Assertions are conditions which are true at the point of execution A Always B Sometimes C Many times D No time Answer A ____________________________________________________________________________ _______________ Top down approach is used for A Development B Identification of faults C Testing and validation D Reverse engineering Answer A ____________________________________________________________________________ _______________ The first item defined for a new system is its A Storage B Outputs C Inputs D Processing Answer B ____________________________________________________________________________ _______________ Software engineering primarily aims on A reliable software B cost effective software C reliable and cost effective software D none of the above Answer C ____________________________________________________________________________ _______________
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Assertions are conditions which are true at the point of executionA AlwaysB SometimesC Many timesD No time
Output comparators are used inA Static testing of single moduleB Dynamic testing of single moduleC Static testing of single and multiple moduleD Dynamic testing of single and multiple module
A key concept of quality control is that all work productsA Are delivered on time and under budgetB Have complete documentationC Have measurable specification for process outputsD Are thoroughly tested before delivery to the customer
What are the three generic phases of software engineering?A Definition, development, supportB What, how, whereC Programming, debugging, maintenanceD Analysis, design, testing
Software feasibility is based on which of the followingA Business and marketing concernsB Scope, constraints, marketC Technology, finance, time, resourcesD Technical prowess of the developers
Answer C
Which one of the items listed below is not one of the software engineering layers ?A ProcessB ManufacturingC MethodD Tools
FP-based estimation techniques require problem decomposition based onA Information domain valuesB Project scheduleC Software functionsD Process activities
Software deteriorates rather than wears out becauseA Software suffers from exposure to hostile environmentsB Defects are more likely to arise after software has been used oftenC Multiple change requests introduce errors in component interactionsD Software spare parts become harder to order
Function point metric of a software also depends on theA Number of function neededB Number of final users of the softwareC Number of external inputs and outputsD Time required for one set of output from a set of input data
Which of these is not a characteristic of Personal Software Process?A Emphasizes personal measurement of work productB Practitioner requires careful supervision by the project managerC Individual practitioner is responsible for estimating and schedulingD Practitioner is empowered to control quality of software work products
Recorded software attributes can be used in the following endeavours :(i) Cost and schedule estimates.(ii) Software product reliability predictions.(iii) Managing the development process.(iv) No whereA (i) (ii) (iv)B (ii) (iii) (iv)C (i) (ii) (iii)D (i) (ii) (iii) (iv)
If the objects focus on the problem domain, then we are concerned withA Object Oriented AnalysisB Object Oriented DesignC Object Oriented Analysis & DesignD None of the above
Applications-softwareA is used to control the operating systemB includes programs designed to help programmersC performs a specific task for computer usersD all of the above
Which of the following are advantages of using LOC (lines of code) as a size oriented metric?A LOC is easily computedB LOC is a language dependent measureC LOC is a language independent measureD LOC can be computed before a design is completed
FAST stands forA Functional Application Specification TechniqueB Fast Application Specification TechniqueC Facilitated Application Specification TechniqueD None of the above
Which of the following statements is trueA Abstract data types are the same as classesB Abstract data types do not allow inheritanceC Classes cannot inherit from the same base classD Object have state and behavior
The main activity of the design phase of the system life cycle is toA Replace the old system with new oneB Develop and test the new systemC Understand the current systemD Propose alternatives to the current system
Answer D
In the light of software engineering software consists ofA In the light of software engineering software consists ofB DataC DocumentationD All of the above
The incremental model of software development isA A reasonable approach when requirements are well definedB A good approach when a working core product is required quicklyC The best approach to use for projects with large development teamsD A revolutionary model that is not used for commercial products
Which leads to blocking states in which some project team members must wait for the other members of the team to complete dependent tasks?A Ad hoc approach of prototypingB Iterative nature of spiral modelC Linear nature of classic life cycleD None of the above
Evolutionary software process modelsA Are iterative in natureB Can easily accommodate product requirements changesC Do not generally produce throw away systemsD All of the above
The model in which the requirements are implemented by category isA Evolutionary Development ModelB Waterfall ModelC PrototypingD Iterative Enhancement Model
For a data entry project for office staff who have never used computers before (user interface and user-friendliness are extremely important), one will useA Spiral modelB Component based modelC PrototypingD Waterfall model
A major defect in waterfall model in software development is thatA The documentation is difficultB A blunder at ant stage can be disastrousC A trial version is available at the end of the projectD The maintenance of the software is difficult
A COCOMO model isA Common Cost Estimation ModelB Constructive Cost Estimation ModelC Complete Cost Estimation ModelD Comprehensive Cost Estimation Model
Process models are described as agile because theyA Eliminate the need for cumbersome documentationB Emphasize maneuverability and adaptabilityC Do not waste development time on planning activitiesD Make extensive use of prototype creation
