Sie sind auf Seite 1von 172

STRICTLY FOR PRIVATE CIRCULATION ONLY

PICT
PUNE
FPL2 QUESTIONS BANK WITH ANSWERS

:::|| COMPILED BY ||:::

:::|| MR. ABHINAY G. DHAMANKAR ||:::

:::|| ITDEPT ||:::


FPL-2 QUESTION BANK PREPARATIONS

Major Contributors :-
Teachers ( ITDEPT ) :-
1. Prof. Abhinay G. Dhamankar
2. Prof. Sachin D. Shelke
3. Prof. Vishal B. Bhosale
4. Prof. Aniket H. Bhaise
5. Prof. Rohini S. Rahate
Teaching Assistants ( ME IT ):-
1. Mr. Gaurav Dalvi
2. Mr. Palash Karmore
3. Mr. Himanshu Joshi
4. Ms. Suverna Jadhav
5. Ms. Sushmita Jain
6. Mr. Shubham Agrawal
7. Mr. Rashid Salman
FE Students :-
All students, who submitted their MCQs
on Moodle System.

IMP Instruction :
Correct option shown as an underlined.
PICT-FPL2-Unit-01-MiPro&MiControl-(321) KEY
1. 80386DX is a _______ bit microprocessor?

A. 16
B. 20
C. 32
D. 64

2. ALU of 80386DX is ______bit.

A. 16
B. 20
C. 30
D. 32

3. Address bus of 80386DX is _____ bit

A. 16
B. 32
C. 40
D. 64

4. 80386DX supports__________________.

A. Only pipelined architecture.


B. Only non-pipelined architecture.
C. Both pipelined & non-pipelined architecture.
D. None of the above

5. The 803806DX can address upto _________ virtual memory

A. 1 TeraByte
B. 64 TeraByte
C. 16 TeraByte
D. 8TeraByte

6. The 803806DX can address upto _________ physical memory

A. 1 MB
B. 64 MB
C. 16 MB
D. 4 GB

7. _______ architecture of 803806DX allows simultaneous instruction


fetching, decoding & execution of the instruction.

A. Only pipelined architecture.


B. Only non-pipelined architecture.
C. Both pipelined & non-pipelined architecture.
D. None of the above
8. Which of the following is not a functional block of 80386DX?

A. Execution unit
B. Bus Control unit
C. Pipeline Unit
D. Memory Management Unit

9. _________ Unit of 803806DX microprocessor reads the instruction from


instruction queue

A. Execution unit
B. Bus Control unit
C. Memory Management Unit
D. Decode Unit

10. _________ Unit of 803806DX microprocessor reads instruction from memory.

A. Execution unit
B. Decode Unit
C. Prefetch unit
D. Control Unit

11. _________ Unit of 803806DX microprocessor reads instruction prefetch


queue.

A. Execution unit
B. Decode Unit
C. Prefetch unit
D. Control Unit

12. _________ Unit of 803806DX microprocessor converts logical address into


linear address.

A. Segmentation Unit
B. Bus Control unit
C. Decode Unit
D. Paging Unit

13. _________ Unit of 803806DX microprocessor converts linear address into


physical address.

A. Segmentation Unit
B. Bus Control unit
C. Decode Unit
D. Paging Unit

14. Segmentation unit converts ____________________.

A. linear address into physical address


B. logical address into linear address
C. physical address into linear address
D. physical address into logical address
15. Paging unit converts ____________________.

A. linear address into physical address


B. logical address into linear address
C. physical address into linear address
D. physical address into logical address

16. Decoded instructions are stored in ___________.

A. Memory
B. CPU
C. Instruction queue
D. Prefetch queue

17. Instructions are read from memory by prefetch unit & stored in _________
__.

A. Memory
B. CPU
C. Instruction queue
D. Prefetch queue

18. Which of the following is not a processing mode of 80386DX?

A. Virtual mode
B. Parallel Mode
C. Real Mode
D. Protected Mode

19. Which of the following is a processing mode of 80386DX?

A. Dual Mode
B. Parallel Mode
C. Virtual Mode
D. Simple Mode

20. Paging can be _________________ in 80386DX Microprocessor.

A. Both enabled & disabled


B. Only enabled
C. only disabled
D. Compulsory

21. Object code of 80386DX is comatible with________ microprocessor.

A. 8008
B. 4004
C. 8086
D. 80486
22. Which of the following is true about external memory?

A. High capacity
B. Fast access
C. High cost
D. None of these

23. which of the following is non-volatile memory?

A. ROM
B. PROM
C. EROM
D. All of above

24. Access time of DRAM is ---------SRAM

A. greater than
B. less than
C. equal to
D. not defined

25. Packaging density of DRAM is------------ SRAM

A. greater than
B. less than
C. equal to
D. not defined

26. Which of the following are true about primary memory compared to
secondary memory?

A. High cost
B. Low speed
C. High storage
D. None of these

27. which access method is used to access cassette tape?

A. Direct
B. Sequential
C. Both of the above
D. None of these

28. EEPROM stands for

A. Electrically Erasable Programmable Read only memory


B. Electronic Erasable Programmable Read only memory
C. Easily Erasable programmable Read Only Memory
D. None of these
29. Which of the following memory need refresh?

A. SRAM
B. DRAM
C. ROM
D. All Of Above

30. Which computer memory used for storing programs and data currently being
processed by the CPU?

A. Mass Memory
B. Internal Memory
C. Non volatile memory
D. PROM

31. Which of the following is a secondary memory device?

A. Keyboard
B. Disk
C. Mouse
D. All of above

32. Which of the following is volatile memory?

A. RAM
B. ROM
C. EPROM
D. PROM

33. Which of the following memories does not need refreshing?

A. SRAM
B. PROM
C. DRAM
D. EPROM

34. As compared to secondary memory,the primary memory of a computer is ?

A. large
B. chip
C. fast
D. slow

35. Which of the following memories has the shortest access times?

A. Cache memory
B. Magnetic Bubble Memory
C. Magnetic Core Memory
D. RAM
36. size of primary cache is usually ---------as that of secondary cache.

A. Greater than
B. Smaller than
C. equal to
D. not defined

37. Which of the following is true about cache memory?

A. It's RAM
B. It's ROM
C. It's EEPROM
D. It's EPROM

38. Memory that is at the top of hierarchy is?

A. slower and more expensive


B. Non volatile and slower
C. On volatile and more expensive
D. Faster and more expensive

39. Select the correct ordering of memory in the storage hierarchy.

A. Hard disk,register,RAM,Cache
B. Cache,Register,RAM,Hard disk
C. Register,Cache,RAM,Hard disk
D. Hard disk,RAM,Register,Cache

40. What are the characteristics of memory at the bottom of the hierarchy?

A. Cheaper and larger in capacity


B. Cheaper and smaller in capacity
C. Faster and larger in capacity
D. Faster and smaller in capacity

41. Which of the following is fastest and most expensive type of storage?

A. Magnetic Disk
B. Registers
C. Cache
D. Main Momory

42. Which of the following device is slowest?

A. Cache
B. DRAM
C. SRAM
D. Magnetic disk
43. Which memory can be erased by exposing it to ultraviolet light.

A. ROM
B. PROM
C. RAM
D. EPROM

44. Which memory stores the data as a charge on the capacitor?

A. EPROM
B. SRAM
C. DRAM
D. None of these

45. Cost of DRAM is -------- SRAM

A. Less than
B. Greater than
C. Equal to
D. Not defined

46. Opcode indicates ------------------

A. Oprands
B. Operation
C. Both A & B
D. None

47. Data bus is---------------

A. Unidirectional
B. Homodirectional
C. Bidirectional
D. All of above

48. 32 TB memory requires---------------- address lines

A. 5
B. 15
C. 35
D. 45

49. 1 word =------------------------

A. 8 bit
B. 2 bytes
C. 16 bytes
D. 2 bit
50. 1 KB = ---------------------

A. 1024 bytes
B. 5024 bytes
C. 124 bytes
D. 2024 bytes

51. Which interrupt has the highest priority?

A. INTR
B. TRAP
C. RST6.5

52. In 8085 name the 16 bit registers?

A. Stack pointer
B. Program counter
C. a & b

53. Which of the following is hardware interrupts?

A. RST5.5, RST6.5, RST7.5


B. INTR, TRAP
C. a & b

54. What is the RST for the TRAP?

A. RST5.5
B. RST4.5
C. RST4

55. What are level Triggering interrupts?

A. INTR&TRAP
B. RST6.5&RST5.5
C. RST7.5&RST6.5

56. Which interrupt is not level sensitive in 8085?

A. RST6.5 is a raising edge-trigging interrupt.


B. RST7.5 is a raising edge-trigging interrupt.
C. a & b

57. What are software interrupts?

A. RST 0 - 7
B. RST 5.5 - 7.5
C. INTR, TRAP

58. What is SIM?

A. Select Interrupt Mask


B. Sorting Interrupt Mask
C. Set Interrupt Mask.
59. RIM is used to check whether, ______

A. The write operation is done or not b) c)


B. The interrupt is Masked or not
C. a & b
D.

60. What is meant by Maskable interrupts?

A. An interrupt which can never be turned off.


B. An interrupt that can be turned off by the programmer.
C. none

61. What does microprocessor speed depends on?

A. Clock
B. Data bus width
C. Address bus width
D.

62. Can ROM be used as stack?

A. Yes
B. No
C. sometimes yes, sometimes no

63. Which processor structure is pipelined?

A. all x80 processors


B. all x85 processors
C. all x86 processors
D.

64. Address line for RST3 is?

A. 0020H
B. 0028H
C. 0018H

65. The advantage of memory mapped I/O over I/O mapped I/O is,

A. Faster
B. Many instructions supporting memory mapped I/O
C. Require a bigger address decoder
D. All the above

66. The register that may be used as an operand register is

A. Accumulator
B. B register
C. Data register
D. Accumulator and B register
67. The registers that contains the status information is

A. control registers
B. instruction registers
C. program status word
D. all of the mentioned

68. An embedded system must have

A. hard disk
B. processor and memory
C. operating system
D. processor and input-output unit(s).

69. The device that generates the basic timing clock signal for the operation
of the circuit using crystal oscillator is

A. timing unit
B. timing and control unit
C. oscillator
D. clock generator

70. The registers that are not accessible by the user are

A. Accumulator and B register


B. IP and IE
C. instruction registers
D. TMP1 and TMP2

71. The ________of the memory chip will identify and select the register for
the EPROM

A. internal decoder
B. external decoder
C. address decoder
D. data decoder

72. Microprocessor provides signal like ____ to indicate the read operation

A. LOW
B. MCMW
C. MCMR
D. MCMWR

73. To interface memory with the microprocessor, connect register the lines
of the address bus must be added to address lines of the _______ chip.

A. single
B. memory
C. multiple
D. triple
74. The remaining address line of ______ bus is decoded to generate chip
select signal

A. data
B. address
C. control bus
D. both (a) and (b)

75. _____ has certain signal requirements write into and read from its
registers

A. memory
B. register
C. both (a) and (b)
D. control

76. An _________ is used to fetch one address

A. internal decoder
B. external decoder
C. encoder
D. register

77. The primary function of the _____________ is to accept data from I/P
devices

A. multiprocessor
B. microprocessor
C. peripherals
D. interfaces

78. ___________ signal prevent the microprocessor from reading the same data
more than one

A. pipelining
B. handshaking
C. controlling
D. signaling

79. __________ generate interrupt signal to microprocessor and receive


acknowledge

A. priority resolver
B. control logic
C. interrupt request register
D. interrupt register

80. The _______ is used to connect more microprocessor

A. peripheral device
B. cascade
C. I/O devices
D. control unit
81. In which year, 8086 was introduced?

A. 1978
B. 1979
C. 1977
D. 1981

82. ALE stands for ___________

A. address latch enable


B. address level enable
C. address leak enable
D. address leak extension

83. What is DEN?

A. direct enable
B. data entered
C. data enable
D. data encoding

84. Von neumonn architecture execute instruction in--------

A. Sequential
B. Parallel Mode
C. pipelined
D. simultaniously

85. Multiplexed pin contain address is A0 and Data is D0 then name of pin is
____.

A. A0D0
B. AD0
C. Both
D. AD

86. 1 long= ----------bits

A. 64
B. 32
C. 23
D. 16

87. size of page in 80386DX is ---------------

A. 4KB
B. 8KB
C. 16KB
D. 32KB
88. speed of 80386DX is

A. 20khz
B. 30KHZ
C. 40KHZ
D. 10KHZ

89. 25.61 in decimal number system is equivalent to how much in binary number
system?

A. 11001.10011
B. 11000.111
C. 11111.10011
D. 11111.11111

90. 11100 in binary number system is equivalent to how much in decimal no


system?

A. 30
B. 27
C. 28
D. 31

91. 110010.1011 in binary number system is equivalent to how much in decimal


no system?

A. 50.6875
B. 50.7568
C. 25.6875
D. 25.7568

92. A nibble contains

A. 4bits
B. 8bits
C. 16bit
D. 1bit

93. In big endian, you store

A. the least significant byte in the smallest address


B. the most significant byte in the smallest address
C. the most significant byte in the biggest address
D. the least significant byte in the biggest address

94. In little endian, you store

A. the least significant byte in the smallest address


B. the most significant byte in the smallest address
C. the most significant byte in the biggest address
D. the least significant byte in the biggest address
95. ________suspends the processing of currently executing program and begins
execution of another program

A. Wait
B. Halt
C. interrupt
D. Restart

96. A processor is 16 bit processor if

A. the address bus is 16bit


B. data bus is 16bit
C. processor can read 16 bit from memory at a time
D. ALU can process 16 bit data simulteneously

97. Address bus of 80386DX is _____ bit

A. 16
B. 32
C. 40
D. 64

98. 80386DX supports__________________

A. Only pipelined architecture.


B. Only non-pipelined architecture.
C. Both pipelined & non-pipelined architecture.
D. None of the above

99. The 803806DX can address upto _________ vitual memory

A. 1 TeraByte
B. 64 TeraByte
C. 16 TeraByte
D. 8TeraByte

100. _______ architecture of 803806DX allows simultaneous instruction


fetching, decoding & execution of the instruction.

A. Only pipelined architecture.


B. Only non-pipelined architecture.
C. Both pipelined & non-pipelined architecture.
D. None of the above

101. Which of the following is not a functional block of 80386DX?

A. Execution unit
B. Bus Control unit
C. Pipeline Unit
D. Memory Management Unit
102. _________ Unit of 803806DX microprocessor reads the instruction from
instruction queue

A. Execution unit
B. Bus Control unit
C. Memory Management Unit
D. Decode Unit

103. Decoded instructions are stored in ___________.

A. Memory
B. CPU
C. Instruction queue
D. Prefetch queue

104. Object code of 80386DX is comatible with________ microprocessor.

A. 8008
B. 4004
C. 8086
D. 80486

105. Which of the following is true about external memory?

A. High capacity
B. Fast access
C. High cost
D. None of these

106. which of the following is non-volatile memory?

A. ROM
B. PROM
C. EROM
D. All of above

107. Which of the following are true about primary memory compared to
secondary memory

A. High cost
B. Low speed
C. High storage
D. None of these

108. EEPROM stands for

A. Electrically Erasable Programable Read only memory


B. Electronic Erasable Programable Read only memory
C. Easily Erasable programableRead Only Memory
D. None of these
109. Which of the following is a secondary memory device?

A. Keyboard
B. Disk
C. ALU
D. All of above

110. Which of the following is volatile memory?

A. RAM
B. ROM
C. EPROM
D. PROM

111. Select the correct ordering of memory in the storage hierarchy.

A. Hard disk,register,RAM,Cache
B. Cache,Register,RAM,Hard disk
C. Register,Cache,RAM,Hard disk
D. Hard disk,RAM,Register,Cache

112. Opcode indicates ------------------

A. Oprands
B. Operation
C. Both A & B
D. None

113. Data bus is---------------

A. Unidirectional
B. Homodirectional
C. Bidirectional
D. All of above

114. 1 KB = ---------------------

A. 1024 bytes
B. 5024 bytes
C. 124 bytes
D. 2024 bytes

115. PIC stands for

A. Peripheral Interface Controller


B. Peripheral Interchange Circuits
C. Peripheral Information Circuitery
D. Peripheral Information Controller
116. When variables are created in C, they are stored in the _____

A. GPRS
B. SFRs
C. ROM
D. None of these

117. The 80386DX is a processor that supports

A. 8-bit data operand


B. 16-bit data operand
C. 32-bit data operand
D. all of the mentioned

118. The 80386DX has an address bus of

A. 8 address lines
B. 16 address lines
C. 32 address lines
D. 64 address lines

119. Which of the units is not a part of internal architecture of 80386?

A. central processing unit


B. memory management unit
C. bus interface unit
D. none of the mentioned

120. The unit that organizes the physical memory, in terms of pages of 4KB
size each is

A. segmentation unit
B. execution unit
C. paging unit
D. instruction unit

121. The paging unit works under the control of

A. memory management unit


B. segmentation unit
C. execution unit
D. instruction unit

122. The signal that is used to insert WAIT states in a bus cycle in 80386
is

A. HOLD
B. HLDA
C. READY
D. PEREQ
123. One computer that is not considered a portable computer is

A. Minicomputer
B. A laptop computer
C. Tablet PC
D. All of the above

124. Which of the following is a way to access secondary memory?

A. Random access memory


B. Action method
C. Transfer method
D. Density method

125. Which of the following devices have a limitation that we can only store
information to it but cannot erase or modify it?

A. Floppy Disk
B. Hard Disk
C. Tape Drive
D. CDROM

126. Which is an item of storage medium in the form of circular plate?

A. Disk
B. CPU
C. Printer
D. ALU

127. The two basic types of record access methods are:

A. Sequential and random


B. Sequential and indexed
C. Direct and immediate
D. Online and real time

128. The actual execution of instructions happens in

A. ALU
B. CU
C. Memory
D. None of above

129. In what respect human beings are superior to computers?

A. Diligence
B. Intelligence
C. Slavery
D. Reliability
130. As compared to the secondary memory, the primary memory of a computer
is

A. Large
B. Cheap
C. Fast
D. Slow

131. The language that the computer can understand and execute is called

A. Machine language
B. Application software
C. System program
D. All of above

132. Who invented the high level language C?

A. Dennis M. Ritchie
B. Niklaus Writh
C. Seymour Papert
D. Donald Kunth

133. Which computer memory is used for storing programs and data currently
being processed by the CPU?

A. Mass memory
B. Internal memory
C. Non-volatile memory
D. PROM

134. Which of the following is not an output device?

A. Portable Projector
B. Printer
C. Flat Screen
D. Touch Screen

135. The process of putting data into a storage location is called

A. reading
B. writing
C. controlling
D. hand shaking

136. The CPU consists of

A. input, output and processing


B. control unit, primary storage and secondary storage
C. Control unit; arithmetic logic unit and primary storage
D. input, processing and storage
137. A list of instructions used by a computer is called

A. program
B. CPU
C. text
D. output

138. Software instruction intended to satisfy a user's specific processing


needs are called

A. system software
B. process software
C. documentation
D. application software

139. The term 'memory' applies to which one of the following

A. logic
B. storage
C. input device
D. output device

140. A collection of 8 bits is called

A. byte
B. record
C. word
D. nibble

141. In the binary number 110.101, the fractional part has the value

A. 0.625
B. 0.125
C. 0.875
D. 0.5

142. The value of 25 in octal system is

A. 20
B. 40
C. 400
D. None of these

143. The ASCII code is for information interchange by a binary code for

A. numbers only
B. alphabets only
C. alphanumeric and other common symbols
D. None of these
144. A characteristic of multiprogramming system is

A. simultaneous execution of program instructions from two applications


B. concurrent processing of two or more programs
C. multiple CPU's
D. all of the above

145. Communication circuits that transmit data in both directions but not at
the same time are operating in

A. simplex mode
B. half-duplex mode
C. full-duplex mode
D. asynchronous mode

146. Operating system functions may include

A. input/output control
B. virtual storage
C. multiprogramming
D. all of the above

147. Which of the following items is not used in LAN

A. computers
B. modem
C. printer
D. cable

148. A kilobyte also referred to as KB, is equal to

A. 1000 bytes
B. 1024 bytes
C. 2048 bytes
D. 512 bytes

149. Inputs to your computer is accomplished using the

A. Screen
B. keyboard
C. printer
D. plotter

150. A collection of wires that connects several device is called

A. link
B. bus
C. cable
D. port
151. Memories in which any location can be reached in a fixed and short
amount of time after specifying its address is called

A. sequential access memory


B. random access memory
C. secondary memory
D. mass storage

152. Which of the following is used as storage locations both in the ALU and
in the control section of a computer

A. accumalator
B. register
C. adder
D. decoder

153. Which of the following memory is volatile

A. RAM
B. ROM
C. EPROM
D. PROM

154. One of the main features that distinguish microprocessor from


microcomputers is

A. words are usually larger in microprocessors


B. words are shorter in microprocessors
C. microprocessor doesnot contain I/O devices
D. computers are not fully integrated

155. A data packet is a packet header together with

A. a network layer
B. an administrative layer
C. user data
D. a packet switch

156. The application layer of the OSI model is the

A. seventh layer
B. sixth layer
C. fifth layer
D. fourth layer

157. Working of the WAN generally involves

A. satellite
B. frame delay
C. ATM
D. user agent
158. Which of the following technique provides dedicated communication
channel between two stations.

A. switch network
B. circuit switching
C. packet switching
D. none of these

159. End-to-end connectivity is provided from host-to-host in

A. network layer
B. session layer
C. data link layer
D. transport layer

160. Which of the two architecture saves memory?

A. Harvard
B. Von Neumann
C. none of the mentioned
D. both of the mentioned in A and B

161. OP Code is code that indicates the ..

A. Operands
B. Operation
C. Both of above
D. None of the above

162. Bus is a group of ..

A. Instructions
B. Operands
C. Pins
D. Opcodes

163. Data bus is ..

A. Unidirectional O/P from processor to memory and I/O device


B. Unidirectional I/P to processor to memory and I/O device
C. Bidirectional
D. None of the above

164. Address bus is .

A. Unidirectional O/P from processor to memory and I/O device


B. Unidirectional I/P to processor to memory and I/O device
C. Bidirectional
D. None of the above
165. Control Bus is

A. Unidirectional O/P from processor to memory and I/O device


B. Unidirectional I/P to processor to memory and I/O device
C. Bidirectional
D. None of the above

166. Operands are .

A. Operation Indicator
B. Data on which is to be performed
C. Instructions
D. None of the above

167. Interrupt is a ..

A. Disturbance to microprocessor
B. Signal given to microprocessor
C. Signal given to microprocessor
D. all of the above

168. Interrupt service Routine is a ..

A. Name of microprocessor
B. Small Program that services the corresponding Interrupt
C. Is a special type of interrupt
D. None of the above

169. Non Vectored interrupt is .

A. Interrupt whose address is known to the processor


B. Interrupt whose address is not known to the processor and the processor
gets from the interrupting source
C. Interrupt that cannot be disabled by the programmer
D. Interrupt that can be disabled by the programmer

170. Vectored interrupt is ..

A. Interrupt whose address is known to the processor


B. Interrupt whose address is not known to the processor and the processor
gets from the interrupting source
C. Interrupt that cannot be disabled by the programmer
D. Interrupt that can be disabled by the programmer

171. The physical memory of 80386 can be a maximum of ___________

A. 4MB
B. 4GB
C. 64MB
D. 64TB
172. The virtual memory of 80386 can be a maximum of_____________

A. 4MB
B. 4GB
C. 64MB
D. 64TB

173. 80386 supports ______________ levels of protection

A. 2
B. 3
C. 4
D. 5

174. 80386 does not support virtual mode of operation

FALSE

175. 80386 is object code compatible with 8086

TRUE

176. 80386 does not have on- chip TLB

FALSE

177. 80386 can be interfaced with__________ math co-processor

A. 80287
B. 80387
C. Both of the above
D. None of the above

178. Parity flag is ____________ to indicate that the result has even parity

A. 0
B. 1
C. 2
D. None of the above

179. Paging mechanism converts _____________

A. virtual memory to main memory


B. main memory to virtual memory
C. linear address to physical address
D. physical address to linear address

180. 0 flag is_____________ to indicate that the result is not zero

A. 0
B. 1
C. 2
D. None of the above
181. Sign flag is __ to indicate that the signed result is negative

A. zero
B. one
C. two
D. none

182. Sign flag is__ to indicate that the signed result is positive

A. 0
B. 1
C. 2
D. NONE

183. Over flow flag is__to indicate that the signed result is out of range

A. 0
B. 1
C. 2
D. NONE

184. Which of the following is not a functional block of 80386DX?

A. Execution unit
B. Bus Control unit
C. Pipeline Unit
D. Memory Management Unit

185. _________ Unit of 803806DX microprocessor reads the instruction from


instruction queue

A. Execution unit
B. Bus Control unit
C. Memory Management Unit
D. Decode Unit

186. Segmentation unit converts ____________________.

A. linear address into physical address


B. logical address into linear address
C. physical address into linear address
D. physical address into logical address

187. Packaging density of DRAM is------------ SRAM

A. greater than
B. less than
C. equal to
D. not defined
188. Which of the following memory need refresh?

A. SRAM
B. DRAM
C. ROM
D. All Of Above

189. The advantage of pages in paging is

A. no logical relation with program


B. no need of entire segment of task in physical memory
C. reduction of memory requirement for task
D. all of the mentioned

190. The size of the pages in paging scheme is

A. variable
B. fixed
C. both variable and fixed
D. none

191. The size of each page table is of

A. 2 Kbytes
B. 2 bytes
C. 4 Kbytes
D. 4 bytes

192. Scheduling is

A. allowing job to use the processor


B. unrelated performance considerations
C. quiet simple to implement, even on large main frames
D. the same regardless of the purpose of the system

193. The instructions available in the 80386 that are not available in its
real address mode is

A. addressing techniques
B. instructions for protected address mode
C. instructions for interrupt handling
D. all of the mentioned

194. The interrupt-request line is a part of the

A. Data line
B. Control line
C. Address line
D. None
195. When the process is returned after an interrupt service ______ should be
loaded again
i) Register contents
ii) Condition codes
iii) Stack contents
iv) Return addresses

A. i,iv
B. ii,iii and iv
C. iii,iv
D. i,ii

196. The time between the recieval of an interrupt and its service is ______

A. Interrupt delay
B. Interrupt latency
C. Cycle time
D. Switching time

197. Interrupts form an important part of _____ systems

A. Batch processing
B. Multitasking
C. Real-time processing
D. Multi-user

198. The resistor which is attached to the service line is called _____

A. Push-down resistor
B. Pull-up resistor
C. Break down resistor
D. Line resistor

199. An interrupt that can be temporarily ignored is

A. Vectored interrupt
B. Non-maskable interrupt
C. Maskable interrupt
D. High priority interrupt

200. Which interrupt is unmaskable??

A. RST 5.5
B. RST 7.5
C. TRAP
D. Both a and b
201. 80386 can be interfaced with _____ math coprocessor

A. 80287
B. 80387
C. both of the above
D. none of the above

U1 MicroPro... #37

202. 80386 is a object code compatible with 8086

TRUE

U1 MicroPro... #39

203. There are ______ number of input channels for the 10 bit ADC in
PIC18F877

A. 4
B. 8
C. 12
D. 16

U1 MicroPro... #96

204. 80386 has ___ bit data bus

A. 8
B. 16
C. 32
D. 64

U1 MicroPro... #31

205. Parity flag is _____ to indicate that the result has odd parity

A. 0
B. 1
C. 2
D. none of the above

U1 MicroPro... #49

206. There is a ______________ level stack in the PIC18F877 for storing the
return address of the program counter

A. 6
B. 8
C. 10
D. 12

U1 MicroPro... #99
207. 80386 can operate in ____ mode

A. Real address
B. Protected
C. Virtual 8086
D. All of the above

U1 MicroPro... #56

208. Data bus is __________

A. Unidirectional output from processor to memory and I/O devices


B. Unidirectional input to processor to memory and I/O devices
C. Bidirectional
D. None of the above

U1 MicroPro... #3

209. Selector for selecting the descriptor in the descriptor table is _______
_

A. Index Register
B. Base Register
C. Segment Register
D. General purpose registers

U1 MicroPro... #67

210. to maintain protection amongst the task the _____ and________ are
compared while accessing a I/O location

A. CPL and DPL


B. CPL and IOPL
C. EPL and IOPL
D. RPL and CPL

U1 MicroPro... #72

211. A processor is 16-bit processor mainly implies that __________________

A. address bus is 16 bit


B. internal data bus is 16 bit
C. external data bus is 16 bit
D. ALU can process 16-bit data simultaneously

U1 MicroPro... #13

212. The capture mode of PIC18F877 can capture the time at every

A. falling edge
B. rising edge
C. every 4th rising edge
D. all of the above

U1 MicroPro... #105
213. Privilege level 3 is used for

A. kernel
B. system services
C. operating system
D. Applications

U1 MicroPro... #62

214. Cache uses principles of ___________

A. Faraday's Law
B. Coulomb's Law
C. Locality of reference
D. Reference of locality

U1 MicroPro... #17

215. The virtual memory of 80386 can be a maximum of ______

A. 4MB
B. 4GB
C. 64MB
D. 64TB

U1 MicroPro... #35

216. 80386 does not have on-chip TLB

FALSE

U1 MicroPro... #40

217. EPROM can be written on for _______ times

A. once by the manufacturer


B. once by the user
C. many times by the user
D. ten times by the user

U1 MicroPro... #28

218. Bus is a group of _______

A. Instructions
B. Operands
C. Pins
D. Opcodes

U1 MicroPro... #2
219. _____ register works as counter for loop , rotate ,etc instruction

A. EBX
B. EAX
C. EDX
D. ECX

U1 MicroPro... #42

220. (16)10=(?)16

A. (10)16
B. (F)16
C. (11)16
D. None of above

U1 MicroPro... #119

221. The page table in main memory stores information of pages present in
main memory.

TRUE

U1 MicroPro... #26

222. Sign flag is _____ to indicate that the sign result is within range

A. 0
B. 1
C. 2
D. none of the above

U1 MicroPro... #55

223. 80386 has ___ registers of ____ bit each

A. 8,32
B. 14,16
C. 8,16
D. 14,16

U1 MicroPro... #33

224. Code stored in a segment with PL=p can be accessed only by code
executing at a PL, numerically, _________

A. at least privileged as p
B. the same or lower PL than p
C. at the same PL
D. none of the above

U1 MicroPro... #65
225. IDTR points the base of __________

A. Task state segment


B. Local Descriptor Table
C. Global Descriptor Table
D. Interrupt Descriptor table

U1 MicroPro... #75

226. The number of timer/counters in PIC18F877 is___________

A. 1
B. 2
C. 3
D. 4

U1 MicroPro... #91

227. PROM can be written on for __________ times

A. once by the manufacturer


B. once by the user
C. many times by the user
D. ten times by the user

U1 MicroPro... #27

228. ROM can be written on for ______ times

A. once by the manufacturer


B. once by the user
C. many times by the user
D. ten times by the user

U1 MicroPro... #24

229. (D) 16=(?)2

A. (1010)2
B. (1101)2
C. (0111)2
D. None of the above

U1 MicroPro... #118

230. A required data when not found in main memory, entire page is brought
into the main memory and is retained for some time based on _________ .

A. Faraday's Law
B. Coulomb's Law
C. Spatial principle of locality of reference
D. Temporal principle of locality of reference

U1 MicroPro... #22
231. The instruction set size of PIC18F877 is _________ instructions

A. 25
B. 35
C. 45
D. 45

U1 MicroPro... #98

232. Privilege level 2 is used for

A. kernel
B. system services
C. operating system
D. Applications

U1 MicroPro... #61

233. 80386 supports _____ levels of protection

A. 2
B. 3
C. 4
D. 5

U1 MicroPro... #36

234. The reset vector address (address of the first instruction to be


executed) of PIC18F877 is _________

A. 0000H
B. 0001H
C. 0004H
D. 1FFFH

U1 MicroPro... #112

235. Translational look-aside buffer ____________

A. gives the translated physical address of the required operand


B. gives the translated physical address of the first byte in the page that
has the required operand
C. gives the linear address of the required operand
D. none of the above

U1 MicroPro... #23

236. (1111) 2=(?)16

A. (10)16
B. (F)16
C. (E)16
D. None

U1 MicroPro... #121
237. Privilege level 1 is used for

A. kernel
B. system services
C. operating system
D. applications

U1 MicroPro... #60

238. The segment size in 80386 is _________

A. fixed 1 MB
B. Fixed 4 GB
C. variable from 1 byte to 1 MB
D. Variable from 1 byte to 1 GB

U1 MicroPro... #77

239. The 8-level stack of PIC18F877 is used to store _____________

A. Parameters to be passed to the subroutine or function


B. the target address of the function to be called
C. The return address of the caller function
D. stack address of the task

U1 MicroPro... #100

240. 80386 has ___ byte prefetch queue

A. 6
B. 16
C. 32
D. 64

U1 MicroPro... #30

241. EEROM can be written on for ______ times

A. once by manufacturer
B. once by the user
C. many times by user
D. ten times by user

U1 MicroPro... #29

242. The data memory of PIC18F877 is divided into _______ banks

A. 2
B. 4
C. 8
D. 16

U1 MicroPro... #111
243. Overflow flag is _____ to indicate that the sign result is out of range

A. 0
B. 1
C. 2
D. none of the above

U1 MicroPro... #54

244. Privilege level 0 is used for

A. kernel
B. System service
C. operating system
D. application

U1 MicroPro... #59

245. Data stored in a segment with PL=p can be accessed only by code
executing at a PL , numerically, ____________

A. at least as privileged as p
B. the same or lower PL than p
C. at the same PL
D. none of the above

U1 MicroPro... #64

246. Brown_ out resets the processor if _______________

A. the microcontroller sleeps


B. the supply voltage rises above the brown out level or BVDD
C. the microcontroller gets hanged
D. the supply voltage rises below the brown out level or BVDD

U1 MicroPro... #102

247. PSP parallel communication is not supported in PIC18F877

FALSE

U1 MicroPro... #95

248. ADC in PIC18F877 is __________ bit ADC

A. 6
B. 8
C. 10
D. 12

U1 MicroPro... #97
249. The data EEPROM size in PIC18F877 is ______________ bytes

A. 256
B. 356
C. 368
D. 512

U1 MicroPro... #88

250. The 'ED" bit being 1, in the access right byte of the non-system, non
executable descriptor indicates

A. System Descriptor
B. code segment
C. data segment
D. stack segment

U1 MicroPro... #81

251. Stack stored in a segment with PL =p can be accessed only by code


executing at a PL, numerically,________

A. at least as priviliged as p
B. the same or lower PL than p
C. at the same PL
D. none of the above

U1 MicroPro... #66

252. Auxillary carry flag holds the carry generated from ________

A. MSB (Most Significant Bit)


B. LSB (Least Significant Bit)
C. Bit D 3 to D4
D. None of the above

U1 MicroPro... #47

253. THe "AV" bit in the descriptor indicates that _______

A. The segment and the descriptor are available and not used by any other
task.
B. The descriptor table is available and not used by any other task
C. The processor is available and not used by any other task.
D. The register set is available and not reached by any other task.

