A Java Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Myhemant72
M
Myhemant72
Community Contributor
Quizzes Created: 4 | Total Attempts: 9,321
| Attempts: 1,665 | Questions: 200
Please wait...
Question 1 / 200
0 %
0/100
Score 0/100
1. Html is the root tag of a html document?

Explanation

The statement is true because the "html" tag is indeed the root tag of an HTML document. It serves as the container for all other elements in the document and defines the beginning and end of the HTML code.

Submit
Please wait...
About This Quiz
A Java Quiz - Quiz

This 'A Java Quiz' challenges learners on Java programming concepts, focusing on GUI components, JDBC, and basic Java syntax. It assesses understanding of JTable functions, execution methods, input... see moredialogs, and more, enhancing practical Java skills. see less

2. Which of the following controls can be used to submit a form?

Explanation

A submit button is used to submit a form. When a user clicks on the submit button, the form data is sent to the server for processing. This allows the user to send the information they have entered in the form to the server-side script or application. The other options listed (checkbox, radio button, and text area) are not used for submitting a form. A checkbox is used to select multiple options, a radio button is used to select a single option, and a text area is used for entering multiple lines of text.

Submit
3. Apache server also known as HTTP server is a ___ server?

Explanation

Apache server, also known as an HTTP server, is a web server. It is specifically designed to serve web pages and handle HTTP requests from clients, such as web browsers. The Apache server is widely used and highly popular in the web hosting industry due to its stability, flexibility, and security features. It is capable of delivering static and dynamic content, managing multiple websites, and supporting various programming languages and modules.

Submit
4. <i> will make a word?

Explanation

The use of the "" tag in HTML is used to make text italicized.

Submit
5. Apache server also known as HTTP server is a ___ server?

Explanation

Apache server, also known as HTTP server, is specifically designed to handle and deliver web content. It is used to host websites and serve web pages to users who request them through their web browsers. Apache is one of the most popular web servers and is widely used across the internet. Therefore, the correct answer is "Web."

Submit
6. Which command is used to drop a table? ( two words)

Explanation

The command "drop table" is used to delete or remove a table from a database. It permanently removes the table and all its data from the database. This command is commonly used when a table is no longer needed or when it needs to be recreated with different structure or data.

Submit
7. A break statement in Java will only break the inner loop, in case of nested loops.

Explanation

In Java, a break statement is used to exit a loop prematurely. When there are nested loops, a break statement will only break the innermost loop in which it is placed. This means that if there are multiple loops nested inside each other, the break statement will only terminate the inner loop and resume the execution of the outer loop. Therefore, the given statement is true.

Submit
8. Which topology has the advantage of short cable length? ( 1 word )

Explanation

The bus topology has the advantage of short cable length because all devices in the network are connected to a single cable. This eliminates the need for long cables to connect devices to a central hub or switch, resulting in shorter cable lengths overall.

Submit
9. Which command is used to drop a table? ( two words)

Explanation

The command "drop table" is used to delete or remove a table from a database. It permanently deletes all the data and structure associated with the table. This command is commonly used in database management systems to remove unnecessary or obsolete tables.

Submit
10. Dropping a table will delete both table structure and data.

Explanation

Dropping a table means permanently removing it from the database. This action not only deletes the table's structure, such as columns and data types, but also removes all the data stored within the table. Therefore, the statement that dropping a table deletes both the table structure and data is correct.

Submit
11. Savepoints need to be named?

Explanation

Savepoints in a database are used to mark a specific point in a transaction where it can be rolled back to in case of an error or failure. Naming savepoints allows for better management and identification of savepoints within a transaction. It provides a way to reference specific savepoints when performing rollback or commit operations. By naming savepoints, it becomes easier to track the sequence of savepoints and their purpose within a transaction, making it a good practice to name them.

Submit
12. A firewall protects the Company LAN from outside threats.

Explanation

A firewall is a network security device that monitors and filters incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a company's internal network (LAN) and the outside world, protecting the LAN from unauthorized access, malware, and other external threats. By allowing only authorized traffic to pass through, a firewall helps to secure the company's network and sensitive data from potential attacks. Therefore, the statement "A firewall protects the Company LAN from outside threats" is true.

Submit
13. The title tag is is to be defined in which section?

Explanation

The title tag is to be defined in the head section of an HTML document. This tag is used to specify the title of the webpage, which is displayed in the browser's title bar or tab. The head section contains meta information about the document, such as the character encoding, linked stylesheets, and scripts.

Submit
14. Savepoints need to be named?

Explanation

Savepoints need to be named in order to be referenced later in the transaction. By assigning a name to a savepoint, it becomes possible to rollback to that specific savepoint if needed. This allows for more granular control over the transaction and enables the ability to undo specific portions of the transaction while preserving the changes made after the savepoint. Without naming savepoints, it would be difficult to identify and rollback to specific points in the transaction.

Submit
15. D in ACID stands for?

Explanation

The correct answer is "Durability". In the ACID (Atomicity, Consistency, Isolation, Durability) acronym, the D stands for Durability. Durability refers to the property of a transaction in a database system to persist even in the event of system failures, such as power outages or crashes. It ensures that once a transaction is committed, its changes will be permanently saved and will survive any subsequent failures, guaranteeing data integrity and reliability.

Submit
16. P in PAN stands for____________________.

Explanation

The correct answer is "Personal." The acronym PAN stands for Personal Area Network, which refers to a network of devices connected to a single person's workspace or immediate surroundings. This can include devices such as smartphones, tablets, laptops, and wearable technology. The "P" in PAN represents the personal nature of this network, as it is limited to the individual user rather than a larger network or organization.

Submit
17. P in PAN stands for____________________.

Explanation

The correct answer is "Personal". The PAN card is a unique identification number issued to individuals and is used for various financial transactions in India. The "P" in PAN stands for "Personal" as it denotes that the card is meant for personal use and identification purposes.

Submit
18. Any DDL statement will automatically commit a tracnsatcion under progress?

Explanation

This statement is true because any Data Definition Language (DDL) statement in a database automatically commits the transaction under progress. DDL statements are used to define the database structure or schema, such as creating or altering tables, indexes, or views. Unlike Data Manipulation Language (DML) statements, which are used to manipulate data within the tables, DDL statements do not require an explicit commit statement to make the changes permanent. Once a DDL statement is executed, it immediately commits the transaction, making the changes permanent and irreversible.

Submit
19. By default autocommit is on?

Explanation

By default, the autocommit feature is turned on in most database management systems. This means that any changes made to the database are automatically saved and committed without the need for explicit commit statements. This can be convenient for simple operations where immediate persistence of data is desired. However, it can also lead to unintended consequences if not managed properly, such as accidental data modifications. Therefore, it is important to be aware of the autocommit setting and adjust it as needed for specific use cases.

Submit
20. The set autocommit will enable or disable the autocommit option only for current session?

Explanation

The statement is true. When the "set autocommit" command is used, it will enable or disable the autocommit option for the current session only. This means that any subsequent transactions performed within the current session will either be automatically committed or not, depending on the value set for autocommit. However, this setting will not affect other sessions or connections to the database.

Submit
21. There can be only one Primary Key in a table.

Explanation

In a database table, the primary key is a unique identifier for each record. It ensures that each row in the table is uniquely identified and can be accessed efficiently. Having more than one primary key in a table would contradict the purpose of a primary key, as it would no longer guarantee uniqueness. Therefore, there can only be one primary key in a table.

Submit
22. A break statement in Java will only break the inner loop, in case of nested loops.

Explanation

In Java, a break statement is used to terminate the current loop and resume execution at the next statement after the loop. When nested loops are present, a break statement will only break out of the innermost loop and continue with the outer loop. This means that the outer loop will continue to execute until its condition is false, regardless of the break statement in the inner loop. Therefore, the given statement is true.

Submit
23. There can be only one Primary Key in a table.

Explanation

In a relational database, a primary key is a unique identifier for each record in a table. It ensures that each record can be uniquely identified and helps maintain data integrity. By definition, there can only be one primary key in a table as it serves as the main identifier for the records. Having multiple primary keys would create ambiguity and make it difficult to uniquely identify records. Therefore, the statement "There can be only one Primary Key in a table" is true.

Submit
24. Java is object oriented language because it supports classes and encapsulation?

Explanation

Java is considered an object-oriented language because it supports the concept of classes and encapsulation. In Java, everything is treated as an object, and objects are instances of classes. Classes define the properties and behaviors of objects, and encapsulation allows for the bundling of data and methods within a class, providing data hiding and abstraction. These features are fundamental to object-oriented programming, making Java an object-oriented language.

Submit
25. Any DDL statement will automatically commit a tracnsatcion under progress?

Explanation

DDL (Data Definition Language) statements in SQL, such as CREATE, ALTER, and DROP, are automatically committed by default. This means that any changes made by these statements are immediately permanent and cannot be rolled back. Unlike DML (Data Manipulation Language) statements, which can be rolled back using the ROLLBACK command, DDL statements do not require an explicit COMMIT statement to make the changes permanent. Therefore, any DDL statement will automatically commit a transaction that is in progress.

