Beruflich Dokumente
Kultur Dokumente
(Q.1) A router
(A) determines on which outgoing link a packet is to be forwarded.
(B) forwards a packet to the next free outgoing link.
(C) forwards a packet to all outgoing link, except the link upon which the packet is to be forwarded.
(D) forwards a packet to all outgoing links.
(Q.2) A computer network is
(A) one computer connected to a server.
(B) three interconnected computers and a set of hardware devices.
(C) two or more interconnected computers and a set of hardware devices.
(D) a computer connected to a printer.
(Q.3) To make all the data, programs and peripherals available to anyone on the network is known as
(A) cost factor.
(B) reliability. (C) communication medium. (D) resource sharing.
(Q.4) Computers that are attached to a network and seek to share the resources of the network are called
(A) non-dedicated servers.
(B) nodes.
(C) peripherals. (D) dedicated servers.
(Q.5) The rules followed by the computers on a network to communicate with one another are known as
(A) protocols.
(B) specifications.(C) interfaces. (D) prototypes.
(Q.6) Every machine on a TCP/IP network has a unique identifying number called an
(A) Interface Protocol address.
(B) Information Protocol address.
(C) Internet Protocol address.
(D) Informatics Protocol address.
(Q.7) The topology in which each node is connected to two and only two neighboring nodes is known as
(A) bus topology.
(B) linear topology. (C) ring topology.
(D) tree topology.
(Q.8) The topology in which we do not need to remove packets from the medium because when a signal reaches the end of
medium, it is absorbed by terminators, is known as
(A) mesh topology.
(B) graph topology.
(C) star topology.(D) tree topology.
(Q.9) A device that provides central connection point for cables from workstations, servers and peripherals is known as
(A) transmitter.
(B) concentrator.
(C) transceiver. (D) repeater.
(Q.10) A short-range wireless technology that is used for connecting and transferring information between devices such as
mobile phones, laptops, PCs, PDAs is known as
(A) bluetooth.
(B) satellite.
(C) radiowave.
(D) microwave.
(Q.11) The type of network that is to be used when an office situated in India has to communicate with its headquarters in
London is known as
(A) LAN.
(B) MAN.
(C) WAN.
(D) PAN.
(Q.12) To receive a network signal from one LAN terminal cable segment and to regenerate and retransmit the signal as it is
in its original strength over one or more cable segments is the main function of
(A) router.
(B) gateway.
(C) repeater.
(D) bridge.
(Q.13) When planning your network , it is important to
(A) purchase backup equipment for all network devices.
(B) choose products that are flexible in case you want to upgrade and expand your network in the future.
(C) install an additional telephone line for each PC in your network.
(D) choose the fastest cabling possible to ensure your network wont get obsolete within 2 years.
(Q.14) A distributed network configuration in which all data/information passes through a central computer is a
(A) bus network.
(B) ring network.
(C) star network.
(D) point-to-point network.
(Q.15) Internet is a/an
(A) local computer network.
(B) world wide network of computers.
(C) interconnected network of computers.
(D) world wide interconnected network of computers that uses a common protocol to communicate with one another.
(Q.16) Internet requires
(C) repeater.
(D) bridge.
(Q.24) An attack where the attacker tries to make some resource too busy to answer legitimate requests or deny legitimate
users to access your machine is known as
(A) snooping. (B) intruding.(C) eavesdropping.(D) denial of service (DoS).
(Q.25) If an organization plans to link its front office situated in the city in a hilly area where the cable connection is not
feasible, then the economic way to connect it with reasonably high speed would be
(A) radio wave transmission.
(B) microwave transmission.
(C) laser transmission.
(D) bluetooth.
(Q.26) The very high speed service to provide data connectivity between technical office located in Kolkata and the BPO
located in Ana Nagar would be (The wire distance between technical office in Kolkata and BPO office in Ana Nagar is 2450
km.)
(A) leased line. (B) co-axial cable network.(C) satellite connection.
(D) telephone line.
(Q.27) A company has offices spread within the range of 2000 km. A device that the company should use to connect all the
computers within each of its offices is a
(A) modem.
(B) telephone. (C) bridge.
(D) switch/hub.
(Q.28) A functional unit that interconnects two local area network (LAN) that use the same logical link control protocol but
may use different medium access control protocols is
(A) bridge.
(B) router.
(C)
repeater.
(D) modem.
(Q.29) Repeaters are of two kinds
(A) amplifier and signal repeater
(B) router and modem.
(C) rectifier and amplifier.
(D) bridge and gateway.
(Q.30) To communicate on an internetwork, we require
(A) name address.
(B) code address.
(C) IP address.
(Q.36) The network in which the devices are within the range of reachability is known as
(A) LAN.
(B) PAN.
(C) MAN.
(D) WAN.
(Q.37) Online messaging is also known as
(A) email.
(B) telnet.
(D) telnet.
(Q.45) A device that is used to segment networks into different sub networks is called
(A) hub.
(B) router.
(C) modem.
(D) switch.
(Q.46) A repeater is a device that
(A) transforms data.
(B) forwards packet.
(C) electrically amplifies the signal it receives and broadcasts it. (D) performs switching.
(Q.47) An example of transmission medium is
(A) modem.
(B) telephone lines.
(C) repeater.
(D) bridge.
(Q.48) The network device that connects two local-area networks is known as
(A) star.
(B) ring.(C) bridge.
(D) router.
(Q.49) A device that connects dissimilar networks is known as
(A) bridge.
(B) router.
(C) repeater.
(D) gateway.
(Q.51) A network device that connects multiple networks irrespective of their protocol is known as a
(A) gateway.
(B) bridge.
(C) router.
(D) hub.
(Q.52) An interconnected collection of autonomous computers is known as a
(A) network.
(B) server.
(C) node.
(D) gateway.
(Q.53) A network within a single building or a campus upto a few km in size is known as
(A) WAN.
(B) PAN.
(C) MAN.
(D) LAN.
(Q.54) When in a network each host is directly connected to other, then the network is known as
(A) bus.
(B) fully-connected.
(C) star.(D) tree.
(Q.55) Connecting two mobiles through bluetooth is an example of
(A) LAN.
(B) MAN.
(C) PAN.
(D) WAN.
(Q.56) The protocol that lets us upload and download material to and from a remote site is known as
(A) file transfer protocol.
(B) http.
(C) data link layer protocol.
(D) smtp.
(Q.57) The advantage of star topology is
(A) its problem diagnosis.
(B) long cable length.
(C) difficulty to expand.
(D) central node dependency.
(Q.58) One of the advantages of linear topology is
(A) its short cable length and simple wiring layout.
(C) the diagnosis of fault.
(Q.59) Another name for NIU is
(A) layer two address.
(C) network interface card.
(Q.60) The primary difference between a LAN, a MAN and a WAN is the
(A) number of nodes in the network.
(B) type of nodes in the network.
(C) distance between groups of nodes in a network.
(D) size of the organisation where the nodes exist.
(Q.61) A cable TV network is to be laid across the city. The most suitable network is
(A) LAN.
(B) WAN.
(C) PAN.
(D) MAN.
(Q.62) A LAN
(A) always contains more than 5 PCs.
(B) connects PCs to telephones.
(C) connects PCs and other computer devices within a small geographic area.
(D) always contains a server which houses centralised files.
(Q.63) Any electronic device on a network is called a
(A) node.
(B) hub.
(C) router.
(D) cable.
(Q.64) Ethernet
(A) is an internal company Internet, not accessible by outside users.
(B) requires its own operating system.
(C) is one of several methods by which information travels through a network.
(D) is not available for peer-to-peer networks.
(Q.65) The piece of equipment that installs in a PC and allows the PC to connect to a network is
(A) hub.
(B) access router.
(C) graphic accelerator card.
(D) NIC.
(Q.66) Remote access capabilities allow
(A) users to access network from remote locations.
(B) users to work with files located anywhere on the network.
(C) hackers to easy infiltrate important files.
(D) store files in a central server.
(Q.67) The most flexible network in which the devices are wired together is
(A) bus network.
(B) ring network.
(C) T-switched network.
(D) demodulation.
(Q.83) To connect two LANs that are physically separate but logically same is known as
(A) bridge.
(B) modem.
(C) router.
(D) repeater.
(Q.84) A network device which is used to interconnect computers and/or devices on a network is known as
(A) Ethernet.
(B) twisted-pair.
(C) repeater.
(D) switch.
(Q.85) Modulation techniques are
(A) SM, GM and TM.
(B) AM, PM and FM.
c) Node
(Q.93) How does a ring topology work? List its advantages and disadvantages.
(Q.94) Expand LAN, WAN and MAN.
(Q.95) What is a network?
(Q.96) Name the most common types of copper cabling.
(Q.97) Name the cable network to connect LANs.
(Q.98) Write the other name for Network Interface Unit.
(Q.99) Name the two types of servers.
(Q.100) What is MAC address.
(Q.101) Expand DNS.
(Q.102) Why do we use repeater?
(Q.103) What is a local area network.
(Q.104) Explain the term topology.
(Q.105) Name the communication channels used in wireless transmission.
(Q.106) What is a protocol?
(Q.107) What is a hub?
(Q.108) What is an IP address?
(Q.109) Differentiate between LAN and Internet.
(Q.110) Differentiate between WAN and MAN.
(Q.111) What is the difference between a LAN and MAN?
(Q.112) What is a Star Topology?
(Q.113) Define Denial of Service.
(Q.114) Write two advantages of Bus Topology.
(Q.115) Write five advantages of fibre optics.
(Q.116) Explain the following terms: nodes and server.
(Q.117) Give three advantages and two disadvantages of Ring Topology.
(Q.118) What are the advantages of setting up a local area network?
(Q.119) Write the different forms of DoS attacks.
(Q.120) Differentiate between gateway and router.
(Q.121) Define
a) Intrusion detection system.
b) Snooping.
(Q.122) Give two advantages and two disadvantages of the following network topologies:
a) Star
b) Tree
(Q.123) Describe modem. What is its function?
(Q.124) Define the term Network Topology. Describe any two topologies.
Ch 2 - Open Source Concepts
(Q.1) To represent the shapes that the characters can have when they are rendered is known as
(A) font.
(B) glyph.
(C) TTF.
(D) OTF.
(D) Linux.
(Q.5) The font in which the same file will work on Windows and Macintosh is
(A) Dynamic Font.
(B) Open Type Font.
(C) True Type Font.
(Q.6) LAMP is an acronym for
(A) Linux, Acrobat, MySQL, PHP.
(C) Linux, Apache, Mozilla, Python.
(D) MySQL.
(B) Keymaps.
(D) Indic Language Keymaps.
(C) W3C.
(Q.13) The software standards for World Wide Web are created by
(A) World Wide Web. (B) W3C.
(C) World Web Wide.
(D) FLOSS.
(D) W4C.
(D) ODF.
(D) Tomcat.
(Q.20) The web browser that Mozilla uses for MAC OSX is known as
(A) LAMP.
(B) W3C.
(C) Firefox.
(D) Carnino.
(D) .odc.
(C) .odl.
(C) WMA(Microsofts).
(D) JPEG.
(D) ISCII.
(D) ISCII.
(D) configuration.
(C) number.
(D) standard.
(D) .odc.
(C) PASCAL.
(D) HTML.
(D) LAMB.
(Q.44) The two PNGs that were created to improve upon and replace GIF and also to optimize the display of images on
internet are
(A) PNG-6 and PNG-23.
(B) PNG-7 and PNG-22.
(C) PNG-8 and PNG-24.
(D) PNG-8 and PNG-25.
(Q.45) Programming language specifically for server side applications and developing dynamic web content is
(A) PHP.
(B) Oracle.
(C) MySQL.
(D) Java.
(Q.46) The format in which the data is encoded in such a way that the file is only readable with the original software to create
it is
(A) proprietary. (B) closed.
(C) open.
(D) free.
(Q.47) A Java technology that allows developers to dynamically generate HTML or some other type of web page is
(A) JVM.
(B) JSP.
(C) Tomcat.
(D) Applet.
(Q.48) When we press the key horizontally adjacent to CapsLock on our keyboard, the letter a gets typed, is an example of
(A) Phonetic Text Entry.
(B) Keymap Based Text Entry.
(C) Indian Language Computing.
(D) Alphanumeric Text Entry.
(Q.49) When a program/process can split itself into two or more simultaneously running tasks, it is known as
(A) Structure.
(B) Threading. (C) Multithreading.
(D) Applet.
(Q.50) The fundamental part of an operating system which is responsible for providing secure access to machines hardware
and other resource to computer programs is
(A) CPU.
(B) RAM.
(C) Motherboard.
(D) Kernel.
(Q.51) A picture compression format which is very light and allows to determine the rate of data compression is
(A) GIF.
(B) Joint Photographic Expert Group.
(C) SVG.
(D) PNG.
(Q.52) Phonetic Text Entry is also known as
(A) translation. (B) transcription.
(C) transcription.
(Q.53) A free software is
(A) used under license.
(C) freely used, modified and redistributed.
(D) specific to a particular software distribution.
(Q.54) Open Source software is
(A) same as free software.
(B) same as FOSS.
(D) transliteration.
(B) payable.
(B) www.postgresql.org.
(D) www.mysql.org.
(B) http://jakarta.apache/tomcat.
(D) http://jakarta.apache.org/tomcat.
(C) www.php.net.
(D) htpp://www.php.org.
(D) BSD.
(D) W3C.
(D) W3C.
(D) DVI.
(C) video.
(D) audio.
10
(C) .ppt.
(D) .docx.
(C) .wma
(D) .wmv
(C) .ppt.
(D) .wmv.
(D) freeware.
(C) Applet.
(D) Tomcat.
(C) Applet.
(D) Tomcat.
(B) editor.
(D) paradigm.
(D) Mozilla.
(D) Linux.
(D) French script.
