Saturday, October 17, 2020

144/2013 HSST

Question1:-In a BST, the traversal type which would print the values in the         nodes in sorted order is :-

  A:-Preorder

   B:Inorder
   C:-Postorder
   D:-None of the above 
Correct Answer:- Option-B

Question Paper Code: 17/2019/OL System Analyst/Programmer

Category Code:                                      021/2018

Exam:                                                       System Analyst/Programmer

Medium of Question:                             English

Date of Test                                            25-05-2019

Question21:-Let A, B and C are three finite sets. Find |A| if |A| = |B|, |A`uu`B| = 2a + 3b, and |A`nn`B| = b A:-a+2b

B:-2a+b C:-2a+2b

D:-a+b

Correct Answer:- Option-A

Question22:-Let X = {2, 3, 6, 12, 24, 48}, and ≤ be the partial order defined by X ≤ Y if X divides Y. Number of edges in the Hasse diagram of (X, ≤) is

A:-4

B:-6

C:-5

D:-8

Correct Answer:- Option-C

Question23:-A box contains 8 red and 6 yellow balls. The probability of drawing two balls of the same colour is A:-42/98

B:-43/95 C:-43/91

D:-None of the above Correct Answer:- Option-C

Question24:-A die is tossed. If the number is odd, what is the probability that the number is prime?

A:-1/3

B:-2/3

C:-4/3

D:-3/4

Correct Answer:- Option-B

Question25:-Let `P(K)=1+3+5..... +(2K-1)=3+K^2` . Then which of the following is true?

A:-Principle of mathematical induction can be used to prove the formula B:-P(1) is correct

C:-P(k) implies P(k+1) D:-None of the above

Correct Answer:- Option-C

Question26:-Three bags P, Q and R contains 20%, 40% and 40% of the total eggs produced in an industry. Past experience shows that 5%, 4% and 2% of the eggs contained in the respective bags are defective. If an egg was found to be defective, what is the the probability that the egg was from the bag P?

A:-10/36 B:-8/36 C:-10/34 D:-4/35

Correct Answer:- Option-C

Question27:-For the set {1, 2, 3, 4}, which of the following is true for the relation R = {(1,3), (1,4), (2,3),(2,4), (3,1), (4,1),

(4,2), (3,4), (3,2)}

A:-R is symmetric B:-R is transitive

C:-R is antisymmetric D:-None of the above

Correct Answer:- Option-D


Question28:-A correlation coefficient of 1 means that

A:-For every positive increase in one variable, there is a positive increase in a fixed proportion of the other variable B:-For every positive increase in one variable, there is a negative decrease in a fixed proportion of the other variable C:-For every positive increase in one variable, there is no change in a fixed proportion of the other variable

D:-There is no relation between the variables Correct Answer:- Option-A

Question29:-Multiple regression is used

A:-To predict scores on an independent variable from scores on multiple dependent variables B:-To predict scores on an dependent variable from scores on multiple dependent variables C:-To predict scores on an dependent variable from scores on multiple independent variables

D:-To predict scores on an independent variable from scores on multiple independent variables Correct Answer:- Option-C

Question30:-Which of the following is not true when conducting multiple regression?

A:-Data must be free from outliers for a multiple regression B:-Data must be heterogeneous for a multiple regression

C:-Multiple regression can be used to access linear relationships D:-Data must be normally distributed for multiple regression Correct Answer:- Option-B

Question31:-As compared to TTL, CMOS logic has A:-Higher speed of operation

B:-Higher power dissipation C:-Smaller physical size

D:-All of the above Correct Answer:- Option-C

Question32:-Pin 21 of 8086 microprocessor is used for the signal A:-READY

B:-ALE C:-RESET D:-QS1

Correct Answer:- Option-C

Question33:-Assume that the following jobs are to be executed on a single processor system

 

Job identifier

CPU-Burst Time

P1

4

P2

1

P3

8

P4

1

P5

2

 

The jobs are assumed to have arrived at time 0 and in the order P1, P2, P3, P4, P5. Calculate the departure completion time for job P1 if scheduling is round robin with time slice 1.

A:-4

B:-10

C:-12

D:-11

Correct Answer:- Option-D Question34:-The Banker's algorithm is used

A:-To prevent deadlock in operating systems B:-To detect deadlock in operating systems C:-To avoid deadlock in operating systems D:-All of the above

Correct Answer:- Option-C

Question35:-The performance of a digital computer improves when its RAM size increases. This is because A:-Size of virtual memory increases

B:-Number of page faults are less C:-Larger RAMS are very faster

D:-Number of segment faults are less Correct Answer:- Option-B

Question36:-Multiplier Quotient register is placed in A:-Main Memory

B:-CPU


C:-I/O Equipment D:-None of these

Correct Answer:- Option-B

Question37:-Which of the following is/are not true in contiguous allocation of disk space A:-Size of the file is to be declared in advance

B:-There is no external fragmentation

C:-Difficulty in finding space for a new file D:-Both 2 and 3

Correct Answer:- Option-B

Question38:-Interrupt latency for real time OS should be A:-Maximum

B:-Zero

C:-Minimal

D:-None of the above Correct Answer:- Option-C

Question39:-Which of the following is an invalid shell variables?