Submit
26. There can be only one Primary Key in the Table?

Explanation

In a database table, the primary key is a unique identifier for each record. It ensures that each record in the table is uniquely identified and helps in maintaining data integrity. Having more than one primary key in a table would result in duplicate values and violate the uniqueness constraint. Therefore, there can be only one primary key in a table.

Submit
27. Incometaxindia.gov.in is a url of?

Explanation

The website "incometaxindia.gov.in" is a URL of an e-governance site. This can be inferred from the domain name "incometaxindia" which suggests that the website is related to income tax in India. Moreover, the ".gov.in" domain indicates that it is a government website. Therefore, it can be concluded that the correct answer is e-governance site.

Submit
28. Alter table command can be used to add the Primary KeY to a table?

Explanation

The alter table command is used to modify the structure of an existing table in a database. One of the modifications that can be made is adding a Primary Key to a table. Therefore, the statement "alter table command can be used to add the Primary Key to a table" is true.

Submit
29. Which protocol does the Apache server use?

Explanation

The correct answer is HTTP. The Apache server uses the HTTP protocol to communicate with clients and serve web pages. HTTP stands for Hypertext Transfer Protocol and is the foundation of data communication for the World Wide Web. It allows for the retrieval and display of web content, such as HTML documents, images, and videos, on a user's web browser. Apache, being a popular web server software, supports the HTTP protocol as its primary means of communication.

Submit
30. For using date and calender which package should be imported?

Explanation

To use date and calendar in a program, the "Util" package should be imported. This package contains classes and methods that provide functionality for working with dates and calendars. By importing the "Util" package, we can access and use the classes and methods related to date and calendar operations in our program.

Submit
31. <b> will make a word?

Explanation

The correct answer is "Bold" because the question is asking which formatting option will make a word. The "" tag is used in HTML to apply bold formatting to text, so selecting the "Bold" option will achieve this effect.

Submit
32. Calendar class is found in which package?

Explanation

The correct answer is "Util" because the Calendar class is a part of the java.util package. This package contains various utility classes and interfaces that are commonly used in Java programming, including the Calendar class for working with dates and times.

Submit
33. Do -- while loop is exit controlled loop?

Explanation

A do-while loop is an exit-controlled loop because the condition is checked at the end of the loop. This means that the loop will always execute at least once before checking the condition. If the condition is true, the loop will continue to execute, otherwise, it will exit.

Submit
34. If it is a composite primary key, it ought to be a table level constraint at the time of definition and not a column constraint.

Explanation

A composite primary key is a primary key that consists of more than one column. In order to enforce this constraint, it should be defined at the table level rather than at the column level. This means that all the columns that make up the composite primary key must be specified together as the primary key for the table. Therefore, the statement that if it is a composite primary key, it ought to be a table level constraint is true.

Submit
35. Which protocol does the Apache server use?

Explanation

The Apache server uses the HTTP protocol. HTTP stands for Hypertext Transfer Protocol and is the primary protocol used for communication on the World Wide Web. Apache is a popular web server software that is widely used to host websites and deliver web pages to users. By using the HTTP protocol, Apache can handle requests from clients (such as web browsers) and send back the requested web pages.

Submit
36. Copper Cables are generally restricted to 100 metres.

Explanation

Copper cables have limitations in terms of signal loss and degradation over distance. Generally, copper cables are restricted to a maximum length of 100 meters before the signal quality deteriorates significantly. This is due to the resistance and capacitance of the copper wire, which affects the transmission of electrical signals. Therefore, it is true that copper cables are generally restricted to 100 meters.

Submit
37. Which command is used to remove rows from a table from the database?

Explanation

The correct answer is "Delete". The Delete command is used to remove rows from a table in a database. It allows for the deletion of specific rows based on specified conditions, or it can be used to delete all rows in a table. The Drop command is used to remove an entire table from the database. Remove and Clear are not valid commands for removing rows from a table.

Submit
38. Indiapost.gov.in and passportindia.gov.in are examples of?

Explanation

Indiapost.gov.in and passportindia.gov.in are examples of e-Governance sites because they are government websites that provide services and information to the public. These sites are specifically designed to facilitate and streamline government processes and interactions with citizens, such as applying for passports or accessing postal services. They aim to improve transparency, efficiency, and accessibility in government operations through the use of technology and online platforms.

Submit
39. A row is also called a ?

Explanation

A row in a database table is also referred to as a tuple. A tuple represents a single record or instance of data within a table. It contains a collection of attributes or columns that define the properties or characteristics of that particular record. Therefore, the correct answer is tuple.

Submit
40. If int  a=10,b=20 what is the result of the following expression b+a*b*a

Explanation

The expression b+a*b*a can be simplified using the order of operations. First, we multiply a by b, resulting in 10*20 = 200. Then, we multiply this result by a again, giving us 200*10 = 2000. Finally, we add b to this result, resulting in 2000+20 = 2020. Therefore, the correct answer is 2020.

Submit
41. There are n1 rows in first table, n2 rows in second table. The cross join of the two tables will have how many rows?

Explanation

The cross join of two tables combines each row from the first table with every row from the second table, resulting in a total of n1 * n2 rows.

Submit
42. WiMax technology is used in?

Explanation

WiMax technology is used in WAN (Wide Area Network). WiMax, which stands for Worldwide Interoperability for Microwave Access, is a wireless communication technology that provides high-speed internet access over long distances. It is commonly used to connect remote areas or locations that are not easily accessible by traditional wired networks. With its wide coverage range, WiMax is ideal for establishing connections in large geographical areas, making it suitable for WAN applications.

Submit
43. Which of the following table constraint is used to provide a Default Value to the column?

Explanation

The table constraint used to provide a default value to a column is the "Default" constraint. This constraint allows the user to specify a default value that will be used for the column if no other value is provided during insertion.

Submit
44. Open Office is a ________?

Explanation

Open Office is a suite like MS Office. This means that it is a collection of various software applications that are similar to the ones found in Microsoft Office. It includes programs like a word processor, spreadsheet, presentation software, and more. Just like MS Office, Open Office provides users with a range of tools to create and edit documents, spreadsheets, and presentations, making it a comprehensive software suite for various office tasks.

Submit
45. Open Office is a ________?

Explanation

Open Office is a suite like MS Office, meaning it is a collection of software applications that are similar to those found in Microsoft Office. It includes programs such as a word processor, spreadsheet, presentation software, and more.

Submit
46. There are n1 rows in first table, n2 rows in second table. The cross join of the two tables will have how many rows?

Explanation

The cross join of two tables combines every row from the first table with every row from the second table. So, for each row in the first table, there will be n2 rows from the second table. Therefore, the total number of rows in the cross join will be n1 * n2.

Submit
47. Copper Cables are generally restricted to 100 metres.

Explanation

Copper cables have a limitation in terms of the distance they can effectively transmit signals without significant loss or degradation. This limitation is typically around 100 meters. Therefore, the statement that copper cables are generally restricted to 100 meters is true.

Submit
48. Do -- while loop is exit controlled loop?

Explanation

A do-while loop is an exit-controlled loop because the condition to exit the loop is checked at the end of the loop body. This means that the loop will always execute at least once, regardless of whether the condition is initially true or false. After each iteration, the condition is checked, and if it is true, the loop continues to execute. If the condition is false, the loop exits.

Submit
49. A in ACID stands for?

Explanation

The correct answer is Atomicity. Atomicity is one of the properties in the ACID (Atomicity, Consistency, Isolation, Durability) acronym, which is used to describe the properties of a reliable database transaction. Atomicity refers to the concept that a transaction is treated as a single, indivisible unit of work. This means that either all the changes made by the transaction are committed to the database, or none of them are. In other words, a transaction is either completed in its entirety or not at all.

Submit
50. R in RAD stands for?

Explanation

The correct answer is "rapid." The R in RAD stands for "rapid."

Submit
51. A group of logically related classes is called a?

Explanation

A group of logically related classes is called a package. A package is used to organize related classes and provide a way to manage and control access to them. It helps in modularizing the code and making it more organized, maintainable, and reusable. By grouping classes into packages, it becomes easier to locate and understand the code, and also helps in avoiding naming conflicts between classes.

Submit
52. Which of  the following two are advantages of e-Governance?

Explanation

The advantages of e-Governance are reduced corruption and reduced paperwork. E-Governance allows for more transparency and accountability in government processes, reducing the opportunities for corruption. Additionally, it eliminates the need for manual paperwork, making government processes more efficient and saving time and resources.

Submit
53. Dta members and methods are packed together in the class, this principle is known as________.

Explanation

Encapsulation is the principle where data members and methods are packaged together in a class. This allows for the hiding of internal details and providing access to the class through a public interface. Encapsulation helps in achieving data security and code reusability.

Submit
54. A firewall caches internet pages of the LAN which are frequently requested.