11
(Q.92) Data can be transported through many different systems without corruption with the help of
(A) ISCII.
(B) Unicode.
(C) ASCII.
(D) Alphanumeric code.
(Q.93) A function for a servlet container is
(A) SQL.
(B) MySQL.
(C) Tomcat.
(D) PHP.
(Q.94) The standards for which the users have to buy license to use them are
(A) open standards.
(B) proprietary standards.
(C) mixed standard.(D) free standard.
(Q.95) An example of proprietary standard is
(A) HTML.
(B) OGG.
(D) ASCII.
(D) Static.
(Q.100) What are the types of Indian Language Text Typing? Explain.
(Q.101) What do you mean by free software?
(Q.102) Explain the term ASCII in detail.
(Q.103) What do you mean by the term open source software?
(Q.104) What is Mozilla software used for?
(Q.105) What is Linux used for?
(Q.106) What is Apache used for?
(Q.107) What is Tomcat used for?
(Q.108) Expand the term: GNU.
(Q.109) Expand the term: SDLC.
(Q.110) What is MySQL software used for?
(Q.111) Define lossless format.
(Q.112) Define lossy format.
(Q.113) Explain the term ODF.
(Q.114) What do you mean by the term standard? What are the different types of standards?
(Q.115) What are the four kinds of freedom that are required by the users of the free software?
(Q.116) Alisha is familiar with the term 'web'. But she does not know about W3C. Explain W3C.
(Q.117) Ajit has been asked by his teacher to prepare one paragraph in static font and one in dynamic font. But he is
confused between the two. Explain static fonts and dynamic fonts. Give one example of each.
(Q.118) What do you mean by the term Ogg Vorbis?
(Q.119) Explain True Type Font in detail.
(Q.120) Explain Open Type Font in detail.
(Q.121) Vaibhav is confused between GNU and Unix. Is there any difference between the two or are they same? Explain
GNU in brief.
(Q.122) Explain the advantages of Open Standards.
(Q.123) What do you mean by free software?
(Q.124) What do you mean by the term open source software?
(Q.125) What is Mozilla software used for?
(Q.126) Explain the term ISCII in detail.
(Q.127) Explain freeware in detail.
(Q.128) Explain shareware in detail.
(Q.129) Write any 5 distribution terms of open source software.
(Q.130) What are the dangers of proprietary standards?
(Q.131) What are the various kinds of ODE file extensions and what are they used for?
(Q.132) Explain the term Indian Language Computing. What is the significance of Unicode in Indian Language Computing?
(Q.133) What is a font? Write the advantages and disadvantage of OTF?
12
13
(D) a: 0 b:9.
(D) w is 2.
(C) w is 25.0.
(D) 10 9 8 7 6.
(Q.17) The change to be done so that the following fragment prints out the even integers 0 2 4 6 8 10 are
for ( int j = 0; j <= 10;
)
System.out.print( j + " " );
System.out.println( );
(A) j+2.
(B) j = j+2.
(C) j++++.
(D) ++j++.
(Q.18) The output of the following code fragment is
for ( int j = 5; j > -5; j-- )
System.out.print( j + " " );
System.out.println( );
(A) -5 -4 -3 -2 -1 0.
(B) 5 4 3 2 1 0.
(C) 5 4 3 2 1 0 -1 -2 -3 -4 -5.
(D) 5 4 3 2 1 0 -1 -2 -3 -4.
(Q.19) The value placed in var is
var = 12 > 9 ? 0 : 1;
(A) 0.
(B) 1.
(C) 9.
(D) 12.
14
(D) -14.
(D) 0.
(D) 120.
(C) 9 8 7 6 5.
(D) 9 8 7 6 5 4.
(D) classes.
(Q.29) Window which contains all the components needed to create GUI application is (1Mark)
(A) Inspector window. (B) Code editor window. (C) Properties window. (D) Palette.
(Q.30) While drawing a control on the form, we first draw
(A) container control.
(B) child control.
(C) toolkit.
(Q.31) When a button is pushed,
(A) a message is generated.
(C) a key event is generated.
(D) swing.
(Q.32) The listener interface that gets activated when the user presses a key on the keyboard is
(A) ActionListener.
(B) KeyListener.
(C) ChangeListener.
(D) FocusListener.
(Q.33) Backspace, tab, carriage return etc. are examples of
(A) graphic characters(B) string characters(C) missing characters(D) non-graphic characters.
(Q.34) Unicode characters can be represented in
15
(A) 8 bits.
(B) 16 bits.
(C) 32 bits.
(D) 64 bits.
(Q.35)A method that returns text currently stored in a text based GUI component is
(A) getText( ). (B) parse( ) method.
(C) setText( ).
(D) returnText( ).
(Q.36) A component that displays an icon but that doesnt react to user clicks is
(A) textbox.
(B) label.
(C) list.
(D) table.
(Q.37) Swing components that do not rely on native GUI are referred to as
(A) lightweight components.(B) heavyweight components.(C) GUI components.(D) non-GUI components.
(Q.38) Java compiler translates Java source code into
(A) java bytecode.(B) machine code.
(C) assembly code.(D) another high-level language code.
(Q.39) Pressing a button generates a/an
(A) ItemEvent.
(B) MouseEvent.
(D) WindowListener.
(D) listener.
(D) control.
(C) compiler.
(D) bytecode.
16
(D) attributes.
(D) string.
(D) unicode.
(D) five.
(D) true.
(C) =
(D) =:
(C) x := 1;
(D) 1 := x;
(D) byte.
(C) 11.25.
(D) 12.
17
(C) 25 % 5.
(D) 37 % 6.
(Q.74)If we attempt to add an int, a byte, a long and a double, the result will be a(1Mark)
(A) byte.
(B) int.
(C) long.
(D) double.
(Q.75) A Java character is stored in
(A) one byte.
(B) two bytes.
(Q.77) A component that displays an icon but that doesnt react to user clicks is
(A) textbox.
(B) label.
(C) list.
(D) table.
(Q.78) A self contained graphic entity that can be customized is
(A) Swing component.(B) Swing container.
(C) Java Applets.
(D) Button.
(C) Swing.
(D) JComponent.
18
(D) * /
(C) Swing.
(D) JComponent.
Component
Widget
(Q.104) What is the value of i and j in the two cases given below:
a) i=7
j= i ++
b) i=8
j= --i
(Q.105) Explain the terms:
(a) Character Constant
(b) String Literal
(Q.106) Write steps to add event handler for Jbutton control.
(Q.107) What are operators? Name them.
(Q.108) How does while loop execution occur?
(Q.109) What are Literals. Name the literals allowed in Java.
(Q.110) What does a break statement do?
(Q.111) What is a fall through?
(Q.112) What are the characteristics of Java?
(Q.113) Describe the relationship between properties, methods and events.
(Q.114) What is a character set?
(Q.115) The do-while loop is an exit-controlled loop. Explain?
19
(Q.8) The option that allows multiple components to be arranged either vertical or horizontal is known as
(A) GridLayout Layout Manager.
(B) GridBagLayout Layout Manager.
(C) CardLayout Manager.
(D) BoxLayout Manager.
(Q.9) A component that lets the user pick a colour is a
(A) colour chooser.
(B) combo box. (C) list box.
(Q.10) A component that displays an icon, but doesnt react to user clicks is a
(A) textbox.
(B) label.
(C) list.
(D) table.
(Q.11) An object that can be set so that multiple items can be selected at the same time is a
(A) Combo Box.
(B) List.
(C) Radio Button.
(D) Tree.
(Q.12)Clicking the closing button on the upper-right corner of a frame generates a/an(1Mark)
(A) ItemEvent.
(B) WindowEvent.
(C) MouseMotionEvent. (D) ComponentEvent.
(Q.13) An associated object of a list that handles the list data is
20
(Q.14) Layout manager where components are given their preferred size is
(A) GridLayout.
(B) FlowLayout.
(C) BoxLayout.
(D) BorderLayout.
(Q.15) The type of control used to display list of values in a list is called
(A)pear shaped control(B)triangle shaped control(C)box shaped control(D)circle shape control
(Q.16) A JList object generates a/an
(A) Adjustment Event. (B) List Selection Listener.(C) Action Event.
(Q.19) The number of List Type controls used by java Swing API are
(A) 2.
(B) 3.
(C) 4.
(D) 5.
(Q.20) The mechanism to fire events at regular intervals is implemented through a/an (1Mark)
(A) List
(B) ComboBox. (C) Timer.
(D) Alarm.
(Q.21) Java offers timers through
(A) Swing API only.(B) util library only.
(Q.28) A control that provides a menu from which the user can choose one of several options is a
(A) Slider.
(B) Check Box.
(C) Combo Box.
(D) Password Field.
(Q.29) A combo box generates an Action Event when the user
(A) fixes a content.
(B) adds an item.
(C) removes an item.(D) makes a selection from it.
(Q.30) A method that responds to an event is
(A) an event handler.
(B) firing an event.
(C) an action.
(D) a listener.
21
(Q.33) A component that looks like a button and that, when pressed, brings up a menu of items for the user to choose from is
a/an
(A) Uneditable combo box.(B) Editable combo box.(C) Interactive Display.(D) Pop Up menu.
(Q.34) A class that provides a component that displays multiple lines of text and optionally allows the user to edit the text is
(A) JTextfield.
(B) editor pane.
(C) JTextArea.
(D) label.
(Q.35) A class that provides a component that displays multiple lines of text and optionally allows the user to edit the text is
(A) JTextfield.
(B) Editor pane.
(C) JTextArea.
(D) label.
(Q.36) The three important players in event handling mechanism are: Event Source, Event Handler of Event listener and
(A) Event Object.
(B) Class Object.
(C) Mouse Object.
(D) Listener.
(Q.37) A container that looks like a frame, but that appears within a real frame is known as
(A) an internal frame. (B) a mainframe.
(C) an externalframe.(D) an internalwindow.
(Q.38) Changing the state of an object is called an
(A) Event.
(B) Event handler.
(D) Source.
(D) Applet.
(D) FlowLayout.
(D) Java Foundation Classes.
(C) dot(.).
(D) blank.
22
(Q.60) The option that fills the line from left to right until no more components can fit is known as
(A) GridLayout Layout Manager.
(B) GridBagLayout Layout Manager.
(C) FlowLayout Layout Manager.
(D) BoxLayout Manager.
(Q.61) In java, an event is implemented as a/an
(A) mechanism.
(B) class.
(C) object.
(D) module.
(D) class.
(D) process.
(D) Open -> Frame.
(Q.67) If one wants to hide the frame, he/she has to click the
(A) open button.
(B) minimize button.
(C) close button.
(Q.68) In Java, size measurements are in
(A) points.
(B) twips.
(Q.69) Text field allows the user to enter the
(A) double line of text.(B) single line of text.
(C) units.
(C) line of a text.
(D) line.
(D) non-editable data.
23
(Q.72) The character that is displayed in place of text being entered is known as
(A) character.
(B) field.
(C) column.
(D) echochar.
(Q.73) After adding a password field, we can change the echo character by setting its(1Mark)
(A) password setting. (B) asterisk setting.
(C) echoChar property. (D) property.
(Q.74) The method which is used to set the echo character is known as
(A) Void setEchoChar(char).
(B) Char getEchoChar().
(C) Char[ ] getPassword().
(D) Void selectAll().
(Q.75) The method which is used to return the echo character is known as
(A) Void setEchoChar(char)
(B) Char getEchoChar()
(C) Char[ ] getPassword()
(D) Void selectAll()
(Q.76) Char[ ] getPassword() method is used to return the text displayed by
(A) password field.
(B) EchoChar. (C) getPassword.
(D) field.
(Q.77) A text area is an editing area for
(A) blocks.
(B) columns.
(C) rows.
(D) words.
(C) Rowcomponent.
24
(Q.5) One of the conventions of method-naming is that the method name should always begin with a\an
(A) noun.
(B) adjective.
(C) action.
(D) verb.
(Q.6) One of the conventions for method-naming is that
(A) there should not be a single capital letter at all.(B) start with special character.
(C) start with capital letter.
(D) start with lower case.
(Q.7) A method returns value through
(A) closing braces.
(B) return_value statement.(C) return statement.(D) value statement.
(Q.8) Static members are called by using
(A) field name.
(B) program name.
(Q.9) To access an instance member, we need to use dot operator with the
(A) object reference.
(B) class reference.
(C) class name.
(D) method name.
(Q.10) A class is created through the keyword
(A) class.
(B) create.
(C) using.
25
(B) objects.
(C) scope.
(D) class.
(Q.15) There is an Object which is passed by reference, but if you make any changes in the formal parameter, the changes
will not be reflected back to the actual parameter. This object is known as
(A) primitive data types.
(B) array.
(C) string.
(D) this.
(Q.16) A method that calls another method is called
(A) called method.
(B) declared method. (C) calling method.
(Q.17) A blue-print defining the characteristics (data items) and behaviour(methods) of a set of similar objects is called
(A) object.
(B) class.
(C) instance.
(D) data type.
(Q.18) The "new" operator requires a call to a/an
(A) object.
(B) constructor.
(C) destructor.
(D) pointer.
(D) module.
(D) constructor.
(Q.32) The difference between static variable and a static function is that a
26
(A) static variable has a function scope but the static function has a program scope
(B) static variable has a file scope but the static function has a program scope.
(C) static variable has a function scope but the static function has a file scope.
(D) static variable has a file scope but the static function has a function scope.
(Q.33) The benefit of using functions is
(A)reduced program size(B)non-readable to user(C)increased ambiguity(D)complex prog.handling
(Q.34) The variables that receive the incoming values in a function, are known as
(A) Actual parameters.(B) Formal parameters.(C) Functional parameters.(D) Global parameters
(Q.35) The non-parameterized constructor is called
(A) explicitly.
(B) automatically.