U1 MicroPro... #78

254. A required data not found in cache is called as __________

A. Page hit
B. Cache hit
C. Page miss
D. Cache miss

U1 MicroPro... #20
255. ______ register works as a via register for I/O access

A. EBX
B. EAX
C. EDX
D. ECX

U1 MicroPro... #43

256. Non-vectored interrupt is ____________

A. interrupt whose address is known to the processor


B. interrupt whose address is not known to the processor and processor gets
it from the interrupting source
C. interrupt that cannot be disabled by the programmer
D. interrupt that can be disabled by the programmer

U1 MicroPro... #9

257. The user program memory in PIC18F877 starts at _______

A. 0000H
B. 0005H
C. 0015H
D. 1FFFH

U1 MicroPro... #115

258. The user program memory is divided into _________ pages

A. 1
B. 2
C. 3
D. 4

U1 MicroPro... #116

259. A required data when not found in main memory an entire page is brought
into main memory based on _________

A. Faraday's Law
B. Coulomb's Law
C. Spatial principle of locality of reference
D. Temporal principle of locality of reference

U1 MicroPro... #21

260. Vectored interrupt is __________

A. interrupt whose address is known to the processor


B. interrupt whose address is not known to the processor and the processor
gets it from the interrupting source
C. interrupt that cannot be disabled by the programmer
D. interrupt that can be disabled by the programmer

U1 MicroPro... #10
261. Sign flag is _____ to indicate that the sign result is negative

A. 0
B. 1
C. 2
D. none of the above

U1 MicroPro... #52

262. Zero flag is _____ to indicate that the result is not zero

A. 0
B. 1
C. 2
D. none of the above

U1 MicroPro... #51

263. ------------- always points to the next instruction to be executed in


80386

A. CS:ESI
B. CS:EDI
C. CS:EBX
D. CS:EIP

U1 MicroPro... #45

264. SFR(Special Function Registers) are used to

A. perform general purpose operations like providing the operands


B. perform special arithmetic an logical operation
C. controlling various on-chip I/O peripherals
D. none of the above

U1 MicroPro... #110

265. LAT register is used to __________

A. read the levels of the pins on the port pins


B. write the data on the port pins by latching them in the latch
C. decide the direction of the port pins
D. none of the above

U1 MicroPro... #104

266. Protection mechanism results in _____

A. Multi-threading
B. Multi-processing
C. Multi-tasking
D. Multi-processors

U1 MicroPro... #63
267. PIC18F877 is a____________ bit microcontroller

A. 4
B. 8
C. 16
D. 32

U1 MicroPro... #84

268. 80386 does not support virtual mode of operation

FALSE
U1 MicroPro... #38

269. GDTR points the base of _________

A. Task state segment


B. Local descriptor table
C. global descriptor table
D. interrupt descriptor table

U1 MicroPro... #73

270. The flash memory of PIC18F877 is ______ words of __________ bits

A. 8k,8
B. 16k,8
C. 8k,14
D. 16k,14

U1 MicroPro... #86

271. TRIS register is used to _________________

A. read the levels of the pins on the port pins


B. write the data on the port pins by latching them in the latch
C. decide the direction of the port pins
D. none of the above

U1 MicroPro... #103

272. MSSP serial communication is not supported in PIC18F877.

FALSE

U1 MicroPro... #93

273. The interrupt vector address of PIC18F877 is _______

A. 0000H
B. 0001H
C. 0004H
D. 1FFFH

U1 MicroPro... #113
274. Cache uses _______ type of memory

A. SRAM
B. DRAM
C. Magnetic
D. Optical

U1 MicroPro... #16

275. _______ register is called the accumulator

A. EBX
B. EAX
C. EDX
D. ECX

U1 MicroPro... #41

276. The USART of PIC18F877 can be configured as ____________

A. Asynchronous (full-duplex)
B. Synchronous- Master (half duplex)
C. Synchronous- Slave (half-duplex)
D. all of the above

U1 MicroPro... #109

277. Each descriptor in 80386 is of _______bytes

A. 4
B. 6
C. 8
D. 10

U1 MicroPro... #69

278. The size of address bus of a processor determines ___________

A. maximum size of memory that can be interfaced to the processor


B. maximum number of bits that can be there in each memory location
C. maximum number of processor that can be connected to a memory
D. maximum number of memory chips that can be connected to the processor

U1 MicroPro... #14

279. Maskable interrupt is _____________

A. interrupt whose address is known to the processor


B. interrupt whose address is not known to the processor and the processor
gets it from the interrupting source
C. interrupt that cannot be disabled by the programmer
D. interrupt that can be disabled by the programmer

U1 MicroPro... #11
280. Interrupt service routine is a __________

A. name of microprocessor
B. small program that services the corresponding interrupt
C. is a special type of interrupt
D. none of the above

U1 MicroPro... #8

281. Interrupt is a ___________

A. Disturbance to microprocessor
B. signal given by microprocessor
C. signal given to microprocessor
D. all of the above

U1 MicroPro... #7

282. Machine cycle refers to time required to __________

A. The cyclic process in the machine


B. One cycle read or write from memory
C. Read or write from I/O
D. both b and c

U1 MicroPro... #83

283. 80386 has __ bit address bus

A. 8
B. 16
C. 32
D. 64

U1 MicroPro... #32

284. The last address of program memory PIC18F877 is __________

A. 0000H
B. 0001H
C. 0004H
D. 1FFFH

U1 MicroPro... #114

285. The number of I/O ports in PIC18F877 is ______

A. 4
B. 5
C. 6
D. 7

U1 MicroPro... #90
286. (1011) 2=(?)10

A. (9)10
B. (10)10
C. (11)10
D. None of above

U1 MicroPro... #120

287. Opcode is a code that indicates the_________

A. Operands
B. Operation
C. Both of the above
D. None of the above

U1 MicroPro... #1

288. Parity flag is _____ to indicate that the result has even parity

A. 0
B. 1
C. 2
D. none of the above

U1 MicroPro... #48

289. To maintain protection amongst the tasks the _______ and ____________
are compared while acessing a memory location.

A. CPL and DPL


B. CPL and IOPL
C. EPL and IOPL
D. RPL and CPL

U1 MicroPro... #71

290. A required data found in Cache is called as __________

A. Page Hit
B. Cache Hit
C. Page miss
D. Cache miss

U1 MicroPro... #18

291. TR points the base of___________

A. Task state segment


B. Local descriptor table
C. global descriptor table
D. interrupt descriptor table

U1 MicroPro... #76
292. (6) 10=(?)2

A. (1010)2
B. (110) 2
C. (011) 2
D. None of the above

U1 MicroPro... #117

293. Each task can access a maximum of_________ local and global registers

A. 8192
B. 16384
C. 32768
D. 65536

U1 MicroPro... #68

294. The analog comparator of PIC18F877 can be used to compare 2 analog


voltages

TRUE

U1 MicroPro... #108

295. The PWM mode of PIC18F877 can be used to make a DAC (Digital to analog
convertor)

TRUE
U1 MicroPro... #107

296. Address bus is __________

A. Unidirectional output from processor to memory and I/O devices


B. Unidirectional input to processor to memory and I/O devices
C. Bidirectional
D. None of the above

U1 MicroPro... #4

297. USART serial communication is not supported in PIC18F877

TRUE

U1 MicroPro... #94

298. In real mode 80386 uses the ____ formula to generate the physical
address

A. Segment register * 10H + Effective Address


B. Segment register + 10H * Effective Address
C. Segment register * 10H * Effective Address
D. Segment register + 10H + Effective Address

U1 MicroPro... #58
299. Control bus is _________

A. Unidirectional output from processor to memory and I/O devices


B. Unidirectional input to processor to memory and I/O devices
C. Bidirectional
D. none of the above

U1 MicroPro... #5

300. A required data found in main memory is called as ___________

A. Page hit
B. Cache hit
C. Page miss
D. Cache miss

U1 MicroPro... #19

301. Demand paging refers to providing the required page to the main memory
when demanded by the processors

TRUE

U1 MicroPro... #25

302. Watchdog Timer resets the microcontroller PIC18F877 when ______________


__

A. the microcontroller sleeps


B. the supply voltage rises above the brown out level or BVDD
C. the microcontroller gets hanged
D. the supply voltage falls below the brown out level or BVDD

U1 MicroPro... #101

303. Maximum speed of the PIC18F877 microcontroller is __________

A. 10 MHZ
B. 20MHZ
C. 30 MHZ
D. 40 MHZ

U1 MicroPro... #85

304. ------------register works as a data register to hold the upper part of


the 32 bit addition

A. EBX
B. EAX
C. EDX
D. ECX

U1 MicroPro... #44
305. The number of interrupt source in PIC18F877 is ________________

A. 13
B. 14
C. 15
D. 16

U1 MicroPro... #89

306. In real mode 80386 can access _____ size of memory

A. 1 MB + 64 KB
B. 1MB
C. 1MB + 64KB - 16 B
D. 4GB

U1 MicroPro... #57

307. Operands are ________________

A. Operation Indicator
B. Data on which operation is to be performed
C. instruction
D. none of the above

U1 MicroPro... #6

308. Sign flag is _____ to indicate that the sign result is positive

A. 0
B. 1
C. 2
D. none of the above

U1 MicroPro... #53

309. The EPL (Effective privilege level) given to a task is__________

A. RPL(Requested privilege level)


B. CPL(Current Privilege Level)
C. max(RPL,CPL)
D. DPL(Descriptor Privilege Level)

U1 MicroPro... #70

310. A processor that has 32 address lines can access _______ memory
locations

A. 32
B. 4
C. 4Giga
D. 32Giga

U1 MicroPro... #15
311. The 'E" bit being 1, in the access right byte of the non-system
descriptor indicates

A. System descriptor
B. code segment
C. data segment
D. stack segment

U1 MicroPro... #80

312. The physical memory of 80386 can be a maximum of ______

A. 4MB
B. 4GB
C. 64MB
D. 64KB

U1 MicroPro... #34

313. The data memory size of PIC18F877 is ________ bytes

A. 256
B. 356
C. 368
D. 512

U1 MicroPro... #87

314. Carry flag holds the carry generated from _____________

A. MSB (Most Significant Bit)


B. LSB (Least Significant Bit)
C. Bit D3 to bit D4
D. None of the above

U1 MicroPro... #46

315. The number of CCP (compare/ Capture /PWM)modules in PIC18F877 is ______


____

A. 1
B. 2
C. 3
D. 4

U1 MicroPro... #92

316. Non- maskable interrupt is ______________

A. interrupt whose address is known to the processor


B. interrupt whose address is not known to the processor and the processor
gets it from the interrupting source
C. interrupt that cannot be disabled by the programmer
D. interrupt that can be disabled by the programmer

U1 MicroPro... #12
317. The compare mode of PIC18F877 can perform ________ with every match in
the compare register and the actual timer value

A. driving a port pin high


B. driving a port pin low
C. toggle a port pin
D. all the above

U1 MicroPro... #106

318. Paging can be enabled and disabled in 80386

TRUE

U1 MicroPro... #82

319. The 'S" bit being 1, in the access right byte of descriptor indicates

A. System descriptor
B. code segment
C. Data segment
D. Stack Segment

U1 MicroPro... #79

320. LDTR points the base of ________

A. Task state segment


B. Local descriptor table
C. global descriptor table
D. interrupt descriptor table

U1 MicroPro... #74

321. Zero flag is _____ to indicate that the result is zero

A. 0
B. 1
C. 2
D. none of the above

U1 MicroPro... #50
PICT-FPL2-Unit-02-Linux(50) KEY
1. Which of the following below are true functionalities of Kernel ?

A. Allocates time and memory to programs


B. Authenticates user
C. Interprets commands
D. All choices are correct

2. A process is identified by a unique

A. pid
B. ld
C. processed
D. proid

3. Which command reduces the size of a file ?

A. pzip
B. gcat
C. pgcat
D. gzip

4. Which command is used to see the online manual ?

A. man
B. manual
C. *man
D. %man

5. Which command is used to clear the screen ?

A. % clear
B. clear
C. clrscr
D. either A or C

6. Pipe symbol is represented by

A. ||
B. |
C. ^
D. $

7. What is used to search files for specified words or patterns ?

A. less
B. srch
C. %src
D. grep
8. The dmesg command

A. Shows user login logoff attempts


B. Shows the syslog file for info messages
C. Kernel log messages
D. Shows the daemon log messages

9. Which command is used to record a user login session in a file

A. macro
B. read
C. script
D. none of the above

10. Solaris is the name of a flavor of UNIX from

A. HP
B. IBM
C. Digital Equipment Corp
D. Sun Microsystems

11. Which of the following is NOT a UNIX variant ?

A. Solaris
B. AIX
C. IRIX
D. AS400

12. The system calls in UNIX is written using which language

A. C
B. C++
C. Assembly Language
D. Fortran

13. Command used to determine the path of an executable file is

A. which
B. where
C. wexec
D. what

14. Command used to count number of character in a file is

A. grep
B. wc
C. count
D. cut
15. Which of these commands could you use to show one page of output at a
time ?

A. less
B. sed
C. pause
D. grep

16. Which commands will give you information about how much disk space each
file in the current directory uses ?

A. ls -l
B. ls -la
C. du
D. ls -a

17. Which of the following command output contains userid ?

A. ls
B. help
C. date
D. ls l

18. Which command is used to display all the files including hidden files in
your current and its subdirectories ?

A. ls aR
B. ls a
C. ls R
D. ls l

19. pwd command displays

A. user password
B. present working directory
C. print name of current/working directory
D. none of the mentioned

20. What command is used to remove files ?

A. dm
B. rm
C. delete
D. erase

21. What command is used to remove the directory ?

A. rdir
B. remove
C. rd
D. rmdir
22. What command is used with vi editor to delete a single character ?

A. x
B. y
C. a
D. z

23. What hardware architectures are not supported by Red Hat Linux?

A. SPARC
B. IBM-compatible
C. Alpha
D. Macintosh
E. None of the above

24. Which of the following command is used unmount a filesystem ?

A. demount
B. unmount
C. dmount
D. umount

25. What does rwx r-x r-- means in octal ?

A. 755
B. 743
C. 754
D. 745

26. Which command is used to copy entire directory ?

A. cp -r
B. cp -i
C. cp
D. none of these

27. Which command is used to display the unix version

A. uname -r
B. uname -n
C. uname -t
D. kernel

28. Which command is used to print a file

A. print
B. ptr
C. lpr
D. none of the above
29. find / -name * will

A. List all files and directories recursively starting from /


B. List a file named * in /
C. List all files in / directory
D. List all files and directories in / directory

30. Which command is used to view compressed text file contents

A. cat
B. type
C. zcat
D. print

31. Which command is used to display disk consumption of a specific directory

A. du
B. ds
C. dd
D. dds

32. Which command creates an empty file if file does not exist ?

A. cat
B. touch
C. ed
D. read

33. Which option of rm command is used to remove a directory with all its
subdirectories

A. b
B. o
C. p
D. r

34. Which command is used to identify file type ?

A. Type
B. File
C. Finfo
D. Info

35. Write the command to display the current date in the form dd/mm/yyyy.

A. date +%d/%m/%Y
B. date +%d/%m/%Y
C. date +/%d/%m/20%y
D. date +/%d/%m/20%y
36. The command syntax to display the file sample.txt one page at a time is

A. man sample.txt > more


B. cat sample.txt < more
C. cat sample.txt | more
D. None of the above

37. How do you rename file new to file old?

A. mv new old
B. move new old
C. cp new old
D. ren new old

38. Shell is ?

A. Command Interpreter
B. Interface between Kernel and Hardware
C. Interface between user and applications
D. Command Compiler

39. Which command is used to display the operating system name

A. os
B. Unix
C. kernel
D. uname

40. Maximum how long can a Linux filename be ?

A. 128 bytes
B. 255 bytes
C. 32 bytes
D. 64 bytes

41. Which combination of keys is used to exit from terminal ?

A. Ctrl + t
B. Ctrl + z
C. Ctrl + d
D. Ctrl + e

42. Which command(s) is/are used to get help about a command in Linux ?

A. info
B. man
C. None of these
D. Both a and b
43. Which of the following OS is not based on Linux ?

A. Ubuntu
B. Redhat
C. CentOs
D. BSD

44. Which key combination is used to see all the hidden files in Nautilus
file manager ?

A. Ctrl + Shift + h
B. Ctrl + h
C. Ctrl + Alt + h
D. None of the above

45. Which of the following command is used to create file in Linux ?

A. touch
B. cat
C. echo
D. All of the above

46. In Linux everything stored as a

A. file
B. directory
C. executables
D. None of the above

47. Which of the following is not a valid login shell in Linux ?

A. C shell
B. Net Shell
C. Bash Shell
D. Z shell

48. Which directory in Linux contains all the config file of the system ?

A. /etc
B. /var
C. /lib
D. /bin

49. Which of the following command is used to know last shutdown/reboot date
and time ?

A. last
B. lastlogin
C. lastreboot
D. lastshutdown
50. Which is the core of the operating system ?

A. Shell
B. Kernel
C. Commands
D. Script
PICT-FPL2-Unit-02-CPP(100) KEY
1. Which of the following access specifies is used in a class definition by
default?

A. Protected
B. Public
C. Private
D. Friend

2. Which of the following also known as an instance of a class?

A. Friend Functions
B. Object
C. Member Functions
D. Member Variables

3. Constructor is executed when _____.

A. an object is created
B. an object is used
C. a class is declared
D. an object goes out of scope.

4. Which of the following statements is correct?

A. Data items in a class must be private.


B. Both data and functions can be either private or public.
C. Member functions of a class must be private.
D. Constructor of a class cannot be private.

5. What does your class can hold?

A. data
B. functions
C. both a & b
D. none of the mentioned

6. How many specifiers are present in access specifiers in class?

A. 1
B. 2
C. 3
D. 4

7. Which is used to define the member of a class externally?

A. :
B. ::
C. #
D. none of the mentioned
8. Which of the following statements are correct for a static member
function?
It can access only other static members of its class.
It can be called using the class name, instead of objects.

A. Only 1 is correct.
B. Only 2 is correct.
C. Both 1 and 2 are correct.
D. Both 1 and 2 are incorrect.

9. What is the output of this program?


#include <iostream>
using namespace std;
class rect
{
int x, y;
public:
void val (int, int);
int area ()
{
return (x * y);
}
};
void rect::val (int a, int b)
{
x = a;
y = b;
}
int main ()
{
rect rect;
rect.val (3, 4);
cout << "rect area: " << rect.area();
return 0;
}

A. rect area:12
B. rect area: 12
C. rect area:24
D. none of the mentioned

10. The fields in the class in c++ program are by default

A. protected
B. private
C. public
D. none of the mentioned

11. Which of the following is a valid class declaration?

A. class A { int x; };
B. class B { }
C. public class A { }
D. object A { int x; };
12. Constructors are used to

A. initalize the objects


B. construct the data members
C. both a & b
D. none of the mentioned

13. Which type is best suited to represent the logical values?

A. integer
B. boolean
C. character
D. all of the mentioned

14. Which operator is used to signify the namespace?

A. conditional operator
B. ternary operator
C. scope operator
D. none of the mentioned

15. What is the output of this program?


#include <iostream>
using namespace std;
namespace first
{
int var = 5;
}
namespace second
{
double var = 3.1416;
}
int main ()
{
int a;
a = first::var + second::var;
cout << a;
return 0;
}

A. 11
B. 01
C. 00
D. 10
16. What is the output of this program?
#include <iostream>
using namespace std;
namespace Box1
{
int a = 4;
} namespace Box2 {
int a = 13;
}
int main () {
int a = 16; Box1::a;
Box2::a;
cout << a;
return 0;
}

A. 4
B. 13
C. 16
D. compile time error

17. What is the output of this program?


#include <iostream>
using namespace std
namespace space {
int x = 10;
}
namespace space
{
int y = 15; }
int main(int argc, char * argv[])
{
space::x = space::y =5;
cout << space::x << space::y;
}

A. 1015
B. 1510
C. 55
D. compile time error
18. What is the output of this program?
#include <iostream>
using namespace std;
namespace extra
{
int i;
}
void i()
{
using namespace extra;
int i;
i = 9;
cout << i;
}
int main()
{
enum letter { i, j};
class i { letter j; };
::i();
return 0;
}

A. 9
B. 10
C. compile time error
D. none of the mentioned

19. What is the output of this program?


#include <iostream>
using namespace std;
int main()
{
int a;
a = 5 + 3 * 5;
cout << a;
return 0;
}

A. 35
B. 20
C. 25
D. 40

20. Which of the following is the only technical difference between


structures and classes in C++?

