Oracle Placement Paper 2016 with Solution

Oracle Placement Paper 2016 with Solution

1. How many times the program will print “India
include
int main()
{
printf(“India”);
main();
return 0;
}

A.Infinite times            B.32767 times            C.65535 times            D.Till stack doesn’t overflow

Answer: D

Explanation:
A call stack or function stack is used for several related purposes, but the main reason for having one is to keep track of the point to which each active subroutine should return control when it finishes executing. A stack overflow occurs when         too much memory is used on the call stack. Here function main() is called repeatedly and its return address is stored in the stack. After stack memory is full. It shows stack overflow error.

2. Specify the 2 library functions to dynamically allocate memory?

A.malloc() and memalloc()            B.alloc() and memalloc()            C.malloc() and calloc()        D.memalloc() and faralloc()

Answer: C

3. You need to store elements in a collection that guarantees that no duplicates are stored. Which two interfaces provide that capability?

A.Java.util.Map            B.Java.util.List            C.Java.util.Collection            D.None of the above

Answer: A

Explanation:
Option A is correct. A Map cannot contain duplicate keys. Option B is wrong. Lists typically allow duplicate elements. Option C is wrong. Collection allows duplicate elements.

4. Which three are methods of the Object class? 1. notify(); 2. notifyAll(); 3. isInterrupted(); 4. synchronized(); 5. interrupt(); 6. wait(long msecs); 7. sleep(long msecs); 8. yield();

A.1, 2, 4                B.2, 4, 5                C.1, 2, 6                    D.2, 3, 4

Answer: C

Explanation:
(1), (2), and (6) are correct. They are all related to the list of threads waiting on the specified object. (3), (5), (7), and (8) are incorrect answers. The methods isInterrupted() andinterrupt() are instance methods of Thread. The methods sleep        () and yield() are static methods of Thread. D is incorrect because synchronized is a keyword and the synchronized()construct is part of the Java language.

5. Which class or interface defines the wait(), notify(),and notifyAll() methods?

A.Object                B.Thread                C.Runnable                D.Class

Answer: A

Explanation:
The Object class defines these thread-specific methods. Option B, C, and D are incorrect because they do not define these methods. And yes, the Java API does define a class called Class, though you do not need to know it for the exam

6. The SQL WHERE clause:

A.limits the column data that are returned.        B.limits the row data are returned.        C.Both A and B are correct.        D.Neither A nor B are correct.

Answer: B

7. To define what columns should be displayed in an SQL SELECT statement:

A.use FROM to name the source table(s) and list the columns to be shown after SELECT.
B.use USING to name the source table(s) and list the columns to be shown after SELECT.
C.use SELECT to name the source table(s) and list the columns to be shown after USING.
D.use USING to name the source table(s) and list the columns to be shown after WHERE.

Answer: A

8. The ODBC core API consists of which of the following functions

A.Commit or rollback transactions only    B.Connect to data sources with driver-specific information only    C.Connect to data sources only    D.Both 1 and 3 above are in the OBDC core API.

Answer: D

9. The memory address of fifth element of an array can be calculated by the formula

A.LOC(Array[5]=Base(Array)+w(5-lower bound), where w is the number of words per memory cell for the array
B.LOC(Array[5])=Base(Array[5])+(5-lower bound), where w is the number of words per memory cell for the array
C.LOC(Array[5])=Base(Array[4])+(5-Upper bound), where w is the number of words per memory cell for the array
D.None of above

Answer: A

10. Which of the following is not a limitation of binary search algorithm?

A.must use a sorted array
B.requirement of sorted array is expensive when a lot of insertion and deletions are needed
C.there must be a mechanism to access middle element directly
D.binary search algorithm is not efficient when the data elements are more than 1000.

Answer: D

11. SNAPSHOT is used for [DBA]

A.Synonym            B.Table space            C.System server            D.Dynamic data replication

Answer: D

12. What is difference between a DIALOG WINDOW and a DOCUMENT WINDOW regarding moving the window with respect to the application window?

A.Both windows behave the same way as far as moving the window is concerned.
B.A document window can be moved outside the application window while a dialog window cannot be moved
C.A dialog window can be moved outside the application window while a document window cannot be moved
D.None

Answer: C

13. What does DLL stands for?

A.Dynamic Language Library            B.Dynamic Link Library        C.Dynamic Load Library        D.None of the above

Answer: B

14. Which Oracle access method is the fastest way for Oracle to retrieve a single row?

A.Primary key access            B.Access via unique index        C.Table access by ROWID        D.Full table scan

Answer: A

15. void start()
{

A a = new A();
B b = new B();
a.s(b);
b = null; /* Line 5 */
a = null;  /* Line 6 */
System.out.println(“start completed”); /* Line 7 */
}

When is the B object, created in line 3, eligible for garbage collection

A.after line 5            B.after line 6                C.after line 7            D.There is no way to be absolutely certain.