The formal methods model of software development makes use of mathematical methods toA Define the specification for computer based systemsB Develop defect free computer based systemsC Verify the correctness of computer based systemsD All of the above
Answer D
In the spiral model ‘risk analysis’ is performedA In the first loopB In the first and second loopC In every loopD Before using spiral model
The prototyping model of software development isA A reasonable approach when requirements are well definedB A useful approach when a customer cannot define requirements clearlyC The best approach to use for projects with large development teamsD A risky model that rarely produces a meaningful product
The model that assumes that effort and development time are functions of product size alone isA Basic COCOMO modelB Intermediate COCOMO modelC Detailed COCOMO modelD All the three COCOMO models
The component based development model isA Only appropriate for computer hardware designB Not able to support the development of reusable componentsC Works best when object technologies are available for supportD Not cost effective by known quantifiable software metrics
The COCOMO model was introduced in the book title “Software Engineering Economics” authored byA Abraham SilberschatzB Barry BoehmC C.J. DateD D.E. Knuth
The spiral model of software developmentA Ends with the delivery of the software productB Is more chaotic than the incremental modelC Includes project risks evaluation during each iterationD All of the above
The concurrent development model isA Another name for the rapid application development modelB Often used for the development of client/server applicationsC Only used for development of parallel or distributed systemsD Used whenever a large number of change requests are anticipated
Modifying the software to match changes in the ever changing environment is calledA Adaptive maintenanceB Corrective maintenanceC Perfective maintenanceD Preventive maintenance
The Warnier diagram enables analystA to represent information hierarchy in a compact mannerB to further identify requirementC to estimate the total cost involvedD None of the above
During which phase ,the requirement analysis is performed?A System investigation phaseB System development phaseC System analysis phaseD None of the above
The system specification is the first deliverable in the computer system engineering process which does not includeA The system specification is the first deliverable in the computer system engineering process which does not
Structured charts are a product ofA Requirements gatheringB Requirements analysisC DesignD Coding
Answer C
If every requirement stated in the Software Requirement Specification (SRS) has only one interpretation, SRS is said to beA CorrectB UnambiguousC ConsistentD Verifiable
Which design model is analogous to the detailed drawings of the access points and external utilities for a house?A Architectural designB Component-level designC Data designD Interface design
Which of the following models can be used to represent the architectural design of a piece of software?A Dynamic modelsB Functional modelsC Structural modelsD All of these
In a function oriented design, weA minimize cohesion and maximize couplingB maximize cohesion and minimize couplingC maximize cohesion and maximize couplingD minimize cohesion and minimize coupling
Design phase will usually beA Top downB Bottom upC RandomD Centre fringing
Answer A
Which of the following is not a characteristics common to all design methods?A Configuration managementB Functional componentC Notation quality assessmentD Guidelines refinement heuristics
In object oriented design of software , objects haveA Attributes and names onlyB Operations and names onlyC Attributes, name and operationsD None of above
The approach to software testing is to design test cases toA Break the softwareB Understand the softwareC Analyze the design of sub processes in the softwareD Analyze the output of the software
White box testing, a software testing technique is sometimes calledA Basic pathB Graph TestingC DataflowD Glass box testing
Answer D
While unit testing a module, it is found that for a set of test data, maximum 90% of the code alone were tested with a probability of success 0.9. The reliability of the module isA Atleast greater than 0.9B Equal to 0.9C Atmost 0.81D Atleast 1/0.81
Which of the following graph theoretic concept will be useful in software testing?A Cyclomatic numberB Hamiltonian circuitC Eulerian cycleD None of the above
A non functional software testing done to check if the user interface is easy to use and understandA Usability testingB Security testingC Unit testingD Black box testing
Which of the following testing methods is normally used as the acceptance test for a software system?A Regression testingB Integration testingC Unit testingD Functional testing
Answer D
AAre easier to develop than single programming systemsB
Execute each job faster
C Execute more jobs in the same time periodD Are used only one large mainframe computers
The primary purpose of an operating system isA To make the most efficient use of the computer hardwareB To allow people to use the computerC To keep systems programmers employedD To make computers easier to use
Overlay isA A part of Operating SystemB A specific memory locationC A single contiguous memory that was used in the olden days for running large programs by swappingD Overloading the system with many user files
Link encryptionA Is more secure than end to end encryptionB Is less secure than end to end encryptionC Cannot be used in a large networkD Is used only detect errors
An operating systemA Is not required on large computersB Is always supplied with the computerC Is always supplied with the BASICD Consists of programs that help in the operation of computer
Remote Computing Service involves the use of time sharing and _______.A multi-processingB interactive processingC batch processingD real-time processing
Which of the following is an example of a spooled device?A The terminal used to enter the input data for a program being executed.B The secondary memory device in a virtual memory system.C A line printer used to print the output of a number of jobs.D None of the above.
