ads

Solved MCQ of Java Beans set-1


1. Java Servlets are efficient and powerful solution for creating ....................... for the web.

A) dynamic content

B) static content

C) hardware

D) both and b


2. Filters were officially introduced in the servlet ........................ specification.

A) 2.1

B) 2.3

C) 2.2

D) 2.4


3. ..................... is the first phase of the servlet life cycle.

A) Initialization

B) Service

C) Destruction

D) Both a and b


4. The service phase of the servlet life cycle represents all interactions with requests until the servlet is ......................

A) created

B) running

C) initiated

D) destroyed


5. GET methods are great for sending .................... amounts of information that you do not mind having visible in a URL.

A) negligible

B) huge

C) small

D) both and b


6. Several vendors are adding ...................... to their existing database .................

A) JDOBC, middle-ware products

B) JDBC drivers, upper-ware products

C) middle-ware products, JDOBC drivers

D) JDBC drivers, middle-ware products


7. JSP is not governed by the ................... defined by the Java 2 specifications.

A) syntax and semantics

B) rules and regulation

C) Jakarta tomcat

D) compiler


8. The concept of distributed object computing can be termed as a marriage between ............. and ..................

A) C++, java

B) C, C++

C) Networking, Object-oriented programming

D) C, Object-oriented programming


9. The IDL compiler generates ..................... and .........................

A) runnable code, stubs

B) client, stubs

C) stubs, client

D) stubs, skeleton


10. Objects are units of encapsulation of ................ and ..............

A) Data, behavior

B) data types, data values

C) function definition and function declaration

D) class and method

Answers:

1.  A) dynamic content
2.  B) 2.3
3.  A) Initialization
4.  D) destroyed
5.  C) small
6.  D) JDBC drivers, middle-ware products
7.  A) syntax and semantics
8.  C) Networking, Object-oriented programming
9   D) stubs, skeleton

Solved MCQ of Internet and HTML set-3


1. ................ are the physical meeting points of backbones.

A) Gateways

B) Pathways

C) Routers

D) Domains


2. WSFTP is an example of ........................... program.

A) FTP

B) Telnet

C) Web browser

D) Mail


3. Which of the following is best suitable for remote administration of a computer?

A) Telnet

B) WAIS

C) Browsers

D) HTML


4. The leading bit pattern of class B network is ..................

A) 0

B) 10

C) 110

D) 11


5. The ...................... attribute adds space within each cell.

A) CELL SPACING

B) CELL PADDING

C) WIDTH

D) ALIGN


6. Which of the following are two popular protocols that allow home computer users to connect their computers to the internet as per hosts?

i) SLIP ii) PPP

iii) HTTP iv) SMTP


A) iii and iv

B) ii and iii

C) i and ii

D) ii and iii


7. A computer that translates ........................ of another computer into an ............... and vice versa, upon request is known as DNS server.

A) Domain name and IP address

B) Host address and Domain name

C) Domain name and server address

D) Server name and IP address



8. Identify the uses of URI in HTML.

i) Link to another document or resource

ii) Link to external style sheet or script

iii) Create an image map

A) i and ii

B) i and iii

C) ii and iii

D) i , ii and iii


9. An ordered list is a ...................... list and an unordered list is a ................. list.

A) bulleted & numbered

B) bulleted & tabular

C) tabular & numbered

D) numbered & bulleted


10. Linking to another place in the same or another web page requires two A (Anchor) tags, the first with the .................. attribute and the second the ...................attribute.

A) NAME & LINK

B) LINK & HREF

C) HREF & NAME

D) TARGET & VALUE

Answers:

1.  A) Gateways
2.  A) FTP
3.  A) Telnet
4.  B) 10
5.  B) CELL PADDING
6.  C) i and ii
7.  A) Domain name and IP address
8.  D) i , ii and iii
9   D) numbered & bulleted
10 C) HREF & NAME

You Might also view the following Related Posts

Solved MCQ of Computer Organization and Architecture set-2


1. The time that elapses between the initiation of an operation and completion of that operation is called.....

A) throughput

B) memory response time

C) memory access time

D) execution time


2. Interrupts which are initiated by an instruction are ............

A) internal

B) external

C) hardware

D) software


3. A semiconductor memory constructed using bipolar transistors or MOS transistor stores information in the form of a ......................

