Sunteți pe pagina 1din 5

.Which option converts high-level language programs into machine language?

A. Interpreter
B. Assembler
C. Compiler (Answer)
D. Translator

23.Which of the following explains local variables in Java?

A. Variables declared outside the body of a particular method.


B. Variables declared in the body of a particular method. (Answer)
C. This is another name of instance variable.
D. This is another name of future Subclasses.

24.The first step in system analysis is ________, where you investigate business
processes and document what the new system must do to satisfy users.

A. Requirement gathering
B. Requirement analysis
C. Requirement modeling (Answer)
D. Requirement planning

25.Which of the following sorting algorithm use(s) divide-and-conquer


algorithm?

A. Merge sort
B. Quick sort
C. Bucket sort
D. All of the above (Answer)

26.Convert (100001)2 to decimal number. Which option is correct?

A. 31
B. 33 (Answer)
C. 29
D. 39

27.DOS 2.0 had support for __________ and support for hierarchical directories.

A. Multimedia
B. Windows
C. Hard disk (Answer)
D. GUI

28.Which of the following attributes for a university data can be used as a


primary key (PK)?
A. Name of Dean
B. Name of Department (Answer)
C. Female staff
D. Name of student

29.A computer based system makes use of which of the following system
components?

A. Software
B. Hardware
C. Database
D. All of the above (Answer)

30.What is/are the main advantage(s) of digital signaling?

A. Cheaper
B. Less susceptible to noise interference
C. Highly susceptible to noise interference
D. Both 'A' and 'B' (Answer)

31.Which notation is used for denoting an upper bound that is NOT asymptotically
tight?

A. Ɵ-notation
B. o-notation (Answer)
C. (Omega) notation
D. % notation

32.Which of the following does NOT cover the activities necessary for the Quality
Program?

A. Establish requirements and control changes


B. Establish and implement methods
C. Evaluate process and product quality
D. Evaluate organizational relationships (Answer)

33.Which of the following critical success factor for software project deals with
testing and correction of mistakes?

A. Quality assurance (Answer)


B. Change management
C. User involvement
D. Integration of components
E. Adequate corrections of the schedule

34.Through the selection and application of appropriate safeguards, security


helps the organization' to protect its physical and financial resources,
reputation, legal position, employees, and other tangible and intangible
assets. The above statement falls under which head from the following:-
A. Computer security supports the mission of the organization (Answer)
B. Computer security should be periodically reassessed
C. Computer security is an integral element of sound management
D. Computer security responsibilities and accountability should be made explicit
………………………………………….

……………………………………….
19.Which type of diagram models the workflow of a module of software
project?

A. Activity diagram (Answer)


B. UML class diagram
C. Sequence diagram
D. Lattice model

20.Mutator method in Java is another name of:

A. built-in method
B. query method
C. Set method (Answer)
D. Get method

21.System analysis and design generally focus on the following EXCEPT?

A. Systems
B. Processes
C. Technology
D. Programming (Answer)

22.Cars for refilling CNG outside a Pump is an example of:

A. Stack
B. Queue (Answer)
C. Link list
D. Array

23.A master-slave flip flop is designed using how many flip flops?

A. 1
B. 2 (Answer)
C. 3
D. 4

24.Which of the following defines a deadlock?

A. Permanent blocking of a set of processes that compete for system


resources. (Answer)
B. Permanent opening of a set of processes that compete for system resources.
C. A piece of code within a process that requires access to shared resources.
D. A piece of code within a process that requires access to blocked resources.

25.Which of the following SQL operation automatically removes duplicates?

A. Average operator
B. Union Operation
C. Intersect Operation
D. Except operation (Answer)

26.In Use case diagram, functions are represented by:

A. Arrows
B. Vertical lines
C. Actors
D. Ovals (Answer)

27.Which of the following explains Backbone LAN?

A. This LAN is a wireless LAN.


B. This LAN creates a shared storage facility across a low-speed network.
C. This LAN creates a shared storage facility across a high-speed network.
D. A high-capacity LAN used to interconnect a number of lower capacity
LANs. (Answer)

28.In quick-sort if the partitioning is _________, then algorithm runs


asymptotically.

A. Recursive call
B. Small
C. Unbalanced
D. Balanced (Answer)

29.Activities of this kind help us in confirming that a product meets its intended
use. These activities aim at confirming that a product meets its customer’s
expectations. In other words, these activities focus on the final product, which
is extensively tested from the customer point of view.

A. Verification
B. Execution
C. Validation (Answer)
D. Authorization

30.Which of the following technique before the release of software encompasses


dividing the errors according to gravity into three groups; critical, significant,
and cosmetic and estimating the average time spent on correcting an error.
A. Counting of errors (Answer)
B. Predicting the number of errors using two test groups
C. The probability method
D. The regression method

31.If the project uses a/an ___________ approach, the organizational structure
of the team may use a cross-functional model. In a cross-functional team,
personnel from the functional areas of the organization work together as a
team to focus on objectives and to take responsibility for coordinating
activities across the organization.

A. Integrated (Answer)
B. Role based
C. Hybrid
D. Robust
E. Intuitive

S-ar putea să vă placă și