A bootstrap isA A memory deviceB A device to support the computerC A small initialisation program to start up a computerD An error correction technique
Memory on your computer where data is stored temporarily is called __________.A RAMB ROMC BIOSD CPU
Answer A
______ is used in operating system to separate mechanism from policyA Single level implementationB Two level implementationC Multi level implementationD None
Object modules generated by assembler that contains unresolved external references are resolved for two or more object module by a/anA Operating systemB LoaderC LinkerD Compiler
The multiuser operating system, 20 requests are made to use a particular resource per hour, on an average the probability that no request are made in 45 minutes isA e-15
Dirty bit is used to showA Page with corrupted dataB Wrong page in the memoryC Page that is modified after being loaded into cache memoryD Page that is less frequently accessed
A page fault means that we referenced a pageA Outside the memory boundariesB With an incorrect I/O requestC That was not in secondary storageD That was not in main memory
Protection against computer virusesA PreventionB Practice of safe computingC Purchasing unopened software from vendorsD Avoiding free or pirated copies from public sources
A relationship between processes such that each has some part (critical section) which must not be executed while the critical section of another is being executed, is known asA SemaphoreB Mutual exclusionC MultiprogrammingD Message passing
Which of the following information bits used by the various page replacement policies indicates if the page has been called lately?A Locality bitB Status bitC Referenced bitD Modified bit
Given memory partitions of 100K, 500K, 200K, 300K and 600K (in order) and processes of 212K, 417K, 112K, and 426K (in order), using the first-fit algorithm in which partition would the process requiring 426K be placed?A 100KB 500KC 200KD 600K
In time sharing operating system ,when the time slot given to a process is completed ,the process goes from running state to theA Blocked stateB Ready stateC Suspended stateD Terminated state
Situations where two or more processes are reading or writing some shared datas and the final result depends on who runs precisely when are calledA Race conditionsB Critical sectionsC Mutual exclusionsD Message passing
Switching the CPU to another Process requires to save state of the old process and loading new process state is called asA Process BlockingB Context SwitchC Time SharingD None of the above
A page faultA is an error specific page.B is an access to the page not currently in memory.C occur when a page program occur in a page memory.D page used in the previous page reference.
Cooperating processes canA Only share a logical address space directly that is, both code and dataB Access concurrently to shared data may result in data consistencyC Either directly share a logical address space or be allowed to share data only through
files or messagesD None of these responses are correct
In the blocked stateA The processes waiting for I/O are foundB The process which is running is foundC The processes waiting for the processor are foundD None of the above
Several processes access and manipulate the same data concurrently and the outcome of the execution depends on the particular order in which the access takes place, is called a(n) ____________________ .A Shared memory segmentsB Race conditionC Entry sectionD Process synchronization
A threadA Is a lightweight process where the context switching is lowB Is a lightweight process where the context switching is highC Is used to speed up pagingD None of the above
Pre-emptive scheduling is the strategy of temporarily suspending a gunning processA before the CPU time slice expiresB to allow starving processes to runC when it requests I/OD to avoid collision
Cascading termination refers to termination of all child processes before the parent terminatesA NormallyB AbnormallyC Normally or abnormallyD None of these
A special software that is used to create a job queue is calledA DriveB SpoolerC InterpreterD Linkage editor
Answer B
Assume N segments in memory and a page size of P bytes. The wastage on account of internal fragmentation isA NP/2 bytesB P/2 bytesC N/2 bytesD NP bytes
In Round Robin cpu scheduling as the time quantum is increased ,the average turn around timeA IncreasesB DecreasesC Remains constantD Varies irregularly
Consider the following transactions with data items P and Q initialized to zero:T1 :read (P);read (Q);if P = 0 then Q := Q + 1 ;write (Q).T2 : read (Q);read (P);if Q = 0 then P := P + 1 ;write (P).Any non-serial interleaving of T1 and T2 for concurrent execution leads toA a serializable scheduleB a schedule that is not conflict serializableC a conflict serializable scheduleD a schedule for which a precedence graph cannot be drawn
Mutual exclusion problem occurs betweenA Two disjoint processes that do not interactB Processes that share resourcesC Processes that don not use the same rssourcesD None of these
Consider a logical address space of 8 pages of 1024 words mapped with memory of 32 frames. How many bits are there in the physical address ?A 9 bitsB 11 bitsC 14 bitsD 15 bits
Peterson’s solution to the critical-section problemA Only satisfies mutual exclusion and progress requirementsB Is a hardware synchronization using locksC Is a software-based solutionD All of the above
