sw engg MCQ
-
Upload
prasanna-rasal -
Category
Documents
-
view
1.366 -
download
1
description
Transcript of sw engg MCQ
Assertions are conditions which are true at the point of executionA AlwaysB SometimesC Many timesD No time
Answer A___________________________________________________________________________________________
Top down approach is used forA DevelopmentB Identification of faultsC Testing and validationD Reverse engineering
Answer A___________________________________________________________________________________________
The first item defined for a new system is itsA StorageB OutputsC InputsD Processing
Answer B___________________________________________________________________________________________
Software engineering primarily aims onA reliable softwareB cost effective softwareC reliable and cost effective softwareD none of the above
Answer C___________________________________________________________________________________________
Output comparators are used inA Static testing of single moduleB Dynamic testing of single moduleC Static testing of single and multiple moduleD Dynamic testing of single and multiple module
Answer D___________________________________________________________________________________________
The feature of the object oriented paradigm which helps code reuse isA ObjectB ClassC InheritanceD Aggregation
Answer C___________________________________________________________________________________________
A key concept of quality control is that all work productsA Are delivered on time and under budgetB Have complete documentationC Have measurable specification for process outputsD Are thoroughly tested before delivery to the customer
Answer C___________________________________________________________________________________________
What are the three generic phases of software engineering?A Definition, development, supportB What, how, whereC Programming, debugging, maintenanceD Analysis, design, testing
Answer A___________________________________________________________________________________________
Coupling and cohesion can be represented using aA Cause-effect graphB Dependence matrixC Structure chartD SRS
Answer B___________________________________________________________________________________________
Software feasibility is based on which of the followingA Business and marketing concernsB Scope, constraints, marketC Technology, finance, time, resourcesD Technical prowess of the developers
Answer C
Which one of the items listed below is not one of the software engineering layers ?A ProcessB ManufacturingC MethodD Tools
Answer B___________________________________________________________________________________________
FP-based estimation techniques require problem decomposition based onA Information domain valuesB Project scheduleC Software functionsD Process activities
Answer C___________________________________________________________________________________________
Software deteriorates rather than wears out becauseA Software suffers from exposure to hostile environmentsB Defects are more likely to arise after software has been used oftenC Multiple change requests introduce errors in component interactionsD Software spare parts become harder to order
Answer B___________________________________________________________________________________________
The worst type of coupling isA Data couplingB Control couplingC Stamp couplingD Content coupling
Answer D___________________________________________________________________________________________
Function point metric of a software also depends on theA Number of function neededB Number of final users of the softwareC Number of external inputs and outputsD Time required for one set of output from a set of input data
Answer C___________________________________________________________________________________________
Which of the following is not an attribute of software engineeringA EfficiencyB ScalabilityC DependabilityD Usability
Answer C___________________________________________________________________________________________
Which of these is not a characteristic of Personal Software Process?A Emphasizes personal measurement of work productB Practitioner requires careful supervision by the project managerC Individual practitioner is responsible for estimating and schedulingD Practitioner is empowered to control quality of software work products
Answer B___________________________________________________________________________________________
Recorded software attributes can be used in the following endeavours :(i) Cost and schedule estimates.(ii) Software product reliability predictions.(iii) Managing the development process.(iv) No whereA (i) (ii) (iv)B (ii) (iii) (iv)C (i) (ii) (iii)D (i) (ii) (iii) (iv)
Answer C___________________________________________________________________________________________
A feasibility study should focus onA Technical feasibilityB Economic feasibilityC Operational feasibiltyD All of these
Answer D___________________________________________________________________________________________
Which is not a size metric?A LOCB Function countC Program lengthD Cyclomatic complexity
Answer D
The level at which the software uses scarce resources isA ReliabilityB EfficiencyC PortabilityD All of the above
Answer B___________________________________________________________________________________________
If the objects focus on the problem domain, then we are concerned withA Object Oriented AnalysisB Object Oriented DesignC Object Oriented Analysis & DesignD None of the above
Answer A___________________________________________________________________________________________
Which one of the following ISO standard is used for software process?A ISO 9000B ISO 9001C ISO 9003D ISO 9000-3
Answer D___________________________________________________________________________________________
Software Engineering is a discipline that integrates _________ for the development of computer software.A ProcessB MethodsC ToolsD All
Answer D___________________________________________________________________________________________
What is the first stage in program development ?A Specification and designB System AnalysisC TestingD None of the above
Answer B___________________________________________________________________________________________
Pseudocode can replaceA FlowchartsB Structure chartsC Decision tablesD Cause-effect graphs
Answer A___________________________________________________________________________________________
Modules X and Y operate on the same input and output data, then the cohesion isA SequentialB CommunicationalC ProceduralD Logical
Answer B___________________________________________________________________________________________
Main aim of software engineering is to produceA ProgramB SoftwareC Within budgetD Software within budget in the given schedule
Answer D___________________________________________________________________________________________
IEEE 830-1993 is a IEEE recommended standard forA Software requirement specificationB Software designC TestingD Both (A) and (B)
Answer A___________________________________________________________________________________________
CASE Tool isA Computer Aided Software EngineeringB Component Aided Software EngineeringC Constructive Aided Software EngineeringD Computer Analysis Software Engineering
Answer A
Key process areas of CMM level 4 are also classified by a process which isA CMM level 2B CMM level 3C CMM level 5D All of the above
Answer C___________________________________________________________________________________________
Applications-softwareA is used to control the operating systemB includes programs designed to help programmersC performs a specific task for computer usersD all of the above
Answer C___________________________________________________________________________________________
User interface design involves following issuesA Error message handlingB System response timeC Command labellingD All of these
Answer D___________________________________________________________________________________________
Which of the items listed below is not one of the software engineering layers?A ProcessB ToolsC MethodsD Manufacturing
Answer D___________________________________________________________________________________________
Which of the following are advantages of using LOC (lines of code) as a size oriented metric?A LOC is easily computedB LOC is a language dependent measureC LOC is a language independent measureD LOC can be computed before a design is completed
Answer A___________________________________________________________________________________________
FAST stands forA Functional Application Specification TechniqueB Fast Application Specification TechniqueC Facilitated Application Specification TechniqueD None of the above
Answer C___________________________________________________________________________________________
An object encapsulatesA DataB BehaviourC StateD Both Data and behaviour
Answer D___________________________________________________________________________________________
Which of the following statements is trueA Abstract data types are the same as classesB Abstract data types do not allow inheritanceC Classes cannot inherit from the same base classD Object have state and behavior
Answer B___________________________________________________________________________________________
The ISO quality assurance standard that applies to software engineering isA ISO 9000B ISO 9001C ISO 9002D ISO 9003
Answer B___________________________________________________________________________________________
The main activity of the design phase of the system life cycle is toA Replace the old system with new oneB Develop and test the new systemC Understand the current systemD Propose alternatives to the current system
Answer D
In the light of software engineering software consists ofA In the light of software engineering software consists ofB DataC DocumentationD All of the above
Answer D___________________________________________________________________________________________
The desired level of coupling isA No couplingB Control couplingC Common couplingD Data coupling
Answer D___________________________________________________________________________________________
The problem that threatens the success of a project but which has not yet happened is aA BugB ErrorC RiskD Failure
Answer C___________________________________________________________________________________________
The tools that support different stages of software development life cycle are calledA CASE toolsB CAME toolsC CAQE toolsD CARE tools
Answer A___________________________________________________________________________________________
The incremental model of software development isA A reasonable approach when requirements are well definedB A good approach when a working core product is required quicklyC The best approach to use for projects with large development teamsD A revolutionary model that is not used for commercial products
Answer B___________________________________________________________________________________________
Waterfall model is aA Linear modelB Iterative modelC Rapid modelD Interactive model
Answer A___________________________________________________________________________________________
Which leads to blocking states in which some project team members must wait for the other members of the team to complete dependent tasks?A Ad hoc approach of prototypingB Iterative nature of spiral modelC Linear nature of classic life cycleD None of the above
Answer C___________________________________________________________________________________________
Many causes of the software crisis can be traced to mythology based onA Management MythsB Customer MythsC Practitioner MythsD All of the above
Answer D___________________________________________________________________________________________
Prototyping is used toA test the software as an end productB expand design detailsC refine and establish requirements gatheringD None of the above
Answer C___________________________________________________________________________________________
The most important feature of spiral model isA Requirement analysisB Risk managementC Quality managementD Configuration management
Answer B
Which phase is not available in software life cycle?A CodingB TestingC MaintenanceD Abstraction
Answer D___________________________________________________________________________________________
Which model is popular for students small projects ?A Waterfall ModelB Spiral ModelC Quick and Fix modelD Prototyping Model
Answer A___________________________________________________________________________________________
Which is the most important feature of spiral model?A Quality managementB Risk managementC Performance managementD Efficiency management
Answer B___________________________________________________________________________________________
Evolutionary software process modelsA Are iterative in natureB Can easily accommodate product requirements changesC Do not generally produce throw away systemsD All of the above
Answer D___________________________________________________________________________________________
Waterfall model is also calledA Classical Life Cycle modelB Customer modelC RADD Spiral model
Answer A___________________________________________________________________________________________
To which phase of SDLC, in file conversion related?A System designB System developmentC System analysisD System implementation
Answer D___________________________________________________________________________________________
The model in which the requirements are implemented by category isA Evolutionary Development ModelB Waterfall ModelC PrototypingD Iterative Enhancement Model
Answer A___________________________________________________________________________________________
For a data entry project for office staff who have never used computers before (user interface and user-friendliness are extremely important), one will useA Spiral modelB Component based modelC PrototypingD Waterfall model
Answer C___________________________________________________________________________________________
What is an incremental software process model that emphasize an extremely short development cycle?A RADB PrototypingC SpiralD None of these
Answer A___________________________________________________________________________________________
Which of these terms is a level name in the Capability Maturity Model?A Ad hocB RepeatableC ReusableD Organized
Answer C
For a well understood data processing application it is best to useA The waterfall modelB Prototyping modelC The evolutionary modelD The spiral model
Answer A___________________________________________________________________________________________
A major defect in waterfall model in software development is thatA The documentation is difficultB A blunder at ant stage can be disastrousC A trial version is available at the end of the projectD The maintenance of the software is difficult
Answer C___________________________________________________________________________________________
A COCOMO model isA Common Cost Estimation ModelB Constructive Cost Estimation ModelC Complete Cost Estimation ModelD Comprehensive Cost Estimation Model
Answer B___________________________________________________________________________________________
The model remains operative until the software is retiredA WaterfallB IncrementalC SpiralD None of these
Answer C___________________________________________________________________________________________
Spiral model begins withA DesignB Risk analysisC CodingD Customer communication
Answer D___________________________________________________________________________________________
Which model is simplest model in Software Development ?A Waterfall modelB PrototypingC IterativeD None of these
Answer A___________________________________________________________________________________________
Prototyping is preferred byA CustomerB DeveloperC No oneD Both
Answer B___________________________________________________________________________________________
Process models are described as agile because theyA Eliminate the need for cumbersome documentationB Emphasize maneuverability and adaptabilityC Do not waste development time on planning activitiesD Make extensive use of prototype creation
Answer B___________________________________________________________________________________________
Waterfall model is not suitable for ?A Small ProjectsB Complex ProjectsC Accommodating changeD None of Above
Answer C___________________________________________________________________________________________
The formal methods model of software development makes use of mathematical methods toA Define the specification for computer based systemsB Develop defect free computer based systemsC Verify the correctness of computer based systemsD All of the above
Answer D
In the spiral model ‘risk analysis’ is performedA In the first loopB In the first and second loopC In every loopD Before using spiral model
Answer C___________________________________________________________________________________________
An SRSA establishes the basis for agreement between client and the
supplier.B provides a reference for validation of the final productC is a prerequisite to high quality softwareD all of the above.
