Quiznetik

Principles of Programming Languages | Set 2

1. What happens when rows are found using a FETCH statement

Correct : B. it causes cursor to open

2. For which trigger timing can you reference the NEW and OLD qulaifires?

Correct : D. oracle forms trigger

3. What is the maximum number of handlers processed before the PL/SQL block is exited when an exception occure?

Correct : A. only one

4. The stepsqlite product is a PL/SQL compiler for the small database-------

Correct : D. sqlite

5. What is the maximum number of ELSE clauses that can be included in an IF clause that is not nested?

Correct : B. 1

6. Subprograms and anonymous blocks can be called by other applications.

Correct : A. true

7. A nested subprogram can be called from the main procedure or from the calling environment. True or False?

Correct : B. false

8. When modifying procedure code, the procedure must be re-executed to validate and store it in the database.

Correct : A. true

9. Which of the following can be used as an argument for a procedure parameter?

Correct : D. all of the above.

10. If you don’t specify a mode for a parameter, what is the default mode?

Correct : B. in

11. Which kind of parameters cannot have a DEFAULT value?

Correct : A. in,out,in out

12. Which one of the following statements about formal and actual parameters is true?

Correct : C. a formal parameter is declared within the called procedure, while an actual parameter is declared in the calling environment.

13. This resembles usages in object-oriented programming languages like________, C++ and Java.

Correct : C. object pascal

14. …………………means combine available symbol to create well formed sentences in the language

Correct : B. syntax

15. ………………….hints at characteristics of language , which are related to language user.

Correct : B. semantics

16. …………………..defines the meaning of the program.

Correct : B. axiomatic semantics

17. Which semantics are used in compiler i.e. convert program into machine language

Correct : D. translation semantics

18. Which of the following is not the built in data types of Pascal?

Correct : D. float

19. Which is the subtypes of Pascal and Ada Data Types

Correct : D. all of these

20. Which is the subtypes of unstructured types of Pascal Data Types

Correct : D. all of these

21. Which is the subtypes of structured type of Pascal Data Types

Correct : D. all of these

22. Which is the subtypes of fundamental data type of C++

Correct : C. both a and b

23. Which is the subtypes of derived data type of C++

Correct : D. all of these

24. Which of the following are structured dta types in Ada?

Correct : D. all of these

25. Which of the following subtypes of scalar data types of Ada

Correct : C. both a and b

26. Which of the following are subtypes of discrete and real data types of Ada?

Correct : D. all of these

27. In which language ADT is not implemented by using class

Correct : D. ada

28. illegal operation that manipluate the data object is called

Correct : B. type error

29. which type of error occure in program

Correct : C. all of these

30. In intensional mapping range type values are directly associated with domain type values

Correct : A. true

31. Extensional mapping is a routine in which the range type values are associated as data aggregates

Correct : A. true

32. What is the output of the folloeing code? #include <iostream> using namespace std; int main() { int a = 10, b = 20; a = a++; b = ++b; cout << a << b; return 0; }

Correct : B. 2

33. The software development process originally consisted only of the ------------phase.

Correct : A. impletation

34. The section examines briefly the developments in language design by following the evolution of ideas and concepts from a ----------------.

Correct : A. historical perspective

35. In the early days of computing, the computer was used mainly in__________

Correct : C. scientific applications.

36. The desire to apply the computerin more and more applications led to its being used in increasingly less under-stood and more -----------------

Correct : B. sophisticated environments.

37. _________considerations forced people to enhancean existing system to meet the newly recognized needs.

Correct : B. economic

38. is another issue that has gained importance gradually,because of two major factors.

Correct : A. system reliability

39. System reliability is another issue that has gained importance gradually,because of --------------major factors.

Correct : B. two

40. One factor of system Reliability isthat systems are being developedfor users with little or no ---------

Correct : A. computer background

41. The second factor of system reliability is that systemsare now being applied in critical areas such as chemical or nuclear plants andpatient monitoring, where system failures can be disastrous. In order toensure ----------, verification and validation became vital..

Correct : A. reliability

42. In the early days of computing, the ------------- was used mainly in scientific applications

Correct : A. computer

43. The runtime storage might be subdivided of hold___________.

Correct : D. all of these

44. During exection of a program the compiler clemandy for block of memory to operahng system This block is called as______________.

Correct : C. runtime

45. Data memory is divided into_________________.

Correct : D. all of these

46. following are the limitations of static allocation strategy

Correct : D. all of these

47. which field is not present in the activation record?

Correct : B. register allocation

48. In activation record the control link is basically a____________.

Correct : B. dynamic link

49. The assigned a pointer to the first instruction of the code segment for the_____.

Correct : C. subprogram

50. A block representation can be portrayed by ________,which demonstrates how blocks are nested into one another.

Correct : B. static nesting tree(snt)

51. A strict substitution is called ‘in-line expansion’or_________.

Correct : A. macro extension

52. Types of parameter passing techniques______.

Correct : D. all of these

53. _________are generally passed by reference.

Correct : B. array

54. The address of actual parameter is passed to the formal parameter, “______”can happen.

Correct : B. aliasing

55. Any manipulation on the formal parameters doesn’t have effect on values in activation of the_____.

Correct : A. caller

56. ________is a second usuage demonstrate for in-out parameter.

Correct : B. pass by reference

57. This sort of intercommunication between the modules is accomplished by_________.

Correct : A. parameter passing

58. The hybid method between call by value and call by reference is______.

Correct : B. copy restore

59. The node of activation tree represents___________.

Correct : C. a and b

60. The root of activation tree represents_________.

Correct : C. a and b

61. ______field ,of activation record refers to non local data in another activation record .

Correct : B. access link

62. The control link of activation record points to__________.

Correct : A. caller procedure

63. An interpreter is a program that repetitively executes :

Correct : C. perform the action

64. CPU is also an interpreter of machine instruction

Correct : A. true

65. ____translate code into some efficient ntermesiate representation and immediately execute that.

Correct : B. interpreter

66. Interpreters are frequently used to executed

Correct : C. both

67. No intermediate code is generated in

Correct : A. interpreter

68. BASIC language is an example of:

Correct : A. interpreter

69. In interpreter conditional control statements are execute slower

Correct : A. true

70. In interpreter memory required is?

Correct : A. less

71. In ------- Higher level language is converted into lower level lenguage

Correct : A. interpreter

72. In computing , an interpreter is a computer that reads the source code of another program and execute that program

Correct : A. true

73. Self modifying code can be easily implemented by

Correct : A. interpreter

74. Translator for low level programming language were termed as C

Correct : A. assembler

75. The translator which perform macro expansion is called a

Correct : B. macro pre-processor

76. Which of the following can be used as a criterion for classification of data structures used in language processing.

Correct : D. all of the above

77. An assembler is

Correct : C. machine dependant.

78. Which is not a funciton of a loader

Correct : B. translation

79. An interpreter is a program that

Correct : B. automates the translation of assemble language into machine language

80. disadvantage of compiler and go loading scheme is that

Correct : D. all of the above

81. which of the following are language processors

Correct : A. assembler

82. An assembler converts

Correct : C. assembly language to machine language

83. Numerous binding are performed amid program execution is called_ _ _ _

Correct : C. both a) & b)

84. Binding is done at_ _ _

Correct : B. execution time

85. Execution time binding is also called as

Correct : C. early binding

86. Binding is chosen by .......

Correct : D. all of above

87. The time amid program formulation or processing when this decision is made is named........

Correct : C. binding time

88. Which of the following logic is used to produce loops in programme logic?1)A data object that is characterized and named unequivocally in a program is named as…………...

Correct : B. variables.

89. The function with the name ___________ is always written in every program

Correct : B. main

90. The scope of a variable declared externally, is__________

Correct : C. in multiple programs

91. The scope of a variable declared as static storage class is__________

Correct : A. local within the function declared

92. __________binding is used to define the scope in terms of the lexical structure of a program.

Correct : A. static scope.