A Java Quiz

  • 9th Grade,
  • 10th Grade,
  • 11th Grade,
  • 12th Grade
  • IEEE
  • ACM
Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Myhemant72
M
Myhemant72
Community Contributor
Quizzes Created: 4 | Total Attempts: 9,338
| Attempts: 1,667 | Questions: 200 | Updated: Mar 21, 2025
Please wait...
Question 1 / 201
🏆 Rank #--
Score 0/100
1. Html is the root tag of a html document?

Explanation

The statement is true because the "html" tag is indeed the root tag of an HTML document. It serves as the container for all other elements in the document and defines the beginning and end of the HTML code.

Submit
Please wait...
About This Quiz
A Java Quiz - Quiz

This 'A Java Quiz' challenges learners on Java programming concepts, focusing on GUI components, JDBC, and basic Java syntax. It assesses understanding of JTable functions, execution methods, input dialogs, and more, enhancing practical Java skills.

2.
You may optionally provide this to label your report, leaderboard, or certificate.
2. Apache server also known as HTTP server is a ___ server?

Explanation

Apache server, also known as an HTTP server, is a web server. It is specifically designed to serve web pages and handle HTTP requests from clients, such as web browsers. The Apache server is widely used and highly popular in the web hosting industry due to its stability, flexibility, and security features. It is capable of delivering static and dynamic content, managing multiple websites, and supporting various programming languages and modules.

Submit
3. Which of the following controls can be used to submit a form?

Explanation

A submit button is used to submit a form. When a user clicks on the submit button, the form data is sent to the server for processing. This allows the user to send the information they have entered in the form to the server-side script or application. The other options listed (checkbox, radio button, and text area) are not used for submitting a form. A checkbox is used to select multiple options, a radio button is used to select a single option, and a text area is used for entering multiple lines of text.

Submit
4. Apache server also known as HTTP server is a ___ server?

Explanation

Apache server, also known as HTTP server, is specifically designed to handle and deliver web content. It is used to host websites and serve web pages to users who request them through their web browsers. Apache is one of the most popular web servers and is widely used across the internet. Therefore, the correct answer is "Web."

Submit
5. <i> will make a word?

Explanation

The use of the "" tag in HTML is used to make text italicized.

Submit
6. Which command is used to drop a table? ( two words)

Explanation

The command "drop table" is used to delete or remove a table from a database. It permanently removes the table and all its data from the database. This command is commonly used when a table is no longer needed or when it needs to be recreated with different structure or data.

Submit
7. Which command is used to drop a table? ( two words)

Explanation

The command "drop table" is used to delete or remove a table from a database. It permanently deletes all the data and structure associated with the table. This command is commonly used in database management systems to remove unnecessary or obsolete tables.

Submit
8. A break statement in Java will only break the inner loop, in case of nested loops.

Explanation

In Java, a break statement is used to exit a loop prematurely. When there are nested loops, a break statement will only break the innermost loop in which it is placed. This means that if there are multiple loops nested inside each other, the break statement will only terminate the inner loop and resume the execution of the outer loop. Therefore, the given statement is true.

Submit
9. Savepoints need to be named?

Explanation

Savepoints in a database are used to mark a specific point in a transaction where it can be rolled back to in case of an error or failure. Naming savepoints allows for better management and identification of savepoints within a transaction. It provides a way to reference specific savepoints when performing rollback or commit operations. By naming savepoints, it becomes easier to track the sequence of savepoints and their purpose within a transaction, making it a good practice to name them.

Submit
10. Dropping a table will delete both table structure and data.

Explanation

Dropping a table means permanently removing it from the database. This action not only deletes the table's structure, such as columns and data types, but also removes all the data stored within the table. Therefore, the statement that dropping a table deletes both the table structure and data is correct.

Submit
11. A firewall protects the Company LAN from outside threats.

Explanation

A firewall is a network security device that monitors and filters incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a company's internal network (LAN) and the outside world, protecting the LAN from unauthorized access, malware, and other external threats. By allowing only authorized traffic to pass through, a firewall helps to secure the company's network and sensitive data from potential attacks. Therefore, the statement "A firewall protects the Company LAN from outside threats" is true.

Submit
12. Which topology has the advantage of short cable length? ( 1 word )

Explanation

The bus topology has the advantage of short cable length because all devices in the network are connected to a single cable. This eliminates the need for long cables to connect devices to a central hub or switch, resulting in shorter cable lengths overall.

Submit
13. Savepoints need to be named?

Explanation

Savepoints need to be named in order to be referenced later in the transaction. By assigning a name to a savepoint, it becomes possible to rollback to that specific savepoint if needed. This allows for more granular control over the transaction and enables the ability to undo specific portions of the transaction while preserving the changes made after the savepoint. Without naming savepoints, it would be difficult to identify and rollback to specific points in the transaction.

Submit
14. The title tag is is to be defined in which section?

Explanation

The title tag is to be defined in the head section of an HTML document. This tag is used to specify the title of the webpage, which is displayed in the browser's title bar or tab. The head section contains meta information about the document, such as the character encoding, linked stylesheets, and scripts.

Submit
15. Any DDL statement will automatically commit a tracnsatcion under progress?

Explanation

This statement is true because any Data Definition Language (DDL) statement in a database automatically commits the transaction under progress. DDL statements are used to define the database structure or schema, such as creating or altering tables, indexes, or views. Unlike Data Manipulation Language (DML) statements, which are used to manipulate data within the tables, DDL statements do not require an explicit commit statement to make the changes permanent. Once a DDL statement is executed, it immediately commits the transaction, making the changes permanent and irreversible.

Submit
16. P in PAN stands for____________________.

Explanation

The correct answer is "Personal". The PAN card is a unique identification number issued to individuals and is used for various financial transactions in India. The "P" in PAN stands for "Personal" as it denotes that the card is meant for personal use and identification purposes.

Submit
17. The set autocommit will enable or disable the autocommit option only for current session?

Explanation

The statement is true. When the "set autocommit" command is used, it will enable or disable the autocommit option for the current session only. This means that any subsequent transactions performed within the current session will either be automatically committed or not, depending on the value set for autocommit. However, this setting will not affect other sessions or connections to the database.

Submit
18. There can be only one Primary Key in a table.

Explanation

In a database table, the primary key is a unique identifier for each record. It ensures that each row in the table is uniquely identified and can be accessed efficiently. Having more than one primary key in a table would contradict the purpose of a primary key, as it would no longer guarantee uniqueness. Therefore, there can only be one primary key in a table.

Submit
19. A break statement in Java will only break the inner loop, in case of nested loops.

Explanation

In Java, a break statement is used to terminate the current loop and resume execution at the next statement after the loop. When nested loops are present, a break statement will only break out of the innermost loop and continue with the outer loop. This means that the outer loop will continue to execute until its condition is false, regardless of the break statement in the inner loop. Therefore, the given statement is true.

Submit
20. There can be only one Primary Key in a table.

Explanation

In a relational database, a primary key is a unique identifier for each record in a table. It ensures that each record can be uniquely identified and helps maintain data integrity. By definition, there can only be one primary key in a table as it serves as the main identifier for the records. Having multiple primary keys would create ambiguity and make it difficult to uniquely identify records. Therefore, the statement "There can be only one Primary Key in a table" is true.

Submit
21. Java is object oriented language because it supports classes and encapsulation?

Explanation

Java is considered an object-oriented language because it supports the concept of classes and encapsulation. In Java, everything is treated as an object, and objects are instances of classes. Classes define the properties and behaviors of objects, and encapsulation allows for the bundling of data and methods within a class, providing data hiding and abstraction. These features are fundamental to object-oriented programming, making Java an object-oriented language.

Submit
22. By default autocommit is on?

Explanation

By default, the autocommit feature is turned on in most database management systems. This means that any changes made to the database are automatically saved and committed without the need for explicit commit statements. This can be convenient for simple operations where immediate persistence of data is desired. However, it can also lead to unintended consequences if not managed properly, such as accidental data modifications. Therefore, it is important to be aware of the autocommit setting and adjust it as needed for specific use cases.

Submit
23. D in ACID stands for?

Explanation

The correct answer is "Durability". In the ACID (Atomicity, Consistency, Isolation, Durability) acronym, the D stands for Durability. Durability refers to the property of a transaction in a database system to persist even in the event of system failures, such as power outages or crashes. It ensures that once a transaction is committed, its changes will be permanently saved and will survive any subsequent failures, guaranteeing data integrity and reliability.

Submit
24. Any DDL statement will automatically commit a tracnsatcion under progress?

Explanation

DDL (Data Definition Language) statements in SQL, such as CREATE, ALTER, and DROP, are automatically committed by default. This means that any changes made by these statements are immediately permanent and cannot be rolled back. Unlike DML (Data Manipulation Language) statements, which can be rolled back using the ROLLBACK command, DDL statements do not require an explicit COMMIT statement to make the changes permanent. Therefore, any DDL statement will automatically commit a transaction that is in progress.

Submit
25. There can be only one Primary Key in the Table?

Explanation

In a database table, the primary key is a unique identifier for each record. It ensures that each record in the table is uniquely identified and helps in maintaining data integrity. Having more than one primary key in a table would result in duplicate values and violate the uniqueness constraint. Therefore, there can be only one primary key in a table.

Submit
26. P in PAN stands for____________________.

Explanation

The correct answer is "Personal." The acronym PAN stands for Personal Area Network, which refers to a network of devices connected to a single person's workspace or immediate surroundings. This can include devices such as smartphones, tablets, laptops, and wearable technology. The "P" in PAN represents the personal nature of this network, as it is limited to the individual user rather than a larger network or organization.

Submit
27. Alter table command can be used to add the Primary KeY to a table?

Explanation

The alter table command is used to modify the structure of an existing table in a database. One of the modifications that can be made is adding a Primary Key to a table. Therefore, the statement "alter table command can be used to add the Primary Key to a table" is true.

Submit
28. <b> will make a word?

Explanation

The correct answer is "Bold" because the question is asking which formatting option will make a word. The "" tag is used in HTML to apply bold formatting to text, so selecting the "Bold" option will achieve this effect.

Submit
29. Do -- while loop is exit controlled loop?

Explanation

A do-while loop is an exit-controlled loop because the condition is checked at the end of the loop. This means that the loop will always execute at least once before checking the condition. If the condition is true, the loop will continue to execute, otherwise, it will exit.

Submit
30. Which protocol does the Apache server use?

Explanation

The correct answer is HTTP. The Apache server uses the HTTP protocol to communicate with clients and serve web pages. HTTP stands for Hypertext Transfer Protocol and is the foundation of data communication for the World Wide Web. It allows for the retrieval and display of web content, such as HTML documents, images, and videos, on a user's web browser. Apache, being a popular web server software, supports the HTTP protocol as its primary means of communication.

Submit
31. Incometaxindia.gov.in is a url of?

Explanation

The website "incometaxindia.gov.in" is a URL of an e-governance site. This can be inferred from the domain name "incometaxindia" which suggests that the website is related to income tax in India. Moreover, the ".gov.in" domain indicates that it is a government website. Therefore, it can be concluded that the correct answer is e-governance site.

Submit
32. If it is a composite primary key, it ought to be a table level constraint at the time of definition and not a column constraint.

Explanation

A composite primary key is a primary key that consists of more than one column. In order to enforce this constraint, it should be defined at the table level rather than at the column level. This means that all the columns that make up the composite primary key must be specified together as the primary key for the table. Therefore, the statement that if it is a composite primary key, it ought to be a table level constraint is true.

Submit
33. Copper Cables are generally restricted to 100 metres.

Explanation

Copper cables have limitations in terms of signal loss and degradation over distance. Generally, copper cables are restricted to a maximum length of 100 meters before the signal quality deteriorates significantly. This is due to the resistance and capacitance of the copper wire, which affects the transmission of electrical signals. Therefore, it is true that copper cables are generally restricted to 100 meters.

Submit
34. For using date and calender which package should be imported?

Explanation

To use date and calendar in a program, the "Util" package should be imported. This package contains classes and methods that provide functionality for working with dates and calendars. By importing the "Util" package, we can access and use the classes and methods related to date and calendar operations in our program.

Submit
35. Calendar class is found in which package?

Explanation

The correct answer is "Util" because the Calendar class is a part of the java.util package. This package contains various utility classes and interfaces that are commonly used in Java programming, including the Calendar class for working with dates and times.

Submit
36. Indiapost.gov.in and passportindia.gov.in are examples of?

Explanation

Indiapost.gov.in and passportindia.gov.in are examples of e-Governance sites because they are government websites that provide services and information to the public. These sites are specifically designed to facilitate and streamline government processes and interactions with citizens, such as applying for passports or accessing postal services. They aim to improve transparency, efficiency, and accessibility in government operations through the use of technology and online platforms.

Submit
37. Which protocol does the Apache server use?

Explanation

The Apache server uses the HTTP protocol. HTTP stands for Hypertext Transfer Protocol and is the primary protocol used for communication on the World Wide Web. Apache is a popular web server software that is widely used to host websites and deliver web pages to users. By using the HTTP protocol, Apache can handle requests from clients (such as web browsers) and send back the requested web pages.

Submit
38. Open Office is a ________?

Explanation

Open Office is a suite like MS Office, meaning it is a collection of software applications that are similar to those found in Microsoft Office. It includes programs such as a word processor, spreadsheet, presentation software, and more.

Submit
39. If int  a=10,b=20 what is the result of the following expression b+a*b*a

Explanation

The expression b+a*b*a can be simplified using the order of operations. First, we multiply a by b, resulting in 10*20 = 200. Then, we multiply this result by a again, giving us 200*10 = 2000. Finally, we add b to this result, resulting in 2000+20 = 2020. Therefore, the correct answer is 2020.

Submit
40. There are n1 rows in first table, n2 rows in second table. The cross join of the two tables will have how many rows?

Explanation

The cross join of two tables combines each row from the first table with every row from the second table, resulting in a total of n1 * n2 rows.

Submit
41. Copper Cables are generally restricted to 100 metres.

Explanation

Copper cables have a limitation in terms of the distance they can effectively transmit signals without significant loss or degradation. This limitation is typically around 100 meters. Therefore, the statement that copper cables are generally restricted to 100 meters is true.

Submit
42. Which command is used to remove rows from a table from the database?

Explanation

The correct answer is "Delete". The Delete command is used to remove rows from a table in a database. It allows for the deletion of specific rows based on specified conditions, or it can be used to delete all rows in a table. The Drop command is used to remove an entire table from the database. Remove and Clear are not valid commands for removing rows from a table.

Submit
43. A row is also called a ?

Explanation

A row in a database table is also referred to as a tuple. A tuple represents a single record or instance of data within a table. It contains a collection of attributes or columns that define the properties or characteristics of that particular record. Therefore, the correct answer is tuple.

Submit
44. Do -- while loop is exit controlled loop?

Explanation

A do-while loop is an exit-controlled loop because the condition to exit the loop is checked at the end of the loop body. This means that the loop will always execute at least once, regardless of whether the condition is initially true or false. After each iteration, the condition is checked, and if it is true, the loop continues to execute. If the condition is false, the loop exits.

Submit
45. WiMax technology is used in?

Explanation

WiMax technology is used in WAN (Wide Area Network). WiMax, which stands for Worldwide Interoperability for Microwave Access, is a wireless communication technology that provides high-speed internet access over long distances. It is commonly used to connect remote areas or locations that are not easily accessible by traditional wired networks. With its wide coverage range, WiMax is ideal for establishing connections in large geographical areas, making it suitable for WAN applications.

Submit
46. Which of the following table constraint is used to provide a Default Value to the column?

Explanation

The table constraint used to provide a default value to a column is the "Default" constraint. This constraint allows the user to specify a default value that will be used for the column if no other value is provided during insertion.

Submit
47. Open Office is a ________?

Explanation

Open Office is a suite like MS Office. This means that it is a collection of various software applications that are similar to the ones found in Microsoft Office. It includes programs like a word processor, spreadsheet, presentation software, and more. Just like MS Office, Open Office provides users with a range of tools to create and edit documents, spreadsheets, and presentations, making it a comprehensive software suite for various office tasks.

Submit
48. The title tag is is to be defined in which section?

Explanation

The title tag is to be defined in the head section of an HTML document. This tag is used to specify the title of the webpage, which is displayed in the browser's title bar or tab. The head section contains meta-information about the webpage, such as the title, character encoding, and linked stylesheets or scripts.

Submit
49. There are n1 rows in first table, n2 rows in second table. The cross join of the two tables will have how many rows?

Explanation

The cross join of two tables combines every row from the first table with every row from the second table. So, for each row in the first table, there will be n2 rows from the second table. Therefore, the total number of rows in the cross join will be n1 * n2.

Submit
50. String object is immutable ?

Explanation

A string object is immutable, meaning its state cannot be modified after it is created. When we perform operations on a string, such as concatenation or substring, a new string object is created instead of modifying the original one. This immutability ensures that strings are thread-safe and can be safely shared among multiple threads without the risk of unexpected modifications.

Submit
51. There can be only one Primary Key in the Table?

Explanation

In a database table, the primary key is a unique identifier for each record. It ensures that each record in the table is uniquely identified and allows for efficient retrieval and manipulation of data. Having multiple primary keys in a table would defeat the purpose of a primary key, as it would no longer guarantee uniqueness. Therefore, there can be only one primary key in a table.

Submit
52. R in RAD stands for?

Explanation

The correct answer is "rapid." The R in RAD stands for "rapid."

Submit
53. WiMax technology is used in?

Explanation

WiMax technology is used in WAN (Wide Area Network) applications. WiMax stands for Worldwide Interoperability for Microwave Access, and it is a wireless communication technology that provides high-speed internet access over long distances. It is commonly used to connect remote areas or areas where wired connections are not feasible, making it ideal for WAN applications.