Answer D___________________________________________________________________________________________
The prototyping model of software development isA A reasonable approach when requirements are well definedB A useful approach when a customer cannot define requirements clearlyC The best approach to use for projects with large development teamsD A risky model that rarely produces a meaningful product
Answer B___________________________________________________________________________________________
The model that assumes that effort and development time are functions of product size alone isA Basic COCOMO modelB Intermediate COCOMO modelC Detailed COCOMO modelD All the three COCOMO models
Answer A___________________________________________________________________________________________
The component based development model isA Only appropriate for computer hardware designB Not able to support the development of reusable componentsC Works best when object technologies are available for supportD Not cost effective by known quantifiable software metrics
Answer C___________________________________________________________________________________________
The COCOMO model was introduced in the book title “Software Engineering Economics” authored byA Abraham SilberschatzB Barry BoehmC C.J. DateD D.E. Knuth
Answer B___________________________________________________________________________________________
The spiral model of software developmentA Ends with the delivery of the software productB Is more chaotic than the incremental modelC Includes project risks evaluation during each iterationD All of the above
Answer C___________________________________________________________________________________________
Prototyping model begin withA Test prototypeB CodingC Requirement gatheringD None of the above
Answer B___________________________________________________________________________________________
The concurrent development model isA Another name for the rapid application development modelB Often used for the development of client/server applicationsC Only used for development of parallel or distributed systemsD Used whenever a large number of change requests are anticipated
Answer B___________________________________________________________________________________________
LOC measure is aA Size oriented metricsB Function oriented metricsC Both a and bD None of the above
Answer A
Which of these are the 5 generic software engineering framework activities ?A Communication, planning, modelling, construction, deploymentB Communication, risk management, measurement, production, reviewingC Analysis, designing, programming, Debugging, maintenanceD Analysis, planning, designing, programming, testing
Answer A___________________________________________________________________________________________
Modifying the software to match changes in the ever changing environment is calledA Adaptive maintenanceB Corrective maintenanceC Perfective maintenanceD Preventive maintenance
Answer A___________________________________________________________________________________________
Which is not a step of requirement engineering?A Requirements elicitationB Requirements analysisC Requirements designD Requirements documentation
Answer C___________________________________________________________________________________________
The Warnier diagram enables analystA to represent information hierarchy in a compact mannerB to further identify requirementC to estimate the total cost involvedD None of the above
Answer A___________________________________________________________________________________________
Requirements can be refined usingA The waterfall modelB Prototyping modelC The evolutionary modelD The spiral model
Answer B___________________________________________________________________________________________
During which phase ,the requirement analysis is performed?A System investigation phaseB System development phaseC System analysis phaseD None of the above
Answer C___________________________________________________________________________________________
The system specification is the first deliverable in the computer system engineering process which does not includeA The system specification is the first deliverable in the computer system engineering process which does not
includeB CostC ScheduleD Technical Analysis
Answer A___________________________________________________________________________________________
SRD stands forA Software requirements definitionB Structured requirements definitionC Software requirements diagramD Structured requirements diagram
Answer B___________________________________________________________________________________________
If every requirement can be checked by a cost-effective process, then the SRS isA VerifiableB TraceableC ModifiableD Complete
Answer A___________________________________________________________________________________________
Structured charts are a product ofA Requirements gatheringB Requirements analysisC DesignD Coding
Answer C
If every requirement stated in the Software Requirement Specification (SRS) has only one interpretation, SRS is said to beA CorrectB UnambiguousC ConsistentD Verifiable
Answer B___________________________________________________________________________________________
If a program in its functioning has not met user requirements is some way, then it isA An errorB A failureC A faultD A defect
Answer D___________________________________________________________________________________________
Capability Maturity Model is meant forA ProductB ProcessC Product and ProcessD None of the above
Answer B___________________________________________________________________________________________
Which design model is analogous to the detailed drawings of the access points and external utilities for a house?A Architectural designB Component-level designC Data designD Interface design
Answer D___________________________________________________________________________________________
Which of the following models can be used to represent the architectural design of a piece of software?A Dynamic modelsB Functional modelsC Structural modelsD All of these
Answer D___________________________________________________________________________________________
Design phase will usually beA top-downB bottom-upC randomD centre fringing
Answer A___________________________________________________________________________________________
In a function oriented design, weA minimize cohesion and maximize couplingB maximize cohesion and minimize couplingC maximize cohesion and maximize couplingD minimize cohesion and minimize coupling
Answer B___________________________________________________________________________________________
Content design is conducted byA Copywriters and graphic designerB Web engineersC Both a and bD None of the above
Answer C___________________________________________________________________________________________
Top-down design does not requireA step-wise refinementB loop invariantsC flow chartingD modularity
Answer B___________________________________________________________________________________________
Design phase will usually beA Top downB Bottom upC RandomD Centre fringing
Answer A
Which of the following is not a characteristics common to all design methods?A Configuration managementB Functional componentC Notation quality assessmentD Guidelines refinement heuristics
Answer A___________________________________________________________________________________________
The importance of software design can be summarized in a single wordA AccuracyB ComplexityC EfficiencyD Quality
Answer D___________________________________________________________________________________________
In object oriented design of software , objects haveA Attributes and names onlyB Operations and names onlyC Attributes, name and operationsD None of above
Answer C___________________________________________________________________________________________
Which design is analogous to the floor plan of a house?A Architectural designB Component-level designC Data designD Interface design
Answer A___________________________________________________________________________________________
Data structure suitable for the application is discussed inA Data designB Architectural designC Procedural designD Interface design
Answer A___________________________________________________________________________________________
The approach to software testing is to design test cases toA Break the softwareB Understand the softwareC Analyze the design of sub processes in the softwareD Analyze the output of the software
Answer D___________________________________________________________________________________________
Alpha and Beta Testing are forms ofA Acceptance testingB Integration testingC System TestingD Unit testing
Answer A___________________________________________________________________________________________
“Black” refers in the “Black-box” testing meansA Characters of the movie “Black”B I / O is hiddenC Design is hiddenD Users are hidden
Answer C___________________________________________________________________________________________
Regression testing is primarily related toA Functional testingB Data flow testingC Development testingD Maintenance testing
Answer D___________________________________________________________________________________________
White box testing, a software testing technique is sometimes calledA Basic pathB Graph TestingC DataflowD Glass box testing
Answer D
While unit testing a module, it is found that for a set of test data, maximum 90% of the code alone were tested with a probability of success 0.9. The reliability of the module isA Atleast greater than 0.9B Equal to 0.9C Atmost 0.81D Atleast 1/0.81
Answer C___________________________________________________________________________________________
What are the testing levels?A Unit testingB Integration testingC System testing and acceptanceD All of the above
Answer D___________________________________________________________________________________________
Function testing is known asA Structural testingB Behavior testingC Regression testingD None of these
Answer B___________________________________________________________________________________________
The main purpose of integration testing is to findA Design errorsB Analysis errorsC Procedure errorsD Interface errors
Answer D___________________________________________________________________________________________
Which of the following graph theoretic concept will be useful in software testing?A Cyclomatic numberB Hamiltonian circuitC Eulerian cycleD None of the above
Answer A___________________________________________________________________________________________
A non functional software testing done to check if the user interface is easy to use and understandA Usability testingB Security testingC Unit testingD Black box testing
Answer A___________________________________________________________________________________________
One of the fault base testing techniques isA Unit testingB Beta testingC Stress testingD Mutation testing
Answer D___________________________________________________________________________________________
A fault simulation testing technique isA Mutation testingB Stress testingC Black box testingD White box testing
Answer A___________________________________________________________________________________________
The testing that focuses on the variables is calledA Black box testingB White box testingC Data variable testingD Data flow testing
Answer A___________________________________________________________________________________________
OPERATING SYSTEM
Multiprogramming systems
Which of the following testing methods is normally used as the acceptance test for a software system?A Regression testingB Integration testingC Unit testingD Functional testing
Answer D
AAre easier to develop than single programming systemsB
Execute each job faster
C Execute more jobs in the same time periodD Are used only one large mainframe computers
Answer C___________________________________________________________________________________________
The operating system creates _____ from the physical computerA Virtual spaceB Virtual computersC Virtual deviceD None
Answer B___________________________________________________________________________________________
The primary purpose of an operating system isA To make the most efficient use of the computer hardwareB To allow people to use the computerC To keep systems programmers employedD To make computers easier to use
Answer A___________________________________________________________________________________________
Overlay isA A part of Operating SystemB A specific memory locationC A single contiguous memory that was used in the olden days for running large programs by swappingD Overloading the system with many user files
Answer C___________________________________________________________________________________________
Link encryptionA Is more secure than end to end encryptionB Is less secure than end to end encryptionC Cannot be used in a large networkD Is used only detect errors
Answer B___________________________________________________________________________________________
Which is built directly on the hardware?A Computer EnvironmentB Application SoftwareC Operating SystemD Database System
Answer C___________________________________________________________________________________________
An operating systemA Is not required on large computersB Is always supplied with the computerC Is always supplied with the BASICD Consists of programs that help in the operation of computer
Answer D___________________________________________________________________________________________
Which of the following is not supported by the operating system?A ProtectionB AccountingC CompilationD I/O operation
Answer C___________________________________________________________________________________________
Remote Computing Service involves the use of time sharing and _______.A multi-processingB interactive processingC batch processingD real-time processing
Answer C___________________________________________________________________________________________
Dijkestra banking algorithm in an operating system, solves the problem ofA Deadlock avoidanceB Deadlock recoveryC Mutual exclusionD Context switching
Answer A
CPU does not perform the operationA Data transferB Logic operationC Arithmetic operationD All of the above
Answer D___________________________________________________________________________________________
An example of an operating system is _______________A Windows XPB UNIX or LINUXC MAC OSD All of the above
Answer D___________________________________________________________________________________________
Two basic two types of record access methods areA Sequential and randomB Direct and immediateC Sequential and indexedD Online and real time
Answer A___________________________________________________________________________________________
A chip having 150 gates will be classified asA MSIB SSIC LSID VLSI
Answer A___________________________________________________________________________________________
Which of the following Operating System does not implement multitasking truly?A Windows 98B Windows NTC Windows XPD MS DOS
Answer D___________________________________________________________________________________________
Which of the following is an example of a spooled device?A The terminal used to enter the input data for a program being executed.B The secondary memory device in a virtual memory system.C A line printer used to print the output of a number of jobs.D None of the above.