A. Member function and data are by default protected in structures but


private in classes.
B. Member function and data are by default private in structures but public
in classes.
C. Member function and data are by default public in structures but private
in classes.
D. Member function and data are by default public in structures but
protected in classes.
21. What is the correct value to return to the operating system upon the
successful completion of a program?

A. -1
B. 1
C. 0
D. Programs do not return a value.

22. What is the only function all C++ programs must contain ?

A. start()
B. system()
C. main()
D. program()

23. What punctuation is used to signal the beginning and end of code blocks ?

A. { }
B. -> and <-
C. BEGIN and END
D. ( and )

24. What punctuation ends most lines of C++ code?

A. . (dot)
B. ; (semi-colon)
C. : (colon)
D. ' (single quote)

25. Which of the following is a correct comment ?

A. */ Comments */
B. ** Comment **
C. /* Comment */
D. { Comment }

26. Which of the following is not a correct variable type ?

A. float
B. real
C. int
D. double

27. Which of the following is true?

A. 1
B. 66
C. .1
D. -1
E. All of the above
28. Evaluate !(1 && !(0 || 1)).

A. True
B. False
C. Unevaluatable
D. Error

29. What is data hiding ?

A. It is related with hiding internal object details


B. It is related with showing internal object details
C. It is related with datatypes
D. None of above

30. What is class in c++ ?

A. When you define a class, you define a blueprint for a data type.
B. When you define a class, you make get more funtionality.
C. When you define a class, you define the logic.
D. When you define a class, you make debugging.

31. What is object in C++ ?

A. Object is part of syntax of a class.


B. Object is datatype of a class.
C. Object is an instance of a class.
D. Object is function of a class.

32. Which is more memory efficient ?

A. structure
B. union
C. both use same memory
D. depends on a programmer

33. How we can define member function outside the class ?

A. Using union
B. Using structure
C. Using pointers
D. Using scope resolution

34. In C++ ..................... operator is used for Dynamic memory


allocation.

A. Scope resolution
B. Conditional
C. New
D. Membership access
35. Operators such as ...................... cannot be overloaded.

A. +
B. ++
C. : :
D. = =

36. Which function return the current position of the get or put pointer in
bytes.

A. tellg( )
B. tellp( )
C. tell( )
D. Both A and B

37. In C++, the first index number in an array starts


with ............................ and the index number of an array of
size n will be ............

A. 0, n-1
B. 1, n-1
C. 0, n
D. 1, n

38. To overload an operator ..................... keyword must be used along


with the operator to be overloaded.

A. Over
B. Overload
C. Void
D. Operator

39. Because the lifetime of a local variable is limited and determined


automatically, these variables are also
called ............................

A. automator
B. automatic
C. dynamic
D. static

40. Which of the following type of class allows only one object of it to be
created ?

A. Virtual class
B. Abstract class
C. Singleton class
D. Friend class
41. Which of the following is not a type of constructor ?

A. Copy constructor
B. Friend constructor
C. Default constructor
D. Parameterized constructor

42. Which of the following statements is correct ?

A. Base class pointer cannot point to derived class.


B. Derived class pointer cannot point to base class.
C. Pointer to derived class cannot be created.
D. Pointer to base class cannot be created.

43. Which of the following is not the member of class ?

A. Static function
B. Friend function
C. Const function
D. Virtual function

44. Which of the following keyword is used to overload an operator ?

A. overload
B. operator
C. friend
D. override

45. What will happen if a class is not having any name ?

A. It cannot have a destructor.


B. It cannot have a constructor.
C. It is not allowed.
D. Both A and B.

46. Which inheritance type is used in the class given below ?

class A : public X, public Y


{

A. Multilevel inheritance
B. Multiple inheritance
C. Hybrid inheritance
D. Hierarchical Inheritance
47. which one of the following is correct about the statements given below?

(I) All function calls are resolved at compile-time in Procedure


Oriented Programming.
(II) All function calls are resolved at compile-time in OOPS.

A. Only II is correct.
B. Both I and II are correct.
C. Only I is correct.
D. Both I and II are incorrect.

48. Which of the following operators cannot be overloaded ?

A. [ ]
B. ->
C. ?:
D. *

49. In which of the following a virtual call is resolved at the time of


compilation ?

A. From inside the destructor.


B. From inside the constructor.
C. From inside the main( ).
D. Both A and B.

50. Which of the following statements regarding inline functions is correct ?

A. It speeds up execution.
B. It slows down execution.
C. It increases the code size.
D. Both A and C

51. Which of the following is a valid class declaration ?

A. class A { int x; };
B. class B { }
C. public class A { }
D. object A { int x; };

AGD FPL... #8
52. What is the output of the following program?
#include <iostream>
using namespace std;
int f(int p, int q)
{
if (p > q)
return p;
else
return q;
}
int main()
{
int a = 5, b = 10;
int k;
bool x = true;
bool y = f(a, b);
k =((a * b) + (x + y));
cout << k;
return 0;
}

A. 55
B. 62
C. 52
D. none of the mentioned

AGD FPL... #34

53. What will be output of this program?


#include <iostream>
using namespace std;
int main()
{
int i = 3;
int l = i / -2;
int k = i % -2;
cout << l << k;
return 0;
}

A. compile time error


B. -1 1
C. 1 -1
D. implementation defined

AGD FPL... #18


54. What is the output of this program?
#include <iostream>
using namespace std;
int main()
{
int a = 5, b = 6, c, d;
c = a, b;
d = (a, b);
cout << c << ' ' << d;
return 0;
}

A. 5 6
B. 6 5
C. 6 7
D. none of the mentioned

AGD FPL... #15

55. How "Late binding" is implemented in C++ ?

A. Using C++ tables


B. Using Virtual tables
C. Using Indexed virtual tables
D. Using polymorphic tables

AGD FPL... #25

56. What is actual syntax of destructor in c++ ?

A. !Classname( )
B. @Classname( )
C. $Classname( )
D. ~Classname( )

AGD FPL... #41

57. Which of the following cannot be passed to a function ?

A. Array
B. Reference variable
C. Object
D. File

AGD FPL... #31

58. An explicitly defined destructor function

A. may be virtual
B. may not be virtual
C. will always be virtual
D. will never be virtual

AGD FPL... #43


59. Which of the following correctly describes overloading of functions ?

A. Virtual polymorphism
B. Transient polymorphism
C. Ad-hoc polymorphism
D. Pseudo polymorphism

AGD FPL... #23

60. Enumerators are stored by the compiler in ?

A. string
B. integer
C. float
D. any of above

AGD FPL... #37

61. What is the output of this program?


#include <iostream>
using namespace std;
int main()
{
int a = 5, b = 6, c, d;
c = a, b;
d = (a, b);
cout << c << ' ' << d;
return 0;
}

A. 6 5
B. 5 6
C. 6 7
D. none of the mentioned

AGD FPL... #22

62. Which of the following statements is correct in C++ ?

A. Classes cannot have data as protected members.


B. Structures can have functions as members.
C. Class members are public by default.
D. Structure members are private by default.

AGD FPL... #4

63. Which of the following is used to make an abstract class ?

A. Declaring it abstract using static keyword.


B. Declaring it abstract using virtual keyword.
C. Making at least one member function as virtual function.
D. Making at least one member function as pure virtual function.

AGD FPL... #5
64. What is the output of the following program?

#include <iostream>
using namespace std;
int main()
{
int x = -1;
unsigned int y = 2;
if(x > y)
{
cout << "x is greater";
}
else
{
cout << "y is greater";
}
}

A. x is greater
B. y is greater
C. Implementation defined
D. Arbitrary

AGD FPL... #17

65. What will be the output of this program ?


#include <iostream>
using namespace std;
int main()
{
char c = 74;
cout << c;
return 0;
}

A. A
B. N
C. J
D. I

AGD FPL... #27


66. What is the output of this program?
#include <iostream>
using namespace std;
class A
{
public: A(int n )
{
cout << n;
}
};
class B: public A
{
public: B(int n, double d) : A(n)
{
cout << d;
}
};
class C: public B
{
public: C(int n, double d, char ch) : B(n, d)
{
cout <<ch;
}
};
int main()
{
C c(5, 4.3, 'R');
return 0;
}

A. 54.3R
B. R4.35
C. 4.3R5
D. None of the mentioned

AGD FPL... #7

67. << operator is ?

A. stream extraction operator


B. stream insertion operator
C. left shift operator
D. right shift operator

AGD FPL... #39


68. What is the output of this program?
#include <iostream>
using namespace std;
int main()
{
int a = 10;
if (a < 10)
{
for (i = 0; i < 10; i++)
cout << i;
}
else
{
cout << i;
}
return 0;
}

A. 0123456789
B. 123456789
C. 0
D. error

AGD FPL... #13

69. Evaluate the following


(false && true) || false || true

A. 0
B. 1
C. false
D. none of the mentioned

AGD FPL... #35

70. Which of the following is correct about function overloading ?

A. The types of arguments are different.


B. The order of argument is different.
C. The number of argument is same.
D. Both A and B.

AGD FPL... #24

71. Pick the odd one out.

A. integer, character, boolean, floating


B. enumeration, classes
C. integer, enum, void
D. arrays, pointer, classes

AGD FPL... #32


72. Destructors are called ?

A. not defined
B. in any order
C. in the reverse order of constructor calls
D. in the same order of constructor calls

AGD FPL... #44

73. What is the output of this program?


#include <iostream>
using namespace std;
void addprint()
{
static int s = 1;
s++;
cout << s;
}
int main()
{
addprint();
addprint();
addprint();
return 0;
}

A. 234
B. 111
C. 123
D. 235

AGD FPL... #12

74. Which of the following is not an extension associated during the creation
of a C++ program ?

A. .cpp
B. .exe
C. .jpg
D. .bak

AGD FPL... #47

75. The antonym of constructor is ?

A. Creator
B. Distinct
C. Destroyer
D. Destructor

AGD FPL... #36


76. C++ was originally developed by ?

A. Colcksin and Mellish


B. Donald E.Knuth
C. Sir Richard Handlee
D. Bajarne Stoustrup

AGD FPL... #45

77. How we can access data members using objects ?

A. object@datamember
B. object*datamember
C. object->datamember
D. object.datamember

AGD FPL... #30

78. Which of the following header file includes definition of cin and cout ?

A. istream.h
B. ostream.h
C. iomanip.h
D. iostream.h

AGD FPL... #2

79. Which one of the following options is correct ?

A. Friend function can access public data members of the class.


B. Friend function can access protected data members of the class.
C. Friend function can access private data members of the class.
D. All of the above.

AGD FPL... #3

80. When struct is used instead of the keyword class means, what will happen
in the program ?

A. access is public by default


B. access is private by default
C. access is protected by default
D. none of the mentioned

AGD FPL... #9

81. Which operator is having the highest precedence?

A. postfix
B. unary
C. shift
D. equality

AGD FPL... #21


82. [2 Marks]
What is the output of this program?
#include <iostream>
using namespace std;
int main()
{
int i, j;
j = 10;
i = (j++, j + 100, 999 + j);
cout << "i="<<i<<" "<<"j="<<j;
return 0;
}

A. i=1000 j=11
B. i=11 j=111
C. i=1010 j=11
D. i=1001 j=1100

AGD FPL... #16

83. Which one of the following is the correct way to declare a pure virtual
function?

A. virtual void Display(void){0};


B. virtual void Display = 0;
C. virtual void Display(void) = 0;
D. void Display(void) = 0;

AGD FPL... #1

84. Pick the odd one out

A. array type
B. character type
C. boolean type
D. integer type

AGD FPL... #10

85. What is the output of this program?

#include <iostream>
using namespace std;
enum test { A = 32, B, C };
int main()
{
cout << A << B<< C;
return 0;
}

A. 323334
B. 323232
C. 323130
D. none of the mentioned

AGD FPL... #29


86. cfront ?

A. is the front end of C compiler


B. is the pre-processor of C compiler
C. is a tool that translate a C++ code to its equivalent C code
D. None of above

AGD FPL... #46

87. What is the output of this program?


#include <iostream>
using namespace std;
int g = 100;
int main()
{
int a;
{
int b;
b = 20;
a = 35;
g = 65;
cout << b << a << g;
}
a = 50;
cout << a << g;
return 0;
}

A. 2035655065
B. 2035655035
C. 2035635065
D. none of the mentioned

AGD FPL... #11

88. Which operator is having right to left associativity in the following?

A. Array subscripting
B. Function call
C. Addition and subtraction
D. Type cast

AGD FPL... #20

89. What is the value of the bool?

bool is_int(789.54)

A. True
B. False
C. 1
D. none of the mentioned

AGD FPL... #33


90. Which operator is having the highest precedence ?

A. postfix
B. unary
C. shift
D. equality

AGD FPL... #14

91. Why reference is not same as a pointer ?

A. A reference can never be null.


B. A reference once established cannot be changed.
C. Reference doesn't need an explicit dereferencing mechanism.
D. All of the above.

AGD FPL... #40

92. Why every program begins with main () in C++ ?

A. As this is from the compiler knows that program execution actually


starts.
B. Because its name "main" is most popular
C. Both A and B
D. None of above

AGD FPL... #49

93. The symbol ** __ .

A. can be overloaded by changing its datatype.


B. cannot be overloaded, as on overloading its meaning shall be changed.
C. can be overloaded.
D. cannot be overloaded as it is not a C++ operator.

AGD FPL... #38

94. Stacks are based on ?

A. FIFO ( First In First Out )


B. LIFO ( Last In First Out )
C. FILO ( First In Last Out )
D. All of above

AGD FPL... #42


95.

A. 0
B. 1
C. Compiler error may be possible
D. Runtime error may be possible

AGD FPL... #19

96. What is the output of this program?


#include <stdio.h>
int main()
{
char a = '\012';
printf("%d", a);
return 0;
}

A. Compiler error
B. 12
C. 10
D. Empty

AGD FPL... #28

97. What is correct about the static data member of a class ?

A. A static member function can access only static data members of a class.
B. A static data member is shared among all the object of the class.
C. A static data member can be accessed directly from main().
D. Both A and B.

AGD FPL... #6
98. What does STL stand for ?

A. Simple Template Library


B. Standard Template Library
C. Static Type Library
D. Single Type-based Library

AGD FPL... #50

99. Which of the following is not a C++ Compiler ?

A. C front
B. Turbo C++
C. Borland C++
D. C++ compiler

AGD FPL... #48

100. How many characters are specified in the ASCII scheme ?

A. 64
B. 128
C. 256
D. none of the mentioned

AGD FPL... #26


PICT-FPL2-Unit-02-CoreJava(143) KEY
1. Which of these functions is called to display the output of an applet?

A. display()
B. print()
C. displayApplet()
D. PrintApplet()

2. Which of these methods can be used to output a sting in an applet?

A. display()
B. print()
C. drawString()
D. transient()

3. What does AWT stands for?

A. All Window Tools


B. All Writing Tools
C. Abstract Window Toolkit
D. Abstract Writing Toolkit

4. Which of these methods is a part of Abstract Window Toolkit (AWT) ?

A. display()
B. print()
C. drawString()
D. transient()

5. Which of these modifiers can be used for a variable so that it can be


accessed from any thread or parts of a program?

A. transient
B. volatile
C. global
D. No modifier is needed

6. Which of these operators can be used to get run time information about an
object?

A. getInfo
B. Info
C. instanceOf
D. getinfoof
7. What is the length of the application box made by this program?

import java.awt.*;
import java.applet.*;

public class myapplet extends Applet


{
public void paint(Graphics g)
{
g.drawString("A Simple Applet", 20, 20);
}
}

A. 20
B. 50
C. 100
D. System dependent

8. What is the length of the application box made by this program?

import java.awt.*;
import java.applet.*;

public class myapplet extends Applet


{
Graphic g;
g.drawString("A Simple Applet", 20, 20);
}

A. 20
B. Default Value
C. Compilation Error
D. Runtime Error
9. What is the output of this program?
import java.io.*;
class Chararrayinput
{
public static void main(String[] args)
{ String obj = "abcdefgh";
int length = obj.length();
char c[ ] = new char[length];
obj.getChars(0, length, c, 0);
CharArrayReader input1 = new CharArrayReader(c);
CharArrayReader input2 = new CharArrayReader(c, 1, 4);
int i; int j;
try
{
while((i = input1.read()) == (j = input2.read()))
{
System.out.print((char)i);
}
} catch (IOException e)
{
e.printStackTrace();
}
}
}

A.
B. abcd
C. abcde
D. None of the mentioned

10. Which of the method is used to put a thread to sleep ?

A. stop()
B. sleep()
C. join()
D. call()

11. Which of these method is used to find out that a thread is still running
or not?

A. run()
B. Alive()
C. isAlive()
D. checkRun()

12. In Java, What is the default value of priority variable MIN_PRIORITY AND
MAX_PRIORITY?

A. 0 & 256
B. 0 & 1
C. 1 & 10
D. 1 & 256
13. Which of these method waits for the thread to treminate?

A. sleep()
B. isAlive()
C. join()
D. stop()

14. Which of these method is used to explicitly set the priority of a


thread?

A. set()
B. make()
C. setPriority()
D. makePriority()

15. What is synchronization in reference to a thread?

A. Its a process of handling situations when two or more threads need


access to a shared resource.
B. Its a process by which many thread are able to access same shared
resource simultaneously.
C. Its a process by which a method is able to access many different threads
simultaneously.
D. Its a method that allow to many threads to access any information
require.

16. What is the output of this program?


class newthread extends Thread
{
newthread()
{
super("My Thread"); start();
}
public void run()
{
System.out.println(this);
}
}
class multithreaded_programing
{
public static void main(String args[])
{
new newthread();
}
}

A. My Thread
B. Thread[My Thread,5,main]
C. Compilation Error
D. Runtime Error
17. What is the output of this program?
class newthread extends Thread
{
Thread t;
newthread()
{
t = new Thread(this,"My Thread");
t.start();
}
public void run()
{
try{
t.join();
System.out.println(t.getName());
}
catch(Exception e)
{
System.out.print("Exception");
}
}
}

class multithreaded_programing
{
public static void main(String args[]) {
new newthread();
}
}

A. My Thread
B. Thread[My Thread,5,main]
C. this,MyThread
D. Runtime Error
18. What is the output of this program?
class newthread extends Thread
{
Thread t;
newthread()
{
t = new Thread(this,"New Thread");
t.start();
}
public void run()
{
System.out.println(t.isAlive());
}
}

class multithreaded_programing
{
public static void main(String args[]) {
new newthread();
}
}

A. 0
B. 1
C. true
D. false
19. What is the output of this program?

class newthread extends Thread


{
Thread t1,t2;
newthread()
{
t1 = new Thread(this,"Thread_1");
t2 = new Thread(this,"Thread_2");
t1.start();
t2.start();
}
public void run()
{
t2.setPriority(Thread.MAX_PRIORITY);
System.out.print(t1.equals(t2));
}
}
class multithreaded_programing
{
public static void main(String args[]) {
new newthread();
}
}

A. true
B. false
C. truetrue
D. falsefalse

20. What is the Message is displayed in the applet made by this program?

import java.awt.*;
import java.applet.*;
public class myapplet extends Applet
{
public void paint(Graphics g)
{
g.drawString("A Simple Applet", 20, 20);
}
}

A. A Simple Applet
B. A Simple Applet 20 20
C. Compilation Error
D. Runtime Error

21. Which of these package is used for graphical user interface?

A. java.applet
B. java.awt
C. java.awt.image
D. java.io
22. Which of these package is used for analyzing code during run-time?

