Questions :- 611 Which of the following problem causes an exception?
1) Missing semicolon in statement in main().
2) A problem in calling function
3) A syntax error
4) A run-time error.
5) None of these
Questions :- 612 What happens if the base and derived class contains definition of a function with same prototype?
1) Compiler reports an error on compilation
2) Only base class function will get called irrespective of object
3) Only derived class function will get called irrespective of object.
4) Base class object will call base class function and derived class object will call derived class function.
5) none of the above
Questions :- 613 In which of the following a virtual call is resolved at the time of compilation?
1) From inside the destructor.
2) From inside the constructor
3) From inside the main().
4) Both A and B.
5) None of these
Questions :- 614 Which inheritance type is used in the class given below? class A : public X, public Y {}
1) Multilevel inheritance
2) Multiple inheritance
3) Hybrid inheritance
4) Hierarchical Inheritance
5) None of these
Questions :- 615 Which of the following is an invalid visibility label while inheriting a class?
1) public
2) private
3) protected
4) friend
5) None of these
Questions :- 616 Start and stop bits are used in serial communications for
1) Error detection
2) Error correction
3) Synchronization
4) Slowing down the communication
5) None of these
Questions :- 617 For a data entry project for office staff who have never used computers before (user interface and user friendliness are extremely important), one will use
1) Spiral model
2) Component based model
3) Prototyping
4) Waterfall model
5) None of these
Questions :- 618 The amount of uncertainty in a system of symbol is called
1) Bandwidth
2) Entropy
3) Loss
4) Quantum
5) None of these
Questions :- 619 Identify the incorrect statement
1) The overall strategy drives the E-Commerce
data warehousing strategy
2) Data warehousing in an E-Commerce environment should be done in a classical manner
3) E-Commerce opens up an entirely new world of web server.
4) E-Commerce security threats can be grouped into three major categories
5) None of the above
Questions :- 620 ______ is not an E-Commerce application
1) House banking
2) Buying stocks
3) Conducting an auction
4) Evaluating an employee
5) None of these