Answer C___________________________________________________________________________________________
Which runs on computer hardware and serve as platform for other software to run on?A Operating SystemB Application SoftwareC System SoftwareD All
Answer A___________________________________________________________________________________________
Execution of two or more programs by a single CPU is known asA MultiprocessingB Time sharingC MultiprogrammingD None of the above
Answer C___________________________________________________________________________________________
A bootstrap isA A memory deviceB A device to support the computerC A small initialisation program to start up a computerD An error correction technique
Answer C___________________________________________________________________________________________
Memory on your computer where data is stored temporarily is called __________.A RAMB ROMC BIOSD CPU
Answer A
______ is used in operating system to separate mechanism from policyA Single level implementationB Two level implementationC Multi level implementationD None
Answer B___________________________________________________________________________________________
Object modules generated by assembler that contains unresolved external references are resolved for two or more object module by a/anA Operating systemB LoaderC LinkerD Compiler
Answer C___________________________________________________________________________________________
Which is the first program run on a computer when the computer boots up?A System softwareB Operating systemC System operationsD None
Answer B___________________________________________________________________________________________
Object code is the output of ______.A Operating SystemB Compiler or AssemblerC only AssemblerD only Compiler
Answer B___________________________________________________________________________________________
WINDOWS is a _________ operating.A Real timeB Multi-userC PreemptiveD Non-preemptive
Answer C___________________________________________________________________________________________
The multiuser operating system, 20 requests are made to use a particular resource per hour, on an average the probability that no request are made in 45 minutes isA e-15
B e-5
C 1 – e-5
D 1 – e-10
Answer A___________________________________________________________________________________________
Fence register is used forA CPU protectionB Memory protectionC File protectionD All of the above
Answer B___________________________________________________________________________________________
The operating system that reads and reacts in terms of actual time isA Batch systemB Quick response systemC Real time systemD Time sharing system
Answer C___________________________________________________________________________________________
Dirty bit is used to showA Page with corrupted dataB Wrong page in the memoryC Page that is modified after being loaded into cache memoryD Page that is less frequently accessed
Answer C___________________________________________________________________________________________
What is a shell ?A It is a hardware componentB It is a command interpreterC It is a part in compilerD It is a tool in CPU scheduling
Answer B
Which is the layer of a computer system between the hardware and the user programA Operating environmentB Operating systemC System environmentD None
Answer B___________________________________________________________________________________________
A page fault means that we referenced a pageA Outside the memory boundariesB With an incorrect I/O requestC That was not in secondary storageD That was not in main memory
Answer D___________________________________________________________________________________________
Protection against computer virusesA PreventionB Practice of safe computingC Purchasing unopened software from vendorsD Avoiding free or pirated copies from public sources
Answer D___________________________________________________________________________________________
A relationship between processes such that each has some part (critical section) which must not be executed while the critical section of another is being executed, is known asA SemaphoreB Mutual exclusionC MultiprogrammingD Message passing
Answer B___________________________________________________________________________________________
Which of the following information bits used by the various page replacement policies indicates if the page has been called lately?A Locality bitB Status bitC Referenced bitD Modified bit
Answer C___________________________________________________________________________________________
A sequence of instructions,in a computer language to get the desired result is known asA ProcessB ProgramC SoftwareD None of these
Answer A___________________________________________________________________________________________
Which is not the state of the process ?A BlockedB RunningC ReadyD Privileged
Answer D___________________________________________________________________________________________
A process executes the codefork();fork();fork();A 3B 4C 7D 8
Answer C___________________________________________________________________________________________
Given memory partitions of 100K, 500K, 200K, 300K and 600K (in order) and processes of 212K, 417K, 112K, and 426K (in order), using the first-fit algorithm in which partition would the process requiring 426K be placed?A 100KB 500KC 200KD 600K
Answer D___________________________________________________________________________________________
The only transition that is initiated by the user process itself isA BlockB DispatchC Wake upD None of Above
Answer A
Round robin scheduling is essentially the preemptive version of ________A FIFOB Shortest job firstC Shortest remainingD Longest time first
Answer A___________________________________________________________________________________________
The operating system of a computer serves as a software interface between the user andA SoftwareB HardwareC ProcessorD Compiler
Answer C___________________________________________________________________________________________
The mechanism that bring a page into memory only when it is needed is calledA SegmentationB FragmentationC Demand PagingD Page Replacement
Answer C___________________________________________________________________________________________
With a four programs in memory and with 80% average I/O wait, the CPU utilization is?A 60%B 70%C 90%D 100%
Answer A___________________________________________________________________________________________
In time sharing operating system ,when the time slot given to a process is completed ,the process goes from running state to theA Blocked stateB Ready stateC Suspended stateD Terminated state
Answer B___________________________________________________________________________________________
Situations where two or more processes are reading or writing some shared datas and the final result depends on who runs precisely when are calledA Race conditionsB Critical sectionsC Mutual exclusionsD Message passing
Answer A___________________________________________________________________________________________
Switching the CPU to another Process requires to save state of the old process and loading new process state is called asA Process BlockingB Context SwitchC Time SharingD None of the above
Answer B___________________________________________________________________________________________
A page faultA is an error specific page.B is an access to the page not currently in memory.C occur when a page program occur in a page memory.D page used in the previous page reference.
Answer B___________________________________________________________________________________________
Cooperating processes canA Only share a logical address space directly that is, both code and dataB Access concurrently to shared data may result in data consistencyC Either directly share a logical address space or be allowed to share data only through
files or messagesD None of these responses are correct
Answer C___________________________________________________________________________________________
A program is located in the smallest available hole in the memory is _________A best – fitB first – bitC worst – fitD buddy
Answer A
A program in execution is calledA ProcessB InstructionC ProcedureD Function
Answer A___________________________________________________________________________________________
In the blocked stateA The processes waiting for I/O are foundB The process which is running is foundC The processes waiting for the processor are foundD None of the above
Answer A___________________________________________________________________________________________
A process executes the codefork();fork();fork();The total number of child processes created isA 3B 4C 7D 8
Answer C___________________________________________________________________________________________
Several processes access and manipulate the same data concurrently and the outcome of the execution depends on the particular order in which the access takes place, is called a(n) ____________________ .A Shared memory segmentsB Race conditionC Entry sectionD Process synchronization
Answer B___________________________________________________________________________________________
A threadA Is a lightweight process where the context switching is lowB Is a lightweight process where the context switching is highC Is used to speed up pagingD None of the above
Answer A___________________________________________________________________________________________
Inter process communicationA Is never necessaryB Allows processors to synchronizeC Is required for all processesD Is usually done via disk drives
Answer B___________________________________________________________________________________________
In round robin CPU scheduling as time quantum is increased the average turn around timeA increasesB decreasesC remains constantD varies irregularly
Answer D___________________________________________________________________________________________
Pre-emptive scheduling is the strategy of temporarily suspending a gunning processA before the CPU time slice expiresB to allow starving processes to runC when it requests I/OD to avoid collision
Answer A___________________________________________________________________________________________
Cascading termination refers to termination of all child processes before the parent terminatesA NormallyB AbnormallyC Normally or abnormallyD None of these
Answer C___________________________________________________________________________________________
A special software that is used to create a job queue is calledA DriveB SpoolerC InterpreterD Linkage editor
Answer B
Assume N segments in memory and a page size of P bytes. The wastage on account of internal fragmentation isA NP/2 bytesB P/2 bytesC N/2 bytesD NP bytes
Answer A___________________________________________________________________________________________
In Round Robin cpu scheduling as the time quantum is increased ,the average turn around timeA IncreasesB DecreasesC Remains constantD Varies irregularly
Answer D___________________________________________________________________________________________
Consider the following transactions with data items P and Q initialized to zero:T1 :read (P);read (Q);if P = 0 then Q := Q + 1 ;write (Q).T2 : read (Q);read (P);if Q = 0 then P := P + 1 ;write (P).Any non-serial interleaving of T1 and T2 for concurrent execution leads toA a serializable scheduleB a schedule that is not conflict serializableC a conflict serializable scheduleD a schedule for which a precedence graph cannot be drawn
Answer B___________________________________________________________________________________________
Mutual exclusion problem occurs betweenA Two disjoint processes that do not interactB Processes that share resourcesC Processes that don not use the same rssourcesD None of these
Answer B___________________________________________________________________________________________
Consider a logical address space of 8 pages of 1024 words mapped with memory of 32 frames. How many bits are there in the physical address ?A 9 bitsB 11 bitsC 14 bitsD 15 bits
Answer D___________________________________________________________________________________________
________ synchronizes critical resources to prevent dead lockA P-operatorB V-operatorC SemaphoreD Swapping
Answer C___________________________________________________________________________________________
___________ is a technique of improving the priority of process waiting in Queue for CPU allocationA StarvationB AgingC RevocationD Relocation
Answer B___________________________________________________________________________________________
Peterson’s solution to the critical-section problemA Only satisfies mutual exclusion and progress requirementsB Is a hardware synchronization using locksC Is a software-based solutionD All of the above
Answer C___________________________________________________________________________________________
_______ is one of pre-emptive scheduling algorithm.A RRB SSNC SSFD Priority based
Answer A___________________________________________________________________________________________