A. java.applet
B. java.awt
C. java.io
D. java.lang.reflect

23. Which of these package is used for handling security related issues in a
program?

A. java.security
B. java.lang.security
C. java.awt.image
D. java.io.security

24. Which of these class allows us to get real time data about private and
protected member of a class?

A. java.io
B. GetInformation
C. ReflectPermission
D. MembersPermission

25. Which of these package is used for invoking a method remotely?

A. java.rmi
B. java.awt
C. java.util
D. java.applet

26. Which of these package is used for all the text related modifications?

A.
B. java.awt
C. java.lang.text
D. java.text.modify
27. What is the output of this program?

import java.lang.reflect.*;
class Additional_packages
{
public static void main(String args[])
{
try {
Class c = Class.forName("java.awt.Dimension");
Constructor constructors[] = c.getConstructors();
for (int i = 0; i < constructors.length; i++)
System.out.println(constructors[i]);
}
catch (Exception e)
{
System.out.print("Exception");
}
}
}

A. Program prints all the constructors of java.awt.Dimension package.


B. Program prints all the possible constructors of class Class.
C. Program prints Exception
D. Runtime Error

28. What is the output of this program?

import java.lang.reflect.*;
class Additional_packages
{
public static void main(String args[])
{
try {
Class c = Class.forName("java.awt.Dimension");
Field fields[] = c.getFields();
for (int i = 0; i < fields.length; i++)
System.out.println(fields[i]);
}
catch (Exception e)
{
System.out.print("Exception");
}
}
}

A. Program prints all the constructors of java.awt.Dimension package.


B. Program prints all the methods of java.awt.Dimension package.
C. Program prints all the data members of java.awt.Dimension package.
D. program prints all the methods and data member of java.awt.Dimension
package.
29. Which of the following can be operands of arithmetic operators?

A. Numeric
B. Boolean
C. Characters
D. Both Numeric & Characters

30. What is the output of this program?

class increment
{
public static void main(String args[])
{
double var1 = 1 + 5;
double var2 = var1 / 4;
int var3 = 1 + 5;
int var4 = var3 / 4;
System.out.print(var2 + " " + var4);
}
}

A. 1 1
B. 0 1
C. 1.5 1
D. 1.5 1.0

31. What is the output of this program?

class Modulus
{
public static void main(String args[])
{
double a = 25.64;
int b = 25;
a = a % 10;
b = b % 10;
System.out.println(a + " " + b);
}
}

A. 5.640000000000001 5
B. 5.640000000000001 5.0
C. 5 5
D. 5 5.640000000000001

32. Which class cannot be a subclass in java?

A. Abstract class
B. Parent class
C. Final class
D. None of the above
33. A Suspended thread can be revived by using?

A. start() method
B. Suspend() method
C. resume() method
D. yield() method

34. Which collection class associates values with keys, and orders the keys
according to their natural order?

A. java.util.HashSet
B. java.util.LinkedList
C. java.util.TreeMap
D. java.util.SortedSet

35. Which methods are utilized to control the access to an object in multi-
threaded programming?

A. Asynchronized methods
B. Synchronized methods
C. Serialized methods
D. None of above

36. What is the output of this program?

class average
{
public static void main(String args[])
{
double num[] = {5.5, 10.1, 11, 12.8, 56.9, 2.5};
double result; result = 0;
for (int i = 0; i < 6; ++i)
result = result + num[i];
System.out.print(result/6);
}
}

A. 16.34
B. 16.5555
C. 16.46666666666667
D. 16.4666666666
37. What is the output of this program?

class conversion
{
public static void main(String args[])
{
double a = 295.04;
int b = 300;
byte c = (byte) a;
byte d = (byte) b;
System.out.println(c + " " + d);
}
}

A. 38 43
B. 39 44
C. 295 300
D. 295.4 300.6

38. What is the output of this program?

class increment
{
public static void main(String args[])
{
int g = 3;
System.out.print(++g * 8);
}
}

A. 25
B. 24
C. 32
D. 33

39. Which of these operators is used to allocate memory to array variable in


Java?

A. malloc
B. new malloc
C. new
D. calloc
40. What is the output of this program?

class array_output
{
public static void main(String args[])
{
int array_variable [] = new int[10];
for (int i = 0; i < 10; ++i)
{
array_variable[i] = i;
System.out.print(array_variable[i] + " ");
i++;
}
}
}

A. 0 2 4 6 8
B. 1 3 5 7 9
C. 0 1 2 3 4 5 6 7 8 9
D. 1 2 3 4 5 6 7 8 9 10

41. Which statement is static and synchronized in JDBC API?

A. executeQuery()
B. executeUpdate()
C. getConnection()
D. prepareCall()

42. All raw data types should be read and uploaded to the database as an
array of?

A. int
B. char
C. boolean
D. byte

43. The class java.sql.Timestamp is associated with?

A. java.util.Time
B. java.sql.Time
C. java.util.Date
D. None of the above

44. Which method executes only once?

A. start()
B. stop()
C. init()
D. destroy()
45. Which of these is not a bitwise operator?

A. &
B. &=
C. |=
D. <=

46. Which operator is used to invert all the digits in binary representation
of a number?

A. ~
B. <<<
C. >>>
D. ^

47. What is the size of byte variable?

A. 8 bit
B. 16 bit
C. 32 bit
D. 64 bit

48. What is the size of int variable?

A. 8 bit
B. 16 bit
C. 32 bit
D. 64 bit

49. What is the default value of long variable?

A. 0
B. 0.0
C. 0L
D. not defined

50. Which of the following is true about super class?

A. Variables, methods and constructors which are declared private can be


accessed only by the members of the super class.
B. Variables, methods and constructors which are declared protected can be
accessed by any subclass of the super class.
C. Variables, methods and constructors which are declared public in the
superclass can be accessed by any class.
D. All of the above.

51. What is instance variable?

A. Instance variables are static variables within a class but outside any
method.
B. Instance variables are variables defined inside methods, constructors or
blocks.
C. Instance variables are variables within a class but outside any method.
D. None of the above.
52. Static binding uses which information for binding?

A. type.
B. object.
C. Both of the above.
D. None of the above.

53. What is synchronization?

A. Synchronization is the capability to control the access of multiple


threads to shared resources.
B. Synchronization is the process of writing the state of an object to
another object.
C. Synchronization is the process of writing the state of an object to byte
stream.
D. None of the above.

54. Under what conditions is an object's finalize() method invoked by the


garbage collector?

A. When it detects that the object has become unreachable.


B. As soon as object is set as null.
C. At fixed intervalm it checks for null value.
D. None of the above.

55. ________This is the parent of Error and Exception classes.

A. Throwable
B. Catchable
C. MainError
D. MainException

56. Java programs are

A. Faster than others


B. Platform independent
C. Not reusable
D. Not scalable

57. Java has its origin in

A. C programming language
B. PERRL
C. COBOL
D. Oak programming language

58. Which one of the following is true for Java

A. Java is object oriented and interpreted


B. Java is efficient and faster than C
C. Java is the choice of everyone.
D. Java is not robust.
59. The command javac is used to

A. debug a java program


B. compile a java program
C. interpret a java program
D. execute a java program

60. Java servlets are an efficient and powerful solution for creating ..
for the web.

A. Dynamic content
B. Static content
C. Hardware
D. Both a and b

61. Filters were officially introduced in the Servlet specification.

A. 2.1
B. 2.3
C. 2.2
D. 2.4

62. Which is the root class of all AWT events

A. java.awt.ActionEvent
B. java.awt.AWTEvent
C. java.awt.event.AWTEvent
D. java.awt.event.Event

63. OOP features are i) Increasing productivity ii) Reusability iii)


Decreasing maintenance cost iv) High vulnerability

A. 1,2 & 4
B. 1,2 & 3
C. 1, 2 & 4
D. none of the above

64. break statement is used to i) get out of method ii) end aprogram iii) get
out of a loop iv) get out of the system

A. 1 & 2
B. 1,2 & 3
C. 1 & 3
D. 3

65. Native protocol pure Java converts .. into the used by DBMSs
directly.

A. JDBC calls, network protocol


B. ODBC class, network protocol
C. ODBC class, user call
D. JDBC calls, user call
66. Standard output variable out is defined in which class?

A. Void
B. Process
C. Runtime
D. System

67. Which of these selection statements test only for equality?

A. if
B. switch
C. if & switch
D. None of the mentioned

68. Which of these are selection statements in Java?

A. if()
B. for()
C. continue
D. break

69. Which of the following loops will execute the body of loop even when
condition controlling the loop is initially false?

A. do-while
B. while
C. for
D. None of the mentioned

70. Which of these jump statements can skip processing remainder of code in
its body for a particular iteration?

A. break
B. return
C. exit
D. continue

71. Which is the correct declaration of main() method in java ?

A. public static int main(String[] args)


B. public int main(String[] args)
C. public static void main(String[] args)
D. None of the above.

72. What is the size of boolean variable?

A. 8 bit
B. 16 bit
C. 32 bit
D. not precisely defined
73. Which of the following is true about String?

A. String is mutable.
B. String is immutable.
C. String is a data type.
D. None of the above.

74. Does garbage collection guarantee that a program will not run out of
memory?

FALSE

75. Can try statements be nested?

TRUE

76. Which one is a valid declaration of a boolean?

A. boolean b1 = 1;
B. boolean b2 = false;
C. boolean b3 = false;
D. boolean b4 = true

77. What is the output of this program?

class mainclass
{
public static void main(String args[])
{
char a = 'A';
a++;
System.out.print((int)a);
}
}

A. 66
B. 67
C. 65
D. 64

78. Which of these operators is used to allocate memory to array variable in


Java?

A. malloc
B. alloc
C. new
D. new malloc

79. Which of these is necessary to specify at time of array initialization?

A. Row
B. Column
C. Both Row and Column
D. None of the mentioned
80. String in Java is a?

A. class
B. object
C. variable
D. character array

81. Which of the following statements are incorrect?

A. String is a class.
B. Strings in java are mutable.
C. Every string is an object of class String.
D. Java defines a peer class of String, called StringBuffer, which allows
string to be altered.

82. What is the output of relational operators?

A. Integer
B. Boolean
C. Characters
D. Double

83. Which of these packages contain classes and interfaces used for input &
output operations of a program?

A. java.util
B. java.lang
C. java.io
D. All of the mentioned

84. What is the return type of Constructors?

A. int
B. float
C. void
D. None of the mentioned

85. Which of the following is a method having same name as that of its
class?

A. finalize
B. delete
C. class
D. constructor

86. Which operator is used by Java run time implementations to free the
memory of an object when it is no longer needed?

A. delete
B. free
C. new
D. None of the mentioned
87. What is multithreaded programming?

A. Its a process in which two different processes run simultaneously.


B. Its a process in which two or more parts of same process run
simultaneously.
C. Its a process in which many different process are able to access same
information.
D. Its a process in which a single process can access information from many
sources.

88. Which of these are types of multitasking?

A. Process based
B. Thread based
C. Process and Thread based
D. None of the mentioned

89. Which of these packages contain all the Javas built in exceptions?

A. java.io
B. java.util
C. java.lang
D. java.net

90. Thread priority in Java is?

A. Integer
B. Float
C. double
D. long

91. What will happen if two thread of same priority are called to be
processed simultaneously?

A. Any one will be executed first lexographically


B. Both of them will be executed simultaneously
C. None of them will be executed
D. It is dependent on the operating system.

92. Which of these statements is incorrect?

A. By multithreading CPUs idle time is minimized, and we can take maximum


use of it.
B. By multitasking CPUs idle time is minimized, and we can take maximum
use of it.
C. Two thread in Java can have same priority
D. A thread can exist only in two states, running and blocked.

93. Which of these package is used for graphical user interface?

A. java.applet
B. java.awt
C. java.awt.image
D. java.io
94. What is the output of this program?

import java.lang.reflect.*;
class Additional_packages
{
public static void main(String args[]) {
try {
Class c = Class.forName("java.awt.Dimension");
Constructor constructors[] = c.getConstructors();
for (int i = 0; i < constructors.length; i++)
System.out.println(constructors[i]);
}
catch (Exception e)
{
System.out.print("Exception");
}
}
}

A. Program prints all the constructors of java.awt.Dimension package.


B. Program prints all the possible constructors of class Class.
C. Program prints Exception
D. Runtime Error

95. What is the name of the method used to start a thread execution?

A. init();
B. start();
C. run();
D. resume();

96. Which two are valid constructors for Thread?

1. Thread(Runnable r, String name)


2. Thread()
3. Thread(int priority)
4. Thread(Runnable r, ThreadGroup g)
5. Thread(Runnable r, int priority)

A. 1 and 3
B. 2 and 4
C. 1 and 2
D. 2 and 5

97. Which of the following will directly stop the execution of a Thread?

A. wait()
B. notify()
C. notifyall()
D. exits synchronized code
98. Which method must be defined by a class implementing the
java.lang.Runnable interface?

A. void run()
B. public void run()
C. public void start()
D. void run(int priority)

99. Which will contain the body of the thread?

A. run();
B. start();
C. stop();
D. main();

100. Which of these method wakes up all the threads?

A. wakeAll()
B. notify()
C. start()
D. notifyAll()

101. A top level class may have which one of the following access modifiers?

A. package
B. private
C. protected
D. public

PICT FPL2... #40

102. Which of the following is correct about main method in java?

A. Must be declared as public.


B. It must not return any value.
C. Must be declared as static.
D. Above all are compulsory.

PICT FPL2... #18

103. Which of these statement is incorrect?

A. Every class must contain a main() method.

B. Applets do not require a main() method at all.

C. There can be only one main() method in a program.

D. main() method must be made public.

PICT FPL2... #5
104. Which of the following is an invalid declaration for the main method in
java program?

A. public static void main (String [ ] args)


B. public static strictfp void main(String args[ ])
C. final static public void main (String args[ ])
D. All are Correct

PICT FPL2... #39

105. Which of these statement is incorrect?

A. All object of a class are allotted memory for the all the variables
defined in the class.
B. If a function is defined public it can be accessed by object of other
class by inheritation.
C. main() method must be made public.
D. All object of a class are allotted memory for the methods defined in the
class.

PICT FPL2... #12

106. Which is a not characteristic of java programming language?

A. Robust
B. Procedural
C. Distributed
D. Multithreaded

PICT FPL2... #14

107. In Java programming an object can take many forms. This feature called

A. Abstraction
B. Polymorphism
C. Encapsulation
D. Inheritance

PICT FPL2... #25

108. Which of the following statements is correct?

A. Public method is accessible to all other classes in the hierarchy


B. Public method is accessible only to subclasses of its parent class
C. Public method can only be called by object of its class.
D. Public method can be accessed by calling object of the public class.

PICT FPL2... #7
109. What is the output of this program?

1. class main_class {
2. public static void main(String args[])
3. {
4. int x = 9;
5. if (x == 9) {
6. int x = 8;
7. System.out.println(x);
8. }
9. }

10. }

A. 9
B. 8
C. Compile error
D. Runtime Error

PICT FPL2... #6

110. Select the correct statement

A. Method overloading is called compile time polymorphism


B. Method overriding is called runtime polymorphism
C. Only [B] is correct
D. Both [A] and [B] are correct

PICT FPL2... #31

111. Command to execute a compiled java program is

A. javac
B. java
C. run
D. execute

PICT FPL2... #34

112. Which of the following keyword is used to invoke superclass of an


overriden method?

A. native
B. new
C. super
D. static

PICT FPL2... #29

113. Which of these keywords is used to make a class?

A. class
B. struct
C. int
D. None of the mentioned

PICT FPL2... #2
114. Java language has support for which of the following types of comments

A. block, line and javadoc


B. javadoc, literal and string
C. javadoc, char and string
D. single, multiple and quote

PICT FPL2... #33

115. A method cannot be overridden if it is qualified by which one of the


following modifier?

A. friendly
B. final
C. static
D. none of these above

PICT FPL2... #26

116. The new operator

A. returns a pointer to a variable


B. creates a variable called new
C. obtains memory for a new variable
D. tells how much memory is available

PICT FPL2... #32

117. Which of the following option is not true about java programming
language?

A. Java is high level programming language.


B. Java is a platform.
C. javac is compiler.
D. Byte code is executed by CPU.

PICT FPL2... #13

118. The order of the three top level elements of the java source file are

A. Import, Package, Class


B. Class, Import, Package
C. Package, Import, Class
D. Random order

PICT FPL2... #36

119. What is the process of defining more than one method in a class
differentiated by method signature?

A. Function overriding
B. Function overloading
C. Function doubling
D. None of the mentioned

PICT FPL2... #9
120. A subclass is also called as

A. inner class
B. nested class
C. derived class
D. hidden class

PICT FPL2... #42

121. Multiple inheritance is possible in java by means of

A. package
B. object
C. interfaces
D. class

PICT FPL2... #27

122. What is the return type of a method that does not returns any value?

A. int
B. float
C. void
D. double

PICT FPL2... #8

123. Which of them is a not command line tool

A. java
B. javaw
C. javapath
D. javadoc

PICT FPL2... #17

124. Which method/methods cannot be overridden?

A. static
B. final
C. only [A]
D. both [A] and [B]

PICT FPL2... #30

125. Which of these operators is used to allocate memory for an object?

A. malloc
B. alloc
C. new
D. give

PICT FPL2... #4
126. Method overloading

A. is a technique for implementing abstraction


B. is a technique for implementing polymorphism
C. is a technique for implementing encapsulation
D. none of the above

PICT FPL2... #28

127. Which of the following is not true in java?

A. Java platform is bit faster than actual CPU platform.


B. javac is compiler tool.
C. java command launch an application.
D. javadoc is documentation tool.

PICT FPL2... #21

128. Attribute of an object can include information about

A. State
B. Method
C. Behavior
D. Procedures

PICT FPL2... #43

129. Which of the following is true about of java hotspot virtual machine?

A. It is additional virtual machine which improves the performance of an


application.
B. It is internal device which convert source code into byte code.
C. It is virtual machine which detects runtime exception.
D. All are true.

