1) While estimating the cost of software, Lines of Code (LOC) and Function Points (FP) are used to measure which one of the following?
(A) Length of code
(B) Size of software
(C) Functionality of software
(D) None of the above
Ans.: B.)
A famous software engineering question. Self explanatory.
2) A good software design must have
(A) High module coupling, High module cohesion
(B) High module coupling, Low module cohesion
(C) Low module coupling, High module cohesion
(D) Low module coupling, Low module cohesion
Ans.: C.)
Frequently asked question in the exam.Shortcut: Always remember Coupling = Low and Cohesion = High.
3) How many times the word 'print' shall be printed by the following program segment?
for(i=1, i≤2, i++)
for(j=1, J≤2, J++)
for(k=l, k≤2, k++)
printf("print/n")
(A) 1
(B) 3
(C) 6
(D) 8
Ans.: D.)
Trick: There are 3 for loops and each for loop remains true till '2' times before the condition fails.
Therefore, 2^3=8.
4) Which of the following is not a type of Database Management System?
(A) Hierarchical
(B) Network
(C) Relational
(D) Sequential
Ans.: D.)
Very basic question
5) Cyclometric complexity of a flow graph G with n vertices and e edges is
(A) V(G) = e+n-2
(B) V(G) = e-n+2
(C) V(G) = e+n+2
(D) V(G) = e-n-2
Ans.: B.)
Software engineering question. Particularly used in Software testing. The formula was designed by Mccabe.
Note: In Dec 2013 exam, UGC may ask who developed Cycometric complexity.
Be alert.
6) Which normal form is considered as adequate for usual database design ?
(A) 2NF
(B) 3NF
(C) 4NF
(D) 5NF
Ans.: B.)
an ideal Database design is possible through 3NF.
7) Manager's salary details are to be hidden from Employee Table. This Technique is called as
(A) Conceptual level Datahiding
(B) Physical level Datahiding
(C) External level Datahiding
(D) Logical level Datahiding
Ans.: A.)
Explanation: Generally, when we say employee table, It includes the personal details of the employee. But salary of an employee is something that describes the things of significance to an organization.Therefore, hiding things of utmost significance is called as Conceptual Data hiding.
8) Which of the following addresses is used to deliver a message to the correct application program running on a host?
(A) Port
(B) IP
(C) Logical
(D) Physical
Ans.: A.)
9) In classful addressing, the IF address 190.255.254.254 belongs to
(A) Class A
(B) Class B
(C) Class C
(D) Class D
Ans.: B.)
Explanation:
(A) Length of code
(B) Size of software
(C) Functionality of software
(D) None of the above
Ans.: B.)
A famous software engineering question. Self explanatory.
2) A good software design must have
(A) High module coupling, High module cohesion
(B) High module coupling, Low module cohesion
(C) Low module coupling, High module cohesion
(D) Low module coupling, Low module cohesion
Ans.: C.)
Frequently asked question in the exam.Shortcut: Always remember Coupling = Low and Cohesion = High.
3) How many times the word 'print' shall be printed by the following program segment?
for(i=1, i≤2, i++)
for(j=1, J≤2, J++)
for(k=l, k≤2, k++)
printf("print/n")
(A) 1
(B) 3
(C) 6
(D) 8
Ans.: D.)
Trick: There are 3 for loops and each for loop remains true till '2' times before the condition fails.
Therefore, 2^3=8.
4) Which of the following is not a type of Database Management System?
(A) Hierarchical
(B) Network
(C) Relational
(D) Sequential
Ans.: D.)
Very basic question
5) Cyclometric complexity of a flow graph G with n vertices and e edges is
(A) V(G) = e+n-2
(B) V(G) = e-n+2
(C) V(G) = e+n+2
(D) V(G) = e-n-2
Ans.: B.)
Software engineering question. Particularly used in Software testing. The formula was designed by Mccabe.
Note: In Dec 2013 exam, UGC may ask who developed Cycometric complexity.
Be alert.
6) Which normal form is considered as adequate for usual database design ?
(A) 2NF
(B) 3NF
(C) 4NF
(D) 5NF
Ans.: B.)
an ideal Database design is possible through 3NF.
