1) Which model depicts the profile of the end users of a computer system. (Software Engineering)
a. Spiral model
b. Iterative model
c. Waterfall model
d. User model
Answer
Explanation
|
ANSWER: User model
Explanation: The User modelling is a subdivision of human–computer interaction and it describes the process of building up and modifying a user model. The main goal of user modelling is customization and adaptation of systems to the user's specific needs
|
|
2) How many types of Prototype models are there? (Software Engineering)
a. 2
b. 3
c. 5
d. 4
Answer
Explanation
|
ANSWER: 4
Explanation: A prototype is a working model of a software for limited functionality. The type of prototype models are : Throwaway/Rapid Prototyping, Evolutionary Prototyping, Incremental Prototyping, Extreme Prototyping
|
|
3) Software Engineering : Software risk impact assessment should focus on consequences affecting, 1) Performance 2) Support 3) Cost 4) Schedule
a. Yes
b. No
Answer
Explanation
|
ANSWER: Yes
Explanation: The risk assessment consists of objective evaluation of risk in which the assumptions and the uncertainties are considered and present.
|
|
4) Which one of the following is not an SQA activity? (Software Engineering)
a. Black box testing
b. White box testing
c. Integration testing
d. Unit testing
Answer
Explanation
|
ANSWER: White box testing
Explanation: White box testing is a testing method for a software where it tests internal structures or workings of an application, as opposed to its functionality (i.e. black-box testing).
|
|
5) Fanin in an OO context indicates. (Software Engineering)
a. Objects
b. Inheritance
c. Messages
d. Polymorphism
Answer
Explanation
|
ANSWER: Inheritance
Explanation: Inheritance is where an object or class is based on another class or object using the same implementation to maintain the same behavior.
|
|
6) Software Maturity Index is computed with the following formula: [MT (FA+FC+FD)]/MT. (Software Engineering)
a. True
b. False
Answer
Explanation
|
ANSWER: True
Explanation: MT = number of modules in current version FA = number of added modules in current version FC = number of changed modules in current version FD = number of deleted modules in current version compared to the previous version
|
|
7) Networking : The octal equivalence of 111010 is
a. 81
b. 72
c. 71
d. None of above
Answer
Explanation
|
ANSWER: 72
Explanation: Group 111010 into two groups as 111 and 010 then convert each group into octal like 111=7 and 010=2. Hence, the octal equivalence of 111010 will be 72.
|
|
8) Which of the following registers is used to keep track of address of the memory location where the next instruction is located? (Networking)
a. Memory address register
b. Memory data register
c. Instruction register
d. Program counter
Answer
Explanation
|
ANSWER: Program counter
Explanation: The program counter is a register in a processor which contains the address of the instruction which is being executed at the current time. As soon as the instruction is fetched the instruction the counter increases by 1.
|
|
9) How many address lines are needed to address each memory location in a 2048 x 4 memory chip? (Networking)
a. 10
b. 11
c. 8
d. 12
Answer
Explanation
|
ANSWER: 11
Explanation: It means that a memory of 2048 words, where each word is 4 bits. So to address 2048 (or 2K, where K means 2^10 or 1024), you need 11 bits, so 11 address lines.
|
|
10) Which computer memory is used for storing programs and data currently being processed by the CPU? (Networking)
a. Mass memory
b. Internal memory
c. Non-volatile memory
d. PROM
Answer
Explanation
|
ANSWER: Internal memory
Explanation: The internal memory generally refers to chips rather than disk or tapes. It resides in the ROM and once the power is off the memory is erased.
|
|
11) Which one of the following statement is true for a layer-4 firewall which is a device that can look at all protocol headers up to the transport layer? (Networking)
a. It cannot block TCP traffic from a specific user on a multiple-user system during 9.00pm and 5.00pm
b. It cannot stop incoming traffic from a specific IP address but allow outgoing traffic to the same IP address.
c. It cannot block entire HTTP traffic during 9.00 pm and 5.00pm
d. It cannot block all ICMP traffic.
Answer
Explanation
|
ANSWER: It cannot block entire HTTP traffic during 9.00 pm and 5.00pm
Explanation: The layer 4 firewall is a device that can look at all the protocol headers upto the transport layer and not the headers above that layer.
|
|
12) Encryption is done at A and decryption is done at B. A adds a digital signature s to message S using public key cryptography, encrypts. (Networking)
a. Encryption: A’s private key followed by B’s public key; Decryption: B’s private key followed by A’s public key.
b. Encryption: A’s public key followed by B’s private key; Decryption: B’s public key followed by A’s private key.
c. Encryption: A’s private key followed by B’s private key; Decryption: A’s public key followed by B’s private key.
d. Encryption: A’s private key followed by B’s private key; Decryption: A’s public key followed by B’s public key.
Answer
Explanation
|
ANSWER: Encryption: A’s private key followed by B’s public key; Decryption: B’s private key followed by A’s public key.
Explanation: Encryption is where plain text is converted into something which is random and meaningless(ciphertext) for the purpose of data security. Decryption is where the ciphertext is converted into plain text or readable format.
|
|
13) C programming: Which header file should be included to use functions like malloc() and calloc()?
a. memory.h
b. stdlib.h
c. string.h
d. dos.h
Answer
Explanation
|
ANSWER: stdlib.h
Explanation: This header file defines four variable type,several macros and various functions for general function.
|
|
14) C programming: What function should be used to free the memory allocated by calloc() ?
a. dealloc();
b. malloc(variable_name, 0)
c. free();
d. memalloc(variable_name, 0)
Answer
Explanation
|
ANSWER: free();
Explanation: The free() function deallocates the memory which was previously allocated by the call to alloc, malloc or calloc
|
|
15) What is the purpose of fflush() function? (C programming)
a. flushes all streams and specified streams.
b. flushes only specified stream.
c. flushes input/output buffer.
d. flushes file buffer.
Answer
Explanation
|
ANSWER: flushes all streams and specified streams.
Explanation: The fflush() function is used in the program which flushes the output buffer of a stream.
|
|
16) What would be the output of the following program? (C programming)
#include”stdio.h” main() { int a, b=5; a=b+NULL; printf(“%d”, a); }
a. 6
b. 5
c. 5 5
d. None
Answer
Explanation
|
ANSWER: 5
Explanation: The value for b=5 a=b+null (null value is always 0) a=5+0 a=5 Hence, the output is 5.
|
|
17) Can we declare a function that can return a pointer to a function of the same type? (C programming)
a. Yes
b. No, we cannot do it directly
Answer
Explanation
|
ANSWER: No, we cannot do it directly
Explanation: We would need to declare typedef for it and typedef will do the job or then return void*.
|
|
18) How can one convert numbers to strings? (C programming)
a. Using atoi()
b. Using printf()
c. Using sprint()
d. Using nsprintf()
Answer
Explanation
|
ANSWER: Using sprint()
Explanation: The sprint() writes the data into the array.
|
|
19) Databases: The view of total database content is _____
a. Conceptual view.
b. Internal view.
c. External view
d. Physical View.
Answer
Explanation
|
ANSWER: Conceptual view.
Explanation: The conceptual view is where it describes what data are actually stored in the database. It contains information about the entire database in terms of small and simple structures.
|
|
20) What are the important criteria for designing tables? (Datebases)
a. Meaningful grouping of attribute
b. No redundancy
c. No inapplicable attribute
d. All the above
Answer
Explanation
|
ANSWER: All the above
Explanation: The tables designed in a database are very important. If the above criteria are not fulfilled we would say that the table design is bad.
|
|
21) Which of the following database object does not physically exist? (Database)
a. Base table
b. Index
c. View
d. None of the above
Answer
Explanation
|
ANSWER: View
Explanation: A view is a result set of a stored query on the data in which the database users can query just as they would in a database collection
|
|
22) A transparent DBMS? (Database)
a. Can not hide sensitive information from users
b. Keep its logical structure hidden from users
c. Keeps its physical structure hidden from users
d. Both B and C
Answer
Explanation
|
ANSWER: Keeps its physical structure hidden from users
Explanation: A DBMS which keeps its physical structure hidden from the user is known as a transparent DBMS
|
|
23) A trigger is ?
a. A statement that enables to start any DBMS
b. A statement that is executed by the user when debugging an application program
c. A condition the system tests for the validity of the database user
d. A statement that is executed automatically by the system as a side effect of modification to the database
Answer
Explanation
|
ANSWER: A statement that is executed automatically by the system as a side effect of modification to the database
Explanation: A database trigger is what is executed automatically in response to certain events on a particular table or view in a database. It is mostly used to maintain the integrity of the database.
|
|
24) An unnormalized relation contains values ?
a. Atomic
b. Non - Atomic
c. Classified
d. None of these
Answer
Explanation
|
ANSWER: Classified
Explanation: No explanation is available for this question!
|
|
25) Primitive operations common to all record management system include ? (Database)
a. Print
b. Sort
c. Look up
d. All of above
Answer
Explanation
|
ANSWER: Look up
Explanation: The Database lookup allows you to look up for the values in a database table. The lookup values are added as new fields onto the stream.
|
|