SlideShare a Scribd company logo
Question C# for Exam Prepared By: Eng Kakada
Page 1
C# Programming :: Datatypes
1. Which of the following statements are correct about data types?
1. If the integer literal exceeds the range of byte, a compilation error will occur.
2. We cannot implicitly convert non-literal numeric types of larger storage size to byte.
3. Byte cannot be implicitly converted to float.
4. A char can be implicitly converted to only int data type.
5. We can cast the integral character codes.
A. 1, 3, 5
B. 2, 4
C. 3, 5
D. 1, 2, 5
2. Which of the following is an 8-byte Integer?
A. Char
B. Long
C. Short
D. Byte
E. Integer
3. Which of the following is NOT an Integer?
A. Char
B. Byte
C. Integer
D. Short
E. Long
4. Which of the following statements is correct?
A. Information is never lost during narrowing conversions.
Question C# for Exam Prepared By: Eng Kakada
Page 2
B. The CInteger() function can be used to convert a Single to an Integer.
C. Widening conversions take place automatically.
D. Assigning an Integer to an Object type is known as Unboxing.
E. 3.14 can be treated as Decimal by using it in the form 3.14F.
5. Which of the following are value types?
1. Integer
2. Array
3. Single
4. String
5. Long
A. 1, 2, 5
B. 1, 3, 5
C. 2, 4
D. 3, 5
6. Which of the following does not store a sign?
A. Short
B. Integer
C. Long
D. Byte
E. Single
7. What is the size of a Decimal?
A. 4 byte
B. 8 byte
C. 16 byte
D. 32 byte
8. What will be the output of the following code snippet when it is executed?
Question C# for Exam Prepared By: Eng Kakada
Page 3
int x = 1;
float y = 1.1f;
short z = 1;
Console.WriteLine((float) x + y * z - (x += (short) y));
A. 0.1 B. 1.0
C. 1.1 D. 11
9. Which of the following statements is correct about the C#.NET code snippet given below?
short s1 = 20;
short s2 = 400;
int a;
a = s1 * s2;
A. A value 8000 will be assigned to a.
B. A negative value will be assigned to a.
C.
During arithmetic if the result exceeds the high or low value of the range the value wraps around till the other
side of the range.
D. An error is reported as widening conversion cannot takes place.
E. An overflow error will be reported since the result of the multiplication exceeds the range of a Short Integer.
10. Which of the following is the correct size of a Decimal datatype?
A. 8 Bytes
B. 4 Bytes
C. 10 Bytes
D. 16 Bytes
E. None of the above.
11. Which of the following statements are correct?
1. We can assign values of any type to variables of type object.
2. When a variable of a value type is converted to object, it is said to be unboxed.
3. When a variable of type object is converted to a value type, it is said to be boxed.
4. Boolean variable cannot have a value of null.
5. When a value type is boxed, an entirely new object must be allocated and constructed.
A. 2, 5
Question C# for Exam Prepared By: Eng Kakada
Page 4
B. 1, 5
C. 3, 4
D. 2, 3
12. Which of the following is the correct ways to set a value 3.14 in a variable pi such that it cannot be modified?
A. float pi = 3.14F;
B. #define pi 3.14F;
C. const float pi = 3.14F;
D. const float pi; pi = 3.14F;
E. pi = 3.14F;
13. Which of the following statements are correct about data types?
1. Each value type has an implicit default constructor that initializes the default value of that type.
2. It is possible for a value type to contain the null value.
3. All value types are derived implicitly from System.ValueType class.
4. It is not essential that local variables in C# must be initialized before being used.
5. Variables of reference types referred to as objects and store references to the actual data.
A. 1, 3, 5
B. 2, 4
C. 3, 5
D. 2, 3, 4
14. Which of the following are the correct way to initialise the variables i and j to a value 10 each?
1. int i = 10; int j = 10;
2. int i, j;
3. i = 10 : j = 10;
4. int i = 10, j = 10;
5. int i, j = 10;
6. int i = j = 10;
A. 2, 4
B. 1, 3
Question C# for Exam Prepared By: Eng Kakada
Page 5
C. 3, 5
D. 4, 5
15. Which of the following statement correctly assigns a value 33 to a variable c?
byte a = 11, b = 22, c;
A. c = (byte) (a + b);
B. c = (byte) a + (byte) b;
C. c = (int) a + (int) b;
D. c = (int)(a + b);
E. c = a + b;
16. Which of the following statements are correct about datatypes in C#.NET?
1. Every datatype is either a value type or a reference type.
2. Value types are always created on the heap.
3. Reference types are always created on the stack.
4. Mapping of every value type to a type in Common Type System facilitates Interoperability in C#.NET.
5. Every reference type gets mapped to a type in Common Type System.
A. 1, 3
B. 2, 5
C. 1, 4
D. 3, 4
17. Which of the following is the correct default value of a Boolean type?
A. 0 B. 1
C. True D. False
E. -1

More Related Content

What's hot

Ppl home assignment_unit2
Ppl home assignment_unit2Ppl home assignment_unit2
Ppl home assignment_unit2
Akshay Nagpurkar
 
201505 CSE340 Lecture 04
201505 CSE340 Lecture 04201505 CSE340 Lecture 04
201505 CSE340 Lecture 04
Javier Gonzalez-Sanchez
 
C language
C languageC language
C language
Yasir Khan
 
201505 CSE340 Lecture 03
201505 CSE340 Lecture 03201505 CSE340 Lecture 03
201505 CSE340 Lecture 03
Javier Gonzalez-Sanchez
 
Project 2 the second project involves/tutorialoutlet
Project 2 the second project involves/tutorialoutletProject 2 the second project involves/tutorialoutlet
Project 2 the second project involves/tutorialoutlet
Messanz
 
C Interview Basic Q&A- 1
C Interview Basic Q&A- 1C Interview Basic Q&A- 1
C Interview Basic Q&A- 1
Jyoti Rawat
 
Complete c programming presentation
Complete c programming presentationComplete c programming presentation
Complete c programming presentation
nadim akber
 
Undefined behavior is closer than you think
Undefined behavior is closer than you thinkUndefined behavior is closer than you think
Undefined behavior is closer than you think
Andrey Karpov
 
Blueprints: Introduction to Python programming
Blueprints: Introduction to Python programmingBlueprints: Introduction to Python programming
Blueprints: Introduction to Python programming
Bhalaji Nagarajan
 
Pcd201516
Pcd201516Pcd201516
Pcd201516
sheikhmoidin
 
201505 - CSE340 Lecture 01
201505 - CSE340 Lecture 01201505 - CSE340 Lecture 01
201505 - CSE340 Lecture 01
Javier Gonzalez-Sanchez
 
Introduction to Python
Introduction to Python Introduction to Python
Introduction to Python
C. ASWINI
 
Digital Logic & Design
Digital Logic & DesignDigital Logic & Design
Digital Logic & Design
Shefa Idrees
 
E9
E9E9
E9
lksoo
 
C++11 and 64-bit Issues
C++11 and 64-bit IssuesC++11 and 64-bit Issues
C++11 and 64-bit Issues
Andrey Karpov
 
Network Security (75:25 Pattern) [QP / April - 2017]
Network Security (75:25 Pattern) [QP / April - 2017]Network Security (75:25 Pattern) [QP / April - 2017]
Network Security (75:25 Pattern) [QP / April - 2017]
Mumbai B.Sc.IT Study
 
1 arithmetic
1 arithmetic1 arithmetic
1 arithmetic
fyjordan9
 
(2) cpp imperative programming
(2) cpp imperative programming(2) cpp imperative programming
(2) cpp imperative programming
Nico Ludwig
 
Fy secondsemester2016
Fy secondsemester2016Fy secondsemester2016
Fy secondsemester2016
Ankit Dubey
 
Fy secondsemester2016
Fy secondsemester2016Fy secondsemester2016
Fy secondsemester2016
Ankit Dubey
 

What's hot (20)

Ppl home assignment_unit2
Ppl home assignment_unit2Ppl home assignment_unit2
Ppl home assignment_unit2
 
201505 CSE340 Lecture 04
201505 CSE340 Lecture 04201505 CSE340 Lecture 04
201505 CSE340 Lecture 04
 
C language
C languageC language
C language
 
201505 CSE340 Lecture 03
201505 CSE340 Lecture 03201505 CSE340 Lecture 03
201505 CSE340 Lecture 03
 
Project 2 the second project involves/tutorialoutlet
Project 2 the second project involves/tutorialoutletProject 2 the second project involves/tutorialoutlet
Project 2 the second project involves/tutorialoutlet
 
C Interview Basic Q&A- 1
C Interview Basic Q&A- 1C Interview Basic Q&A- 1
C Interview Basic Q&A- 1
 
Complete c programming presentation
Complete c programming presentationComplete c programming presentation
Complete c programming presentation
 
Undefined behavior is closer than you think
Undefined behavior is closer than you thinkUndefined behavior is closer than you think
Undefined behavior is closer than you think
 
Blueprints: Introduction to Python programming
Blueprints: Introduction to Python programmingBlueprints: Introduction to Python programming
Blueprints: Introduction to Python programming
 
Pcd201516
Pcd201516Pcd201516
Pcd201516
 
201505 - CSE340 Lecture 01
201505 - CSE340 Lecture 01201505 - CSE340 Lecture 01
201505 - CSE340 Lecture 01
 
Introduction to Python
Introduction to Python Introduction to Python
Introduction to Python
 
Digital Logic & Design
Digital Logic & DesignDigital Logic & Design
Digital Logic & Design
 
E9
E9E9
E9
 
C++11 and 64-bit Issues
C++11 and 64-bit IssuesC++11 and 64-bit Issues
C++11 and 64-bit Issues
 
Network Security (75:25 Pattern) [QP / April - 2017]
Network Security (75:25 Pattern) [QP / April - 2017]Network Security (75:25 Pattern) [QP / April - 2017]
Network Security (75:25 Pattern) [QP / April - 2017]
 
1 arithmetic
1 arithmetic1 arithmetic
1 arithmetic
 
(2) cpp imperative programming
(2) cpp imperative programming(2) cpp imperative programming
(2) cpp imperative programming
 
Fy secondsemester2016
Fy secondsemester2016Fy secondsemester2016
Fy secondsemester2016
 
Fy secondsemester2016
Fy secondsemester2016Fy secondsemester2016
Fy secondsemester2016
 

Similar to C# programming datatypes

Technical questions
Technical questionsTechnical questions
Technical questions
Kirthan S Holla
 
Redo midterm
Redo midtermRedo midterm
Redo midterm
IIUM
 
Java Quiz
Java QuizJava Quiz
Java Quiz
Dharmraj Sharma
 
LDCQ paper Dec21 with answer key_62cb2996afc60f6aedeb248c1d9283e5.pdf
LDCQ paper Dec21 with answer key_62cb2996afc60f6aedeb248c1d9283e5.pdfLDCQ paper Dec21 with answer key_62cb2996afc60f6aedeb248c1d9283e5.pdf
LDCQ paper Dec21 with answer key_62cb2996afc60f6aedeb248c1d9283e5.pdf
Vedant Gavhane
 
C and CPP Interview Questions
C and CPP Interview QuestionsC and CPP Interview Questions
C and CPP Interview Questions
Sagar Joshi
 
Computer programming mcqs
Computer programming mcqsComputer programming mcqs
Computer programming mcqs
saadkhan672
 
C# programming constructors
C# programming  constructorsC# programming  constructors
C# programming constructors
성진 원
 
CBSE 12 ip 2018 sample paper
CBSE 12 ip 2018 sample paperCBSE 12 ip 2018 sample paper
CBSE 12 ip 2018 sample paper
Knowledge Center Computer
 
C Programming
C ProgrammingC Programming
C Programming
amitymbaassignment
 
Java Questioner for
Java Questioner for Java Questioner for
Java Questioner for
Abhay Korat
 
Chap1 language fondamentale of java ( scjp /ocjp)
Chap1 language fondamentale of java ( scjp /ocjp)Chap1 language fondamentale of java ( scjp /ocjp)
Chap1 language fondamentale of java ( scjp /ocjp)
It Academy
 
Java Programming.pdf
Java Programming.pdfJava Programming.pdf
Java Programming.pdf
RavinderKSingla
 
Memory management of datatypes
Memory management of datatypesMemory management of datatypes
Memory management of datatypes
Monika Sanghani
 
Ques c++ minhnd
Ques c++   minhndQues c++   minhnd
Ques c++ minhnd
Congdat Le
 
Consider this code using the ArrayBag of Section 5.2 and the Locat.docx
Consider this code using the ArrayBag of Section 5.2 and the Locat.docxConsider this code using the ArrayBag of Section 5.2 and the Locat.docx
Consider this code using the ArrayBag of Section 5.2 and the Locat.docx
maxinesmith73660
 
C Sharp Nagina (1)
C Sharp Nagina (1)C Sharp Nagina (1)
C Sharp Nagina (1)
guest58c84c
 
C Sharp Jn (1)
C Sharp Jn (1)C Sharp Jn (1)
C Sharp Jn (1)
jahanullah
 
Technical aptitude Test 1 CSE
Technical aptitude Test 1 CSETechnical aptitude Test 1 CSE
Technical aptitude Test 1 CSE
Sujata Regoti
 
Java level 1 Quizzes
Java level 1 QuizzesJava level 1 Quizzes
Java level 1 Quizzes
Steven Luo
 
Vb.net
Vb.netVb.net

Similar to C# programming datatypes (20)

Technical questions
Technical questionsTechnical questions
Technical questions
 
Redo midterm
Redo midtermRedo midterm
Redo midterm
 
Java Quiz
Java QuizJava Quiz
Java Quiz
 
LDCQ paper Dec21 with answer key_62cb2996afc60f6aedeb248c1d9283e5.pdf
LDCQ paper Dec21 with answer key_62cb2996afc60f6aedeb248c1d9283e5.pdfLDCQ paper Dec21 with answer key_62cb2996afc60f6aedeb248c1d9283e5.pdf
LDCQ paper Dec21 with answer key_62cb2996afc60f6aedeb248c1d9283e5.pdf
 
C and CPP Interview Questions
C and CPP Interview QuestionsC and CPP Interview Questions
C and CPP Interview Questions
 
Computer programming mcqs
Computer programming mcqsComputer programming mcqs
Computer programming mcqs
 
C# programming constructors
C# programming  constructorsC# programming  constructors
C# programming constructors
 
CBSE 12 ip 2018 sample paper
CBSE 12 ip 2018 sample paperCBSE 12 ip 2018 sample paper
CBSE 12 ip 2018 sample paper
 
C Programming
C ProgrammingC Programming
C Programming
 
Java Questioner for
Java Questioner for Java Questioner for
Java Questioner for
 
Chap1 language fondamentale of java ( scjp /ocjp)
Chap1 language fondamentale of java ( scjp /ocjp)Chap1 language fondamentale of java ( scjp /ocjp)
Chap1 language fondamentale of java ( scjp /ocjp)
 
Java Programming.pdf
Java Programming.pdfJava Programming.pdf
Java Programming.pdf
 
Memory management of datatypes
Memory management of datatypesMemory management of datatypes
Memory management of datatypes
 
Ques c++ minhnd
Ques c++   minhndQues c++   minhnd
Ques c++ minhnd
 
Consider this code using the ArrayBag of Section 5.2 and the Locat.docx
Consider this code using the ArrayBag of Section 5.2 and the Locat.docxConsider this code using the ArrayBag of Section 5.2 and the Locat.docx
Consider this code using the ArrayBag of Section 5.2 and the Locat.docx
 
C Sharp Nagina (1)
C Sharp Nagina (1)C Sharp Nagina (1)
C Sharp Nagina (1)
 
C Sharp Jn (1)
C Sharp Jn (1)C Sharp Jn (1)
C Sharp Jn (1)
 
Technical aptitude Test 1 CSE
Technical aptitude Test 1 CSETechnical aptitude Test 1 CSE
Technical aptitude Test 1 CSE
 
Java level 1 Quizzes
Java level 1 QuizzesJava level 1 Quizzes
Java level 1 Quizzes
 
Vb.net
Vb.netVb.net
Vb.net
 

Recently uploaded

How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 

Recently uploaded (20)