Match the following :(a) Disk scheduling 1. Round-robin(b) Batch processing 2. SCAN(c) Time sharing 3. LIFO(d) Interrupt processing 4. FIFOA 3 4 2 1B 4 3 2 1C 2 4 1 3D 1 4 3 2
Answer C
Which of the following is scheme to deal with deadlock ?A Time outB Time inC Both (A) & (B)D None of the above
Answer A___________________________________________________________________________________________
Which of the following resources can cause deadlock?A Read only filesB Shared programsC PrintersD All of these
Answer C___________________________________________________________________________________________
A semaphore count of negative n means (s=–n) that the queue contains ________ waiting processes.A n + 1B nC n - 1D 0
Answer B___________________________________________________________________________________________
Resources are allocated to the process on non-sharable basis isA mutual exclusionB hold and waitC no pre-emptionD circular wait
Answer A___________________________________________________________________________________________
In order to allow only one process to enter its critical section, binary semaphore are initialized toA 0B 1C 2D 3
Answer B___________________________________________________________________________________________
Consider the following page trace : 4,3, 2, 1, 4, 3, 5, 4, 3, 2, 1, 5. Percentage of page fault that would occur if FIFO page replacement algorithm is used with number of frames for the JOB m=4 will beA 8B 9C 10D 12
Answer C___________________________________________________________________________________________
A system has 3 processes sharing 4 resources.If each process needs a maximum of 2 units ,thenA Deadlock can never occurB Deadlock may occurC Deadlock has to occurD None of these
Answer A___________________________________________________________________________________________
Consider the methods used by processes P1 and P2 for accessing their critical sections. The initial values of shared Boolean variables S1 and S2 are randomly assigned,P1 P2while (S1 = = S2); while (S1 = = S2);critical section critical sectionS1 = S2; S1 = S2;Which one of the following statements describes the properties achieved ?A Mutual exclusion but not progressB Progress but not mutual exclusionC Neither mutual exclusion nor progressD Both mutual exclusion and progress
Answer C___________________________________________________________________________________________
The scheduling in which CPU is allocated to the process with least CPU-burst time is calledA Priority SchedulingB Shortest job first SchedulingC Round Robin SchedulingD Multilevel Queue Scheduling
Answer B___________________________________________________________________________________________
The simplest way to break a deadlock is toA Preempt a resourceB RollbackC Kill one of the processesD Lock one of the processes
Answer C
A scheduler which selects processes from secondary storage device is calledA Short term schedulerB Long term schedulerC Medium term schedulerD Process scheduler
Answer C___________________________________________________________________________________________
Banker s algorithm for resource allocation deals withA Deadlock preventionB Deadlock avoidanceC Deadlock recoveryD Mutual exclusion
Answer B___________________________________________________________________________________________
Interval between the time of submission and completion of job is calledA Waiting timeB Turn around timeC ThroughputD Response time
Answer B___________________________________________________________________________________________
What problem is solved by Dijkstra’s Banker’s algorithm?A Mutual exclusionB Deadlock recoveryC Deadlock avoidanceD Cache coherence
Answer B___________________________________________________________________________________________
In the process management Round-robin method is essentially the pre-emptive version of _________A FILOB FIFOC SSFD Longest time first
Answer B___________________________________________________________________________________________
Which of the following statement is wrong ?I. 2-phase locking protocol suffer from dead lock.II. Time stamp protocol suffer from more aborts.III. A block hole in a DFD is a data store with only inbound flows.IV. Multivalued dependency among attribute is checked at 3 NF level.V. An entity-relationship diagram is a tool to represent event model.A I, II, IIB II, III, IVC III, IV, VD II, IV, V
Answer A___________________________________________________________________________________________
The completion order of the 3 processes under the policies FCFS and RR2 (round robin scheduling with CPU quantum of 2 time units) areA FCFS: P1, P2, P3 RR2: P1, P2, P3B FCFS: P1, P3, P2 RR2: P1, P3, P2C FCFS: P1, P2, P3 RR2: P1, P3, P2D FCFS: P1, P3, P2 RR2: P1, P2, P3
Answer C___________________________________________________________________________________________
Indefinite blocking is calledA DeadlockB StarvationC Both a and bD None of these
Answer B___________________________________________________________________________________________
A solution to the critical section problem must satisfy which requirements?A Bounded waiting, monitor and relative speedB Semaphores, monitor and prevention of deadlockC Signal, wait and continueD Mutual exclusion, progress and bounded waiting
Answer D___________________________________________________________________________________________
_____________ is one preemptive scheduling algorithm.A Shortest job firstB Round robinC Priority basedD Shortest job next
Answer A
It is not possible to have a deadlock involving only a single process. Why?A This holds mutual exclusion, hold-and-wait and non-preemptionB This follows directly from the hold-and-wait conditionC Because single process not always in safe stateD None of the above
Answer B___________________________________________________________________________________________
A Dead-lock in an Operating System isA Desirable processB Undesirable processC Definite waiting processD All of the above
Answer C___________________________________________________________________________________________
Which of the following approaches do not require knowledge of the system state?A Deadlock detectionB Deadlock preventionC Deadlock avoidanceD None of the above
Answer D___________________________________________________________________________________________
The simplest way to break a deadlock is toA Preempt a resourceB RollbackC Kill one of the processesD Lock one of the processes
Answer C___________________________________________________________________________________________
Three concurrent processes X, Y, and Z execute three different code segments that access and update certain shared variables. Process X executes the P operation (i.e., wait) on semaphores a, b and c; process Y executes the P operation on semaphores b, c and d; process Z executes the P operation on semaphores c, d, and a before entering the respective code segments. After completing the execution of its code segment, each process invokes the V operation (i.e., signal) on its three semaphores. All semaphores are binary semaphores initialized to one. Which one of the following represents a deadlock- free order of invoking the P operations by the processes?A X : P (a ) P (b) P (c ) Y : P (b ) P (c) P (d) Z : P (c ) P (d) P (a)B X : P (b ) P (a) P (c ) Y : P (b ) P (c) P (d) Z : P (a ) P (c ) P (d)C X : P (b ) P (a) P (c ) Y : P (c ) P (b) P (d) Z : P (a ) P (c ) P (d)D X : P (a ) P (b) P (c ) Y : P (c ) P (b) P (d) Z : P (c ) P (d) P (a)
Answer B___________________________________________________________________________________________
The register or main memory location which contains the effective address of the operand is known asA pointerB special locationC indexed registerD None of the above
Answer A___________________________________________________________________________________________
A file system with 300 GByte disk uses a file descriptor with 8 direct block addresses, 1 indirect block address and 1 doubly indirect block address. The size of each disk block is 128 Bytes and the size of each disk block address is 8 Bytes. The maximum possible file size in this file system isA 3 KBytesB 35 KBytesC 280 KBytesD dependent on the size of the disk
Answer B___________________________________________________________________________________________
Which of the following scheduling policy is well suited for time shared operating system?A Shortest job firstB Round robinC First com first serveD Elevator
Answer B___________________________________________________________________________________________
The maximum amount of information that is available in one portion of the disk access arm for a removal disk pack (without further movement of the arm with multiple heads)A A plate of dataB A cylinder of dataC A track of dataD A block of data
Answer B___________________________________________________________________________________________
Memory management isA Not used in modern operating systemB Replaced with virtual memory on current systemsC Not used on multiprogramming systemsD Critical for even the simplest operating systems
Answer D
The purpose of a Memory Management Unit is to ___________ .A Perform run-time mapping from virtual to physical addressesB Ensure protection of the memory space allocated to every processC Both A and B are correct responsesD None of these responses is correct
Answer A___________________________________________________________________________________________
In virtual memory systems, Dynamic address translationA Is the hardware necessary to implement pagingB Stores pages at a specific location on diskC Is useless when swapping is usedD Is part of the operating system paging algorithm
Answer A___________________________________________________________________________________________
Assertion(A): Bit maps are not often used in memory management.Reason(R): Searching a bitmap for a run of given length is a slow operation.A Both (A) and (R) are true and (R) is correct explanation for (A)B Both(A) and (R) are true but (R) is not correct explanation for (A)C (A) is true (R) is falseD (A) is false (R) is true
Answer A___________________________________________________________________________________________
The performance of cache memory is frequently measured in terms of a quantity calledA Bit ratioB Nor ratioC No ratioD Hit ratio
Answer D___________________________________________________________________________________________
In which of the following page replacement policies Balady’s anomaly occurs?A FIFOB LRUC LFUD NRU
Answer A___________________________________________________________________________________________
Suppose it takes 100 ns to access a page table and 20 ns to access associative memory with a 90% hit rate, the average access time equals:A 20 nsB 28 nsC 90 nsD 100 ns
Answer B___________________________________________________________________________________________
Moving process from main memory to disk is calledA SchedulingB CatchingC SwappingD Spooling
Answer C___________________________________________________________________________________________
Virtual memory isA related to virtual realityB a form of ROMC a form of RAMD None of the above
Answer C___________________________________________________________________________________________
___________ is a technique of temporarily removing inactive programs from the memory of computer system.A SwappingB SpoolingC SemaphoreD Scheduler
Answer A___________________________________________________________________________________________
Fragmentation of the file systemA Occurs only if file system is used improperlyB Can always be preventedC Can be temporarily removed by compactionD Is the characteristic of all the file systems
Answer C
The size of the virtual memory depends on the size of theA Data busB Main memoryC Address busD None of the above
Answer C___________________________________________________________________________________________
Variable partition memory management technique with compaction results inA Reduction of fragmentationB Minimal wastageC Segment sharingD None of the above
Answer A___________________________________________________________________________________________
Loading operating system from secondary memory to primary memory is calledA CompilingB BootingC RefreshingD Reassembling
Answer B___________________________________________________________________________________________
Paging is a memory management scheme that ___________________.A Permits the logical address space of a process to be noncontiguousB Avoids external fragmentation and the need for compactionC Solves the considerable problem of fitting memory chunks of fixed sizes onto the backing storeD All of the above
Answer B___________________________________________________________________________________________
A static partitioned memory management system has a total of six partitions. If one is allocated to the operating system, this will allow a total ofA Five user jobsB Six user jobsC Thirty-two user jobsD Thirty-six user jobs
Answer A___________________________________________________________________________________________
Consider the virtual page reference string1, 2, 3, 2, 4, 1, 3, 2, 4, 1on a demand paged virtual memory system running on a computer system that has main memory size of 3 page frames which are initially empty. Let LRU, FIFO and OPTIMAL denote the number of page faults under the corresponding page replacement policy. ThenA OPTIMAL < LRU < FIFOB OPTIMAL < FIFO < LRUC OPTIMAL = LRUD OPTIMAL = FIFO
Answer B___________________________________________________________________________________________
Virtual memory can be implemented withA SegmentationB PagingC NoneD All of the above
Answer D___________________________________________________________________________________________
On a disk with 1000 cylinders (0 to 999) find the number of tracks, the disk arm must move to satisfy all the requests in the disk queue. Assume the last request service was at track 345 and the head is moving toward track 0. The queue in FIFO order contains requests for the following tracks :123, 874, 692, 475, 105, 376(Assume SCAN algorithm)A 2013B 1219C 1967D 1507
Answer B___________________________________________________________________________________________
Memory utilization factor shall be computed as followsA Memory in use/allocated memoryB Memory in use/total memory connectedC Memory allocated/total memory availableD Memory committed/total memory available
Answer B___________________________________________________________________________________________
File attributes areA NameB TypeC LocationD All of these
Answer D
Which structure prohibits the sharing of files and directories?A Tree structureB One level structureC Two level structureD None of the these
Answer A___________________________________________________________________________________________
Best method for allocation isA ContiguousB LinkedC IndexD All of these
Answer B___________________________________________________________________________________________
Which one is best for memory allocation?A First fitB Best fitC Worst fitD All of these
Answer B___________________________________________________________________________________________
The simplest directory structure isA Single level directoryB Two level directoryC Tree structure directoryD None of these
Answer C___________________________________________________________________________________________
A tree structured file directory systemA Allows easy storage and retrieval of file namesB Is a much debated unnecessary featureC Is not essential when we have millions of filesD None of the above
Answer A___________________________________________________________________________________________
The file structure that redefines its first record at a base of zero uses the termA Relative organizationB Key fieldingC Dynamic reallocationD Hashing
Answer A___________________________________________________________________________________________
Which of the following types of terminals is entirely dependent for all its capabilities on the computer system to which it is connected?A Smart terminalB Dumb terminalC Micro computerD None of these
Answer B___________________________________________________________________________________________
File record lengthA Should always be fixedB Should always be variableC Depends upon the size of the fileD Should be chosen to match the data characteristics
Answer D___________________________________________________________________________________________
FAT stands forA File Accomodation TableB File Access TapeC File Allocation TableD File Activity Table
Answer C___________________________________________________________________________________________
________ is the time required by a sector to reach below read/write head.A Seek TimeB Latency TimeC Access timeD None
Answer B
Which of the following is the principal difference between a monochrome monitor and an RGB monitor?A Number of electron gunsB ResolutionC SizeD Cost
Answer A___________________________________________________________________________________________
A file sometimes called aA Collection of input dataB Data setC Temporary place to store dataD Program
Answer B___________________________________________________________________________________________
There are no cycles ofA General graph directoryB Cyclic graph directoryC One level directoryD Two level directory
Answer B___________________________________________________________________________________________
Solution of name collision problem isA Single level directoryB Two level directoryC Tree structureD All of these
Answer B___________________________________________________________________________________________
When used with I\O devices the term intelligent impliesA A color output capabilityB Speech processing capabilityC High speed printing capabilityD Features to support off line and online tasks
Answer D___________________________________________________________________________________________
Optical storage is aA high-speed direct access storage device.B low-speed direct access storage device.C medium-speed direct access storage device.D high-speed sequential access storage device.
Answer C___________________________________________________________________________________________
Memory protection is normally done by theA Processor and the associated hardwareB Operating systemC CompilerD User program
Answer A___________________________________________________________________________________________
Program threats areA Trojan horseB Trap doorC Both A and BD None of these
Answer C___________________________________________________________________________________________
Which of the following is the process by which a user’s access to physical data in the application is limited, based on his privileges ?A AuthorizationB AuthenticationC Access ControlD All of these
Answer C___________________________________________________________________________________________
Worm was made upA One programB Two programC Three programD All of these
Answer B
Trojan horseA A code segment that misuses its file is called trojan horseB Good for file accessingC Both A and BD None of these
Answer A___________________________________________________________________________________________
A major security problem for operating system isA Authentication problemB Physical problemC Human problemD None of these
Answer A___________________________________________________________________________________________
To protect system,there are how many security levels?A OneB TwoC ThreeD Four
Answer C___________________________________________________________________________________________
Which of the following topologies consists of multiple CPUs connected by a single communication line running the length of the network?A TreeB RingC StarD Bus
Answer D___________________________________________________________________________________________
Which of the following is the process by which a user’s privileges ascertained ?A AuthorizationB AuthenticationC Access ControlD None of these
Answer A___________________________________________________________________________________________
An audit logA Simply records the timeB UserC Type of all access to an objectD All of these
Answer B___________________________________________________________________________________________
All of the following are examples of real security and privacy risks exceptA HackersB SpamC VirusesD Identify theft
Answer B___________________________________________________________________________________________
Security violation due toA MaliciousB AccidentalC Both A and BD None of these
Answer C___________________________________________________________________________________________
A public key encryption systemA Allows only the correct receiver to decode the data.B Allows only one to decode the transmission.C Allows only the correct sender to decode the data.D Does not encode the data before transmitting it.
Answer A___________________________________________________________________________________________
Which model estimates the total effort in terms of person,months of the technical project staff?A SpiralB WaterfallC PrototypingD COCOMO model
Answer D
Lowest level of security isA AB BC CD D
Answer A___________________________________________________________________________________________
Bootstrap or vector is calledA Grappling hook programB Main programC Secondary programD Primary storage
Answer B___________________________________________________________________________________________
In one time passwordA The password is different in each instanceB The password is same in each instanceC Both A and BD None of these
Answer A___________________________________________________________________________________________
The DIR command in DOS operating systemA Copies filesB Erases filesC Extracts a list of file namesD None of these
Answer C___________________________________________________________________________________________
Malicious access areA Unauthorized reading of dataB Unauthorized modification of dataC Unauthorized destruction of dataD All of these
Answer D___________________________________________________________________________________________
Audit log can be used to determineA How and when the problem occurredB What amount of damage was doneC When security has been violatedD All of these
Answer C___________________________________________________________________________________________
The most common approach to authenticating a user identity isA User passwordB User log inC Hardware deviceD None of these
Answer A___________________________________________________________________________________________
In which model advantage of better testing in software development?A Waterfall modelB PrototypingC IterativeD All of these
Answer C___________________________________________________________________________________________
WEB
Which model reduces the cost of development of software?A Waterfall modelB PrototypingC IterativeD None of these
Answer B
The main function of a browser is toA Compile HTMLB Interpret HTMLC De-compile HTMLD Interpret CGI programs
Answer B___________________________________________________________________________________________
DMSP stands forA Distributed Mail System ProtocolB Distributed Message System ProtocolC Distributed Message System PoolD Distributed Mail System Pool
Answer A___________________________________________________________________________________________
In HTML URI is used toA Create a frame documentB Create a image map in the webpageC Customize the image in the webpageD Identify a name or a resource on the internet
Answer D___________________________________________________________________________________________
Which tags are commonly used by search engines?A HeadingsB TitleC ParagraphD All of these
Answer A___________________________________________________________________________________________
The HTML tags are enclosed withinA Curly bracesB ParenthesesC Angle bracketsD Square brackets
Answer C___________________________________________________________________________________________
A header in CGI script can specifyA Format of the documentB New locat ion of the documentC A and B bothD Start of the document
Answer A___________________________________________________________________________________________
Which of the following tags below are used for multi line text input control?A Textml tagB Text tagC Textarea tagD Both a and b
Answer C___________________________________________________________________________________________
What is the use of web font in HTML?A That is the core font that is used to develop web pagesB That enables to use fonts over the web without installationC That is the special font that is developed by Microsoft corporationD All of the above
Answer B___________________________________________________________________________________________
HTML is defined using SGML – an _______ standard, information processing-text and office systems (SGML) for text information processing.A ISO – 8878B ISO – 8879C ISO – 8880D ISO – 8881
Answer B___________________________________________________________________________________________
The MIME text file is saved withA HMT extensionB HTML extensionC THM extensionD None of these
Answer B
Which of the following attributes below are used for a font name?A FontnameB fnC FontD Face
Answer D___________________________________________________________________________________________
What is the use of forms in HTML?A To display contents of e mailsB To display animation effectC To collect users inputD None of the above
Answer C___________________________________________________________________________________________
Each list item in an ordered or unordered list has which tag?A List tagB Is tagC Li tagD Ol tag
Answer C___________________________________________________________________________________________
Which of the following identifies a specific web page and its computer on the Web?A Web siteB Web site addressC URLD Domain Name
Answer D___________________________________________________________________________________________
Which of the following protocol is not used in the internet?A TelnetB WIRLC HTTPD Gopher
Answer B___________________________________________________________________________________________
Which of the following statement is true?A An XML document can have one root element.B An XML document can have one child element.C XML elements have to be in lower case.D All of the above.