Explanation

A firewall caches internet pages of the LAN which are frequently requested. This means that when a user from the LAN requests a webpage, the firewall checks if it has a cached copy of that webpage. If it does, it serves the cached copy to the user instead of retrieving it from the internet. This helps to improve the speed and efficiency of internet browsing for users on the LAN.

Submit
55. The title tag is is to be defined in which section?

Explanation

The title tag is to be defined in the head section of an HTML document. This tag is used to specify the title of the webpage, which is displayed in the browser's title bar or tab. The head section contains meta-information about the webpage, such as the title, character encoding, and linked stylesheets or scripts.

Submit
56. Which topology is hierarchical in nature? ( 1 Word )

Explanation

The tree topology is hierarchical in nature as it follows a parent-child relationship where each node has only one parent and can have multiple children. The nodes are organized in a hierarchical structure, similar to a tree, with a root node at the top and branches connecting the nodes. This topology allows for easy management and scalability as any changes made to one part of the tree do not affect the entire network.

Submit
57. While(1) { System.out.println("Hello World"): } The above loop will run

Explanation

The given code contains a while loop with the condition "while(1)", which means the loop will continue to run indefinitely as long as the condition is true. Since the condition is always true (1 is always true in programming), the loop will never terminate and will continue to print "Hello World" infinitely. Therefore, the correct answer is that it is an infinite loop.

Submit
58. LI in HTML stands for?

Explanation

LI in HTML stands for "List Item". In HTML, lists are used to group related items together. The LI element is used to define each individual item in a list, whether it is an ordered list (OL) or an unordered list (UL). So, when we see LI in HTML, it refers to a list item within a list structure.

Submit
59. Round and pow  are methods of?

Explanation

The methods "round" and "pow" are part of the Math package in Java. The Math package provides mathematical functions and operations, including rounding numbers and raising a number to a power.

Submit
60. String object is immutable ?

Explanation

A string object is immutable, meaning its state cannot be modified after it is created. When we perform operations on a string, such as concatenation or substring, a new string object is created instead of modifying the original one. This immutability ensures that strings are thread-safe and can be safely shared among multiple threads without the risk of unexpected modifications.

Submit
61. There can be only one Primary Key in the Table?

Explanation

In a database table, the primary key is a unique identifier for each record. It ensures that each record in the table is uniquely identified and allows for efficient retrieval and manipulation of data. Having multiple primary keys in a table would defeat the purpose of a primary key, as it would no longer guarantee uniqueness. Therefore, there can be only one primary key in a table.

Submit
62. WiMax technology is used in?

Explanation

WiMax technology is used in WAN (Wide Area Network) applications. WiMax stands for Worldwide Interoperability for Microwave Access, and it is a wireless communication technology that provides high-speed internet access over long distances. It is commonly used to connect remote areas or areas where wired connections are not feasible, making it ideal for WAN applications.

Submit
63. What is the output of the following query? select sum(Basic) from Employee where eno>=5;

Explanation

The query is selecting the sum of the "Basic" column from the "Employee" table where the "eno" column is greater than or equal to 5. The output of the query is 3000, which suggests that the sum of the "Basic" values for all employees with an "eno" greater than or equal to 5 is 3000.

Submit
64. Once a table structure is created it can not be modified.

Explanation

The statement is false because table structures can be modified after they are created. It is possible to add or remove columns, change data types, modify constraints, and perform other alterations to the table structure. This flexibility allows for the adaptation of the table to changing requirements or improvements in the database design.

Submit
65. A MAN is larger than a WAN.

Explanation

The statement "A MAN is larger than a WAN" is false. In this context, MAN refers to Metropolitan Area Network, which is a network that covers a larger geographical area than a WAN (Wide Area Network). Therefore, a WAN is actually larger than a MAN.

Submit
66. Snapdeal.com is a ?

Explanation

Snapdeal.com is an e-commerce site. E-commerce refers to the buying and selling of goods and services over the internet. Snapdeal.com allows users to browse and purchase a wide range of products online, making it an e-commerce site.

Submit
67. There can be only one NOT NULL column in a table?

Explanation

False. In a table, multiple columns can be designated as NOT NULL, meaning they cannot contain null values.

Submit
68. A group of logically related classes is called a?

Explanation

A group of logically related classes is called a "package". In programming, a package is a way to organize and group related classes together. It helps in managing and organizing the codebase, making it easier to understand and maintain. Packages provide a way to encapsulate classes and prevent naming conflicts. They also provide a level of abstraction and modularity, allowing for better code reuse and separation of concerns.

Submit
69. Ubuntu is open source _________?

Explanation

Ubuntu is open source because it is an operating system (OS) that is based on the Linux kernel. Open source means that the source code of the software is freely available to the public, allowing users to view, modify, and distribute the code. Ubuntu being an open source OS means that anyone can access and modify its source code, contributing to its development and customization.

Submit
70. Which topology has the advantage of short cable length? ( 1 word )

Explanation

The bus topology has the advantage of short cable length because all devices in the network are connected to a single cable, creating a linear structure. This eliminates the need for long cable runs to connect devices, resulting in shorter cable lengths overall.

Submit
71. Which topology is hierarchical in nature? ( 1 Word )

Explanation

The tree topology is hierarchical in nature because it follows a hierarchical structure where all the nodes are connected in a specific pattern. The nodes are organized in a tree-like structure with a root node at the top and branches connecting to other nodes. This hierarchy allows for easy management and control of the network as information flows from the top down, making it an ideal choice for large networks.

Submit
72. Which command is used to remove rows from a table from the database?

Explanation

The correct answer is "Delete". The Delete command is used to remove rows from a table in a database. It allows for the deletion of specific rows based on certain conditions or criteria.

Submit
73. What is the result of the following? String str="Hi There"; int len=str.length(); System.out.prinltln(len);

Explanation

The given code snippet initializes a string variable "str" with the value "Hi There". Then, it calculates the length of the string using the "length()" method and stores it in an integer variable "len". Finally, it prints the value of "len" using the "println()" method. Since the string "Hi There" has 8 characters, the length of the string is 8. Therefore, the result of the code is 8.

Submit
74. There can be only one NOT NULL column in a table?

Explanation

This statement is false because there can be multiple NOT NULL columns in a table. The NOT NULL constraint is used to ensure that a column cannot contain any NULL values, and it can be applied to multiple columns within a table. Therefore, it is not limited to just one column.

Submit
75. The natural join is a equi join?

Explanation

The explanation for the given correct answer is that a natural join is a type of equi join. In a natural join, the join condition is based on the equality of all columns with the same name in the two tables being joined. This means that only the matching rows with equal values in the common columns are included in the result set. Therefore, a natural join can be considered as an equi join because it compares the values in the common columns for equality.

Submit
76. Which of the following tags will create a bulleted list? 

Explanation

The UL tag in HTML is used to create an unordered (bulleted) list. It is used to group a list of items that do not have a specific order or sequence. The UL tag is paired with the LI (list item) tags to define each individual item in the list. When the UL tag is used, the browser automatically adds bullet points to each item in the list.

Submit
77. There can be only one Foreign key in a table?

Explanation

False. There can be multiple foreign keys in a table. A foreign key is a field or a combination of fields in a table that refers to the primary key of another table. It is used to establish a link between the two tables and enforce referential integrity. In a table, there can be multiple relationships with other tables, each requiring a separate foreign key. Therefore, it is not limited to just one foreign key in a table.

Submit
78. Concat() is a method of which class?

Explanation

The concat() method is a method of the String class. It is used to concatenate two strings together and return a new string that is the combination of the two original strings.

Submit
79. Which command is used to remove a table from the database?

Explanation

The correct answer is "Drop". The "Drop" command is used to remove a table from the database. It permanently deletes the table and all its data from the database.

Submit
80. Alter table command can be used to drop the Primary KeY?

Explanation

The alter table command can be used to drop the Primary Key. This command allows for changes to be made to an existing table, including adding or dropping columns, modifying data types, and altering constraints. In the case of dropping the Primary Key, the alter table command can be used to remove the constraint associated with the Primary Key, effectively dropping it from the table.

Submit
81. Which of  the following two are advantages of e-Governance?

Explanation

The advantages of e-Governance are reduced corruption and reduced paperwork. E-Governance allows for more transparency and accountability in government processes, making it more difficult for corruption to occur. Additionally, e-Governance reduces paperwork by digitizing and automating many administrative tasks, making government processes more efficient and cost-effective.

Submit
82. In relational terminology a row is also called?

Explanation

In relational terminology, a row is also called a tuple. A tuple represents a single record or instance in a table and contains a set of attributes or fields that describe the data. Each tuple has a unique combination of attribute values, and together they form the rows of a table. Therefore, the correct answer is "Tuple."

Submit
83. Which of the following table constraint is used to provide a Default Value to the column?

Explanation

The Default constraint is used to provide a default value to a column in a table. This means that if no value is specified for the column when inserting a new row, the default value will be used instead. This constraint ensures that the column always has a value, even if it is not explicitly provided.