(C) forcefully.
(D) locally.
(D) many.
(Q.37) The difference between constructors and the other member function is that the(1Mark)
(A) constructors cannot be overloaded.
(B) constructors have a return type.
(C) constructors do not return any value.
(D) constructors are called explicitly.
(Q.38) A user-defined data type
(A) contain main method.
(B) do not contain main method.
(C) is same as primitive data type.
(D) is same as fundamental data type.
(Q.39) An application has a class
(A) containing main method.
(C) containing secondary method.
(C) function.
(D) object.
(Q.41)If I create an object of car type, then driving, moving, applying brake are its(1Mark)
(A) Classes.
(B) Data.
(C) Functions.
(D) Attributes.
(Q.42) Once a class is declared, we can create and declare variables of this class type, known as
(A) final.
(B) static.
(C) objects.
(D) functions.
(Q.43) In java, the composite data type is
(A) string.
(B) class.
(C) protected.
(D) default.
27
(A) final.
(B) public.
(C) static.
(D) create.
(Q.51) The class members are that members that are declared with
(A) non-static keyword.(B) static keyword.(C) public keyword.(D) private keyword.
(Q.52) In java, all primitive data types are
(A) passed by value.(B) passed by reference.(C) passed by object.(D) called by reference.
(Q.53) In java, all reference type data are passed by
(A) value.
(B) parameters.
(C) arguments.
(D) reference.
(D) value.
(D) fields.
(Q.57) There is an object named car of class vehicle with the colour, gears, power, length, width as
(A) features.
(B) functions.
(C) methods.
(D) attributes.
(Q.58) Final keyword is a
(A) parameter.
(B) method name.
(C) modifier.
(C) calls.
(Q.63) The data type that specify the empty set of values is
(A) \u0000.
(B) null.
(C) void.
(Q.64) Parameters that you can pass in a method are of
(A) one type.
(B) two types.
(C) null types.
(D) definitions.
(D) return.
(D) void types.
28
(Q.71) The data members that are usually maintained to store values common to the entire class are
(A) non-static members.(B) static data members.(C) initialized members.(D) abstract members.
(Q.72) A method may contain several
(A) return statement.(B) main( ) method.(C) other defined methods.(D) object.
(Q.73) The method terminates as soon as the
(A) continue statement is encountered. (B) break statement is encountered.
(C) semicolon is encountered.
(D) return statement is encountered.
(Q.74) In java, we do not need to create the object called
(A) this.
(B) string.
(C) class.
(D) array.
(D) Definition.
29
(A) delete().
(B) append().
(C) reverse().
(D) replace().
(D) 2147483648.
(Q.4) The method that returns the maximum number of characters that can be inserted in the string is
(A) capacity(). (B) length().
(C) setLength().
(D) maxString().
(Q.5) The public members of objects are accessed through
(A) # operator. (B) . operator.
(C) + operator.(D) operator.
(Q.6) Calendar.Date field stores numeric
(A) date.
(B) year.
(C) month.
(D) day.
(D) 1.0.
(D) 1.5.
(Q.13) We can change the length of a string in a StringBuffer object with the
(A) get() method.
(B) length() method. (C) set() method. (D) setLength() method.
(Q.14) When the StringBuffer objects length is longer than the String it holds, the extra character contains
(A) \u0000.
(B) \f0000.
(C) \a0000.
(D) \g0000.
(Q.15) The method that compares strings while ignoring case is
(A) compareTo().
(B) equalsIgnoreCase(). (C) compareIgnoreCase().(D) equalsCompareCase().
(Q.16) The operator alternative to concat() method is
(A) / operator. (B) - operator. (C) + operator.(D) \ operator.
(Q.17) To return a new string from the current string we can use
(A) + operator. (B) subString() method. (C) Trim() method.(D) - operator.
(Q.18) The method that is used to remove white spaces from both ends of the string is
(A) truncate(). (B) remove().
(C) trim().
(D) hide().
(Q.19) The method used to calculate absolute value of a number
(A) abs() method.
(B) absolute() method.(C) value() method.(D) floor() method.
(Q.20) To concatenate two strings, we can use
(A) capacity() method.(B) charAt() method.(C) valueOf() method.(D) concat() method.
(Q.21) For creating an object, it is mandatory to use new operator in
(A) StringBuffer class.(B) String class.(C) Object class.(D) Character class.
(Q.22) The compareTo() method compares two strings
(A) linearly.
(B) geometrically.
(C) lexicographically.
(D) geographically.
30
(D) Library.
(D) Object.
31
(D) Java.Math.
(C) Java.net.
(D) Java.awt.
(D) java.awt.
(C) Object.
(C) Packages.
(D) Java.
(D) Objects.
(D) class.
(Q.52) The term that refers to the process that set specified path of a user defined package is
(A) classpath.
(B) language.
(C) address.
(D) protocol.
(Q.53) The default access specifier of class members is
(A) Private.
(B) Public.
(C) Protected.
(D) Default.
(D) library.
(D) Current.
(D) Anonymous class.
(Q.58) If we do not want to insert a number in pow( ) method then we can use
(A) None
(B) NULL
(C) NaN
(Q.59) If we use setLength( ) method to specify a length shorter than its string, the string is
(A) appended.
(B) truncated.
(C) modified. (D) updated.
(Q.60) The class member that is accessible everywhere in the program is
(A) protected.
(B) private.
(C) default.
(D) public.
(Q.61) The objects of StringBuffer class can be
(A) deleted.
(B) detected.
(C) forwarded. (D) modified.
(Q.62) The StringBuffer object is more flexible than
(A) class object.
(B) io object.
(C) Character object.
32
(Q.63) Protected members can be accessed from within classes belonging to the same
(A) system.
(B) package.
(C) class.
(D) method.
(Q.64) A class is a collection of methods and
(A) fields.
(B) main() method.
(Q.65) Java is a
(A) case-sensitive language.
(C) non-case-sensitive.
(C) keywords.
(D) interfaces.
(D) default.
(D) this.
(D) characters.
(D) Block.
(Q.72) In StringBuffer class append( ) and insert( ) methods are overloaded and will call the
(A) toChar( ) method for all objects.
(B) String( ) method for all objects.
(C) StringBuffer( ) method for all objects.(D) toString( ) method for all objects.
(Q.73) In Java, API stands for
(A) ApplicationPackage Interface.
(C) Application Programming Interface.
(Q.74) Two classes in two different packages can have the same
(A) path.
(B) name.
(C) classpath.
(D) object.
33
(D) Class.
(Q.3) A class can implement as many as interfaces but can extend only one
(A) variable.
(B) function.
(C) interface.
(D) class.
(Q.4) Suppose there are three classes: Computer, Apple_Computer and IBM_Computer, the relationship between these
classes is
(A) Computer is the superclass; Apple_Computer and IBM_Computer are subclasses of Computer.
(B) IBMComputer is the superclass; AppleComputer and Computer are subclasses of IBMComputer.
(C) Computer, AppleComputer and IBMComputer are sibling classes.
(D) Computer is a superclass, AppleComputer is a subclass of Computer and IBMComputer is a subclass of AppleComputer.
(Q.5) The syntax to define a new class "Coke" based on the superclass "SoftDrink" is (1Mark)
(A) class Coke is a SoftDrink.
(B) class Coke implements SoftDrink.
(C) class Coke defines SoftDrink.
(D) class Coke extends SoftDrink.
(Q.6) constructors of a superclass are not inherited by
(A) base class.
(B) interface.
(C) abstract class.
(D) subclasses.
(Q.7) A class "Car" and its subclass "Honda_City" both have a method run() which was written by the programmer as a part
of the class definition. If "junker" refers to an object of type "Honda_City", then the statement that is true for junker.show(); is
(A) show() method defined in "Honda_City" will be called.
(B) show() method defined in "Car" will be called.
(C) the compiler will complain that run() has been defined twice.
(D) overloading will be used to pick run().
(Q.8) The feature of java that shows the real world model is
(A) inheritance.
(B) abstract class.
(C) interface.
34
(D) multiple.
(Q.14) The syntax to call the variable of a superclass if the superclass and subclass both have the same signature is
(A) super.hiddenVariable.
(B) super.methodName. (C) sub.hiddenVariable (D) subr.Method.
(Q.15) A final class cannot be
(A) overwritten.
(D) superclass.
(D) classes.
35
(D) Object.
(B) variable.
(D) document.
(D) variable.
36
(B) methods.
(D) only variables not the member function.
(Q.44) A class Animal has a subclass Mammal. So, we can say that
(A) Mammal can have no subclasses.
(B) Mammal can have no siblings.
(C) Animal can have only one subclass. (D) Mammal can have no other parent than Animal.
(Q.45) In java class hierarchy, the root of the tree is
(A) class.
(B) base class.
(C) derive class.
(D) object.
(Q.49) In java, a class can inherit the property of its higher class, this property is known as
(A)additive property(B) transitive property(C) transparent property(D) visible property.
(Q.50)When same name of variable and method comes in class, this property is known as(1Mark)
(A) overloading.
(B) overmethod.
(C) overribbing.
(D) overriding.
(Q.51) The final variables are
(A) static.
(B) dynamic.
(C) correct.
(D) define.
(C) interface.
(D) abstract.
(D) class.
37
(A) overriding.
(B) abstract.
(C) interface.
(D) overloading.
(Q.64) A superclass variable hides, when superclass variable and subclass variable have there
(A) name.
(B) no name.
(C) same name.
(D) definition.
(Q.65) A superclass method overrides when a superclass & a subclass method have
(A) same name.
(B) same signature.
(C) different name.
(D) definition.
(Q.66) An object can refer to itself by using
(A) super keyword.
(B) interface keyword.
(Q.68) Way to make general classes into more specific classes is known as
(A) overriding.
(B) inheritance.
(C) overloading.
(D) class.
(Q.69) A concrete superclass is the one whose objects
(A) can be declared & created. (B) cannot be declared.
(C) can be created.
(D) cannot be declared & created.
(Q.70) The feature which we use to control the access of the data member and member function is known as
(A) Access specifier.
(B) Controllers. (C) Limits.
(D) Control specifier.
(Q.71) While at the time of defining the interface, you need to replace the keyword class with
(A) abstract.
(B) implement.
(C) final.
(D) interface.
(Q.72) The modifier which we cannot change should be declared as
(A) private.
(B) public static final.
(C) default.
(D) public.
(Q.73) Define inheritance.
(Q.74) What is the primary purpose of inheritance?
(Q.75) Define base class.
(Q.76) How do you prevent a subclass from having access to a member of a superclass?(1Mark)
(Q.77) Brief the concept of overriding.
(Q.78) What is the use of super keyword?
(Q.79) Define the use of implement keyword.
(Q.80) What is an abstract class?
(Q.81) What is the use of specifiers of superclass members that are not accessible to a subclass?
(Q.82) Define the signature of a method.
(Q.83) Write the use of this() and super() with constructors.
(Q.84) Define concrete classes.
(Q.85) Explain the relation between base class and derive class.
(Q.86) Write the difference between interface and abstract class?
(Q.87) How can I get the superclass to call back to a method in the subclass?
(Q.88) A class "abc" inherits from a class "xyz". Write syntax to define the class "abc".
(Q.89) How can we prevent a class from being extended?
(Q.90) How many objects per class can you declare in a java program?
(Q.91) How does constructor and destructor works in inheritance?
(Q.92) How does an interface is different from a class?
(Q.93) Discuss interface with syntax.
(Q.94) What are the advantages and disadvantages of an interface?
(Q.95) What are the benefits of inheritance?
(Q.96) What type of inheritance does Java have? Also illustrate the concept of function overloading with the help of an
example.
(Q.97) What is the difference between an abstract class and an interface?
(Q.98) Can we explicitly inherit from the Object class?
(Q.99) How can I call an overridden method in the superclass?
(Q.100) Write the difference between overloading and overriding method.
38
(Q.101) Define access specifier in java and State the significance of public, private, protected and default modifiers or
specifiers.
(Q.102) Explain the concept of Hierarchical Inheritance with example.
GUI Dialogs and Tables
(Q.1) If the returned value equals JOptionPane.YES_Option, it means
(A) NO button was pressed.
(B) the user closed the dialog without using a button.
(C) CANCEL button was pressed.(D) YES button was pressed.
(Q.2) If the returned value equals JOptionPane.CLOSED_Option, it means
(A) the user closed the dialog without using a button.(B) YES button was pressed.
(C) NO button was pressed.
(D) CANCEL button was pressed.
(Q.3) If the returned value equals JOptionPane.OK_Option, it means
(A) YES button was pressed.
(B) OK button was pressed.
(C) CANCEL button was pressed.(D) that the user closed the dialog without using a button.
(Q.4) Addition or removal of rows in a table are performed through the object called (1Mark)
(A) DefaultTable.
(B) TableModel.
(C) DefaultModel.
(D) DefaultTableModel.
(Q.5) Dialogs are not
(A) accessible.
(B) volatile.
(D) JConfirmDialog.
(Q.8) Dialog box which blocks all user interactions with other application windows until it is finished
(A) Option dialog.
(B) Modeless dialog.
(C) Dialog.
(D) Modal dialog.
(Q.9) The most flexible dialog is a
(A) Message dialog.
(B) Confirm dialog.
(Q.10) The predefined dialog type of JOptionPane class that does not return anything is known as
(A) showOptionDialog. (B) showInputDialog.
(C) showConfirmDialog.(D) showMessageDialog.
(Q.11)The method which is used to return the cell value at row & column in JTable is(1Mark)
(A) getValueAt().
(B) getCellAt().
(C) getAccessAt().
(D) getValue().
(Q.12) The statement that is used to access JOptionPane class is
(A) export.
(B) import.
(C) run.
(D) execute.
(Q.13) A dialog box that is used to display informative messages to the user is
(A) Message dialog box.(B) Input dialog. (C) Option dialog.
(D) Confirm dialog.
(Q.14) JOptionPane class is available in
(A) java.swingx.package.(B) javax.swing.*; package.(C) javax.package.(D) swing.java.package.
(Q.15) A simple message dialog box has
(A) two buttons.
(B) more than one button.
39
(A) Jdialog.
(B) JOptionPane.
(C) JcolorChooser.
(Q.19) A method that displays a modal dialog with one button which is labelled is
(A) showMessageDialog()(B) showInputDialog().(C) showConfirmDialog().(D) showOptionDialog().
(Q.20) A dialog with empty text field,
(A) showMessageDialog()(B) showInputDialog()(C) showConfirmDialog()(D) showOptionDialog().
(Q.21)When one of the showXxxDialog methods returns an integer, the possible value is(1Mark)
(A) Null_Option.
(B) Show_Option.
(C) Closed_Option.
(D) Confirm_Option.
(Q.22) The other name for JOptionPane is
(A) alerts.
(B) panel.
(D) 2.
(D) 2.
(C) JOptionChooser.
(D) JDialog.
(D) JOptionDialog.
(D) JColorChooser.
40
(Q.38) Like JTree, the component that relies on a separate model object to hold and represent the data it displays is a
(A) Jlist.
(B) JButton.
(C) JTable.
(D) Table Model.
(Q.39) When you use DefaultTableModel, you must
(A) create java table.
(B) apply javax.swing package.
(C) export javax.defaulttableModel.
(D) import javax.swing.table package.
(Q.40) The area which allows the user to provide a response that can be taken through JtextField, JcomboBox or Jlist is
(A) Icon area. (B) Input area.
(C) Message area.
(D) Button area.
(Q.41) Dialog boxes can be
(A) regular or interval type.
(C) modal and modeless type.
(D) Table.
(D) disappear().
41
(C) IBM.
(D) Oracle.
(Q.4) first( )
42
(A) moves the cursor forward one row.(B) moves cursor to first row in the ResultSet object.
(C) moves cursor relative to its current position.
(D) retrieves the current row number the cursor is pointing at.
(Q.5) last( )
(A) positions the cursor on the rno-th row of the ResultSet object.
(B) moves cursor relative to its current position.
(C) moves cursor to first row in the ResultSet object.
(D) moves cursor to last row in the ResultSet object.
(Q.6) The method of a ResultSet that shows the status of ResultSet object is known as(1Mark)
(A) stmt().
(B) conn().
(C) executeQuery().
(D) getResultSet().
(Q.7) The most popular programming interface for accessing relational database is
(A) JDBC.
(B) JVM.
(C) ODBC.
(D) XML.
(Q.8) JDBC stands for
(A) Java Database Connectivity.
(C) Java Digital Base Connector.
(C) Class()
(D) Class.forName()
(Q.16) The type of driver which acts as a bridge access to a database and which was previously accessed via ODBC is
known as
(A) jdbc.odbc bridge.
(B) odbc bridge.(C) jdbc bridge. (D) Jdk bridge.
(Q.17) JDBC
(A) helps in communication between networks.(B) establishes a connection with a database.
(C) is the name of the class.
(D) is a transmission medium.
(Q.18) MySQL provides connectivity for client applications developed in Java programming language via a JDBC driver,
known as
(A) MySQL Connector/J.
(B) Java API.
(C) ODBC API. (D) Driver Manager.
(Q.19) Class offers the method that is used to register the driver with DriverManager, known as
(A) Name().
(B) forClass().
(C) forName().
(D) Name.for().
(Q.20) MySQL databases URL is framed as
43
(A) jdbc://mysql://database-name.
(B) jdbc://mysql://database-name?username.
(C) jdbc://mysql://database-name?password.
(D) jdbc://mysql://localhost/database-name? user = username &password = password.
(Q.21) If the result-set contains multiple rows, then to retrieve data from all rows of the record-set, we use
(A) location.
(B) row numbers.
(C) loops.
(D) connections.
(Q.22)If we have an INSERT/DELETE/UPDATE query, then the method we need to invoke is (1Mark)
(A) < statement - object >.executeQuery()
(B) < statement - object >.executeUpdate()
(C) executeObject()
(D) < statement - object >.updateQuery()
(Q.23) The first step to make a JDBC connection is to
(A) get the connection.
(B) create a database connection.
(C) create a query.
(D) register the database driver.
(Q.24) Syntax for the statement that can be used to update the database is
(A) Statement = con.createStatement(); (B) Statement stmt = createStatement();
(C) Statement stmt = con.Statement(); (D) Statement stmt = con.createStatement();
(Q.25) Update and Insert query can be executed by
(A) processUpdate()
(B) update()
(C) runUdate() (D) executeUpdate()
(Q.26) To execute one static SQL statement, we use
(A) Result object.
(B) First object. (C) Set object. (D) Statement object.
(Q.27) The syntax to open a database is
(A) DriverManager.getConnection(jdbc:mysql://localhost:3306/school, "root" , "Pooja");
(B) DriverManager.getConnection(jdbc:mysql://localhost:3306/school,root ,Pooja);
(C) DriverManager.getConnection(jdbc:mysql://localhost:3306/school, "root" , "Pooja");
(D) DriverManager.getConnection(jdbc:mysql://localhost:3306/school,"root" ,"Pooja");
(Q.28) Two commonly used drivers to connect MySQL from Java are:
(A) Java.sql.Driver and com.jdbc.driver. (B) Java.Driver and com.mysqldriver.
(C) Java.sql and com.mysql.jdbc..
(D) Java.sql.Driver and com.mysql.jdbc.driver.
(Q.29) One of the class in JDBC API hierarchy is
(A) MySQL class.
(B) ODBC class.
44
(Q.38) executeUpdate( )
(A) modifies statements.
(B) produces single result set.
(C) executes Update, Insert or delete statements.
(D) executes statements that return more than one result set.
(Q.39) Execute( )
(A) executes statements that return more than one result set.
(B) modifies statements.
(C) produces single result set.
(D) executes Update, Insert or delete statements.
(Q.40) Once a connection to the database has been establish, we can use the connection object to
(A) create statements. (B) create objects.
(C) create function.
(D) create class.
(Q.41) A command in SQL which returns multiple results is
(A) execute().
(B) run().
(C) process().
(Q.42) The executeQuery( ) returns a single
(A) Query.
(B) Value.
(D) query().
(D) Column.
(D) connection.
45
(D) execute.
(Q.55)To establish connection between Java & MySQL, we need a software that is called(1Mark)
(A) SQL Connector.
(B) MySQL Connector/J.
(C) J Connector.
(D) MM Connector/J.
(Q.56) The method used to close all database resources is
(A) close( ).
(B) rs.next( ).
(C) first( ).
(D) last( ).
(D) javapackage;
(Q.1) The series of numbers representing a Web address are better known as
(A) URL.
(B) HTTP.
(C) URI.
(D) IP address.
46
(Q.4) A hyperlink is a
(A) very fast internet connection.(B) words or images that reference other electronic files.
(C) type of error message.
(D) video game.
(Q.5) A URL
(A) stores video clips.
(C) identifies the location of an electronic file.
(D) Perl.
(C) http:/.
(D) WWW.
47
(A) browsing.
(B) blogging.
(D) Protocol.
48
(C) Hubs.
(D) Clients.
(Q.38) The term for a machine that contacts a server for information is
(A) Client.
(B) Master.
(C) Host.
(D) Slave.
(Q.39) Internet has been around for a few decades, but the Web was invented in
(A) 1992.
(B) 1990.
(C) 1989.
(D) 1991.
(Q.40) A request send for a PHP page from a client is passed to
(A) PHP interpreter.
(B) JSP interpreter.
(C) Developer. (D) Server Side Include.
(Q.41) A Web browser
(A) requests, interprets and displays Web pages.(B) works as a tool to design Web pages.
(C) delivers Web pages.
(D) runs gateway programs.
(Q.42) Commonly used program to create Web pages is
(A) Notepad.
(B) Power point.(C) Adobe Reader.
(Q.43) Browser developed from Mozilla is
(A) Internet Explorer.
(B) Firefox.
(C) Safari.
(D) Paint.
(D) Lynx.
(Q.44) Fast and stable browser that is compatible with most relatively operating systems is
(A) Lynx.
(B) Opera.
(C) Firefox.
(D) Internet Explorer.
(Q.45) The browser retrieves code, usually written in
(A) HTML.
(B) HTTP.
(C) FTP.
(D) SMTP.
(D) URI.
(Q.48) A document created by web server whenever a browser requests the document is (1Mark)
(A) dynamic.
(B) static.
(C) active.
(D) inactive.
(Q.49) Dynamic documents are sometimes referred to as
(A) client-side document.
(B) server-side dynamic document.
(C) static web pages.
(D) active web pages.
(Q.50) The interpreter processes the PHP code and generates an output, which is
(A) static.
(B) dynamic.
(C) active.
(D) inactive.
(Q.51) A repository of information linked together from points all over the world is (1Mark)
(A) World Wide Web.
(B) Hyper Text Transfer Protocol.
(C) Hyper Text Markup Language.
(D) Uniform Resource Locator.
(Q.52) Dynamic documents are sometimes referred to as
(A) HTML pages.(B) Active documents.(C) Server-side dynamic documents.(D) Static documents.
(Q.53) A technology that creates and handles dynamic documents is
(A) GIC.
(B) CGI.
(C) GCI.
(D) AGI.
49
(C) FTTP.
(D) HTML.
(D) HTTP.
(Q.61) If one plans to transfer files on a regular basis, then one should use
(A) FTP sockets.
(B) FTP client. (C) HTTP interface.
(D) SMTP storehouse.
(Q.62) The web browser program sends a request to
(A) another browser.(B) web administrator.(C) local machine.(D) web server.
(Q.63) In HTTP communications, the role Web browser plays is
(A) as a client. (B) as a server. (C) as a host. (D) as a protocol.
(Q.64) Client-side scripting programs are executed by
(A) Web browser before making a HTTP request.
(B) Web server after receiving a HTTP request, but before HTML is generated.
(C) Web browser after receiving a HTTP response containing HTML.
(D) Web server after generating HTML but before sending a HTTP response.
(Q.65) PHP stands for
(A)Private Home Page(B)Personal Hypertext Processor(C)Public Home Page(D)Personal Home Page.
(Q.66) A fixed-content document that is created and stored in a server is a
(A) dynamic document. (B) static document.
(C) active document.
(D) client document.
(Q.67) The World Wide Web is a massive collection of web sites, all hosted on
(A) Computers.
(B) Internet.
(C) World Wide Web. (D) A network.
(Q.68) Document that is created by a Web server whenever a browser requests the document is
(A) static.
(B) dynamic.
(C) active.
(D) inactive.
(Q.69) One way to create an active document is to use
(A) CGI.
(B) URL.
(C) Java applets.
(Q.70) WWW is the acronym of the
(A) Web World Wide. (B) World Wide Webpage.
(D) state.
(D) HTTP.
(D) comma(,).
50
(C) way.
(D) RSS.
(C) IBM.
(D) INTEL.
(C) web.
(Q.89) The protocol used for the Web client to talk to the server is
(A) HTML.
(B) HTTP.
(C) CGI.
(D) Perl.
51
(Q.94) The feature common in CGI, SSI, ASP and servlets is that they can/are
(A) execute on the client or the server for maximum flexibility.
(B) execute on the server and interact with other server programs.
(C) easy and quick to learn.
(D) efficient and scale well as the number of visitors to site increases.
(Q.95) HTML is an acronym of
(A) High Tech Markup Language.
(C) Hyper Text Markup Language.
(Q.96) Telnet is a
(A) telephone network.
(C) standard Internet protocol for remote login.
52
(C) eg.
(D) en.
(Q.5) Rahul desires to code in html. He wants the title to be displayed in his browsers window. The html tag that he should
use is
(A) < head >. (B) < title >.
(C) < caption >.
(D) < p >.
(Q.6) Shikha wants to make the body text appear 70 pixels away from top edge of the page. The correct attribute to be used
is
(A) < body margin:top = 70 >.
(B) < topmargin >70< /topmargin >.
(C) < body style=70:topmargin >.
(D) < body topmargin = 70 >.
(Q.7) Rajeev wants to make the text appear in center. The correct HTML tag is
(A) < body style = center >.
(B) < center > The text is centralized< /center >.
(C) < /center > The text is centralized < center >.
(D) < centralized > The text is centralized < /centralized >.
(Q.8) Rohan has prepared an article. He wants that the text should be displayed exactly ( i.e., with all the tabs, blank lines
etc. ) in the same way as he has typed in the HTML code. The HTML tag that needs to be used by Rohan is
(A) < br >< /br >.
(B) < p >< /p >.
(C) < p align = center >.(D) < pre >< /pre >.
(Q.9) Abha wants to change the color, style and size of the text, which she has created in HTML. The correct tag to achieve
this is
(A) < font > tag.
(B) < style > tag.
(C) < size > tag. (D) < color > tag.
(Q.10) Siddharth is creating a web site with the help of html codes. He wants the text that appears on the website to be
either in Georgia or Bookman Old Style font. The attribute which he should use is
(A) < font style = Georgia; Bookman Old Style >.
(B) < font type = Georgia, Bookman Old Style >.
(C) < font face = Georgia, Bookman Old Style >.
(D) < font text = Georgia; Bookman Old Style >.
(Q.11) Priyanka is preparing some questions for the students of her class to make them understand the concept of the
HTML. She desires to have a horizontal line of size 4 and width 40% drawn after each question. The correct HTML code to
accomplish this is
(A) < horizontal = size:4 , width =40% >.
(B) < horizontal> size= 4, width =40% < /horizontal >.
(C) < hr size = 4 width = 40% >.
(D) < hr > size = 4 , width = 40% < /hr >.