A:-india_15 B:-_15_india C:-15_india

D:-Both 2 and 3

Correct Answer:- Option-C

Question40:-The output of the following shell programming is var_1 = good

Readonly var_1 var_1= morning echo $var_1 exit 0

A:-good

B:-morning

C:-program will generate an error message D:-none of the above

Correct Answer:- Option-A

Question41:-The time complexity of building a heap with 'n' elements is A:-O(n)

B:-O(log n)

C:-`O(n^2)`

D:-O(n log n)

Correct Answer:- Option-A

Question42:-Which of the following is false regarding AVL trees?

A:-AVL tree is more balanced than binary search tree

B:-AVL tree is more space efficient than binary search tree C:-AVL tree is more time efficient than binary search tree D:-None of the above

Correct Answer:- Option-B

Question43:-What is the worst case complexity of quicksort?

A:-O(n log n)

B:-O(n)

C:-`O(n^2)`

D:-O(log n)

Correct Answer:- Option-C

Question44:-Which data structure can be used to efficiently implement dijkstra's algorithm?

A:-Double ended queue B:-Priority queue

C:-Stack

D:-Binary search tree Correct Answer:- Option-B

Question45:-Which data structure is well suited for separate chaining?

A:-Singly linked list B:-Doubly linked list C:-Circular linked list


D:-Binary trees

Correct Answer:- Option-B

Question46:-In the following code, how many times the program will print "Hello"?

 

#include<stdio.h> int main()

{

printf("Hello"); main();

return 0;

}

A:-Infinite times B:-32767 times C:-65535 times

D:-till stack overflows Correct Answer:- Option-D

Question47:-What will be output if you will compile and execute the following c code? #include "string.h"

void main()

{

printf("%d%d",sizeof("program"),strlen("program")); getch();

}

A:-8 7

B:-7 8

C:-8 8

D:-7 7

Correct Answer:- Option-A

Question48:-Predict the outputs of following C program. int main()

{

int x = -20; while (x++ !=1); printf("%d", x); return 0;

}

A:-2

B:-1 C:--1

D:-infinite

Correct Answer:- Option-A

Question49:-What is the return type of malloc()?

A:-void*

B:-pointer of allocated memory type C:-void**

D:-int*

Correct Answer:- Option-A

Question50:-What does the following declaration mean? int (*ptr)[20];

A:-ptr is array of pointers to 20 integers

B:-ptr is a pointer to an array of 20 integers C:-ptr is an array of 20 integers

D:-None of these

Correct Answer:- Option-B

Question51:-If class C is derived from another class B which is derived from class A, which class will have minimum level of abstraction?

A:-Class A B:-Class B C:-Class C

D:-All have same level of abstraction Correct Answer:- Option-C

Question52:-Which of the following statement is false?


A:-An abstract class is a class which cannot be instantiated

B:-Creation of an object is not possible with abstract class but it can be inherited C:-An abstract class can contain only Abstract method

D:-None of these

Correct Answer:- Option-D

Question53:-Which is the necessary condition for virtual function to achieve late binding?

A:-Virtual function is to be accessed with direct name

B:-Virtual functions is to be accessed using base class object only C:-Virtual function is to be accessed using pointer or reference

D:-Virtual function is to be accessed using derived class object only Correct Answer:- Option-C

Question54:-Operator overloading is

A:-Making c++ operator works with objects B:-Giving new meaning to existing operator C:-Adding operation to the existing operators D:-All the above

Correct Answer:- Option-C

Question55:-What are all the operators that cannot be overloaded?

A:-Scope Resolution (::) B:-Member Selection (.) C:-New operator (new) D:-Both 1 and 2

Correct Answer:- Option-D

Question56:-Which two of the following methods are defined in class Thread?

A:-Start and wait B:-Start and run C:-Wait and notify D:-Start Only

Correct Answer:- Option-B

Question57:-Which of these class object cannot be used to form a dynamic array in JAVA?

A:-ArrayList B:-Map

C:-Vector

D:-ArrayList and Vector Correct Answer:- Option-B

Question58:-Predict the output of the following code

 

public class Check

{

public static void main(String args[])

{

String s1 = "test";

String s2 = new String(s1);

System.out.println(s1==s2);

}

}

A:-true B:-false C:-0

D:-test

Correct Answer:- Option-B

Question59:-In java applet programs, the applet life cycle functions are called in which order?

