Download APTECH Computer Education

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
APTECH Computer Education
Name: __________
Date: ____________
Test: 2100-DISM-JAVA
1___ is used to connect the Java Application with the Database.
a:API
b: DBMS
c: JDBC d:JNS
2-
___ is responsible for ensuring that an application has a consistent and uniform access to any database. a:
JDBC Driver
b: Java Driver
c: Oracle Driver
d: ODBC driver.
3-
Which driver type maps JDBC calls to the underlying network protocol, which in turn calls native methods
on Server? a: Type I
b: Type II
c: Type III
d: Type IV
4-
Which of the following is/are the difference between processes and Threads?
a: Unlike Processes, thread are not independent of one another.
b: Unlike Processes, all threads can access every address in the task.
c: Unlike Processes, threads are designed to assist one other.
d: All of above.
5-
Which of the following annotations indicates that compiler warnings should be shielded in the annotated
element and all of its sub-elements? a: @Override
b: @SuppressWarnings c: @Documented d:
@Rentention
6- The wrapper classes are required for which of the following?
1: Compare Values in Objects.
2: Convert Values from one data type to another
Value. a: 1,2 b: 2,3 c: 1,3
d: 1,2,3
3: Check the data type of a
7- The functions in the Math class can be classified as which of the following?
1: Power Function
2: Arithmetic function
3: Exponential Function
4: Logarithmic function.
a: 1,2,3
b: 2,3,4
c: 1,3,4
d: 1,2,3,4
8-
The read () method reads the next bytes of data from the input stream and returns an int value in the range
of 0-32767. a: True
b:False
9- Which of the following are the advantages of Generics?
1: It allows flexibility of dynamic binding.
2: Compiler detected errors are less time consuming to fix
3: The code reviews are simpler. a: 1,2
b: 2,3 c: 1,3
d: 1,2,3
10- Regular expressions help describing a pattern of text. a: True b: False.
11- Which of the following are the benefits of using Stored Procedure?
1: Reduced network Traffic 2: Enhanced hardware and software capabilities.
4: Centralized Control
a: 1,2,3
b: 2,3,4
c:1,3,4
3: Increased Security
d:1,2,3,4
12- Which of the following are static constant values that can be specified for the result set type?
1: TYPE_FORWARD_ONLY
2: TYPE_BACKWARD_ONLY
3: TYPE_SCROLL_SENSITIVE
4: TYPE_SCROLL_INSENSITIVE a: 1,2,3
b: 2,3,4
c: 1,3,4
d: 1,2,3,4
13- Java Security has evolved with which of the following versions?
1: JDK 1.0
2: JDK 1.1
3: JDK 2 a: 1,2
b: 2,3
c:1,3
d: 1,2,3
14- In the ____ operator, the object is an instance of a class and the type is a class type.
a: InstanceOf Operator
b: Object instanceOf type c: Assignment
15- Constructor overloading can be achieved with:
a: Same number of parameters and different data types.
b: Different number of parameters with same data type.
c: Same number of parameters and data types.
d: Different number of parameters with data types.
16- The advantages of instance Methods are:
1: Instance Methods can be overridden and overloaded.
2: Overridden instance method can have a different return type provided that the new type is a sub-class of the
declared return type of the over ridden method.
3: Instance methods can only be accessed by using and instance of the class using the dot operator.
4: Static variables can be accessed from the instance methods.
a: Statements 1,2,3
b:Statements 2,3,4
c: Statements 1,2,3,4
APTECH Computer Education
17- Java environment consist of the following elements:
1: Java Language 2: Byte code definition
3: Java Libraries 4: JVM
Portable Compiler 7: Java Compiler
a:1,3,5,6,7
b: 2,4,6,7
5: Structure of Class file 6:
c: 1,2,3,4,5
18- Cipher objects are created using the __ method of the cipher class.
a: setInstance()
b: getInstance()
c: createInstance()
19- The Cipher object is initialized by the ___ method.
a: init()
b: setInstance()
c: getInstance()
20- Which of the following statement is false about Model-View-Controller architecture?
a: The Model represents all the data and the various states of the component.
b: The View depicts the graphical part on the screen.
c: The Controller is responsible for determining whether the component should react to any input events from input
devices such as the keyboard and mouse.
d: A Model is bound to a specific View or Controller.
21- Which of the following are not the methods of JApplet class?
1: init()
2: start() 3: sleep()
4: paint() 5: exit()
a: 1,2,3
b: 2,4,5
c: 4,5
d: 3,5 e: 1,2,4
22- A ___ is a text component which can display and edit text of type plain, HTML, RTF.
a: JFormattedTextField
b: JEditorPane c: JTextArea
d: JTextField
23- The ___ method invokes the getPreferredSize() method of the frame to determine the best zize for laying
out the components: a: getSize() b: setSize()
c: preferredSize() d: pack()
24- The ___ Manager places the components in terms of rows and columns:
a: GridLayout
b: BorderLayout c: CardLayout
d: FlowLayout
25- A __ is a class used to represent a menu on a menu bar.
a: JMenuBar b: JMenu
c: MenuBar
d: JMenuItem.
26- Swing provides the ____ class to create filters:
a: javax.swing.FileFilter
b: javax.swing.filechooser.Filter
c: javax.swing.filechooser.FileFilter
27- A __ is a dockable only if the container it belongs to has a BorderLayou layout manager.
a: JToolBar b: JMenuBar
c: JCheckBoxMenuItem d: JMenu
28- The __ method is used to make the toolbar dockable.
a: setFloatable()
b: setDockable()
c: setDock()
d: setToolDockable()
29- The currency of a particular country can be displayed in the correct format using __ class.
a: MessageFormat
b: NumberFormat c: CountryFormat d: Local
30- Java as a programming language, provides several layers of security control, int the __ layer, the class
loader ensures that the class does not violate the access restriction. a: 1st Layer b: 2nd Layer
c: 3rd
Layer d: 4th Layer
31- To alter the flow of control, you can make use of the instructions to modify the local register.
a: Browser b: Java Compiler
c: Java interpreter
d: Program Counter
32- A Converted java program byte code file can be executed across a network using a:
a: Java Virtual Machine
b: Browser
c: JIT Compiler
d: Microprocessor.
33- ___ are logical values that do not convert into any numerical representation.
a: Integer literals
b: Boolean literals c: Character literals
d: Floating-point literals.