A) Flip-flop voltage levels

B) bit

C) byte

D) opcodes values


4. A simple way of performing I/O tasks is to use a method known as ......................

A) program-controlled I/O

B) program-controlled input

C) program-controlled output

D) I/O operation


5. Memory access in RISC architecture is limited to instructions ........

A) CALL and RET

B) PUSH and POP

C) STA and LDA

D) MOV and JMP


6. Striking key stores the corresponding character code in a 8-bit buffer register associated with the keyboard. This register is called as ........................

A) DATAINOUT

B) DATAOUT

C) DATAIN

D) Both A and B


7. When the character is transferred to the processor, status control flag SIN is automatically cleared to ............................

A) zero

B) one

C) two

D) yes


8. A microprogram written as string of 0's and 1's is a ...

A) symbolic micro-instruction

B) binary micro-instruction

C) symbolic micro-instruction

D) binary microprogram


9. An exception conditions in a computer system by an event external to the CPU is called .........

A) Interrupt

B) halt

C) wait

D) process


10. When the CPU detects an interrupt, it then saves its ...................

A) Previous state

B) Next state

C) Current state

D) Both A and B

 

Answers:

1.  C) memory access time
2.  B) external
3.  A) Flip-flop voltage levels
4.  A) program-controlled I/O
5.  C) STA and LDA
6.  C) DATAIN
7.  A) zero
8.  D) binary microprogram
9   A) Interrupt.
10 C) Current state.

You Might also view the following Related Posts

List the different types of memory management techniques in OS

In uniprogramming system, main memory is divided into two parts, one pare for the operating system (resident monitor, kernel) and one part for the program currently being executed. In multiprogramming system, the 'user' part of the memory must be further subdivided to accommodate multiple processes. The task of subdivision is carried out dynamically by operating system and is known as memory management.

Memory management by OS can be divided into two methods: 

 

# Real Memory Management


In real memory management OS operates the space of the main memory only.

There are two ways of real memory management.

a) Mono Programming System:– Execution of one program at one time. The memory is divided into two parts, one is to save the OS and the other is to save programs.

b) Multi Programming System:– Several simultaneous processes can be executed at the same time. Memory space is shared by several processes. To enable it to run a process should be stored into the memory. When the execution process is completed, it will be taken out from the memory. There are two schemes.

i. Fixed Size Partitioning: Partitioning of memory space into several spaces. One process is started into the memory if there is a memory space that can fit the process.

ii. Variable size partitioning: A process is started if there is memory space that is still empty if there is memory space that is still empty which can fit the process. This method is better and more flexible.

# Virtual Memory Management


Virtual memory is a scheme that is transparent to the application process and allows each process to behave as if it had unlimited main memory at its disposal. To achieve this, the operating system creates for each process a virtual address space on disk. Part of virtual memory is brought into real main memory as needed.

There are three techniques of virtual memory management which are given below:–

i. Paging Method: This method introduced in the 1960's Atlas computer, sets up enough memory space for each process by making the secondary storage as an extension to the main memory. The virtual memory space is provided is divided into several pages with every page having the same size. The main memory is divided into a few framework pages. This page framework is shared with a program in the system at that point.

ii. Segmentation Method: Segmentation method provides a large sized of virtual memory, but require virtual memory which provides multidimensional memory. This form of memory management is known as segmented virtual memory management. Segmentation allows the programmer to view memory as consisting of multiple address spaces or segments. Segments may be of unequal, indeed dynamic size.

iii. Paging and Segmentation Method: In paging and segmentation method both paging and segmentation have their strengths. This virtual memory is multidimensional and provides many segments and each segment has a large volume.

What are the different types of scheduling methods?


Process scheduling is one way for a processor to handle n processes, by scheduling the execution process. Each process is executed one by one according to prescribed schedule.

The aim of processor scheduling is to assign processes to be executed by the processor or processors over time, in a way that meets system objectives, such as response time, throughput and processor efficiency. In many systems, this scheduling activity is broken down into three separate functions: long, medium and short-term scheduling.

Types of Scheduling 


Long term Scheduling

The long term scheduler determines which programs are admitted to the system for processing. Thus, it controls the degree of multiprogramming. Once admitted a job or user program becomes a process and added to the queue for the short term scheduler. In some systems, a newly created process begins in a swapped-out condition, in which case it is added to the queue for the medium term scheduler.

Medium term scheduling

 Medium term scheduling is a part of the swapping function. The swapping in decision is based on the need to manage the degree of multiprogramming.
 It is the decision to add to the number of processes that are partially of fully in main memory.

Short term scheduling

The short term scheduler is also known as the dispatcher executes must frequently and makes the fine grained decision of which process to execute next.

It is the decision as to which available process will be executed by the processor.

You Might also view the following Related Posts

Java Multiple Choice Questions With Answers set-8


1. Using which keyword we can access value of the instance variables and class variables of that class inside the method of that class itself.

A) super

B) final

C) this

D) either super or this


2. If a variable is declared final, it must include ...................... value.

A) integer

B) no

C) initial

D) float


3. State true or false.

i) Jpanel is a class included in awt package.

ii) Anonymous classes are mostly used for event handling.

iii) Names of anonymous classes must be unique

iv) JOptionPane is an inner class

A) i-false, ii-false, iii-true, iv-true

B) i-true, ii-false, iii-true, iv-false

C) i-false, ii-true, iii-false, iv-false

D) i-true, ii-false, iii-false, iv-true


4. In java, string is a .............

A) primitive data type

B) abstract data type

C) combination of boolean

D) None of the above


5. Methods can be overloaded with a difference only in the type of the return value ..

A) Not supported

B) False

C) True

D) None of the above


6. Each method in a java class must have a unique name .

A) Not necessary

B) True

C) False

D) None of the above


7. State true or false.

i) comparisons precede logical operations in java

ii) assignment operations succeed increment operations

iii) arithmetic operations succeed comparisons

iv) x precede +

A) i-true, ii-true, iii-false, iv-true

B) i-true, ii-false, iii-true, iv-false

C) i-false, ii-true, iii-false, iv-false

D) i-true, ii-false, iii-false, iv-true


8. It is important feature of java that it always provides a default constructor to a class.

A) Not supported

B) False

C) True

D) None of the above


9. ....................... is the key to ..................

A) Serialization, persistence

B) Persistence, inheritance

C) Inheritance, object

D) Persistence, serialization


10. State true of false.

i) Public can only be assigned to class

ii) Protected protects a statement

iii) Protected method is never accessible outside the package

iv) Friendly variable may be accessible outside class

A) i-true, ii-true, iii-false, iv-true

B) i-true, ii-false, iii-true, iv-false

C) i-false, ii-true, iii-false, iv-false

D) i-true, ii-false, iii-false, iv-true

Answers:

1.  C) this
2.  C) initial
3.  C) i-false, ii-true, iii-false, iv-false
4.  B) abstract data type
5.  B) False
6.  A) Not necessary
7.  A) i-true, ii-true, iii-false, iv-true
8.  C) True
9.  A) Serialization, persistence
10.C) i-false, ii-true, iii-false, iv-false

You Might also view the following Related Posts

MCQ of System Analysis and Design With Answer set-6


1. ......................... refers to the collection of information pertinent to systems project.

A) Data gathering

B) Data Exporting

C) Data Embedding

D) Data importing


2. A physical DFD

A) has no means of showing material flow

B) does not concern itself with material flow

C) can show only stored material

D) can show the flow of material


3. Development costs for a computer based information system include/s ........................

A) Salaries of the system analysis

B) Cost of converting and preparing data

C) Cost of testing and documenting

D) All A, B, C


4. Before developing a logical DFD it is a good idea to

A) develop a physical DFD

B) develop a system flow chart

C) determine the contents of all data stores

D) find out user's preferences


5. A data store in a DFD represents

A) a sequential file

B) a disk store

C) a repository of data

D) a random access memory


6. Which of the following is/are major step/s of system design?

A) Specification of system output

B) Development of system flowchart

C) Development of program specifications

D) All A, B, C


7. A data flow can

A) only enter a data store

B) only leave a data store

C) enter or leave data store

D) either enter or leave a data store but not both


8. ..................... means coordinated effort, to communicate the information of the system in written form.

A) System Documentation

B) System Storage

C) System Record

D) System Share


9. Some of the tools which are available with the system analysis are ....................

A) Review of Documentation & Observation of the situation

B) Conducting Interviews & Questionnaire Administration

C) Both A & B

D) Review of Procedure & Conducting Interviews


10. Data cannot flow between two data stores because

A) it is not allowed in DFD

B) a data store is a passive repository of data

C) data can get corrupted

D) they will get merged

Answers:


1.  A) Data gathering
2.  D) can show the flow of material
3.  D) All A, B, C
4.  A) develop a physical DFD
5.  C) a repository of data
6.  D) All A, B, C 
7.  C) enter or leave data store
8.  A) System Documentation
9.  C) Both A & B
10. D) they will get merged

You Might also view the following Related Posts

How To Create Simple Image Slideshow Using JavaScript ?