A:-start(), init(), paint(), destroy(), stop()

B:-init(), run(), start(), stop(), destroy()

C:-init(), start(), paint(), stop(), destroy()

D:-start(), run(), paint(), destroy(), stop() Correct Answer:- Option-C

Question60:-The three notion of java virtual machine are A:-class, object, variable

B:-specification, implementation, instance C:-primitive, referential, user defined


D:-byte code, object code, executable Correct Answer:- Option-B

Question61:-Collection of entities that have the same attributes are called A:-Domain

B:-Value set C:-Entity set D:-Entity type

Correct Answer:- Option-D

Question62:-Which of the following key is related with referential integrity constraint?

A:-Primary key B:-Candidate key C:-Foreign key D:-Super key

Correct Answer:- Option-C

Question63:-Consider the following table of data r(R) of the relation schema R(XYZ)

 

X    Y     Z

x1 y1 z1 x2 y1 z1 x3   y2  z1

 

Which of the following functional dependency sets are valid A:-X->Y, Y->Z, Z->X

B:-X->Y, X->Z, Y->Z

C:-Both 1 and 2

D:-None of the above Correct Answer:- Option-B

Question64:-The SQL aggregate function that returns number of values in a given column is A:-count( )

B:-count(*)

C:-sum( )

D:-All of the above Correct Answer:- Option-A

Question65:-Which of the following construct returns true if a given tuple is not present in the subquery A:-exists

B:-not present C:-not exists

D:-none of the above Correct Answer:- Option-C

Question66:-What will be the output of the following query?

CREATE EmployeeView VIEW AS SELECT nothing FROM Employee WHERE ID < 100 A:-EmployeeView will be created with no columns

B:-EmployeeView will be created with column nothing C:-Syntax error

D:-None of the above Correct Answer:- Option-C

Question67:-Consider a relation A with m rows and relation B with n rows. How many rows will be generated if A × B is performed?

A:-m

B:-m + n C:-m - n D:-m * n

Correct Answer:- Option-D

Question68:-               is the statement which specifies when the trigger is to be executed.

A:-From B:-Where C:-When

D:-None of the above Correct Answer:- Option-C

Question69:-Which of the following is true about Atomicity?


A:-Smallest unit of transaction

B:-Either all of its operations are executed or none C:-Atleast one of the operation should be executed D:-All of the above

Correct Answer:- Option-B

Question70:-Which of the following differentiates Two-Phase Locking with Strict Two-Phase Locking in Concurrency control?

A:-Release locks after usage B:-Release locks at commit C:-Cascading aborts

D:-None of the above Correct Answer:- Option-B

Question71:-The middle layer of a three layer client/server architecture is called A:-Presentation layer

B:-Application layer C:-Database layer

D:-None of the above Correct Answer:- Option-B

Question72:-Which of the following element in CSS allows authors to use external style sheets in their pages?

A:-position B:-span

C:-extern D:-link

Correct Answer:- Option-D

Question73:-Which of the following object displays prompt dialog in JavaScript?

A:-alert

B:-prompt

C:-document D:-window

Correct Answer:- Option-D

Question74:-A technology for locating information in an XML document is A:-xPath

B:-XSL

C:-MathML

D:-All of the above Correct Answer:- Option-A

Question75:-The method used in PHP to transfer binary data from client to server is A:-GET

B:-POST

C:-Both 1 and 2

D:-None of the above Correct Answer:- Option-B

Question76:-The directive used to specify information needed by ASP.NET to process an ASPX file A:-Page

B:-Register C:-Import D:-Master

Correct Answer:- Option-A

Question77:-Which object in AJAX applications manage asynchronous interaction with the server?

A:-HttpURLConnection B:-HttpRequest

C:-XMLHttpRequest D:-All of the above

Correct Answer:- Option-C

Question78:-Cross-Site Scripting attacks are normally initiated by A:-Web Client

B:-Web Server C:-Both 1 and 2

D:-None of the above Correct Answer:- Option-A


Question79:-Which of the following in ASP.NET is a data source control method?

A:-ExecuteReader B:-SqlDataReader C:-SqlCommand D:-SqlConnection

Correct Answer:- Option-D

Question80:-Which of the following function is used to exit from a PHP Script?

A:-exit( )

B:-die( )

C:-both 1 and 2

D:-none of the above Correct Answer:- Option-C

Question81:-Which one among the following is a private IP address?

A:-11.0.0.1

B:-168.172.29.41

C:-172.15.24.33

D:-192.168.24.40

Correct Answer:- Option-D

Question82:-Which layer in the TCP/IP stack is equivalent to the Transport layer in the OSI model?

A:-Application B:-Host-to-Host C:-Internet

D:-Network Access Correct Answer:- Option-B

Question83:-Which among the following describes the DHCP Discover message?