PICT FPL2... #15

130. Primary purpose of inheritance is

A. code reuse
B. overloading
C. overriding
D. ignoring irrelevant features from a software

PICT FPL2... #23

131. Java programs are

A. Platform-dependent
B. Interpreter-dependent
C. Platform-independent
D. Interpreter-independent

PICT FPL2... #38


132. Which of the following is a method having same name as that of its
class?

A. finalize
B. class
C. constructor
D. delete

PICT FPL2... #10

133. Which of the following is correct?

A. Java platform is software only platform that runs on the top of other
hardware based platform.
B. Java platform has two components: JVM, API.
C. Java technology is programming language as well as platform
D. All of the above.

PICT FPL2... #16

134. The java compiler

A. creates executable
B. translates java source code to byte code
C. creates classes
D. produces java Interpreter

PICT FPL2... #35

135. Which of the following is a valid declaration of an object of class


Box?

A. Box obj = new Box();


B. Box obj = new Box;
C. obj = new Box();
D. new Box obj;

PICT FPL2... #3

136. Visualizing program components as objects is characteristics of which of


the following language types?

A. Object-oriented programming language


B. Machine language
C. Command line operating system
D. Procedural language

PICT FPL2... #41


137. Which of the following is correct?

A. class MainClass {
static public void main(String[] args)
{
System.out.println("Hello World!");
}
}
B. class MainClass {
public static void main(String[] args)
{
System.out.println("Hello World!");
}
}
C. class MainClass {
static public int main(String[] args)
{
System.out.println("Hello World!");
return 1;
}
}
D. Both option (a) and (b)

PICT FPL2... #20

138. Which not true about API in java?

A. API stands for application package interface.


B. It is large collection of software components.
C. It is large array of useful class.
D. It is grouped into the package of related class.

PICT FPL2... #19

139. Java uses ___ to represent characters

A. ASCII code
B. Unicode
C. Byte code
D. None of the above

PICT FPL2... #37

140. In Java Inheritance

A. all fields of a class are private


B. all fields of a class are protected
C. a new class is derived from an existing
D. none of these above

PICT FPL2... #22


141. Which of the following modifiers can be used to disallow a method from
being overridden

A. final
B. transient
C. volatile
D. none of these above

PICT FPL2... #24

142. What is the stored in the object obj in following lines of code?

A. Memory address of allocated memory of object.


B. NULL
C. Any arbitrary pointer
D. Garbage

PICT FPL2... #1

143. Which method can be defined only once in a program?

A. main method
B. finalize method
C. static method
D. private method

PICT FPL2... #11


PICT-FPL2-Unit-02-DataStructures(19) KEY
1. Can linked list be implemented using arrays?

A. Yes
B. No

2. On which principle does stack work?

A. FILO
B. FIFO
C. LILO
D. Both a and c above

3. An empty list is the one which has no

A. nodes
B. data
C. both a and b above
D. address

4. In a heap, element with the greatest key is always in the ______________


node.

A. leaf
B. root
C. first node of left sub tree
D. first node of right sub tree

5. A _____________ tree is tree where for each parent node, there is only
one associated child node.

A. balanced binary tree


B. rooted complete binary tree
C. complete binary tree
D. degenerate tree

6. Items in a priority queue are entered in a _______________ order.

A. random
B. order of priority
C. as and when they come
D. none of the above

7. A tree cannot contain cycles.

A. False
B. True
8. In graphs, A hyperedge is an edge that is allowed to take on any number of
_____________

A. Vertices
B. Edges
C. Both a and b above
D. Labels

9. Key value pairs is usually seen in

A. Hash tables
B. Heaps
C. Both a and b
D. Skip list

10. Breadth First Search is used in

A. Binary trees
B. Stacks
C. Graphs
D. Both a and c above

11. Which of the following ways below is a pre order traversal?

A. Root->left sub tree->right sub tree


B. Root-> right sub tree ->left sub tree
C. right sub tree->left sub tree->Root
D. left sub tree->right sub tree->Root

12. What is the peculiarity of red black trees?

A. In red-black trees, the root do not contain data.


B. In red-black trees, the leaf nodes are not relevant and do not contain
data.
C. In red-black trees, the leaf node are relevant but do not contain data.
D. Both a and c above

13. AVL trees have a faster ________________

A. Insertion
B. Deletion
C. Updation
D. Retrival

14. Which of the following statements hold true for binary trees?

A. The left subtree of a node contains only nodes with keys less than the
nodes key.
B. The right subtree of a node contains only one nodes with key greater
than the nodes key.
C. Both a and b above
D. both left and right subtree nodes contains only nodes with keys less
than the nodes key.
15. Which of the following linked list below have last node of the list
pointing to the first node?

A. circular doubly linked list


B. circular linked list
C. circular singly linked list
D. doubly linked list

16. Which of the following ways below is a In-order traversal ?

A. Root->left sub tree->right sub tree


B. Root-> right sub tree ->left sub tree
C. right sub tree->left sub tree->Root
D. left sub tree->Root->right sub tree

17. Can stack be describe as a pointer?

A. Yes
B. No

18. The time required in best case for search operation in binary tree is

A. O(n)
B. O(log n)
C. O(2n)
D. O(log 2n)

19. In ______________ tree, the heights of two child subtree of any node
differ by at most one.

A. Binary tree
B. Red black tree
C. Splay tree
D. AVL tree
PICT-FPL2-Unit-02-HTML(60) KEY
1. Width="500" and width="500%" are the same?

FALSE

2. Which of the following attribute is used for a font name?

A. fortname
B. fn
C. font
D. face

3. Which of the following tag is used for a multi-line text input control?

A. textml
B. text
C. textarea
D. Both b and c

4. <meta> tag cannot be defined in the <head> tag

TRUE

5. Each list item in an ordered or unordered list has which tag?

A. list
B. ls
C. li
D. ol

6. What is the attribute for <image> tag

A. Pt
B. url
C. path
D. src

7. <br> tag is used for?

A. Space
B. Paragraph break
C. Line break
D. Word break

8. Data cell contain images?

TRUE
9. Which tags are most commonly used by search engines?

A. Heading
B. Title
C. Paragraph
D. All

10. What is the difference between XML and HTML?

A. HTML is used for exchanging data ,XML is not.


B. XML is used for exchanging data, HTML is not.
C. HTML can have user define tags, XML cannot.
D. Both b and c.

11. What are <div> tags used for?

A. To replace paragraph
B. Logically divide the paragraphs
C. Logically divide the document
D. To provide space between tables

12. htm and .html are same?

TRUE

13. Audio can be played in HTML?

TRUE

14. What is cell padding?

A. Used to separate cell walls from their contents.


B. Used to set space between cells.
C. Used to provide width to a cell
D. Both a and b

15. What attribute is used to specify number of rows?

A. Rownum
B. Rownumb
C. Rn
D. Rowspan

16. What are meta tags used for?

A. To store information usually relevant to browsers and search engines.


B. To only store information usually relevant to browsers.
C. To only store information about search engines.
D. To store information about external links.
17. How can we resize the image?

A. Using resize attribute


B. Using height and width
C. Using size attribute
D. Using rs attribute

18. For Frames in HTML, how do you specify the rest of the screen?

A. Using &
B. Using $
C. Using *
D. Using #

19. Which of the following type of information should not be included on the
web site?

A. Links to sites of interest


B. Private personal information
C. work and academic experience
D. Graphical

20. bgcolor is an attribute of body tag

TRUE

21. Which of the following web elements should you know about before building
your web site?

A. The web audience


B. The operating environment of your ISP
C. The operating system of your visitor
D. Each consideration should determine your web design choices

22. Which of the following is the language of the web?

A. Basic
B. C++
C. MS Visual Basic
D. HTML

23. What is the purpose of HTML tag ?

A. It specifies formatting and layout instructions for web page.


B. It hides programming instructions from view.
C. It determines the organizational structure of web site.
D. It connects web site to an operating environment.
24. A web document is broken into sections. What are the tags called that
create these sections?

A. Structure tags
B. HTML tags
C. Heading tags
D. Body tags

25. What should be the first and last pair of tags in the web document?

A. <html></html>and<body></body>
B. <start><end> and <body></body>
C. <head><body>and<title></title>
D. <title></title>and<body></body>

26. When you use a heading tag in a document,what does the web browser
assumes?

A. Heading information is to appear in bold letters


B. Heading information is to appear on its own line
C. Heading information has a hyperlink
D. Heading information is shown as a size six

27. For every Web document, you can add words that appear in the upper left
bar area of the browser. What set of tags allow to provide this
information?

A. <head></head>
B. <head><head>
C. <label><label>
D. <title></title>

28. If you wanted to create text that was a different color or font than
other text in your Web page,what type of tag would you use?

A. Layout
B. Basic formatting
C. Design
D. Outline

29. When creating a web document, what format is used to express an image's
height and width ?

A. Centimeters
B. Pixels
C. Dots per inch
D. Inches

30. JPEG images can use _____ colors

A. 16.5 million
B. 16.6 million
C. 16.7 million
D. 16.8 million
31. The three image formats supported by most Web browsers are _____

A. GIF,BMP,PNG
B. PNG,BMP,JPEG
C. JPEG,BMP,GIF
D. GIF,PNG and JPEG

32. Which of the following is a specific font?

A. TImes New roman


B. Courier New
C. Arial
D. Arial Black

33. Which of the following is a basic color name in HTML?

A. blue
B. red
C. green
D. navy

34. What does HTML stand for?

A. Hyperlinks and text markup language


B. Hyper text markup language
C. Hyper tool markup language
D. Home tool markup language

35. Who makes the web standards?

A. MOZILLA
B. The World Wide Web Consortium
C. Microsoft
D. Google

36. Which of the following tag is used for the largest heading

A. H1
B. H6
C. head
D. heading

37. Which of the following tag is used to insert line break?

A. <br/>
B. <lb/>
C. <break/>
D. <linebreak/>
38. Which of the following syntax is used to add background color in HTML?

A. <background>yellow</background>
B. <body style = "background-color:yellow">
C. <body background ="yellow">
D. <body style ="background-yellow">

39. Which of the following tag is used to make text bold

A. <bold>
B. <b>
C. None
D. Both a and b

40. Which of the following tag is used to make text italic.

A. <italic>
B. <i>
C. None
D. both a and b

41. What is the correct HTML for creating a hyperlink?

A. <a>http://www.pict.edu</a>
B. <a name ="http://www.pict.edu">pict.edu</a>
C. <a href = "http://www.pict.edu">pict.edu</a>
D. <a url = "http:// www.pict.edu">pict.edu</a>

42. How can you create an e-mail link?

A. <a href="mailto:xxx@yyy">
B. <mail href="xxx@yyy">
C. <a href="xxx@yyy">
D. <mail>xxx@yyy</mail>

43. How can you open a link in a new browser window?

A. <a href="url" target="_blank">


B. <a href="url" target="new">
C. <a href="url" new>
D. None

44. Which of these tags are all <table> tags?

A. <table><head><tfoot>
B. <table><tr><td>
C. <table><tr><tt>
D. <table><body><tr>
45. Choose the correct HTML tag to left-align the content inside a table cell

A. <td align="left">
B. <td valign="left">
C. <tdleft>
D. <td leftalign>

46. How can you make a list that lists the items with numbers ?

A. <ul>
B. <list>
C. <dl>
D. <ol>

47. How can you make a list that lists the items with bullets ?

A. <ul>
B. <list>
C. <dl>
D. <ol>

48. What is the correct HTML for making a checkbox ?

A. <input type="check"/>
B. <check>
C. <checkbox>
D. <input type="checkbox"/>

49. What is the correct HTML for making a text input field ?

A. <input type="textfield" />


B. <textinput type= "tetxt" />
C. <input type="text" />
D. <textfield>

50. What is the correct HTML for making a drop-down list ?

A. <list>
B. <select>
C. <input type="dropdown"/>
D. <input type="list" />

51. What is the correct HTML for making a text area ?

A. <input type="textbox"/>
B. <input type="textarea" />
C. <textarea>
D. None
52. What is the correct HTML for inserting an image ?

A. <img alt="MyImage">image.gif</img>
B. <image src="image.gif" alt="MyImage" />
C. <img href="image.gif" alt="MyImage" />
D. <img src="image.gif" alt="MyImage" />

53. What is the correct HTML for inserting a background image?

A. <body background="background.gif">
B. <img src="background.gif" background/>
C. <background img="background.gif">
D. None

54. To make the width of a table adjust to the current width of the viewer's
browser window, you should specify a table width of ______

A. 100%
B. 640 pixels
C. 1024 pixels
D. none of the above

55. What will happen if we do not use the width and height attributes in
<img> element?

A. The image will not load.


B. The image will load but will not be its actual size.
C. The image must load completely before the browser can continue loading
the rest of the remaining contents.
D. The browser will fill in the text around the image as the image loads.

56. In <img src="image.gif">,"image.gif" is an _________ .

A. element
B. attribute
C. value
D. operator

57. A ___________ URL describes the location of the desired fie with
reference to the location of the file that contains the URL itself.

A. relative
B. absolute
C. general
D. specific

58. To create a set of radio buttons that only allows a single button in the
set to be selected at one time, the ______ attribute of each button must
be the same.

A. label
B. value
C. name
D. src
59. Java ______ are little applications that can run in your browser to
create special effects on a web page.

A. scripts
B. modules
C. extensions
D. applets

60. To include a local style within an HTML tag, which of the following
attribute is used ?

A. link
B. local
C. format
D. style
PICT-FPL2-Unit-02-Linked List(14) KEY
1. Generally collection of nodes is called

A. Stack
B. Queue
C. Linked List
D. Heap

2. A linear collection of data member given by pointer is called______.

A. Graph
B. Queue
C. Linked List
D. Stack

3. Which of the following is not a type of Linked list ?

A. Singly Linked list


B. Doubly Linked List
C. Hybrid Linked List
D. Circular Linked List

4. Linked List is Generally Considered as _____type of memory allocation.

A. static
B. Dynamic
C. Compile time
D. None of these

5. Each Node in Linked List contain minimum two fields , one field is called
data field to store data and another field is_____.

A. Pointer to character
B. Pointer to integer
C. Pointer to class
D. Pointer to Node

6. calloc initializes memory with all bits set to zero.

A. true
B. false
C. Depends on the compiler
D. Depends on the standard

7. The function ____ obtains block of memory dynamically.

A. calloc
B. malloc
C. Both a & b
D. free
8. In function free(p), p is a

A. int
B. Pointer returned by malloc()
C. Pointer returned by calloc()
D. Both b & c

9. What is the output of this C code?

1. #include <stdio.h>
2. void main()
3. {
4. char *p = calloc(100, 1);
5. p = "welcome";
6. printf("%sn", p);
7. }

A. Segmentation fault
B. Garbage
C. Error
D. welcome

10. Memory allocation using malloc() is done in?

A. Static area
B. Stack area
C. Heap area
D. Both b & c

11. Why do we write (int *) before malloc?


int *ip = (int *)malloc(sizeof(int));

A. It is for the syntax correctness


B. It is for the type-casting
C. It is to inform malloc function about the data-type expected
D. None of the mentioned

12. Which one is used during memory deallocation in C?

A. remove(p);
B. delete(p);
C. free(p);
D. terminate(p);

13. Suppose pointer ptr points to a node in a linked in list . Which of the
Following statement changes ptr so that it points to the next node?

A. ptr ++;
B. ptr =link
C. ptr=ptr +link
D. ptr=ptr->link;
14. How many reference member, minimum, must a linked list node have ?

A. 0
B. 1
C. 2
D. 3
PICT-FPL2-Unit-02-Pointers(10) KEY
1. The operator used for dereferencing or indirection is ____

A. *
B. &
C. ->
D. >>

2. Choose the right option


string* x, y;

A. x is a pointer to a string, y is a string


B. y is a pointer to a string, x is a string
C. both x and y are pointer to string types
D. none of the mentioned

3. Which of the following is illegal?

A. int *ip;

B. string s, *sp = 0;
C. int i; double* dp = &i;
D. int *pi = 0;

4. What will happen in this code?


int a = 100, b = 200;
int *p = &a, *q = &b;
p = q;

A. b is assigned to a

B. p now points to b

C. a is assigned to b

D. q now points to a
5. What is the output of this program? #include <iostream>
usingnamespacestd;
int main()
{
char*ptr;
charStr[]="abcdefg";
ptr=Str;
ptr+=5;
cout<<ptr;
return0;
}

A. fg

B. cdef

C. defg

D. abcd

6. What will be output of following program? #include<stdio.h>


int main()
{
int a = 320;
char *ptr;
ptr =( char *)&a;
printf("%d ",*ptr);
return 0;
}

A. 2
B. 320
C. 64
D. Compilation error

7. What will be output of following program?


#include<stdio.h>
#include<string.h>
int main()
{
char *ptr1 = NULL;
char *ptr2 = 0;
strcpy(ptr1," c");
strcpy(ptr2,"questions");
printf("\n%s %s",ptr1,ptr2);
return 0;
}

A. c questions
B. c (null)
C. (null) (null)
D. Compilation error
8. What will be output of following program?
#include<stdio.h>
#include<string.h>
int main()
{
register a = 25;
int far *p;
p=&a;
printf("%d ",*p);
return 0;
}

A. 25
B. 4
C. Address
D. Compilation error

9. What will be output of following program?


#include<stdio.h>
#include<string.h>
int main()
{
char far *p,*q;
printf("%d %d",sizeof(p),sizeof(q));
return 0;
}

A. 2 2
B. 4 4
C. 4 2
D. 2 4

10. What will be output of following program?


#include<stdio.h>
int main()
{
int a = 10;
void *p = &a;
int *ptr = p;
printf("%u",*ptr);
return 0;
}

A. 10
B. Address
C. 2
D. Compilation error
PICT-FPL2-Unit-02-Structure(37) KEY
1. Which of the following are themselves a collection of different data
types?

A. string
B. structures
C. char
D. All of the mentioned

2. User-defined data type can be derived by___________.

A. struct
B. enum
C. typedef
D. All of the mentioned

3. Which operator connects the structure name to its member name?

A. -
B. <-
C. .
D. Both (b) and (c)

4. Which of the following cannot be a structure member?

A. Another structure
B. Function
C. Array
D. None of the mentioned

5. Which of the following structure declaration will throw an error?

A. struct temp{}s;
main(){}
B. struct temp{};
struct temp s;
main(){}
C. struct temp s;
struct temp{};
main(){}
D. None of the mentioned
6. What is the output of this C code?

