Tuesday, 25 February 2014

SOLVED QUESTIONS OF PREVIOUS EXAMS

If the primal Linear Programming problem has unbounded solution, then it's dual problem will have
(A) feasible solution
(B) alternative solution
(C) no feasible solution at all
(D) no bounded solution at all
Ans.: c.)
Linear programming.
 
Match the following :
List -1                         List-II
a. Data coupling       i. Module A and Moduie B have shared data
b. Stamp coupling     ii. Dependency between modules is based on the fact they communicate by only passing of data
c. Common coupling   iii. When complete data structure is passed from one module to another
d. Content coupling   iV. When the control is passed from one module to the middle of another
Codes :    
    a       b    c        d
(A)   iii       ii    i       iv
(B)    ii       iii    i       iv
(C)    ii       iii    iv       i
(D)   iii      ii    iv       i

Ans.:  b.)
Software engineering

A process which defines a series of tasks that have the following four primary objectives is known as
1. to identify all items that collectively define the software configuration.
2. to manage changes to one or more of these items.
3. to facilitate the construction of different versions of an application.
4. to ensure that software quality is maintained as the configuration evolves over time.
(A) Software Quality Management Process
(B) Software Configuration Management Process
(C) Software Version Management Process
(D) Software Change Management Process

Ans.: b.)
Software engineering

One weakness of boundary value analysis and equivalence partitioning is
(A) they are not effective.
(B) they do not explore combinations of input circumstances.
(C) they explore combinations of input circumstances.
(D) none of the above.

Ans.:  b.)
Software testing

Which once of the following is not a software myth?
(A) Once we write the program and get it to work, our job is done.
(B) Project requirements continually change, but change can be easily accommodated because software is flexible.
(C) If we get behind schedule, we can add more pro grammers and catch up.
(D) If an organization does not understand how to control software projects internally, it will invariably struggle when it outsources software projects

Ans.:  d.)
Software engineering 

Match the following with respect to relationship between objects and classes: 
List -I         List -II
a. State diagram      i. Useful for both abstract modelling and for designing actual program
b. Object diagram    ii. Describes object classes
c. Class diagram       iii. Useful for documenting test cases
d. Instance  diagram     iv. Describing the behaviour of a single class of objects.
Codes :
    a   b   c  d
(A) iv  i   ii iii
(B) ii  iii iv i
(C) iii iv  ii i
(D) ii  iv  i  iii

Ans.: c.)
OOAD

Match the following style rules for reusability: 
List -I                                          List -II
a. Keep  methods coherent     i. Write a method to get the last element of a list
b. Keep  methods  small           ii. Maintain parallel structure when possible
c. Keep  methods  consistent  iii. Breaking a method methods into smaller parts
d. Provide  uniform  coverage  iv. Performs a single function or a group of closely related functions. 
Codes :
    a   b   C  d
(A) iv  iii ii i
(B) ii  i   iv iii
(C) iii iv  ii i
(D) ii  iii iv i

Ans.: a.)

Which is the protocol for performing RPCs between applications in a language and system independent way?
(A) Hyper Text Transmission Protocol (HTTP)
(B) Simple network Management Protocol (SNMP)
(C) Simple Object Access Protocol (SOAP)
(D) Simple Mail Transfer Protocol (SMTP)

Ans.: c.)
Networking
SOAP (Simple Object Access Protocol) is a way for a program running in one kind of operating system (such as Windows 2000) to communicate with a progam in the same or another kind of an operating system (such as Linux) by using the World Wide Web's Hypertext Transfer Protocol (HTTP)and its Extensible Markup Language (XML) as the mechanisms for information exchange

The document that is used by XSLT to indicate, how to transform the elements of the XML document to another format is
(A) HTML page
(B) DOC type procedure
(C) Style sheet
(D) Stored procedure

Ans.: c.)
Web design

Which of the following concepts means adding new concepts to a program as it runs ?
(A) Data hiding
(B) Dynamic loading
(C) Dynamic typing
(D) Dynamic binding

Ans.: b.)
OOPS
Dynamic loading is a mechanism by which a computer program can, at run time, load a library into memory, retrieve the addresses of functions and variables contained in the library, execute those functions or access those variables, and unload the library from memory

Which of the following correctly describes overloading of functions?
(A) Virtual polymorphism
(B) Transient polymorphism
(C) Ad-hoc polymorphism
(D) Pseudo polymorphism

Ans.: c.)
OOPS

Match the following with respect to programming languages :
    List -1                                    List - II
a. Structured Language             i. JAVA 
b. Non-structured Language      ii. BASIC
c. Object Oriented Language    iii. PASCAL
d. Interpreted Language        iv. FORTRAN
Language Codes :
    a   b    c   d
(A) iii iv   i   ii
(B) iv  iii  ii  i
(C) ii  iv   i   iii
(D) ii  iii  iv  i

Ans.: a.)

The compiler converts all operands upto the type of the largest operand is called
(A) Type Promotion
(B) Type Evaluation
(C) Type Conversion
(D) Type Declaration

Ans.: a.)
Compilers

Important advantage of using new and delete operators in C++ is
(A) Allocation of memory
(B) Frees the memory previously allocated
(C) Initialization of memory easily
(D) Allocation of memory and frees the memory previously allocated.

Ans.: d.)
OOPS .

Match the following control strategies of prolog :
    List -1    List - II
a. Forward movement        i. Variable can be done with a constant, another variable or a function.
b. Unification           ii. The entire conjunctive goal is executed.
c. Deep backtracking     iii. Previous sub goal to find alternative solutions.
d. Shallow backtracking   iv.Chooses sub goal with possible unifier.
Codes :
     a   b    c    d
(A) iv   i    ii   iii
(B) ii   iv   i    iii
(C) iii  i    iv   ii
(D) ii   iii  iv   i

 Ans.: b.)
Artificial intelligence

High level knowledge which relates to the use of sentences in different contexts and how the context affect the meaning of the sentences ?
(A) Morphological
(B) Syntactic
(C) Semantic
(D) Pragmatic
Ans.: d.)
The objective of__________procedure is to discover at least one________that causes two literals to match.
(A) unification, validation
(B) unification, substitution
(C) substitution, unification
(D) minimax, maximum

Ans.: b.)
In alpha-beta pruning, _________is used to cut off the search at maximizing level only and _________is  used  to cut off the search at minimizing level only.
(A) alpha, beta
(B) beta, alpha
(C) alpha, alpha
(D) beta, beta

Ans.: b.)
Artificial intelligence
Find the false statement:
(A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption.
(B) The symmetric cipher DES (Data Encryption Standard) was widely used in the industry for security product.
(C) The    AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.
(D) Public key algorithms use two different keys for Encryption and Decryption.

Ans.: c .)
Network security and cryptography
In IPV 4, the IP address 200.200.200.200 belongs to
(A) Class A    (B) Class B
(C) Class C    (D) Class D

Ans.: c.)
Networks
Explanation: 
Class
Address Range
Class A
0.0.0.0
Class B
128.0.0.0
Class C
192.0.0.0
Class D
224.0.0.0
Class E
240.0.0.0
 

No comments:

Post a Comment