Oracle Placement Paper
Oracle Placement Paper
Oracle Placement Paper
A.Infinite times B.32767 times C.65535 times D.Till stack doesn't overflow
Answer: D
Explanation:
A call stack or function stack is used for several related purposes, but the main reason for having
one is to keep track of the point to which each active subroutine should return control when it
finishes executing. A stack overflow occurs when too much memory is used on the call stack. Here
function main() is called repeatedly and its return address is stored in the stack. After stack memory
is full. It shows stack overflow error.
A.malloc() and memalloc() B.alloc() and memalloc() C.malloc() and calloc() D.memalloc()
and faralloc()
Answer: C
3. You need to store elements in a collection that guarantees that no duplicates are stored. Which
two interfaces provide that capability?
Answer: A
Explanation:
Option A is correct. A Map cannot contain duplicate keys. Option B is wrong. Lists typically allow
duplicate elements. Option C is wrong. Collection allows duplicate elements.
4. Which three are methods of the Object class? 1. notify(); 2. notifyAll(); 3. isInterrupted(); 4.
synchronized(); 5. interrupt(); 6. wait(long msecs); 7. sleep(long msecs); 8. yield();
https://www.freshersnow.com/
Answer: C
Explanation:
(1), (2), and (6) are correct. They are all related to the list of threads waiting on the specified object.
(3), (5), (7), and (8) are incorrect answers. The methods isInterrupted() andinterrupt() are instance
methods of Thread. The methods sleep () and yield() are static methods of Thread. D is
incorrect because synchronized is a keyword and the synchronized()construct is part of the Java
language.
Answer: A
Explanation:
The Object class defines these thread-specific methods. Option B, C, and D are incorrect because
they do not define these methods. And yes, the Java API does define a class called Class, though
you do not need to know it for the exam
A.limits the column data that are returned. B.limits the row data are returned. C.Both A and
B are correct. D.Neither A nor B are correct.
Answer: B
A.use FROM to name the source table(s) and list the columns to be shown after SELECT.
B.use USING to name the source table(s) and list the columns to be shown after SELECT.
C.use SELECT to name the source table(s) and list the columns to be shown after USING.
D.use USING to name the source table(s) and list the columns to be shown after WHERE.
Answer: A
Answer: D
9. The memory address of fifth element of an array can be calculated by the formula
https://www.freshersnow.com/
A.LOC(Array[5]=Base(Array)+w(5-lower bound), where w is the number of words per memory cell for
the array
B.LOC(Array[5])=Base(Array[5])+(5-lower bound), where w is the number of words per memory cell
for the array
C.LOC(Array[5])=Base(Array[4])+(5-Upper bound), where w is the number of words per memory cell
for the array
D.None of above
Answer: A
Answer: D
Answer: D
12. What is difference between a DIALOG WINDOW and a DOCUMENT WINDOW regarding
moving the window with respect to the application window?
A.Both windows behave the same way as far as moving the window is concerned.
B.A document window can be moved outside the application window while a dialog window cannot
be moved
C.A dialog window can be moved outside the application window while a document window cannot
be moved
D.None
Answer: C
A.Dynamic Language Library B.Dynamic Link LibraryC.Dynamic Load Library D.None of the
above
Answer: B
https://www.freshersnow.com/
14. Which Oracle access method is the fastest way for Oracle to retrieve a single row?
A.Primary key access B.Access via unique index C.Table access by ROWID D.Full table
scan
Answer: A
A a = new A();
B b = new B();
a.s(b);
b = null; /* Line 5 */
a = null; /* Line 6 */
System.out.println("start completed"); /* Line 7 */
}
When is the B object, created in line 3, eligible for garbage collection
A.after line 5 B.after line 6 C.after line 7 D.There is no way to be absolutely certain.
Answer: D
Explanation:
Option D is correct. I think there are too many unknowns about the method s and the classes A and
B to be able to answer this question with any certainty.
Answer: A
Explanation:
Runtime error: Abnormal program termination. assert failed (i<5), NOTE asserts are used during
debugging to make sure that certain conditions are satisfied. If assertion fails, the program will
terminate reporting the same. After debugging use, #undef NDEBUG and this will disable all the
assertions from the source code. Assertion is a good debugging tool to make use of.
17. main()
https://www.freshersnow.com/
{
int c[ ]={2.8,3.4,4,6.7,5};
int j,*p=c,*q=c;
for(j=0;j<5;j++)
{
printf(" %d ",*c);
++q;
}
for(j=0;j<5;j++)
{
printf(" %d ",*p);
++p;
}
}
Answer: A
Explanation:
Initially pointer c is assigned to both p and q. In the first loop, since only q is incremented and not c ,
the value 2 will be printed 5 times. In second loop p itself is incremented. So the values 2 3 4 6 5 will
be printed
Answer: C
Explanation:
argv[1] & argv[2] are strings. They are passed to the function sum without converting it to integer
values.
19. #include
main()
https://www.freshersnow.com/
{
char s[]={'a','b','c','\n','c','\0'};
char *p,*str,*str1;
p=&s[3];
str=p;
str1=s;
printf("%d",++*p + ++*str1-32);
}
Answer: A
Explanation:
p is pointing to character '\n'. str1 is pointing to character 'a' ++*p. "p is pointing to '\n' and that is
incremented by one." the ASCII value of '\n' is 10, which is then incremented to 11. The value of
++*p is 11. ++*str1, str1 is pointing to 'a' that is incremented by 1 and it becomes 'b'. ASCII value of
'b' is 98. Now performing (11 + 98 - 32), we get 77("M"); So we get the output 77 :: "M" (Ascii is 77).
20. #include
int main()
{
int j=1;
while(j <= 255)
{
printf("%c %d\n", j, j);
j++;
}
return 0;
}
Answer: B
Explanation:
The while(j <= 255) loop will get executed 255 times. The size short int(2 byte wide) does not affect
the while() loop.
21. Which of the following data structure store the homogeneous data elements?
Answer: B
https://www.freshersnow.com/
22. If you need to duplicate the entire disk, which command will you use?
Answer: B
Explanation:
Diskcopy is used to perform track-by-track copy of a disk into another. Copy command copies
selected files; chkdsk and format commands are not for copying purpose
Answer: D
Answer: A
Answer: C
26. How many buses are connected as part of the 8085 microprocessor?
Answer: B
27. In a CLIENT/SERVER environment , which of the following would not be done at the client ?
A.User interface part B.Data validation at entry line C.Responding to user events D.None of the
above
Answer: D
28. Which command will delete all data from a table and will not write to the rollback segment?
https://www.freshersnow.com/
Answer: B
29. The system variable that records the select statement that SQL * FORMS most recently used to
populate a block is
Answer: D
A.Authentication policies B.Limiting particular areas within a building to only authorized people
C.Ensure appropriate responses rates are in external maintenance agreements D.All of the
above.
Answer: D
https://www.freshersnow.com/