commit
174.
transaction serializablity
175.
locking
176.
transaction monitor
177.
------------------cursor are
declared by ORACLE for each UPDATE, DELETE and INSERT SQL commands
178.
internal
179.
External
180.
Implicit
181.
Explicit
182.
183.
184.
1.
A class is declared
inside a class but outside a method it is known as-----------------------
a.
Annoymous inner class
b.
Member
inner class
c.
Local Inner Class
d.
Static nested Class
2.
JVM stands for
a.
Java Very Large Machine
b.
Java Verified Machine
c.
Java Very small machine
d.
Java
Virtual Machine
3.
What type of constructor is used to
provide different values to the distinct objects?
a.
Default constructor
b.
Parameterized
Constructor
c.
Overloading Constructor
d.
None of the above
4.
How many types of controls does AWT
support?
a.
7
b.
6
c.
5
d.
8
5.
Which type of inheritance one
super-class have more than on sub-class
a.
Hierarchical inheritance
b.
single inheritance
c.
Multiple inheritances
d.
Multilevel inheritance
6.
Which allows you to define one
interface and have multiple implementations?
a.
Encapsulation
b.
inheritance
c.
Polymorphism
d.
None of the above
7.
which right shift operator preserves
the sign of the value?
8.
~
9.
What is it called if an object
has its own lifecycle and there is no owner?
A.
Aggregation
B.
Composition
C.
Encapsulation
D.
Association
10.
What is the return type of
constructors ?
A.
int
B.
float
C.
void
D.
none of
the mentioned
11.
Which of these is an incorrect array
declaration ?
A.
int arr[]=new int[5]
B.
int[]arr=new int[5]
C.
int
arr[]=int[5] new
D.
int arr[]=new int[5]
12.
---------- is comparable to pair of
persons in a room taking turns to speak with each other
A.
Time
Division Multiplexing
B.
Frequency Division Multiplexing
C.
Code Division Multiplexing
D.
None of these
13.
Which one of the following error
detecting code is also known as polynomial code?
A.
Checksum
B.
Parity
C.
Cyclic
Redundancy checks
D.
None of these
14.
The encryption algorithm for WPA2 is
based on
A.
DES
B.
AES
C.
Elliptic Curve
D.
EI Gamal
15.
------------------ is used to divide
physical network topology into different logical topologies
A.
Wimax
B.
WLAN
C.
Adhoc Network
D.
VLAN
16.
Which one of the following is not a
Network layer Protocol?
A.
TCP
B.
ICMP
C.
ARP
D.
DHCP
17.
Select the service which is not
provided by the Transport Layer.
A.
Congestion Control
B.
Routing
C.
Flow Control
D.
Error Correction
18.
----------------- is not a linux
file system
A.
Ext4
B.
Jfs
C.
XFS
D.
ReFS
19.
The IEEE standard for Wimax is
A.
802.11
B.
802.15
C.
802.15.1
D.
802.16
20.
-----------------
is not a web server
A.
IIS
B.
Apache
C.
Firefox
D.
Nginx
21.
A Denial of service attack against a
network belongs to which of the following type of threat?
A.
Modification
B.
Interception
C.
Interruption
D.
None of these
22.
---------------Caches web pages on
the server hard disk so that they can be quickly retrieved later.
A.
File Server
B.
Proxy
Server
C.
Web Server
D.
None of these
23.
--------------- is not an active
attack in Nertwork Security
A.
Traffic
Analysis
B.
Masquerade
C.
Replay
D.
Denial Of Service
24.
----------- is an indication of the
relative independence among the modules
A.
Cohesion
B.
Coupling
C.
Pattern
D.
Modularity
25.
The test-Case design technique that
complements equivalence partitioning and leads to the selection of test cases
at the edges of the class
A.
Orthogonal array testing
B.
Model-Based Testing
C.
Boundary
Value analysis
D.
Condition testing
26.
The framework activity that presents
software increment to the customer and includes delivery , support and feedback
A.
Communication
B.
Planning
C.
Modeling
D.
Deployment
27.
-----------------
structures a team loosely and
depends on individual initiative of the team members.
A.
Random
paradigm
B.
Open Paradigm
C.
Closed Paradigm
D.
Synchronous Paradigm
28.
The w5HH principle is
suggested by
A.
Reel
B.
Grady Bosch
C.
Liu
D.
Barry
Boehm
29.
A quality metric that provides
benefit at both the project and process level is called
A.
Defect
Removal efficiency
B.
FP
C.
LOC
D.
Use-Case Points
30.
The prioritized list of project
requirements or features which provides business value for the customer
A.
Sprints
B.
Demos
C.
Backlog
D.
States
31.
----------------- is an agile
process model that provides a framework for building and maintaining
systems which meet tight time constraints through the use of incremental
prototyping.
A.
Adaptive Software Development
B.
Dynamic
systems development method
C.
Scrum Model
D.
Crystal
32.
The small and highly motivated and
self-organizing project team is called-----------------
A.
Stake holders
B.
Team leaders
C.
Agile
D.
Mavericks
33.
--------------- is also called
behavioral testing, focuses on the functional requirements of the
software.
A.
Black box
testing
B.
White box Testing
C.
Basis Path Testing
D.
Data Flow Testing
34.
Used to show dynamic communications
between objects during execution of a task
A.
Class
Diagram
B.
Deployment Diagram
C.
Use Case Diagram
D.
Sequence Diagram
35.
A new technology that emphasizes the
design of test cases before the creation of source code
A.
Agile Process
B.
Test-
driven Development
C.
Postmodern design
D.
Model-driven Software Development
36.
Which is a technique in a java in
which a class can have any number of constructors that differ in
parameter lists?
A.
Constructor
overloading
B.
Method Overloading
C.
Operator Overloading
D.
None of the above
37.
Which method is used to change the
name of thread?
A.
Public string getName()
B.
Public
Void setName(String name)
C.
Public void getName()
D.
Public String setName(sting name)
38.
Which statement provides an easy way
to dispatch execution to different parts of your code based on the value of
expression?
A.
If
B.
Switch
C.
Nested-if
D.
If-else-if
39.
Which keyword is used to make the classes
and interface of another package accessible to the current package?
A.
Import
B.
Implements
C.
Instanceof
D.
None of the above
40.
Which method DataInputStream class
reads a line from the file and returns it as a string?
A.
WriteInt()
B.
reading()
C.
readLine()
D.
writeDouble()
41.
Under which package is the string
class encapsulated?
A.
Java.awt
B.
Java.util
C.
Java.io
D.
Java.lang
42.
Which of the following is a valid
declaration of an object of class Box?
A.
Box obj
=new box()
B.
Box obj = new Box
C.
Obj=new Box()
D.
new Box obj
43.
What is the output of this program?
Class
selection_statements
{
Public
static void main(string args[])
{
Int var1=5
Int var2=6
If (var
2==1)==var1)
System.out.prin(var2);
else
System.out.print(++var2)
}
}
A.
1
B.
2
C.
3
D.
4
44. A
class member declared protected becomes a member of subclass of which type?
A.
Public Member
B.
Static Member
C.
Protected Member
D.
Private
Member
45. Which
of these is not a bitwise operator?
A &
B &=
C!=
Dless
than=
Thread
priority in Java is
A.
Integer
B.
Float
C.
double
D.
long
46. Which
of the method is a part of Abstract Window Toolkit (AWT)?
A.
Display()
B.
Paint ()
C.
drawString()
D.
Transient
44.
The ------------------- attribute of
applet tag specifies the amount of horizontal blank space the browser should
leave surrounding the applet
A) SPACE=Pixel
45.
b) HSPACE=Pixel
46.
c)HWDTH=pixel
47.
e)HBLANK=pixel
48.
The --------------------method is
defined by the AWT which cause the AWT runtime system to execute a call to your
applet's update() method.
49.
A)Update()
50.
B)Paint()
51.
C)repaint()
52.
D)reupdate()
53.
-------------------------Package in java contents language utility classes such as
vectors, hash, tables, random numbers data etc.
A) Java.util
B) Java.awt
C) Java.net
54.
D. Java.lang
55.
HTML Stands for
56.
A)Hyper Text Markup Language
57.
B)Hyper Text Marking Lanuage
58.
C)Hyper Text MArkup Lists
59.
D)None of the above
60.
The capablity to store one object
inside another object is called
A) Encapsulation
B) Aggregation(Ans Key)
C) Polymorphism
D) Inheritance
61.
The capability to store one object
inside another object is called
A) Encapsulation
B) Aggregation(Ans Key)
C) Polymorphism
D) Inheritance
62.
Result of getAIIResponseHeaders()
XMLHTTP Request method is
A) Returns the complete set to HTTP headers as a string
63.
B)Returns the value of the specified
HTTP header
64.
C) Both (A) and (B)
65.
D) None of the above
66.
WAMP Variant for MAC operating
system is
A) LAMP
B) MAMP
C) SAMP
D) None of these
67.
DNS Comprises
A) Domain Names and Name Server
B) Domain Names and Domain Name Space
C) Domain Names, Domain Name Space and Name Server
68.
Latest web browser of Microsoft
69.
A)Internet Explorer
70.
B)Opera
71.
C)Safari
72.
D)Edge
73.
TCP/IP Stands for
A) Transmission control protocol/Internet Protocol
B) Transfer Control Protocol/ Internet Protocol
C) Both A and B
74.
Packet switching method is used in
A) TCP
B) UDP
C) Both A and B
D) None of these
75.
bWhich layer uses error control mechanism in OSI?
76.
A)Network Layer
77.
b) Data Link Layer
78.
C) Tran spot Layer
79.
D) Application Layer
80.
ISDN is an exaple of
--------------------network
81.
A)Circuit
Switched Telephone Network
82.
B) Packet Switched Network
83.
C) Message Switched Network
84.
D) None of the above
85.
What is the maximum cable length of
STP
86.
A)300 m
87.
B) 200 m
88.
c) 100 m
89.
D) 150 m
90.
Application layer uses the following
protocols:
91.
A)SMTP
92.
B)FTP
93.
C)HTTP
94.
D)All of
the above
95.
To define style shee rules in header
section of the HTML document called
A) Externam Style Sheet
B) Internal Style Sheet
C) Inline style sheet
96.
None of the above
97.
The application server for Java Web
Application is
A) JBoss
B) Glassfish
C) Weblogic
98.
D)Tomcat
99.
The protocol used to send email from
one to another
100.
A)POP3
101.
B)HTTP
102.
c)SMTP
103.
D)FTP
104.
commonly used web application that
make use of AJAX
A) Google Map
B) Yahoo Maps
C) Gmail
105.
D)All of the above
106.
IIS stands for
A) International information Standards
B) International Information Services
C) Internet Information Standards
107.
D)Internet Information Services
108.
The attribute of an HTML tag can be used to uniquely identify any element within an HTML page is
The attribute of an HTML tag can be used to uniquely identify any element within an HTML page is
A) id
B) Title
C) Class
D) Style
109.
gA smalla area can use the following
network
A) LAN|
B) WAN
C) MAN
D) None of the above
110.
The attribute is used to specify the
URL of the document that occupies the inline frame
A) Frame
B) Sup
111.
c) Src
112.
D) Span
113.
HTML form control tag is
A) File select boxes
B) Text input controls
114.
c) Checkboxes Controls
115.
D)All of the above
116.
Client software that is used for
email retrieval
A) IMAP
B) HTTP
117.
C)DHCP
118.
D)ICMP
119.
bThe number of sub keys generated by
IDEA algorithm is
A) 64
B) 32
C) 54
D) 52
120.
---------------- is an example of
public key algorithm?
A) DES
121.
B)RSA
122.
C)IREA
123.
bD)RCS
124.
DSS Signature uses which hash
algorithm?
A) MD5
B) SHA-1
C) SHA-2
D) Does not use hash algorithm
125.
In asymmetric key cryptography the
private key is kept by
A) Sender
B) Receiver
C) Sender and receiver
D) Cryptoanalyst
126.
What is Data Encryption Standard
(DES) ?
A.
Block
Cipher
B.
Stream Cipher
C.
Bit Cipher
D.
None of the above
127.
In Cryptography , the order of the
letters in a message is rearranged by
A.
Transposition
Ciphers
B.
Substitution Ciphers
C.
Both A and B
D.
None of the above
128.
Using RSA algorithm, What is
the value of cipher text C, If the plain text M=5 and P=3 , q=11 and d=7
A.
24
B.
25
C.
26
D.
32
129.
---------------- is used for hiding
the payment information from the merchant
A.
SET
B.
SSL
C.
SHTTP
D.
TSP
130.
The URL Property belongs to which of
the following object?
A.
Document
B.
Element
C.
Location
D.
Event
131.
Which of the following attribute can
hold the JavaScript version?
A.
Language
B.
Script
C.
Version
D.
None of the above
132.
Which event occurs when user click
on an HTML element?
A.
onclick()
B.
onmouceclick()
C.
onchange()
D.
onmouseover
133.
<Script language
="javascript">
134.
function x()
135.
{
136.
Document.write(2+0+"4");
137.
}
138.
</scipt>
A.
204
B.
2
C.
Error
D.
24
139.
What is the value of $a and $b after
the function call ?
140.
<?php
141.
function doSomething(&$arg)
142.
{
143.
$fruit=$arg;
144.
$arg +=1;
145.
return $fruit;
146.
}
147.
$a=3;
148.
$b=doSomething($a);
149.
?>
A.
a is 3 and b is 4
B.
a is 4 and b is 3
C.
both are 3
D.
both are 4
150.
which version of PHP was added with
Exception handling?
A.
PHP 4
B.
PHP 5
C.
PHP 5.3
D.
PHP
151.
Which one of the following way can
you embed PHP code in an HTML page?
A.
<?php PHP code goes here ?>
B.
<?PHP code goes here?>
C.
<script
language="php"> PHP code goes here </script>
D.
All of the
above
152.
is php case sensitive?
153.
Referential Integrity is directly
related to
A.
Relation Key
B.
Foreign
Key
C.
Primary Key
D.
Candidate Key
154.
Consider a schema R(P,Q,R,S) and
functional dependencies P->Q and R->S. Then the decomposition
R1(P,Q) and R2(R,S) is
A.
Dependency Preserving and lossless
join
B.
Lossless join but not dependency
preserving
C.
Lossless Join
D.
Dependency
preserving but not lossless join
155.
The normalization if 1 NF relations
to 2NF involves
A.
Removal of full dependencies
B.
Removal of Transitive dependencies
C.
Removal of
partial dependencies
D.
Removal of multivalued dependencies
156.
157.
An attribute A of data type
Varchar(20) has the value "Ram". the attribure of data type char(20)
has value "Ramu". Here attribute A has --------- Spaces and attribute
B ahs ----------------- spaces.
- 3,4
- 20,4
- 20,20
- 3,20
162.
E-R model uses this symbol to
represent weak entity set.
163.
Dotted Rectangle
164.
Doubly Dotted Rectangle
165.
Double
lined Rectangle
166.
Rectangle
167.
Data mining is used to aid in
168.
Operational management
169.
analyzing past decision made by
managers
170.
detecting
patterns in operational data
171.
retrieving archival data
172.
------------- helps solve
concurrency problem
173.
two -phase commit
174.
transaction serializablity
175.
locking
176.
transaction monitor
177.
------------------cursor are
declared by ORACLE for each UPDATE, DELETE and INSERT SQL commands
178.
internal
179.
External
180.
Implicit
181.
Explicit
182.
183.
184.
No comments:
Post a Comment