 

i.     It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast

ii.    It uses UDP as the Transport layer protocol

iii.   It uses TCP as the Transport layer protocol

iv.   It does not use a layer 2 destination address A:-i only

B:-i and ii C:-iii and iv D:-iv only

Correct Answer:- Option-B

Question84:-Among the following IP address classes, which one provides a maximum of only 254 host addresses per network ID?

A:-Class A B:-Class B C:-Class C D:-Class D

Correct Answer:- Option-C

Question85:-You have an IP address of 172.16.13.5 with a 255.255.255.128 subnet mask. What is your class of address, subnet address, and broadcast address?

A:-Class A, Subnet 172.16.13.0, Broadcast address 172.16.13.127 B:-Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.127 C:-Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.255 D:-Class B, Subnet 172.16.0.0, Broadcast address 172.16.255.255 Correct Answer:- Option-B

Question86:-You have an interface on a router with the IP address of 192.168.192.10/29. Including the router interface, how many hosts can have IP addresses on the LAN attached to the router interface?

A:-32

B:-30

C:-8

D:-6

Correct Answer:- Option-D

Question87:-The number of unique substitution boxes in DES after the 48 bit XOR operation are A:-4

B:-6

C:-8


D:-12

Correct Answer:- Option-C

Question88:-For `p=11` and `q=17`, choose `e=7`. Find the plain text for the Cipher text 11 using the RSA algorithm A:-88

B:-111

C:-122

D:-143

Correct Answer:- Option-A

Question89:-Which of the following is true about HTTP headers and connection management?

A:-All HTTP responses must either close a connection or include a Content-Length:header to signify to end of a HTTP response body

B:-The Host : field in HTTP allows the same web server to server content for multiple domains

C:-When transferring many small Web objects, the only performance difference between persistent and non-persistent HTTP connections is related to connection establishment

D:-HTTP headers have a fixed size Correct Answer:- Option-B

Question90:-Which of the following about UNIX socket programming is true?

 

i.    When a TCP sender calls close(), the network stack immediately sends a FIN packet to its peer

ii.    send() on a TCP socket causes a sender to a generate a TCP/IP packet and send it out the appropriate network interface

iii.   accept() returns when the receiver completes the three-way TCP handshake

iv.   The return value of recv() specifies the number of bytes read from a socket, or if the socket was closed or an error was encountered

A:-i only B:-i and ii

C:-iii and iv D:-iv only

Correct Answer:- Option-C Question91:-COCOMO stands for

A:-Consumed Cost Model B:-Constructive Cost Model C:-Common Control Model D:-Composition Cost Model Correct Answer:- Option-B

Question92:-Which of the following is not defined in a good Software Requirement Specification (SRS) document?

A:-Functional Requirement

B:-Nonfunctional Requirement C:-Goals of implementation

D:-Algorithm for software implementation Correct Answer:- Option-D

Question93:-Software process and improvement are assessed by A:-ISO 9000

B:-ISO 9001

C:-SPICE (ISO/IEC15504)

D:-Both 2 and 3

Correct Answer:- Option-D

Question94:-CMM model in Software Engineering is a technique of A:-Develop the software

B:-Improve the software process C:-Improve the testing process D:-All of the above

Correct Answer:- Option-B

Question95:-Alpha and Beta Testing are forms of A:-Acceptance testing

B:-Integration testing C:-System testing

D:-Unit testing

Correct Answer:- Option-A

Question96:-Coupling and cohesion can be represented using a A:-cause-effect graph


B:-dependence matrix C:-structure chart

D:-SRS

Correct Answer:- Option-B

Question97:-The tests that run every night during the project development or before a programmer checks in any changes to the global repository are normally characterized as

A:-Integration tests B:-Regression tests C:-Validation tests D:-System tests

Correct Answer:- Option-B

Question98:-Which of the following reason is valid ones for choosing a top-down process?

A:-Developers can present a demo of the project to the management faster than using a bottom-up process B:-A top-down process is more time consuming because of the unit tests

C:-In a top-down design, if an error is detected its always because a lower-level module is not meeting its specifications (because the higher-level ones are already been tested)

D:-A top-down process makes it possible to detect performance problems faster Correct Answer:- Option-A

Question99:-Consider the following statements

 

(i)    Bottom-up testing is not an effective way to reveal architectural design flaws.

(ii)   Top-down testing can be time-consuming, because you need to write stubs for many modules. A:-Only (i) is true

B:-Only (ii) is true

C:-Both (i) and (ii) are true D:-Both (i) and (ii) are false Correct Answer:- Option-C

Question100:-Consider the following statements

 

(i)    When designing tests, if partitions are chosen perfectly, there is no point to testing boundary values near the edges of the partition.