Answer A___________________________________________________________________________________________
Output of XML document can be viewed asA Word processorB Web browserC NotepadD None of the above
Answer B___________________________________________________________________________________________
All exceptions in Java are subclasses of built in class calledA ExceptionB ErrorC ThrowableD Raise
Answer C___________________________________________________________________________________________
XML is aA Imperative languageB Declarative languageC StandardD None of these
Answer B___________________________________________________________________________________________
Node in XML isA Any part of the document whether it is elements ,attributes or otherwiseB Referred only to the attributesC Referred to the top element in the documentD None of these
Answer A
Well formed XML document meansA It contains a root elementB It contain an elementC It contains one or more elementsD Must contain one or more elements and root element must contain all other elements
Answer D___________________________________________________________________________________________
XML DSOs has the property for the number of pages of data the recordset containsA CountB NumberC PagecountD Pagenumber
Answer C___________________________________________________________________________________________
There is a way of describing XML data,how?A XML uses a DTD to describe the data.B XML uses XSL to describe data.C XML uses a description node to describe dataD Both A and C.
Answer D___________________________________________________________________________________________
XML uses the features ofA HTMLB XHTMLC VMLD SGML
Answer D___________________________________________________________________________________________
DOM is aA A parserB SpecificationC Coding styleD None of these
Answer A___________________________________________________________________________________________
XPATH used toA Address your documents by specifying a location pathB Address the serverC Store the IP of the serverD None of these
Answer A___________________________________________________________________________________________
The XML DOM object isA EntityB Entity referenceC Comment referenceD Comment data
Answer B___________________________________________________________________________________________
XML document can be viewed inA IE 3.0B IE 2.0C IE 6.0D IE X.0
Answer C___________________________________________________________________________________________
What is so great about XML?A Easy data exchangeB High speed on networkC Both A and BD None of the above
Answer C___________________________________________________________________________________________
The most popular way to materialize XML document is to useA DTDB XSLTC HTMLD SOAP
Answer B
NamespaceA Distinguishes one XML vocabulary from anotherB Provides the spaces in the namesC Is a querying languageD None of these
Answer A___________________________________________________________________________________________
Which of the following statement is true?A All the statements are true.B All XML elements must have closing tag.C All XML elements must be lower case.D All XML documents must have a DTD.
Answer B___________________________________________________________________________________________
How many root element can an XML document have ?A OneB TwoC ThreeD As many as the memory provides
Answer A___________________________________________________________________________________________
Attributes in XML areA Elements inXMLB Child nodesC A way of attaching characteristics or properties to elements of a documentD None of these
Answer C___________________________________________________________________________________________
Microsoft XML schema data types for hexadecimal digits representing octatesA UIDB UXIDC UUIDD XXID
Answer C___________________________________________________________________________________________
The tags in XML areA Case insensitiveB Case sensitiveC Browser dependentD None of these
Answer B___________________________________________________________________________________________
What is XML?A Subset of SGML,Extensible Markup LanguageB Superset of SGML,Extensible Markup LanguageC Like SGML ,Extended Markup LanguageD None of these
Answer A___________________________________________________________________________________________
XMLA Can be used as a databaseB Cannot be used as a databaseC XML is not a database ,it is languageD None of these
Answer A___________________________________________________________________________________________
CIDR stands forA Classified Internet Domain RoutingB Classless Inter Domain RoutingC Classless Internet Domain RoutingD Classified Inter Domain Routing
Answer B___________________________________________________________________________________________
The term byte stuf fing refers toA Data stuffing used wi th character oriented hardwareB Data stuffing used wi th bi t oriented hardwareC Data stuffing used with both A and BD Data stuffing used wi th byte oriented hardware
Answer A
What are empty elements and is it valid?A No there is no such terms as empty elementB Empty elements are element with no dataC No it is not valid to use empty elementD None of these
Answer B___________________________________________________________________________________________
www is based on which model?A Local serverB Client serverC 3 tierD None of these
Answer B___________________________________________________________________________________________
Let most segment of a name inn DNS representsA Individual NetworkB Individual computerC Domain nameD Network type
Answer B___________________________________________________________________________________________
Characteristic encoding isA Method used to represent numbers in a characterB Method used to represent character in a numberC Not a methodD None of these
Answer A___________________________________________________________________________________________
The web standard allows programmers on many different computer platforms to dispersed format and display the information server.These programs are calledA Web browsersB HTMLC Internet ExplorerD None of these
Answer A___________________________________________________________________________________________
BCC in the internet refers toA Black carbon copyB Blind carbon copyC Blank carbon copyD Beautiful carbon copy
Answer B___________________________________________________________________________________________
Which type of web document is run at the client siteA Static___________________________________________________________________________________________
Hardware that calculates CRC usesA Shift registerB Xor unitC Both A and BD Instruction register
Answer B___________________________________________________________________________________________
MSXML isA A Microsoft languageB XML parser that ships with IE5.0C Used for interacting with XMLD None of these
Answer B___________________________________________________________________________________________
Address 192.5.48.3 belongs toA Class AB Class BC Class CD Class D
Answer C
What does the URL need to access documents ?I. Path nameII. Host nameIII. DNSIV. Retrieval methodV. Server port numberA I, II, IIIB I, III, VC I, II, IVD III, IV, V
Answer B___________________________________________________________________________________________
Which Layer is not present in TCP/ IP model?A Application LayerB Internet LayerC Transport LayerD Presentation Layer
Answer D___________________________________________________________________________________________
UNIX LINUX
Unl ike Ipv4, Ipv6 does not include the following field in the base headerA Next Header fieldB Field for Fragmentation informationC Flow LabelD Kind field
Answer B___________________________________________________________________________________________
FDDI (Fiber Distributed Data Interconnect) is an example ofA Token ringB Token busC Star topologyD Multipoint network
Answer A
Which of the following statement best explains a process?A It is a program.B It is a program in execution.C It is an instance of a program in execution.D It is a program that uses system calls.
Answer C___________________________________________________________________________________________
In which section of a process,the information about the arguments to the program are available?A DataB TextC StackD User block
Answer C___________________________________________________________________________________________
Choose the incorrect statementA Shell scripts can accept argumentsB Shell scripts are interpretedC Shell is a programming languageD Shell scripts are compiled
Answer D___________________________________________________________________________________________
UNIX was developed byA Bell labsB Berkley softwareC California universityD American defence academy
Answer A___________________________________________________________________________________________
Kernel is not involvedA When a read operation is doneB When a pressed key is echoed on to the screenC In resource allocationD None of the above
Answer D___________________________________________________________________________________________
Choose the correct statement.A Kernel is non preemptive.B Interrupts are blocked when critical section of a code is being executed.C No process can put another process to sleep.D None of the above.
Answer C___________________________________________________________________________________________
The exception to the fact that any process in UNIX ,has a parent isA DevB ShC KernelD Login
Answer C___________________________________________________________________________________________
Lint should be usedA Before compilationB After compilationC To analyze a C codeD None of the above
Answer A___________________________________________________________________________________________
Which command is used to display the top of the file?A CatB MoreC HeadD Grep
Answer C___________________________________________________________________________________________
Which one of the following options is not a shell in UNIX system?A Bourne ShellB C ShellC Net ShellD Korn Shell
Answer C
The command that can be used to restrict incoming messages to a user isA MesgB HaltC GrepD Sleep
Answer A___________________________________________________________________________________________
The sort command in UNIXA Used to sort a fileB Used to sort the list of files in a directoryC Both A and BD None of the above
Answer A___________________________________________________________________________________________
Which of the following keys is used to replace a single character with new text?A SB sC rD C
Answer B___________________________________________________________________________________________
Which command is used to remove a directory?A rdB rmdirC dldirD rdir
Answer B___________________________________________________________________________________________
The tail command in UNIXA Can be used to look at the tail or bottom of the fileB Can be used to display the list of last 10 files in the current directoryC Can be used to display the list of last 15 in the current directoryD None of the above
Answer A___________________________________________________________________________________________
Which command is used to remove a fileA RenameB MVC RMD Del
Answer C___________________________________________________________________________________________
Which command is used to change protection mode of files starting with the string emp and ending with 1,2, or 3?
A chmod 777 emp*B chmod u x emp[l-3]C chmod u r ??? empD chmod 222 emp?
Answer B___________________________________________________________________________________________
Which command will be used with vi editor to append text at end of line?A AB iC aD I
Answer A___________________________________________________________________________________________
Which of the following command the file names in multiple columns?A IS–XB ISC IS–1D IS–f–X
Answer B___________________________________________________________________________________________
Which command is used to display the device name of the terminal you are using?A whoB lsC ttyD stty
Answer C
Which command allows you to view your file 24 lines at a time ?A MoreB CatC PgD None of the above
Answer A___________________________________________________________________________________________
Which of the following is not a communication command?A WriteB MailC MesgD Grep
Answer D___________________________________________________________________________________________
Which command is used to extract specific columns from the file?A cutB grepC PastD cat
Answer A___________________________________________________________________________________________
Which command is used with vi editor to move the cursor to the left?A iB kC jD h
Answer D___________________________________________________________________________________________
Which command is used to create a directory?A CRDIRB MKDIRC MDD CR
Answer B___________________________________________________________________________________________
Which of the following changes permission to deny write permission to group and others?A Chmod go-w filexB Chmod go w filexC Chmod go=w fileD None of the above
Answer A___________________________________________________________________________________________
Which command is used with vi editor to delete a single character?A ZB yC aD x
Answer D___________________________________________________________________________________________
The tar command in UNIXA Used to create compressed archives of directories and filesB Used to extract directories and files from an archivesC Both A and BD None of the above
Answer C___________________________________________________________________________________________
Which command is used to sort the lines of data in a file in reverse orderA sortB shC stD sort -r
Answer D___________________________________________________________________________________________
Which of the following commands is used to rename a file?A RenameB MVC RemoveD Ren
Answer B
Which of the following calls never returns an error?A GetpidB ForkC Ioct1D Open
Answer A___________________________________________________________________________________________
Which command is used to display a file contents in octal form?A cdB ofC odD oct
Answer C___________________________________________________________________________________________
Which of the following is not a communication command?A writeB mailC mesgD grep
Answer D___________________________________________________________________________________________
Which of the following commands is used to count the total number of lines,words and characters contained in a file?A count pB wcountC wcD count w
Answer C___________________________________________________________________________________________
The cc command makes a total ofA 1 passB 2 passC 4 passD 5 pass
Answer D___________________________________________________________________________________________
Which of the following commands is used for an automatic remainder service?A WriteB CalenderC MailD Mesg
Answer B___________________________________________________________________________________________
The Unix command used to find out the number of characters in a file isA ncB wcC chcntD c
Answer B___________________________________________________________________________________________
In a system ,if 5 people are currently using vi editor ,then the number of corresponding processes will beA 1B 5C 3D 0
Answer B___________________________________________________________________________________________
Which set option is used with vi editor to display line numbers on screen?A nmB nuC icD li
Answer B___________________________________________________________________________________________
Which command will be used with vi editor to move back to the beginning of a word?A bB eC aD w
Answer A
When a process makes a system call ,its mode changes fromA User to kernelB Kernel to userC Restricted to unrestrictedD Unrestricted to restricted
Answer A___________________________________________________________________________________________
Which of the following are not system calls?A ChmodB OpenC LseekD Getc
Answer D___________________________________________________________________________________________
The advantage of binary files over text files is thatA It is compactB It can be accessed fasterC Many commands assume the named file to be a binary fileD They are more reliable
Answer D___________________________________________________________________________________________
Mounting a file system results in the loading ofA Boot blockB Super blockC i-node tableD All of these
Answer B___________________________________________________________________________________________
If cat x ,prints garbage ,then x is probably aA Data fileB Binary fileC Text fileD Source file
Answer B___________________________________________________________________________________________
Which of the following system calls transforms an executable binary file into a process?A ForkB ExecC Ioct1D Longjmp
Answer B___________________________________________________________________________________________
The cat command is used toA Print a fileB Display a fileC Capture a fileD Copy a file
Answer B___________________________________________________________________________________________
An attempt to read from locked file,results inA Prematured terminationB A deadlockC An indefinite waitD None of the above
Answer D___________________________________________________________________________________________
Which of the following file names can be found in more than one directory?A PasswdB BinC DateD None of the above
Answer A___________________________________________________________________________________________
Command_________compares two files byte by byte and displays the first mismatch.A cmpB compC cmapD None of these
Answer A
When the read system call encounters EOF ,it returnsA Some positive integerB Some negative integerC 0D -1
Answer C___________________________________________________________________________________________
To allow only one user to work with a particular file at a particular time ,one has toA SemaphoreB Critical regionC LockingD Dedicated mode
Answer C___________________________________________________________________________________________
Which of the following are character special files?A TerminalB PrinterC ModemD Tape drive
Answer B___________________________________________________________________________________________
Which of the following sections of an executable binary file has all uninitialized data items?A BSSB DataC HeaderD Symbol
Answer A___________________________________________________________________________________________
Which of the following files contains information related to password aging?A ShadowB ProfileC PasswordD All of these
Answer C___________________________________________________________________________________________
Which of the following system calls,does not return control to the calling point, on termination?A ForkB ExecC Ioct1D Longjmp
Answer B___________________________________________________________________________________________
Which command is used to display the characteristics of a process?A pidB psC duD au
Answer D___________________________________________________________________________________________
The first thing that is searched when a command references a file is itsA i nodeB i node numberC PermissionD None of the above
Answer B___________________________________________________________________________________________
Profilers areA Tools that analyze the run time behavior of a programB Tools that check C code for cross file consistencyC Tools that keep track of evolving versions of a fileD None of the above
Answer A___________________________________________________________________________________________
Which of the following tools can be used to keep track of evolving version of a file?A MakeB YaccC SCCSD dv
Answer C
Which command is used to display and create files?A catB edC viD lyrix
Answer A___________________________________________________________________________________________
Files that can store data in the same format as used in program are calledA Binary filesB Source fileC Text fileD Core
Answer A___________________________________________________________________________________________
The file that stores an integer as a sequence of characters is aA Text fileB Data fileC Binary fileD Core
Answer A___________________________________________________________________________________________
Which is the earliest and most widely used shell that came with the UNIX system?A C ShellB Korn ShellC Bourne ShellD Smith Shell
Answer C___________________________________________________________________________________________
OOP
Environment variables can be accessed byA System programsB C programsC Shell scriptsD None of the above
Answer C___________________________________________________________________________________________
Which of the following are not filter programs?A DateB SortC CatD Grep
Answer A___________________________________________________________________________________________
Which of the following shell scripts looping features does not recognize the break command?A WhileB UntilC ForD None of the above
Answer D___________________________________________________________________________________________
Which of the following is not a filter?A catB wcC grepD sort
Answer A___________________________________________________________________________________________
Shell functionsA Are another name for shell proceduresB Execute faster than shell proceduresC Are executed by a new shellD Are not executed by new shell
Answer D
The members of a class by default areA PublicB ProtectedC PrivateD Mandatory to specify
Answer C___________________________________________________________________________________________
Exception handling is targeted atA Run-time errorB Compile time errorC Logical errorD All of the above
Answer A___________________________________________________________________________________________
It is possible to declare as a friendA A member functionB A global functionC A classD All of the above
Answer D___________________________________________________________________________________________
You separated a derived class name from its access specifier withA A colonB Two colonsC Atleast one spaceD A semi colon
Answer B___________________________________________________________________________________________
An exception is caused byA A hardware problemB A problem in the operating systemC A syntax errorD A run-time error
Answer D___________________________________________________________________________________________
The following can be declared as friend in a classA An objectB A classC A public data memberD A private data member
Answer B___________________________________________________________________________________________
Which of the following statements is NOT valid about operator overloading?A Only existing operators can be overloadedB Overloaded operator must have at least one operand of its class typeC The overloaded operators follow the syntax rules of the original operatorD None of the above
Answer D___________________________________________________________________________________________
A copy constructor takesA No argumentB One argumentC Two argumentsD Arbitrary no. of arguments
Answer B___________________________________________________________________________________________
An object isA One instance of a classB Another word for a classC A class with static methodD A method that accesses class
Answer A___________________________________________________________________________________________
cfrontA is the front end of a C compilerB is the per-process of a C compilerC is a tool that is translated a C++ code to its equivalent C codeD None of above
Answer C
A class defined within another class isA Nested classB InheritanceC ContainershipD Encapsulation
Answer A___________________________________________________________________________________________
A blueprint for a software object is called aA ObjectB ClassC InstanceD None of these
Answer B___________________________________________________________________________________________
At which point of time a variable comes into existence in memory is determined by itsA ScopeB Storage classC Data typeD All of the above
Answer B___________________________________________________________________________________________
A virtual class is the same asA An abstract classB A class with a virtual functionC A base classD None of the above
Answer D___________________________________________________________________________________________
A static data member is given a valueA Within the class definitionB Outside the class definitionC When the program is exeutedD Never
Answer D___________________________________________________________________________________________
Which of the following is false for cin?A It represents standard inputB It is an object of istream class.C It is a class of which stream is an objectD Using cin the data can be read from user’s terminal
Answer C___________________________________________________________________________________________
Member functions, when defined within the class specificationA Are always inlineB Are not inlineC Are inline by default, unless they are too big or too complicatedD Are not inline by default.
Answer A___________________________________________________________________________________________
Access to private dataA Restricted to methods of the same classB Restricted to methods of other classesC Available to methods of the same class and other classesD Not an issue because the program will not compile
Answer B___________________________________________________________________________________________
C++ was originally developed byA Clocksin and MelishB Donald E.KnuthC Sir Richard HadleeD Bjarne Stroustrup
Answer D___________________________________________________________________________________________
Use of virtual functions impliesA OverloadingB OverridingC Static bindingD Dynamic binding
Answer D
Which of the statements is true in a protected derivation of a derived class from a base class?A Private members of the base class become protected members of the derived classB Protected members of the base class become public members of the derived classC Public members of the base class become protected members of the derived classD Protected derivation does not affect private and protected members of the derived class
Answer C___________________________________________________________________________________________
The keyword friend does not appear inA The class allowing access to another classB The class desiring access to another classC The private section of a classD The public section of a class
Answer C___________________________________________________________________________________________
Data members which are staticA Cannot be assigned a valueB Can only be used in static functionsC Cannot be defined in a UnionD Can be accessed outside the class
Answer B___________________________________________________________________________________________
Which can be passed as an argument to a function?A ConstantB ExpressionC Another functionD All of the above
Answer A___________________________________________________________________________________________
Function templates can acceptA Any type of parametersB Only one parameterC Only parameters of the basic typeD Only parameters of the derived type
Answer C___________________________________________________________________________________________
If you wanted to sort many large objects or structures, it would be most efficient toA Place them in an array and sort the array.B Place pointers to them in an array and sort the array.C Place them in a linked list and sort the linked list.D Place references to them in an array and sort the array.Answer C___________________________________________________________________________________________Match the following :(a) Garbage collection in 1. Java(b) Nameless object 2. generic programming(c) Template support 3. defines a class(d) A forward reference 4. member function(e) Derived class inherits
