Maharashtra SET Computer Science Paper II April 2017 - Part 2

11.       The storage class specification in 'C' programming language is :
(A) Automatic
(B) Static
(C) External
(D) All of these
Answer: D
12.       After function has returned, the values stored in its local variables are copied into variables in the main function with the same name.
(A) True
(B) False
(C) Can't say
(D) Error
Answer: A
13.       If the variable of double type is converted into float, then :
(A) Truncation takes place
(B) The lower order bits are dropped
(C) Rounding takes place
(D) None of the above
Answer: C
14.       The programming language which has the capability to produce new data types, it is said to be :
(A) Extensible
(B) Encapsulated
(C) Reprehensible
(D) None of these
Answer: A
15.       A virtual function allows you to :
(A) Create a function that have no body.
(B) Create an array of type pointer to base calls that can hold pointers to derived class
(C) Group objects of different classes so, they can all be accessed by the same function code.
(D) Use the same function call to execute member function of objects from different classes.
Answer: D
16.       To perform look up operation using form, you have to :
(A) Search each form sequentially, until get the required.
(B) Type the key in entry line, and correct form is displayed.
(C) Enter the search value into form.
(D) Put the key and correct form is displayed.
Answer: *
17.       Consider the case that, a primary key is combined with foreign key, it will create :
(A) Many to many relationship between the table that connects them.
(B) Parent child relationship between the table that connects them.
(C) Network model between the tables.
(D) Hierarchical model between the tables.
Answer: B
18.       One of the following situations represents true network structure, which :
(A) allows many to many relationship
(B) indicates physical representation of data
(C) is conceptually simple
(D) is dominant database
Answer: A
19.       The third normal is adequate if the relation is having :
(A) non-composite and non-overlapped candidate keys
(B) non-composite candidate keys
(C) non-overlapped candidate keys
(D) multiple candidate keys
Answer: D
20.    An audit trial can be used for :
(A) recorded history of operations performed on file
(B) making back up copies
(C) making record copies
(D) restoring lost information
Answer: A

Pages   2   3   4   5 

Post a Comment