(Q.12) The attribute that specifies a horizontal line to be rendered in one solid color (noshaded), instead of a shaded color, is
known as
(A) unshade attribute. (B) noshade attribute.(C) nonshaded attribute.(D) shading attribute.
53
(Q.13) Bela has Windows XP installed on her computer. She wants to create a first page using the HTML code. She is
confused with the steps to open the text editor, which in this case is notepad. The correct steps are
(A) Start
Run
Programs
Microsoft Office.
(B) Start
Settings
Taskbar
Notepad.
(C) Start
Programs
Accessories
Notepad.
(D) Start
Accessories Programs
Notepad.
(Q.14) Raghav has created a first page in HTML code. He clicks at File
Save command. Then, he selects the desired
folder. The file name chosen by him is trial. The extension that is to be used by him so as to save it properly is
(A) trial.swf.
(B) trial.avi.
(C) trial.xml.
(D) trial.htm.
(Q.15) Rita is coding for the first time in HTML. She has read the various HTML tags. The general form that she should use
for her HTML document is
(A) < head >
< title > < /head >
< /title >
(B) < html >
< head >
< title > < /title >< /head >
< body >< /body >< /html >
(C) < html >
< body >
< title > < /title >< /body >
< head >< /head >< /html >
(D) < head >
< body >
< /body >
< /head >
< html >
< /html >
(Q.16) Aditya has been practicing the html tags. He has worked on the tags like < i>, < p >, < br >, < hr >, < h1 >< h6 >.
Now he wants to define the text as strong. The statement that he wants to make it appear as strong is Life is beautiful. The
correct html tag to achieve this is
(A) < s > Life is beautiful < /s >.
(B) < strong > Life is beautiful < /strong >.
(C) < h > Life is beautiful < /h >.
(D) < div > Life is beautiful < /div >.
(Q.17) Abhay is taking a quiz on html basics. The first question that appears on screen, asks him to mark the correct option
out of the four options with html tags. The correct option is
(A) < strong > This is a test on html < /strong >.(B) < /b > This is a test on html < /b >.
(C) < strong > This is a test on html < strong >. (D) < b > This is a test on html < b >.
(Q.18) Rajat is preparing an html document. He wants a title should appear on the browser of the title bar. The < title >
should be placed in the
(A) body section.
(B) CSS section.
(C) footer section.
(D) head section.
(Q.19) Abhinav wants to code in html. He knows about the tag to be used to make his text appear in 3D horizontal rule. The
correct attribute that he should use to make the text in 2D is
(A) < horizontal size = 36 2d >.
(B) < hr size = 36 noshade >.
(C) < horizontal size = 36 noshade >.
(D) < hr size = 36 2d >.
(Q.20) Amisha wants to display one horizontal rule of width 40% and the other horizontal rule of width 70% after a line break,
in her html document. The correct format is
(A) < horizontal width = 40% , 70%> < br >.
(B) < hr width = 40%, br, 70% >.
(C) < br/ >< hr width = 40 %, 70% >.
(D)< hr width = 40% >< br >< hr width = 70% >.
(Q.21) Ritika wants to write a chemical reaction in an html code. The correct html tag that should be used by her to type
H2O is
(A) H < SUP > 2 < /SUP >.
(B) H < HR > 2 < /HR >.
(C) H < PRE > 2 < /PRE >.
(D) H < SUB > 2 < /SUB >.
(Q.22) Misha wants to change the background color of her webpage. The html tag that needs to be applied to the bgcolor
attribute so as to change the background color her webpage is
(A) < pre >.
(B) < body >.
(C) < head >.
(D) < title >.
(Q.23) Sangeeta wishes to write an equation of mathematics using html code. However, she wants the comments to be
added so that the equation can be understood by everyone without any guidance. The proper syntax to start an HTML
comment is
(A) < comment >.
(B) < ! comment >.
(C) < --! >.
(D) < !-- >.
(Q.24) Rita is preparing a question in mathematics, which includes a greater than symbol. But since this symbol has a
special meaning in html, the correct way to include greater than symbol is
(A) < !- - greater >.
(B) < & greater >.
(C) & gt.
(D) < & gt >.
(Q.25) The textual content that appears in the source HTML document but is not rendered by the browser is known as
54
(A) message.
(B) footer.
(C) title.
(D) comment.
(Q.26) Akash wants the background color to be in black color and the text to be in yellow. The correct format to achieve this
is
(A) < body style = background color: black, text: yellow >.
(B) < body bgcolor= black, text = yellow >.
(C) < body bgcolor=black text=yellow >.
(D) < bgcolor=black text=yellow >.
(Q.27) Ankur has written a paragraph using html. Now he wants the heading of the article should appear on largest font. The
heading should be in
(A) < h6 >.
(B) < h1 >.
(C) < h4 >.
(D) < h2 >.
(Q.28) Anurag wants the top margin of his document
should be set to 60. The correct format that should be used by him is
(A)<topmargin=60 >(B)< margin =top,60 >(C)< body margin=top,60 >(D)< body topmargin = 60 >
(Q.29) BASEFONT is an example of
(A) empty element.
(B) container element. (C) twin element.(D) pair element.
(Q.30) The < hr > tag is used inside
(A) < head >.
(B) < title >.
(D)<hn>.
(Q.40) HTML is
(A)case-sensitive(B)not case-sensitive(C)programming language(D) desktop publishing solution
(Q.41) For header information, we use
(A) < header > tag.
(B) < heading > tag.
(Q.42) The html tag used to display the text in the browsers window is
(A) < br/ >.
(B) < head >.
(C) < title >.
55
(Q.43) The elements that require a starting as well as ending tags, is known as
(A) empty elements.(B) enclosed elements.
(C) container elements. (D) conditional elements.
(Q.44) The elements that require a starting tag and not an ending tag is known as
(A) empty elements.(B) container elements.(C) conditional elements.(D) enclosed elements.
(Q.45) To mark the beginning and end of an HTML document, we use
(A) < html > and < /html > tags.
(B) < title > and < /title > tags.
(C) < htm > and < /htm > tags.
(D) < head > and < /head > tags.
(Q.46) To specify the text direction for the content in an element, we use
(A) lang attribute.(B) directory attribute.(C) dir attribute.(D) text attribute.
(Q.47) The text that we type between < p > and < /p > tags is by default
(A) centre aligned.
(B) left aligned. (C) right aligned.
(D) bottom aligned.
(Q.48) The value of # FFFFFF is
(A) black.
(B) red. (C) green.
(D) white.
(D) white.
(Q.50) The attribute to change the font type of the text we want to display is
(A) basefont. (B) font.(C) face.
(D) header.
(Q.51) If no font-name given in the list is supported by the browser, then the browser renders the text in
(A) arial font.
(B) verdana font.
(C) default font. (D) georgia.
(Q.52) Browser does not recognize
(A) fonts.
(B) paragraphs.
(C) tabs.
(D) headings.
(D) teal.
(Q.55) The blank area left from the edge of a page is known as
(A) column.
(B) margin.
(C) row.
(D) tag.
(Q.56) The default size of horizontal rule is
(A) 3 pixels.
(B) 5 pixels.
(C) 8 pixels.
(D) 7 pixels.
(Q.57)One of the many tiny dots that make up the display on the computer is known as (1Mark)
(A) point.
(B) character.
(C) element.
(D) pixel.
(Q.58) The two types of size attributes are
(A) short and long.(B) float and short.(C) long and float.(D) absolute and relative.
(Q.59) The correct html tag to make a text italic is
(A) < i >.
(B) < italic >.
(C) < italicize >.
(Q.62) The two types of styles for individual words or sentences are
(A)outer and inner(B)logical and abstract(C)logical and physical.(D) abstract and physical.
56
(Q.63) The element that only has a starting tag and not an ending tag is
(A) < html >.
(B) < p >.
(C) < br >.
(D) < head >.
(Q.64) In the < hr > tag, the default rule is
(A) 1-D.
(B) 2-D.
(C) 3-D.
(D) noshade.
(Q.69) To define the basic font size, the tag used is known as
(A) font.
(B) size.
(C) basefont.
(D) face.
(Q.70) The tag that identifies the document as an html document is known as
(A) < title >.
(B) < html >.
(C) < body >.
(D) < head >.
(Q.71) The tags that require a starting as well as ending tag are called
(A) empty elements.
(B) twin elements.
(C) pair elements.(D) container elements.
(Q.72) The text styles that are handled in its own way by the browsers are known as (1Mark)
(A) physical.
(B) logical.
(C) abstract.
(D) virtual.
(Q.73) The syntax of the heading element is
(A) < h >.
(B) < head >.
(C) pixel.
(Q.76) To break a text flow and insert the horizontal rule, the tag used is
(A) < br >.
(B) < break >.
(C) < text >.
(Q.77) The maximum characters that a title can have
(A) 72.
(B) 69.
(C) 23.
(Q.78) The attribute that sets the background graphics of body tag is known as
(A) bgcolor.
(B) background.
(C) body.
(Q.79) The length of an attribute value is limited to
(A) 1024 characters.
(B) 1125 characters.
(C) 1124 characters.
(D) margin.
(D) graphics.
57
58
(Q.8) Amit wants to create a list that contains different cars. But he wants the list items should have letters starting with A.
To achieve this, he should use
(A) < ol >.
(B) < ol type = A >.
(C) < ul type = A >.
(D) < ul >.
(Q.9) Ashita wants to create a list that contains various kinds of drinks. But she wants the list items should have bullets
rather than numbers or letters. To achieve this, she needs
(A) < ol >.
(B) < disc >.
(C) < ul >.
(D) < square >.
(Q.10) Ajay is creating a table in HTML. He is familiar with the tags in table like < td >, < th >, < tr > etc. Now, he wants to
give some amount of space between cell border and the cell contents. The correct attribute to achieve this is
(A) align.
(B) cellpadding.
(C) cellspacing. (D) valign
(Q.11) Reena is creating a table in HTML. She is familiar with the tags in table like < td >, < th >, < tr > etc. Now, she wants
to give some amount of space between cells. The correct attribute to achieve this is
(A) align.
(B) cellpadding.
(C) cellspacing.
(D) valign
(Q.12) Ayesha wants to specify the height of the table as 90 and width of the table as 45. Also, she wants the border of size
4. The correct HTML code is
(A) < table border = 4 ht = 90, width = 45 >.(B) < table border = 4 height = 90, width = 45 >.
(C) < table border = 4 height, width = 90, 45 >.
(D) < tr border = 4 height = 90, width = 45 >.
(Q.13) Sujit is creating a table. He wants the background color of his table to be aqua along with the border as 1. The
correct syntax for introducing the color in the background is
(A)< th border = 1 bgcolor = aqua >.
(B) < td border = 1 background = aqua >.
(C) < table border = 1 bgcolor = aqua >.
(D) <table border =1 background=aqua >.
(Q.14) Sneha is learning to create tables in HTML. She needs to write a caption as First Page for her table. The correct
way is
(A) < caption >First Page< /caption >.
(B) < title >First Page < /title >.
(C) < p >First Page < /p >.
(D) < head >First Page< /head >.
(Q.15) Rajeev wants the thickness of the table border to be 4. The syntax which he should use to achieve this is
(A) <th border=4>(B) <table bgborder=4>(C)<table border=4>(D)<td border=4 >.
(Q.16) The form attribute that specifies the target page where the result of script will be displayed is known as
(A) name.
(B) enctype.
(C) method.
(D) target.
(Q.17) Ashish wants to make use of some control which helps him to select only one or two options out of many options
available. The appropriate control is
(A) radio box.
(B) checkbox. (C) drop down box.
(D) button.
(Q.18) Manan is working on tables. He wants to left-align the content inside a table-cell. The correct HTML code line is
(A)<td valign=left>(B) < tdleft >.(C) < td align = left >.(D) < td leftalign >.
(Q.19) Mamta wants to create a frame such that top and bottom edges of the border are displayed. The correct HTML code
line is
(A) < table border = 1 frame = lhs >. (B) < table border = 1 frame = hsides >.
(C) < table border = 1 frame = above >.(D) < table border = 1 frame = vsides >.
(Q.20) Mahima wants to create a frame such that only the top edge of the border is displayed. The correct HTML code line is
(A) < table border = 1 frame = lhs >. (B) < table border = 1 frame = hsides >.
(C) < table border = 1 frame = above >.(D) < table border = 1 frame = abvside >.
(Q.21) Resham wants to display borders between rows only in the table. The correct HTML code line is
(A) < table border = 1 type = rows > (B) < table border = 1 compact = rows >
(C) < table border = 1 rules = rows > (D) < table border = 1 type = rows >
(Q.22) Shilpa is using the frame attribute for the first time. She wants the table border to be 2 and only the horizontal sides
of her frame should be displayed. The correct syntax is
(A) < table border = 2 frame = horizontal >.(B) < table border = 2 sides = hframe >.
59
(Q.23) Ranjeet wants to show some computer options that may fit on the same line as the start of the definition. The attribute
to be used is
(A) start attribute.
(B) compact attribute. (C) dir attribute. (D) lang attribute.
(Q.24) Naina wants to display a table with border as 1 and the color of the border as teal. The correct HTML code line is
(A) < table border = 1 color >.
(B) < table border = 1 color = teal >.
(C) < table color = teal >.
(D) < table border = 1 bordercolor = teal >.
(Q.25) Damanjeet wants to give a border to her HTML table. The correct HTML code to display a border 3 for her table is
(A) < table> border = 3 </table >.
(B) < table border = 3 >.
(C) < td > border 3 < /td >.
(D) < tr > border 3 < /tr >.
(Q.26) Pinki wants to insert a new table row. The correct tag to be used is
(A) < table row >.
(B) < th >.
(C) < td >.
(D) < tr >.
(Q.27) Manisha wants to create an HTML table. She is searching for the correct table tag that should be used to mention the
title in the table. The correct table tag is
(A) < bt >.