1. #include <stdio.h>
2. struct student
3. {
4. int no;
5. char name[20];
6. }
7. void main()
8. {
9. struct student s;

10. s.no = 8;
11. printf("hello");

A. Compile time error


B. Nothing
C. hello
D. varies

7. What is the output of this C code?

1. #include <stdio.h>
2. struct student
3. {
4. int no = 5;
5. char name[20];
6. };
7. void main()
8. {
9. struct student s;

10. s.no = 8;
11. printf("hello");
12. }

A. Nothing
B. Compile time error
C. hello
D. Varies
8. What is the output of this C code?

1. #include <stdio.h>
2. struct student
3. {
4. int no;
5. char name[20];
6. };
7. void main()
8. {
9. student s;

10. s.no = 8;
11. printf("hello");
12. }

A. Nothing
B. hello
C. Compile time error
D. Varies

9. What is the output of this C code?

1. #include <stdio.h>
2. void main()
3. {
4. struct student
5. {
6. int no;
7. char name[20];
8. };
9. struct student s;

10. s.no = 8;
11. printf("%d", s.no);
12. }

A. Nothing
B. Compile time error
C. Junk
D. 8
10. Can the above code be compiled successfully?

1. #include <stdio.h>
2. struct p
3. {
4. int k;
5. char c;
6. float f;
7. };
8. int main()
9. {

10. struct p x = {.c = 97, .f = 3, .k = 1};


11. printf("%fn", x.f);

A. Yes
B. No
C. Depends on the standard
D. Depends on the platform

11. The first and second arguments of fopen are

A. A character string containing the name of the file & the second argument
is the mode.
B. A character string containing the name of the user & the second argument
is the mode.
C. A character string containing file poniter & the second argument is the
mode.
D. None of the mentioned of the mentioned

12. For binary files, a ___ must be appended to the mode string.

A. Nothing
B. "b"
C. binary
D. "01"

13. If there is any error while opening a file, fopen will return

A. Nothing
B. EOF
C. NULL
D. Depends on compiler

14. Which is true about getc.getc returns?

A. The next character from the stream referred to by file pointer


B. EOF for end of file or error
C. Both a & b
D. Nothing.
15. When a C program is started, O.S environment is responsible for opening
file and providing pointer for that file?

A. Standard input
B. Standard output
C. Standard error
D. All of the menitoned

16. FILE is of type ______ ?

A. int type

B. char * type

C. struct type
D. None of the mentioned

17. What is the meant by a in the following operation?


fp = fopen(Random.txt, a);

A. Attach

B. Append
C. Apprehend
D. Add

18. Which of the following mode argument is used to truncate?

A. a
B. f
C. w
D. t

19. Which type of files cant be opened using fopen()?

A. .txt

B. .bin
C. .c
D. None of the mentioned

20. Which of the following fopen statements are illegal?

A. fp = fopen(abc.txt, r);

B. fp = fopen(/home/user1/abc.txt, w);
C. fp = fopen(abc, w);
D. None of the mentioned
21. What does the following segment of code do?
fprintf(fp, Copying!);

A. It writes Copying! into the file pointed by fp


B. It reads Copying! from the file and prints on display
C. It writes as well as reads Copying! to and from the file and prints it
D. None of the mentioned

22. FILE reserved word is

A. A structure tag declared in stdio.h


B. One of the basic datatypes in c
C. Pointer to the structure defined in stdio.h

D. It is a type name defined in stdio.h

23. What is the output of this C code?

1. #include <stdio.h>
2. int main()
3. {
4. FILE *fp = stdin;
5. int n;
6. fprintf(fp, "%d", 45);
7. }

A. Compilation error
B. Nothing
C. 45
D. Depends on the standard

24. What is the output of this C code?

1. #include <stdio.h>
2. #include <stdlib.h>
3. int main()
4. {
5. FILE *fp = stdout;
6. int n;
7. fprintf(fp, "%d", 45);
8. }

A. Compilation error
B. 45
C. Nothing
D. Depends on the standard
25. stdout, stdin and stderr are

A. File pointers
B. File desciptors
C. Streams
D. Structure

26. Which of the following statements about stdout and stderr are true?

A. Same
B. Both connected to screen always.
C. Both connected to screen by default.
D. stdout is line buffered but stderr is unbuffered.

27. What is the output of this C code?

1. #include <stdio.h>
2. int main()
3. {
4. FILE *fp = stdout;
5. int n;
6. fprintf(fp, "%d ", 45);
7. fprintf(stderr, "%d ", 65);
8. return 0;
9. }

A. 45 65
B. 65 45
C. 65
D. Compilation error

28. What is the output of this C code?

1. #include <stdio.h>
2. int main()
3. {
4. FILE *fp = stdout;
5. int n;
6. fprintf(fp, "%dn ", 45);
7. fprintf(stderr, "%d ", 65);
8. return 0;
9. }

A. 45 65
B. 65 45
C. 65
D. Compilation error
29. What is the output of this C code?

1. #include <stdio.h>
2. int main()
3. {
4. FILE *fp = stdout;
5. int n;
6. fprintf(fp, "%d ", 45);
7. fflush(stdout);
8. fprintf(stderr, "%d", 65);
9. return 0;

10. }

A. 45 65
B. 65 45
C. 45
D. Compilation error

30. What is the output of this C code?

1. #include <stdio.h>
2. struct student
3. {
4. char *name;
5. };
6. struct student s;
7. struct student fun(void)
8. {
9. s.name = "newton";

10. rintf("%sn", s.name);


11. s.name = "alan";
12. return s;
13. }
14. void main()
15. {
16. struct student m = fun();
17. printf("%sn", m.name);
18. m.name = "turing";
19. printf("%sn", s.name);
20. }

A. newton alan alan


B. alan newton alan
C. alan alan newton
D. Compile time error
31. What is the output of this C code?

1. #include <stdio.h>
2. struct student
3. {
4. char *name;
5. };
6. void main()
7. {
8. struct student s, m;
9. s.name = "st";

10. m = s;
11. printf("%s%s", s.name, m.name);
12. }

A. Compile time error


B. Nothing
C. Junk values
D. st st

32. Which of the following return-type cannot be used for a function in C?

A. char *
B. struct
C. void
D. None of the mentioned
33. . Whats the output of the following code?

1. #include <stdio.h>
2. struct temp
3. {
4. int a;
5. } s;
6. void func(struct temp)
7. {
8. s.a = 10;
9. printf("%dt", s.a); s

10. }
11. main()
12. {
13. func(s);
14. printf("%dt", s.a);
15. }

A. 10 (Garbage Value)
B. 0 10
C. 10 0
D. (Garbage Value) 10

34. Which of the following operation is illegal in structures?

A. Typecasting of structure
B. Pointer to a variable of same structure
C. Dynamic allocation of memory for structure
D. All of the mentioned

35. Which of the following operation is illegal in structures?

A. Typecasting of structure
B. Pointer to a variable of same structure
C. Dynamic allocation of memory for structure
D. All of the mentioned

36. Presence of code like s.t.b = 10 indicate.

A. Syntax Error
B. structure
C. double data type
D. An ordinary variable name
37. The output of the code below is

1. #include <stdio.h>
2. struct student
3. {
4. char *name;
5. };
6. struct student fun(void)
7. {
8. struct student s;
9. s.name = "alan";

10. return s;
11. }
12. void main()
13. {
14. struct student m = fun();
15. s.name = "turing";
16. printf("%s", m.name);
17. }

A. alan
B. Turing
C. Compile time error
D. Nothing
PICT-FPL2-Unit-03-Embedded C(66) KEY
1. Which of the following is the header file for PIC18F877 in the MPLAB

A. header-16F877A
B. 16F877A.h
C. h.16F877A
D. header.16F877A

2. What is the operation of the function output_C(255)

A. Output the data 'C' to port 255


B. Output some data to port C
C. Output the data 255 to port C
D. none of the above

3. Which of the following floating point data type is supported by PIC


microcontroller

A. 32-bit
B. 64-bit
C. 80-bit
D. 128-bit

4. The function input_A() will

A. return the data read from port A


B. accepted the data from port A and keep in the register of the processor
C. accepted a data from the port A and display it
D. output a data to port A

5. The function to generate a delay in milliseconds with passing the


parameter as the delay required in milliseconds is

A. delaymilliseconds(n)
B. delaymilli(n)
C. delayms(n)
D. delay_ms(n)

6. The function delay_us(x) generates a delay of

A. x seconds
B. x milliseconds
C. x microseconds
D. none of the above

7. The function delay_ms(x) generates a delay of

A. x seconds
B. x milliseconds
C. x microseconds
D. none of the above
8. The function output_A(x)

A. gives the data 'x' to port A


B. gives the data 'A' to port x
C. gives a random data to port x
D. gives a random data to port A

9. The function output_high(PIN_C3)

A. clears the port C pin 3


B. sets the port C pin 3
C. toggles the port C pin 3
D. none of the above

10. The function output_low(PIN_C3)

A. clears the port C pin 3


B. sets the port C pin 3
C. toggles the port C pin 3
D. none

11. The function input(PIN_C3)

A. inputs from port C pin 3


B. reads from port C pin 3
C. returns the one bit value read from the port C
D. clears the port C pin 3

12. The PIC18F877 has a_____________channel ADC

A. 4
B. 8
C. 12
D. none of the above

13. The PIC18F877 has a______bit ADC

A. 8
B. 10
C. 12
D. 16

14. The input channels of the ADC of PIC 18F877 are available on _______pins

A. RA0 to RA5 and RE1 to RE2


B. RA1 to RA2 and RE0 to RE5
C. RB0 to RB5 and RE1 to RE2
D. RB0 to RB1 and RE0 to RE5
15. The function used to read the digital output data of the ADC of the
PIC18F877 is_____

A. input_adc()
B. read_adc()
C. accept_adc()
D. none of the above

16. The function used to select the ADC input channel for the analog input is

A. select_adc_channel(n)
B. adc_channel(n)
C. set_adc_channel(n)
D. none of the above

17. The_________directives is used to indicate that a function is ISR

A. #int_<interrupt_name>
B. #ISR_<interrupt_name>
C. #interrupt_name
D. #interrupt_<interrupt_name>

18. The function used to set the timer mode for a timer 'x' is ______

A. set_timerx(mode)
B. setup_timerx(mode)
C. settings timerx(mode)
D. timerx(mode)

19. The function used to read the contents of a timer 'x' is ______

A. input_timerx()
B. accept_timerx()
C. get_timerx()
D. set_timerx(n)

20. The function used to write to the contents of a timer 'x' is______

A. input_timerx()
B. accept_timerx(n)
C. get_timerx(n)
D. set_timerx(n)

21. The function used to get the data from the UART port of the PIC 18F877 is

A. gets()
B. getc()
C. getch()
D. getchar()
22. The function used to send the data from the UART port of the PIC 18F877
is

A. puts(x)
B. putch(x)
C. putchar(x)
D. putc(x)

23. The function used to get the data from the SPI port of the PIC 18F877 is

A. spi_gets()
B. spi_read()
C. spi_input()
D. spi_getchar()

24. The function used to send the data from the SPI port of the PIC 18F877 is

A. spi_puts(x)
B. spi_write(x)
C. spi_send(x)
D. spi_putc(x)

25. The function used to send data through the i2c port of PIC18F877 is _____
_

A. i2c_read()
B. i2c_accept()
C. i2c_input()
D. i2c_write(n)

26. The function used to read the data from the ic2 port of PIC18F877 is ____
__

A. i2c_read()
B. i2c_output(n)
C. i2c_write(n)
D. i2c_stop()

27. The function used to read the data from the i2c port 0f PIC18F877 is

A. i2c_read()
B. i2c_output(n)
C. i2c_write(n)
D. i2c_stop()

28. The function used to stop the data from the i2c port 0f PIC18F877 is

A. i2c_read()
B. i2c_output(n)
C. i2c_write(n)
D. i2c_stop()
29. The sequence of the 4-bits to be given for full stepping in a stepper
motor is _____

A. 09H,0AH,06H,05H
B. 09H,06H,05H,0AH
C. 0AH,09H,06H,05H
D. 05H,06H,09H,0AH

30. The most common type of microprocessor is -----------

A. Chip
B. System board
C. CISC chip
D. Port

Embedded_rashid #1

31. "int8" is a eight bit data type.

A. True
B. False
C. Depends on condition
D. None of the above

Embedded_rashid #2

32. "int16" is a sixteen bit data type

A. True
B. False
C. Depends on condition
D. None

Embedded_rashid #3

33. Embedded system is _______

A. Reactive
B. Real time
C. Both (a) and (b)
D. None

Embedded_rashid #4

34. Software written for embedded system is called________

A. Firmware
B. System program
C. Operating system
D. All

Embedded_rashid #5
35. Software for embedded system is written in __________

A. ROM
B. Flash memory
C. Both A and B
D. None

Embedded_rashid #6

36. Embedded system has _________

A. Response time constraints


B. Strict deadlines
C. Both A and B
D. None

Embedded_rashid #7

37. OS used in embedded system is ________

A. Single user OS
B. Real time OS
C. Open source
D. All

Embedded_rashid #8

38. Which feature of C language helps in accessing the underlying hardware?

A. Pointers
B. Arrays
C. Strings
D. Functions

Embedded_rashid #9

39. Assembly code embedded within C programs is called ______

A. Inline Assembly Code


B. Machine code
C. Both A and B
D. None

Embedded_rashid #10

40. Following feature of C is not supported in Embedded C.

A. Pointers
B. Functions
C. Recursion
D. All

Embedded_rashid #11
41. Embedded C do not use standard C functions like

A. malloc
B. getch
C. printf
D. scanf

Embedded_rashid #12

42. Execution of single program repeatedly is done by ________

A. Distributed system
B. Embedded system
C. Both A and B
D. None

Embedded_rashid #13

43. Use of pointers in embedded system is ________

A. Bit manipulation
B. Calling function
C. Accessing underlying hardware
D. All

Embedded_rashid #14

44. Embedded C is used for __________

A. Micro controllers
B. Desktop computers
C. Both A and B
D. None

Embedded_rashid #15

45. Following is embedded system

A. Digital camera
B. Mobile phone
C. Washing machine
D. All

Embedded_rashid #16

46. Embedded devices have following resource constraints___ ___

OR

Embedded system programming is to get maximum features in ________

A. Limited ROM
B. Limited RAM
C. Limited stack space
D. All

Embedded_rashid #17
47. Embedded system are programmed using________

A. Machine code
B. Low level language
C. High level language
D. All

Embedded_rashid #18

48. A traffic light sequencer is an example of _________

A. Desktop
B. Embedded system
C. Distributed system
D. None

Embedded_rashid #19

49. Numbers are stored and transmitted inside a computer in

A. Binary form
B. AscII form
C. Decimal form
D. Alphanumeric form

Embedded_rashid #21

50. Embedded C programming language support _______ instruction of normal C


language

A. All
B. some
C. Specific
D. Cannot tell

Embedded_rashid #22

51. CCS C is__________

A. Compiler
B. Linker
C. Cross linker
D. Cross compiler

Embedded_rashid #23

52. Which of the following function will you use to create delay in
microseconds?

A. delayms()
B. delaymicroseconds()
C. delay_ms()
D. delay_microsecods()

Embedded_rashid #24
53. Software for embedded system is written in ________

A. FlashROM
B. RAM
C. EEPROM
D. All

Embedded_rashid #25

54. SPI uses ___________ pins for communication

A. SCK, SDI
B. SCL, SDA
C. PSP0 to PSP7
D. RXD, TSD

Embedded_rashid #26

55. I2C stands for ______________________________

A. Inter integrated circuits


B. Internal integrated circuits
C. Inbuilt integrated circuits
D. Internal Inbuilt circuits

Embedded_rashid #27

56. Which function is used to accept data received by serial I2C port?

A. getc()
B. I2C_read()
C. I2C_readdata()
D. psp_write()

Embedded_rashid #28

57. Embedded systems are programmed using

A. Machine code
B. Low level language
C. High level language
D. All

Embedded_rashid #30

58. A cross compiler is a compiler whose purpose is _______

A. Compile code for target CPU


B. Convert high level language
C. Combine high and low level langauage
D. All

Embedded_rashid #29
59. Why C(255) is used?

A. IT outputs data C to pport number 255


B. It outputs some data 255 times to port C
C. It outputs data 255 to port C
D. It outputs data 1 to port C

Embedded_rashid #31

60. What does the function output_high(PIN_C3) perform ?

A. Clears port C in pin 3


B. Clears pin 3 in port C
C. Sets port C in pin 3
D. Sets pin 3 of port C

Embedded_rashid #32

61. ADC stands for _______________

A. Analog Direct Control


B. Analog To Digital Convertor
C. Analog Digital Convertor
D. Asynchronous To Direct Convertor

Embedded_rashid #33

62. Which function is used to read the digital output data from ADC ?

A. input_adc()
B. read_adc()
C. accept_adc()
D. any of above

Embedded_rashid #34

63. Which of the following functions is used to initialized ADC and to make
it use internal clock of the PIC ?

A. set_ADC()
B. setup_ADC()
C. set_adc_ports()
D. set_adc_channel()

Embedded_rashid #35

64. Which language provides direct hardware control without sacrificing


benefits of high level language ?

A. C
B. Pascal
C. Fortan
D. ALL

Embedded_rashid #36
65. SPL stands for ______________

A. Synchronous Portable Interface


B. Serial Peripheral Interface
C. Selected Peripheral Interface
D. Synchronous Peripheral Interface

Embedded_rashid #37

66. Which function used to write to the content of any timer X ?

A. input_timerx()
B. accept_timerx()
C. get_timerx()
D. set_timerx()

Embedded_rashid #38
PICT-FPL2-Unit-04-Android(143) KEY
1. What is an activity in Android?

