Check the latest jobs opening news in private and public sector.

Tuesday, November 11, 2014

Infotech Placement Papers - Interview Questions 2015

 Infotech Placement Papers - Interview Questions 2015

Placement papers of Infotech 2015. Learn and practice the placement papers and interview questions answers of Infotech and find out how much you score before you appear for your next interview and written test.

Infotech Placement Papers - Interview Questions:


1. The following SQL is which type of join: SELECT CUSTOMER_T. CUSTOMER_ID, ORDER_T. CUSTOMER_ID, NAME, ORDER_ID FROM CUSTOMER_T,ORDER_T WHERE CUSTOMER_T. CUSTOMER_ID = ORDER_T. CUSTOMER_ID
    A.Equi-join            B.Natural join            C.Outer join            D.Cartesian join

    Answer: A

2. Which statement is true about a static nested class?

    A.You must have a reference to an instance of the enclosing class in order to instantiate it.
    B.It does not have access to nonstatic members of the enclosing class.
    C.It's variables and methods must be static.
    D.It must extend the enclosing class.

    Answer: B

    Explanation:
    Option B is correct because a static nested class is not tied to an instance of the enclosing class, and thus can't access the nonstatic members of the class (just as a static method can't access nonstatic members of a class). Option A is incorrect because static nested classes do not need (and can't use) a reference to an instance of the enclosing class. Option C is incorrect because static nested classes can declare and define nonstatic members. Option D is wrong because it         just is. There's no rule that says an inner or nested class has to extend anything.

3. Which constructs an anonymous inner class instance?

 A.Runnable r = new Runnable() { };                                                            B.Runnable r = new Runnable(public void run() { });                                    C.Runnable r = new Runnable { public void run(){}};    D.System.out.println(new Runnable() {public void run() { }});

    Answer: D

     Explanation:
    D is correct. It defines an anonymous inner class instance, which also means it creates an instance of that new anonymous class at the same time. The anonymous class is an implementer of the Runnable interface, so it must override the run()method of Runnable. A is incorrect because it doesn't override the run() method, so it violates the rules of interface implementation. B and C use incorrect syntax.

4. Which of the following range is a valid long double?

    A.3.4E-4932 to 1.1E+4932        B.3.4E-4932 to 3.4E+4932            C.1.1E-4932 to 1.1E+4932            D.1.7E-4932 to 1.7E+4932

    Answer: A

    Explanation:
    The range of long double is 3.4E-4932 to 1.1E+4932

5. In C, if you pass an array as an argument to a function, what actually gets passed?

    A.Value of elements in array        B.First element of the array        C.Base address of the array        D.Address of the last element of array

    Answer: C

    Explanation:
    The statement 'C' is correct. When we pass an array as a funtion argument, the base address of the array will be passed.

6. Consider the following program:
    # include
    class x
         {
            public:
            int a;
            x();
        };
        x::x()
        {
             a=10; cout<
            class b:public x
             {
                public:
                b();
            };
            b::b() { a=20; cout<
        main ()
        {
            b temp;
        }
what will be the output of this program?


    A.10            B.20            C.2010            D.1020

    Answer: B

7.     int i,j;
    for(i=0;i<=10;i++)
    {
        j+=5;
        assert(i<5);
    }


    A.Runtime error        B.6            C.5            D.10

    Answer: A

    Explanation:
    Runtime error: Abnormal program termination. assert failed (i<5), , asserts are used during debugging to make sure that certain conditions are satisfied. If assertion fails, the program will terminate reporting the same. After debugging use,  #undef NDEBUG and this will disable all the assertions from the source code. Assertion is a good debugging tool to make use of.

8. A primary key should be defined as


    A.NULL.            B.NOT NULL.        C.Either of the above can be used.        D.None of the above are correct

    Answer: B

9. In which numbering system can the binary number 1011011111000101 be easily converted to?

    A.Decimal system        B.Hexadecimal system        C.Octal system            D.No need to convert

    Answer: B

    Explanation:
    Hexadecimal system is better, because each 4-digit binary represents one Hexadecimal digit.

10. Which JDBC driver Type(s) can be used in either applet or servlet code?

    A.Both Type 1 and Type 2        B.Both Type 1 and Type 3        C.Both Type 3 and Type 4            D.Type 4 only

    Answer: C



You can also see:  Accenture Placement Papers
11. What is the difference between a LIST BOX and a COMBO BOX ?

    A.In the list box, the user is restricted to selecting a value from a list but in a combo box the user can type in value which is not in the list
    B.A list box is a data entry area while a combo box can be used only for control purposes
    C.In a combo box, the user is restricted to selecting a value from a list but in a list box the user can type in a value which is not in the list
    D.None of the above

    Answer: A

12. In a CLIENT/SERVER environment , which of the following would not be done at the client ?

    A.User interface part        B.Data validation at entry line        C.Responding to user events,        D.None of the above

    Answer: D

13. Why is it better to use an INTEGRITY CONSTRAINT to validate data in a table than to use a STORED PROCEDURE ?

    A.Because an integrity constraint is automatically checked while data is inserted into or updated in a table while a stored procedure has to be specifically invoked
    B.Because the stored procedure occupies more space in the database than a integrity constraint definition
    C.Because a stored procedure creates more network traffic than a integrity constraint definition
    D.None

    Answer: A

14. Which of the following is TRUE for the SYSTEM VARIABLE $date$

    A.Can be assigned to a global variable        B.Can be assigned to any field only during design time        C.Can be assigned to any variable or field during run time        D.None of the above

    Answer: B

15. Which of the following packaged procedure is UNRESTRICTED ?

    A.CALL_INPUT        B.CLEAR_BLOCK        C.EXECUTE_QUERY        D.USER_EXIT

    Answer: D

16. Identify the RESTRICTED packaged procedure from the following

    A.USER_EXIT        B.MESSAGE        C.BREAK                D.EXIT_FORM

    Answer: D

17. What is SQL*FORMS

    A.SQL*FORMS is a 4GL tool for developing & executing Oracle based interactive applications.
    B.SQL*FORMS is a 3GL tool for connecting to the Database
    C.SQL*FORMS is a reporting tool
    D.None of the above

    Answer: A

18. A column defined as PRIMARY KEY can have NULL


    A.TRUE                B.FALSE

    Answer: B

19. Which of the following SQL functions can operate on any datatype

    A.TO_CHAR        B.LOWER                C.LPAD            D.CEIL

    Answer: D

20. Which of the following is true concerning systems information in an RDBMS

    A.RDBMS store database definition information in system-created tables.
    B.This information can be accessed using SQL.
    C.This information often cannot be updated by a user
    D.All of the above

    Answer: A




You can also see:  Cisco Placement Papers
21. What servlet processor was developed by Apache Foundation and Sun?

    A.Apache Tomcat            B.Apache Web server            C.Sun servlet processor            D.None of the above is correct

    Answer: A

22. The software used to drive microprocessor-based systems is called:

    A.Assembly language programs        B.Firmware            C.BASIC interpreter instructions        D.Flowchart instructions

    Answer: A

23. Which bitwise operator is suitable for checking whether a particular bit is on or off?

    A.&& operator            B.& operator            C.|| operator                D.! operator

    Answer: B

24. Multivalued dependencies should ________ be eliminated.

    A.always                B.commonly            C.seldom                    D.never

    Answer: A

25. Each data item in a record may be a group item composed of sub-items; those items which are indecomposable are called

    A.elementary items        B.atoms                C.scalars                    D.all of above

    Answer: D

26. What is the output of the following program
    main()
    {
        int c[ ]={2.8,3.4,4,6.7,5};
        int j,*p=c,*q=c;
        for(j=0;j<5;j++)
        {
            printf(" %d ",*c);
            ++q; 
        }
        for(j=0;j<5;j++)
        {
            printf(" %d ",*p);
            ++p; 
        }
    }


    A.2 2 2 2 2 2 3 4 6 5        B.2.8,3.4,4,6.7,5            C.Compiler error            D.None

    Answer: A

    Explanation:
    Initially pointer c is assigned to both p and q. In the first loop, since only q is incremented and not c , the value 2 will be printed 5 times. In second loop p itself is incremented. So the values 2 3 4 6 5 will be printed.

27. Which of the following conditions should exist if you want to convert a relationship to an associative entity?

 A.Some of the relationships for the participating entities are "many".            B.The resulting associative entity has an independent meaning.                  C.The resulting associative entity has no attributes.    D.All of the above

    Answer: B

28. #include gets replaced by the contents of the file stdio.h

    A.During editing            B.During linking            C.During execution            D.During preprocessing

    Answer: D

    Explanation:
    The preprocessor replaces the line #include with the system header file of that name. More precisely, the entire text of the file 'stdio.h' replaces the#include directive.

29. When new data are to be inserted into a data structure, but there is no available space; this situation is usually called

    A.underflow            B.overflow            C.housefull            D.saturated

    Answer: D

30. Using the SQL GROUP BY phrase with a SELECT statement can help detect which of the following problems?

    A.The multivalue, multicolumn problem        B.The inconsistent values problem        C.The missing values problem        D.The general-purpose remarks column problem

    Answer: B


More Placement Papers Click Here 

Get Latest Freshers Jobs Alerts For Free 


Register Here


For Jobs Updates via Facebook 

facebook
Share:

0 comments:

Post a Comment

Copyright © Latest Job Opening News in Private & Public Sector- Bestjobalert.com | Powered by Blogger Design by ronangelo | Blogger Theme by NewBloggerThemes.com