How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 

C# programming datatypes

  • 1. Question C# for Exam Prepared By: Eng Kakada Page 1 C# Programming :: Datatypes 1. Which of the following statements are correct about data types? 1. If the integer literal exceeds the range of byte, a compilation error will occur. 2. We cannot implicitly convert non-literal numeric types of larger storage size to byte. 3. Byte cannot be implicitly converted to float. 4. A char can be implicitly converted to only int data type. 5. We can cast the integral character codes. A. 1, 3, 5 B. 2, 4 C. 3, 5 D. 1, 2, 5 2. Which of the following is an 8-byte Integer? A. Char B. Long C. Short D. Byte E. Integer 3. Which of the following is NOT an Integer? A. Char B. Byte C. Integer D. Short E. Long 4. Which of the following statements is correct? A. Information is never lost during narrowing conversions.
  • 2. Question C# for Exam Prepared By: Eng Kakada Page 2 B. The CInteger() function can be used to convert a Single to an Integer. C. Widening conversions take place automatically. D. Assigning an Integer to an Object type is known as Unboxing. E. 3.14 can be treated as Decimal by using it in the form 3.14F. 5. Which of the following are value types? 1. Integer 2. Array 3. Single 4. String 5. Long A. 1, 2, 5 B. 1, 3, 5 C. 2, 4 D. 3, 5 6. Which of the following does not store a sign? A. Short B. Integer C. Long D. Byte E. Single 7. What is the size of a Decimal? A. 4 byte B. 8 byte C. 16 byte D. 32 byte 8. What will be the output of the following code snippet when it is executed?
  • 3. Question C# for Exam Prepared By: Eng Kakada Page 3 int x = 1; float y = 1.1f; short z = 1; Console.WriteLine((float) x + y * z - (x += (short) y)); A. 0.1 B. 1.0 C. 1.1 D. 11 9. Which of the following statements is correct about the C#.NET code snippet given below? short s1 = 20; short s2 = 400; int a; a = s1 * s2; A. A value 8000 will be assigned to a. B. A negative value will be assigned to a. C. During arithmetic if the result exceeds the high or low value of the range the value wraps around till the other side of the range. D. An error is reported as widening conversion cannot takes place. E. An overflow error will be reported since the result of the multiplication exceeds the range of a Short Integer. 10. Which of the following is the correct size of a Decimal datatype? A. 8 Bytes B. 4 Bytes C. 10 Bytes D. 16 Bytes E. None of the above. 11. Which of the following statements are correct? 1. We can assign values of any type to variables of type object. 2. When a variable of a value type is converted to object, it is said to be unboxed. 3. When a variable of type object is converted to a value type, it is said to be boxed. 4. Boolean variable cannot have a value of null. 5. When a value type is boxed, an entirely new object must be allocated and constructed. A. 2, 5
  • 4. Question C# for Exam Prepared By: Eng Kakada Page 4 B. 1, 5 C. 3, 4 D. 2, 3 12. Which of the following is the correct ways to set a value 3.14 in a variable pi such that it cannot be modified? A. float pi = 3.14F; B. #define pi 3.14F; C. const float pi = 3.14F; D. const float pi; pi = 3.14F; E. pi = 3.14F; 13. Which of the following statements are correct about data types? 1. Each value type has an implicit default constructor that initializes the default value of that type. 2. It is possible for a value type to contain the null value. 3. All value types are derived implicitly from System.ValueType class. 4. It is not essential that local variables in C# must be initialized before being used. 5. Variables of reference types referred to as objects and store references to the actual data. A. 1, 3, 5 B. 2, 4 C. 3, 5 D. 2, 3, 4 14. Which of the following are the correct way to initialise the variables i and j to a value 10 each? 1. int i = 10; int j = 10; 2. int i, j; 3. i = 10 : j = 10; 4. int i = 10, j = 10; 5. int i, j = 10; 6. int i = j = 10; A. 2, 4 B. 1, 3
  • 5. Question C# for Exam Prepared By: Eng Kakada Page 5 C. 3, 5 D. 4, 5 15. Which of the following statement correctly assigns a value 33 to a variable c? byte a = 11, b = 22, c; A. c = (byte) (a + b); B. c = (byte) a + (byte) b; C. c = (int) a + (int) b; D. c = (int)(a + b); E. c = a + b; 16. Which of the following statements are correct about datatypes in C#.NET? 1. Every datatype is either a value type or a reference type. 2. Value types are always created on the heap. 3. Reference types are always created on the stack. 4. Mapping of every value type to a type in Common Type System facilitates Interoperability in C#.NET. 5. Every reference type gets mapped to a type in Common Type System. A. 1, 3 B. 2, 5 C. 1, 4 D. 3, 4 17. Which of the following is the correct default value of a Boolean type? A. 0 B. 1 C. True D. False E. -1