7) Manager's salary details are to be hidden from Employee Table. This Technique is called as
(A) Conceptual level Datahiding
(B) Physical level Datahiding
(C) External level Datahiding
(D) Logical level Datahiding
Ans.: A.)
Explanation: Generally, when we say employee table, It includes the personal details of the employee. But salary of an employee is something that describes the things of significance to an organization.Therefore, hiding things of utmost significance is called as Conceptual Data hiding.
8) Which of the following addresses is used to deliver a message to the correct application program running on a host?
(A) Port
(B) IP
(C) Logical
(D) Physical
Ans.: A.)
9) In classful addressing, the IF address 190.255.254.254 belongs to
(A) Class A
(B) Class B
(C) Class C
(D) Class D
Ans.: B.)
Explanation:
Class
|
Address Range
|
Class A
|
0.0.0.0
|
Class B
|
128.0.0.0
|
Class C
|
192.0.0.0
|
Class D
|
224.0.0.0
|
Class E
|
240.0.0.0
|
Trick: 0-127 -Class A
128-191-Class B
192-223- Class C
224-239-Class D
240-above- Class E
10) In IPv4 header, the field is needed to allow the destination host to determine which datagram a newly arrived fragments belongs to.
(A) identification
(B) fragment offset
(C) time to live
(D) header checksum
Ans.: A.)
Information: An IPV4 requires 32 bit address field IPV6 requires 128 bit address field
11) For a B-tree of height h and degree t, the total CPU time used to insert a node is
(A) O(h log t)
(B) O(t log h)(C) O(t2h)
(D) O(th)
Ans.: D.)
12) The time complexity to build a heap with a list of n numbers is
(A) O(log n)
(B) O(n)
(C) O(n log n)
(D) O(n2)
Ans.: B.)
Binary search: O(logn)
Merge sort: O(nlogn)
Quick sort: O(nlogn)
Selecton sort: O(n)
Insertion sort: O(n*n)
13) Consider the following statements for priority queue:
S1 : It is a data structure in which the intrinsic ordering of the elements does determine the result of its basic operations.
S2: The elements of a priority queue may be complex structures that are ordered on one or several fields.
Which of the following is correct?
(A) Both S1 and S2 are incorrect.
(B) S1 is correct and S2 is incorrect.
(C) SI is incorrect and S2 is correct.
(D) Both S1 and S2 are correct.
Ans.: D.)
14) The task of correcting and pre processing data is called as
(A) Data streaming
(B) Data cleaning
(C) Data mining
(D) Data storming
Ans.: B.)
15) Repository of information gathered from multiple sources, storing under unified scheme at a single site is called as
(A) Data mining
(B) Meta data
(C) Data warehousing
(D) Database
Ans.: C.)
16) A test contains 100 true/false questions. How many different
ways can a student answer the questions on the test, if the answer may be
left blank also.
(A) 100P2
(B) 100C2
(C) 2100
(D) 3100
Ans.: D.)
Reason: A question can be answered True or False or Left Blank. So there are 3 possibilities. So the answer is 3^100.
17) How many edges must be removed to produce the spanning forest of a graph with N vertices, M edges and C connected components?
(A) M+N-C
(B) M-N-C
(C) M-N+C
(D) M+N+C
Ans.: C.)
18) In substitution, a character in the plaintext is always changed to the same character in the ciphertext, regardless of its position in the text.
(A) polyalphabetic
(B) monoalphabetic
(C) transpositional
(D) multialphabetic
Ans.: B.)
19) The mv command changes
(A) the inode
(B) the inode-number
(C) the directory entry
(D) both the directory entry and the inode
Ans.: C.)
20) The relation "divides" on a set of positive integers is ________
(A) Symmetric and transitive
(B) Anti symmetric and transitive
(C) Symmetric only
(D) Transitive only
Ans.: B.)
21) COCOMO stands for
(A) Composite Cost Model
(B) Constructive Cost Model
(C) Constructive Composite Model
(D) Comprehensive Construction Model
Ans.: B.)
According to your answer to 7 i put this answer in psc .but that will goes to negative
ReplyDeleteExternal level datahiding is the answer
DeleteOkk
ReplyDelete