Download APTECH Computer Education

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
APTECH Computer Education
Name: __________
Date: ____________
Test: 2100-DISM-JAVA
1___ is used to connect the Java Application with the Database.
a:API
b: DBMS
c: JDBC d:JNS
2-
___ is responsible for ensuring that an application has a consistent and uniform access to any database. a:
JDBC Driver
b: Java Driver
c: Oracle Driver
d: ODBC driver.
3-
Which driver type maps JDBC calls to the underlying network protocol, which in turn calls native methods
on Server? a: Type I
b: Type II
c: Type III
d: Type IV
4-
Which of the following is/are the difference between processes and Threads?
a: Unlike Processes, thread are not independent of one another.
b: Unlike Processes, all threads can access every address in the task.
c: Unlike Processes, threads are designed to assist one other.
d: All of above.
5-
Which of the following annotations indicates that compiler warnings should be shielded in the annotated
element and all of its sub-elements? a: @Override
b: @SuppressWarnings c: @Documented d:
@Rentention
6- The wrapper classes are required for which of the following?
1: Compare Values in Objects.
2: Convert Values from one data type to another
Value. a: 1,2 b: 2,3 c: 1,3
d: 1,2,3
3: Check the data type of a
7- The functions in the Math class can be classified as which of the following?
1: Power Function
2: Arithmetic function
3: Exponential Function
4: Logarithmic function.
a: 1,2,3
b: 2,3,4
c: 1,3,4
d: 1,2,3,4
8-
The read () method reads the next bytes of data from the input stream and returns an int value in the range
of 0-32767. a: True
b:False
9- Which of the following are the advantages of Generics?
1: It allows flexibility of dynamic binding.
2: Compiler detected errors are less time consuming to fix
3: The code reviews are simpler. a: 1,2
b: 2,3 c: 1,3
d: 1,2,3
10- Regular expressions help describing a pattern of text. a: True b: False.
11- Which of the following are the benefits of using Stored Procedure?
1: Reduced network Traffic 2: Enhanced hardware and software capabilities.
4: Centralized Control
a: 1,2,3
b: 2,3,4
c:1,3,4
3: Increased Security
d:1,2,3,4
12- Which of the following are static constant values that can be specified for the result set type?
1: TYPE_FORWARD_ONLY
2: TYPE_BACKWARD_ONLY
3: TYPE_SCROLL_SENSITIVE
4: TYPE_SCROLL_INSENSITIVE a: 1,2,3
b: 2,3,4
c: 1,3,4
d: 1,2,3,4
13- Java Security has evolved with which of the following versions?
1: JDK 1.0
2: JDK 1.1
3: JDK 2 a: 1,2
b: 2,3
c:1,3
d: 1,2,3
14- In the ____ operator, the object is an instance of a class and the type is a class type.
a: InstanceOf Operator
b: Object instanceOf type c: Assignment
15- Constructor overloading can be achieved with:
a: Same number of parameters and different data types.
b: Different number of parameters with same data type.
c: Same number of parameters and data types.
d: Different number of parameters with data types.
16- The advantages of instance Methods are:
1: Instance Methods can be overridden and overloaded.
2: Overridden instance method can have a different return type provided that the new type is a sub-class of the
declared return type of the over ridden method.
3: Instance methods can only be accessed by using and instance of the class using the dot operator.
4: Static variables can be accessed from the instance methods.
a: Statements 1,2,3
b:Statements 2,3,4
c: Statements 1,2,3,4
APTECH Computer Education
17- Java environment consist of the following elements:
1: Java Language 2: Byte code definition
3: Java Libraries 4: JVM
Portable Compiler 7: Java Compiler
a:1,3,5,6,7
b: 2,4,6,7
5: Structure of Class file 6:
c: 1,2,3,4,5
18- Cipher objects are created using the __ method of the cipher class.
a: setInstance()
b: getInstance()
c: createInstance()
19- The Cipher object is initialized by the ___ method.
a: init()
b: setInstance()
c: getInstance()
20- Which of the following statement is false about Model-View-Controller architecture?
a: The Model represents all the data and the various states of the component.
b: The View depicts the graphical part on the screen.
c: The Controller is responsible for determining whether the component should react to any input events from input
devices such as the keyboard and mouse.
d: A Model is bound to a specific View or Controller.
21- Which of the following are not the methods of JApplet class?
1: init()
2: start() 3: sleep()
4: paint() 5: exit()
a: 1,2,3
b: 2,4,5
c: 4,5
d: 3,5 e: 1,2,4
22- A ___ is a text component which can display and edit text of type plain, HTML, RTF.
a: JFormattedTextField
b: JEditorPane c: JTextArea
d: JTextField
23- The ___ method invokes the getPreferredSize() method of the frame to determine the best zize for laying
out the components: a: getSize() b: setSize()
c: preferredSize() d: pack()
24- The ___ Manager places the components in terms of rows and columns:
a: GridLayout
b: BorderLayout c: CardLayout
d: FlowLayout
25- A __ is a class used to represent a menu on a menu bar.
a: JMenuBar b: JMenu
c: MenuBar
d: JMenuItem.
26- Swing provides the ____ class to create filters:
a: javax.swing.FileFilter
b: javax.swing.filechooser.Filter
c: javax.swing.filechooser.FileFilter
27- A __ is a dockable only if the container it belongs to has a BorderLayou layout manager.
a: JToolBar b: JMenuBar
c: JCheckBoxMenuItem d: JMenu
28- The __ method is used to make the toolbar dockable.
a: setFloatable()
b: setDockable()
c: setDock()
d: setToolDockable()
29- The currency of a particular country can be displayed in the correct format using __ class.
a: MessageFormat
b: NumberFormat c: CountryFormat d: Local
30- Java as a programming language, provides several layers of security control, int the __ layer, the class
loader ensures that the class does not violate the access restriction. a: 1st Layer b: 2nd Layer
c: 3rd
Layer d: 4th Layer
31- To alter the flow of control, you can make use of the instructions to modify the local register.
a: Browser b: Java Compiler
c: Java interpreter
d: Program Counter
32- A Converted java program byte code file can be executed across a network using a:
a: Java Virtual Machine
b: Browser
c: JIT Compiler
d: Microprocessor.
33- ___ are logical values that do not convert into any numerical representation.
a: Integer literals
b: Boolean literals c: Character literals
d: Floating-point literals.