A. Activity performs the actions on the screen


B. Manage the Application content
C. Screen UI
D. None of the above

2. What is the difference between margin and padding in android layout?

A. Margin is specifying the extra space left on all four sides in layout
B. Padding is used to offset the content of a view by specific px or dp
C. Both A and B are correct
D. None of the above

3. What is ANR in android?

A. When the application is not


C. When Android forcefully kills an
responding ANR will
application, it is called ANR
occur.
B. Dialog box is called as ANR. D. None of the above

4. How to access the context in android content provider?

A. Using getContext() in onCreate() D. A & C


B. Using intent() E. A & B
C. Using getApplicationContext() at
anywhere in an application

5. What is an anonymous class in android?

A. Interface class C. Java class


B. A class that does not have a
name but have functionalities in D. Manifest file
it

6. What is LastKnownLocation in android?

A. To find the last location of a C. To find the last known location


phone of a phone.
B. To find known location of a
D. None of the above
phone

7. What is the HTTP response error code status in android?

A. status code < 100 C. status >= 400


B. status code > 100 D. None of the above
8. How many protection levels are available in the android permission tag?

A. There are no permission tags available in android


B. Normal, kernel, application
C. Normal, dangerous, signature, and signatureOrsystem
D. None of the above

9. What are the main components in android?

A. Activity C. Broadcast Receiver


B. Services D. All of above

10. Explain android activity life cycle?

A. onCreate() > onStart() > onActivityStarted() > onResume() > onPause


()
B. OnCreate() > onStart() >onResume() > onPause() > onStop() >
onRestart()
C. OnCreate() > onStart() > onPause() > onResume() > onStop() >
onDestroy()
D. onResume()

11. What are the layouts available in android?

A. Linear Layout D. Relative Layout


B. Frame Layout E. All of above
C. Table Layout

12. What is sleep mode in android?

A. Only Radio interface layer and


C. Air plane mode
alarm are in active mode
B. Switched off D. None of the Above

13. Which permissions are required to get a location in android?

A. ACCESS_FINE and ACCESS_COARSE C. Internet permission


B. GPRS permission D. WIFI permission.

14. What is ADB in android?

A. Image tool C. Android Debug Bridge


B. Development tool D. None of the above.

15. Data can be read from local source XML in android through

A. XML resource parser C. DOM parsing


B. XML pull parsing D. None of the above
16. What is off-line synchronization in android?

A. Synchronization with internet C. Synchronization without internet


B. Background synchronization D. None of the above

17. How to pass the data between activities in Android?

A. Intent C. Broadcast receiver


B. Content Provider D. None of the Above

18. What is broadcast receiver in android?

A. It will react on broadcast C. It will pass the data between


announcements. activities.
B. It will do background
D. None of the Above
functionalities as services.

19. What is sleep mode in android?

A. Only Radio interface layer and


C. Air plane mode
alarm are in active mode
B. Switched off D. None of the Above

20. What is APK in android?

A. Android packages C. Android packaging kit


B. Android pack D. None of the above.

21. What is the JSON exception in android?

A. JSon Exception C. Input not found exception


B. Json Not found exception D. None of the above

22. What is anchor view?

A. Same as list view C. Same as relative layout


B. provides the information on
D. None of the above
respective relative positions

23. How to get a response from an activity in Android?

A. startActivityToResult() C. Bundle()
B. startActiivtyForResult() D. None of the above

24. What is splash screen in android?

A. Initial activity of an C. Initial method of an application


application
B. Initial service of an application
D. Initial screen of an application

25. What is broadcast receiver in android?

A. It will react on broadcast C. It will pass the data between


announcements. activities.
B. It will do background
D. None of the Above
functionalities as services.

26. Which features are considered while creating android application?

A. Screen Size
B. Input configuration
C. Platform Version
D. Device features
E. All of above

27. What is breakpoint in android?

A. Breaks the application C. Breaks the execution.


B. Breaks the development code D. None of the above.

28. What is JSON in android?

A. Java Script Object Native C. Java Script Object Notation


B. Java Script Oriented Notation D. None of the Above

29. What is the JSON exception in android?

A. JSon Exception C. Input not found exception


B. Json Not found exception D. None of the above

30. What are commands needed to create APK in android?

C. Javac,dxtool, aapt tool,


A. No need to write any commands
jarsigner tool, and zipalign
B. Create apk_android in command
D. None of the above
line

31. What is the life cycle of foreground activity in android?

A. onCreate() > onStart() >


C. onCreate() > onStart() >
onResume() > onStop() >
onResume()
onRestart()
B. onCreate() > onStart() >
D. None of the above
onResume() >onStop()
32. What is Android?

A. Android is a stack of software's


C. Virtual machine
for mobility
B. Google mobile device name D. None of the above

33. What is anchor view?

A. Same as list view C. Same as relative layout


B. provides the information on
D. None of the above
respective relative positions

34. WHich method is used to find GPS enabled or disabled pro-grammatically in

A. finish() C. onProviderDisable()
B. getGPSStatus() D. getGPS().

35. How many levels of securities are there in android?

A. App level security and kernel


C. Java level security
level security
B. Android level security D. None of the above

36. How to pass the data between activities in Android?

A. Intent C. Broadcast receiver


B. Content Provider D. None of the Above

37. What is sandbox in android?

A. Each application runs securely in


sandbox without interrupting C. Android development tool kit
another process
B. Android Box D. None of the above

38. What is the difference between margin and padding in android layout?

A. Margin is specifying the extra


space left on all four sides in C. Both A and B are correct
layout
B. Padding is used to offset the
content of a view by specific px D. None of the above
or dp

39. How to stop the services in android?

A. finish() C. By manually
B. system.exit(). D. stopSelf() and stopService()

40. In which technique, we can refresh the dynamic content in android?

A. Java C. Android
B. Ajax D. None of the Above

41. What is the purpose of super.onCreate() in android?

C. It allows the developers to


A. To create an activity
write the program
B. To create a graphical window for
D. None of the above
subclass

42. What is an interface in android?

A. Interface acts as a bridge


between class and the outside C. Interface is a layout file.
world.
B. Interface is a class. D. None of the above

43. On which thread services work in android?

A. Worker Thread C. Main Thread


B. Own Thread D. None of the above.

44. What is the difference between services and thread in android?

A. Services performs functionalities


in the background. By default
C. Thread works on services
services run on main thread only

B. Thread and services are having


D. None of the above
same functionalities.

45. Is it possible activity without UI in android?

A. No, it's not possible C. We can't say


B. Yes,it's possible D. None of the above

46. What AVD in android?

A. Android Valuable Device C. Android Virtual Device


B. Android Variable Device D. None Of Above

47. what is transient data in android?

A. Permanent data C. Temporary data


B. Secure data D. Logical data
48. How many applications are there in a given task in android?

A. Two C. Many
B. One D. Zero

49. What is breakpoint in android?

A. Breaks the application C. Breaks the execution.


B. Breaks the development code D. None of the above.

50. Why are these few users left with versions 1. 0 and 1. 1 ?

A. The first phones were released with version 1. 5


B. 1. 0 and 1. 1 had security holes that forced carriers to recall phones
using them.
C. 1. 0 and 1. 1 are just_number. Designations for the version Apple's
iphone running.
D. Everyone with 1. 0 and 1. 1 were upgraded to 1. 5 over the air
automatically

FPL2 Unit... #32

51. From the documentation of Android we can access the information about
articles and various tutorials on Andriod using_________

A. Home tab
B. Resources tab
C. Video tab
D. SDK tab

FPL2 Unit... #45

52. The AWT and swing libraries have been removed from the android library
set.

TRUE

FPL2 Unit... #17

53. An activity can be thought of as corresponding to what ?

A. A Java project
B. A Java class
C. A method call
D. none

FPL2 Unit... #10


54. What is a key difference with the distribution of apps for android based
devices than other mobile device platform applications ?

A. Applications are distributed by Apple app store only.


B. Applications are distributed by multiple vendors with different policies
on application.
C. Applications are distributed by multiple vendors with the exact same
policies on applications.
D. Applications are distributed by the android market only.

FPL2 Unit... #27

55. What is the driving force behind an android application and that
ultimately gets converted into a Dalvik executable ?

A. Java source code


B. R file
C. The emulator
D. The SDK

FPL2 Unit... #5

56. Android is based an Linux for the following reason :

A. Security
B. Portability
C. Networking
D. All

FPL2 Unit... #24

57. Which of these are not one of the three main components of Apk?

A. Dalvik executable
B. Resources
C. Native libraries.
D. Webkit.

FPL2 Unit... #21

58. The R. Java file is where you edit the resources for your project.

FALSE
FPL2 Unit... #13

59. Which of the following are not a compared of an Apk file ?

A. Dalvik executable
B. Resources
C. Native Libraries
D. All of these are components of the Apk

FPL2 Unit... #11


60. The XML file that contain all the text that your application uses_______

A. stack.xml
B. text.xml
C. strings.xml
D. string.Java

FPL2 Unit... #6

61. Emulator is identical to running a real phone EXCEPT when emulating /


simulating what?

A. Telephony
B. Applications
C. Sensors
D. The simulator can emulate / simulate all aspects"of a smart phone.

FPL2 Unit... #9

62. Which android version had the greatest share of the market as of January
2011 ?

A. 1. 1
B. 1. 5
C. 2. 3
D. 3. 4

FPL2 Unit... #34

63. The android software development kit (SDK) is all you need to develop
application for android.

TRUE

FPL2 Unit... #3

64. Android tries hard to low level components. Such as software stack, with
interfaces so that vender-specific code can be managed easily.

A. Confound
B. Abstract
C. Modularize
D. Compound

FPL2 Unit... #37

65. The emulated device for android ____

A. Runs the same base as the actual device, all the way down to the machine
layer.
B. Is more of a simulator and acts as a virtual machine for the android
device.

FPL2 Unit... #15


66. Android doesn't make any assumptions about a device's screen size,
resolution or chipset.

TRUE

FPL2 Unit... #33

67. What operating system is used as the base of the Android stack ?

A. Linux
B. Windows
C. Java
D. XML

FPL2 Unit... #25

68. what year was the open handset alliance announced ?

A. 2005
B. 2006
C. 2007
D. 2008

FPL2 Unit... #36

69. The Rfile is a (an) __________ generated file.

A. Automatically
B. Manually
C. Emulated
D. None

FPL2 Unit... #8

70. what year was development on the Dalvik virtual machine started?

A. 2003
B. 2005
C. 2007
D. 2006

FPL2 Unit... #26

71. What is contained within the manifest XML file?

A. The permissions the application requires


B. The list of strings used in the application
C. The sources code
D. all other choices

FPL2 Unit... #12


72. When developing for the Android OS, Java byte code is compiled into what?

A. Java source code


B. Dalvik application code
C. Dalvik byte code
D. C source code

FPL2 Unit... #28

73. A device with android installed is needed to develop apps for android.

FALSE

FPL2 Unit... #39

74. When you distribute your application commercially, you'll want to sign it
with your own key ?

TRUE
FPL2 Unit... #20

75. Google licensed some proprietary apps.

TRUE

FPL2 Unit... #38

76. As an android programmer, what version of Android should you use as your
minimum development target ?

A. Versions1. 6 or 2. 0
B. Versions 1. 0 or 1. 1
C. Versions1. 2 or 1. 3
D. Versions 2. 3 or 3. 0

FPL2 Unit... #42

77. Following is a client server tool in Android

A. Android debug bridge.


B. Dalvik debug monitor server (DDMS) [command line too1]
C. Android manager
D. Android hierarchy viewer [visual tool for laying out the components]

FPL2 Unit... #40

78. Android is licensed under which open source licensing license.

A. GNU's Gpl
B. Apache / MIT
C. OSS
D. Sourceforge

FPL2 Unit... #41


79. which one is not a nickname of a version of android?

A. Cupcake
B. Ginger bread
C. Honeycomb
D. Muffin

FPL2 Unit... #31

80. Your java source code is what is directly run on the android device.

FALSE
FPL2 Unit... #16

81. File specifies the layout of your screen.

A. Layout file
B. Manifest file
C. Strings XML
D. R file

FPL2 Unit... #4

82. Android release since 1. 5 have been given nicknames derived how ?

A. Adjective and strange animal


B. Food
C. Something that starts WFA'-> something that start WFB'
D. american states

FPL2 Unit... #30

83. When did Google purchase android ?

A. 2007
B. 2005
C. 2008
D. 2010

FPL2 Unit... #29

84. What is a funny fact about the start of android ?

A. It was originally going to be called UFO


B. The first version of android was released without an actual phone on the
market
C. Androids main purpose was to unlock your car door when you left the keys
inside of it
D. Was going to be a closed source application to make more money for its
company.

FPL2 Unit... #35


85. What does the. Apk extension stand for ?

A. Application Package
B. Application Program Kit
C. Android Proprietary Kit
D. Android Package

FPL2 Unit... #18

86. Creating a UI in android requires careful use of.___________

A. Java and SQL


B. XML and Java
C. XML and C++
D. Dream weaver

FPL2 Unit... #1

87. Which of the following is the most resource activities on android ?

A. Closing an app
B. Suspending an app
C. Opening a new app
D. Restoring the most recent app

FPL2 Unit... #7

88. What was Google's main business motivation for supporting Android?

A. To level the playing field for mobile devices.


B. To directly complete with the iphone
C. To comer the mobile device application market for licensing purpose.
D. To allow them to advertise more

FPL2 Unit... #43

89. From the documentation of Android following is a general starting point.

A. Home tab
B. Dev tab
C. Video tab
D. SDK tab

FPL2 Unit... #44

90. How does Google check for malicious software in the Android market ?

A. Every new app is scanned by a virus scanner


B. Users report malicious software to Google.
C. Google employees verify each new application.
D. A separate company monitors the Android market for Google.

FPL2 Unit... #19


91. what was the main reason for replacing the Java Virtual Machine (JVM)
with the Dalvik VM when the project began ?

A. These was not enough memory capability


B. Java virtual machine was not free
C. Java VM was too complicated to configure
D. Java VM ran too slow

FPL2 Unit... #23

92. What is contained within the layout XML file?

A. Orientations and layouts that speed what the display looks like
B. The permission required by the application
C. The strings used in the application
D. The code which is complied to run the application

FPL2 Unit... #14

93. List and adapters are more organizations aids than user interface
elements in android.

TRUE

FPL2 Unit... #2

94. What is the name of the program that converts java byte code into Dalvik
byte code ?

A. Android Interpretive Complier (AIC)


B. Dalvik converter
C. Dex compiler
D. Mobile Interpretive Complier (MIC)

FPL2 Unit... #22

95. _____ Mobile OS has evolved in 1996.

A. Symbian
B. Palm
C. Pocket PC
D. RIM

FPL2 Unit... #15

96. WAP stands for _____ .

A. Wireless Application Protocol


B. Wireless Application Program
C. Wireless Application Portal
D. none

FPL2 Unit... #26


97. iOS supports x86 architecture.

FALSE

FPL2 Unit... #20

98. ______ is designed to run on mobile devices.

A. Mobile OS
B. DOS
C. Network OS
D. None

FPL2 Unit... #16

99. User interface fundamentals are managed by____.

A. View manager
B. window manager
C. both (a) and (b)
D. none

FPL2 Unit... #46

100. AVD stands for Android Virtual Driver.

FALSE

FPL2 Unit... #38

101. WAP is technical standard for accessing information over a ______ .

A. Mobile wireless network


B. wired network
C. bluetooth
D. none

FPL2 Unit... #31

102. ________ is responsible for running application on android.

A. JVM
B. ADT
C. DVM
D. none

FPL2 Unit... #35

103. Android is owned by____.

A. Apple
B. RIM
C. Google
D. Microsoft

FPL2 Unit... #8
104. From the documentation of Andriod we can access the information about
application design and development using _____.

A. Home tab
B. Dev tab
C. Video tab
D. SDK tab

FPL2 Unit... #49

105. Applications can interact with one another by acting as content


providers.

TRUE

FPL2 Unit... #44

106. Android provides API for accessing peripherals like accelerometer, GPS
and compass.

TRUE

FPL2 Unit... #36

107. Device drivers communicates with the _____.

A. Application
B. Hardware
C. Software
D. None

FPL2 Unit... #12

108. Data link layer is a part of WAP architecture.

FALSE

FPL2 Unit... #28

109. ______ is assigned with task of maintenance and further development of


andriod.

A. Google
B. OHA
C. AOSP
D. PaloAlto

FPL2 Unit... #17


110. Android uses ____ as a database.

A. Oracle
B. MS acess
C. SQLite
D. SQL

FPL2 Unit... #10

111. Data sharing between applications is managed by _____ .

A. Activity manager
B. Telephony manager
C. Content manager
D. Location manager

FPL2 Unit... #14

112. iOS is proprietary.

TRUE

FPL2 Unit... #6

113. _____ protocols works at transport layer.

A. WTLS
B. WAE
C. WSP
D. WDP

FPL2 Unit... #32

114. DVM is developed by _____.

A. Linux Torvald
B. Dennis Ritchie
C. Dan Bornstein
D. none

FPL2 Unit... #24

115. WAP is designed to work for micro browsers on mobiles.

TRUE

FPL2 Unit... #25

116. DDMS stands for Dalvik Debug Monitor Server.

TRUE

FPL2 Unit... #43


117. Which of the following is mobile OS?

A. Eclipse
B. Python
C. Android
D. None

FPL2 Unit... #1

118. OHA stands for ______.

A. Open Handset Alliance


B. Open Hardware Alliance
C. Open Handheld Alliance
D. None

FPL2 Unit... #3

119. ADB is a client-server tool.

TRUE
FPL2 Unit... #42

120. Android is based on ______ operating system.

A. Linux
B. Windows
C. Mac
D. None

FPL2 Unit... #2

121. Dalvik compiler converts Java file to .class files.

FALSE

FPL2 Unit... #11

122. Jelly Bean is popular name for android version _________.

A. 4.1.X
B. 3.0
C. 1.5
D. 2.2

FPL2 Unit... #18

123. WAP enables the applications development for handled portable devices.

TRUE

FPL2 Unit... #27


124. Android application framework accesses the libraries through _______.

A. JVM
B. DVM
C. CLR
D. None

FPL2 Unit... #4

125. GSM is one of the wireless bearers in WAP architecture.

TRUE
FPL2 Unit... #29

126. WML stands for ____.

A. Wireless Markup Library


B. Wireless markup language
C. Web based markup language
D. none

FPL2 Unit... #30

127. ADT is ______ for eclipse IDE.

A. Protocol
B. Library function
C. plug in
D. none

FPL2 Unit... #34

128. Black Berry supports ARM CPU architecture type.

TRUE

FPL2 Unit... #22

129. ______ is central command center for android application.

A. Activity
B. Intent
C. Context
D. Service

FPL2 Unit... #40

130. Objective C is used in development of iOS.

TRUE

FPL2 Unit... #9
131. From documentation of Andriod we can access the information about latest
development announcements and important links to Andriod topics using
.

A. Home tab
B. Dev tab
C. Video tab
D. SDK tab

FPL2 Unit... #48

132. Content providers manage the activity life cycle of application.

FALSE
FPL2 Unit... #21

133. ______ acts as abstraction layer between hardware and other software
layers.

A. Application
B. Application Framework
C. Linux Kernel
D. DVm

FPL2 Unit... #19

134. Tasks that do not require user interaction can be encapsulated in ____.

A. Activity
B. