11. What
is the output of the following program ?
(Assume that the appropriate pre-processor
directives are included and there is no syntax error)
main()
{
char S[ ] = "ABCDEFGH";
printf ("%C",* (& S[3]));
printf ("%s", S+4);
printf ("%u", S);
/* Base address of S is 1000 */ }
(A) ABCDEFGH1000 (B) CDEFGH1000
(C) DDEFGHH1000 (D) DEFGH1000
Answer: D
12. Which
of the following, in C++, is inherited in a derived class from base class ?
(A) constructor (B) destructor
(C) data members (D) virtual methods
Answer: C
13. Given
that x=7.5, j=-1.0, n=1.0, m=2.0
the value of --x+j == x>n>=m is:
(A) 0 (B)
1
(C) 2 (D)
3
Answer: A
14. Which
of the following is incorrect in C++ ?
(A) When we write overloaded function we must
code the function for each usage.
(B) When we write function template we code
the function only once.
(C) It is difficult to debug macros
(D) Templates are more efficient than macros
Answer: Marks to All
15. When
the inheritance is private, the private methods in base class are..................
in the derived class (in C++).
(A) inaccessible (B) accessible
(C) protected (D)
public
Answer: A
16. An
Assertion is a predicate expressing a condition we wish database to always
satisfy. The correct syntax for Assertion is :
(A) CREATE ASSERTION ‘ASSERTION Name’ CHECK ‘Predicate’
(B) CREATE ASSERTION ‘ASSERTION NAME’
(C) CREATE ASSERTION, CHECK Predicate
(D) SELECT ASSERTION
Answer: A
17. Which
of the following concurrency protocol ensures both conflict serializability and
freedom from deadlock ?
(a) 2-phase Locking
(b) Time stamp - ordering
(A) Both (a) and (b) (B) (a) only
(C) (b) only (D)
Neither (a) nor (b)
Answer: C
18. Drop
Table cannot be used to drop a Table referenced by ..................
constraint.
(a) Primary key (b) Sub key (c)
Super key (d) Foreign key
(A) (a) (B)
(a), (b) and (c)
(C) (d) (D)
(a) and (d)
Answer: C
19. Database
applications were built directly on top of file system to overcome the
following drawbacks of using file-systems
(a) Data redundancy and inconsistency
(b) Difficulty in accessing Data
(c) Data isolation
(d) Integrity problems
(A) (a) (B) (a) and (d)
(C) (a), (b) and (c) (D) (a), (b), (c) and (d)
Answer: D
20. For
a weak entity set to be meaningful, it must be associated with another entity
set in combination with some of their attribute values, is called as :
(A) Neighbour Set (B) Strong Entity Set
(C) Owner entity set (D) Weak Set
Answer: C
0 Comments