Consider the following page trace : 4,3, 2, 1, 4, 3, 5, 4, 3, 2, 1, 5. Percentage of page fault that would occur if FIFO page replacement algorithm is used with number of frames for the JOB m=4 will beA 8B 9C 10D 12
A system has 3 processes sharing 4 resources.If each process needs a maximum of 2 units ,thenA Deadlock can never occurB Deadlock may occurC Deadlock has to occurD None of these
Consider the methods used by processes P1 and P2 for accessing their critical sections. The initial values of shared Boolean variables S1 and S2 are randomly assigned,P1 P2while (S1 = = S2); while (S1 = = S2);critical section critical sectionS1 = S2; S1 = S2;Which one of the following statements describes the properties achieved ?A Mutual exclusion but not progressB Progress but not mutual exclusionC Neither mutual exclusion nor progressD Both mutual exclusion and progress
The scheduling in which CPU is allocated to the process with least CPU-burst time is calledA Priority SchedulingB Shortest job first SchedulingC Round Robin SchedulingD Multilevel Queue Scheduling
The simplest way to break a deadlock is toA Preempt a resourceB RollbackC Kill one of the processesD Lock one of the processes
Answer C
A scheduler which selects processes from secondary storage device is calledA Short term schedulerB Long term schedulerC Medium term schedulerD Process scheduler
Which of the following statement is wrong ?I. 2-phase locking protocol suffer from dead lock.II. Time stamp protocol suffer from more aborts.III. A block hole in a DFD is a data store with only inbound flows.IV. Multivalued dependency among attribute is checked at 3 NF level.V. An entity-relationship diagram is a tool to represent event model.A I, II, IIB II, III, IVC III, IV, VD II, IV, V
The completion order of the 3 processes under the policies FCFS and RR2 (round robin scheduling with CPU quantum of 2 time units) areA FCFS: P1, P2, P3 RR2: P1, P2, P3B FCFS: P1, P3, P2 RR2: P1, P3, P2C FCFS: P1, P2, P3 RR2: P1, P3, P2D FCFS: P1, P3, P2 RR2: P1, P2, P3
A solution to the critical section problem must satisfy which requirements?A Bounded waiting, monitor and relative speedB Semaphores, monitor and prevention of deadlockC Signal, wait and continueD Mutual exclusion, progress and bounded waiting
_____________ is one preemptive scheduling algorithm.A Shortest job firstB Round robinC Priority basedD Shortest job next
Answer A
It is not possible to have a deadlock involving only a single process. Why?A This holds mutual exclusion, hold-and-wait and non-preemptionB This follows directly from the hold-and-wait conditionC Because single process not always in safe stateD None of the above
Which of the following approaches do not require knowledge of the system state?A Deadlock detectionB Deadlock preventionC Deadlock avoidanceD None of the above
Three concurrent processes X, Y, and Z execute three different code segments that access and update certain shared variables. Process X executes the P operation (i.e., wait) on semaphores a, b and c; process Y executes the P operation on semaphores b, c and d; process Z executes the P operation on semaphores c, d, and a before entering the respective code segments. After completing the execution of its code segment, each process invokes the V operation (i.e., signal) on its three semaphores. All semaphores are binary semaphores initialized to one. Which one of the following represents a deadlock- free order of invoking the P operations by the processes?A X : P (a ) P (b) P (c ) Y : P (b ) P (c) P (d) Z : P (c ) P (d) P (a)B X : P (b ) P (a) P (c ) Y : P (b ) P (c) P (d) Z : P (a ) P (c ) P (d)C X : P (b ) P (a) P (c ) Y : P (c ) P (b) P (d) Z : P (a ) P (c ) P (d)D X : P (a ) P (b) P (c ) Y : P (c ) P (b) P (d) Z : P (c ) P (d) P (a)
The register or main memory location which contains the effective address of the operand is known asA pointerB special locationC indexed registerD None of the above
A file system with 300 GByte disk uses a file descriptor with 8 direct block addresses, 1 indirect block address and 1 doubly indirect block address. The size of each disk block is 128 Bytes and the size of each disk block address is 8 Bytes. The maximum possible file size in this file system isA 3 KBytesB 35 KBytesC 280 KBytesD dependent on the size of the disk
Which of the following scheduling policy is well suited for time shared operating system?A Shortest job firstB Round robinC First com first serveD Elevator
The maximum amount of information that is available in one portion of the disk access arm for a removal disk pack (without further movement of the arm with multiple heads)A A plate of dataB A cylinder of dataC A track of dataD A block of data
Memory management isA Not used in modern operating systemB Replaced with virtual memory on current systemsC Not used on multiprogramming systemsD Critical for even the simplest operating systems
Answer D
The purpose of a Memory Management Unit is to ___________ .A Perform run-time mapping from virtual to physical addressesB Ensure protection of the memory space allocated to every processC Both A and B are correct responsesD None of these responses is correct
In virtual memory systems, Dynamic address translationA Is the hardware necessary to implement pagingB Stores pages at a specific location on diskC Is useless when swapping is usedD Is part of the operating system paging algorithm
