Ch 6-Textbook+Extra Mcq
Ch 6-Textbook+Extra Mcq
Ch 6-Textbook+Extra Mcq
Textbook Exercise
(3) Which of the following is used to distinguish objects from each other?
(A) Attributes (B) State (C) Behavior (D) All of these
(4) Which of the following is used to define common features of similar objects?
(A) Class (B) Object (C) Methods (D) All of these
Page 1
(11) In class diagram, composition is represented using which of the following symbols?
(A) Empty diamond symbol (B) Filled diamond symbol
(C) Empty triangle symbol (D) All of these
(13) Which of the following is the part of object oriented class diagram?
(A) Data Encapsulation (B) Data Abstraction
(C) Polymorphism (D) All of these
(14) In Object oriented methodology, the focus is on which of the following entity?
(A) Data (B) Functions (C) Object (D) All of these
(16) What enables to represent and protect data in which the implementation details are
hidden?
(A) Data Encapsulation (B) Data Abstraction
(C) Both (A) and (B) (D) Polymorphism
(18) What can be used to create models of object oriented software to help with design of an
application?
(A) Unified Modelling Language (B) Unified Modelling Linux
(C) Unified Manufacturing Linux (D) Unified Manufacturing Language
(19) What object oriented program, attribute that describe the object are known?
(A) Behaviour (B) Method (C) Data field (D) State
(20) Which of the following programming language does not support object-oriented
programming?
(A) asp.net (B) Java (C) PHP (D) C
(21) The way of programming can be divided into how many categories?
(A) 2 (B) 3 (C) 4 (D) 5
(22) Which of the following is used to define common feature of similar objects?
(A) Class (B) Method (C) Object (D) Messaging
Page 2
(23) In Class diagram, a class is represented using which of the following?
(A) name (B) behaviour (C) attributes (D) All of these
(24) In UML, visibility can be represented using which of the following symbols?
(A) +, /, ~, * (B) –, #, +, _ (C) –, #, *, $ (D) _, #, +, –
(25) In Object oriented programming, which of the following property keeps the data safe
from unintended actions and inadvertent access by outside objects ?
(A) Messaging (B) Polymorphism (C) Encapsulation (D) Data abstraction
(26) In Object oriented programming, which of the following property enables to represent
data in which the implementation details are hidden ?
(A) Composition (B) Aggregation (C) Data abstraction (D) Messaging
(27) Which feature of object oriented programming allows defining more than one method
having same name but different signature in single class ?
(A) Messaging (B) Method overloading
(C) Aggregation (D) Encapsulation
(29) When objects of one class are composed of objects of other class is called what?
(A) Aggregation (B) Encapsulation (C) Inheritance (D) Polymorphism
(32) In Object oriented terminology, sub class or child class or derived class indicated what for
inheritance?
(A) Base class (B) Existing class (C) Super class (D) New class
(33) In class diagram, which of the following symbol is used to represent inheritance?
(A) Empty diamond symbol (B) Filled diamond symbol
(C) Arrow symbol (D) None of these
(34) In inheritance, which type of relationship exists between super class and sub class?
(A) a kind of (B) exclusive (C) is-like (D) non-exclusive
Page 3
(36) From the following what is best suited for Java?
(A) Procedural programming language (B) Query language
(C) Object oriented programming language (D) Structured oriented language
(37) From the following what is a template for multiple objects with similar features?
(A) Attribute (B) Behaviour (C) Class (D) Method
(40) In object oriented programming, data and methods that manipulate data are guarded
against modification or misuse by other components of program are known as what ?
(42) In object oriented terminology, existing class is also known as which class in inheritance?
(A) Super class (B) Parent class (C) Sub class (D) (A) or (B)
(45) A computer language is object oriented, if they support which of the following object
properties?
(A) Abstract, Extract, Concept, Inheritance
(B) Abstraction, Encapsulations, Polymorphism, Inheritance
(C) Abstraction, Extract, Polymorphism, Inheritance
(D) Abstraction, Capsulation, Polymorphism, Heritance
(46) Which of the following presents a collection of classes, constraints and relationship
among classes ?
(A) Object diagram (B) Group diagram
(C) Model diagram (D) Class diagram
Page 4
(47) In UML notation, visibility can be private, protected, public and package, where protected
is represented using which symbol ?
(A) + (B) – (C) # (D) ~
(48) Which of the following members of the class are not available directly to outside world?
(A) Public (B) Private (C) Protected (D) Package
(49) Which of the following is the mechanism of providing protection to data and methods of a
program?
(A) Abstraction (B) Messaging (C) Encapsulation (D) Polymorphism
(50) Which of the following is a concept that hides the complexity, it says what it does, but not
how it is done ?
(A) Abstraction (B) Messaging (C) Polymorphism (D) Encapsulation
(51) Which of the following feature of object oriented programming allows defining more than
one method having same name but different signature in a single class ?
(A) Method underloading (B) Method overloading
(C) Method uploading (D) Method downloading
(52) Which of the following represents non-exclusive relationship between two classes?
(A) Aggregation (B) Composition (C) Encapsulation (D) Messaging
(54) In Object oriented terminology new class is called sub class or child class or derived class,
whereas the existing class is called as what ?
(A) User class (B) Top class (C) Upper class (D) Super class
(55) Which of the following refers to the capability of defining a new class of objects that
inherits the characteristics of another existing class?
(A) Encapsulation (B) Inheritance (C) Messaging (D) Abstract
(57) Which of the following power of programming language who enables the programmer to
create modular, reusable and extendable code?
Page 5
Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.
Alternative Proxies: