sw engg MCQ

121
Assertions are conditions which are true at the point of execution A Always B Sometimes C Many times D No time Answer A ____________________________________________________________________________ _______________ Top down approach is used for A Development B Identification of faults C Testing and validation D Reverse engineering Answer A ____________________________________________________________________________ _______________ The first item defined for a new system is its A Storage B Outputs C Inputs D Processing Answer B ____________________________________________________________________________ _______________ Software engineering primarily aims on A reliable software B cost effective software C reliable and cost effective software D none of the above Answer C ____________________________________________________________________________ _______________

description

MCQ questions

Transcript of sw engg MCQ

Assertions are conditions which are true at the point of executionA AlwaysB SometimesC Many timesD No time

Answer A___________________________________________________________________________________________

Top down approach is used forA DevelopmentB Identification of faultsC Testing and validationD Reverse engineering

Answer A___________________________________________________________________________________________

The first item defined for a new system is itsA StorageB OutputsC InputsD Processing

Answer B___________________________________________________________________________________________

Software engineering primarily aims onA reliable softwareB cost effective softwareC reliable and cost effective softwareD none of the above

Answer C___________________________________________________________________________________________

Output comparators are used inA Static testing of single moduleB Dynamic testing of single moduleC Static testing of single and multiple moduleD Dynamic testing of single and multiple module

Answer D___________________________________________________________________________________________

The feature of the object oriented paradigm which helps code reuse isA ObjectB ClassC InheritanceD Aggregation

Answer C___________________________________________________________________________________________

A key concept of quality control is that all work productsA Are delivered on time and under budgetB Have complete documentationC Have measurable specification for process outputsD Are thoroughly tested before delivery to the customer

Answer C___________________________________________________________________________________________

What are the three generic phases of software engineering?A Definition, development, supportB What, how, whereC Programming, debugging, maintenanceD Analysis, design, testing

Answer A___________________________________________________________________________________________

Coupling and cohesion can be represented using aA Cause-effect graphB Dependence matrixC Structure chartD SRS

Answer B___________________________________________________________________________________________

Software feasibility is based on which of the followingA Business and marketing concernsB Scope, constraints, marketC Technology, finance, time, resourcesD Technical prowess of the developers

Answer C

Which one of the items listed below is not one of the software engineering layers ?A ProcessB ManufacturingC MethodD Tools

Answer B___________________________________________________________________________________________

FP-based estimation techniques require problem decomposition based onA Information domain valuesB Project scheduleC Software functionsD Process activities

Answer C___________________________________________________________________________________________

Software deteriorates rather than wears out becauseA Software suffers from exposure to hostile environmentsB Defects are more likely to arise after software has been used oftenC Multiple change requests introduce errors in component interactionsD Software spare parts become harder to order

Answer B___________________________________________________________________________________________

The worst type of coupling isA Data couplingB Control couplingC Stamp couplingD Content coupling

Answer D___________________________________________________________________________________________

Function point metric of a software also depends on theA Number of function neededB Number of final users of the softwareC Number of external inputs and outputsD Time required for one set of output from a set of input data

Answer C___________________________________________________________________________________________

Which of the following is not an attribute of software engineeringA EfficiencyB ScalabilityC DependabilityD Usability

Answer C___________________________________________________________________________________________

Which of these is not a characteristic of Personal Software Process?A Emphasizes personal measurement of work productB Practitioner requires careful supervision by the project managerC Individual practitioner is responsible for estimating and schedulingD Practitioner is empowered to control quality of software work products

Answer B___________________________________________________________________________________________

Recorded software attributes can be used in the following endeavours :(i) Cost and schedule estimates.(ii) Software product reliability predictions.(iii) Managing the development process.(iv) No whereA (i) (ii) (iv)B (ii) (iii) (iv)C (i) (ii) (iii)D (i) (ii) (iii) (iv)

Answer C___________________________________________________________________________________________

A feasibility study should focus onA Technical feasibilityB Economic feasibilityC Operational feasibiltyD All of these

Answer D___________________________________________________________________________________________

Which is not a size metric?A LOCB Function countC Program lengthD Cyclomatic complexity

Answer D

The level at which the software uses scarce resources isA ReliabilityB EfficiencyC PortabilityD All of the above

Answer B___________________________________________________________________________________________

If the objects focus on the problem domain, then we are concerned withA Object Oriented AnalysisB Object Oriented DesignC Object Oriented Analysis & DesignD None of the above

Answer A___________________________________________________________________________________________

Which one of the following ISO standard is used for software process?A ISO 9000B ISO 9001C ISO 9003D ISO 9000-3

Answer D___________________________________________________________________________________________

Software Engineering is a discipline that integrates _________ for the development of computer software.A ProcessB MethodsC ToolsD All

Answer D___________________________________________________________________________________________

What is the first stage in program development ?A Specification and designB System AnalysisC TestingD None of the above

Answer B___________________________________________________________________________________________

Pseudocode can replaceA FlowchartsB Structure chartsC Decision tablesD Cause-effect graphs

Answer A___________________________________________________________________________________________

Modules X and Y operate on the same input and output data, then the cohesion isA SequentialB CommunicationalC ProceduralD Logical

Answer B___________________________________________________________________________________________

Main aim of software engineering is to produceA ProgramB SoftwareC Within budgetD Software within budget in the given schedule

Answer D___________________________________________________________________________________________

IEEE 830-1993 is a IEEE recommended standard forA Software requirement specificationB Software designC TestingD Both (A) and (B)

Answer A___________________________________________________________________________________________

CASE Tool isA Computer Aided Software EngineeringB Component Aided Software EngineeringC Constructive Aided Software EngineeringD Computer Analysis Software Engineering

Answer A

Key process areas of CMM level 4 are also classified by a process which isA CMM level 2B CMM level 3C CMM level 5D All of the above

Answer C___________________________________________________________________________________________

Applications-softwareA is used to control the operating systemB includes programs designed to help programmersC performs a specific task for computer usersD all of the above

Answer C___________________________________________________________________________________________

User interface design involves following issuesA Error message handlingB System response timeC Command labellingD All of these

Answer D___________________________________________________________________________________________

Which of the items listed below is not one of the software engineering layers?A ProcessB ToolsC MethodsD Manufacturing

Answer D___________________________________________________________________________________________

Which of the following are advantages of using LOC (lines of code) as a size oriented metric?A LOC is easily computedB LOC is a language dependent measureC LOC is a language independent measureD LOC can be computed before a design is completed

Answer A___________________________________________________________________________________________

FAST stands forA Functional Application Specification TechniqueB Fast Application Specification TechniqueC Facilitated Application Specification TechniqueD None of the above

Answer C___________________________________________________________________________________________

An object encapsulatesA DataB BehaviourC StateD Both Data and behaviour

Answer D___________________________________________________________________________________________

Which of the following statements is trueA Abstract data types are the same as classesB Abstract data types do not allow inheritanceC Classes cannot inherit from the same base classD Object have state and behavior

Answer B___________________________________________________________________________________________

The ISO quality assurance standard that applies to software engineering isA ISO 9000B ISO 9001C ISO 9002D ISO 9003

Answer B___________________________________________________________________________________________

The main activity of the design phase of the system life cycle is toA Replace the old system with new oneB Develop and test the new systemC Understand the current systemD Propose alternatives to the current system

Answer D

In the light of software engineering software consists ofA In the light of software engineering software consists ofB DataC DocumentationD All of the above

Answer D___________________________________________________________________________________________

The desired level of coupling isA No couplingB Control couplingC Common couplingD Data coupling

Answer D___________________________________________________________________________________________

The problem that threatens the success of a project but which has not yet happened is aA BugB ErrorC RiskD Failure

Answer C___________________________________________________________________________________________

The tools that support different stages of software development life cycle are calledA CASE toolsB CAME toolsC CAQE toolsD CARE tools

Answer A___________________________________________________________________________________________

The incremental model of software development isA A reasonable approach when requirements are well definedB A good approach when a working core product is required quicklyC The best approach to use for projects with large development teamsD A revolutionary model that is not used for commercial products

Answer B___________________________________________________________________________________________

Waterfall model is aA Linear modelB Iterative modelC Rapid modelD Interactive model

Answer A___________________________________________________________________________________________

Which leads to blocking states in which some project team members must wait for the other members of the team to complete dependent tasks?A Ad hoc approach of prototypingB Iterative nature of spiral modelC Linear nature of classic life cycleD None of the above

Answer C___________________________________________________________________________________________

Many causes of the software crisis can be traced to mythology based onA Management MythsB Customer MythsC Practitioner MythsD All of the above

Answer D___________________________________________________________________________________________

Prototyping is used toA test the software as an end productB expand design detailsC refine and establish requirements gatheringD None of the above

Answer C___________________________________________________________________________________________

The most important feature of spiral model isA Requirement analysisB Risk managementC Quality managementD Configuration management

Answer B

Which phase is not available in software life cycle?A CodingB TestingC MaintenanceD Abstraction

Answer D___________________________________________________________________________________________

Which model is popular for students small projects ?A Waterfall ModelB Spiral ModelC Quick and Fix modelD Prototyping Model

Answer A___________________________________________________________________________________________

Which is the most important feature of spiral model?A Quality managementB Risk managementC Performance managementD Efficiency management

Answer B___________________________________________________________________________________________

Evolutionary software process modelsA Are iterative in natureB Can easily accommodate product requirements changesC Do not generally produce throw away systemsD All of the above

Answer D___________________________________________________________________________________________

Waterfall model is also calledA Classical Life Cycle modelB Customer modelC RADD Spiral model

Answer A___________________________________________________________________________________________

To which phase of SDLC, in file conversion related?A System designB System developmentC System analysisD System implementation

Answer D___________________________________________________________________________________________

The model in which the requirements are implemented by category isA Evolutionary Development ModelB Waterfall ModelC PrototypingD Iterative Enhancement Model

Answer A___________________________________________________________________________________________

For a data entry project for office staff who have never used computers before (user interface and user-friendliness are extremely important), one will useA Spiral modelB Component based modelC PrototypingD Waterfall model

Answer C___________________________________________________________________________________________

What is an incremental software process model that emphasize an extremely short development cycle?A RADB PrototypingC SpiralD None of these

Answer A___________________________________________________________________________________________

Which of these terms is a level name in the Capability Maturity Model?A Ad hocB RepeatableC ReusableD Organized

Answer C

For a well understood data processing application it is best to useA The waterfall modelB Prototyping modelC The evolutionary modelD The spiral model

Answer A___________________________________________________________________________________________

A major defect in waterfall model in software development is thatA The documentation is difficultB A blunder at ant stage can be disastrousC A trial version is available at the end of the projectD The maintenance of the software is difficult

Answer C___________________________________________________________________________________________

A COCOMO model isA Common Cost Estimation ModelB Constructive Cost Estimation ModelC Complete Cost Estimation ModelD Comprehensive Cost Estimation Model

Answer B___________________________________________________________________________________________

The model remains operative until the software is retiredA WaterfallB IncrementalC SpiralD None of these

Answer C___________________________________________________________________________________________

Spiral model begins withA DesignB Risk analysisC CodingD Customer communication

Answer D___________________________________________________________________________________________

Which model is simplest model in Software Development ?A Waterfall modelB PrototypingC IterativeD None of these

Answer A___________________________________________________________________________________________

Prototyping is preferred byA CustomerB DeveloperC No oneD Both

Answer B___________________________________________________________________________________________

Process models are described as agile because theyA Eliminate the need for cumbersome documentationB Emphasize maneuverability and adaptabilityC Do not waste development time on planning activitiesD Make extensive use of prototype creation

Answer B___________________________________________________________________________________________

Waterfall model is not suitable for ?A Small ProjectsB Complex ProjectsC Accommodating changeD None of Above

Answer C___________________________________________________________________________________________

The formal methods model of software development makes use of mathematical methods toA Define the specification for computer based systemsB Develop defect free computer based systemsC Verify the correctness of computer based systemsD All of the above

Answer D

In the spiral model ‘risk analysis’ is performedA In the first loopB In the first and second loopC In every loopD Before using spiral model

Answer C___________________________________________________________________________________________

An SRSA establishes the basis for agreement between client and the

supplier.B  provides a reference for validation of the final productC is a prerequisite to high quality softwareD all of the above.

Answer D___________________________________________________________________________________________

The prototyping model of software development isA A reasonable approach when requirements are well definedB A useful approach when a customer cannot define requirements clearlyC The best approach to use for projects with large development teamsD A risky model that rarely produces a meaningful product

Answer B___________________________________________________________________________________________

The model that assumes that effort and development time are functions of product size alone isA Basic COCOMO modelB Intermediate COCOMO modelC Detailed COCOMO modelD All the three COCOMO models

Answer A___________________________________________________________________________________________

The component based development model isA Only appropriate for computer hardware designB Not able to support the development of reusable componentsC Works best when object technologies are available for supportD Not cost effective by known quantifiable software metrics

Answer C___________________________________________________________________________________________

The COCOMO model was introduced in the book title “Software Engineering Economics” authored byA Abraham SilberschatzB Barry BoehmC C.J. DateD D.E. Knuth

Answer B___________________________________________________________________________________________

The spiral model of software developmentA Ends with the delivery of the software productB Is more chaotic than the incremental modelC Includes project risks evaluation during each iterationD All of the above

Answer C___________________________________________________________________________________________

Prototyping model begin withA Test prototypeB CodingC Requirement gatheringD None of the above

Answer B___________________________________________________________________________________________

The concurrent development model isA Another name for the rapid application development modelB Often used for the development of client/server applicationsC Only used for development of parallel or distributed systemsD Used whenever a large number of change requests are anticipated

Answer B___________________________________________________________________________________________

LOC measure is aA Size oriented metricsB Function oriented metricsC Both a and bD None of the above

Answer A

Which of these are the 5 generic software engineering framework activities ?A Communication, planning, modelling, construction, deploymentB Communication, risk management, measurement, production, reviewingC Analysis, designing, programming, Debugging, maintenanceD Analysis, planning, designing, programming, testing

Answer A___________________________________________________________________________________________

Modifying the software to match changes in the ever changing environment is calledA Adaptive maintenanceB Corrective maintenanceC Perfective maintenanceD Preventive maintenance

Answer A___________________________________________________________________________________________

Which is not a step of requirement engineering?A Requirements elicitationB Requirements analysisC Requirements designD Requirements documentation

Answer C___________________________________________________________________________________________

The Warnier diagram enables analystA to represent information hierarchy in a compact mannerB to further identify requirementC to estimate the total cost involvedD None of the above

Answer A___________________________________________________________________________________________

Requirements can be refined usingA The waterfall modelB Prototyping modelC The evolutionary modelD The spiral model

Answer B___________________________________________________________________________________________

During which phase ,the requirement analysis is performed?A System investigation phaseB System development phaseC System analysis phaseD None of the above

Answer C___________________________________________________________________________________________

The system specification is the first deliverable in the computer system engineering process which does not includeA The system specification is the first deliverable in the computer system engineering process which does not

includeB CostC ScheduleD Technical Analysis

Answer A___________________________________________________________________________________________

SRD stands forA Software requirements definitionB Structured requirements definitionC Software requirements diagramD Structured requirements diagram

Answer B___________________________________________________________________________________________

If every requirement can be checked by a cost-effective process, then the SRS isA VerifiableB TraceableC ModifiableD Complete

Answer A___________________________________________________________________________________________

Structured charts are a product ofA Requirements gatheringB Requirements analysisC DesignD Coding

Answer C

If every requirement stated in the Software Requirement Specification (SRS) has only one interpretation, SRS is said to beA CorrectB UnambiguousC ConsistentD Verifiable

Answer B___________________________________________________________________________________________

If a program in its functioning has not met user requirements is some way, then it isA An errorB A failureC A faultD A defect

Answer D___________________________________________________________________________________________

Capability Maturity Model is meant forA ProductB ProcessC Product and ProcessD None of the above

Answer B___________________________________________________________________________________________

Which design model is analogous to the detailed drawings of the access points and external utilities for a house?A Architectural designB Component-level designC Data designD Interface design

Answer D___________________________________________________________________________________________

Which of the following models can be used to represent the architectural design of a piece of software?A Dynamic modelsB Functional modelsC Structural modelsD All of these

Answer D___________________________________________________________________________________________

Design phase will usually beA top-downB bottom-upC randomD centre fringing

Answer A___________________________________________________________________________________________

 In a function oriented design, weA minimize cohesion and maximize couplingB maximize cohesion and minimize couplingC maximize cohesion and maximize couplingD minimize cohesion and minimize coupling

Answer B___________________________________________________________________________________________

Content design is conducted byA Copywriters and graphic designerB Web engineersC Both a and bD None of the above

Answer C___________________________________________________________________________________________

Top-down design does not requireA step-wise refinementB loop invariantsC flow chartingD modularity

Answer B___________________________________________________________________________________________

Design phase will usually beA Top downB Bottom upC RandomD Centre fringing

Answer A

Which of the following is not a characteristics common to all design methods?A Configuration managementB Functional componentC Notation quality assessmentD Guidelines refinement heuristics

Answer A___________________________________________________________________________________________

The importance of software design can be summarized in a single wordA AccuracyB ComplexityC EfficiencyD Quality

Answer D___________________________________________________________________________________________

In object oriented design of software , objects haveA Attributes and names onlyB Operations and names onlyC Attributes, name and operationsD None of above

Answer C___________________________________________________________________________________________

Which design is analogous to the floor plan of a house?A Architectural designB Component-level designC Data designD Interface design

Answer A___________________________________________________________________________________________

Data structure suitable for the application is discussed inA Data designB Architectural designC Procedural designD Interface design

Answer A___________________________________________________________________________________________

The approach to software testing is to design test cases toA Break the softwareB Understand the softwareC Analyze the design of sub processes in the softwareD Analyze the output of the software

Answer D___________________________________________________________________________________________

Alpha and Beta Testing are forms ofA Acceptance testingB Integration testingC System TestingD Unit testing

Answer A___________________________________________________________________________________________

“Black” refers in the “Black-box” testing meansA Characters of the movie “Black”B I / O is hiddenC  Design is hiddenD Users are hidden

Answer C___________________________________________________________________________________________

Regression testing is primarily related toA Functional testingB Data flow testingC Development testingD Maintenance testing

Answer D___________________________________________________________________________________________

White box testing, a software testing technique is sometimes calledA Basic pathB Graph TestingC DataflowD Glass box testing

Answer D

While unit testing a module, it is found that for a set of test data, maximum 90% of the code alone were tested with a probability of success 0.9. The reliability of the module isA Atleast greater than 0.9B Equal to 0.9C Atmost 0.81D Atleast 1/0.81

Answer C___________________________________________________________________________________________

What are the testing levels?A Unit testingB Integration testingC System testing and acceptanceD All of the above

Answer D___________________________________________________________________________________________

Function testing is known asA Structural testingB Behavior testingC Regression testingD None of these

Answer B___________________________________________________________________________________________

The main purpose of integration testing is to findA Design errorsB Analysis errorsC Procedure errorsD Interface errors

Answer D___________________________________________________________________________________________

Which of the following graph theoretic concept will be useful in software testing?A Cyclomatic numberB Hamiltonian circuitC Eulerian cycleD None of the above

Answer A___________________________________________________________________________________________

A non functional software testing done to check if the user interface is easy to use and understandA Usability testingB Security testingC Unit testingD Black box testing

Answer A___________________________________________________________________________________________

One of the fault base testing techniques isA Unit testingB Beta testingC Stress testingD Mutation testing

Answer D___________________________________________________________________________________________

A fault simulation testing technique isA Mutation testingB Stress testingC Black box testingD White box testing

Answer A___________________________________________________________________________________________

The testing that focuses on the variables is calledA Black box testingB White box testingC Data variable testingD Data flow testing

Answer A___________________________________________________________________________________________

OPERATING SYSTEM

Multiprogramming systems

Which of the following testing methods is normally used as the acceptance test for a software system?A Regression testingB Integration testingC Unit testingD Functional testing

Answer D

AAre easier to develop than single programming systemsB

Execute each job faster

C Execute more jobs in the same time periodD Are used only one large mainframe computers

Answer C___________________________________________________________________________________________

The operating system creates _____ from the physical computerA Virtual spaceB Virtual computersC Virtual deviceD None

Answer B___________________________________________________________________________________________

The primary purpose of an operating system isA To make the most efficient use of the computer hardwareB To allow people to use the computerC To keep systems programmers employedD To make computers easier to use

Answer A___________________________________________________________________________________________

Overlay isA A part of Operating SystemB A specific memory locationC A single contiguous memory that was used in the olden days for running large programs by swappingD Overloading the system with many user files

Answer C___________________________________________________________________________________________

Link encryptionA Is more secure than end to end encryptionB Is less secure than end to end encryptionC Cannot be used in a large networkD Is used only detect errors

Answer B___________________________________________________________________________________________

Which is built directly on the hardware?A Computer EnvironmentB Application SoftwareC Operating SystemD Database System

Answer C___________________________________________________________________________________________

An operating systemA Is not required on large computersB Is always supplied with the computerC Is always supplied with the BASICD Consists of programs that help in the operation of computer

Answer D___________________________________________________________________________________________

Which of the following is not supported by the operating system?A ProtectionB AccountingC CompilationD I/O operation

Answer C___________________________________________________________________________________________

Remote Computing Service involves the use of time sharing and _______.A multi-processingB interactive processingC batch processingD real-time processing

Answer C___________________________________________________________________________________________

Dijkestra banking algorithm in an operating system, solves the problem ofA Deadlock avoidanceB Deadlock recoveryC Mutual exclusionD Context switching

Answer A

CPU does not perform the operationA Data transferB Logic operationC Arithmetic operationD All of the above

Answer D___________________________________________________________________________________________

An example of an operating system is _______________A Windows XPB UNIX or LINUXC MAC OSD All of the above

Answer D___________________________________________________________________________________________

Two basic two types of record access methods areA Sequential and randomB Direct and immediateC Sequential and indexedD Online and real time

Answer A___________________________________________________________________________________________

A chip having 150 gates will be classified asA MSIB SSIC LSID VLSI

Answer A___________________________________________________________________________________________

Which of the following Operating System does not implement multitasking truly?A Windows 98B Windows NTC Windows XPD MS DOS

Answer D___________________________________________________________________________________________

Which of the following is an example of a spooled device?A The terminal used to enter the input data for a program being executed.B The secondary memory device in a virtual memory system.C A line printer used to print the output of a number of jobs.D None of the above.

Answer C___________________________________________________________________________________________

Which runs on computer hardware and serve as platform for other software to run on?A Operating SystemB Application SoftwareC System SoftwareD All

Answer A___________________________________________________________________________________________

Execution of two or more programs by a single CPU is known asA MultiprocessingB Time sharingC MultiprogrammingD None of the above

Answer C___________________________________________________________________________________________

A bootstrap isA A memory deviceB A device to support the computerC A small initialisation program to start up a computerD An error correction technique

Answer C___________________________________________________________________________________________

Memory on your computer where data is stored temporarily is called __________.A RAMB ROMC BIOSD CPU

Answer A

______ is used in operating system to separate mechanism from policyA Single level implementationB Two level implementationC Multi level implementationD None

Answer B___________________________________________________________________________________________

Object modules generated by assembler that contains unresolved external references are resolved for two or more object module by a/anA Operating systemB LoaderC LinkerD Compiler

Answer C___________________________________________________________________________________________

Which is the first program run on a computer when the computer boots up?A System softwareB Operating systemC System operationsD None

Answer B___________________________________________________________________________________________

Object code is the output of ______.A Operating SystemB Compiler or AssemblerC only AssemblerD only Compiler

Answer B___________________________________________________________________________________________

WINDOWS is a _________ operating.A Real timeB Multi-userC PreemptiveD Non-preemptive

Answer C___________________________________________________________________________________________

The multiuser operating system, 20 requests are made to use a particular resource per hour, on an average the probability that no request are made in 45 minutes isA e-15

B e-5

C 1 – e-5

D 1 – e-10

Answer A___________________________________________________________________________________________

Fence register is used forA CPU protectionB Memory protectionC File protectionD All of the above

Answer B___________________________________________________________________________________________

The operating system that reads and reacts in terms of actual time isA Batch systemB Quick response systemC Real time systemD Time sharing system

Answer C___________________________________________________________________________________________

Dirty bit is used to showA Page with corrupted dataB Wrong page in the memoryC Page that is modified after being loaded into cache memoryD Page that is less frequently accessed

Answer C___________________________________________________________________________________________

What is a shell ?A It is a hardware componentB It is a command interpreterC It is a part in compilerD It is a tool in CPU scheduling

Answer B

Which is the layer of a computer system between the hardware and the user programA Operating environmentB Operating systemC System environmentD None

Answer B___________________________________________________________________________________________

A page fault means that we referenced a pageA Outside the memory boundariesB With an incorrect I/O requestC That was not in secondary storageD That was not in main memory

Answer D___________________________________________________________________________________________

Protection against computer virusesA PreventionB Practice of safe computingC Purchasing unopened software from vendorsD Avoiding free or pirated copies from public sources

Answer D___________________________________________________________________________________________

A relationship between processes such that each has some part (critical section) which must not be executed while the critical section of another is being executed, is known asA SemaphoreB Mutual exclusionC MultiprogrammingD Message passing

Answer B___________________________________________________________________________________________

Which of the following information bits used by the various page replacement policies indicates if the page has been called lately?A Locality bitB Status bitC Referenced bitD Modified bit

Answer C___________________________________________________________________________________________

A sequence of instructions,in a computer language to get the desired result is known asA ProcessB ProgramC SoftwareD None of these

Answer A___________________________________________________________________________________________

Which is not the state of the process ?A BlockedB RunningC ReadyD Privileged

Answer D___________________________________________________________________________________________

 A process executes the codefork();fork();fork();A 3B 4C 7D 8

Answer C___________________________________________________________________________________________

Given memory partitions of 100K, 500K, 200K, 300K and 600K (in order) and processes of 212K, 417K, 112K, and 426K (in order), using the first-fit algorithm in which partition would the process requiring 426K be placed?A 100KB 500KC 200KD 600K

Answer D___________________________________________________________________________________________

The only transition that is initiated by the user process itself isA BlockB DispatchC Wake upD None of Above

Answer A

Round robin scheduling is essentially the preemptive version of ________A FIFOB Shortest job firstC Shortest remainingD Longest time first

Answer A___________________________________________________________________________________________

The operating system of a computer serves as a software interface between the user andA SoftwareB HardwareC ProcessorD Compiler

Answer C___________________________________________________________________________________________

The mechanism that bring a page into memory only when it is needed is calledA SegmentationB FragmentationC Demand PagingD Page Replacement

Answer C___________________________________________________________________________________________

With a four programs in memory and with 80% average I/O wait, the CPU utilization is?A 60%B 70%C 90%D 100%

Answer A___________________________________________________________________________________________

In time sharing operating system ,when the time slot given to a process is completed ,the process goes from running state to theA Blocked stateB Ready stateC Suspended stateD Terminated state

Answer B___________________________________________________________________________________________

Situations where two or more processes are reading or writing some shared datas and the final result depends on who runs precisely when are calledA Race conditionsB Critical sectionsC Mutual exclusionsD Message passing

Answer A___________________________________________________________________________________________

Switching the CPU to another Process requires to save state of the old process and loading new process state is called asA Process BlockingB Context SwitchC Time SharingD None of the above

Answer B___________________________________________________________________________________________

 A page faultA is an error specific page.B is an access to the page not currently in memory.C occur when a page program occur in a page memory.D  page used in the previous page reference.

Answer B___________________________________________________________________________________________

Cooperating processes canA Only share a logical address space directly that is, both code and dataB Access concurrently to shared data may result in data consistencyC Either directly share a logical address space or be allowed to share data only through

files or messagesD None of these responses are correct

Answer C___________________________________________________________________________________________

A program is located in the smallest available hole in the memory is _________A best – fitB first – bitC worst – fitD buddy

Answer A

A program in execution is calledA ProcessB InstructionC ProcedureD Function

Answer A___________________________________________________________________________________________

In the blocked stateA The processes waiting for I/O are foundB The process which is running is foundC The processes waiting for the processor are foundD None of the above

Answer A___________________________________________________________________________________________

A process executes the codefork();fork();fork();The total number of child processes created isA 3B 4C 7D 8

Answer C___________________________________________________________________________________________

Several processes access and manipulate the same data concurrently and the outcome of the execution depends on the particular order in which the access takes place, is called a(n) ____________________ .A Shared memory segmentsB Race conditionC Entry sectionD Process synchronization

Answer B___________________________________________________________________________________________

A threadA Is a lightweight process where the context switching is lowB Is a lightweight process where the context switching is highC Is used to speed up pagingD None of the above

Answer A___________________________________________________________________________________________

Inter process communicationA Is never necessaryB Allows processors to synchronizeC Is required for all processesD Is usually done via disk drives

Answer B___________________________________________________________________________________________

In round robin CPU scheduling as time quantum is increased the average turn around timeA increasesB decreasesC remains constantD varies irregularly

Answer D___________________________________________________________________________________________

Pre-emptive scheduling is the strategy of temporarily suspending a gunning processA before the CPU time slice expiresB to allow starving processes to runC when it requests I/OD to avoid collision

Answer A___________________________________________________________________________________________

Cascading termination refers to termination of all child processes before the parent terminatesA NormallyB AbnormallyC Normally or abnormallyD None of these

Answer C___________________________________________________________________________________________

A special software that is used to create a job queue is calledA DriveB SpoolerC InterpreterD Linkage editor

Answer B

Assume N segments in memory and a page size of P bytes. The wastage on account of internal fragmentation isA NP/2 bytesB P/2 bytesC N/2 bytesD NP bytes

Answer A___________________________________________________________________________________________

In Round Robin cpu scheduling as the time quantum is increased ,the average turn around timeA IncreasesB DecreasesC Remains constantD Varies irregularly

Answer D___________________________________________________________________________________________

Consider the following transactions with data items P and Q initialized to zero:T1 :read (P);read (Q);if P = 0 then Q := Q + 1 ;write (Q).T2 : read (Q);read (P);if Q = 0 then P := P + 1 ;write (P).Any non-serial interleaving of T1 and T2 for concurrent execution leads toA a serializable scheduleB a schedule that is not conflict serializableC a conflict serializable scheduleD a schedule for which a precedence graph cannot be drawn

Answer B___________________________________________________________________________________________

Mutual exclusion problem occurs betweenA Two disjoint processes that do not interactB Processes that share resourcesC Processes that don not use the same rssourcesD None of these

Answer B___________________________________________________________________________________________

Consider a logical address space of 8 pages of 1024 words mapped with memory of 32 frames. How many bits are there in the physical address ?A 9 bitsB 11 bitsC 14 bitsD 15 bits

Answer D___________________________________________________________________________________________

 ________ synchronizes critical resources to prevent dead lockA P-operatorB V-operatorC SemaphoreD Swapping

Answer C___________________________________________________________________________________________

___________ is a technique of improving the priority of process waiting in Queue for CPU allocationA StarvationB AgingC RevocationD Relocation

Answer B___________________________________________________________________________________________

Peterson’s solution to the critical-section problemA Only satisfies mutual exclusion and progress requirementsB Is a hardware synchronization using locksC Is a software-based solutionD All of the above

Answer C___________________________________________________________________________________________

_______ is one of pre-emptive scheduling algorithm.A RRB SSNC SSFD Priority based

Answer A___________________________________________________________________________________________

Match the following :(a) Disk scheduling      1. Round-robin(b) Batch processing     2. SCAN(c) Time sharing              3. LIFO(d) Interrupt processing 4. FIFOA 3   4   2   1B 4   3   2   1C 2   4   1   3D 1   4   3   2

Answer C

Which of the following is scheme to deal with deadlock ?A Time outB Time inC Both (A) & (B)D None of the above

Answer A___________________________________________________________________________________________

Which of the following resources can cause deadlock?A Read only filesB Shared programsC PrintersD All of these

Answer C___________________________________________________________________________________________

 A semaphore count of negative n means (s=–n) that the queue contains ________ waiting processes.A n + 1B nC n - 1D 0

Answer B___________________________________________________________________________________________

Resources are allocated to the process on non-sharable basis isA mutual exclusionB hold and waitC no pre-emptionD circular wait

Answer A___________________________________________________________________________________________

In order to allow only one process to enter its critical section, binary semaphore are initialized toA 0B 1C 2D 3

Answer B___________________________________________________________________________________________

Consider the following page trace : 4,3, 2, 1, 4, 3, 5, 4, 3, 2, 1, 5. Percentage of page fault that would occur if FIFO page replacement algorithm is used with number of frames for the JOB m=4 will beA 8B 9C 10D 12

Answer C___________________________________________________________________________________________

A system has 3 processes sharing 4 resources.If each process needs a maximum of 2 units ,thenA Deadlock can never occurB Deadlock may occurC Deadlock has to occurD None of these

Answer A___________________________________________________________________________________________

Consider the methods used by processes P1 and P2 for accessing their critical sections. The initial values of shared Boolean variables S1 and S2 are randomly assigned,P1                                            P2while (S1 = = S2);           while (S1 = = S2);critical section                critical sectionS1 = S2;                          S1 = S2;Which one of the following statements describes the properties achieved ?A Mutual exclusion but not progressB Progress but not mutual exclusionC Neither mutual exclusion nor progressD Both mutual exclusion and progress

Answer C___________________________________________________________________________________________

The scheduling in which CPU is allocated to the process with least CPU-burst time is calledA Priority SchedulingB Shortest job first SchedulingC Round Robin SchedulingD Multilevel Queue Scheduling

Answer B___________________________________________________________________________________________

The simplest way to break a deadlock is toA Preempt a resourceB RollbackC Kill one of the processesD Lock one of the processes

Answer C

A scheduler which selects processes from secondary storage device is calledA Short term schedulerB Long term schedulerC Medium term schedulerD Process scheduler

Answer C___________________________________________________________________________________________

Banker s algorithm for resource allocation deals withA Deadlock preventionB Deadlock avoidanceC Deadlock recoveryD Mutual exclusion

Answer B___________________________________________________________________________________________

Interval between the time of submission and completion of job is calledA Waiting timeB Turn around timeC ThroughputD Response time

Answer B___________________________________________________________________________________________

What problem is solved by Dijkstra’s Banker’s algorithm?A Mutual exclusionB Deadlock recoveryC Deadlock avoidanceD Cache coherence

Answer B___________________________________________________________________________________________

 In the process management Round-robin method is essentially the pre-emptive version of _________A FILOB FIFOC SSFD Longest time first

Answer B___________________________________________________________________________________________

Which of the following statement is wrong ?I. 2-phase locking protocol suffer from dead lock.II. Time stamp protocol suffer from more aborts.III. A block hole in a DFD is a data store with only inbound flows.IV. Multivalued dependency among attribute is checked at 3 NF level.V. An entity-relationship diagram is a tool to represent event model.A I, II, IIB II, III, IVC III, IV, VD II, IV, V

Answer A___________________________________________________________________________________________

The completion order of the 3 processes under the policies FCFS and RR2 (round robin scheduling with CPU quantum of 2 time units) areA FCFS: P1, P2, P3 RR2: P1, P2, P3B FCFS: P1, P3, P2 RR2: P1, P3, P2C FCFS: P1, P2, P3 RR2: P1, P3, P2D FCFS: P1, P3, P2 RR2: P1, P2, P3

Answer C___________________________________________________________________________________________

Indefinite blocking is calledA DeadlockB StarvationC Both a and bD None of these

Answer B___________________________________________________________________________________________

A solution to the critical section problem must satisfy which requirements?A Bounded waiting, monitor and relative speedB Semaphores, monitor and prevention of deadlockC Signal, wait and continueD Mutual exclusion, progress and bounded waiting

Answer D___________________________________________________________________________________________

_____________ is one preemptive scheduling algorithm.A Shortest job firstB Round robinC Priority basedD Shortest job next

Answer A

It is not possible to have a deadlock involving only a single process. Why?A This holds mutual exclusion, hold-and-wait and non-preemptionB This follows directly from the hold-and-wait conditionC Because single process not always in safe stateD None of the above

Answer B___________________________________________________________________________________________

A Dead-lock in an Operating System isA Desirable processB Undesirable processC Definite waiting processD All of the above

Answer C___________________________________________________________________________________________

Which of the following approaches do not require knowledge of the system state?A Deadlock detectionB Deadlock preventionC Deadlock avoidanceD None of the above

Answer D___________________________________________________________________________________________

The simplest way to break a deadlock is toA Preempt a resourceB RollbackC Kill one of the processesD Lock one of the processes

Answer C___________________________________________________________________________________________

Three concurrent processes X, Y, and Z execute three different code segments that access and update certain shared variables. Process X executes the P operation (i.e., wait) on semaphores a, b and c; process Y executes the P operation on semaphores b, c and d; process Z executes the P operation on semaphores c, d, and a before entering the respective code segments. After completing the execution of its code segment, each process invokes the V operation (i.e., signal) on its three semaphores. All semaphores are binary semaphores initialized to one. Which one of the following represents a deadlock- free order of invoking the P operations by the processes?A X : P (a ) P (b) P (c ) Y : P (b ) P (c) P (d) Z : P (c ) P (d) P (a)B X : P (b ) P (a) P (c ) Y : P (b ) P (c) P (d)  Z : P (a ) P (c ) P (d)C X : P (b ) P (a) P (c ) Y : P (c ) P (b) P (d) Z : P (a ) P (c ) P (d)D X : P (a ) P (b) P (c ) Y : P (c ) P (b) P (d) Z : P (c ) P (d) P (a)

Answer B___________________________________________________________________________________________

The register or main memory location which contains the effective address of the operand is known asA pointerB special locationC indexed registerD None of the above

Answer A___________________________________________________________________________________________

A file system with 300 GByte disk uses a file descriptor with 8 direct block addresses, 1 indirect block address and 1 doubly indirect block address. The size of each disk block is 128 Bytes and the size of each disk block address is 8 Bytes. The maximum possible file size in this file system isA 3 KBytesB 35 KBytesC 280 KBytesD dependent on the size of the disk

Answer B___________________________________________________________________________________________

Which of the following scheduling policy is well suited for time shared operating system?A Shortest job firstB Round robinC First com first serveD Elevator

Answer B___________________________________________________________________________________________

The maximum amount of information that is available in one portion of the disk access arm for a removal disk pack (without further movement of the arm with multiple heads)A A plate of dataB A cylinder of dataC A track of dataD A block of data

Answer B___________________________________________________________________________________________

Memory management isA Not used in modern operating systemB Replaced with virtual memory on current systemsC Not used on multiprogramming systemsD Critical for even the simplest operating systems

Answer D

The purpose of a Memory Management Unit is to ___________ .A Perform run-time mapping from virtual to physical addressesB Ensure protection of the memory space allocated to every processC Both A and B are correct responsesD None of these responses is correct

Answer A___________________________________________________________________________________________

In virtual memory systems, Dynamic address translationA Is the hardware necessary to implement pagingB Stores pages at a specific location on diskC Is useless when swapping is usedD Is part of the operating system paging algorithm

Answer A___________________________________________________________________________________________

Assertion(A): Bit maps are not often used in memory management.Reason(R): Searching a bitmap for a run of given length is a slow operation.A Both (A) and (R) are true and (R) is correct explanation for (A)B Both(A) and (R) are true but (R) is not correct explanation for (A)C (A) is true (R) is falseD (A) is false (R) is true

Answer A___________________________________________________________________________________________

The performance of cache memory is frequently measured in terms of a quantity calledA Bit ratioB Nor ratioC No ratioD Hit ratio

Answer D___________________________________________________________________________________________

In which of the following page replacement policies Balady’s anomaly occurs?A FIFOB LRUC LFUD NRU

Answer A___________________________________________________________________________________________

Suppose it takes 100 ns to access a page table and 20 ns to access associative memory with a 90% hit rate, the average access time equals:A 20 nsB 28 nsC 90 nsD 100 ns

Answer B___________________________________________________________________________________________

Moving process from main memory to disk is calledA SchedulingB CatchingC SwappingD Spooling

Answer C___________________________________________________________________________________________

Virtual memory isA related to virtual realityB a form of ROMC a form of RAMD None of the above

Answer C___________________________________________________________________________________________

___________ is a technique of temporarily removing inactive programs from the memory of computer system.A SwappingB SpoolingC SemaphoreD Scheduler

Answer A___________________________________________________________________________________________

Fragmentation of the file systemA Occurs only if file system is used improperlyB Can always be preventedC Can be temporarily removed by compactionD Is the characteristic of all the file systems

Answer C

The size of the virtual memory depends on the size of theA Data busB Main memoryC Address busD None of the above

Answer C___________________________________________________________________________________________

Variable partition memory management technique with compaction results inA Reduction of fragmentationB Minimal wastageC Segment sharingD None of the above

Answer A___________________________________________________________________________________________

Loading operating system from secondary memory to primary memory is calledA CompilingB BootingC RefreshingD Reassembling

Answer B___________________________________________________________________________________________

Paging is a memory management scheme that ___________________.A Permits the logical address space of a process to be noncontiguousB Avoids external fragmentation and the need for compactionC Solves the considerable problem of fitting memory chunks of fixed sizes onto the backing storeD All of the above

Answer B___________________________________________________________________________________________

A static partitioned memory management system has a total of six partitions. If one is allocated to the operating system, this will allow a total ofA Five user jobsB Six user jobsC Thirty-two user jobsD Thirty-six user jobs

Answer A___________________________________________________________________________________________

Consider the virtual page reference string1, 2, 3, 2, 4, 1, 3, 2, 4, 1on a demand paged virtual memory system running on a computer system that has main memory size of 3 page frames which are initially empty. Let LRU, FIFO and OPTIMAL denote the number of page faults under the corresponding page replacement policy. ThenA OPTIMAL < LRU < FIFOB OPTIMAL < FIFO < LRUC OPTIMAL = LRUD OPTIMAL = FIFO

Answer B___________________________________________________________________________________________

Virtual memory can be implemented withA SegmentationB PagingC NoneD All of the above

Answer D___________________________________________________________________________________________

On a disk with 1000 cylinders (0 to 999) find the number of tracks, the disk arm must move to satisfy all the requests in the disk queue. Assume the last request service was at track 345 and the head is moving toward track 0. The queue in FIFO order contains requests for the following tracks :123, 874, 692, 475, 105, 376(Assume SCAN algorithm)A 2013B 1219C 1967D 1507

Answer B___________________________________________________________________________________________

Memory utilization factor shall be computed as followsA Memory in use/allocated memoryB Memory in use/total memory connectedC Memory allocated/total memory availableD Memory committed/total memory available

Answer B___________________________________________________________________________________________

File attributes areA NameB TypeC LocationD All of these

Answer D

Which structure prohibits the sharing of files and directories?A Tree structureB One level structureC Two level structureD None of the these

Answer A___________________________________________________________________________________________

Best method for allocation isA ContiguousB LinkedC IndexD All of these

Answer B___________________________________________________________________________________________

Which one is best for memory allocation?A First fitB Best fitC Worst fitD All of these

Answer B___________________________________________________________________________________________

The simplest directory structure isA Single level directoryB Two level directoryC Tree structure directoryD None of these

Answer C___________________________________________________________________________________________

A tree structured file directory systemA Allows easy storage and retrieval of file namesB Is a much debated unnecessary featureC Is not essential when we have millions of filesD None of the above

Answer A___________________________________________________________________________________________

The file structure that redefines its first record at a base of zero uses the termA Relative organizationB Key fieldingC Dynamic reallocationD Hashing

Answer A___________________________________________________________________________________________

Which of the following types of terminals is entirely dependent for all its capabilities on the computer system to which it is connected?A Smart terminalB Dumb terminalC Micro computerD None of these

Answer B___________________________________________________________________________________________

File record lengthA Should always be fixedB Should always be variableC Depends upon the size of the fileD Should be chosen to match the data characteristics

Answer D___________________________________________________________________________________________

FAT stands forA File Accomodation TableB File Access TapeC File Allocation TableD File Activity Table

Answer C___________________________________________________________________________________________

________ is the time required by a sector to reach below read/write head.A Seek TimeB Latency TimeC Access timeD None

Answer B

Which of the following is the principal difference between a monochrome monitor and an RGB monitor?A Number of electron gunsB ResolutionC SizeD Cost

Answer A___________________________________________________________________________________________

A file sometimes called aA Collection of input dataB Data setC Temporary place to store dataD Program

Answer B___________________________________________________________________________________________

There are no cycles ofA General graph directoryB Cyclic graph directoryC One level directoryD Two level directory

Answer B___________________________________________________________________________________________

Solution of name collision problem isA Single level directoryB Two level directoryC Tree structureD All of these

Answer B___________________________________________________________________________________________

When used with I\O devices the term intelligent impliesA A color output capabilityB Speech processing capabilityC High speed printing capabilityD Features to support off line and online tasks

Answer D___________________________________________________________________________________________

Optical storage is aA high-speed direct access storage device.B low-speed direct access storage device.C medium-speed direct access storage device.D high-speed sequential access storage device.

Answer C___________________________________________________________________________________________

Memory protection is normally done by theA Processor and the associated hardwareB Operating systemC CompilerD User program

Answer A___________________________________________________________________________________________

Program threats areA Trojan horseB Trap doorC Both A and BD None of these

Answer C___________________________________________________________________________________________

Which of the following is the process by which a user’s access to physical data in the application is limited, based on his privileges ?A AuthorizationB AuthenticationC Access ControlD All of these

Answer C___________________________________________________________________________________________

Worm was made upA One programB Two programC Three programD All of these

Answer B

Trojan horseA A code segment that misuses its file is called trojan horseB Good for file accessingC Both A and BD None of these

Answer A___________________________________________________________________________________________

A major security problem for operating system isA Authentication problemB Physical problemC Human problemD None of these

Answer A___________________________________________________________________________________________

To protect system,there are how many security levels?A OneB TwoC ThreeD Four

Answer C___________________________________________________________________________________________

Which of the following topologies consists of multiple CPUs connected by a single communication line running the length of the network?A TreeB RingC StarD Bus

Answer D___________________________________________________________________________________________

Which of the following is the process by which a user’s privileges ascertained ?A AuthorizationB AuthenticationC Access ControlD None of these

Answer A___________________________________________________________________________________________

An audit logA Simply records the timeB UserC Type of all access to an objectD All of these

Answer B___________________________________________________________________________________________

All of the following are examples of real security and privacy risks exceptA HackersB SpamC VirusesD Identify theft

Answer B___________________________________________________________________________________________

Security violation due toA MaliciousB AccidentalC Both A and BD None of these

Answer C___________________________________________________________________________________________

A public key encryption systemA Allows only the correct receiver to decode the data.B Allows only one to decode the transmission.C Allows only the correct sender to decode the data.D Does not encode the data before transmitting it.

Answer A___________________________________________________________________________________________

Which model estimates the total effort in terms of person,months of the technical project staff?A SpiralB WaterfallC PrototypingD COCOMO model

Answer D

Lowest level of security isA AB BC CD D

Answer A___________________________________________________________________________________________

Bootstrap or vector is calledA Grappling hook programB Main programC Secondary programD Primary storage

Answer B___________________________________________________________________________________________

In one time passwordA The password is different in each instanceB The password is same in each instanceC Both A and BD None of these

Answer A___________________________________________________________________________________________

The DIR command in DOS operating systemA Copies filesB Erases filesC Extracts a list of file namesD None of these

Answer C___________________________________________________________________________________________

Malicious access areA Unauthorized reading of dataB Unauthorized modification of dataC Unauthorized destruction of dataD All of these

Answer D___________________________________________________________________________________________

Audit log can be used to determineA How and when the problem occurredB What amount of damage was doneC When security has been violatedD All of these

Answer C___________________________________________________________________________________________

The most common approach to authenticating a user identity isA User passwordB User log inC Hardware deviceD None of these

Answer A___________________________________________________________________________________________

In which model advantage of better testing in software development?A Waterfall modelB PrototypingC IterativeD All of these

Answer C___________________________________________________________________________________________

WEB

Which model reduces the cost of development of software?A Waterfall modelB PrototypingC IterativeD None of these

Answer B

The main function of a browser is toA Compile HTMLB Interpret HTMLC De-compile HTMLD Interpret CGI programs

Answer B___________________________________________________________________________________________

DMSP stands forA Distributed Mail System ProtocolB Distributed Message System ProtocolC Distributed Message System PoolD Distributed Mail System Pool

Answer A___________________________________________________________________________________________

In HTML URI is used toA Create a frame documentB Create a image map in the webpageC Customize the image in the webpageD Identify a name or a resource on the internet

Answer D___________________________________________________________________________________________

Which tags are commonly used by search engines?A HeadingsB TitleC ParagraphD All of these

Answer A___________________________________________________________________________________________

The HTML tags are enclosed withinA Curly bracesB ParenthesesC Angle bracketsD Square brackets

Answer C___________________________________________________________________________________________

A header in CGI script can specifyA Format of the documentB New locat ion of the documentC A and B bothD Start of the document

Answer A___________________________________________________________________________________________

Which of the following tags below are used for multi line text input control?A Textml tagB Text tagC Textarea tagD Both a and b

Answer C___________________________________________________________________________________________

What is the use of web font in HTML?A That is the core font that is used to develop web pagesB That enables to use fonts over the web without installationC That is the special font that is developed by Microsoft corporationD All of the above

Answer B___________________________________________________________________________________________

HTML is defined using SGML – an _______ standard, information processing-text and office systems (SGML) for text information processing.A ISO – 8878B ISO – 8879C ISO – 8880D ISO – 8881

Answer B___________________________________________________________________________________________

The MIME text file is saved withA HMT extensionB HTML extensionC THM extensionD None of these

Answer B

Which of the following attributes below are used for a font name?A FontnameB fnC FontD Face

Answer D___________________________________________________________________________________________

What is the use of forms in HTML?A To display contents of e mailsB To display animation effectC To collect users inputD None of the above

Answer C___________________________________________________________________________________________

Each list item in an ordered or unordered list has which tag?A List tagB Is tagC Li tagD Ol tag

Answer C___________________________________________________________________________________________

Which of the following identifies a specific web page and its computer on the Web?A Web siteB Web site addressC URLD Domain Name

Answer D___________________________________________________________________________________________

Which of the following protocol is not used in the internet?A TelnetB WIRLC HTTPD Gopher

Answer B___________________________________________________________________________________________

Which of the following statement is true?A An XML document can have one root element.B An XML document can have one child element.C XML elements have to be in lower case.D All of the above.

Answer A___________________________________________________________________________________________

Output of XML document can be viewed asA Word processorB Web browserC NotepadD None of the above

Answer B___________________________________________________________________________________________

All exceptions in Java are subclasses of built in class calledA ExceptionB ErrorC ThrowableD Raise

Answer C___________________________________________________________________________________________

XML is aA Imperative languageB Declarative languageC StandardD None of these

Answer B___________________________________________________________________________________________

Node in XML isA Any part of the document whether it is elements ,attributes or otherwiseB Referred only to the attributesC Referred to the top element in the documentD None of these

Answer A

Well formed XML document meansA It contains a root elementB It contain an elementC It contains one or more elementsD Must contain one or more elements and root element must contain all other elements

Answer D___________________________________________________________________________________________

XML DSOs has the property for the number of pages of data the recordset containsA CountB NumberC PagecountD Pagenumber

Answer C___________________________________________________________________________________________

There is a way of describing XML data,how?A XML uses a DTD to describe the data.B XML uses XSL to describe data.C XML uses a description node to describe dataD Both A and C.

Answer D___________________________________________________________________________________________

XML uses the features ofA HTMLB XHTMLC VMLD SGML

Answer D___________________________________________________________________________________________

DOM is aA A parserB SpecificationC Coding styleD None of these

Answer A___________________________________________________________________________________________

XPATH used toA Address your documents by specifying a location pathB Address the serverC Store the IP of the serverD None of these

Answer A___________________________________________________________________________________________

The XML DOM object isA EntityB Entity referenceC Comment referenceD Comment data

Answer B___________________________________________________________________________________________

XML document can be viewed inA IE 3.0B IE 2.0C IE 6.0D IE X.0

Answer C___________________________________________________________________________________________

What is so great about XML?A Easy data exchangeB High speed on networkC Both A and BD None of the above

Answer C___________________________________________________________________________________________

The most popular way to materialize XML document is to useA DTDB XSLTC HTMLD SOAP

Answer B

NamespaceA Distinguishes one XML vocabulary from anotherB Provides the spaces in the namesC Is a querying languageD None of these

Answer A___________________________________________________________________________________________

Which of the following statement is true?A All the statements are true.B All XML elements must have closing tag.C All XML elements must be lower case.D All XML documents must have a DTD.

Answer B___________________________________________________________________________________________

How many root element can an XML document have ?A OneB TwoC ThreeD As many as the memory provides

Answer A___________________________________________________________________________________________

Attributes in XML areA Elements inXMLB Child nodesC A way of attaching characteristics or properties to elements of a documentD None of these

Answer C___________________________________________________________________________________________

Microsoft XML schema data types for hexadecimal digits representing octatesA UIDB UXIDC UUIDD XXID

Answer C___________________________________________________________________________________________

The tags in XML areA Case insensitiveB Case sensitiveC Browser dependentD None of these

Answer B___________________________________________________________________________________________

What is XML?A Subset of SGML,Extensible Markup LanguageB Superset of SGML,Extensible Markup LanguageC Like SGML ,Extended Markup LanguageD None of these

Answer A___________________________________________________________________________________________

XMLA Can be used as a databaseB Cannot be used as a databaseC XML is not a database ,it is languageD None of these

Answer A___________________________________________________________________________________________

CIDR stands forA Classified Internet Domain RoutingB Classless Inter Domain RoutingC Classless Internet Domain RoutingD Classified Inter Domain Routing

Answer B___________________________________________________________________________________________

The term byte stuf fing refers toA Data stuffing used wi th character oriented hardwareB Data stuffing used wi th bi t oriented hardwareC Data stuffing used with both A and BD Data stuffing used wi th byte oriented hardware

Answer A

What are empty elements and is it valid?A No there is no such terms as empty elementB Empty elements are element with no dataC No it is not valid to use empty elementD None of these

Answer B___________________________________________________________________________________________

www is based on which model?A Local serverB Client serverC 3 tierD None of these

Answer B___________________________________________________________________________________________

Let most segment of a name inn DNS representsA Individual NetworkB Individual computerC Domain nameD Network type

Answer B___________________________________________________________________________________________

Characteristic encoding isA Method used to represent numbers in a characterB Method used to represent character in a numberC Not a methodD None of these

Answer A___________________________________________________________________________________________

The web standard allows programmers on many different computer platforms to dispersed format and display the information server.These programs are calledA Web browsersB HTMLC Internet ExplorerD None of these

Answer A___________________________________________________________________________________________

BCC in the internet refers toA Black carbon copyB Blind carbon copyC Blank carbon copyD Beautiful carbon copy

Answer B___________________________________________________________________________________________

Which type of web document is run at the client siteA Static___________________________________________________________________________________________

Hardware that calculates CRC usesA Shift registerB Xor unitC Both A and BD Instruction register

Answer B___________________________________________________________________________________________

MSXML isA A Microsoft languageB XML parser that ships with IE5.0C Used for interacting with XMLD None of these

Answer B___________________________________________________________________________________________

Address 192.5.48.3 belongs toA Class AB Class BC Class CD Class D

Answer C

What does the URL need to access documents ?I. Path nameII. Host nameIII. DNSIV. Retrieval methodV. Server port numberA I, II, IIIB I, III, VC I, II, IVD III, IV, V

Answer B___________________________________________________________________________________________

Which Layer is not present in TCP/ IP model?A Application LayerB Internet LayerC Transport LayerD Presentation Layer

Answer D___________________________________________________________________________________________

UNIX LINUX

Unl ike Ipv4, Ipv6 does not include the following field in the base headerA Next Header fieldB Field for Fragmentation informationC Flow LabelD Kind field

Answer B___________________________________________________________________________________________

FDDI (Fiber Distributed Data Interconnect) is an example ofA Token ringB Token busC Star topologyD Multipoint network

Answer A

Which of the following statement best explains a process?A It is a program.B It is a program in execution.C It is an instance of a program in execution.D It is a program that uses system calls.

Answer C___________________________________________________________________________________________

In which section of a process,the information about the arguments to the program are available?A DataB TextC StackD User block

Answer C___________________________________________________________________________________________

Choose the incorrect statementA Shell scripts can accept argumentsB Shell scripts are interpretedC Shell is a programming languageD Shell scripts are compiled

Answer D___________________________________________________________________________________________

UNIX was developed byA Bell labsB Berkley softwareC California universityD American defence academy

Answer A___________________________________________________________________________________________

Kernel is not involvedA When a read operation is doneB When a pressed key is echoed on to the screenC In resource allocationD None of the above

Answer D___________________________________________________________________________________________

Choose the correct statement.A Kernel is non preemptive.B Interrupts are blocked when critical section of a code is being executed.C No process can put another process to sleep.D None of the above.

Answer C___________________________________________________________________________________________

The exception to the fact that any process in UNIX ,has a parent isA DevB ShC KernelD Login

Answer C___________________________________________________________________________________________

Lint should be usedA Before compilationB After compilationC To analyze a C codeD None of the above

Answer A___________________________________________________________________________________________

Which command is used to display the top of the file?A CatB MoreC HeadD Grep

Answer C___________________________________________________________________________________________

Which one of the following options is not a shell in UNIX system?A Bourne ShellB C ShellC Net ShellD Korn Shell

Answer C

The command that can be used to restrict incoming messages to a user isA MesgB HaltC GrepD Sleep

Answer A___________________________________________________________________________________________

The sort command in UNIXA Used to sort a fileB Used to sort the list of files in a directoryC Both A and BD None of the above

Answer A___________________________________________________________________________________________

Which of the following keys is used to replace a single character with new text?A SB sC rD C

Answer B___________________________________________________________________________________________

Which command is used to remove a directory?A rdB rmdirC dldirD rdir

Answer B___________________________________________________________________________________________

The tail command in UNIXA Can be used to look at the tail or bottom of the fileB Can be used to display the list of last 10 files in the current directoryC Can be used to display the list of last 15 in the current directoryD None of the above

Answer A___________________________________________________________________________________________

Which command is used to remove a fileA RenameB MVC RMD Del

Answer C___________________________________________________________________________________________

Which command is used to change protection mode of files starting with the string emp and ending with 1,2, or 3?

A chmod 777 emp*B chmod u x emp[l-3]C chmod u r ??? empD chmod 222 emp?

Answer B___________________________________________________________________________________________

Which command will be used with vi editor to append text at end of line?A AB iC aD I

Answer A___________________________________________________________________________________________

Which of the following command the file names in multiple columns?A IS–XB ISC IS–1D IS–f–X

Answer B___________________________________________________________________________________________

Which command is used to display the device name of the terminal you are using?A whoB lsC ttyD stty

Answer C

Which command allows you to view your file 24 lines at a time ?A MoreB CatC PgD None of the above

Answer A___________________________________________________________________________________________

Which of the following is not a communication command?A WriteB MailC MesgD Grep

Answer D___________________________________________________________________________________________

Which command is used to extract specific columns from the file?A cutB grepC PastD cat

Answer A___________________________________________________________________________________________

Which command is used with vi editor to move the cursor to the left?A iB kC jD h

Answer D___________________________________________________________________________________________

Which command is used to create a directory?A CRDIRB MKDIRC MDD CR

Answer B___________________________________________________________________________________________

Which of the following changes permission to deny write permission to group and others?A Chmod go-w filexB Chmod go w filexC Chmod go=w fileD None of the above

Answer A___________________________________________________________________________________________

Which command is used with vi editor to delete a single character?A ZB yC aD x

Answer D___________________________________________________________________________________________

The tar command in UNIXA Used to create compressed archives of directories and filesB Used to extract directories and files from an archivesC Both A and BD None of the above

Answer C___________________________________________________________________________________________

Which command is used to sort the lines of data in a file in reverse orderA sortB shC stD sort -r

Answer D___________________________________________________________________________________________

Which of the following commands is used to rename a file?A RenameB MVC RemoveD Ren

Answer B

Which of the following calls never returns an error?A GetpidB ForkC Ioct1D Open

Answer A___________________________________________________________________________________________

Which command is used to display a file contents in octal form?A cdB ofC odD oct

Answer C___________________________________________________________________________________________

Which of the following is not a communication command?A writeB mailC mesgD grep

Answer D___________________________________________________________________________________________

Which of the following commands is used to count the total number of lines,words and characters contained in a file?A count pB wcountC wcD count w

Answer C___________________________________________________________________________________________

The cc command makes a total ofA 1 passB 2 passC 4 passD 5 pass

Answer D___________________________________________________________________________________________

Which of the following commands is used for an automatic remainder service?A WriteB CalenderC MailD Mesg

Answer B___________________________________________________________________________________________

 The Unix command used to find out the number of characters in a file isA ncB wcC chcntD c

Answer B___________________________________________________________________________________________

In a system ,if 5 people are currently using vi editor ,then the number of corresponding processes will beA 1B 5C 3D 0

Answer B___________________________________________________________________________________________

Which set option is used with vi editor to display line numbers on screen?A nmB nuC icD li

Answer B___________________________________________________________________________________________

Which command will be used with vi editor to move back to the beginning of a word?A bB eC aD w

Answer A

When a process makes a system call ,its mode changes fromA User to kernelB Kernel to userC Restricted to unrestrictedD Unrestricted to restricted

Answer A___________________________________________________________________________________________

Which of the following are not system calls?A ChmodB OpenC LseekD Getc

Answer D___________________________________________________________________________________________

The advantage of binary files over text files is thatA It is compactB It can be accessed fasterC Many commands assume the named file to be a binary fileD They are more reliable

Answer D___________________________________________________________________________________________

Mounting a file system results in the loading ofA Boot blockB Super blockC i-node tableD All of these

Answer B___________________________________________________________________________________________

If cat x ,prints garbage ,then x is probably aA Data fileB Binary fileC Text fileD Source file

Answer B___________________________________________________________________________________________

Which of the following system calls transforms an executable binary file into a process?A ForkB ExecC Ioct1D Longjmp

Answer B___________________________________________________________________________________________

The cat command is used toA Print a fileB Display a fileC Capture a fileD Copy a file

Answer B___________________________________________________________________________________________

An attempt to read from locked file,results inA Prematured terminationB A deadlockC An indefinite waitD None of the above

Answer D___________________________________________________________________________________________

Which of the following file names can be found in more than one directory?A PasswdB BinC DateD None of the above

Answer A___________________________________________________________________________________________

Command_________compares two files byte by byte and displays the first mismatch.A cmpB compC cmapD None of these

Answer A

When the read system call encounters EOF ,it returnsA Some positive integerB Some negative integerC 0D -1

Answer C___________________________________________________________________________________________

To allow only one user to work with a particular file at a particular time ,one has toA SemaphoreB Critical regionC LockingD Dedicated mode

Answer C___________________________________________________________________________________________

Which of the following are character special files?A TerminalB PrinterC ModemD Tape drive

Answer B___________________________________________________________________________________________

Which of the following sections of an executable binary file has all uninitialized data items?A BSSB DataC HeaderD Symbol

Answer A___________________________________________________________________________________________

Which of the following files contains information related to password aging?A ShadowB ProfileC PasswordD All of these

Answer C___________________________________________________________________________________________

Which of the following system calls,does not return control to the calling point, on termination?A ForkB ExecC Ioct1D Longjmp

Answer B___________________________________________________________________________________________

Which command is used to display the characteristics of a process?A pidB psC duD au

Answer D___________________________________________________________________________________________

The first thing that is searched when a command references a file is itsA i nodeB i node numberC PermissionD None of the above

Answer B___________________________________________________________________________________________

Profilers areA Tools that analyze the run time behavior of a programB Tools that check C code for cross file consistencyC Tools that keep track of evolving versions of a fileD None of the above

Answer A___________________________________________________________________________________________

Which of the following tools can be used to keep track of evolving version of a file?A MakeB YaccC SCCSD dv

Answer C

Which command is used to display and create files?A catB edC viD lyrix

Answer A___________________________________________________________________________________________

Files that can store data in the same format as used in program are calledA Binary filesB Source fileC Text fileD Core

Answer A___________________________________________________________________________________________

The file that stores an integer as a sequence of characters is aA Text fileB Data fileC Binary fileD Core

Answer A___________________________________________________________________________________________

Which is the earliest and most widely used shell that came with the UNIX system?A C ShellB Korn ShellC Bourne ShellD Smith Shell

Answer C___________________________________________________________________________________________

OOP

Environment variables can be accessed byA System programsB C programsC Shell scriptsD None of the above

Answer C___________________________________________________________________________________________

Which of the following are not filter programs?A DateB SortC CatD Grep

Answer A___________________________________________________________________________________________

Which of the following shell scripts looping features does not recognize the break command?A WhileB UntilC ForD None of the above

Answer D___________________________________________________________________________________________

Which of the following is not a filter?A catB wcC grepD sort

Answer A___________________________________________________________________________________________

Shell functionsA Are another name for shell proceduresB Execute faster than shell proceduresC Are executed by a new shellD Are not executed by new shell

Answer D

The members of a class by default areA PublicB ProtectedC PrivateD Mandatory to specify

Answer C___________________________________________________________________________________________

Exception handling is targeted atA Run-time errorB Compile time errorC Logical errorD All of the above

Answer A___________________________________________________________________________________________

It is possible to declare as a friendA A member functionB A global functionC A classD All of the above

Answer D___________________________________________________________________________________________

You separated a derived class name from its access specifier withA A colonB Two colonsC Atleast one spaceD A semi colon

Answer B___________________________________________________________________________________________

An exception is caused byA A hardware problemB A problem in the operating systemC A syntax errorD A run-time error

Answer D___________________________________________________________________________________________

The following can be declared as friend in a classA An objectB A classC A public data memberD A private data member

Answer B___________________________________________________________________________________________

Which of the following statements is NOT valid about operator overloading?A Only existing operators can be overloadedB Overloaded operator must have at least one operand of its class typeC The overloaded operators follow the syntax rules of the original operatorD None of the above

Answer D___________________________________________________________________________________________

A copy constructor takesA No argumentB One argumentC Two argumentsD Arbitrary no. of arguments

Answer B___________________________________________________________________________________________

An object isA One instance of a classB Another word for a classC A class with static methodD A method that accesses class

Answer A___________________________________________________________________________________________

cfrontA is the front end of a C compilerB is the per-process of a C compilerC is a tool that is translated a C++ code to its equivalent C codeD None of above

Answer C

A class defined within another class isA Nested classB InheritanceC ContainershipD Encapsulation

Answer A___________________________________________________________________________________________

A blueprint for a software object is called aA ObjectB ClassC InstanceD None of these

Answer B___________________________________________________________________________________________

At which point of time a variable comes into existence in memory is determined by itsA ScopeB Storage classC Data typeD All of the above

Answer B___________________________________________________________________________________________

A virtual class is the same asA An abstract classB A class with a virtual functionC A base classD None of the above

Answer D___________________________________________________________________________________________

A static data member is given a valueA Within the class definitionB Outside the class definitionC When the program is exeutedD Never

Answer D___________________________________________________________________________________________

Which of the following is false for cin?A It represents standard inputB It is an object of istream class.C It is a class of which stream is an objectD Using cin the data can be read from user’s terminal

Answer C___________________________________________________________________________________________

Member functions, when defined within the class specificationA Are always inlineB Are not inlineC Are inline by default, unless they are too big or too complicatedD Are not inline by default.

Answer A___________________________________________________________________________________________

Access to private dataA Restricted to methods of the same classB Restricted to methods of other classesC Available to methods of the same class and other classesD Not an issue because the program will not compile

Answer B___________________________________________________________________________________________

C++ was originally developed byA Clocksin and MelishB Donald E.KnuthC Sir Richard HadleeD Bjarne Stroustrup

Answer D___________________________________________________________________________________________

Use of virtual functions impliesA OverloadingB OverridingC Static bindingD Dynamic binding

Answer D

Which of the statements is true in a protected derivation of a derived class from a base class?A Private members of the base class become protected members of the derived classB Protected members of the base class become public members of the derived classC Public members of the base class become protected members of the derived classD Protected derivation does not affect private and protected members of the derived class

Answer C___________________________________________________________________________________________

The keyword friend does not appear inA The class allowing access to another classB The class desiring access to another classC The private section of a classD The public section of a class

Answer C___________________________________________________________________________________________

Data members which are staticA Cannot be assigned a valueB Can only be used in static functionsC Cannot be defined in a UnionD Can be accessed outside the class

Answer B___________________________________________________________________________________________

Which can be passed as an argument to a function?A ConstantB ExpressionC Another functionD All of the above

Answer A___________________________________________________________________________________________

Function templates can acceptA Any type of parametersB Only one parameterC Only parameters of the basic typeD Only parameters of the derived type

Answer C___________________________________________________________________________________________

If you wanted to sort many large objects or structures, it would be most efficient toA Place them in an array and sort the array.B Place pointers to them in an array and sort the array.C Place them in a linked list and sort the linked list.D Place references to them in an array and sort the array.Answer C___________________________________________________________________________________________Match the following :(a) Garbage collection in 1. Java(b) Nameless object 2. generic programming(c) Template support 3. defines a class(d) A forward reference 4. member function(e) Derived class inherits

In which case is it mandatory to provide a destructor in a class?A Almost in every classB Class for which two or more than two objects will be createdC Class for which copy constructor is definedD Class whose objects will be created dynamically

Answer D___________________________________________________________________________________________

A pointer to the base class can hold address ofA Only base class objectB Only derived class objectC Base class object as well as derived class objectD None of the above

Answer C___________________________________________________________________________________________

Member of a class specified as _______ are accessible only to method of the class.A privateB publicC protectedD derive

Answer A___________________________________________________________________________________________

When a child class function is called,the compiler looks first for a matching function name in theA Class of the object using the function nameB Immediate ancestor classC Base classD Descendant class

Answer A___________________________________________________________________________________________

Maximum number of template arguments in a function template isA OneB TwoC ThreeD Many

Answer D

from base classA 1 5 4 2 3B 1 5 2 3 4C 5 1 2 3 4D 5 4 3 1 2Answer B___________________________________________________________________________________________A struct is the same as a class except thatA There are no member functionsB All members are publicC Cannot be used in inheritance hierarchyD It does have a this pointerAnswer C___________________________________________________________________________________________Which of the following is not the characteristic of constructor?A They should be declared in the public section.B They do not have return type.C They can not be inherited.D They can be virtual.Answer D___________________________________________________________________________________________The friend functions are used in situations where:A We want to have access to unrelated classesB Dynamic binding is requiredC Exchange of data between classes to take placeD None of the aboveAnswer D___________________________________________________________________________________________A template classA Is designed to be stored in different containersB Works with different data typesC Generates objects which must be identicalD Generates classes with different numbers of member functionsAnswer B___________________________________________________________________________________________Pure virtual functionsA Have to be redefined in the inherited classB Cannot have public access specificationC Are mandatory for a virtual classD None of the aboveAnswer A___________________________________________________________________________________________Overloading a postfix increment operator by means of a member function takesA No argumentB One argumentC Two argumentsD Three argumentsAnswer A___________________________________________________________________________________________A class which can use all the features of an established class,isA A static classB A super classC A subclassD Overloaded