In which case is it mandatory to provide a destructor in a class?A Almost in every classB Class for which two or more than two objects will be createdC Class for which copy constructor is definedD Class whose objects will be created dynamically
Answer D___________________________________________________________________________________________
A pointer to the base class can hold address ofA Only base class objectB Only derived class objectC Base class object as well as derived class objectD None of the above
Answer C___________________________________________________________________________________________
Member of a class specified as _______ are accessible only to method of the class.A privateB publicC protectedD derive
Answer A___________________________________________________________________________________________
When a child class function is called,the compiler looks first for a matching function name in theA Class of the object using the function nameB Immediate ancestor classC Base classD Descendant class
Answer A___________________________________________________________________________________________
Maximum number of template arguments in a function template isA OneB TwoC ThreeD Many
Answer D
from base classA 1 5 4 2 3B 1 5 2 3 4C 5 1 2 3 4D 5 4 3 1 2Answer B___________________________________________________________________________________________A struct is the same as a class except thatA There are no member functionsB All members are publicC Cannot be used in inheritance hierarchyD It does have a this pointerAnswer C___________________________________________________________________________________________Which of the following is not the characteristic of constructor?A They should be declared in the public section.B They do not have return type.C They can not be inherited.D They can be virtual.Answer D___________________________________________________________________________________________The friend functions are used in situations where:A We want to have access to unrelated classesB Dynamic binding is requiredC Exchange of data between classes to take placeD None of the aboveAnswer D___________________________________________________________________________________________A template classA Is designed to be stored in different containersB Works with different data typesC Generates objects which must be identicalD Generates classes with different numbers of member functionsAnswer B___________________________________________________________________________________________Pure virtual functionsA Have to be redefined in the inherited classB Cannot have public access specificationC Are mandatory for a virtual classD None of the aboveAnswer A___________________________________________________________________________________________Overloading a postfix increment operator by means of a member function takesA No argumentB One argumentC Two argumentsD Three argumentsAnswer A___________________________________________________________________________________________A class which can use all the features of an established class,isA A static classB A super classC A subclassD Overloaded
Answer C___________________________________________________________________________________________A friend function to a class, C cannot accessA Private data members and member functionsB Public data members and member functionsC Protected data members and member functionsD The data members of the derived class of CAnswer D
In access control in a protected derivation, visibility modes will change as followsA Private, public and protected become protectedB Only public becomes protectedC Public and protected become protectedD Only private becomes protectedAnswer C___________________________________________________________________________________________Which of the following cannot be legitimately passed to a functionA A constantB A variableC A structureD A header fileAnswer D___________________________________________________________________________________________When the compiler cannot differentiate between two overloaded constructors, they are calledA OverloadedB DestructedC AmbiguousD DubiousAnswer C___________________________________________________________________________________________If a base class destructor is not virtual, thenA It can not have a function bodyB It can not be calledC It can not be called when accessed from pointerD Destructor in derived class can not be called when accessed through a pointer to the base classAnswer D___________________________________________________________________________________________A function call mechanism that passes arguments to a function by passing a copy of the values of the arguments is __________A Call by nameB Call by valueC Call by referenceD Call by value resultAnswer B___________________________________________________________________________________________A variable defined within a block is visibleA From the point of definition onward in the programB From the point of definition onward in the functionC From the point of definition onward in the blockD Throughout the functionAnswer C___________________________________________________________________________________________RunTime polymorphism is achieved by ___________A Friend function
B Virtual functionC Operator overloadingD Function overloadingAnswer B___________________________________________________________________________________________This pointerA Implicitly points to an objectB Can be explicitly used in a classC Can be used to return an objectD All of the aboveAnswer D___________________________________________________________________________________________A __________ is a special method used to initialize the instance variable of a class.A Member functionB DestructorC ConstructorD StructureAnswer C___________________________________________________________________________________________Additional information sent when an exception is thrown may be placed inA The throw keywordB The function that caused the errorC The catch blockD An object of the exception classAnswer C
Mechanism of deriving a class from another derived class is known as____A PolymorphismB Single InheritanceC Multilevel InheritanceD Message PassingAnswer C___________________________________________________________________________________________Mechanism of deriving a class from another derived class is known asA PolymorphismB Single inheritanceC Multilevel inheritanceD Message passingAnswer C___________________________________________________________________________________________The concept of hierarchical classification is related toA AbstractionB InheritanceC Function overloadingD NoneAnswer B___________________________________________________________________________________________The process of extracting the relevant attributes of an object is known asA PolymorphismB InheritenceC Abstraction
D Data hidingAnswer B___________________________________________________________________________________________If a class C is derived from class B, which is derived from class A, all through public inheritance, then a class C member function can accessA Protected and public data only in C and BB Protected and public data only in CC Private data in A and BD Protected data in A and BAnswer D___________________________________________________________________________________________The process of building new classes from existing one is called ______.A PolymorphismB StructureC InheritanceD CascadingAnswer C___________________________________________________________________________________________This type of inheritance is a mixture of multiple inheritance and hierarchical inheritanceA Single inheritanceB Multiple inheritanceC Hierarchical inheritanceD Hybrid inheritanceAnswer D___________________________________________________________________________________________The base class access specification determines how ___________ members in the base class may be accessed by derived classes.A PrivateB PublicC ProtectedD A,Band CAnswer D___________________________________________________________________________________________A base class may also be called aA Child classB SubclassC Derived classD Parent classAnswer D___________________________________________________________________________________________In multiple inheritanceA The base classes must have only default constructorsB Cannot have virtual functionsC Can include virtual classesD None of the aboveAnswer C
Which of the statements are true ?I. Function overloading is done at compile time.II. Protected members are accessible to the member of derived class.III. A derived class inherits constructors and destructors.IV. A friend function can be called like a normal function.V. Nested class is a derived class.A I, II, III
B II, III, VC III, IV, VD I, II, IVAnswer D____________________________________________________________________________________________________ members of a base class are never accessible to a derived class.A PublicB PrivateC ProtectedD A,B and CAnswer B___________________________________________________________________________________________Assume that we have constructor functions for both base class and derived class. Now consider the declaration in main( ). Base * P = New Derived; in what sequence will the constructor be called ?A Derived class constructor followed by Base class constructor.B Base class constructor followed by derived class constructor.C Base class constructor will not be called.D Base class constructor will not be called.Answer B___________________________________________________________________________________________When a sub class is inherited from only one super class .It is known asA Single inheritanceB Multiple inheritanceC Hierarchical inheritanceD Multilevel inheritanceAnswer A___________________________________________________________________________________________In multiple inheritanceA The base classes must have only default constructorsB Cannot have virtual functionsC Cannot have virtual classesD None of the aboveAnswer C___________________________________________________________________________________________The polymorphism can be characterized by the phraseA One interface,multiple methodsB Multiple interfaces,one methodC One interface,one methodD None of the aboveAnswer A___________________________________________________________________________________________The mechanism that binds code and data together and keeps them secure from outside world is known asA AbstractionB InheritanceC EncapsulationD PolymorphismAnswer C___________________________________________________________________________________________The term __________ means the ability to take many forms.A InheritanceB PolymorphismC Member functionD EncapsulationAnswer B
___________________________________________________________________________________________Runtime polymorphism is achieved byA Friend functionB Virtual functionC Operator overloadingD Function overloadingAnswer B___________________________________________________________________________________________RunTime Polymorphism is achieved by ______A Friend functionB Virtual functionC Operator overloadingD Function overloadingAnswer B
Usually a pure virtual functionA Has complete function bodyB Will never be calledC Will be called only to delete an objectD Is defined only in derived class
Answer D___________________________________________________________________________________________
Encapsulation isA Dynamic bindingB A mechanism to associate the code and data.C Data abstractionD Creating new class
Answer B___________________________________________________________________________________________
Identify the operator that is NOT used with pointersA ->B &C *D >>
Answer D___________________________________________________________________________________________
Consider the following statementschar *ptr;ptr = “hello”;cout << *ptr;What will be printed?A first letterB entire stringC it is a syntax errorD last letter
Answer A___________________________________________________________________________________________
Which of the following operator can be overloaded through friend function?A ->B =C ( )D *
Answer D___________________________________________________________________________________________
What will be the output of the following program?#include<iostream.h>void main(){float x=5,y=2;int result;result=x % y;cout<<result;}A 1B 1.0C Error messageD 2.5
Answer C___________________________________________________________________________________________
Which of the following declarations are illegal?A void *ptr;B char *str = “hello”;C char str = “hello”;D const *int p1;
Answer C___________________________________________________________________________________________
If we create a file by ‘ifstream’, then the default mode of the file is _________A ios :: outB ios :: inC ios :: appD ios :: binary
Answer B___________________________________________________________________________________________
If the variable count exceeds 100, a single statement that prints “Too many” isA if (count<100) cout << “Too many”;B if (count>100) cout >> “Too many”;C if (count>100) cout << “Too many”;D None of these.
Answer C___________________________________________________________________________________________
Which of the following will produce a value 10 if x = 9.7?A floor(x)B abs(x)C log(x)D ceil(x)Answer D___________________________________________________________________________________________The address of a variable temp of type float isA *tempB &tempC float& tempD float temp&Answer B___________________________________________________________________________________________What will be the values of x, m and n after the execution of the following statements?int x, m, n;m = 10;n = 15;x = ++m + n++;A x=25, m=10, n=15B x=26, m=11, n=16C x=27, m=11, n=16D x=27, m=10, n=15Answer B___________________________________________________________________________________________for (; ;)A means the test which is done using some expression is always trueB is not validC will loop foreverD should be written as for( )Answer C___________________________________________________________________________________________Consider the following statements:int x = 22,y=15;x = (x>y) ? (x+y) : (x-y);What will be the value of x after executing these statements?A 22B 37C 7D 5
What is the following code segment doing?void fn( ){char c;cin.get(c);if (c != ‘\n’) {fn( );cout.put(c);}}A The string entered is printed as it is.B The string entered is printed as it is.C It will go in an infinite loop.D It will print an empty line.
Answer B
Answer B___________________________________________________________________________________________If an array is declared as int a[4] = {3, 0, 1, 2}, then values assigned to a[0] & a[4] will be ________A 3, 2B 0, 2C 3, 0D 0, 4Answer C___________________________________________________________________________________________To access the public function fbase() in the base class, a statement in a derived class function fder() uses the statement.fbase();A fbase();B fder();C base::fbase();D der::fder();Answer A___________________________________________________________________________________________If x =5, y =2 then x ^y equals________.(where ^ is a bitwise XOR operator)A 00000111B 10000010C 10100000D 11001000Answer A___________________________________________________________________________________________ What will be the output of following program?#include<iostream.h>void main(){float x;x=(float)9/2;cout<<x;}A 4.5B 4.0C 4D 5Answer A___________________________________________________________________________________________The operator << when overloaded in a classA must be a member functionB must be a non member functionC can be both (A) & (B) aboveD cannot be overloadedAnswer C
Which of the following is the valid class declaration header for the derived class d with base classes b1 and b2?A class d : public b1, public b2B class d : class b1, class b2C class d : public b1, b2D class d : b1, b2
Answer A___________________________________________________________________________________________
In C++, dynamic memory allocation is accomplished with the operator ____A newB thisC malloc( )D delete
Answer A___________________________________________________________________________________________
What is the error in the following code?class t{virtual void print();}A No errorB Function print() should be declared as static.C Function print() should be defined.D Class t should contain data members.
Answer A___________________________________________________________________________________________
What is the output of the following codechar symbol[3]={‘a’,‘b’,‘c’};for (int index=0; index<3; index++)cout << symbol [index];A a b cB “abc”C abcD ‘abc’
Answer C___________________________________________________________________________________________
What will be the result of the expression 13 & 25?A 38B 25C 9D 12
Answer C___________________________________________________________________________________________