Submit
84. Alter table command can be used to add the Primary KeY to a table?

Explanation

The alter table command can indeed be used to add the Primary Key to a table. This command allows for modifications to be made to an existing table, including adding or modifying constraints such as the Primary Key. By specifying the table name and the column(s) to be designated as the Primary Key, the alter table command can successfully add the Primary Key constraint to the table.

Submit
85. Class level variables are declared ?

Explanation

Class level variables are declared in the beginning of the class definition. This means that they are declared outside of any specific method or constructor in the class. By declaring variables at the class level, they become accessible to all methods within the class. This allows the variables to be shared and used throughout the class, rather than being limited to a specific method or constructor.

Submit
86. Dta members and methods are packed together in the class, this principle is known as________.

Explanation

Encapsulation is the principle where data members and methods are bundled together in a class. This allows for the hiding of internal details and provides a way to control access to the data. It promotes modular and organized code by grouping related data and functions together.

Submit
87. Which of the following is a cross of Text Field and List?

Explanation

A ComboBox is a combination of a Text Field and a List. It allows the user to either enter a value manually or select from a pre-defined list of options. This makes it a cross between a Text Field and a List.

Submit
88. Ubuntu is open source _________?

Explanation

Ubuntu is an open-source operating system (OS). Open source refers to a type of software where the source code is freely available to the public, allowing users to view, modify, and distribute it. Ubuntu, being an open-source OS, means that it is built on a foundation of freely available source code, allowing users to customize and adapt it to their needs.

Submit
89. This is the instantiation of a class?

Explanation

In object-oriented programming, a class is a blueprint for creating objects. An object is an instance of a class, meaning it is created based on the class definition. Therefore, the correct answer is "Object" as it represents the instantiation of a class.

Submit
90. The natural join is a equi join?

Explanation

The natural join is a type of join operation in relational databases where the join is performed based on matching columns with the same name and data type. In an equi join, the join condition is based on equality between two columns. In the case of a natural join, the join condition is automatically determined based on the matching column names. Therefore, it can be concluded that the natural join is indeed an equi join.

Submit
91. Which of the following is just like the bullted list in HTML?

Explanation

UL stands for Unordered List in HTML. It is used to create a bulleted list where each item in the list is preceded by a bullet point. UL is similar to the bullted list in HTML as it allows for the creation of a list without any specific order or hierarchy. The items in the list are not numbered and are displayed with bullet points.

Submit
92. What will happen if you forget to give where condition after update command? 

Explanation

If you forget to give a WHERE condition after an update command, it will update all rows of the table. This means that the update operation will be applied to every row in the table, potentially causing unintended changes to the data. It is important to always specify a WHERE condition in order to target specific rows for update and avoid unintended consequences.

Submit
93. Calender is a static class?

Explanation

The statement is true because the Calendar class in Java is a static class. This means that it can be accessed directly without creating an instance of the class. The methods and fields in the Calendar class are also static, allowing them to be accessed without creating an object of the class.

Submit
94. In relational terminology a row is also called?

Explanation

In relational terminology, a row is also called a tuple. A tuple represents a single record in a table and contains a set of related data values. It is a collection of attributes or fields that define the characteristics of the data stored in the table. Therefore, the correct answer is "Tuple."

Submit
95.      ISCII is a _________bit code?

Explanation

ISCII is an 8-bit code.

Submit
96. There can be only one Foreign key in a table?

Explanation

This statement is false. A table can have multiple foreign keys, which are used to establish relationships with other tables. Foreign keys are used to ensure referential integrity and maintain data consistency in the database.

Submit
97. Fiber cable has high transmission loss?

Explanation

Fiber cable actually has low transmission loss. This is because fiber optic cables use light to transmit data, which experiences very little signal loss over long distances. Unlike traditional copper cables, fiber optic cables do not suffer from electromagnetic interference or signal degradation. Therefore, fiber cables are known for their high transmission capacity and low loss of signal strength.

Submit
98. Which two of the following are protocols?

Explanation

FTP and HTTP are both protocols. FTP stands for File Transfer Protocol, which is used for transferring files between computers on a network. HTTP stands for Hypertext Transfer Protocol, which is the protocol used for transmitting hypertext over the internet. TTP and SMHT are not recognized protocols.

Submit
99. A table level primary key constraint is created when two or more columns form the Primary Key?

Explanation

A table level primary key constraint is created when two or more columns form the Primary Key. This means that the primary key constraint is applied to the entire table, rather than just a single column. It ensures that the combination of values in the specified columns is unique for each row in the table.

Submit
100. LI in HTML stands for?

Explanation

The correct answer is "List Item." In HTML, the "LI" tag is used to define a list item within an ordered or unordered list. It is used to create bullet points or numbered items in a list.

Submit
101. Which of the following is just like the bullted list in HTML?

Explanation

The correct answer is UL because UL stands for Unordered List in HTML, which is used to create a bulleted list. It is a type of list that does not have a specific order or sequence.

Submit
102. Statement stmt; stmt=con.createConnection(); stmt.executeQuery();  // What is the return type of this statement? What is the return type of this statement? stmt.executeQuery()

Explanation

executeQuery returns a ResultSet object which holds the data specified in the query.
ResultSet rs=stmt.executeQuery("select *from emp);

Submit
103. Which keyword is used for implementing inheritance in java?

Explanation

The keyword "extends" is used for implementing inheritance in Java. Inheritance allows a class to inherit the properties and methods of another class, known as the superclass. The "extends" keyword is used to create a subclass that inherits the attributes and behaviors of the superclass. By using "extends", the subclass can access and use the methods and variables of the superclass, allowing for code reuse and creating a hierarchical relationship between classes.

Submit
104. Order by clause in Mysql is used to

Explanation

The order by clause in MySQL is used to sort the result set of a query in either ascending or descending order based on one or more columns. It allows the user to specify the order in which the rows should be displayed. By default, the sorting is done in ascending order, but it can be modified to sort in descending order as well by using the DESC keyword. Therefore, the correct answer is "Sort in ascending or descending order."

Submit
105. JDBC can be used only from java?

Explanation

JDBC (Java Database Connectivity) is a Java API that allows Java programs to interact with databases. It provides a set of classes and interfaces that enable developers to connect to a database, execute SQL queries, and retrieve and manipulate data. Since JDBC is a Java API, it can only be used from Java programming language. Other programming languages may have their own APIs or libraries for interacting with databases. Therefore, the statement "JDBC can be used only from Java" is true.

Submit
106. ODBC can be used from any front end?

Explanation

ODBC (Open Database Connectivity) is a standard programming interface that allows applications to access data in database management systems. It provides a consistent way for different front-end applications to communicate with various database systems. Therefore, ODBC can indeed be used from any front end, making the statement "True" correct.

Submit
107. There can be only one unique key in a Table?

Explanation

This statement is false because in a table, there can be multiple unique keys. A unique key is a column or a set of columns that uniquely identifies each row in the table. While there can be only one primary key in a table, which is a unique key that is used to identify each row, there can also be other unique keys in the table that ensure the uniqueness of certain columns or combinations of columns. Therefore, there can be more than one unique key in a table.

Submit
108. A cross join is created by using two tables. First table has 5 rows , second table has three rows, the result has how many rows?

Explanation

A cross join is created by combining every row from the first table with every row from the second table. In this case, the first table has 5 rows and the second table has 3 rows. Therefore, the result will have 5 multiplied by 3, which is 15 rows.

Submit
109. In which of the following topologies there is a dependence on the central node for functioning?

Explanation

In a star topology, all devices in the network are connected to a central node, often referred to as a hub or switch. This central node plays a crucial role in the functioning of the network as it is responsible for managing and controlling the communication between the devices. Without the central node, the devices in the network would not be able to communicate with each other. Therefore, there is a dependence on the central node for the proper functioning of a star topology network.

Submit
110. What is the output of the following query? select sum(Basic) from Employee where eno>=5;

Explanation

The output of the query is 3000. This is because the query is selecting the sum of the "Basic" column from the "Employee" table where the "eno" column is greater than or equal to 5. The sum of the "Basic" values for all rows where the "eno" is greater than or equal to 5 is 3000.

Submit
111. Which three of the following are DML commands in MySql?

Explanation

The question asks for the three DML (Data Manipulation Language) commands in MySql. DML commands are used to modify and manipulate data in a database. The correct answer is Insert, Update, and Delete. These commands are commonly used to insert new records into a table, update existing records, and delete records from a table respectively.

Submit
112. While(1); { System.out.println("Hello World"): } What is the error in the above piece of code

Explanation

The error in the above piece of code is that there is a semicolon after the while statement. The semicolon terminates the while loop, causing it to become an infinite loop. The code inside the loop will never be executed.

Submit
113. Shiksha.com and MeritNation.com are ___________ websites?