Assertion(A): Bit maps are not often used in memory management.Reason(R): Searching a bitmap for a run of given length is a slow operation.A Both (A) and (R) are true and (R) is correct explanation for (A)B Both(A) and (R) are true but (R) is not correct explanation for (A)C (A) is true (R) is falseD (A) is false (R) is true
Suppose it takes 100 ns to access a page table and 20 ns to access associative memory with a 90% hit rate, the average access time equals:A 20 nsB 28 nsC 90 nsD 100 ns
Fragmentation of the file systemA Occurs only if file system is used improperlyB Can always be preventedC Can be temporarily removed by compactionD Is the characteristic of all the file systems
Answer C
The size of the virtual memory depends on the size of theA Data busB Main memoryC Address busD None of the above
Variable partition memory management technique with compaction results inA Reduction of fragmentationB Minimal wastageC Segment sharingD None of the above
Paging is a memory management scheme that ___________________.A Permits the logical address space of a process to be noncontiguousB Avoids external fragmentation and the need for compactionC Solves the considerable problem of fitting memory chunks of fixed sizes onto the backing storeD All of the above
A static partitioned memory management system has a total of six partitions. If one is allocated to the operating system, this will allow a total ofA Five user jobsB Six user jobsC Thirty-two user jobsD Thirty-six user jobs
Consider the virtual page reference string1, 2, 3, 2, 4, 1, 3, 2, 4, 1on a demand paged virtual memory system running on a computer system that has main memory size of 3 page frames which are initially empty. Let LRU, FIFO and OPTIMAL denote the number of page faults under the corresponding page replacement policy. ThenA OPTIMAL < LRU < FIFOB OPTIMAL < FIFO < LRUC OPTIMAL = LRUD OPTIMAL = FIFO
On a disk with 1000 cylinders (0 to 999) find the number of tracks, the disk arm must move to satisfy all the requests in the disk queue. Assume the last request service was at track 345 and the head is moving toward track 0. The queue in FIFO order contains requests for the following tracks :123, 874, 692, 475, 105, 376(Assume SCAN algorithm)A 2013B 1219C 1967D 1507
Memory utilization factor shall be computed as followsA Memory in use/allocated memoryB Memory in use/total memory connectedC Memory allocated/total memory availableD Memory committed/total memory available
A tree structured file directory systemA Allows easy storage and retrieval of file namesB Is a much debated unnecessary featureC Is not essential when we have millions of filesD None of the above
Which of the following types of terminals is entirely dependent for all its capabilities on the computer system to which it is connected?A Smart terminalB Dumb terminalC Micro computerD None of these
File record lengthA Should always be fixedB Should always be variableC Depends upon the size of the fileD Should be chosen to match the data characteristics
When used with I\O devices the term intelligent impliesA A color output capabilityB Speech processing capabilityC High speed printing capabilityD Features to support off line and online tasks
Optical storage is aA high-speed direct access storage device.B low-speed direct access storage device.C medium-speed direct access storage device.D high-speed sequential access storage device.
Which of the following is the process by which a user’s access to physical data in the application is limited, based on his privileges ?A AuthorizationB AuthenticationC Access ControlD All of these
Which of the following topologies consists of multiple CPUs connected by a single communication line running the length of the network?A TreeB RingC StarD Bus
A public key encryption systemA Allows only the correct receiver to decode the data.B Allows only one to decode the transmission.C Allows only the correct sender to decode the data.D Does not encode the data before transmitting it.
In HTML URI is used toA Create a frame documentB Create a image map in the webpageC Customize the image in the webpageD Identify a name or a resource on the internet
What is the use of web font in HTML?A That is the core font that is used to develop web pagesB That enables to use fonts over the web without installationC That is the special font that is developed by Microsoft corporationD All of the above
HTML is defined using SGML – an _______ standard, information processing-text and office systems (SGML) for text information processing.A ISO – 8878B ISO – 8879C ISO – 8880D ISO – 8881
Which of the following statement is true?A An XML document can have one root element.B An XML document can have one child element.C XML elements have to be in lower case.D All of the above.
Node in XML isA Any part of the document whether it is elements ,attributes or otherwiseB Referred only to the attributesC Referred to the top element in the documentD None of these
Answer A
Well formed XML document meansA It contains a root elementB It contain an elementC It contains one or more elementsD Must contain one or more elements and root element must contain all other elements
There is a way of describing XML data,how?A XML uses a DTD to describe the data.B XML uses XSL to describe data.C XML uses a description node to describe dataD Both A and C.
Which of the following statement is true?A All the statements are true.B All XML elements must have closing tag.C All XML elements must be lower case.D All XML documents must have a DTD.
What is XML?A Subset of SGML,Extensible Markup LanguageB Superset of SGML,Extensible Markup LanguageC Like SGML ,Extended Markup LanguageD None of these
CIDR stands forA Classified Internet Domain RoutingB Classless Inter Domain RoutingC Classless Internet Domain RoutingD Classified Inter Domain Routing
The term byte stuf fing refers toA Data stuffing used wi th character oriented hardwareB Data stuffing used wi th bi t oriented hardwareC Data stuffing used with both A and BD Data stuffing used wi th byte oriented hardware
Answer A
What are empty elements and is it valid?A No there is no such terms as empty elementB Empty elements are element with no dataC No it is not valid to use empty elementD None of these
Characteristic encoding isA Method used to represent numbers in a characterB Method used to represent character in a numberC Not a methodD None of these
The web standard allows programmers on many different computer platforms to dispersed format and display the information server.These programs are calledA Web browsersB HTMLC Internet ExplorerD None of these
Which type of web document is run at the client siteA Static___________________________________________________________________________________________
Hardware that calculates CRC usesA Shift registerB Xor unitC Both A and BD Instruction register
Address 192.5.48.3 belongs toA Class AB Class BC Class CD Class D
Answer C
What does the URL need to access documents ?I. Path nameII. Host nameIII. DNSIV. Retrieval methodV. Server port numberA I, II, IIIB I, III, VC I, II, IVD III, IV, V
Unl ike Ipv4, Ipv6 does not include the following field in the base headerA Next Header fieldB Field for Fragmentation informationC Flow LabelD Kind field
FDDI (Fiber Distributed Data Interconnect) is an example ofA Token ringB Token busC Star topologyD Multipoint network
Answer A
Which of the following statement best explains a process?A It is a program.B It is a program in execution.C It is an instance of a program in execution.D It is a program that uses system calls.
Choose the incorrect statementA Shell scripts can accept argumentsB Shell scripts are interpretedC Shell is a programming languageD Shell scripts are compiled
Choose the correct statement.A Kernel is non preemptive.B Interrupts are blocked when critical section of a code is being executed.C No process can put another process to sleep.D None of the above.
The tail command in UNIXA Can be used to look at the tail or bottom of the fileB Can be used to display the list of last 10 files in the current directoryC Can be used to display the list of last 15 in the current directoryD None of the above
Which of the following changes permission to deny write permission to group and others?A Chmod go-w filexB Chmod go w filexC Chmod go=w fileD None of the above
The tar command in UNIXA Used to create compressed archives of directories and filesB Used to extract directories and files from an archivesC Both A and BD None of the above
The advantage of binary files over text files is thatA It is compactB It can be accessed fasterC Many commands assume the named file to be a binary fileD They are more reliable
Profilers areA Tools that analyze the run time behavior of a programB Tools that check C code for cross file consistencyC Tools that keep track of evolving versions of a fileD None of the above
Shell functionsA Are another name for shell proceduresB Execute faster than shell proceduresC Are executed by a new shellD Are not executed by new shell
Answer D
The members of a class by default areA PublicB ProtectedC PrivateD Mandatory to specify
Which of the following statements is NOT valid about operator overloading?A Only existing operators can be overloadedB Overloaded operator must have at least one operand of its class typeC The overloaded operators follow the syntax rules of the original operatorD None of the above
cfrontA is the front end of a C compilerB is the per-process of a C compilerC is a tool that is translated a C++ code to its equivalent C codeD None of above
Answer C
A class defined within another class isA Nested classB InheritanceC ContainershipD Encapsulation
Which of the following is false for cin?A It represents standard inputB It is an object of istream class.C It is a class of which stream is an objectD Using cin the data can be read from user’s terminal
Member functions, when defined within the class specificationA Are always inlineB Are not inlineC Are inline by default, unless they are too big or too complicatedD Are not inline by default.
Access to private dataA Restricted to methods of the same classB Restricted to methods of other classesC Available to methods of the same class and other classesD Not an issue because the program will not compile
Use of virtual functions impliesA OverloadingB OverridingC Static bindingD Dynamic binding
Answer D
Which of the statements is true in a protected derivation of a derived class from a base class?A Private members of the base class become protected members of the derived classB Protected members of the base class become public members of the derived classC Public members of the base class become protected members of the derived classD Protected derivation does not affect private and protected members of the derived class
The keyword friend does not appear inA The class allowing access to another classB The class desiring access to another classC The private section of a classD The public section of a class
Data members which are staticA Cannot be assigned a valueB Can only be used in static functionsC Cannot be defined in a UnionD Can be accessed outside the class
If you wanted to sort many large objects or structures, it would be most efficient toA Place them in an array and sort the array.B Place pointers to them in an array and sort the array.C Place them in a linked list and sort the linked list.D Place references to them in an array and sort the array.Answer C___________________________________________________________________________________________Match the following :(a) Garbage collection in 1. Java(b) Nameless object 2. generic programming(c) Template support 3. defines a class(d) A forward reference 4. member function(e) Derived class inherits
In which case is it mandatory to provide a destructor in a class?A Almost in every classB Class for which two or more than two objects will be createdC Class for which copy constructor is definedD Class whose objects will be created dynamically
A pointer to the base class can hold address ofA Only base class objectB Only derived class objectC Base class object as well as derived class objectD None of the above
When a child class function is called,the compiler looks first for a matching function name in theA Class of the object using the function nameB Immediate ancestor classC Base classD Descendant class
Maximum number of template arguments in a function template isA OneB TwoC ThreeD Many
Answer D
from base classA 1 5 4 2 3B 1 5 2 3 4C 5 1 2 3 4D 5 4 3 1 2Answer B___________________________________________________________________________________________A struct is the same as a class except thatA There are no member functionsB All members are publicC Cannot be used in inheritance hierarchyD It does have a this pointerAnswer C___________________________________________________________________________________________Which of the following is not the characteristic of constructor?A They should be declared in the public section.B They do not have return type.C They can not be inherited.D They can be virtual.Answer D___________________________________________________________________________________________The friend functions are used in situations where:A We want to have access to unrelated classesB Dynamic binding is requiredC Exchange of data between classes to take placeD None of the aboveAnswer D___________________________________________________________________________________________A template classA Is designed to be stored in different containersB Works with different data typesC Generates objects which must be identicalD Generates classes with different numbers of member functionsAnswer B___________________________________________________________________________________________Pure virtual functionsA Have to be redefined in the inherited classB Cannot have public access specificationC Are mandatory for a virtual classD None of the aboveAnswer A___________________________________________________________________________________________Overloading a postfix increment operator by means of a member function takesA No argumentB One argumentC Two argumentsD Three argumentsAnswer A___________________________________________________________________________________________A class which can use all the features of an established class,isA A static classB A super classC A subclassD Overloaded
Answer C___________________________________________________________________________________________A friend function to a class, C cannot accessA Private data members and member functionsB Public data members and member functionsC Protected data members and member functionsD The data members of the derived class of CAnswer D
In access control in a protected derivation, visibility modes will change as followsA Private, public and protected become protectedB Only public becomes protectedC Public and protected become protectedD Only private becomes protectedAnswer C___________________________________________________________________________________________Which of the following cannot be legitimately passed to a functionA A constantB A variableC A structureD A header fileAnswer D___________________________________________________________________________________________When the compiler cannot differentiate between two overloaded constructors, they are calledA OverloadedB DestructedC AmbiguousD DubiousAnswer C___________________________________________________________________________________________If a base class destructor is not virtual, thenA It can not have a function bodyB It can not be calledC It can not be called when accessed from pointerD Destructor in derived class can not be called when accessed through a pointer to the base classAnswer D___________________________________________________________________________________________A function call mechanism that passes arguments to a function by passing a copy of the values of the arguments is __________A Call by nameB Call by valueC Call by referenceD Call by value resultAnswer B___________________________________________________________________________________________A variable defined within a block is visibleA From the point of definition onward in the programB From the point of definition onward in the functionC From the point of definition onward in the blockD Throughout the functionAnswer C___________________________________________________________________________________________RunTime polymorphism is achieved by ___________A Friend function
B Virtual functionC Operator overloadingD Function overloadingAnswer B___________________________________________________________________________________________This pointerA Implicitly points to an objectB Can be explicitly used in a classC Can be used to return an objectD All of the aboveAnswer D___________________________________________________________________________________________A __________ is a special method used to initialize the instance variable of a class.A Member functionB DestructorC ConstructorD StructureAnswer C___________________________________________________________________________________________Additional information sent when an exception is thrown may be placed inA The throw keywordB The function that caused the errorC The catch blockD An object of the exception classAnswer C
Mechanism of deriving a class from another derived class is known as____A PolymorphismB Single InheritanceC Multilevel InheritanceD Message PassingAnswer C___________________________________________________________________________________________Mechanism of deriving a class from another derived class is known asA PolymorphismB Single inheritanceC Multilevel inheritanceD Message passingAnswer C___________________________________________________________________________________________The concept of hierarchical classification is related toA AbstractionB InheritanceC Function overloadingD NoneAnswer B___________________________________________________________________________________________The process of extracting the relevant attributes of an object is known asA PolymorphismB InheritenceC Abstraction
D Data hidingAnswer B___________________________________________________________________________________________If a class C is derived from class B, which is derived from class A, all through public inheritance, then a class C member function can accessA Protected and public data only in C and BB Protected and public data only in CC Private data in A and BD Protected data in A and BAnswer D___________________________________________________________________________________________The process of building new classes from existing one is called ______.A PolymorphismB StructureC InheritanceD CascadingAnswer C___________________________________________________________________________________________This type of inheritance is a mixture of multiple inheritance and hierarchical inheritanceA Single inheritanceB Multiple inheritanceC Hierarchical inheritanceD Hybrid inheritanceAnswer D___________________________________________________________________________________________The base class access specification determines how ___________ members in the base class may be accessed by derived classes.A PrivateB PublicC ProtectedD A,Band CAnswer D___________________________________________________________________________________________A base class may also be called aA Child classB SubclassC Derived classD Parent classAnswer D___________________________________________________________________________________________In multiple inheritanceA The base classes must have only default constructorsB Cannot have virtual functionsC Can include virtual classesD None of the aboveAnswer C
Which of the statements are true ?I. Function overloading is done at compile time.II. Protected members are accessible to the member of derived class.III. A derived class inherits constructors and destructors.IV. A friend function can be called like a normal function.V. Nested class is a derived class.A I, II, III
B II, III, VC III, IV, VD I, II, IVAnswer D____________________________________________________________________________________________________ members of a base class are never accessible to a derived class.A PublicB PrivateC ProtectedD A,B and CAnswer B___________________________________________________________________________________________Assume that we have constructor functions for both base class and derived class. Now consider the declaration in main( ). Base * P = New Derived; in what sequence will the constructor be called ?A Derived class constructor followed by Base class constructor.B Base class constructor followed by derived class constructor.C Base class constructor will not be called.D Base class constructor will not be called.Answer B___________________________________________________________________________________________When a sub class is inherited from only one super class .It is known asA Single inheritanceB Multiple inheritanceC Hierarchical inheritanceD Multilevel inheritanceAnswer A___________________________________________________________________________________________In multiple inheritanceA The base classes must have only default constructorsB Cannot have virtual functionsC Cannot have virtual classesD None of the aboveAnswer C___________________________________________________________________________________________The polymorphism can be characterized by the phraseA One interface,multiple methodsB Multiple interfaces,one methodC One interface,one methodD None of the aboveAnswer A___________________________________________________________________________________________The mechanism that binds code and data together and keeps them secure from outside world is known asA AbstractionB InheritanceC EncapsulationD PolymorphismAnswer C___________________________________________________________________________________________The term __________ means the ability to take many forms.A InheritanceB PolymorphismC Member functionD EncapsulationAnswer B
___________________________________________________________________________________________Runtime polymorphism is achieved byA Friend functionB Virtual functionC Operator overloadingD Function overloadingAnswer B___________________________________________________________________________________________RunTime Polymorphism is achieved by ______A Friend functionB Virtual functionC Operator overloadingD Function overloadingAnswer B
Usually a pure virtual functionA Has complete function bodyB Will never be calledC Will be called only to delete an objectD Is defined only in derived class
Consider the following statementschar *ptr;ptr = “hello”;cout << *ptr;What will be printed?A first letterB entire stringC it is a syntax errorD last letter
What will be the output of the following program?#include<iostream.h>void main(){float x=5,y=2;int result;result=x % y;cout<<result;}A 1B 1.0C Error messageD 2.5
If the variable count exceeds 100, a single statement that prints “Too many” isA if (count<100) cout << “Too many”;B if (count>100) cout >> “Too many”;C if (count>100) cout << “Too many”;D None of these.
Which of the following will produce a value 10 if x = 9.7?A floor(x)B abs(x)C log(x)D ceil(x)Answer D___________________________________________________________________________________________The address of a variable temp of type float isA *tempB &tempC float& tempD float temp&Answer B___________________________________________________________________________________________What will be the values of x, m and n after the execution of the following statements?int x, m, n;m = 10;n = 15;x = ++m + n++;A x=25, m=10, n=15B x=26, m=11, n=16C x=27, m=11, n=16D x=27, m=10, n=15Answer B___________________________________________________________________________________________for (; ;)A means the test which is done using some expression is always trueB is not validC will loop foreverD should be written as for( )Answer C___________________________________________________________________________________________Consider the following statements:int x = 22,y=15;x = (x>y) ? (x+y) : (x-y);What will be the value of x after executing these statements?A 22B 37C 7D 5
What is the following code segment doing?void fn( ){char c;cin.get(c);if (c != ‘\n’) {fn( );cout.put(c);}}A The string entered is printed as it is.B The string entered is printed as it is.C It will go in an infinite loop.D It will print an empty line.
Answer B
Answer B___________________________________________________________________________________________If an array is declared as int a[4] = {3, 0, 1, 2}, then values assigned to a[0] & a[4] will be ________A 3, 2B 0, 2C 3, 0D 0, 4Answer C___________________________________________________________________________________________To access the public function fbase() in the base class, a statement in a derived class function fder() uses the statement.fbase();A fbase();B fder();C base::fbase();D der::fder();Answer A___________________________________________________________________________________________If x =5, y =2 then x ^y equals________.(where ^ is a bitwise XOR operator)A 00000111B 10000010C 10100000D 11001000Answer A___________________________________________________________________________________________ What will be the output of following program?#include<iostream.h>void main(){float x;x=(float)9/2;cout<<x;}A 4.5B 4.0C 4D 5Answer A___________________________________________________________________________________________The operator << when overloaded in a classA must be a member functionB must be a non member functionC can be both (A) & (B) aboveD cannot be overloadedAnswer C
Which of the following is the valid class declaration header for the derived class d with base classes b1 and b2?A class d : public b1, public b2B class d : class b1, class b2C class d : public b1, b2D class d : b1, b2
What is the error in the following code?class t{virtual void print();}A No errorB Function print() should be declared as static.C Function print() should be defined.D Class t should contain data members.
What is the output of the following codechar symbol[3]={‘a’,‘b’,‘c’};for (int index=0; index<3; index++)cout << symbol [index];A a b cB “abc”C abcD ‘abc’