Answer: D

Explanation:
Option D is correct. I think there are too many unknowns about the method s and the classes A and B to be able to answer this question with any certainty.

16.    int i,j;
for(i=0;i<=10;i++)
{
j+=5;
assert(i<5);
}

A.Runtime error            B.5                C.6                D.10

Answer: A

Explanation:
Runtime error: Abnormal program termination. assert failed (i<5), NOTE asserts are used during debugging to make sure that certain conditions are satisfied. If assertion fails, the program will terminate reporting the same. After debugging use,         #undef NDEBUG and this will disable all the assertions from the source code. Assertion is a good debugging tool to make use of.

17.     main()
{
int c[ ]={2.8,3.4,4,6.7,5};
int j,*p=c,*q=c;
for(j=0;j<5;j++)
{
printf(” %d “,*c);
++q;
}
for(j=0;j<5;j++)
{
printf(” %d “,*p);
++p;
}
}

A.2 2 2 2 2 2 3 4 6 5        B.2.8,3.4,4,6.7,5            C.Compiler error            D.None

Answer: A

Explanation:
Initially pointer c is assigned to both p and q. In the first loop, since only q is incremented and not c , the value 2 will be printed 5 times. In second loop p itself is incremented. So the values 2 3 4 6 5 will be printed

18.     main(int argc, char **argv)
{
printf(“enter the character”);
getchar();
sum(argv[1],argv[2]);
}
sum(num1,num2) int num1,num2;
{
return num1+num2;
}

A.2            B.3            C.Compile error            D.None

Answer: C

Explanation:
argv[1] & argv[2] are strings. They are passed to the function sum without converting it to integer values.

19.     #include
main()
{
char s[]={‘a’,’b’,’c’,’\n’,’c’,’\0′};
char *p,*str,*str1;
p=&s[3];
str=p;
str1=s;
printf(“%d”,++*p + ++*str1-32);
}

A.77            B.Compiler error        C.32            D.None

Answer: A

Explanation:
p is pointing to character ‘\n’. str1 is pointing to character ‘a’ ++*p. “p is pointing to ‘\n’ and that is incremented by one.” the ASCII value of ‘\n’ is 10, which is then incremented to 11. The value of ++*p is 11. ++*str1, str1 is pointing to ‘a’             that is incremented by 1 and it becomes ‘b’. ASCII value of ‘b’ is 98. Now performing (11 + 98 – 32), we get 77(“M”); So we get the output 77 :: “M” (Ascii is 77).

20.     #include
int main()
{
int j=1;
while(j <= 255)
{
printf(“%c %d\n”, j, j);
j++;
}
return 0;
}

A.Infinite times        B.255 times        C.256 times        D.254 times

Answer: B

Explanation:
The while(j <= 255) loop will get executed 255 times. The size short int(2 byte wide) does not affect the while() loop.

21. Which of the following data structure store the homogeneous data elements?

A.Arrays            B.Records        C.Pointers        D.None

Answer: B

22. If you need to duplicate the entire disk, which command will you use?

A.Copy            B.Diskcopy        C.Chkdsk            D.Format

Answer: B

Explanation:
Diskcopy is used to perform track-by-track copy of a disk into another. Copy command copies selected files; chkdsk and format commands are not for copying purpose

23. The SQL command to create a table is:

A.MAKE TABLE.        B.ALTER TABLE        C.DEFINE TABLE.        D.CREATE TABLE.

Answer: D

24. Which SQL trigger does SQL Server NOT support?

A.BEFORE        B.INSTEAD OF        C.AFTER            D.SQL Server supports all three

Answer: A

25. Pre-processors does not do which one of the following

A.macro            B.conditional compliclation        C.in type checking        D.including load file

Answer: C

26. How many buses are connected as part of the 8085 microprocessor?

A.2            B.3            C.5            D.8

Answer: B

27. In a CLIENT/SERVER environment , which of the following would not be done at the client ?

A.User interface part    B.Data validation at entry line    C.Responding to user events        D.None of the above

Answer: D

28. Which command will delete all data from a table and will not write to the rollback segment?

A.DROP            B.DELETE            C.CASCADE D        D.TRUNCATE

Answer: B

29. The system variable that records the select statement that SQL * FORMS most recently used to populate a block is

A.SYSTEM.LAST_RECORD        B.SYSTEM.CURSOR_RECORD        C.SYSTEM.CURSOR_FIELD        D.SYSTEM.LAST_QUERY

Answer: D

30. Which of the following is part of an administrative policy to secure a database?

A.Authentication policies    B.Limiting particular areas within a building to only authorized people    C.Ensure appropriate responses rates are in external maintenance agreements    D.All of the above.

Answer: D

, , ,

Post navigation

Leave a Reply