Answer C___________________________________________________________________________________________A friend function to a class, C cannot accessA Private data members and member functionsB Public data members and member functionsC Protected data members and member functionsD The data members of the derived class of CAnswer D

In access control in a protected derivation, visibility modes will change as followsA Private, public and protected become protectedB Only public becomes protectedC Public and protected become protectedD Only private becomes protectedAnswer C___________________________________________________________________________________________Which of the following cannot be legitimately passed to a functionA A constantB A variableC A structureD A header fileAnswer D___________________________________________________________________________________________When the compiler cannot differentiate between two overloaded constructors, they are calledA OverloadedB DestructedC AmbiguousD DubiousAnswer C___________________________________________________________________________________________If a base class destructor is not virtual, thenA It can not have a function bodyB It can not be calledC It can not be called when accessed from pointerD Destructor in derived class can not be called when accessed through a pointer to the base classAnswer D___________________________________________________________________________________________A function call mechanism that passes arguments to a function by passing a copy of the values of the arguments is __________A Call by nameB Call by valueC Call by referenceD Call by value resultAnswer B___________________________________________________________________________________________A variable defined within a block is visibleA From the point of definition onward in the programB From the point of definition onward in the functionC From the point of definition onward in the blockD Throughout the functionAnswer C___________________________________________________________________________________________RunTime polymorphism is achieved by ___________A Friend function

B Virtual functionC Operator overloadingD Function overloadingAnswer B___________________________________________________________________________________________This pointerA Implicitly points to an objectB Can be explicitly used in a classC Can be used to return an objectD All of the aboveAnswer D___________________________________________________________________________________________A __________ is a special method used to initialize the instance variable of a class.A Member functionB DestructorC ConstructorD StructureAnswer C___________________________________________________________________________________________Additional information sent when an exception is thrown may be placed inA The throw keywordB The function that caused the errorC The catch blockD An object of the exception classAnswer C

Mechanism of deriving a class from another derived class is known as____A PolymorphismB Single InheritanceC Multilevel InheritanceD Message PassingAnswer C___________________________________________________________________________________________Mechanism of deriving a class from another derived class is known asA PolymorphismB Single inheritanceC Multilevel inheritanceD Message passingAnswer C___________________________________________________________________________________________The concept of hierarchical classification is related toA AbstractionB InheritanceC Function overloadingD NoneAnswer B___________________________________________________________________________________________The process of extracting the relevant attributes of an object is known asA PolymorphismB InheritenceC Abstraction

D Data hidingAnswer B___________________________________________________________________________________________If a class C is derived from class B, which is derived from class A, all through public inheritance, then a class C member function can accessA Protected and public data only in C and BB Protected and public data only in CC Private data in A and BD Protected data in A and BAnswer D___________________________________________________________________________________________The process of building new classes from existing one is called ______.A PolymorphismB StructureC InheritanceD CascadingAnswer C___________________________________________________________________________________________This type of inheritance is a mixture of multiple inheritance and hierarchical inheritanceA Single inheritanceB Multiple inheritanceC Hierarchical inheritanceD Hybrid inheritanceAnswer D___________________________________________________________________________________________The base class access specification determines how ___________ members in the base class may be accessed by derived classes.A PrivateB PublicC ProtectedD A,Band CAnswer D___________________________________________________________________________________________A base class may also be called aA Child classB SubclassC Derived classD Parent classAnswer D___________________________________________________________________________________________In multiple inheritanceA The base classes must have only default constructorsB Cannot have virtual functionsC Can include virtual classesD None of the aboveAnswer C

Which of the statements are true ?I. Function overloading is done at compile time.II. Protected members are accessible to the member of derived class.III. A derived class inherits constructors and destructors.IV. A friend function can be called like a normal function.V. Nested class is a derived class.A I, II, III

B II, III, VC III, IV, VD I, II, IVAnswer D____________________________________________________________________________________________________ members of a base class are never accessible to a derived class.A PublicB PrivateC ProtectedD A,B and CAnswer B___________________________________________________________________________________________Assume that we have constructor functions for both base class and derived class. Now consider the declaration in main( ). Base * P = New Derived; in what sequence will the constructor be called ?A Derived class constructor followed by Base class constructor.B Base class constructor followed by derived class constructor.C Base class constructor will not be called.D Base class constructor will not be called.Answer B___________________________________________________________________________________________When a sub class is inherited from only one super class .It is known asA Single inheritanceB Multiple inheritanceC Hierarchical inheritanceD Multilevel inheritanceAnswer A___________________________________________________________________________________________In multiple inheritanceA The base classes must have only default constructorsB Cannot have virtual functionsC Cannot have virtual classesD None of the aboveAnswer C___________________________________________________________________________________________The polymorphism can be characterized by the phraseA One interface,multiple methodsB Multiple interfaces,one methodC One interface,one methodD None of the aboveAnswer A___________________________________________________________________________________________The mechanism that binds code and data together and keeps them secure from outside world is known asA AbstractionB InheritanceC EncapsulationD PolymorphismAnswer C___________________________________________________________________________________________The term __________ means the ability to take many forms.A InheritanceB PolymorphismC Member functionD EncapsulationAnswer B

___________________________________________________________________________________________Runtime polymorphism is achieved byA Friend functionB Virtual functionC Operator overloadingD Function overloadingAnswer B___________________________________________________________________________________________RunTime Polymorphism is achieved by ______A Friend functionB Virtual functionC Operator overloadingD Function overloadingAnswer B

Usually a pure virtual functionA Has complete function bodyB Will never be calledC Will be called only to delete an objectD Is defined only in derived class

Answer D___________________________________________________________________________________________

Encapsulation isA Dynamic bindingB A mechanism to associate the code and data.C Data abstractionD Creating new class

Answer B___________________________________________________________________________________________

Identify the operator that is NOT used with pointersA ->B &C *D >>

Answer D___________________________________________________________________________________________

Consider the following statementschar *ptr;ptr = “hello”;cout << *ptr;What will be printed?A first letterB entire stringC it is a syntax errorD last letter

Answer A___________________________________________________________________________________________

Which of the following operator can be overloaded through friend function?A ->B =C ( )D *

Answer D___________________________________________________________________________________________

What will be the output of the following program?#include<iostream.h>void main(){float x=5,y=2;int result;result=x % y;cout<<result;}A 1B 1.0C Error messageD 2.5

Answer C___________________________________________________________________________________________

Which of the following declarations are illegal?A void *ptr;B char *str = “hello”;C char str = “hello”;D const *int p1;

Answer C___________________________________________________________________________________________

If we create a file by ‘ifstream’, then the default mode of the file is _________A ios :: outB ios :: inC ios :: appD ios :: binary

Answer B___________________________________________________________________________________________

If the variable count exceeds 100, a single statement that prints “Too many” isA if (count<100) cout << “Too many”;B if (count>100) cout >> “Too many”;C if (count>100) cout << “Too many”;D None of these.

Answer C___________________________________________________________________________________________

Which of the following will produce a value 10 if x = 9.7?A floor(x)B abs(x)C log(x)D ceil(x)Answer D___________________________________________________________________________________________The address of a variable temp of type float isA *tempB &tempC float& tempD float temp&Answer B___________________________________________________________________________________________What will be the values of x, m and n after the execution of the following statements?int x, m, n;m = 10;n = 15;x = ++m + n++;A x=25, m=10, n=15B x=26, m=11, n=16C x=27, m=11, n=16D x=27, m=10, n=15Answer B___________________________________________________________________________________________for (; ;)A means the test which is done using some expression is always trueB is not validC will loop foreverD should be written as for( )Answer C___________________________________________________________________________________________Consider the following statements:int x = 22,y=15;x = (x>y) ? (x+y) : (x-y);What will be the value of x after executing these statements?A 22B 37C 7D 5

What is the following code segment doing?void fn( ){char c;cin.get(c);if (c != ‘\n’) {fn( );cout.put(c);}}A The string entered is printed as it is.B The string entered is printed as it is.C It will go in an infinite loop.D It will print an empty line.

Answer B

Answer B___________________________________________________________________________________________If an array is declared as int a[4] = {3, 0, 1, 2}, then values assigned to a[0] & a[4] will be ________A 3, 2B 0, 2C 3, 0D 0, 4Answer C___________________________________________________________________________________________To access the public function fbase() in the base class, a statement in a derived class function fder() uses the statement.fbase();A fbase();B fder();C base::fbase();D der::fder();Answer A___________________________________________________________________________________________If x =5, y =2 then x ^y equals________.(where ^ is a bitwise XOR operator)A 00000111B 10000010C 10100000D 11001000Answer A___________________________________________________________________________________________ What will be the output of following program?#include<iostream.h>void main(){float x;x=(float)9/2;cout<<x;}A 4.5B 4.0C 4D 5Answer A___________________________________________________________________________________________The operator << when overloaded in a classA must be a member functionB must be a non member functionC can be both (A) & (B) aboveD cannot be overloadedAnswer C

Which of the following is the valid class declaration header for the derived class d with base classes b1 and b2?A class d : public b1, public b2B class d : class b1, class b2C class d : public b1, b2D class d : b1, b2

Answer A___________________________________________________________________________________________

In C++, dynamic memory allocation is accomplished with the operator ____A newB thisC malloc( )D delete

Answer A___________________________________________________________________________________________

What is the error in the following code?class t{virtual void print();}A No errorB Function print() should be declared as static.C Function print() should be defined.D Class t should contain data members.

Answer A___________________________________________________________________________________________

What is the output of the following codechar symbol[3]={‘a’,‘b’,‘c’};for (int index=0; index<3; index++)cout << symbol [index];A a b cB “abc”C abcD ‘abc’

Answer C___________________________________________________________________________________________

What will be the result of the expression 13 & 25?A 38B 25C 9D 12

Answer C___________________________________________________________________________________________

The operator that cannot be overloaded isA ++B : :C ~D ( )

Answer B