(ii)   Glass-box tests designed for one implementation are valid to use when testing another implementation. A:-Only (i) is true

B:-Only (ii) is true

C:-Both (i) and (ii) are true D:-Both (i) and (ii) are false Correct Answer:- Option-C

Question21:-Let A, B and C are three finite sets. Find |A| if |A| = |B|, |A`uu`B| = 2a + 3b, and |A`nn`B| = b A:-a+2b

B:-2a+b C:-2a+2b

D:-a+b

Correct Answer:- Option-A

Question22:-Let X = {2, 3, 6, 12, 24, 48}, and ≤ be the partial order defined by X ≤ Y if X divides Y. Number of edges in the Hasse diagram of (X, ≤) is

A:-4

B:-6

C:-5

D:-8

Correct Answer:- Option-C

Question23:-A box contains 8 red and 6 yellow balls. The probability of drawing two balls of the same colour is A:-42/98

B:-43/95 C:-43/91

D:-None of the above Correct Answer:- Option-C

Question24:-A die is tossed. If the number is odd, what is the probability that the number is prime?

A:-1/3

B:-2/3

C:-4/3

D:-3/4

Correct Answer:- Option-B

Question25:-Let `P(K)=1+3+5..... +(2K-1)=3+K^2` . Then which of the following is true?

A:-Principle of mathematical induction can be used to prove the formula B:-P(1) is correct

C:-P(k) implies P(k+1) D:-None of the above

Correct Answer:- Option-C

Question26:-Three bags P, Q and R contains 20%, 40% and 40% of the total eggs produced in an industry. Past experience shows that 5%, 4% and 2% of the eggs contained in the respective bags are defective. If an egg was found to be defective, what is the the probability that the egg was from the bag P?

A:-10/36 B:-8/36 C:-10/34 D:-4/35

Correct Answer:- Option-C

Question27:-For the set {1, 2, 3, 4}, which of the following is true for the relation R = {(1,3), (1,4), (2,3),(2,4), (3,1), (4,1),

(4,2), (3,4), (3,2)}

A:-R is symmetric B:-R is transitive

C:-R is antisymmetric D:-None of the above

Correct Answer:- Option-D


Question28:-A correlation coefficient of 1 means that

A:-For every positive increase in one variable, there is a positive increase in a fixed proportion of the other variable B:-For every positive increase in one variable, there is a negative decrease in a fixed proportion of the other variable C:-For every positive increase in one variable, there is no change in a fixed proportion of the other variable

D:-There is no relation between the variables Correct Answer:- Option-A

Question29:-Multiple regression is used

A:-To predict scores on an independent variable from scores on multiple dependent variables B:-To predict scores on an dependent variable from scores on multiple dependent variables C:-To predict scores on an dependent variable from scores on multiple independent variables

D:-To predict scores on an independent variable from scores on multiple independent variables Correct Answer:- Option-C

Question30:-Which of the following is not true when conducting multiple regression?

A:-Data must be free from outliers for a multiple regression B:-Data must be heterogeneous for a multiple regression

C:-Multiple regression can be used to access linear relationships D:-Data must be normally distributed for multiple regression Correct Answer:- Option-B

Question31:-As compared to TTL, CMOS logic has A:-Higher speed of operation

B:-Higher power dissipation C:-Smaller physical size

D:-All of the above Correct Answer:- Option-C

Question32:-Pin 21 of 8086 microprocessor is used for the signal A:-READY

B:-ALE C:-RESET D:-QS1

Correct Answer:- Option-C

Question33:-Assume that the following jobs are to be executed on a single processor system

 

Job identifier

CPU-Burst Time

P1

4

P2

1

P3

8

P4

1

P5

2

 

The jobs are assumed to have arrived at time 0 and in the order P1, P2, P3, P4, P5. Calculate the departure completion time for job P1 if scheduling is round robin with time slice 1.

A:-4

B:-10

C:-12

D:-11

Correct Answer:- Option-D Question34:-The Banker's algorithm is used

A:-To prevent deadlock in operating systems B:-To detect deadlock in operating systems C:-To avoid deadlock in operating systems D:-All of the above

Correct Answer:- Option-C

Question35:-The performance of a digital computer improves when its RAM size increases. This is because A:-Size of virtual memory increases

B:-Number of page faults are less C:-Larger RAMS are very faster

D:-Number of segment faults are less Correct Answer:- Option-B

Question36:-Multiplier Quotient register is placed in A:-Main Memory

B:-CPU


C:-I/O Equipment D:-None of these

Correct Answer:- Option-B

Question37:-Which of the following is/are not true in contiguous allocation of disk space A:-Size of the file is to be declared in advance

B:-There is no external fragmentation

C:-Difficulty in finding space for a new file D:-Both 2 and 3

Correct Answer:- Option-B

Question38:-Interrupt latency for real time OS should be A:-Maximum

B:-Zero

C:-Minimal

D:-None of the above Correct Answer:- Option-C

Question39:-Which of the following is an invalid shell variables?

A:-india_15 B:-_15_india C:-15_india

D:-Both 2 and 3

Correct Answer:- Option-C

Question40:-The output of the following shell programming is var_1 = good

Readonly var_1 var_1= morning echo $var_1 exit 0

A:-good

B:-morning

C:-program will generate an error message D:-none of the above

Correct Answer:- Option-A

Question41:-The time complexity of building a heap with 'n' elements is A:-O(n)

B:-O(log n)

C:-`O(n^2)`

D:-O(n log n)

Correct Answer:- Option-A

Question42:-Which of the following is false regarding AVL trees?

A:-AVL tree is more balanced than binary search tree

B:-AVL tree is more space efficient than binary search tree C:-AVL tree is more time efficient than binary search tree D:-None of the above

Correct Answer:- Option-B

Question43:-What is the worst case complexity of quicksort?

A:-O(n log n)

B:-O(n)

C:-`O(n^2)`

D:-O(log n)

Correct Answer:- Option-C

Question44:-Which data structure can be used to efficiently implement dijkstra's algorithm?

A:-Double ended queue B:-Priority queue

C:-Stack

D:-Binary search tree Correct Answer:- Option-B

Question45:-Which data structure is well suited for separate chaining?

A:-Singly linked list B:-Doubly linked list C:-Circular linked list


D:-Binary trees

Correct Answer:- Option-B

Question46:-In the following code, how many times the program will print "Hello"?

 

#include<stdio.h> int main()

{

printf("Hello"); main();

return 0;

}

A:-Infinite times B:-32767 times C:-65535 times

D:-till stack overflows Correct Answer:- Option-D

Question47:-What will be output if you will compile and execute the following c code? #include "string.h"

void main()

{

printf("%d%d",sizeof("program"),strlen("program")); getch();

}

A:-8 7

B:-7 8

C:-8 8

D:-7 7

Correct Answer:- Option-A

Question48:-Predict the outputs of following C program. int main()

{

int x = -20; while (x++ !=1); printf("%d", x); return 0;

}

A:-2

B:-1 C:--1

D:-infinite

Correct Answer:- Option-A

Question49:-What is the return type of malloc()?

A:-void*

B:-pointer of allocated memory type C:-void**

D:-int*

Correct Answer:- Option-A

Question50:-What does the following declaration mean? int (*ptr)[20];

A:-ptr is array of pointers to 20 integers

B:-ptr is a pointer to an array of 20 integers C:-ptr is an array of 20 integers

D:-None of these

Correct Answer:- Option-B

Question51:-If class C is derived from another class B which is derived from class A, which class will have minimum level of abstraction?

A:-Class A B:-Class B C:-Class C

D:-All have same level of abstraction Correct Answer:- Option-C

Question52:-Which of the following statement is false?


A:-An abstract class is a class which cannot be instantiated

B:-Creation of an object is not possible with abstract class but it can be inherited C:-An abstract class can contain only Abstract method

D:-None of these

Correct Answer:- Option-D

Question53:-Which is the necessary condition for virtual function to achieve late binding?

A:-Virtual function is to be accessed with direct name

B:-Virtual functions is to be accessed using base class object only C:-Virtual function is to be accessed using pointer or reference

D:-Virtual function is to be accessed using derived class object only Correct Answer:- Option-C

Question54:-Operator overloading is

A:-Making c++ operator works with objects B:-Giving new meaning to existing operator C:-Adding operation to the existing operators D:-All the above

Correct Answer:- Option-C

Question55:-What are all the operators that cannot be overloaded?

A:-Scope Resolution (::) B:-Member Selection (.) C:-New operator (new) D:-Both 1 and 2

Correct Answer:- Option-D

Question56:-Which two of the following methods are defined in class Thread?

A:-Start and wait B:-Start and run C:-Wait and notify D:-Start Only

Correct Answer:- Option-B

Question57:-Which of these class object cannot be used to form a dynamic array in JAVA?

A:-ArrayList B:-Map

C:-Vector

D:-ArrayList and Vector Correct Answer:- Option-B

Question58:-Predict the output of the following code

 

public class Check

{

public static void main(String args[])

{

String s1 = "test";

String s2 = new String(s1);

System.out.println(s1==s2);

}

}

A:-true B:-false C:-0

D:-test

Correct Answer:- Option-B

Question59:-In java applet programs, the applet life cycle functions are called in which order?

