3i Infotech Placement: Sample Questions 1051 - 1053 of 1245

Glide to success with Doorsteptutor material for competitive exams : get questions, notes, tests, video lectures and more- for all subjects of your exam.

Question 1051

Edit

Describe in Detail

Essay▾
  1. #include<studio.h>
  2. #definea10
  3. main()
  4. {
  5.     #definea50
  6.     printf( “%d” a);
  7. }

Explanation

In a program

Table Shows the Program
#define a 10Define the preprocessor directives a value is 10
main ()

{

#define a 50

Here, define a value also 50.
printf ( “% d” a) ;Print a value is 50

Because, The preprocessor directives can be redefined anywhere in the program

So the most recently assigned value will be taken

Question 1052

Write in Short

Short Answer▾

Binary equivalent of

Explanation

  • Divide by
    • reminder
    • , remainder is
    • , remainder is
    • , remainder is
    • , remainder is
    • , remainder is
  • Read from bottom to top as
  • This is the binary equivalent of decimal number

Question 1053

Question

MCQ▾

A Stored Procedure is a

Choices

Choice (4)

a.

Can be called from all client environments

b.

Sequence of SQL or PL/SQL statements to perform specific function

c.

Stored in compiled form in the database

d.

All a., b. and c. are correct

Answer

d.

Explanation

Define Store Procedure
  • A procedure is a named PL/SQL block, which performs one or more specific task.
  • A procedure has a header and body
  • Consists of the name and the parameters passed to the procedure.
  • The body declaration section, execution section and exception section form general PL/SQL block.
  • Used as building blocks for several different applications.

Advantages of stored procedure:

  • Maintainability:
    • Because scripts are in one location, easy to update and track dependencies based on schema.
  • Testing:
    • Can be tested independent of the application.
  • Isolation of business rules:
    • Having Stored Procedures in one location.
  • Speed:
    • Store procedures are cached on the server.
  • Security:
    • Limit direct access to tables via defined roles in the database.
    • Separating data and the code that accesses.

Developed by: