Databases/Java/C++/SE Test Questions Set 1

1)   Database: In second normal form ______________________

a. A composite attributes is converted to individual attributes.
b. Non key attributes are functional dependent on key attributes.
c. The non key attributes functionally dependent on not a part of key attributes.
d. All the above.
Answer  Explanation 

ANSWER: Non key attributes are functional dependent on key attributes.

A table is said to be in the second normal form when all the non-key attributes are fully functional dependent on the primary key.

2)   Database: To avoid the problem of updating you can take the following principle for a good database design.

a. Unrelated data should be kept in different table.
b. Table should not contain any redundancy.
c. Table should represent constraint.
d. All the above
Answer  Explanation 

ANSWER: All the above

No explanation is available for this question!

3)   Database: Which is not a function of aggregate function?

a. Count
b. Avg
c. Create
d. Max
Answer  Explanation 

ANSWER: Create

The aggregate functions are used for calculation in the database. The create is a keyword used in dbms.

4)   Database: Which is the make given to the database management system which is able to handle full text data, image data, audio and video?

a. full media
b. graphics media
c. multimedia
d. hypertext
Answer  Explanation 

ANSWER: multimedia

multimedia is where there are collection of pictures,video,audio,text.

5)   Database: Which of the following fields in a student file can be used as a primary key?

a. class
b. Social Security Number
c. GPA
d. Major
Answer  Explanation 

ANSWER: Social Security Number

The primary key is a unique identifier and it is unique for each record. Here the social security number is unique as each student is identified by that and there will be no duplications.

6)   Database: A condition that led to the development of database was

a. A demand for more data to support information needs
b. An increase in the amount of data handled by organizations
c. The poliferation of data files
d. All of above
Answer  Explanation 

ANSWER: All of above

No explanation is available for this question!

7)   Java: A JDBC technology-based driver ("JDBC driver") makes it possible to do

a. Establish a connection with a data source
b. Send queries and update statements to the data source
c. Process the results
d. All mentioned above
Answer  Explanation 

ANSWER: All mentioned above

A JDBC Driver is a component which enable a java application to interact with a database.

8)   Java: In which model a Java applet or application talks directly to the data source?

a. Two-tier models
b. Three-tier models
c. Both A & B
d. None of the above
Answer  Explanation 

ANSWER: Two-tier models

A two-tier model is based on the client – server architecture. There is a direct communication between the client and server. It will run faster because of the tight coupling.

9)   Java: In which the JDBC type represents a "single precision" floating point number that supports seven digits of mantissa?

Answer  Explanation 


The corresponding SQL type REAL is defined in SQL-92 and is widely, though not universally, supported by the major databases. The SQL-92 standard leaves the precision of REAL up to the implementation.

10)   Java: The struts 2 framework is used to develop MVC- based web application

a. True
b. False

Answer  Explanation 


The struts 2 framework is a combination of webwork framework of open symphony and struts 1.

11)   Java: Which servlet does struts framework use?

a. EntryServlet
b. StrutsServlet
c. ActionServlet
d. BasicServlet
Answer  Explanation 

ANSWER: ActionServlet

The ActionServlet provides a "controller" in the Model-View-Controller (MVC) design pattern for web applications which is commonly known as "Model 2". Struts Flow start with ActionServlet then call to process() method of RequestProcessor.

12)   Java: Which is a component in AWT that can contain another components like buttons, textfields, labels etc.?

a. Window
b. Container
c. Panel
d. Frame
Answer  Explanation 

ANSWER: Container

A container is a component itself and it adds a capability to add a component to itself. A container can add only a component to itself.

13)   Java: AWT is used for GUI programming in java?

a. True
b. False

Answer  Explanation 


The AWT contains a large number of classes and methods which allows us to create and manage the windows GUI application. AWT is not only merely used because most of the GUI java programs are implemented using swing but but because of its rich implementation of the GUI controls and nature.