(B) < I >.
(C) < caption >.
(D) < br >.
(Q.28) Rashi is taking the test on HTML. The first question that appears on her screen is: The two attributes for < ol > are
(A) dir and lang attribute.
(B) start and type attribute.
(C) type and underline attribute. (D) dir and start attribute.
(Q.29) Pooja desires to create an HTML code using < ul > tag in such a way that the list items have either squares or circles
before them. The attribute of < ul > tag that needs to be used is
(A) dir attribute. (B) lang attribute.
(C) type attribute.
(D) underline attribute.
(Q.30)Priya has to prepare a list of guests to be invited in the party. She wants that all names should have bullets before
them. The tag that can be used to accomplish this is(1Mark)
(A) < un >.
(B) < ul >.
(C) < uo >.
(D) < ol >.
(Q.31) The indented list without any bullet symbol or any number in front of each item is known as
(A) ordered list.
(B) unordered list.
(C) text list.
(D) definition list.
(Q.32) ROWSPAN and COLSPAN attributes are used to
(A) specify the span of a cell.
(B) delete rows and columns.
(C) edit rows and columns.
(D) insert rows and columns.
(Q.33) A list that lists the items with bullets is
(A) < list >.
(B) < dl >.
(Q.34) . Ramesh has to prepare an assignment on the basic types of lists in HTML. They are
(A)data list, number list, order list(B)data definition, number definition, order definition
(C)ordered list, unordered list, definition list(D)basic list, advanced list, logical list.
(Q.35) Khushboo wants to have the caption as Colors in her HTML table. The correct syntax is
(A) < title > Colors < /title >.
(B) < caption > Colors < /caption >.
(C) < caption Colors >.
(D) < title Caption >.
(Q.36) Every HTML document must include the tags
(A) < html > < /html > & < body > < /body >.
(B) < body > < /body > & at least one < p >.
(C) < html > < /html > & < head > < /head >.
(D) < title >< /title > & < p> < /p >.
(Q.37) Resham wants to display borders between rows only in the table. The correct HTML code line is
(A) < table border = 1 type = rows > (B) < table border = 1 compact = rows >
(C) < table border = 1 rules = rows > (D) < table border = 1 type = rows >
(Q.38) The tag that starts a table cell is
60
(Q.39) Asha is creating her first table in HTML. The correct table tags are
(A) < table >< tr > < tt >.
(B) < thead > < body > < tr >.
(C) < table > < tr > < td >.
(D) < table > < head > < tfoot >.
(Q.40) A list that lists the items with numbers is defined as
(A) < list >.
(B) < dl >.
(C) < ol >.
(D) controls.
(Q.55) To specify how the browser should encode the data before it sends it to the server, we use
(A) name.
(B) enctype attribute.
(C) target attribute.
(D) action attribute.
(Q.56) To send the form information in the HTTP environment, the value we use is
(A) GET.
(B) TARGET.
(C) POST.
(D) FORM.
61
(Q.57)The control that allows user to create a single-line input control is known as (1Mark)
(A) TEXTAREA.
(B) RADIOBOX.
(C) MENU.
(D) INPUT.
(Q.58) The character that is displayed on the password forms when the user inputs characters is
(A) + character.
(B) * an asterisk.
(C) - character.(D) A random character.
(Q.59)To add a border to table, the tag in which the BORDER attribute is specified is(1Mark)
(A) table.
(B) thead.
(C) tfoot.
(D) tborder.
(Q.60) To specify a summary of the content of a table, we use
(A) type attribute.
(B) dir attribute. (C) summary attribute. (D) lang attribute.
(Q.61) The border = 6 would set the border
(A) around the cell to 6 percent.
(B) around the cell to 6 pixels.
(C) inside the table to 6 percent.
(D) around the table to 6 pixels.
(Q.62) To specify the beginning of a tables row, we use
(A) tablerow.
(B) tr.
(C) td.
(D) th.
(Q.63) The attributes for < textarea > tag are
(A) name and size.
(B) cols and size.(C) name and type.(D) name, columns and rows.
(Q.64) The two valid attributes of radiobox are
(A) name and size.
(B) checked and name. (C) value and size.(D) checked and size.
(Q.65) < DT > stands for
(A) Data term.
(B) Description term.
(Q.68) If we want to give the amount of space between the cell border and the cell contents, we use
(A)compact attribute(B)cellspacing attribute(C)cellpadding attribute(D)center attribute.
(Q.69) Valign is used to
(A) align a cells contents.(B) align a table.(C) align the border.(D) align the table row.
(Q.70) List inside another list is known as
(A) hierarchical list.(B) sequential list.(C) multiple list.(D) nested list.
(Q.71) A two sided tag is
(A) < dt >.
(B) < li >.
(Q.72)The HTML codes that control the appearance of document contents are known as(1Mark)
(A) tags.
(B) slashes.
(C) properties. (D) attributes.
(Q.73) The two table dimension tags are
(A) < tl > and < tw >.(B) < tr > and < td >.(C) < td > and < rd >.(D) < tr > and < tl >.
(Q.74) The attribute of < option > is
(A) size.
(B) label.
(C) method.
(D) number.
(Q.75) To open a new form as per the URL specified in action attribute, we use
(A) FORM.
(B) GET.
(C) SET.
(D) POST.
(Q.76) The attribute used for checkboxes is:
(A) check.
(B) checkb.
(D) checkbox.
62
(Q.77) The HTML code line : < td height = 25 > < /td >
(A) sets the height of the table to 25 pixels.(B) sets the height of the cell to 25 pixels.
(C) sets the width to 25 pixels.
(D) sets the length of the table to 25 pixels.
(Q.78) BGCOLOR attribute of < table >
(A) specifies a background color for the cell
(B) specifies a background image for the cell.
(C) specifies a background color for the table.
(D) specifies a background image for the table.
(Q.79) BACKGROUND attribute of < table >
(A)specifies a background color for the cell(B) specifies a background image for the table.
(C)specifies a background image for the cell(D) specifies a background image for the table.
(Q.80) The default alignment of < td > tag is
(A) right.
(B) justified.
(C) center.
(D) left.
(Q.81) What are the three basic types of lists in HTML?
(Q.82) Define definition list.
(Q.83) Differentiate between check box and radio button control?
(Q.84) Define unnumbered list.
(Q.85) Define numbered list.
(Q.86) Name the two attributes of < ol > tag.
(Q.87) Define the term Tables in HTML.
(Q.88) Write the HTML code line to display border 2 of a table.
(Q.89) What is used for the Frame attribute of < table >?
(Q.90) Name the attribute of < TABLE > tag which is used to deal with the inside border edges.
(Q.91) Name the attribute of < TABLE > tag that is used to specify the color of tables border.
(Q.92) Name the attribute to add a background color to a table.
(Q.93) Write the full form of < TH > tag.
(Q.94) Name the attribute of < DL > tag. Define the attribute.
(Q.95) Differentiate between cellspacing and cellpadding.
(Q.96) Explain align attribute of the < table > tag. What values can it have?
(Q.97) What is the full form of < DD > tag in Definition list? Define the terms:
a < THEAD >
b < TFOOT >
c. < TBODY >
(Q.98) Name the various control types in HTML.
(Q.99) Define checkbox. Write its syntax.
(Q.100) Explain Select box Control.
(Q.101) What are Radio Buttons? Name 4 attributes of radiobox.
(Q.102) Define forms in HTML.
(Q.103) Differentiate between < ul > and < ol > tags.
(Q.104) Explain the role of using type attribute in Unordered Lists?
(Q.105) Identify the error(s) in the following HTML code. Also write the correct code.
< OL > type = a start = d
(Q.106) Explain table. What are the basic commands for creating a table?
(Q.107) How can we set text area in a form?
(Q.108) Explain 'SELECT tag'?
(Q.109) Explain the processing of form data when the form is submitted.
(Q.110) What for rowspan and colspan are used? Give one example.
(Q.111) Explain summary attribute. Give an example.
XML - eXtensible Markup Language
(Q.1) Jason works in the technical department for a music store, which has branches all over the world. He is writing a code
for audio collection and he wants to include comments in his code. Comments are inserted to XML to
(A) design the file.(B) break document into sections.(C) have fun.(D) processing.
(Q.2) Raghu is a fresher, he has been asked to take an online test at CSC so as to test his knowledge. The full-form of XML
is
(A)eXperts Marked Language
(B) eXtended Markup Language.
(C) eXpanded Marked Language.
(D) eXtensible Markup Language.
63
(Q.3) Anjali wants to become an expert in markup languages. She has an expertise in HTML. Now, she wants to learn XML.
But before she starts with the coding, she desires to have a brief introduction about it. The ancestor of XML is
(A) SXML.
(B) SGML.
(C) SML.
(D) DHTML.
(Q.4) Neha has read in brief about SGML and now she is learning XML. She is not aware of the relation between the two
languages. XML is a
(A) subset of SGML.
(B) superset of SGML.(C) complexset of SGML.(D) minorset of SGML.
(Q.5) Siddharth wants to use a markup language that will help him displaying the output in the browser. The language that is
about displaying information is
(A) XML.
(B) SGML.
(C) HTML.
(D) SQL.
(Q.6) Ashi has created a code in XML for a book store. She wants to see how it appears in the browser. The step/steps
involved to view an XML document are
(A) XML >> browser.(B) XML >> style-sheet >> browser.(C) XML >> HTML >> browser.(D) browser.
(Q.7) Madhavs teacher has asked him to use XML to write a code for students who are participating in the Summer Camp
along with the tags of his choice. XML is
(A) designed to display data.
(B) designed to be self-descriptive.
(C) platform dependent.
(D) inextensible.
(Q.8) Shikha wants to use a markup language, i.e., HTML for writing a program on Computer Parts. But her friend suggested
her to write in XML as XML is
(A)platform independent(B)inextensible(C) designed to display data.(D) exactly same as HTML.
(Q.9) Nija is a renowned chef at Hotel Taj. She wants to write the code for preparing pakoras using a markup language,
wherein she can choose the tags according to her choice. We can create tags of our own choice in
(A) HTML.
(B) DHTML.
(C) SQL.
(D) XML.
(Q.10) Madhavi wants to use a markup language where the tags < parts >, < Parts > and < PARTS > are treated as different
cases. Tags are case-sensitive in
(A) HTML.
(B) XML.
(C) SQL.
(D) PLSQL.
(Q.11) Sanjana has coded in XML. But she does not know what all is required to view the output in web browser. To process
an XML document on web, we need
(A) only css or xsl.(B) only dtd.(C) only xml file.(D) css or xsl, dtd and xml file.
(Q.12) Ramesh is a trainee and has been asked to take an online test at Magna Infotech to test his knowledge. The other
name for XML file is
(A) XML document.
(B) XSL.
(C) grammar structure.
(D) SGML.
(Q.13) Priyanka wants to use a language which helps to write code for Rasam recipe. A language that is based on XML is
(A) SMGML.
(B) SSML.
(C) RecipeML.
(D) EDI.
(Q.14) Rashis brother is teaching her XML. She was told by him that every XML document has both logical and physical
structure. Logical structure tells about
(A) order of elements.
(B) names of the XML file.
(C) how XML file should be created.
(D) the extension of XML file.
(Q.15) Geeta has written a code for inventory house of her company. She was told that every XML document has a logical
as well as a physical structure. But she doesnt know what a physical structure actually contains. The physical structure
contains the
(A) order of elements. (B) css file.
(C) actual content.
(D) xsl file.
(Q.16) Abha has recently joined as a Programmer in Satyam. She has been asked to revise the basics of XML so that she
does not make any mistakes while writing the codes. First Generation Markup Language is
(A) InkML.
(B) RecipeML.
(C) SGML.
(D) EDI.
(Q.17) Jaya has to write a code for the employee details using XML. Before typing the various details of an employee, she
needs to write the XML declaration. An XML declaration begins with a
(A) <*xml*>.
(B) <$xml$>.
(C) < ? xml? >.
(D) <^xml^>.
64
(Q.18) Kamal has learnt XML with the help of video tutorials. Before he starts writing codes, he wants to test his knowledge.
So, he decides to solve a paper on XML which has objective questions. PI stands for
(A)program instruction(B)pseudo instruction(C)primary instruction(D)processing instruction.
(Q.19) Kajal has learnt XML with the help of online tutorials. Before she starts writing codes, she wants to test her
knowledge. So, she decides to solve a paper on XML which has objective questions. DTD stands for
(A) declaration type document.
(B) document type definition.
(C) definition type document.
(D) definition type declaration.
(Q.20)Ananyas sir has asked to write a code on the Student Details using XML. She was told to write a code with the tags of
her own choice but before that she needs to add a parent element also. The parent element of all other elements in data
instance is known as
(A) child element.
(B) document element.
(C) data element.
(D) entity.
(Q.21) Sudip is writing a poetry using XML document. He read in a tutorial that all XML documents must contain element.
XML documents must contain
(A)only one element(B)only two elements(C)at least two elements(D)at least one element.
(Q.22) XML documents must contain
(A)only one tag(B)a unique opening and closing tag(C)only one attribute(D)only one element.
(Q.23) Tags must be
(A) case-insensitive.
(B) attractive.
(Q.24)One of the things that we require to link an HTML document with a style-sheet (1Mark)
(A)create html document (.html file)(B)create groups(C)create sgml file(D)create dhtml file.