Submit
54. A firewall caches internet pages of the LAN which are frequently requested.

Explanation

A firewall caches internet pages of the LAN which are frequently requested. This means that when a user from the LAN requests a webpage, the firewall checks if it has a cached copy of that webpage. If it does, it serves the cached copy to the user instead of retrieving it from the internet. This helps to improve the speed and efficiency of internet browsing for users on the LAN.

Submit
55. Which topology is hierarchical in nature? ( 1 Word )

Explanation

The tree topology is hierarchical in nature as it follows a parent-child relationship where each node has only one parent and can have multiple children. The nodes are organized in a hierarchical structure, similar to a tree, with a root node at the top and branches connecting the nodes. This topology allows for easy management and scalability as any changes made to one part of the tree do not affect the entire network.

Submit
56. LI in HTML stands for?

Explanation

LI in HTML stands for "List Item". In HTML, lists are used to group related items together. The LI element is used to define each individual item in a list, whether it is an ordered list (OL) or an unordered list (UL). So, when we see LI in HTML, it refers to a list item within a list structure.

Submit
57. Which of  the following two are advantages of e-Governance?

Explanation

The advantages of e-Governance are reduced corruption and reduced paperwork. E-Governance allows for more transparency and accountability in government processes, reducing the opportunities for corruption. Additionally, it eliminates the need for manual paperwork, making government processes more efficient and saving time and resources.

Submit
58. A in ACID stands for?

Explanation

The correct answer is Atomicity. Atomicity is one of the properties in the ACID (Atomicity, Consistency, Isolation, Durability) acronym, which is used to describe the properties of a reliable database transaction. Atomicity refers to the concept that a transaction is treated as a single, indivisible unit of work. This means that either all the changes made by the transaction are committed to the database, or none of them are. In other words, a transaction is either completed in its entirety or not at all.

Submit
59. A group of logically related classes is called a?

Explanation

A group of logically related classes is called a package. A package is used to organize related classes and provide a way to manage and control access to them. It helps in modularizing the code and making it more organized, maintainable, and reusable. By grouping classes into packages, it becomes easier to locate and understand the code, and also helps in avoiding naming conflicts between classes.

Submit
60. Ubuntu is open source _________?

Explanation

Ubuntu is open source because it is an operating system (OS) that is based on the Linux kernel. Open source means that the source code of the software is freely available to the public, allowing users to view, modify, and distribute the code. Ubuntu being an open source OS means that anyone can access and modify its source code, contributing to its development and customization.

Submit
61. Which topology is hierarchical in nature? ( 1 Word )

Explanation

The tree topology is hierarchical in nature because it follows a hierarchical structure where all the nodes are connected in a specific pattern. The nodes are organized in a tree-like structure with a root node at the top and branches connecting to other nodes. This hierarchy allows for easy management and control of the network as information flows from the top down, making it an ideal choice for large networks.

Submit
62. Dta members and methods are packed together in the class, this principle is known as________.

Explanation

Encapsulation is the principle where data members and methods are packaged together in a class. This allows for the hiding of internal details and providing access to the class through a public interface. Encapsulation helps in achieving data security and code reusability.

Submit
63. Once a table structure is created it can not be modified.

Explanation

The statement is false because table structures can be modified after they are created. It is possible to add or remove columns, change data types, modify constraints, and perform other alterations to the table structure. This flexibility allows for the adaptation of the table to changing requirements or improvements in the database design.

Submit
64. While(1) { System.out.println("Hello World"): } The above loop will run

Explanation

The given code contains a while loop with the condition "while(1)", which means the loop will continue to run indefinitely as long as the condition is true. Since the condition is always true (1 is always true in programming), the loop will never terminate and will continue to print "Hello World" infinitely. Therefore, the correct answer is that it is an infinite loop.

Submit
65. Snapdeal.com is a ?

Explanation

Snapdeal.com is an e-commerce site. E-commerce refers to the buying and selling of goods and services over the internet. Snapdeal.com allows users to browse and purchase a wide range of products online, making it an e-commerce site.

Submit
66. Concat() is a method of which class?

Explanation

The concat() method is a method of the String class. It is used to concatenate two strings together and return a new string that is the combination of the two original strings.

Submit
67. Round and pow  are methods of?

Explanation

The methods "round" and "pow" are part of the Math package in Java. The Math package provides mathematical functions and operations, including rounding numbers and raising a number to a power.

Submit
68. What is the result of the following? String str="Hi There"; int len=str.length(); System.out.prinltln(len);

Explanation

The given code snippet initializes a string variable "str" with the value "Hi There". Then, it calculates the length of the string using the "length()" method and stores it in an integer variable "len". Finally, it prints the value of "len" using the "println()" method. Since the string "Hi There" has 8 characters, the length of the string is 8. Therefore, the result of the code is 8.

Submit
69. There can be only one NOT NULL column in a table?

Explanation

This statement is false because there can be multiple NOT NULL columns in a table. The NOT NULL constraint is used to ensure that a column cannot contain any NULL values, and it can be applied to multiple columns within a table. Therefore, it is not limited to just one column.

Submit
70. There can be only one NOT NULL column in a table?

Explanation

False. In a table, multiple columns can be designated as NOT NULL, meaning they cannot contain null values.

Submit
71. A group of logically related classes is called a?

Explanation

A group of logically related classes is called a "package". In programming, a package is a way to organize and group related classes together. It helps in managing and organizing the codebase, making it easier to understand and maintain. Packages provide a way to encapsulate classes and prevent naming conflicts. They also provide a level of abstraction and modularity, allowing for better code reuse and separation of concerns.

Submit
72. What is the output of the following query? select sum(Basic) from Employee where eno>=5;

Explanation

The query is selecting the sum of the "Basic" column from the "Employee" table where the "eno" column is greater than or equal to 5. The output of the query is 3000, which suggests that the sum of the "Basic" values for all employees with an "eno" greater than or equal to 5 is 3000.

Submit
73. The natural join is a equi join?

Explanation

The explanation for the given correct answer is that a natural join is a type of equi join. In a natural join, the join condition is based on the equality of all columns with the same name in the two tables being joined. This means that only the matching rows with equal values in the common columns are included in the result set. Therefore, a natural join can be considered as an equi join because it compares the values in the common columns for equality.

Submit
74. A MAN is larger than a WAN.

Explanation

The statement "A MAN is larger than a WAN" is false. In this context, MAN refers to Metropolitan Area Network, which is a network that covers a larger geographical area than a WAN (Wide Area Network). Therefore, a WAN is actually larger than a MAN.

Submit
75. Which command is used to remove a table from the database?

Explanation

The correct answer is "Drop". The "Drop" command is used to remove a table from the database. It permanently deletes the table and all its data from the database.

Submit
76. Which command is used to remove rows from a table from the database?

Explanation

The correct answer is "Delete". The Delete command is used to remove rows from a table in a database. It allows for the deletion of specific rows based on certain conditions or criteria.

Submit
77. In relational terminology a row is also called?

Explanation

In relational terminology, a row is also called a tuple. A tuple represents a single record or instance in a table and contains a set of attributes or fields that describe the data. Each tuple has a unique combination of attribute values, and together they form the rows of a table. Therefore, the correct answer is "Tuple."

Submit
78. Ubuntu is open source _________?

Explanation

Ubuntu is an open-source operating system (OS). Open source refers to a type of software where the source code is freely available to the public, allowing users to view, modify, and distribute it. Ubuntu, being an open-source OS, means that it is built on a foundation of freely available source code, allowing users to customize and adapt it to their needs.

Submit
79. Which of the following tags will create a bulleted list? 

Explanation

The UL tag in HTML is used to create an unordered (bulleted) list. It is used to group a list of items that do not have a specific order or sequence. The UL tag is paired with the LI (list item) tags to define each individual item in the list. When the UL tag is used, the browser automatically adds bullet points to each item in the list.

Submit
80. There can be only one Foreign key in a table?

Explanation

False. There can be multiple foreign keys in a table. A foreign key is a field or a combination of fields in a table that refers to the primary key of another table. It is used to establish a link between the two tables and enforce referential integrity. In a table, there can be multiple relationships with other tables, each requiring a separate foreign key. Therefore, it is not limited to just one foreign key in a table.

Submit
81. Which topology has the advantage of short cable length? ( 1 word )

Explanation

The bus topology has the advantage of short cable length because all devices in the network are connected to a single cable, creating a linear structure. This eliminates the need for long cable runs to connect devices, resulting in shorter cable lengths overall.

Submit
82. Alter table command can be used to drop the Primary KeY?

Explanation

The alter table command can be used to drop the Primary Key. This command allows for changes to be made to an existing table, including adding or dropping columns, modifying data types, and altering constraints. In the case of dropping the Primary Key, the alter table command can be used to remove the constraint associated with the Primary Key, effectively dropping it from the table.

Submit
83. This is the instantiation of a class?