We can create attractive and eye catching website by using image slideshows, flash and other designs. There are so many pre-build JavaScript files and jquery plugins can be found on the web, but today i am going to tail about Creating simple and easy to understand code for image slideshow using JavaScript.

Code for creating simple image slideshow 


Just copy and paste the code below where you want to place slideshow and change the location of the images.

<script language="JavaScript">
var i = 0;
var path = new Array();

// LIST OF IMAGES
path[0] = "image_1.gif";
path[1] = "image_2.gif";
path[2] = "image_3.gif";

function swapImage()
{
document.slide.src = path[i];
if(i < path.length - 1) i++; else i = 0;
setTimeout("swapImage()",3000);
}
window.onload=swapImage;
</script>
<img height="200" name="slide" src="image_1.gif" width="400" />

Demo slideshow for the above code




Code for creating slideshow with caption


Just copy and paste the code below where you want to place slideshow and change the location  and caption of the images.


<script type="text/javascript">

var i = 0;

var image = new Array();  

// LIST OF IMAGES

image[0] = "image_1.gif";

image[1] = "image_2.gif";

image[2] = "image_3.gif";  

var k = image.length-1;   

var caption = new Array();

// LIST OF CAPTÄ°ONS

caption[0] = "Caption for the first image";

caption[1] = "Caption for the second image";

caption[2] = "Caption for the third image";

function swapImage(){

var el = document.getElementById("mydiv");

el.innerHTML=caption[i];

var img= document.getElementById("slide");

img.src= image[i];

if(i < k ) { i++;} 

else  { i = 0; }

setTimeout("swapImage()",5000);

}

function addLoadEvent(func) {

var oldonload = window.onload;

if (typeof window.onload != 'function') {

window.onload = func;

else  {

window.onload = function() {

if (oldonload) {

oldonload();

}

func();

}

}

}

addLoadEvent(function() {

swapImage();

}); 

</script>

<table style="border:3px solid #00aaff;background-color:#00aaaa;">

<tr>

<td>

<img name="slide" id="slide" alt ="my images" height="285" width="485" src="image_1.gif"/>

</td>

</tr>

<tr>

<td align="center"style="font:small-caps bold 15px georgia; color:blue;">

<div id ="mydiv"></div>

</tr>

</td>

</table>

 

Demo slideshow for the above code



my images



Related Posts:

    Solved MCQ of Oracle and Distributed Database set-4


    1. ………………….. is the collection of memory structures and Oracle background processes that operates against an Oracle database.

    A) Database

    B) Instance

    C) Tablespace

    D) Segment


    2. A ………………………… is a logical grouping of database objects, usually to facilitate security, performance, or the availability of database objects such as tables and indexes.

    A) tablespace

    B) segments

    C) extents

    D) blocks


    3. A tablespace is further broken down into …………………

    A) tablespace

    B) segments

    C) extents

    D) blocks


    4. ……………………….. is a contiguous group of blocks allocated for use as part of a table, index, and so forth.

    A) tablespace

    B) segment

    C) extent

    D) block


    5. ……………… is the smallest unit of allocation in an Oracle database.

    A) Database

    B) Instance

    C) Tablespace

    D) Database Block


    6. An Oracle ………………………..is a set of tables and views that are used as a read-only reference about the database.

    A) Database dictionary

    B) Dictionary table

    C) Data dictionary

    D) Dictionary


    7. A data dictionary is created when a …………………. created.

    A) Instance

    B) Segment

    C) Database

    D) Dictionary


    8. An Oracle object type has two parts the …………………. and …………………….

    A) Instance and body

    B) Segment and blocks

    C) Specification and body

    D) Body and segment


    9. By, default, Oracle object types are ………………………

    A) INSTANTIABLE

    B) NOT INSTANTIABLE

    C) FINAL

    D) OVERRIDING


    10. A method modifier tells Oracle that new subtypes may not override a method is called …………….

    A) INSTANTIABLE

    B) NOT INSTANTIABLE

    C) FINAL

    D) OVERRIDING

    Answers:


    1. B) Instance
    2. A) tablespace
    3. B) segments
    4. C) extent
    5.  D) Database Block
    6.  C) Data dictionary
    7.  C) Database
    8.  C) Specification and body
    9.  A) INSTANTIABLE
    10. C) FINAL

    You Might also view the following Related Posts