View in English View in Hindi |
A Dequeue allows |
A) Insertion at only one end but deletion at both ends
B) Insertion at both ends but deletion at one end
C) Both (insertion at only one end but deletion at both ends) and (insertion at both ends but deletion at one end)
D) Insertion and deletion in middle but not at either ends
Correct Answer : Both (insertion at only one end but deletion at both ends) and (insertion at both ends but deletion at one end) |
A full binary tree with n leaves contains |
A) n nodes
B) log2n nodes
C) 2n-1 nodes
D) 2n nodes
Correct Answer : 2n-1 nodes |
The complexity of Merge Sort algorithm is |
A) O(n)
B) O(log2n)
C) O(n2)
D) O(nlog2n)
Correct Answer : O(nlog2n) |
The complexity of bubble sort algorithm is |
A) O(n)
B) O(log2n)
C) O(n2)
D) O(nlog2n)
Correct Answer : O(n2) |
Stack data structure is used in |
A) Garbage collection
B) Pointer manipulation
C) Recursion
D) None of these
Correct Answer : Recursion |
Linked lists are best suited |
A) For relatively permanent collection of data
B) For the dynamic allocation of data
C) For the insertion of data at one end
D) When data accesses is done at one end
Correct Answer : For the dynamic allocation of data |
A relational database is a |
A) Set of tuples
B) Set of nodes in tree form
C) Set of nodes in hierarchichal form
D) None of these
Correct Answer : Set of tuples |
E-R diagram can be transformed to |
A) Objects and classes
B) Tables
C) Arrays
D) None of these
Correct Answer : Tables |
A weak entity set is a |
A) Entity set whose existence depends on another weak entity set
B) Entity set whose existence depends on another strong entity set
C) Entity set whose existence dependency does not matter
D) None of these
Correct Answer : Entity set whose existence depends on another strong entity set |
In ACID properties of transactions processing, 'C' stands for |
A) Consistency
B) Cordinality
C) Conefirmity
D) None of these
Correct Answer : Consistency |
Encryption is a technique |
A) To design conceptual schema
B) To translate global data
C) To provide privacy of data
D) To update database
Correct Answer : To provide privacy of data |
Full form of DDL in SQL is |
A) Data directed language
B) Data definition language
C) Data density language
D) To update database
Correct Answer : Data definition language |
A database can be inconsistent due to |
A) Atomicity
B) Redundancy
C) Efficiency
D) All options are correct
Correct Answer : Redundancy |
SQL is developed to support |
A) Hierarchichal database
B) Relational database
C) Network database
D) A simple data file
Correct Answer : Relational database |
Which of the following is the property of object oriented programming? |
A) Polymorphism
B) Data encapsulation
C) Operator overloading
D) All options are correct
Correct Answer : All options are correct |
Member function of a class in C++ can be called by an object of that class using |
A) Dot operator
B) Ternary operator
C) Relational operator
D) Scope resolution operator
Correct Answer : Dot operator |
What value is displayed in the following C++ example? |
A) 0
B) 45.23
C) 52.43
D) 82.15
Correct Answer : 52.43 |
Reusability of code in C++ programs is justified with the following feature |
A) Information binding
B) Data abstraction
C) Data encapsulation
D) Inheritance
Correct Answer : Inheritance |
Which one of the following keywords is used for memory allocation in C++? |
A) Malloc
B) Calloc
C) New
D) Free
Correct Answer : New |
Which statement is true about destructor in C++? |
A) Destroy the objects when no longer requires
B) Create and use constant objects
C) Used in classes to display the class contents
D) All options are correct
Correct Answer : Destroy the objects when no longer requires |
“Run time binding” is the term used in C++. Its synonym is |
A) Virtual function
B) Instantiation
C) Polymorphism
D) None of these
Correct Answer : Polymorphism |
Which language is not an object oriented programming language? |
A) C++
B) Java
C) Small talk
D) C
Correct Answer : C |
In C++, the operator overloading is an example of |
A) Polymorphism
B) Inheritance
C) Encapsulation
D) Data hiding
Correct Answer : Polymorphism |
The reason of dividing OSI model in terms of number of layers is |
A) Ease the implementation of protocols for communication between systems
B) Ease the browsing of internet
C) Ease the programming storage
D) None of these
Correct Answer : Ease the implementation of protocols for communication between systems |
First layer of OSI reference model is known as |
A) Physical layer
B) Session layer
C) Transport layer
D) Network layer
Correct Answer : Physical layer |