Saturday, August 3, 2013

Programming (C, C++ ...) 01

01. When a programming Language has the capacity to produce new datatype, it is called as,
[Paper III December 2012]
(A) Overloaded Language
(B) Extensible Language
(C) Encapsulated Language
(D) Abstraction Language                  

02. The Default Parameter Passing Mechanism is called as       [Paper III December 2012]
(A) Call by Value
(B) Call by Reference
(C) Call by Address
(D) Call by Name

03. Functions defined with class name are called as                   [Paper III December 2012]
(A) Inline function            (B) Friend function
(C) Constructor               (D) Static function

04. Assume that we have constructor functions for both base class and derived class. Now consider the declaration in main( ). Base * P = New Derived; in what sequence will the constructor be called? 
[Paper III June 2012]
(A) Derived class constructor followed by Base class constructor.
(B) Base class constructor followed by derived class constructor.
(C) Base class constructor will not be called.
(D) Derived class constructor will not be called. 

05. Consider the program below in a hypothetical programming language which allows global variables and a choice of static or dynamic scoping                  [Paper III December 2012]
int i;
program Main( )
{
       i = 10;
       call f ( );
}
procedure f( )
{
        int i = 20;
        call g ( );
}
procedure g( )
{
       print i;
}
Let x be the value printed under static scoping and y be the value printed under dynamic scoping. Then x and y are
(A) x = 10, y = 20
(B) x = 20, y = 10
(C) x = 20, y = 20
(D) x = 10, y = 10

06. printf(“%c”, 100);                                  [Paper II June 2012]
(A) prints 100
(B) prints ASCII equivalent of 100
(C) prints garbage
(D) none of the above

07. X – = Y + 1 means                               [Paper III December 2012]
(A) X = X – Y + 1
(B) X = –X – Y – 1
(C) X = –X + Y + 1
(D) X = X – Y – 1

08. The _______ memory allocation function modifies the previous allocated space. 
[Paper III June 2012]
(A) calloc( )                 (B) free( )
(C) malloc( )                (D) realloc( )

09. The mechanism that binds code and data together and keeps them secure from outside world is known as                  .           [Paper III June 2012]
(A) Abstraction           (B) Inheritance
(C) Encapsulation       (D) Polymorphism

10. Match the following with respect to java.util.* class methods:     [Paper III June 2012]
(a) Bit Set                    (i) Time zone getTimezone( )
(b) Calendar                (ii) int hashcode( )
(c) Time zone              (iii) int nextInt( )
(d) Random                 (iv) void setID(String tzName)
(a)        (b)        (c)        (d)
(A)       (ii)        (i)         (iv)       (iii)
(B)       (iii)       (iv)        (i)         (ii)
(C)       (iv)       (iii)        (ii)        (i)
(D)       (ii)        (i)         (iii)       (iv)



SOLUTIONS
1. B

2. A

3. C

4.

5. D
Whatever be the scoping, the i declared inside the method f() is not accessible outside. So when we say i from g(), it refers to global i. So under both cases, 10 is printed

6. B

7. D
X - = Y + 1    =>     X = X - (Y+1)    =>     X = X - Y - 1

8. D
malloc allocates the specified number of bytes
realloc increases or decrease the size of the specified block of memory. Reallocates it if needed
calloc allocates the specified number of bytes and initializes them to zero

free         releases the specified block of memory back to the system

9. C

10. A
The exact match is
(a) Bit Set                    (ii) int hashcode( )
(b) Calendar                (i) Time zone getTimezone( )
(c) Time zone               (iv) void setID(String tzName)
(d) Random                 (iii) int nextInt( )

No comments:

Post a Comment