Explanation

In object-oriented programming, a class is a blueprint for creating objects. An object is an instance of a class, meaning it is created based on the class definition. Therefore, the correct answer is "Object" as it represents the instantiation of a class.

Submit
84. Which of  the following two are advantages of e-Governance?

Explanation

The advantages of e-Governance are reduced corruption and reduced paperwork. E-Governance allows for more transparency and accountability in government processes, making it more difficult for corruption to occur. Additionally, e-Governance reduces paperwork by digitizing and automating many administrative tasks, making government processes more efficient and cost-effective.

Submit
85. Which of the following is a cross of Text Field and List?

Explanation

A ComboBox is a combination of a Text Field and a List. It allows the user to either enter a value manually or select from a pre-defined list of options. This makes it a cross between a Text Field and a List.

Submit
86. The natural join is a equi join?

Explanation

The natural join is a type of join operation in relational databases where the join is performed based on matching columns with the same name and data type. In an equi join, the join condition is based on equality between two columns. In the case of a natural join, the join condition is automatically determined based on the matching column names. Therefore, it can be concluded that the natural join is indeed an equi join.

Submit
87. Which of the following table constraint is used to provide a Default Value to the column?

Explanation

The Default constraint is used to provide a default value to a column in a table. This means that if no value is specified for the column when inserting a new row, the default value will be used instead. This constraint ensures that the column always has a value, even if it is not explicitly provided.

Submit
88. Alter table command can be used to add the Primary KeY to a table?

Explanation

The alter table command can indeed be used to add the Primary Key to a table. This command allows for modifications to be made to an existing table, including adding or modifying constraints such as the Primary Key. By specifying the table name and the column(s) to be designated as the Primary Key, the alter table command can successfully add the Primary Key constraint to the table.

Submit
89. Which of the following is just like the bullted list in HTML?

Explanation

UL stands for Unordered List in HTML. It is used to create a bulleted list where each item in the list is preceded by a bullet point. UL is similar to the bullted list in HTML as it allows for the creation of a list without any specific order or hierarchy. The items in the list are not numbered and are displayed with bullet points.

Submit
90. Dta members and methods are packed together in the class, this principle is known as________.

Explanation

Encapsulation is the principle where data members and methods are bundled together in a class. This allows for the hiding of internal details and provides a way to control access to the data. It promotes modular and organized code by grouping related data and functions together.

Submit
91. What will happen if you forget to give where condition after update command? 

Explanation

If you forget to give a WHERE condition after an update command, it will update all rows of the table. This means that the update operation will be applied to every row in the table, potentially causing unintended changes to the data. It is important to always specify a WHERE condition in order to target specific rows for update and avoid unintended consequences.

Submit
92. Class level variables are declared ?

Explanation

Class level variables are declared in the beginning of the class definition. This means that they are declared outside of any specific method or constructor in the class. By declaring variables at the class level, they become accessible to all methods within the class. This allows the variables to be shared and used throughout the class, rather than being limited to a specific method or constructor.

Submit
93. A table level primary key constraint is created when two or more columns form the Primary Key?

Explanation

A table level primary key constraint is created when two or more columns form the Primary Key. This means that the primary key constraint is applied to the entire table, rather than just a single column. It ensures that the combination of values in the specified columns is unique for each row in the table.

Submit
94. There can be only one Foreign key in a table?

Explanation

This statement is false. A table can have multiple foreign keys, which are used to establish relationships with other tables. Foreign keys are used to ensure referential integrity and maintain data consistency in the database.

Submit
95. Fiber cable has high transmission loss?

Explanation

Fiber cable actually has low transmission loss. This is because fiber optic cables use light to transmit data, which experiences very little signal loss over long distances. Unlike traditional copper cables, fiber optic cables do not suffer from electromagnetic interference or signal degradation. Therefore, fiber cables are known for their high transmission capacity and low loss of signal strength.

Submit
96. Which of the following is just like the bullted list in HTML?

Explanation

The correct answer is UL because UL stands for Unordered List in HTML, which is used to create a bulleted list. It is a type of list that does not have a specific order or sequence.

Submit
97. Which keyword is used for implementing inheritance in java?

Explanation

The keyword "extends" is used for implementing inheritance in Java. Inheritance allows a class to inherit the properties and methods of another class, known as the superclass. The "extends" keyword is used to create a subclass that inherits the attributes and behaviors of the superclass. By using "extends", the subclass can access and use the methods and variables of the superclass, allowing for code reuse and creating a hierarchical relationship between classes.

Submit
98. Calender is a static class?

Explanation

The statement is true because the Calendar class in Java is a static class. This means that it can be accessed directly without creating an instance of the class. The methods and fields in the Calendar class are also static, allowing them to be accessed without creating an object of the class.

Submit
99. JDBC can be used only from java?

Explanation

JDBC (Java Database Connectivity) is a Java API that allows Java programs to interact with databases. It provides a set of classes and interfaces that enable developers to connect to a database, execute SQL queries, and retrieve and manipulate data. Since JDBC is a Java API, it can only be used from Java programming language. Other programming languages may have their own APIs or libraries for interacting with databases. Therefore, the statement "JDBC can be used only from Java" is true.

Submit
100. In relational terminology a row is also called?

Explanation

In relational terminology, a row is also called a tuple. A tuple represents a single record in a table and contains a set of related data values. It is a collection of attributes or fields that define the characteristics of the data stored in the table. Therefore, the correct answer is "Tuple."

Submit
101. A cross join is created by using two tables. First table has 5 rows , second table has three rows, the result has how many rows?

Explanation

A cross join is created by combining every row from the first table with every row from the second table. In this case, the first table has 5 rows and the second table has 3 rows. Therefore, the result will have 5 multiplied by 3, which is 15 rows.

Submit
102.      ISCII is a _________bit code?

Explanation

ISCII is an 8-bit code.

Submit
103. What is the output of the following query? select sum(Basic) from Employee where eno>=5;

Explanation

The output of the query is 3000. This is because the query is selecting the sum of the "Basic" column from the "Employee" table where the "eno" column is greater than or equal to 5. The sum of the "Basic" values for all rows where the "eno" is greater than or equal to 5 is 3000.

Submit
104. LI in HTML stands for?

Explanation

The correct answer is "List Item." In HTML, the "LI" tag is used to define a list item within an ordered or unordered list. It is used to create bullet points or numbered items in a list.

Submit
105. Statement stmt; stmt=con.createConnection(); stmt.executeQuery();  // What is the return type of this statement? What is the return type of this statement? stmt.executeQuery()

Explanation

executeQuery returns a ResultSet object which holds the data specified in the query.
ResultSet rs=stmt.executeQuery("select *from emp);

Submit
106. Transliteration of Indian Languages means?

Explanation

Transliteration of Indian Languages refers to using English phonetics to type Indian languages. This means that instead of using the traditional Indian language keyboard layout, one can type in Indian languages using the English alphabet. For example, typing "Namaste" in English would automatically convert it to नमस्ते in Hindi. This method allows individuals who are familiar with English to easily type in Indian languages without having to learn a new keyboard layout.

Submit
107. There can be only one unique key in a Table?

Explanation

This statement is false because in a table, there can be multiple unique keys. A unique key is a column or a set of columns that uniquely identifies each row in the table. While there can be only one primary key in a table, which is a unique key that is used to identify each row, there can also be other unique keys in the table that ensure the uniqueness of certain columns or combinations of columns. Therefore, there can be more than one unique key in a table.

Submit
108. A cross join is created by using two tables. First table has 5 rows , second table has three rows, the result has how many rows?

Explanation

A cross join combines every row from the first table with every row from the second table, resulting in a new table with a number of rows equal to the product of the number of rows in each table. In this case, the first table has 5 rows and the second table has 3 rows, so the result will have 5 * 3 = 15 rows.

Submit
109. In which of the following topologies there is a dependence on the central node for functioning?

Explanation

In a star topology, all devices in the network are connected to a central node, often referred to as a hub or switch. This central node plays a crucial role in the functioning of the network as it is responsible for managing and controlling the communication between the devices. Without the central node, the devices in the network would not be able to communicate with each other. Therefore, there is a dependence on the central node for the proper functioning of a star topology network.

Submit
110. Which three of the following are DML commands in MySql?

Explanation

The question asks for the three DML (Data Manipulation Language) commands in MySql. DML commands are used to modify and manipulate data in a database. The correct answer is Insert, Update, and Delete. These commands are commonly used to insert new records into a table, update existing records, and delete records from a table respectively.

Submit
111. While(1); { System.out.println("Hello World"): } What is the error in the above piece of code

Explanation

The error in the above piece of code is that there is a semicolon after the while statement. The semicolon terminates the while loop, causing it to become an infinite loop. The code inside the loop will never be executed.

Submit
112. Which two of the following are protocols?

Explanation

FTP and HTTP are both protocols. FTP stands for File Transfer Protocol, which is used for transferring files between computers on a network. HTTP stands for Hypertext Transfer Protocol, which is the protocol used for transmitting hypertext over the internet. TTP and SMHT are not recognized protocols.

Submit
113. Order by clause in Mysql is used to

Explanation

The order by clause in MySQL is used to sort the result set of a query in either ascending or descending order based on one or more columns. It allows the user to specify the order in which the rows should be displayed. By default, the sorting is done in ascending order, but it can be modified to sort in descending order as well by using the DESC keyword. Therefore, the correct answer is "Sort in ascending or descending order."

Submit
114. ODBC can be used from any front end?

Explanation

ODBC (Open Database Connectivity) is a standard programming interface that allows applications to access data in database management systems. It provides a consistent way for different front-end applications to communicate with various database systems. Therefore, ODBC can indeed be used from any front end, making the statement "True" correct.

Submit
115. Arrange the events in the order they need to be carried out 1. Extract data from result set 2. import the sql package 3. Execute Query 4.Open a connection

Explanation

The correct order of events to be carried out is as follows:
1. Import the sql package
2. Open a connection
3. Execute Query
4. Extract data from result set.

Submit
116. System and String classes are defined in which package?

Explanation

The System and String classes are defined in the "lang" package. This package is a part of the Java standard library and contains fundamental classes and interfaces that are essential for developing Java programs. The lang package provides basic functionalities and utilities that are used extensively in Java programming, including the System class for accessing system resources and the String class for manipulating strings.

Submit
117. Which package is imported by default in java?

Explanation

In Java, the "lang" package is imported by default. This package contains fundamental classes and interfaces that are essential for the Java language, such as the Object class, which is the root of all classes in Java. Importing the "lang" package allows access to these fundamental classes without explicitly importing them in every Java program.

Submit
118. R in RAD stands for?

Explanation

The correct answer is "rapid" because the acronym RAD stands for Rapid Application Development. RAD is a software development methodology that emphasizes quick prototyping and iterative development to deliver software faster.

Submit
119. A MAN is larger than a WAN.

Explanation

The statement "A MAN is larger than a WAN" is false. In computer networking, a MAN (Metropolitan Area Network) is larger than a WAN (Wide Area Network). A MAN covers a larger geographical area, typically a city or a metropolitan area, while a WAN covers a larger area, such as multiple cities or even countries. Therefore, the correct answer is false.

Submit
120. Shiksha.com and MeritNation.com are ___________ websites?

Explanation

Shiksha.com and MeritNation.com are e-learning websites. This means that they provide online educational resources and courses to students. These websites offer a platform for students to access study materials, practice tests, and interactive learning tools. They aim to enhance the learning experience by providing a digital platform for students to learn and improve their academic skills.

Submit
121.  Having clause can be used without group by clause?

Explanation

The having clause is used to filter the groups generated by the group by clause. It is used in conjunction with the group by clause, so it cannot be used without the group by clause. Therefore, the statement "Having clause can be used without group by clause" is false.

Submit
122. Haryana.nic.in is a url of?

Explanation

The given URL, haryana.nic.in, is most likely a government website as it ends with ".nic.in" which is a domain reserved for government organizations in India. The "nic" in the domain stands for National Informatics Centre, which is a government agency responsible for providing e-governance services. Therefore, it can be inferred that haryana.nic.in is an e-governance site.

Submit
123. The maximum value dayofyear() function can return is?

Explanation

The dayofyear() function returns the day of the year for a given date. In a non-leap year, there are 365 days, so the maximum value the function can return in that case is 365. However, in a leap year, there is an extra day, making it a total of 366 days. Therefore, the correct answer is 366.

Submit
124. StringBuffer object is immutable ?

Explanation

The given answer is False. StringBuffer objects are actually mutable, meaning that they can be modified after they are created. Unlike String objects, which are immutable and cannot be changed once created, StringBuffer objects can have their values modified by using methods such as append(), delete(), and insert(). This makes StringBuffer a more flexible choice when dealing with dynamic string operations.

Submit
125. There can be only one alternate key in a table?

Explanation

This statement is false because a table can have multiple alternate keys. Alternate keys are unique identifiers that can be used as an alternative to the primary key for identifying records in a table. These alternate keys can be composed of one or more columns in the table. Therefore, it is possible to have more than one alternate key in a table.

Submit
126. Class level variables are declared ?

Explanation

Class level variables are declared in the beginning of the class definition. This means that they are declared outside of any specific method or constructor and are accessible throughout the entire class. By declaring variables at the class level, they can be accessed and modified by any method within the class, providing a way to store and share data across multiple methods.

Submit
127. There can be only one alternate key in a table?

Explanation

This statement is false because a table can have multiple alternate keys. An alternate key is a candidate key that is not chosen as the primary key. It provides an alternative way to uniquely identify records in a table. Therefore, it is possible to have more than one alternate key in a table.

Submit
128. Which of the following is immutable?

Explanation

String is immutable in Java, meaning that once a String object is created, its value cannot be changed. Any operation that appears to modify a String actually creates a new String object. This immutability ensures that String objects are thread-safe and can be safely shared among multiple threads without the risk of data corruption.

Submit
129. Abstract class is a class which can be instantiated?

Explanation

An abstract class cannot be instantiated directly. It is meant to be subclassed and serves as a blueprint for other classes. Objects cannot be created from an abstract class, but it can be used as a reference type for polymorphism.

Submit
130. A foreign key can not refer to the same table primary key?

Explanation

A foreign key can refer to the same table primary key. This is known as self-referencing or self-join, where a table can have a foreign key that references its own primary key. This can be useful in scenarios where there is a hierarchical relationship within the data.

Submit
131. Which of the following is a cross of Text Field and List?

Explanation

A ComboBox is a cross between a Text Field and a List because it allows the user to either select an item from a drop-down list or enter their own text. It combines the functionality of a text input field with the ability to choose from a predefined set of options.

Submit
132. You want to take the input of Hobbies from the user, ie Sports, Movies , Traveling etc which of the following controls would be the most suitable?

Explanation

A check box would be the most suitable control for taking input of hobbies from the user. This is because a check box allows the user to select multiple options from a list, which is ideal for selecting multiple hobbies. A radio button, on the other hand, only allows the user to select one option, which would not be suitable for selecting multiple hobbies. A text field is used for entering free-form text, so it would not be appropriate for selecting hobbies from a predefined list. A combo box is a drop-down list that allows the user to select one option, so it would not be suitable for selecting multiple hobbies either.

Submit
133. Calendar class is an abstract class.

Explanation

The statement is true because the Calendar class in Java is indeed an abstract class. This means that it cannot be directly instantiated and used to create objects. Instead, it serves as a base class for specific calendar implementations such as the GregorianCalendar class. By making the Calendar class abstract, it provides a common set of methods and functionality that can be shared among different calendar implementations.

Submit
134. WE can use Indian language key map to type in Iindian languages?

Explanation

The statement is true because Indian language key maps are designed specifically to enable users to type in Indian languages. These key maps provide the necessary characters and symbols required for typing in languages such as Hindi, Tamil, Bengali, etc. By using the Indian language key map, users can easily switch between English and Indian languages on their keyboards and type in their preferred language.

Submit
135. Protected data members are accessible outside the class in which defined?

Explanation

Protected data members are only accessible within the class in which they are defined and in the derived classes. They are not accessible outside of the class.

Submit
136. By default autocommit is on?

Explanation

By default, autocommit is set to "on" in many database management systems. This means that each individual SQL statement is treated as a transaction and is automatically committed to the database once it is executed. This can be convenient for small or simple operations where you don't need to manually manage transactions. However, in more complex scenarios, it may be necessary to turn off autocommit and manually manage transactions to ensure data consistency and integrity.

Submit
137. Abstract class is a class which can be instantiated?

Explanation

An abstract class cannot be instantiated because it is incomplete and serves as a blueprint for other classes to inherit from. It contains abstract methods that must be implemented by its subclasses. Therefore, an abstract class cannot be directly instantiated but can only be used as a base for creating objects of its subclasses.

Submit
138. Which command is used to drop a column? ( two words )

Explanation

The command "alter table" is used to modify the structure of a table in a database. In this case, it is specifically used to drop a column from a table.

Submit
139. Alter table command can be used to drop the Primary KeY?

Explanation

The alter table command can indeed be used to drop the Primary Key. This command allows for modifications to be made to an existing table, including adding or removing constraints such as Primary Keys.

Submit
140. What is the return type of Math.pow() ?

Explanation

The return type of Math.pow() is double because the Math.pow() function in Java is used to calculate the power of a number. It takes two parameters, the base and the exponent, and returns the result as a double data type. The double data type is used to represent decimal numbers with high precision. Therefore, the correct answer is double.

Submit
141. Which of the following tag is used for table heading style?

Explanation

The correct answer is "th". In HTML, the "th" tag is used to define a header cell in a table. It is typically used to label the columns or rows in a table, providing a clear and concise description of the data in that particular section of the table. The "th" tag is important for accessibility purposes as it helps screen readers and other assistive technologies to properly identify and navigate the table headers.

Submit
142. In case of nesting a Break statement will break the?

Explanation

In case of nesting, a break statement will break the loop in which it is placed. This means that if there are multiple loops nested within each other, the break statement will only exit the loop in which it is directly placed. It will not exit any outer loops or inner loops. Therefore, the correct answer is "The loop in which break is placed."

Submit
143. A table level primary key constraint is created when two or more columns form the Primary Key?

Explanation

A table level primary key constraint is created when two or more columns form the Primary Key. This means that the primary key constraint is applied to the entire table and not just a single column. It ensures that the combination of values in the specified columns is unique for each row in the table.

Submit
144. Commit and Rollback are exemples of?

Explanation

Commit and Rollback are examples of Transaction Control Language (TCL) statements. TCL statements are used to manage transactions in a database. Commit is used to save the changes made in a transaction, while Rollback is used to undo the changes made in a transaction. These statements ensure the consistency and integrity of the data in the database by allowing users to control the outcome of a transaction.

Submit
145. Which of the following principles does the optical fibre use for transmission?

Explanation

Optical fibers use the principle of total internal reflection for transmission. This occurs when light rays traveling through a medium with a higher refractive index encounter a boundary with a medium of lower refractive index at an angle greater than the critical angle. Instead of refracting out of the medium, the light is reflected back into the medium, allowing it to travel through the fiber by bouncing off the walls. This principle allows for efficient transmission of light signals over long distances in optical fibers.

Submit
146. In MYSql _________ keyword is used to check for null values?( 1 word )

Explanation

The keyword "is" is used in MySQL to check for null values.

Submit
147. Which of thefollowing aretrue about fibre cables?(Select two)

Explanation

Fiber cables are lighter than copper cables because they are made of glass or plastic fibers, which are lighter materials compared to copper. They are used mostly in backbone networks because fiber optic cables can transmit data over longer distances without losing signal strength, making them suitable for connecting different networks.

Submit
148. Which of the following SQL objects will store the data retrieved through a Query?

Explanation

The ResultSet object in SQL stores the data retrieved through a query. It is used to hold the result set of a query and allows for easy access and manipulation of the data. The ResultSet object can be used to iterate over the rows of the result set and retrieve the values of each column in a specific row.

Submit
149. Select ascii("BABITA"); will return

Explanation

The function ascii() is used to return the ASCII value of a character. In this case, the function is applied to the string "BABITA". The ASCII value of the character 'B' is 66, so the function will return 66.

Submit
150. What will be the result of the following? String str="Ravi"; StringBuffer sb=new StringBuffer(str); int len=str.length(); for(int i=0;i

Explanation

The code initializes a string variable "str" with the value "Ravi". It then creates a StringBuffer object "sb" with the same value as "str". The code then gets the length of the string "str" and stores it in the integer variable "len". The for loop iterates from 0 to the value of "len". However, the given code is incomplete and does not provide any information on what happens inside the for loop. Therefore, it is not possible to determine the exact result of the code.

Submit
151. Which of the following is immutable?

Explanation

String is immutable because once a String object is created, its value cannot be changed. Any operation that appears to modify a String actually creates a new String object with the modified value. This immutability property of String makes it safe to use in multi-threaded environments and allows for efficient memory management.

Submit
152. Which of the following topologies have the advantage of short cable length?

Explanation

The bus topology has the advantage of short cable length because all devices are connected to a single cable, resulting in a shorter overall length of cable needed compared to other topologies. In a bus topology, devices are connected in a linear fashion, with each device tapping into the main cable. This eliminates the need for individual cables to connect each device to a central point, as in the star topology. The ring and tree topologies also require longer cable lengths to connect devices in a circular or hierarchical manner. Therefore, the bus topology is the correct answer as it minimizes cable length.

Submit
153. A while loop will execute at least once irrespective of the condition specified in the loop?

Explanation

A while loop will only execute if the condition specified in the loop is true. If the condition is false from the beginning, the loop will not execute at all. Therefore, the statement that a while loop will execute at least once irrespective of the condition is false.

Submit
154. Which of the following principles does the optical fibre use for transmission?

Explanation

Optical fibers use the principle of total internal reflection for transmission. This occurs when light traveling through a medium with a higher refractive index encounters a boundary with a medium of lower refractive index at an angle greater than the critical angle. Instead of being refracted, the light is reflected back into the higher refractive index medium, allowing it to propagate through the fiber by bouncing off the walls. This principle ensures that the light signal remains confined within the fiber and is able to travel long distances without significant loss of signal strength.

Submit
155. Which of the following two are selection statements?

Explanation

The two selection statements in the given options are "if" and "switch". The "if" statement is used to execute a block of code if a certain condition is true. The "switch" statement is used to select one of many code blocks to be executed, based on the value of a variable. Both of these statements are used to control the flow of the program based on certain conditions.

Submit
156. How many records will be displayed by the following Query? select count(distinct Mgr) from Employee?

Explanation

The query "select count(distinct Mgr) from Employee" will display the count of distinct values in the "Mgr" column of the "Employee" table. The answer "2" suggests that there are two distinct values in the "Mgr" column.

Submit
157. Which of the following controls can be used to show cities in a HTML  form?

Explanation

A List or Combobox control can be used to show cities in an HTML form. This control allows the user to select a single option from a dropdown list of cities. The user can scroll through the list and choose the desired city. This control is commonly used when there are a limited number of options to choose from, such as a list of cities.

Submit
158. You can save time  by creating your website?

Explanation

DreamWeaver is a web development software that provides a visual interface for creating websites. It offers various features and tools that can help streamline the website creation process, allowing users to save time compared to manually coding the website using HTML or using a word processor like Word. DreamWeaver provides a more efficient and user-friendly way to design and develop websites.

Submit
159. String str="123"; StringBuffer sb=new StringBuffer(str); sb.reverse(); String str1=sb.toString(); String str2=str1+str; System.out.println(str2); What is  the output of the above code?

Explanation

The given code reverses the string "123" using the StringBuffer class and appends it to the original string. Therefore, the output of the code will be "321123".

Submit
160. How many records will be displayed by the following Query? select count(distinct Mgr) from Employee?

Explanation

The query "select count(distinct Mgr) from Employee" will display the count of distinct values in the "Mgr" column of the Employee table. The answer to the question is 2, indicating that there are two distinct values in the "Mgr" column.

Submit
161. How  many records will be displayed by the following query? select * from Employee where Basic>2000;

Explanation

The query "select * from Employee where Basic>2000" will display 2 records.

Submit
162. Descriptive Web Site names are converted into numerical ones by which of the following?

Explanation

A DNS server converts descriptive web site names into numerical IP addresses. When a user types in a website name (such as www.example.com) into their web browser, the DNS server translates that name into the corresponding IP address (such as 192.168.0.1) that the computer can understand. This allows the user's computer to connect to the correct web server and access the desired website.

Submit
163. Statement stmt; stmt=con.createConnection(); stmt.executeQuery();  // What is the return type of this statement? What is the return type of this statement? stmt.executeQuery()

Explanation

executeQuery returns a ResultSet object which holds the data specified in the query.
ResultSet rs=stmt.executeQuery("select *from emp);

Submit
164. Open type fonts are same as Unicode?

Explanation

Open type fonts are not the same as Unicode. Unicode is a character encoding standard that assigns a unique number to each character, while Open type is a font format developed by Microsoft and Adobe that supports advanced typographic features. Open type fonts can contain Unicode characters, but they can also include additional features such as ligatures, alternate glyphs, and stylistic sets. Therefore, while Open type fonts can support Unicode characters, they are not synonymous with Unicode itself.

Submit
165. One transaction can have only one DML statement?

Explanation

This statement is false because a single transaction can have multiple DML (Data Manipulation Language) statements, such as INSERT, UPDATE, DELETE, or MERGE. These statements can be used to modify data in a database within a single transaction. Therefore, the statement "One transaction can have only one DML statement" is incorrect.

Submit
166. A firewall generally sits on ?

Explanation

A firewall generally sits on a proxy server. A proxy server acts as an intermediary between a client device and a web server, allowing the firewall to monitor and control incoming and outgoing network traffic. The firewall on the proxy server can inspect the data packets and apply security measures to protect the network from unauthorized access, malware, and other threats. By sitting on a proxy server, the firewall can effectively filter and block suspicious or malicious traffic before it reaches the intended destination.

Submit
167. Descriptive Web Site names are converted into numerical ones by which of the following?

Explanation

DNS servers are responsible for converting descriptive website names (such as www.example.com) into numerical IP addresses (such as 192.168.1.1) that computers can understand. When a user types a website name into their browser, the DNS server is queried to find the corresponding IP address, allowing the user to access the website. Therefore, DNS servers are used to convert descriptive website names into numerical ones.

Submit
168. Statement.executeUpdate(); method is used for fetching the data from the database from netbeans?

Explanation

The statement.executeUpdate() method is not used for fetching data from the database in NetBeans. This method is typically used for executing SQL statements that modify data in the database, such as INSERT, UPDATE, or DELETE statements. To fetch data from the database in NetBeans, other methods like statement.executeQuery() or PreparedStatement.executeQuery() are typically used.

Submit
169. Which of the following is exit coltrolled loop?

Explanation

A do-while loop is an exit controlled loop because it checks the condition at the end of the loop. This means that the loop will always execute at least once, even if the condition is initially false. After each iteration, the condition is checked, and if it is true, the loop will continue. If the condition is false, the loop will exit. This is different from a while loop, where the condition is checked at the beginning, and if it is false initially, the loop will not execute at all.

Submit
170. Working at a particular level of abstraction with out considering background details is known as________?

Explanation

Abstraction refers to the concept of working at a higher level of abstraction without concerning oneself with the underlying implementation details. It allows for the creation of simplified models or representations of complex systems, making it easier to understand and work with the system. By focusing on the essential features and hiding unnecessary details, abstraction helps in managing complexity and improving the efficiency of problem-solving.

Submit
171. Which of the following two are selection statements?

Explanation

The two selection statements in the given options are "if" and "switch". The "if" statement is used to execute a block of code if a certain condition is true. The "switch" statement is used to select one of many code blocks to be executed, based on the value of a variable. Both of these statements allow for conditional execution of code, making them selection statements.

Submit
172. Which of the following tags will create a bulleted list? 

Explanation

The UL tag in HTML is used to create an unordered (bulleted) list. It is used to group a set of related items together in a list format, where each item is represented by a bullet point.

Submit
173. One transaction can have only one DML statement?

Explanation

False. One transaction can have multiple DML (Data Manipulation Language) statements. DML statements are used to modify, insert, or delete data in a database. In a transaction, multiple DML statements can be executed together as a single unit of work, ensuring that all changes are either committed or rolled back together. This allows for data consistency and integrity within the database.

Submit
174. Durability of a transaction means?

Explanation

Durability of a transaction refers to the permanence of the changes made during that transaction. It ensures that once a transaction is committed, the changes made to the database will persist and will not be lost even in the event of system failures or crashes. Durability guarantees that the data will be stored reliably and permanently, providing data consistency and integrity.

Submit
175. Which of the following topologies features direct connection between all participating nodes?

Explanation

Mesh topology features a direct connection between all participating nodes. In this topology, each node is connected to every other node in the network, forming a fully interconnected network. This allows for efficient communication and high fault tolerance, as there are multiple paths for data to travel. However, it requires a large number of connections and can be expensive to implement.

Submit
176. A view can be used to rename a column?

Explanation

Yes, a view can be used to rename a column. Views are virtual tables created by a query that can be used to present data in a customized way. When creating a view, the column names can be specified to be different from the original table's column names, effectively renaming them. This allows for easier understanding and manipulation of data without altering the original table structure.

Submit
177. Fiber cable has high transmission loss?

Explanation

Fiber cable actually has low transmission loss. This is because the fiber optic cables are made of glass or plastic, which allows for the transmission of light signals over long distances without significant loss of signal strength. This makes fiber optic cables ideal for long-distance communication and high-speed data transmission.

Submit
178. Which one of the following is true regarding public static void main(String args[])

Explanation

The statement "It is the driver function" is true because the main() method is the entry point of a Java program. It is the first method that is called when a program is executed, and it is responsible for starting the execution of the program. The main() method acts as a driver for the rest of the program, calling other methods and coordinating the flow of execution.

Submit
179. Cardinality of a table is?

Explanation

The cardinality of a table refers to the number of rows in the table. It is a measure of the size or the count of the data in the table. The number of rows represents the number of individual records or instances in the table.

Submit
180. Which of the following needs to be imported for java jdbc connectivity JFrame project from netbeans?

Explanation

The correct answer is "java.sql.*;". This is because the "java.sql" package contains classes and interfaces that are essential for JDBC (Java Database Connectivity) connectivity in a Java JFrame project. The other options, "javax.sql.*;", "javac.sql.*;", and "java.sql;", are incorrect as they either do not exist or do not provide the necessary classes for JDBC connectivity.

Submit
181. Each row of a JTable in java is added using?

Explanation

In Java, each row of a JTable is added using an Object. This is because JTable is a flexible component that can display data of any type. By using an Object, we can store and display different types of data in each row of the JTable.

Submit
182. There can be only one unique key in a Table?

Explanation

This statement is false because in a table, it is possible to have multiple unique keys. A unique key is a column or a set of columns that uniquely identifies each row in a table. While there can only be one primary key in a table, which is a type of unique key, there can also be additional unique keys defined on other columns in the table. These unique keys ensure that the values in the specified columns are unique across all rows in the table. Therefore, there can be more than one unique key in a table.

Submit
183. Working at a particular level of abstraction with out considering background details is known as________?

Explanation

Abstraction refers to the practice of working at a particular level of abstraction without considering background details. It involves focusing on the essential features and hiding unnecessary details. This allows for simplifying complex systems and making them easier to understand and work with. By using abstraction, developers can create models and representations that capture the important aspects of a system while abstracting away the implementation details. This helps in managing complexity, improving code reusability, and enhancing maintainability.

Submit
184. What query should be written to find the name of all managers? (Based on the following table).

Explanation

The correct answer is "select distinct mgr from emp". This query will retrieve the distinct values of the "mgr" column from the "emp" table, which represents the names of all managers. The "distinct" keyword ensures that duplicate values are not included in the result.

Submit
185. What will happen if you forget to give where condition after update command? 

Explanation

If you forget to give a WHERE condition after the UPDATE command, it will update all rows of the table. This means that the update operation will be applied to every single row in the table, potentially causing unintended changes to the data. It is important to always include a WHERE condition to specify which rows should be updated to avoid such situations.

Submit
186. Each row of a JTable in java is added using?

Explanation

In Java, each row of a JTable is added using an Object. This is because JTable is a flexible component that can display data of any type. By using an Object, we can store and display different types of data in each row of the JTable. This allows for a wide range of data to be displayed in a tabular format.

Submit
187. The MySql service is avialable by default at which of the following ports?

Explanation

The correct answer is 3306. This port number is the default port for the MySQL service.

Submit
188. ASCII is a _________ bit code?

Explanation

ASCII is a 7-bit code.

Submit
189. There is a table emp(eno,ename,deptno) Another table dept(dno,dname,mgr) I can create a natural Join using the above table structures?

Explanation

That is because the common column is named deptno in first table and dno in second table.

Submit
190. Transactions can be created only by grouping DDL statements together?

Explanation

Transactions can be created by grouping both DDL (Data Definition Language) and DML (Data Manipulation Language) statements together. DDL statements are used to define or modify the structure of the database, while DML statements are used to manipulate the data within the database. Therefore, the statement that transactions can only be created by grouping DDL statements together is false.

Submit
191. Arrange the events in the order they need to be carried out 1. Extract data from result set 2. import the sql package 3. Execute Query 4.Open a connection

Explanation

The correct order of events is as follows:
1. Import the sql package (2)
2. Open a connection (4)
3. Execute Query (3)
4. Extract data from result set (1)

Submit
192. Which of the following topologies have the advantage of short cable length?

Explanation

The Bus topology has the advantage of short cable length because all devices in the network are connected to a single cable, resulting in a direct connection between each device. This eliminates the need for long cable runs that are required in other topologies such as Ring or Tree. In a Bus topology, devices can be easily added or removed without affecting the rest of the network, making it a cost-effective and flexible option for small to medium-sized networks.

Submit
193. A firewall generally sits on ?

Explanation

A firewall generally sits on a proxy server. A proxy server acts as an intermediary between a client and a server, filtering and forwarding network traffic. By sitting on a proxy server, the firewall can monitor and control incoming and outgoing network traffic, providing an additional layer of security by blocking unauthorized access and protecting the network from potential threats.

Submit
194. There is a table emp(eno,ename,deptno) Another table dept(dno,dname,mgr) I can create a natural Join using the above table structures?

Explanation

That is because the common column is named deptno in first table and dno in second table.

Submit
195.  Having clause can be used without group by clause?

Explanation

The correct answer is False. The Having clause cannot be used without a Group By clause. The Having clause is used to filter the results of a query based on a condition that applies to groups of rows, and it is typically used in conjunction with the Group By clause. Without the Group By clause, there are no groups to apply the condition to, making the Having clause invalid.

Submit
196. Which of the following is the abbreviation of Hypertext Preprocessor?

Explanation

PHP is the correct answer because it stands for Hypertext Preprocessor. PHP is a widely-used open source scripting language that is specifically designed for web development. It is embedded within HTML code and can be used to create dynamic web pages and applications. PHP is known for its simplicity, flexibility, and ease of integration with different databases and frameworks, making it a popular choice among developers.

Submit
197. Protected data members are accessible outside the class in which defined?

Explanation

Protected data members are not accessible outside the class in which they are defined. They can only be accessed by the class itself and its derived classes. This is because protected access modifier allows access to the member within the class and its subclasses, but not to the outside world.

Submit
198. Which of the following are the two advantages of e-learning?

Explanation

The two advantages of e-learning are that you can learn at your own pace and it is interactive. E-learning allows individuals to learn at their own speed, giving them the flexibility to go through the material at a comfortable rate. Additionally, e-learning often incorporates interactive elements such as quizzes, simulations, and multimedia, which enhance the learning experience and make it more engaging.

Submit
199. A while loop will execute at least once irrespective of the condition specified in the loop?

Explanation

A while loop will only execute if the condition specified in the loop is true. If the condition is false from the beginning, the loop will not execute at all. Therefore, the statement in the question is incorrect.

Submit
200. Statement.executeUpdate(); method is used for fetching the data from the database from netbeans?

Explanation

The statement.executeUpdate() method is not used for fetching data from the database in NetBeans. It is used to execute SQL statements that modify the data in the database, such as INSERT, UPDATE, or DELETE statements. To fetch data from the database, the statement.executeQuery() method is used.

Submit
×
Saved
Thank you for your feedback!
View My Results
Cancel
  • All
    All (200)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Html is the root tag of a html document?
Apache server also known as HTTP server is a ___ server?
Which of the following controls can be used to submit a form?
Apache server also known as HTTP server is a ___ server?
<i> will make a word?
Which command is used to drop a table? ( two words)
Which command is used to drop a table? ( two words)
A break statement in Java will only break the inner loop, in case of...
Savepoints need to be named?
Dropping a table will delete both table structure and data.
A firewall protects the Company LAN from outside threats.
Which topology has the advantage of short cable length? ( 1 word )
Savepoints need to be named?
The title tag is is to be defined in which section?
Any DDL statement will automatically commit a tracnsatcion under...
P in PAN stands for____________________.
The set autocommit will enable or disable the autocommit option only...
There can be only one Primary Key in a table.
A break statement in Java will only break the inner loop, in case of...
There can be only one Primary Key in a table.
Java is object oriented language because it supports classes and...
By default autocommit is on?
D in ACID stands for?
Any DDL statement will automatically commit a tracnsatcion under...
There can be only one Primary Key in the Table?
P in PAN stands for____________________.
Alter table command can be used to add the Primary KeY to a table?
<b> will make a word?
Do -- while loop is exit controlled loop?
Which protocol does the Apache server use?
Incometaxindia.gov.in is a url of?
If it is a composite primary key, it ought to be a table level...
Copper Cables are generally restricted to 100 metres.
For using date and calender which package should be imported?
Calendar class is found in which package?
Indiapost.gov.in and passportindia.gov.in are examples of?
Which protocol does the Apache server use?
Open Office is a ________?
If int  a=10,b=20...
There are n1 rows in first table, n2 rows in second table. The cross...
Copper Cables are generally restricted to 100 metres.
Which command is used to remove rows from a table from the database?
A row is also called a ?
Do -- while loop is exit controlled loop?
WiMax technology is used in?
Which of the following table constraint is used to provide a Default...
Open Office is a ________?
The title tag is is to be defined in which section?
There are n1 rows in first table, n2 rows in second table. The cross...
String object is immutable ?
There can be only one Primary Key in the Table?
R in RAD stands for?
WiMax technology is used in?
A firewall caches internet pages of the LAN which are frequently...
Which topology is hierarchical in nature? ( 1 Word )
LI in HTML stands for?
Which of  the following two are advantages of e-Governance?
A in ACID stands for?
A group of logically related classes is called a?
Ubuntu is open source _________?
Which topology is hierarchical in nature? ( 1 Word )
Dta members and methods are packed together in the class, this...
Once a table structure is created it can not be modified.
While(1)...
Snapdeal.com is a ?
Concat() is a method of which class?
Round and pow  are methods of?
What is the result of the following?...
There can be only one NOT NULL column in a table?
There can be only one NOT NULL column in a table?
A group of logically related classes is called a?
What is the output of the following query?...
The natural join is a equi join?
A MAN is larger than a WAN.
Which command is used to remove a table from the database?
Which command is used to remove rows from a table from the database?
In relational terminology a row is also called?
Ubuntu is open source _________?
Which of the following tags will create a bulleted list? 
There can be only one Foreign key in a table?
Which topology has the advantage of short cable length? ( 1 word )
Alter table command can be used to drop the Primary KeY?
This is the instantiation of a class?
Which of  the following two are advantages of e-Governance?
Which of the following is a cross of Text Field and List?
The natural join is a equi join?
Which of the following table constraint is used to provide a Default...
Alter table command can be used to add the Primary KeY to a table?
Which of the following is just like the bullted list in HTML?
Dta members and methods are packed together in the class, this...
What will happen if you forget to give where condition after update...
Class level variables are declared ?
A table level primary key constraint is created when two or more...
There can be only one Foreign key in a table?
Fiber cable has high transmission loss?
Which of the following is just like the bullted list in HTML?
Which keyword is used for implementing inheritance in java?
Calender is a static class?
JDBC can be used only from java?
In relational terminology a row is also called?
A cross join is created by using two tables. First table has 5 rows ,...
     ISCII is a _________bit code?
What is the output of the following query?...
LI in HTML stands for?
Statement stmt;...
Transliteration of Indian Languages means?
There can be only one unique key in a Table?
A cross join is created by using two tables. First table has 5 rows ,...
In which of the following topologies there is a dependence on the...
Which three of the following are DML commands in MySql?
While(1);...
Which two of the following are protocols?
Order by clause in Mysql is used to
ODBC can be used from any front end?
Arrange the events in the order they need to be carried out...
System and String classes are defined in which package?
Which package is imported by default in java?
R in RAD stands for?
A MAN is larger than a WAN.
Shiksha.com and MeritNation.com are ___________ websites?
 Having clause can be used without group by clause?
Haryana.nic.in is a url of?
The maximum value dayofyear() function can return is?
StringBuffer object is immutable ?
There can be only one alternate key in a table?
Class level variables are declared ?
There can be only one alternate key in a table?
Which of the following is immutable?
Abstract class is a class which can be instantiated?
A foreign key can not refer to the same table primary key?
Which of the following is a cross of Text Field and List?
You want to take the input of Hobbies from the user, ie Sports, Movies...
Calendar class is an abstract class.
WE can use Indian language key map to type in Iindian languages?
Protected data members are accessible outside the class in which...
By default autocommit is on?
Abstract class is a class which can be instantiated?
Which command is used to drop a column? ( two words )
Alter table command can be used to drop the Primary KeY?
What is the return type of Math.pow() ?
Which of the following tag is used for table heading style?
In case of nesting a Break statement will break the?
A table level primary key constraint is created when two or more...
Commit and Rollback are exemples of?
Which of the following principles does the optical fibre use for...
In MYSql _________ keyword is used to check for null values?( 1 word )
Which of thefollowing aretrue about fibre cables?(Select two)
Which of the following SQL objects will store the data retrieved...
Select ascii("BABITA"); will return
What will be the result of the following?...
Which of the following is immutable?
Which of the following topologies have the advantage of short cable...
A while loop will execute at least once irrespective of the condition...
Which of the following principles does the optical fibre use for...
Which of the following two are selection statements?
How many records will be displayed by the following Query?...
Which of the following controls can be used to show cities in a HTML...
You can save time  by creating your website?
String str="123";...
How many records will be displayed by the following Query?...
How  many records will be displayed by the following query?...
Descriptive Web Site names are converted into numerical ones by which...
Statement stmt;...
Open type fonts are same as Unicode?
One transaction can have only one DML statement?
A firewall generally sits on ?
Descriptive Web Site names are converted into numerical ones by which...
Statement.executeUpdate(); method is used for fetching the data from...
Which of the following is exit coltrolled loop?
Working at a particular level of abstraction with out considering...
Which of the following two are selection statements?
Which of the following tags will create a bulleted list? 
One transaction can have only one DML statement?
Durability of a transaction means?
Which of the following topologies features direct connection between...
A view can be used to rename a column?
Fiber cable has high transmission loss?
Which one of the following is true regarding public static void...
Cardinality of a table is?
Which of the following needs to be imported for java jdbc connectivity...
Each row of a JTable in java is added using?
There can be only one unique key in a Table?
Working at a particular level of abstraction with out considering...
What query should be written to find the name of all managers? (Based...
What will happen if you forget to give where condition after update...
Each row of a JTable in java is added using?
The MySql service is avialable by default at which of the following...
ASCII is a _________ bit code?
There is a table...
Transactions can be created only by grouping DDL statements together?
Arrange the events in the order they need to be carried out...
Which of the following topologies have the advantage of short cable...
A firewall generally sits on ?
There is a table...
 Having clause can be used without group by clause?
Which of the following is the abbreviation of Hypertext Preprocessor?
Protected data members are accessible outside the class in which...
Which of the following are the two advantages of e-learning?
A while loop will execute at least once irrespective of the condition...
Statement.executeUpdate(); method is used for fetching the data from...
play-Mute sad happy unanswered_answer up-hover down-hover success oval cancel Check box square blue
Alert!