14)   ______________are used to format the data display in CPP?

a. Iterators
b. Punctuators
c. Manipulators
d. Allocators
Answer  Explanation 

ANSWER: Manipulators

Manipulators are functions which are specifically designed to be used with conjunction with the insertion (<<) and extraction (>>) operators. They are used to change the formatting parameters on streams and insert or extract certain special characters.

15)   Java: Predict the output:

int x = 786;
cout << setfill(‘*’) << setw(6) << x;

a. 786***
b. **786
c. ***786
d. ******
Answer  Explanation 

ANSWER: ***786

When set() manipulator is used, then output is right justified. So Out of 6 width, 3 are used by variable x and remaining 3 width (Spaces) are filled with char * due to setfill().

16)   Java: Generic pointers can be declared with__________

a. auto
b. void
c. asm
d. None of these
Answer  Explanation 

ANSWER: void

When a variable is declared as being a pointer to type void it is known as a generic pointer. We cannot have a void type of variable so the pointer will not point to any data and therefore it cannot be dereferenced. Still it is a pointer and to use it you just need to cast it to another kind of pointer.

17)   C++: During a class inheritance in CPP, if the visibility mode or mode of derivation is not provided, then by default visibility mode is___________.

a. public
b. protected
c. private
d. friend
Answer  Explanation 

ANSWER: private

The private keyword specifies that the members are accessible only from member functions and friends of the class.

18)   C++: The derivation of Child class from Base class is indicated by ____ symbol.

a. ::
b. :
c. ;
d. |
Answer  Explanation 


No explanation is available for this question!

19)   Software Engineering: Which model gives the overall reliability of the system that is projected and certified?

a. Sampling model
b. Component model
c. Certification model
d. Both A & B
Answer  Explanation 

ANSWER: Certification model

No explanation is available for this question!

20)   Software Engineering: Which subsystem implements a repository that encompasses the following elements?

1) Content database
2) Database capabilities
3) Configuration management functions

a. The publishing subsystem
b. The management subsystem
c. The collection subsystem
d. None of the above
Answer  Explanation 

ANSWER: The management subsystem

The content must be stored in a repository catalogued for subsequent acquisition and use and labelled to define 1) current status 2) appropriate version of the current object and 3) related content object. Therefore, we use the management system.

21)   Software Engineering: Abbreviate the term BSS.

a. Box Structure Specification
b. Box Statistical Specification
c. Box Statistical System
d. Box Structure Sampling
Answer  Explanation 

ANSWER: Box Structure Specification

The box structure provides a stepwise refinement and verification methodology for information system analysis and design. They are used for recording and decomposing requirement specification. It helps in making the requirement clear to readers,complete and provide an artifact that will enhance the tracebility of the requirements.

22)   Software Engineering: Each metric should be validated empirically in a wide variety of contexts before
being published and that are used to make decisions.

a. True
b. False

Answer  Explanation 


The above line is one of the metric principle.

23)   Software Engineering: Threat is the probability that can attack a specific type and it also occur within a given time.

a. Yes
b. No

Answer  Explanation 


No explanation is available for this question!

24)   Software Engineering: The Phases of formal review process are mentioned below. Arrange them in the correct order

i. Planning
ii. Review Meeting
iii. Rework
iv. Individual Preparations
v. Kick Off
vi. Follow Up

a. i,ii,iii,iv,v,vi
b. vi,i,ii,iii,iv,v
c. i,v,iv,ii,iii,vi
d. i,ii,iii,v,iv,vi
Answer  Explanation 

ANSWER: i,v,iv,ii,iii,vi

No explanation is available for this question!

25)   Software Engineering: What can static analysis NOT find?

a. the use of a variable before it has been defined
b. unreachable (“dead”) code
c. memory leaks
d. array bound violations
Answer  Explanation 

ANSWER: memory leaks

The static analysis is the analysis of a computer software that is performed without executing the programs.