Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
APTECH Computer Education Name: __________ Date: ____________ Test: 2100-DISM-JAVA 1___ is used to connect the Java Application with the Database. a:API b: DBMS c: JDBC d:JNS 2- ___ is responsible for ensuring that an application has a consistent and uniform access to any database. a: JDBC Driver b: Java Driver c: Oracle Driver d: ODBC driver. 3- Which driver type maps JDBC calls to the underlying network protocol, which in turn calls native methods on Server? a: Type I b: Type II c: Type III d: Type IV 4- Which of the following is/are the difference between processes and Threads? a: Unlike Processes, thread are not independent of one another. b: Unlike Processes, all threads can access every address in the task. c: Unlike Processes, threads are designed to assist one other. d: All of above. 5- Which of the following annotations indicates that compiler warnings should be shielded in the annotated element and all of its sub-elements? a: @Override b: @SuppressWarnings c: @Documented d: @Rentention 6- The wrapper classes are required for which of the following? 1: Compare Values in Objects. 2: Convert Values from one data type to another Value. a: 1,2 b: 2,3 c: 1,3 d: 1,2,3 3: Check the data type of a 7- The functions in the Math class can be classified as which of the following? 1: Power Function 2: Arithmetic function 3: Exponential Function 4: Logarithmic function. a: 1,2,3 b: 2,3,4 c: 1,3,4 d: 1,2,3,4 8- The read () method reads the next bytes of data from the input stream and returns an int value in the range of 0-32767. a: True b:False 9- Which of the following are the advantages of Generics? 1: It allows flexibility of dynamic binding. 2: Compiler detected errors are less time consuming to fix 3: The code reviews are simpler. a: 1,2 b: 2,3 c: 1,3 d: 1,2,3 10- Regular expressions help describing a pattern of text. a: True b: False. 11- Which of the following are the benefits of using Stored Procedure? 1: Reduced network Traffic 2: Enhanced hardware and software capabilities. 4: Centralized Control a: 1,2,3 b: 2,3,4 c:1,3,4 3: Increased Security d:1,2,3,4 12- Which of the following are static constant values that can be specified for the result set type? 1: TYPE_FORWARD_ONLY 2: TYPE_BACKWARD_ONLY 3: TYPE_SCROLL_SENSITIVE 4: TYPE_SCROLL_INSENSITIVE a: 1,2,3 b: 2,3,4 c: 1,3,4 d: 1,2,3,4 13- Java Security has evolved with which of the following versions? 1: JDK 1.0 2: JDK 1.1 3: JDK 2 a: 1,2 b: 2,3 c:1,3 d: 1,2,3 14- In the ____ operator, the object is an instance of a class and the type is a class type. a: InstanceOf Operator b: Object instanceOf type c: Assignment 15- Constructor overloading can be achieved with: a: Same number of parameters and different data types. b: Different number of parameters with same data type. c: Same number of parameters and data types. d: Different number of parameters with data types. 16- The advantages of instance Methods are: 1: Instance Methods can be overridden and overloaded. 2: Overridden instance method can have a different return type provided that the new type is a sub-class of the declared return type of the over ridden method. 3: Instance methods can only be accessed by using and instance of the class using the dot operator. 4: Static variables can be accessed from the instance methods. a: Statements 1,2,3 b:Statements 2,3,4 c: Statements 1,2,3,4 APTECH Computer Education 17- Java environment consist of the following elements: 1: Java Language 2: Byte code definition 3: Java Libraries 4: JVM Portable Compiler 7: Java Compiler a:1,3,5,6,7 b: 2,4,6,7 5: Structure of Class file 6: c: 1,2,3,4,5 18- Cipher objects are created using the __ method of the cipher class. a: setInstance() b: getInstance() c: createInstance() 19- The Cipher object is initialized by the ___ method. a: init() b: setInstance() c: getInstance() 20- Which of the following statement is false about Model-View-Controller architecture? a: The Model represents all the data and the various states of the component. b: The View depicts the graphical part on the screen. c: The Controller is responsible for determining whether the component should react to any input events from input devices such as the keyboard and mouse. d: A Model is bound to a specific View or Controller. 21- Which of the following are not the methods of JApplet class? 1: init() 2: start() 3: sleep() 4: paint() 5: exit() a: 1,2,3 b: 2,4,5 c: 4,5 d: 3,5 e: 1,2,4 22- A ___ is a text component which can display and edit text of type plain, HTML, RTF. a: JFormattedTextField b: JEditorPane c: JTextArea d: JTextField 23- The ___ method invokes the getPreferredSize() method of the frame to determine the best zize for laying out the components: a: getSize() b: setSize() c: preferredSize() d: pack() 24- The ___ Manager places the components in terms of rows and columns: a: GridLayout b: BorderLayout c: CardLayout d: FlowLayout 25- A __ is a class used to represent a menu on a menu bar. a: JMenuBar b: JMenu c: MenuBar d: JMenuItem. 26- Swing provides the ____ class to create filters: a: javax.swing.FileFilter b: javax.swing.filechooser.Filter c: javax.swing.filechooser.FileFilter 27- A __ is a dockable only if the container it belongs to has a BorderLayou layout manager. a: JToolBar b: JMenuBar c: JCheckBoxMenuItem d: JMenu 28- The __ method is used to make the toolbar dockable. a: setFloatable() b: setDockable() c: setDock() d: setToolDockable() 29- The currency of a particular country can be displayed in the correct format using __ class. a: MessageFormat b: NumberFormat c: CountryFormat d: Local 30- Java as a programming language, provides several layers of security control, int the __ layer, the class loader ensures that the class does not violate the access restriction. a: 1st Layer b: 2nd Layer c: 3rd Layer d: 4th Layer 31- To alter the flow of control, you can make use of the instructions to modify the local register. a: Browser b: Java Compiler c: Java interpreter d: Program Counter 32- A Converted java program byte code file can be executed across a network using a: a: Java Virtual Machine b: Browser c: JIT Compiler d: Microprocessor. 33- ___ are logical values that do not convert into any numerical representation. a: Integer literals b: Boolean literals c: Character literals d: Floating-point literals.