Wednesday, 26 February 2014

SOLVED QUESTIONS OF PREVIOUS EXAMS

1) Encryption and Decryption is the responsibility of Layer.
(A) Physical
(B) Network
(C) Application
(D) Datalink
Ans.: c.)
Networking related.
Encryption is typically done at this level too, although it can be done on the application, session, transport, or network layers.

2) Software Configuration Management is the discipline for systematically controlling
(A) the changes due to the evolution of work products as the project proceeds.
(B) the changes due to defects (bugs) being found and then fixed.
(C) the changes due to requirement changes
(D) all of the above
Ans.: d.)
Software engineering concept.


3) Which one of the following is not a step of requirement engineering ?
(A) Requirement elicitation
(B) Requirement analysts
(C) Requirement design
(D) Requirement documentation
Ans.: c.)STEPS IN REQUIREMENT ENGINEERING:
—  Requirements inception
—  Requirements identification
—  Requirements analysis and negotiation
—  Requirements specification
(Software Requirements Specification)
—  System modeling
—  Requirements validation
—  Requirements management


4) The student marks should not be greater than 100. This is
(A) Integrity constraint
(B) Referential constraint
(C) Over-defined constraint
(D) Feasible constraint
Ans.: a.)
Rdbms concept
Easy question.
Note: Integrity means to ensure accuracy and consistency of data


5) GO  BOTTOM  and  SKIP-3 commands are given one after another in a database file of 30 records. It shifts the control to
(A) 28th record      (B) 27th record
(C) 3rd record       (D) 4th record
Ans.: b.)
Simple logical question. Go to the last record and leave the last 3 recrods, therefore, the control will be shifted to 27th record. 


6) An ER Model includes
I.   An ER diagram portraying entity types.
II.  Attributes for each entity type
III. Relationships among entity types.
IV.  Semantic integrity constraints that reflects the business rules about data not captured in the ER diagram.
(A) I, II, III & IV   (B) I&IV
(C) I, II & IV        (D) I & III
Ans.: a.)
Rdbms concept



7) What does the following declaration mean ?
int (*ptr) [10];
(A) ptr is an array of pointers of 10 integers.
(B) ptr is a pointer to an array of 10 integers.
(C) ptr is an array of 10 integers.
(D) none of the above.
Ans.: b.)
Simple question.
Related to c language.



8) Which of the following operators can not be overloaded in C+ + ?
(A) *     (B) + =
(C) = =     (D) ::
Ans.: d.)
Very simple.



9) allows to create classes which are derived from other classes, so that they automatically include some of its "parent's" members, plus its own members.
(A) Overloading
(B) Inheritance
(C) Polymorphism
(D) Encapsulation
Ans.: b.)
OOPS concept.




10)  _________ is often used to prove the correctness of a recursive function.
(A) Diagonaliization
(B) Communitivity
(C) Mathematical Induction
(D) Matrix Multiplication
Ans.: c.)


11) Which of the following derivations does a top-down parser use while parsing an input string ? The input is scanned from left to right.
(A) Leftmost derivation
(B) Leftmost derivation traced out in reverse
(C) Rightmost derivation traced out in reverse
(D) Rightmost derivation
Ans.: a.)
Compiler design.



12) The process of assigning load addresses to the various parts of the program and adjusting the code and data in the program to reflect the assigned addresses is called    ____________
(A) Symbol resolution
(B) Parsing
(C) Assembly
(D) Relocation
Ans.: d.)
Operating systems
program relocatability refer to the ability to load and execute a program into an arbitrary place in memory



13) Active X controls are Pentium binary programs that can be embedded in ____________
(A) Word pages
(B) URL pages
(C) Script pages
(D) Web pages
Ans.: d.)
Windows programming
ActiveX is a loosely defined set of technologies developed by Microsoft in 1996 for sharing information among different applications
Example:  Internet Explorer's Flash player is an ActiveX control. 



14) Match the following :
List-I                                                       List - II
a. Wireless Application Environment      i.    HTTP      
b. Wireless Transaction Protocol           ii.    IP
c. Wireless Datagram Protocol             iii    Scripts
d. Wireless                                          iv.    UDP
Codes :      
     a     b     c    d
(A) ii    iv     i    iii
(B) iv    iii     ii    i
(C) iv    iii     i    ii
(D) iii    i     iv    ii
Ans.: d.)
Mobile computing



15) Which of the following is widely used inside the telephone system for long-haul data traffic ?
(A) ISDN
(B) ATM
(C) Frame Relay
(D) ISTN
Ans.: b.)
Networks



16) The document standards for EDI were first developed by large business house during the 1970s and are now under the control of the following standard organisation :
(A) ISO
(B) ANSI
(C) ITU-T
(D) IEEE
Ans.: b.)
ANSI (American National Standards Institute)
Current trends and technologies



17) Electronic Data Interchange Software consists of the following four layers :
(A) Business application, Internal format conversion, Network translator, EDI envelope
(B) Business application, Internal format conversion, EDI translator, EDI envelope
(C) Application layer, Transport layer, EDI translator, EDI envelope
(D) Application layer, Transport layer, IP layer, EDI envelope
Ans.: d.)
Current trends and technologies



18) Linux operating system uses
(A) Affinity Scheduling
(B) Fair Preemptive Scheduling
(C) Hand Shaking
(D) Highest Penalty Ratio Next
Ans.: b.)
OS



19) The VLF and LF bauds use propagation for communication.
(A) Ground          (B) Sky
(C) Line of sight   (D) Space
Ans.: a.)
Mobile computing



20) Data Integrity control uses  
(A) Upper and lower limits on numeric data.
(B) Passwords to prohibit unauthorised access to files.
(C) Data dictionary to keep the data
(D) Data dictionary to find last access of data
Ans.: d.)
RDBMS concept

No comments:

Post a Comment