(Q.25) A well-formed document is
(A)
< xml version="1.0">
< note >
< to >Tove </to >
< from >Jani < /from >
< heading >Reminder < /heading >
< body >Don't forget me this weekend!< /body>
< /note >
(C)
< ?xml version="1.0"? >
< note >
< to >Tove< /to >
< from >Jani< /from >
< heading >Reminder< /heading >
< /body >Don't forget me this weekend!< body>
< /note >
(Q.26) DTD begins with
(A) < DOCTYPE >
(B) < ? DOCTYPE >
(B)
< ?xml version="1.0"? >
< note >
< to >Tove < to >
< from >Jani < /from >
< heading >Reminder< /heading >
< body >Don't forget me this weekend!< /body>
< /note >
(D)
< ?xml version="1.0"? >
< note >
< to >Tove< /to >
< from >Jani< /from >
< heading >Reminder< /heading >
< body >Don't forget me this weekend!< /body>
< /note >
(C) < ! DOCTYPE >
65
(D) definitions.
(C) elements.
(C) .xsl.
(D) .ods.
66
(Q.54) The correct syntax of the declaration which defines the XML version is
(A) < xml version=(B) < ?xml version=(C) < ?xml version=(D) < xml version = 1.0? >.
(Q.55) The correct way to insert comments is
(A) < -- This is comment -- >.
(B) < !- - This is a comment -- >.
(C) < - - ! This is a comment !-- >.
(D) < ? This is a comment ? >.
(Q.56) XSL stands for
(A) eXtra Style Language.
(C) eXtensible Style Listing.
(C) Sun.
(Q.58) XML is
(A) expandable. (B) a stylesheet.
(D) IBM.
(D) RecipeML.
(D) scalar.
(D) traces.
(D) properties.
(Q.66) Software packages that check XML document as per the specified DTD and give feedback are known as
(A) XML Compilers.
(B) XML Parsers.(C) XML Processors.(D) XML Validators.
(Q.67) Software packages that are a part of bigger applications that provide XML support are known as
(A) XML compilers.
(B) XML parsers.
(C) XML processors.
(D) XML validators.
(Q.68) All attribute values must be enclosed in
(A) curly brackets.
(B) square brackets.
(C) dollar sign. (D) quotation marks.
(Q.69) XML data within HTML file is known as
(A) Data Island.
(B) Data Definition.
67
(D) Fortran.
(D) EDI.
(D) XML Validator.
(Q.75) Selector is
(A) an element linked to a particular style.
(C) the name of the stylesheet.
(C) UCF6.
(D) UTF-6.
68
(C) Java.
(D) TRUNCATE.
(Q.11) The constraint that specifies that a column must not assume the null value is(1Mark)
(A)DEFAULT Constraint.(B) NOT NULL Constraint.(C) UNIQUE Constraint.(D) DESCRIBE Constraint.
(Q.12)The command used to retrieve information from one or more databases is known as(1Mark)
(A) FROM Clause.
(B) WHERE Clause.
(C) SELECT.
(D) IS NULL.
(Q.13) DDL stands for
(A) Data Department Language.
(C) Data Development Language.
69
(D) number.
(D) RIGCHAR.
(D) 16.8.
(Q.24)The function that returns a number rounded off as per the given instructions is(1Mark)
(A) ROUND.
(B) TRUNCATE.
(C) MOD.
(D) MID.
(Q.25) A set of attributes that can uniquely identify tuples within the relation is known as
(A) alternate key.
(B) primary key. (C) secondary key.
(D) candidate key.
(Q.26) The data model in which the data is represented by pointers is called
(A)relational datamodel(B)hierarchical datamodel(C)network datamodel(D)conceptual datamodel
(Q.27) The rule which is used to specify the value in the certain column must satisfy a Boolean express is
(A)foreign key constraint(B)check constraint.(C) table constraint.(D) unique key constraint.
(Q.28) The number of attributes in a relation is known as
(A) degree.
(B) rank.
(C) key.
(D) cardinality.
70
(Q.35) The constraint that ensures that all values in a column satisfy certain conditions is
(A) unique constraint.(B) primary key constraint.(C) default constraint(D) check constraint.
(Q.36) The function that returns a numeric expression rounded to an integer is
(A) ROUND.
(B) TRUNCATE.
(C) MOD.
(D) MID.
(Q.37) To remove all the tuples from an employee table the SQL query is
(A)DELETE employee;(B)DELETE ALL FROM employee;(C)DELETE* FROM employee;(D)DELETE FROM employee;
(Q.38) The result of query SQRT(625); is
(A) 13.
(B) 25.
(C) 125.
(D) 55.
(D) DNL.
(Q.41) The SQL keyword, which is used in ascending or descending order, i.e., sorting the result set, is
(A) ORDER BY.
(B) HAVING.
(C) GROUP BY.
(D) SORT.
(Q.42) To redefine a column (datatype, size, default value), the command used is
(A) ADD TABLE.
(B) INCLUDE TABLE.
(C) ALTER TABLE.
(Q.43) The function SUBSTRING is equivalent to
(A) SUBSTR.
(B) SUBSTRG.
(C) SBSTR.
(D) SUBSTRN.
(D) Length().
(D) SUBSTRN.
(Q.48) The function that converts the given string into the upper case is
(A) UCASE(str).
(B) LCASE(str). (C) ULCASE(str).
(D) LUCASE(str).
(Q.49) Referential integrity is ensured through
(A)unique constraint.(B) foreign key constraint.(C) default constraint.(D) check constraint.
(Q.50)When a constraint is to be applied on a group of columns of the table is called(1Mark)
(A) column constraint.(B) table constraint.(C) row constraint.(D) database constraint.
(Q.51) The string function among the following is
(A) Round().
(B) Now().
(C) Sysdate().
(D) Instr().
71
(B) HAVING.
(D) SORT.
(C) time.
(D) string.
(Q.62)If I want to select all columns from a table named CLASS, then correct method
(A) SELECT * FROM CLASS.
(B) SELECT (ALL) FROM CLASS.
(C) SELECT CLASS.
(D) SELECT *. FROM CLASS.
(Q.63) NOT NULL constraint ensures that
(A) a column can never have empty values.
(C) a column can have empty value.
(D) variable.
(Q.65) A default value can be specified for a column using the constraint named as
(A)default constraint(B)unique constraint(C) check constraint.(D) foreign key constraint.
(Q.66) The function UCASE is synonym of
(A) LOWER.
(B) UPPER.
(C) CHAR.
(D) CONCAT.
72
(Q.73) In the "Person_Record" table if we want to change "Hansen" to "Nilsen" in the "LastName" column then the SQL
query will be
(A) UPDATE Persons SET LastName='Nilsen' WHERE LastName='Hansen'.
(B) MODIFY Persons SET LastName='Hansen' INTO LastName='Nilsen.
(C) UPDATE Persons SET LastName='Hansen' INTO LastName='Nilsen'.
(D) MODIFY Persons SET LastName='Nilsen' WHERE LastName='Hansen'.
(Q.74) To insert values in the "students" table with fields i.e. name, roll no, sex, grade, salary, the SQL query will be
(A) INSERT INTO students VALUES (2,aditi, f,e1, 10,000);
(B) INSERT INTO students VALUES (2,aditi, e1,f, 10,000);
(C) INSERT INTO students VALUES (aditi, 20,f,e1, 10,000);
(D) INSERT INTO (name, roll no, sex, grade, salary) VALUES (aditi, 20,f,e1, 10,000);
(Q.75) To enforce a foreign key constraint at column level, the syntax to be followed is
(A) Columnname datatype (size) REFERENCES tablename
[(columnname)] [ ON DELETE CASCADE] [ ON UPDATE CASCADE]
(B) Columnname datatype (size) REFERENCES tablename
[(columnname)] [ ON DELETE CASCADE] [ ON DELETE CASCADE]
(C) Columnname datatype (size) REFERENCES tablename
[(columnname)] [ ON DELETE CASCADE] [ ON MODIFY CASCADE]
(D) Columnname datatype (size) REFERENCES tablename
[(columnname)] [ ON DELETE CASCADE] [ ON TRANSLATE CASCADE]
(Q.76) One complete unit of work is known as
(A) Program.
(B) Method.
(C) Function.
(C) MID.
(D) Transaction.
(D) SQRT.
(D) TCL.
(Q.81) Which keyword eliminates the redundant data from the query result and which retains duplicate output rows in a
query result?
(Q.82) Give the examples of numeric functions.
(Q.83) What is the procedure to start MySQL?
(Q.84) What is referential integrity? What are the conditions to set referential integrity?
(Q.85) What is the result of expression MOD (46, 3)?
(Q.86) How many types of functions are there in SQL and what are they?
(Q.87) What is a literal? Give some examples.
(Q.88) What is a data type? Name some data types available in MySQL.
(Q.89) Explain hierarchical data model.
(Q.90) What purpose is served by MOD function? Give its argument type and return value. Write a query to find out the
remainder of 999 divided by 29.
(Q.91) Are the functions DAYNAME() and DAYOFWEEK() same?
73
(D) AUTOCOMMIT.
74
(Q.6) When a user issues a DDL (data definition language) statement into a transaction, the Commit that would occur is
(A) implicit.
(B) explicit.
(C) default.
(D) autocommit.
(Q.7) In case of failure, if transaction cannot be successfully completed, then any data changes made by the transaction are
(A) undone.
(B) deleted.
(C) done.
(D) saved.
(Q.8) The concurrent execution of transaction gives motivation to
(10 Marks)
(A) Multiprogramming System.(B) Multi-tasking System.(C) Serialization.(D) Parallel System.
(Q.9) All operation into a transaction gets executed within the statements called
(A) begin and end.(B) start and finish.(C) begin and last.(D) front and end.
(Q.10) The ACID property stands for
(A) The Atomic Composition of Information Databases.
(B) Testing the chemical properties of storage media in TPSs against sulphuric acid.
(C) The Atomicity, Concurrency, Isolation and Dataframe.
(D) The Atomicity, Consistency, Isolation and Durability.
(Q.11) The guarantee that once the user has been notified of success, the transaction will persist through all conditions,
including system failure is
(A) Isolation.
(B) Transaction issue. (C) Durability. (D) Database property.
(Q.12) Statement that terminates the current transaction and makes all changes under the transaction persistent is
(A) ROLLBACK.
(B) SAVEPOINT.
(C) COMMIT. (D) ABORT.
(Q.13) Property that indicates that actions performed by a transaction will be hidden from outside the transaction until the
transaction terminates is
(A) Consistency.
(B) Abort.
(C) Auto commit.
(D) Isolation.
(Q.14) The keyword that is optional with Commit and Rollback statement is
(A) Code.
(B) Work.
(C) Syntax.
(D) Begin.
(Q.15) An organized collection of logically related data is known as
(A) data.
(B) database.
(C) information. (D) metadata.
(Q.16) The logical unit of work that succeeds or fail in its entirely is called
(A) DBMS.
(B) Database.
(C) Transaction.
(D) MySql.
(Q.17) Transaction ends
(A) only when it is Committed.
(C) when it is Committed or Rollback.
(D) active.
75
(A) Code.
(B) Transaction.
(C) Process.
(D) Table.
(D) concurrency.
(D) occasionally.
(D) rollback.
(D) stored.
(D) Durability.
(D) PPT.
(Q.39) To discard the changes made to the database we use the statement called
(A) Rollback.
(B) Commit.
(C) Savepoint.
(D) AutoCommit.
(Q.40) To cancel a statement, a user issues
(A) Tab + A.
(B) Ctrl + Z.
(C) Alt + C.
(D) Shift + C.
(D) default.
(D) Rollback.
(Q.44) To save the data permanently at a specific point or segment, we can issue
76
(B) SavePoint.
(C) Status.
(D) LevelPoint.
(D) TCL.
77
(Q.11) Neha has written the query (SELECT SUM(SALARY) FROM EMPLOYEE;) to calculate the total sum of the salary
from the employee table. The Employee table is as follows:
The total value of the sum is
(A) 376000.
(B) 357000.
(C) 375000.
(D) 367000.
(Q.12) Based on the given table, Mahima has to write the query to find Sum of salary for each particular department. She
also needs to include the DEPT_NAME in the SELECT.
The correct query is
(A) SELECT DEPT_NAME, FROM EMPLOYEE GROUP BY DEPT_NAME;
78
(D) different.
(Q.24) The option that causes a group function to considers all values is called
(A) distinct.
(B) similar.
(C) equal.
(D) all.
(Q.25) Function that computes average is
(A) count.
(B) sum.
(C) avg.
(D) having.
79
(Q.36) A field or expression that has different values in the rows belonging to the group is known as
(A) non-group field.(B) joint field.(C) group field.
(D) non-joint field.
(Q.37) Clause used to place condition on group, is known as
(A) where.
(B) and.
(C) having.
(D) or.
(Q.38) Query that combines rows from two or more tables is known as
(A) combine.
(B) having.
(C) where.
(D) join.
(Q.39) If n1 is the first table and n2 is the second table, then unrestricted join will return
(A) n1-n2.
(B) n1 X n2.
(C) n1+n2.
(D) n1/n2.
(Q.40) If two joining tables have fields with same name, then we should use
(A) only one name.(B) qualified field names.(C) delete the entire field.(D) where clause.
(Q.41) To compare columns for equality, we use
(A) where.
(B) having.
(C) equi-join.
(D) join.
(C) having.
(Q.43) Query that specifies some relationship other than equality between columns is known as
(A) non-equi-join.
(B) equi-join.
(C) from.
(D) where.
(Q.44) Equi-join minus one of the two identical columns is known as
(A) equi-join.
(B) cross join.
(C) natural join. (D) non-equi-join.
(Q.45) Cartesian product of two tables is known as
(A) cross join.
(B) natural join.
(C) equi-join.
(Q.46) The name of join that can be used so as not to specify a Join-condition is
80
(B) equi-join.
(Q.47) A temporary label given along with the table name in From clause is known as
(A) having.
(B) count.
(C) join.
(D) table alias.
(Q.48) To join 5 tables, the minimum no. of join conditions that we require is
(A) 5.
(B) 4.
(C) 3.
(D) 2.
(Q.49) Cartesian product is denoted by
(A) $.
(B) ^.
(C) #.
(D) X.
81
(D) a tuple.
(B) SET = 0;
(D) SET FOREIGN _KEY_CHECKS = 1;
(Q.6) The SQL statement which is used to insert a new data in the table is
(A) ADD RECORD.
(B) ADD NEW.
(C) INSERT.
(D) INSERT NEW.
(Q.7) The SQL statement which is used to delete all the data from the table is
(A) DELETE.
(B) DROP.
(C) TRUNCATE.
(D) REMOVE.
(Q.8) If I want to change "Pooja" into "Rohilla" in the "LastName" column of the "Persons" table then the SQL query will be
(A) UPDATE Persons SET LastName='Rohilla' WHERE LastName='Pooja'.
(B) MODIFY Persons SET LastName='Pooja' INTO LastName='Rohilla.
(C) UPDATE Persons SET LastName='Pooja' INTO LastName='Rohilla'.
(D) MODIFY Persons SET LastName='Rohilla' WHERE LastName='Pooja'.
(Q.9) UNIQUE constraint ensures that
(A) two rows can have same value in the specified column.
(B) no two rows can have same value in the specified column.
(C) data delicacy can be there.
(D) data inconsistency may /may not be there.
(Q.10) A constraint that affects only a single column is known as
(A) table constraint.
(B) column constraint. (C) row constraint.(D) database constraint.
(Q.11) To insert a tuple in a table, the DML command that we can use is
(A) INSERT IN. (B) INSERT ON.
(C) INSERT INTO.
(D) INSERT ONTO.
(Q.12) The "ALL" clause is similar to
(A) %.
(B) *.
(C) $.
(D) @.
(Q.13) To add a new column "tel_no" of type integer in the table "Student", the syntax used is
(A) CREATE TABLE < table name > ADD < column name >< DATA TYPE >< SIZE >;
(B) UPDATE TABLE < table name > ADD < column name >< DATA TYPE >< SIZE >;
(C) ARRANGE TABLE < table name > ADD < column name >< DATA TYPE >< SIZE >;
(D) ALTER TABLE Student ADD (tel_no integer);
(Q.14) To drop an "EMPLOYEE" table, the command we can use is
(A) DELETE EMPLOYEE;(B) REMOVE EMPLOYEE;(C) TRUNCATE EMPLOYEE;(D) DROP TABLE EMPLOYEE;
(Q.15) The feature of a RDBMS that helps to define and restrict behaviours of columns in a database is known as
(A) constraints.
(B) constants. (C) variables. (D) identifiers.
(Q.16) The syntax to select a column named "Marks" from a table named "Student", having duplicate rows is
82
(C) altered.
(D) deleted.
(Q.19) If I want to change "Roll_No" 400 only for those items that have "Roll_No" 300, then the SQL statement will be
(A) MODIFY items SET Roll No=400 Where Roll No = 300;
(B) UPDATE items SET Roll No=400 Where Roll No = 300;
(C) UPDATE items Roll No=400 in place of Roll No = 300;
(D) UPDATE items Roll No=400 HAVING Roll No = 300;
(Q.20) Nulls are inserted in the table by typing
(A)NULL with quotes(B)NULL without quotes(C)NULL with semi-colon(D) NULL without semi-colon
(Q.21) The columns in the foreign key must match those of the corresponding columns in the primary key of the referenced
table in terms of the
(A) variable.
(B) datatype.
(C) constraint. (D) table.
(Q.22) Whenever two tables are related by a common column, then the related column in the parent table should be defined
as
(A) Primary Key.
(B) Composite Key.
(C) Foreign Key.
(D) Duplicate Key.
(Q.23)The data in the database must be consistent & correct. A DBMS ensures this by
(A) Double Constraints. (B) Some Constraints.(C) Integrity Constraints(D) Data Constraints.
(Q.24) In MySQL, the Foreign Key is only used on
(A) InnoDB.
(B) MyISAM.
(C) DBA.
(D) InoDB.
(Q.25) One of the property of a valid database is
(A) constant.
(B) verified.
(C) consistent. (D) proper.
(Q.26) The syntax to change the engine while the time of creating a table is
(A) Create table < table name >()ENGINE .
(B) Create table ()ENGINE = InnoDB.
(C) Create table <table name>() InnoDB.(D) Create table < table name >()ENGINE = InnoDB.
(Q.27) A foreign key can only be defined in
(A) parent table.(B) child table. (C) parent table as well as in child table.
(D) only in parent but not in child.
(Q.28) A table to which a foreign key points is called a
(A) Referenced table. (B) Child table. (C) Refer table. (D) Main table.
(Q.29) The syntax to disable the foreign key is
(A) FOREIGN_KEY_CHECKS = 0;
(B) SET KEY_CHECKS = 0;
(C) SET FOREIGN_KEY_CHECKS = 0; (D) SET PRIMARY_KEY_CHECKS = 0;
(Q.30) Referential integrity is ensured through
(A) Composite Key.
(B) Primary Key.
83
84
(Q.51) If you want to ensure that the column should not store any NULL value, then you will use
(A) Not constraint.(B) Number constraint.(C) Not Null constraint.(D) Null constraint.
(Q.52) Syntax to select all columns from a table ABC is
(A) SELECT * FROM ABC.
(B) SELECT (ALL) FROM ABC.
(C) SELECT ABC.
(D) SELECT *. FROM ABC.
(Q.53) The clause that is used to specify conditions based on a list is
(A) LIKE Clause.
(B) BETWEEN Clause.
(C) IN Clause. (D) ALL Clause.
(Q.54) The clause that is used to eliminate the duplicate rows in the output is
(A) IS NULL clause.
(B) DISTINCT clause. (C) ALL clause. (D) BETWEEN clause.
(Q.55) Command used to retrieve information from one or more databases is
(A) FROM Clause.
(B) WHERE Clause.
(C) SELECT.
(D) IS NULL.
(Q.56) The clause that is used to specify conditions based on a list is
(A) LIKE Clause.
(B) BETWEEN Clause.
(C) IN Clause. (D) ALL Clause.
(Q.57) Syntax to drop the primary key of table T1 is
(A) ALTER TABLE T1 DROP PRIMARY KEY;
(B) ALTER T1 DROP PRIMARY KEY;
(C) ALTER TABLE T1 DROP
(D) TABLE T DROP PRIMARY KEY
(Q.58) MySQL will reject foreign key constraint if its database engine is
(A) INNODB.
(B) not INNODB.
(C) ENNODB.
(Q.59) Referencing action can be done by
(A) CREATE.
(B) CASCADE.
(C) COMMIT.
(Q.61) A constraint is
(A) a command in the SQL *plus.
(B) the conditions or checks on table only .
(C) the conditions or checks on columns of a table only.
(D) a condition on one or more columns of a table.
(Q.62) A primary key constraints, declares
(A) that primary key can have null value.
(B) to be same as unique constraint.
(C) column as the primary key and cannot have null value.
(D) column as the primary key and can have null value.
(Q.63) We can define column level constraint & table level constraint by
(A) column command.(B) create table command.(C) row command.(D) database command.
(Q.64) The inline constraint is also known as
(A) row command.(B) create table constraint.(C) column constraint.(D) Database command.
(Q.65) The out-of-line constraint is also known as
(A) row command.(B) create table constraint.(C) column constraint.(D) table constraint.
(Q.66) Nulls are inserted in the table by typing
(A) NULL with quotes.
(B) NULL without quotes.
(C) NULL with semi-colon.
(D) NULL without semi-colon.
(Q.67) The SQL keyword which is used in ascending or descending order, i.e., sorting the result set is
(A) ORDER BY.
(B) HAVING.
(C) GROUP BY.(D) SORT.
(Q.68) DROP table command in SQL lets you drop a table
85
(Q.82) NULL values are not permitted in columns that forms part of a
(A) Table.
(B) Database.
(C) Primary Key.
(Q.83) The data type should be same of foreign key and
(A) domain key. (B) primary key.
(C) composite key.
(Q.84)
(Q.85)
(Q.86)
(Q.87)
(Q.88)
(Q.89)
(Q.90)
(Q.91)
(Q.92)
86
(Q.3) Xerte is
(A) Open source e-learning developer tool.
(C) Open Source authoring application.
(Q.4) Any form of transaction that uses an electronic medium to facilitate the transaction is known as
(A) E-commerce.
(B) E-business.
(C) E-company.
(D) E-trade.
(Q.5) It is the process of converting data model into relational schema is known as
87
(A) Normalization.
(Q.6) One component that nearly all GUI programs will have is
(A) window.
(B) mouse.
(C) monitor.
(D) button.
(D) fBay.in
(C) links.
(D) back-end.
(D) server.
(D) sharekhan.
(C) bookstore.
88
(D) records.
(Q.33) An Open Source Course Management System, also known as a Learning Management System is referred as
(A) Noodle.
(B) Soodle.
(C) Moodle.
(D) Doodle.
(Q.34) An object that waits for and responds to an event from a GUI component is a
(A) event listener.
(B) GUI listener.(C) collection class.
(D) click listener.
(Q.35) G2C stands for
(A)Government to Control(B)Government to Client(C)Government to Citizen(D)Government toCourt
(Q.36) G2G stands for
(A)Government to Government(B)Government to Galaxy(C)Galaxy to Government(D)Galaxy to Galaxy
(Q.37) Clicking a JRadioButton generates
(A) ActionEvent.(B) ComponentEvent. (C) ContainerEvent.
(D) table.
(Q.39)A component that enables the user to choose single value or multiple values is
(A) text field.
(B) combo box. (C) list.
(D) label.
(Q.40) Pressing a button generates a/an
(A) ItemEvent.
(B) MouseEvent.
89
(Q.43) The result of union of several lower level entity sets to produce higher-level entity set is
(A) generalization.(B) specialization.(C) organization.(D) merging.
(Q.44) the end that uses icons
(A) Back End. (B) Middle End. (C) Front End. (D) Up-Front End.
(Q.45) In GUI a control is known as
(A) Object.
(B) component.
(C) gadget.
(D) widget.
(D) SwingUtilities.
(Q.49) A container that can hold a group of components so that they can be displayed on a frame is called
(A) label.
(B) panel.
(C) frame.
(D) desktopPane.
(Q.50) B2G stands for
(A) Business to Government.
(C) Broker to Government.
(D) table.
(Q.59) The organizations that conduct some e-commerce activities, yet their primary business is done in the physical world
is known as
(A) brick-and-mortar organizations.
(B) virtual organizations.
(C) click-and-mortar organizations.
(D) pure- play organizations.
(Q.60) The type of E-Business in which businesses conduct online tendering and requesting quotes from suppliers is known
as
(A) online direct marketing.
(B) electronic tendering.
90
(D) membership.
(C) columns.
(D) attributes.
(Q.62) An abstraction of a design that allows us to focus on the "big picture" of design without going into details is known as
(A)online design(B)e-commerce(C) conceptual modelling(D)electronic information collection.
(Q.63) The type of E-Business in which the people spread their brands on the Net by word-of-mouth is known as
(A)viral marketing.(B) electronic tendering.(C) find-the-best-price.(D) name-your-own-price.
(Q.64) The type of E-Business in which demands of small buyers are aggregated to get a large volume is known as
(A) viral marketing.(B) electronic tendering.(C) group purchasing.(D) name-your-own-price.
(Q.65) The type of E-Business in which products and services are self configured by using the internet is known as
(A) viral marketing.(B) product customization.(C) group purchasing.(D) online auctions.
(Q.66) The type of E-Business which creates virtual marketplaces where transactions can be conducted in an efficient way is
known as
(A) viral marketing.(B) product customization.(C) electronic marketplaces(D)online auctions.
(Q.67) The type of E-Business which aggregates information and package it for customers, vendors or others in the supply
chain is known as
(A)viral marketing.(B) product customization.(C) value-chain integrators(D) online auctions.
(Q.68) The type of E-Business which provides specialized services in supply-chain operations such as providing logistics is
known as
(A) viral marketing.
(B) product-chain- customization.
(C) value-chain service.
(D) online-chain-auctions.
(Q.69) A person involved in E-Business who exchanges surplus products or services with the process administered
completely online by an intermediary is known as
(A) online barter.(B) information broker.(C) service provider.(D) online auctioneer.
(Q.70) An attribute which can hold only one value is known as
(A) multi-valued.(B) single-valued.(C) one valued.(D) double-valued.
(Q.71) E-business company that offers Quick Collect services to send money online with pay out at over tens of thousand
agent locations worldwide is
(A) DELL.
(B) Sharekhan.
(C) Yatra.
(D) Western Union Money Transfer.
(Q.72) The term used to describe a means of teaching through technology such as a network, browser, CDROM or DVD
multimedia platforms is known as
(A) E-teaching.
(B) E-learning.
(C) E-networking.
(D) E-browsing.
(Q.73) Databases developed in a systematic way are known as
(A) Database cycle.(B) Development cycle.(C) Data cycle.(D) Database Development Life Cycle.
(Q.74) The diamond box is used by
(A) an entity type.
(B) a table.
(Q.75) GUI stands for
(A)Graphical User Interface
(C) Graphical User Interact.
(D) a relationship.
(Q.76) An entity that is visible to the user and is used to perform task is known as(1Mark)
(A) subject.
(B) links.
(C) interface.
(D) object.
(Q.77) The end, hidden from the user is known as
(A) hardware.
(B) hyperlink.
(C) front end.
(Q.78) The layer that contains the database object is called
(A) front-end.
(B) hardware.
(C) links.
91
(Q.79) To handle all database access through one or more server, we require
(A) object.
(B) database object.
(C) back-end. (D) links.
(Q.80) Responsible for processing data for user queries and for request is
(A) object.
(B) database object.
(C) back-end.
(Q.81) The GUI should match
(A) between the system and the real world.
(C) between the software and the hardware.
(D) server.
(D) container.
92