A:-start(), init(), paint(), destroy(), stop()

B:-init(), run(), start(), stop(), destroy()

C:-init(), start(), paint(), stop(), destroy()

D:-start(), run(), paint(), destroy(), stop() Correct Answer:- Option-C

Question60:-The three notion of java virtual machine are A:-class, object, variable

B:-specification, implementation, instance C:-primitive, referential, user defined


D:-byte code, object code, executable Correct Answer:- Option-B

Question61:-Collection of entities that have the same attributes are called A:-Domain

B:-Value set C:-Entity set D:-Entity type

Correct Answer:- Option-D

Question62:-Which of the following key is related with referential integrity constraint?

A:-Primary key B:-Candidate key C:-Foreign key D:-Super key

Correct Answer:- Option-C

Question63:-Consider the following table of data r(R) of the relation schema R(XYZ)

 

X    Y     Z

x1 y1 z1 x2 y1 z1 x3   y2  z1

 

Which of the following functional dependency sets are valid A:-X->Y, Y->Z, Z->X

B:-X->Y, X->Z, Y->Z

C:-Both 1 and 2

D:-None of the above Correct Answer:- Option-B

Question64:-The SQL aggregate function that returns number of values in a given column is A:-count( )

B:-count(*)

C:-sum( )

D:-All of the above Correct Answer:- Option-A

Question65:-Which of the following construct returns true if a given tuple is not present in the subquery A:-exists

B:-not present C:-not exists

D:-none of the above Correct Answer:- Option-C

Question66:-What will be the output of the following query?

CREATE EmployeeView VIEW AS SELECT nothing FROM Employee WHERE ID < 100 A:-EmployeeView will be created with no columns

B:-EmployeeView will be created with column nothing C:-Syntax error

D:-None of the above Correct Answer:- Option-C

Question67:-Consider a relation A with m rows and relation B with n rows. How many rows will be generated if A × B is performed?

A:-m

B:-m + n C:-m - n D:-m * n

Correct Answer:- Option-D

Question68:-               is the statement which specifies when the trigger is to be executed.

A:-From B:-Where C:-When

D:-None of the above Correct Answer:- Option-C

Question69:-Which of the following is true about Atomicity?


A:-Smallest unit of transaction

B:-Either all of its operations are executed or none C:-Atleast one of the operation should be executed D:-All of the above

Correct Answer:- Option-B

Question70:-Which of the following differentiates Two-Phase Locking with Strict Two-Phase Locking in Concurrency control?

A:-Release locks after usage B:-Release locks at commit C:-Cascading aborts

D:-None of the above Correct Answer:- Option-B

Question71:-The middle layer of a three layer client/server architecture is called A:-Presentation layer

B:-Application layer C:-Database layer

D:-None of the above Correct Answer:- Option-B

Question72:-Which of the following element in CSS allows authors to use external style sheets in their pages?

A:-position B:-span

C:-extern D:-link

Correct Answer:- Option-D

Question73:-Which of the following object displays prompt dialog in JavaScript?

A:-alert

B:-prompt

C:-document D:-window

Correct Answer:- Option-D

Question74:-A technology for locating information in an XML document is A:-xPath

B:-XSL

C:-MathML

D:-All of the above Correct Answer:- Option-A

Question75:-The method used in PHP to transfer binary data from client to server is A:-GET

B:-POST

C:-Both 1 and 2

D:-None of the above Correct Answer:- Option-B

Question76:-The directive used to specify information needed by ASP.NET to process an ASPX file A:-Page

B:-Register C:-Import D:-Master

Correct Answer:- Option-A

Question77:-Which object in AJAX applications manage asynchronous interaction with the server?

A:-HttpURLConnection B:-HttpRequest

C:-XMLHttpRequest D:-All of the above

Correct Answer:- Option-C

Question78:-Cross-Site Scripting attacks are normally initiated by A:-Web Client

B:-Web Server C:-Both 1 and 2

D:-None of the above Correct Answer:- Option-A


Question79:-Which of the following in ASP.NET is a data source control method?

A:-ExecuteReader B:-SqlDataReader C:-SqlCommand D:-SqlConnection

Correct Answer:- Option-D

Question80:-Which of the following function is used to exit from a PHP Script?

A:-exit( )

B:-die( )

C:-both 1 and 2

D:-none of the above Correct Answer:- Option-C

Question81:-Which one among the following is a private IP address?

A:-11.0.0.1

B:-168.172.29.41

C:-172.15.24.33

D:-192.168.24.40

Correct Answer:- Option-D

Question82:-Which layer in the TCP/IP stack is equivalent to the Transport layer in the OSI model?

A:-Application B:-Host-to-Host C:-Internet

D:-Network Access Correct Answer:- Option-B

Question83:-Which among the following describes the DHCP Discover message?