Explanation

Shiksha.com and MeritNation.com are e-learning websites. This means that they provide online educational resources and courses to students. These websites offer a platform for students to access study materials, practice tests, and interactive learning tools. They aim to enhance the learning experience by providing a digital platform for students to learn and improve their academic skills.

Submit
114. Arrange the events in the order they need to be carried out 1. Extract data from result set 2. import the sql package 3. Execute Query 4.Open a connection

Explanation

The correct order of events to be carried out is as follows:
1. Import the sql package
2. Open a connection
3. Execute Query
4. Extract data from result set.

Submit
115. A cross join is created by using two tables. First table has 5 rows , second table has three rows, the result has how many rows?

Explanation

A cross join combines every row from the first table with every row from the second table, resulting in a new table with a number of rows equal to the product of the number of rows in each table. In this case, the first table has 5 rows and the second table has 3 rows, so the result will have 5 * 3 = 15 rows.

Submit
116. System and String classes are defined in which package?

Explanation

The System and String classes are defined in the "lang" package. This package is a part of the Java standard library and contains fundamental classes and interfaces that are essential for developing Java programs. The lang package provides basic functionalities and utilities that are used extensively in Java programming, including the System class for accessing system resources and the String class for manipulating strings.

Submit
117. Which package is imported by default in java?

Explanation

In Java, the "lang" package is imported by default. This package contains fundamental classes and interfaces that are essential for the Java language, such as the Object class, which is the root of all classes in Java. Importing the "lang" package allows access to these fundamental classes without explicitly importing them in every Java program.

Submit
118. Transliteration of Indian Languages means?

Explanation

Transliteration of Indian Languages refers to using English phonetics to type Indian languages. This means that instead of using the traditional Indian language keyboard layout, one can type in Indian languages using the English alphabet. For example, typing "Namaste" in English would automatically convert it to नमस्ते in Hindi. This method allows individuals who are familiar with English to easily type in Indian languages without having to learn a new keyboard layout.

Submit
119. Protected data members are accessible outside the class in which defined?

Explanation

Protected data members are only accessible within the class in which they are defined and in the derived classes. They are not accessible outside of the class.

Submit
120. A foreign key can not refer to the same table primary key?

Explanation

A foreign key can refer to the same table primary key. This is known as self-referencing or self-join, where a table can have a foreign key that references its own primary key. This can be useful in scenarios where there is a hierarchical relationship within the data.

Submit
121.  Having clause can be used without group by clause?

Explanation

The having clause is used to filter the groups generated by the group by clause. It is used in conjunction with the group by clause, so it cannot be used without the group by clause. Therefore, the statement "Having clause can be used without group by clause" is false.

Submit
122. Haryana.nic.in is a url of?

Explanation

The given URL, haryana.nic.in, is most likely a government website as it ends with ".nic.in" which is a domain reserved for government organizations in India. The "nic" in the domain stands for National Informatics Centre, which is a government agency responsible for providing e-governance services. Therefore, it can be inferred that haryana.nic.in is an e-governance site.

Submit
123. There can be only one alternate key in a table?

Explanation

This statement is false because a table can have multiple alternate keys. Alternate keys are unique identifiers that can be used as an alternative to the primary key for identifying records in a table. These alternate keys can be composed of one or more columns in the table. Therefore, it is possible to have more than one alternate key in a table.

Submit
124. There can be only one alternate key in a table?

Explanation

This statement is false because a table can have multiple alternate keys. An alternate key is a candidate key that is not chosen as the primary key. It provides an alternative way to uniquely identify records in a table. Therefore, it is possible to have more than one alternate key in a table.

Submit
125. Abstract class is a class which can be instantiated?

Explanation

An abstract class cannot be instantiated directly. It is meant to be subclassed and serves as a blueprint for other classes. Objects cannot be created from an abstract class, but it can be used as a reference type for polymorphism.

Submit
126. R in RAD stands for?

Explanation

The correct answer is "rapid" because the acronym RAD stands for Rapid Application Development. RAD is a software development methodology that emphasizes quick prototyping and iterative development to deliver software faster.

Submit
127. Which of the following is a cross of Text Field and List?

Explanation

A ComboBox is a cross between a Text Field and a List because it allows the user to either select an item from a drop-down list or enter their own text. It combines the functionality of a text input field with the ability to choose from a predefined set of options.

Submit
128. A MAN is larger than a WAN.

Explanation

The statement "A MAN is larger than a WAN" is false. In computer networking, a MAN (Metropolitan Area Network) is larger than a WAN (Wide Area Network). A MAN covers a larger geographical area, typically a city or a metropolitan area, while a WAN covers a larger area, such as multiple cities or even countries. Therefore, the correct answer is false.

Submit
129. You want to take the input of Hobbies from the user, ie Sports, Movies , Traveling etc which of the following controls would be the most suitable?

Explanation

A check box would be the most suitable control for taking input of hobbies from the user. This is because a check box allows the user to select multiple options from a list, which is ideal for selecting multiple hobbies. A radio button, on the other hand, only allows the user to select one option, which would not be suitable for selecting multiple hobbies. A text field is used for entering free-form text, so it would not be appropriate for selecting hobbies from a predefined list. A combo box is a drop-down list that allows the user to select one option, so it would not be suitable for selecting multiple hobbies either.

Submit
130. In case of nesting a Break statement will break the?

Explanation

In case of nesting, a break statement will break the loop in which it is placed. This means that if there are multiple loops nested within each other, the break statement will only exit the loop in which it is directly placed. It will not exit any outer loops or inner loops. Therefore, the correct answer is "The loop in which break is placed."

Submit
131. Class level variables are declared ?

Explanation

Class level variables are declared in the beginning of the class definition. This means that they are declared outside of any specific method or constructor and are accessible throughout the entire class. By declaring variables at the class level, they can be accessed and modified by any method within the class, providing a way to store and share data across multiple methods.

Submit
132. What is the return type of Math.pow() ?

Explanation

The return type of Math.pow() is double because the Math.pow() function in Java is used to calculate the power of a number. It takes two parameters, the base and the exponent, and returns the result as a double data type. The double data type is used to represent decimal numbers with high precision. Therefore, the correct answer is double.

Submit
133. The maximum value dayofyear() function can return is?

Explanation

The dayofyear() function returns the day of the year for a given date. In a non-leap year, there are 365 days, so the maximum value the function can return in that case is 365. However, in a leap year, there is an extra day, making it a total of 366 days. Therefore, the correct answer is 366.

Submit
134. WE can use Indian language key map to type in Iindian languages?

Explanation

The statement is true because Indian language key maps are designed specifically to enable users to type in Indian languages. These key maps provide the necessary characters and symbols required for typing in languages such as Hindi, Tamil, Bengali, etc. By using the Indian language key map, users can easily switch between English and Indian languages on their keyboards and type in their preferred language.

Submit
135. By default autocommit is on?

Explanation

By default, autocommit is set to "on" in many database management systems. This means that each individual SQL statement is treated as a transaction and is automatically committed to the database once it is executed. This can be convenient for small or simple operations where you don't need to manually manage transactions. However, in more complex scenarios, it may be necessary to turn off autocommit and manually manage transactions to ensure data consistency and integrity.

Submit
136. StringBuffer object is immutable ?

Explanation

The given answer is False. StringBuffer objects are actually mutable, meaning that they can be modified after they are created. Unlike String objects, which are immutable and cannot be changed once created, StringBuffer objects can have their values modified by using methods such as append(), delete(), and insert(). This makes StringBuffer a more flexible choice when dealing with dynamic string operations.

Submit
137. Which of the following is immutable?

Explanation

String is immutable in Java, meaning that once a String object is created, its value cannot be changed. Any operation that appears to modify a String actually creates a new String object. This immutability ensures that String objects are thread-safe and can be safely shared among multiple threads without the risk of data corruption.

Submit
138. Which of the following topologies have the advantage of short cable length?

Explanation

The bus topology has the advantage of short cable length because all devices are connected to a single cable, resulting in a shorter overall length of cable needed compared to other topologies. In a bus topology, devices are connected in a linear fashion, with each device tapping into the main cable. This eliminates the need for individual cables to connect each device to a central point, as in the star topology. The ring and tree topologies also require longer cable lengths to connect devices in a circular or hierarchical manner. Therefore, the bus topology is the correct answer as it minimizes cable length.

Submit
139. Abstract class is a class which can be instantiated?

Explanation

An abstract class cannot be instantiated because it is incomplete and serves as a blueprint for other classes to inherit from. It contains abstract methods that must be implemented by its subclasses. Therefore, an abstract class cannot be directly instantiated but can only be used as a base for creating objects of its subclasses.

Submit
140. Which of the following SQL objects will store the data retrieved through a Query?

Explanation

The ResultSet object in SQL stores the data retrieved through a query. It is used to hold the result set of a query and allows for easy access and manipulation of the data. The ResultSet object can be used to iterate over the rows of the result set and retrieve the values of each column in a specific row.

Submit
141. Calendar class is an abstract class.

Explanation

The statement is true because the Calendar class in Java is indeed an abstract class. This means that it cannot be directly instantiated and used to create objects. Instead, it serves as a base class for specific calendar implementations such as the GregorianCalendar class. By making the Calendar class abstract, it provides a common set of methods and functionality that can be shared among different calendar implementations.

Submit
142. Commit and Rollback are exemples of?

Explanation

Commit and Rollback are examples of Transaction Control Language (TCL) statements. TCL statements are used to manage transactions in a database. Commit is used to save the changes made in a transaction, while Rollback is used to undo the changes made in a transaction. These statements ensure the consistency and integrity of the data in the database by allowing users to control the outcome of a transaction.

Submit
143. A while loop will execute at least once irrespective of the condition specified in the loop?

Explanation

A while loop will only execute if the condition specified in the loop is true. If the condition is false from the beginning, the loop will not execute at all. Therefore, the statement that a while loop will execute at least once irrespective of the condition is false.

Submit
144. Which of thefollowing aretrue about fibre cables?(Select two)

Explanation

Fiber cables are lighter than copper cables because they are made of glass or plastic fibers, which are lighter materials compared to copper. They are used mostly in backbone networks because fiber optic cables can transmit data over longer distances without losing signal strength, making them suitable for connecting different networks.

Submit
145. Alter table command can be used to drop the Primary KeY?

Explanation

The alter table command can indeed be used to drop the Primary Key. This command allows for modifications to be made to an existing table, including adding or removing constraints such as Primary Keys.

Submit
146. Select ascii("BABITA"); will return

Explanation

The function ascii() is used to return the ASCII value of a character. In this case, the function is applied to the string "BABITA". The ASCII value of the character 'B' is 66, so the function will return 66.

Submit
147. A table level primary key constraint is created when two or more columns form the Primary Key?

Explanation

A table level primary key constraint is created when two or more columns form the Primary Key. This means that the primary key constraint is applied to the entire table and not just a single column. It ensures that the combination of values in the specified columns is unique for each row in the table.

Submit
148. Which of the following principles does the optical fibre use for transmission?

Explanation

Optical fibers use the principle of total internal reflection for transmission. This occurs when light traveling through a medium with a higher refractive index encounters a boundary with a medium of lower refractive index at an angle greater than the critical angle. Instead of being refracted, the light is reflected back into the higher refractive index medium, allowing it to propagate through the fiber by bouncing off the walls. This principle ensures that the light signal remains confined within the fiber and is able to travel long distances without significant loss of signal strength.

Submit
149. String str="123"; StringBuffer sb=new StringBuffer(str); sb.reverse(); String str1=sb.toString(); String str2=str1+str; System.out.println(str2); What is  the output of the above code?

Explanation

The given code reverses the string "123" using the StringBuffer class and appends it to the original string. Therefore, the output of the code will be "321123".

Submit
150. Which of the following principles does the optical fibre use for transmission?

Explanation

Optical fibers use the principle of total internal reflection for transmission. This occurs when light rays traveling through a medium with a higher refractive index encounter a boundary with a medium of lower refractive index at an angle greater than the critical angle. Instead of refracting out of the medium, the light is reflected back into the medium, allowing it to travel through the fiber by bouncing off the walls. This principle allows for efficient transmission of light signals over long distances in optical fibers.

Submit
151. Which of the following two are selection statements?

Explanation

The two selection statements in the given options are "if" and "switch". The "if" statement is used to execute a block of code if a certain condition is true. The "switch" statement is used to select one of many code blocks to be executed, based on the value of a variable. Both of these statements are used to control the flow of the program based on certain conditions.

Submit
152. How many records will be displayed by the following Query? select count(distinct Mgr) from Employee?

Explanation

The query "select count(distinct Mgr) from Employee" will display the count of distinct values in the "Mgr" column of the "Employee" table. The answer "2" suggests that there are two distinct values in the "Mgr" column.

Submit
153. Descriptive Web Site names are converted into numerical ones by which of the following?

Explanation

A DNS server converts descriptive web site names into numerical IP addresses. When a user types in a website name (such as www.example.com) into their web browser, the DNS server translates that name into the corresponding IP address (such as 192.168.0.1) that the computer can understand. This allows the user's computer to connect to the correct web server and access the desired website.

Submit
154. Which command is used to drop a column? ( two words )

Explanation

The command "alter table" is used to modify the structure of a table in a database. In this case, it is specifically used to drop a column from a table.

Submit
155. What will be the result of the following? String str="Ravi"; StringBuffer sb=new StringBuffer(str); int len=str.length(); for(int i=0;i

Explanation

The code initializes a string variable "str" with the value "Ravi". It then creates a StringBuffer object "sb" with the same value as "str". The code then gets the length of the string "str" and stores it in the integer variable "len". The for loop iterates from 0 to the value of "len". However, the given code is incomplete and does not provide any information on what happens inside the for loop. Therefore, it is not possible to determine the exact result of the code.

Submit
156. Which of the following tag is used for table heading style?

Explanation

The correct answer is "th". In HTML, the "th" tag is used to define a header cell in a table. It is typically used to label the columns or rows in a table, providing a clear and concise description of the data in that particular section of the table. The "th" tag is important for accessibility purposes as it helps screen readers and other assistive technologies to properly identify and navigate the table headers.

Submit
157. Which of the following controls can be used to show cities in a HTML  form?

Explanation

A List or Combobox control can be used to show cities in an HTML form. This control allows the user to select a single option from a dropdown list of cities. The user can scroll through the list and choose the desired city. This control is commonly used when there are a limited number of options to choose from, such as a list of cities.

Submit
158. Which of the following is immutable?

Explanation

String is immutable because once a String object is created, its value cannot be changed. Any operation that appears to modify a String actually creates a new String object with the modified value. This immutability property of String makes it safe to use in multi-threaded environments and allows for efficient memory management.

Submit
159. You can save time  by creating your website?

Explanation

DreamWeaver is a web development software that provides a visual interface for creating websites. It offers various features and tools that can help streamline the website creation process, allowing users to save time compared to manually coding the website using HTML or using a word processor like Word. DreamWeaver provides a more efficient and user-friendly way to design and develop websites.

Submit
160. How  many records will be displayed by the following query? select * from Employee where Basic>2000;

Explanation

The query "select * from Employee where Basic>2000" will display 2 records.

Submit
161. In MYSql _________ keyword is used to check for null values?( 1 word )

Explanation

The keyword "is" is used in MySQL to check for null values.

Submit
162. Statement stmt; stmt=con.createConnection(); stmt.executeQuery();  // What is the return type of this statement? What is the return type of this statement? stmt.executeQuery()

Explanation

executeQuery returns a ResultSet object which holds the data specified in the query.
ResultSet rs=stmt.executeQuery("select *from emp);

Submit
163. Open type fonts are same as Unicode?

Explanation

Open type fonts are not the same as Unicode. Unicode is a character encoding standard that assigns a unique number to each character, while Open type is a font format developed by Microsoft and Adobe that supports advanced typographic features. Open type fonts can contain Unicode characters, but they can also include additional features such as ligatures, alternate glyphs, and stylistic sets. Therefore, while Open type fonts can support Unicode characters, they are not synonymous with Unicode itself.

Submit
164. Working at a particular level of abstraction with out considering background details is known as________?

Explanation

Abstraction refers to the concept of working at a higher level of abstraction without concerning oneself with the underlying implementation details. It allows for the creation of simplified models or representations of complex systems, making it easier to understand and work with the system. By focusing on the essential features and hiding unnecessary details, abstraction helps in managing complexity and improving the efficiency of problem-solving.

Submit
165. A firewall generally sits on ?

Explanation

A firewall generally sits on a proxy server. A proxy server acts as an intermediary between a client device and a web server, allowing the firewall to monitor and control incoming and outgoing network traffic. The firewall on the proxy server can inspect the data packets and apply security measures to protect the network from unauthorized access, malware, and other threats. By sitting on a proxy server, the firewall can effectively filter and block suspicious or malicious traffic before it reaches the intended destination.

Submit
166. How many records will be displayed by the following Query? select count(distinct Mgr) from Employee?

Explanation

The query "select count(distinct Mgr) from Employee" will display the count of distinct values in the "Mgr" column of the Employee table. The answer to the question is 2, indicating that there are two distinct values in the "Mgr" column.

Submit
167. Descriptive Web Site names are converted into numerical ones by which of the following?

Explanation

DNS servers are responsible for converting descriptive website names (such as www.example.com) into numerical IP addresses (such as 192.168.1.1) that computers can understand. When a user types a website name into their browser, the DNS server is queried to find the corresponding IP address, allowing the user to access the website. Therefore, DNS servers are used to convert descriptive website names into numerical ones.

Submit
168. Statement.executeUpdate(); method is used for fetching the data from the database from netbeans?

Explanation

The statement.executeUpdate() method is not used for fetching data from the database in NetBeans. This method is typically used for executing SQL statements that modify data in the database, such as INSERT, UPDATE, or DELETE statements. To fetch data from the database in NetBeans, other methods like statement.executeQuery() or PreparedStatement.executeQuery() are typically used.

Submit
169. Which of the following is exit coltrolled loop?

Explanation

A do-while loop is an exit controlled loop because it checks the condition at the end of the loop. This means that the loop will always execute at least once, even if the condition is initially false. After each iteration, the condition is checked, and if it is true, the loop will continue. If the condition is false, the loop will exit. This is different from a while loop, where the condition is checked at the beginning, and if it is false initially, the loop will not execute at all.

Submit
170. Which of the following two are selection statements?

Explanation

The two selection statements in the given options are "if" and "switch". The "if" statement is used to execute a block of code if a certain condition is true. The "switch" statement is used to select one of many code blocks to be executed, based on the value of a variable. Both of these statements allow for conditional execution of code, making them selection statements.

Submit
171. One transaction can have only one DML statement?

Explanation

This statement is false because a single transaction can have multiple DML (Data Manipulation Language) statements, such as INSERT, UPDATE, DELETE, or MERGE. These statements can be used to modify data in a database within a single transaction. Therefore, the statement "One transaction can have only one DML statement" is incorrect.

Submit
172. Which of the following topologies features direct connection between all participating nodes?

Explanation

Mesh topology features a direct connection between all participating nodes. In this topology, each node is connected to every other node in the network, forming a fully interconnected network. This allows for efficient communication and high fault tolerance, as there are multiple paths for data to travel. However, it requires a large number of connections and can be expensive to implement.

Submit
173. Cardinality of a table is?

Explanation

The cardinality of a table refers to the number of rows in the table. It is a measure of the size or the count of the data in the table. The number of rows represents the number of individual records or instances in the table.

Submit
174. Fiber cable has high transmission loss?

Explanation

Fiber cable actually has low transmission loss. This is because the fiber optic cables are made of glass or plastic, which allows for the transmission of light signals over long distances without significant loss of signal strength. This makes fiber optic cables ideal for long-distance communication and high-speed data transmission.

Submit
175. Which of the following needs to be imported for java jdbc connectivity JFrame project from netbeans?

Explanation

The correct answer is "java.sql.*;". This is because the "java.sql" package contains classes and interfaces that are essential for JDBC (Java Database Connectivity) connectivity in a Java JFrame project. The other options, "javax.sql.*;", "javac.sql.*;", and "java.sql;", are incorrect as they either do not exist or do not provide the necessary classes for JDBC connectivity.

Submit
176. What query should be written to find the name of all managers? (Based on the following table).

Explanation

The correct answer is "select distinct mgr from emp". This query will retrieve the distinct values of the "mgr" column from the "emp" table, which represents the names of all managers. The "distinct" keyword ensures that duplicate values are not included in the result.

Submit
177. Which of the following tags will create a bulleted list? 

Explanation

The UL tag in HTML is used to create an unordered (bulleted) list. It is used to group a set of related items together in a list format, where each item is represented by a bullet point.

Submit
178. A view can be used to rename a column?

Explanation

Yes, a view can be used to rename a column. Views are virtual tables created by a query that can be used to present data in a customized way. When creating a view, the column names can be specified to be different from the original table's column names, effectively renaming them. This allows for easier understanding and manipulation of data without altering the original table structure.

Submit
179. One transaction can have only one DML statement?

Explanation

False. One transaction can have multiple DML (Data Manipulation Language) statements. DML statements are used to modify, insert, or delete data in a database. In a transaction, multiple DML statements can be executed together as a single unit of work, ensuring that all changes are either committed or rolled back together. This allows for data consistency and integrity within the database.

Submit
180. Durability of a transaction means?

Explanation

Durability of a transaction refers to the permanence of the changes made during that transaction. It ensures that once a transaction is committed, the changes made to the database will persist and will not be lost even in the event of system failures or crashes. Durability guarantees that the data will be stored reliably and permanently, providing data consistency and integrity.

Submit
181. There can be only one unique key in a Table?

Explanation

This statement is false because in a table, it is possible to have multiple unique keys. A unique key is a column or a set of columns that uniquely identifies each row in a table. While there can only be one primary key in a table, which is a type of unique key, there can also be additional unique keys defined on other columns in the table. These unique keys ensure that the values in the specified columns are unique across all rows in the table. Therefore, there can be more than one unique key in a table.

Submit
182. ASCII is a _________ bit code?

Explanation

ASCII is a 7-bit code.

Submit
183.  Having clause can be used without group by clause?

Explanation

The correct answer is False. The Having clause cannot be used without a Group By clause. The Having clause is used to filter the results of a query based on a condition that applies to groups of rows, and it is typically used in conjunction with the Group By clause. Without the Group By clause, there are no groups to apply the condition to, making the Having clause invalid.

Submit
184. What will happen if you forget to give where condition after update command? 

Explanation

If you forget to give a WHERE condition after the UPDATE command, it will update all rows of the table. This means that the update operation will be applied to every single row in the table, potentially causing unintended changes to the data. It is important to always include a WHERE condition to specify which rows should be updated to avoid such situations.

Submit
185. Each row of a JTable in java is added using?

Explanation

In Java, each row of a JTable is added using an Object. This is because JTable is a flexible component that can display data of any type. By using an Object, we can store and display different types of data in each row of the JTable.

Submit
186. Which one of the following is true regarding public static void main(String args[])

Explanation

The statement "It is the driver function" is true because the main() method is the entry point of a Java program. It is the first method that is called when a program is executed, and it is responsible for starting the execution of the program. The main() method acts as a driver for the rest of the program, calling other methods and coordinating the flow of execution.

Submit
187. Protected data members are accessible outside the class in which defined?

Explanation

Protected data members are not accessible outside the class in which they are defined. They can only be accessed by the class itself and its derived classes. This is because protected access modifier allows access to the member within the class and its subclasses, but not to the outside world.

Submit
188. Working at a particular level of abstraction with out considering background details is known as________?

Explanation

Abstraction refers to the practice of working at a particular level of abstraction without considering background details. It involves focusing on the essential features and hiding unnecessary details. This allows for simplifying complex systems and making them easier to understand and work with. By using abstraction, developers can create models and representations that capture the important aspects of a system while abstracting away the implementation details. This helps in managing complexity, improving code reusability, and enhancing maintainability.

Submit
189. Which of the following are the two advantages of e-learning?

Explanation

The two advantages of e-learning are that you can learn at your own pace and it is interactive. E-learning allows individuals to learn at their own speed, giving them the flexibility to go through the material at a comfortable rate. Additionally, e-learning often incorporates interactive elements such as quizzes, simulations, and multimedia, which enhance the learning experience and make it more engaging.

Submit
190. A while loop will execute at least once irrespective of the condition specified in the loop?

Explanation

A while loop will only execute if the condition specified in the loop is true. If the condition is false from the beginning, the loop will not execute at all. Therefore, the statement in the question is incorrect.

Submit
191. There is a table emp(eno,ename,deptno) Another table dept(dno,dname,mgr) I can create a natural Join using the above table structures?

Explanation

That is because the common column is named deptno in first table and dno in second table.

Submit
192. Transactions can be created only by grouping DDL statements together?

Explanation

Transactions can be created by grouping both DDL (Data Definition Language) and DML (Data Manipulation Language) statements together. DDL statements are used to define or modify the structure of the database, while DML statements are used to manipulate the data within the database. Therefore, the statement that transactions can only be created by grouping DDL statements together is false.

Submit
193. Each row of a JTable in java is added using?

Explanation

In Java, each row of a JTable is added using an Object. This is because JTable is a flexible component that can display data of any type. By using an Object, we can store and display different types of data in each row of the JTable. This allows for a wide range of data to be displayed in a tabular format.

Submit
194. Arrange the events in the order they need to be carried out 1. Extract data from result set 2. import the sql package 3. Execute Query 4.Open a connection

Explanation

The correct order of events is as follows:
1. Import the sql package (2)
2. Open a connection (4)
3. Execute Query (3)
4. Extract data from result set (1)

Submit
195. Which of the following topologies have the advantage of short cable length?

Explanation

The Bus topology has the advantage of short cable length because all devices in the network are connected to a single cable, resulting in a direct connection between each device. This eliminates the need for long cable runs that are required in other topologies such as Ring or Tree. In a Bus topology, devices can be easily added or removed without affecting the rest of the network, making it a cost-effective and flexible option for small to medium-sized networks.

Submit
196. The MySql service is avialable by default at which of the following ports?

Explanation

The correct answer is 3306. This port number is the default port for the MySQL service.

Submit
197. Which of the following is the abbreviation of Hypertext Preprocessor?

Explanation

PHP is the correct answer because it stands for Hypertext Preprocessor. PHP is a widely-used open source scripting language that is specifically designed for web development. It is embedded within HTML code and can be used to create dynamic web pages and applications. PHP is known for its simplicity, flexibility, and ease of integration with different databases and frameworks, making it a popular choice among developers.

Submit
198. A firewall generally sits on ?

Explanation

A firewall generally sits on a proxy server. A proxy server acts as an intermediary between a client and a server, filtering and forwarding network traffic. By sitting on a proxy server, the firewall can monitor and control incoming and outgoing network traffic, providing an additional layer of security by blocking unauthorized access and protecting the network from potential threats.

Submit
199. There is a table emp(eno,ename,deptno) Another table dept(dno,dname,mgr) I can create a natural Join using the above table structures?

Explanation

That is because the common column is named deptno in first table and dno in second table.

Submit
200. Statement.executeUpdate(); method is used for fetching the data from the database from netbeans?

Explanation

The statement.executeUpdate() method is not used for fetching data from the database in NetBeans. It is used to execute SQL statements that modify the data in the database, such as INSERT, UPDATE, or DELETE statements. To fetch data from the database, the statement.executeQuery() method is used.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 15, 2010
    Quiz Created by
    Myhemant72
Cancel
  • All
    All (200)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Html is the root tag of a html document?
Which of the following controls can be used to submit a form?
Apache server also known as HTTP server is a ___ server?
<i> will make a word?
Apache server also known as HTTP server is a ___ server?
Which command is used to drop a table? ( two words)
A break statement in Java will only break the inner loop, in case of...
Which topology has the advantage of short cable length? ( 1 word )
Which command is used to drop a table? ( two words)
Dropping a table will delete both table structure and data.
Savepoints need to be named?
A firewall protects the Company LAN from outside threats.
The title tag is is to be defined in which section?
Savepoints need to be named?
D in ACID stands for?
P in PAN stands for____________________.
P in PAN stands for____________________.
Any DDL statement will automatically commit a tracnsatcion under...
By default autocommit is on?
The set autocommit will enable or disable the autocommit option only...
There can be only one Primary Key in a table.
A break statement in Java will only break the inner loop, in case of...
There can be only one Primary Key in a table.
Java is object oriented language because it supports classes and...
Any DDL statement will automatically commit a tracnsatcion under...
There can be only one Primary Key in the Table?
Incometaxindia.gov.in is a url of?
Alter table command can be used to add the Primary KeY to a table?
Which protocol does the Apache server use?
For using date and calender which package should be imported?
<b> will make a word?
Calendar class is found in which package?
Do -- while loop is exit controlled loop?
If it is a composite primary key, it ought to be a table level...
Which protocol does the Apache server use?
Copper Cables are generally restricted to 100 metres.
Which command is used to remove rows from a table from the database?
Indiapost.gov.in and passportindia.gov.in are examples of?
A row is also called a ?
If int  a=10,b=20...
There are n1 rows in first table, n2 rows in second table. The cross...
WiMax technology is used in?
Which of the following table constraint is used to provide a Default...
Open Office is a ________?
Open Office is a ________?
There are n1 rows in first table, n2 rows in second table. The cross...
Copper Cables are generally restricted to 100 metres.
Do -- while loop is exit controlled loop?
A in ACID stands for?
R in RAD stands for?
A group of logically related classes is called a?
Which of  the following two are advantages of e-Governance?
Dta members and methods are packed together in the class, this...
A firewall caches internet pages of the LAN which are frequently...
The title tag is is to be defined in which section?
Which topology is hierarchical in nature? ( 1 Word )
While(1)...
LI in HTML stands for?
Round and pow  are methods of?
String object is immutable ?
There can be only one Primary Key in the Table?
WiMax technology is used in?
What is the output of the following query?...
Once a table structure is created it can not be modified.
A MAN is larger than a WAN.
Snapdeal.com is a ?
There can be only one NOT NULL column in a table?
A group of logically related classes is called a?
Ubuntu is open source _________?
Which topology has the advantage of short cable length? ( 1 word )
Which topology is hierarchical in nature? ( 1 Word )
Which command is used to remove rows from a table from the database?
What is the result of the following?...
There can be only one NOT NULL column in a table?
The natural join is a equi join?
Which of the following tags will create a bulleted list? 
There can be only one Foreign key in a table?
Concat() is a method of which class?
Which command is used to remove a table from the database?
Alter table command can be used to drop the Primary KeY?
Which of  the following two are advantages of e-Governance?
In relational terminology a row is also called?
Which of the following table constraint is used to provide a Default...
Alter table command can be used to add the Primary KeY to a table?
Class level variables are declared ?
Dta members and methods are packed together in the class, this...
Which of the following is a cross of Text Field and List?
Ubuntu is open source _________?
This is the instantiation of a class?
The natural join is a equi join?
Which of the following is just like the bullted list in HTML?
What will happen if you forget to give where condition after update...
Calender is a static class?
In relational terminology a row is also called?
     ISCII is a _________bit code?
There can be only one Foreign key in a table?
Fiber cable has high transmission loss?
Which two of the following are protocols?
A table level primary key constraint is created when two or more...
LI in HTML stands for?
Which of the following is just like the bullted list in HTML?
Statement stmt;...
Which keyword is used for implementing inheritance in java?
Order by clause in Mysql is used to
JDBC can be used only from java?
ODBC can be used from any front end?
There can be only one unique key in a Table?
A cross join is created by using two tables. First table has 5 rows ,...
In which of the following topologies there is a dependence on the...
What is the output of the following query?...
Which three of the following are DML commands in MySql?
While(1);...
Shiksha.com and MeritNation.com are ___________ websites?
Arrange the events in the order they need to be carried out...
A cross join is created by using two tables. First table has 5 rows ,...
System and String classes are defined in which package?
Which package is imported by default in java?
Transliteration of Indian Languages means?
Protected data members are accessible outside the class in which...
A foreign key can not refer to the same table primary key?
 Having clause can be used without group by clause?
Haryana.nic.in is a url of?
There can be only one alternate key in a table?
There can be only one alternate key in a table?
Abstract class is a class which can be instantiated?
R in RAD stands for?
Which of the following is a cross of Text Field and List?
A MAN is larger than a WAN.
You want to take the input of Hobbies from the user, ie Sports, Movies...
In case of nesting a Break statement will break the?
Class level variables are declared ?
What is the return type of Math.pow() ?
The maximum value dayofyear() function can return is?
WE can use Indian language key map to type in Iindian languages?
By default autocommit is on?
StringBuffer object is immutable ?
Which of the following is immutable?
Which of the following topologies have the advantage of short cable...
Abstract class is a class which can be instantiated?
Which of the following SQL objects will store the data retrieved...
Calendar class is an abstract class.
Commit and Rollback are exemples of?
A while loop will execute at least once irrespective of the condition...
Which of thefollowing aretrue about fibre cables?(Select two)
Alter table command can be used to drop the Primary KeY?
Select ascii("BABITA"); will return
A table level primary key constraint is created when two or more...
Which of the following principles does the optical fibre use for...
String str="123";...
Which of the following principles does the optical fibre use for...
Which of the following two are selection statements?
How many records will be displayed by the following Query?...
Descriptive Web Site names are converted into numerical ones by which...
Which command is used to drop a column? ( two words )
What will be the result of the following?...
Which of the following tag is used for table heading style?
Which of the following controls can be used to show cities in a HTML...
Which of the following is immutable?
You can save time  by creating your website?
How  many records will be displayed by the following query?...
In MYSql _________ keyword is used to check for null values?( 1 word )
Statement stmt;...
Open type fonts are same as Unicode?
Working at a particular level of abstraction with out considering...
A firewall generally sits on ?
How many records will be displayed by the following Query?...
Descriptive Web Site names are converted into numerical ones by which...
Statement.executeUpdate(); method is used for fetching the data from...
Which of the following is exit coltrolled loop?
Which of the following two are selection statements?
One transaction can have only one DML statement?
Which of the following topologies features direct connection between...
Cardinality of a table is?
Fiber cable has high transmission loss?
Which of the following needs to be imported for java jdbc connectivity...
What query should be written to find the name of all managers? (Based...
Which of the following tags will create a bulleted list? 
A view can be used to rename a column?
One transaction can have only one DML statement?
Durability of a transaction means?
There can be only one unique key in a Table?
ASCII is a _________ bit code?
 Having clause can be used without group by clause?
What will happen if you forget to give where condition after update...
Each row of a JTable in java is added using?
Which one of the following is true regarding public static void...
Protected data members are accessible outside the class in which...
Working at a particular level of abstraction with out considering...
Which of the following are the two advantages of e-learning?
A while loop will execute at least once irrespective of the condition...
There is a table...
Transactions can be created only by grouping DDL statements together?
Each row of a JTable in java is added using?
Arrange the events in the order they need to be carried out...
Which of the following topologies have the advantage of short cable...
The MySql service is avialable by default at which of the following...
Which of the following is the abbreviation of Hypertext Preprocessor?
A firewall generally sits on ?
There is a table...
Statement.executeUpdate(); method is used for fetching the data from...
Alert!

Advertisement