 

i.     It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast

ii.    It uses UDP as the Transport layer protocol

iii.   It uses TCP as the Transport layer protocol

iv.   It does not use a layer 2 destination address A:-i only

B:-i and ii C:-iii and iv D:-iv only

Correct Answer:- Option-B

Question84:-Among the following IP address classes, which one provides a maximum of only 254 host addresses per network ID?

A:-Class A B:-Class B C:-Class C D:-Class D

Correct Answer:- Option-C

Question85:-You have an IP address of 172.16.13.5 with a 255.255.255.128 subnet mask. What is your class of address, subnet address, and broadcast address?

A:-Class A, Subnet 172.16.13.0, Broadcast address 172.16.13.127 B:-Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.127 C:-Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.255 D:-Class B, Subnet 172.16.0.0, Broadcast address 172.16.255.255 Correct Answer:- Option-B

Question86:-You have an interface on a router with the IP address of 192.168.192.10/29. Including the router interface, how many hosts can have IP addresses on the LAN attached to the router interface?

A:-32

B:-30

C:-8

D:-6

Correct Answer:- Option-D

Question87:-The number of unique substitution boxes in DES after the 48 bit XOR operation are A:-4

B:-6

C:-8


D:-12

Correct Answer:- Option-C

Question88:-For `p=11` and `q=17`, choose `e=7`. Find the plain text for the Cipher text 11 using the RSA algorithm A:-88

B:-111

C:-122

D:-143

Correct Answer:- Option-A

Question89:-Which of the following is true about HTTP headers and connection management?

A:-All HTTP responses must either close a connection or include a Content-Length:header to signify to end of a HTTP response body

B:-The Host : field in HTTP allows the same web server to server content for multiple domains

C:-When transferring many small Web objects, the only performance difference between persistent and non-persistent HTTP connections is related to connection establishment

D:-HTTP headers have a fixed size Correct Answer:- Option-B

Question90:-Which of the following about UNIX socket programming is true?

 

i.    When a TCP sender calls close(), the network stack immediately sends a FIN packet to its peer

ii.    send() on a TCP socket causes a sender to a generate a TCP/IP packet and send it out the appropriate network interface

iii.   accept() returns when the receiver completes the three-way TCP handshake

iv.   The return value of recv() specifies the number of bytes read from a socket, or if the socket was closed or an error was encountered

A:-i only B:-i and ii

C:-iii and iv D:-iv only

Correct Answer:- Option-C Question91:-COCOMO stands for

A:-Consumed Cost Model B:-Constructive Cost Model C:-Common Control Model D:-Composition Cost Model Correct Answer:- Option-B

Question92:-Which of the following is not defined in a good Software Requirement Specification (SRS) document?

A:-Functional Requirement

B:-Nonfunctional Requirement C:-Goals of implementation

D:-Algorithm for software implementation Correct Answer:- Option-D

Question93:-Software process and improvement are assessed by A:-ISO 9000

B:-ISO 9001

C:-SPICE (ISO/IEC15504)

D:-Both 2 and 3

Correct Answer:- Option-D

Question94:-CMM model in Software Engineering is a technique of A:-Develop the software

B:-Improve the software process C:-Improve the testing process D:-All of the above

Correct Answer:- Option-B

Question95:-Alpha and Beta Testing are forms of A:-Acceptance testing

B:-Integration testing C:-System testing

D:-Unit testing

Correct Answer:- Option-A

Question96:-Coupling and cohesion can be represented using a A:-cause-effect graph


B:-dependence matrix C:-structure chart

D:-SRS

Correct Answer:- Option-B

Question97:-The tests that run every night during the project development or before a programmer checks in any changes to the global repository are normally characterized as

A:-Integration tests B:-Regression tests C:-Validation tests D:-System tests

Correct Answer:- Option-B

Question98:-Which of the following reason is valid ones for choosing a top-down process?

A:-Developers can present a demo of the project to the management faster than using a bottom-up process B:-A top-down process is more time consuming because of the unit tests

C:-In a top-down design, if an error is detected its always because a lower-level module is not meeting its specifications (because the higher-level ones are already been tested)

D:-A top-down process makes it possible to detect performance problems faster Correct Answer:- Option-A

Question99:-Consider the following statements

 

(i)    Bottom-up testing is not an effective way to reveal architectural design flaws.

(ii)   Top-down testing can be time-consuming, because you need to write stubs for many modules. A:-Only (i) is true

B:-Only (ii) is true

C:-Both (i) and (ii) are true D:-Both (i) and (ii) are false Correct Answer:- Option-C

Question100:-Consider the following statements

 

(i)    When designing tests, if partitions are chosen perfectly, there is no point to testing boundary values near the edges of the partition.

(ii)   Glass-box tests designed for one implementation are valid to use when testing another implementation. A:-Only (i) is true

B:-Only (ii) is true

C:-Both (i) and (ii) are true D:-Both (i) and (ii) are false Correct Answer:- Option-C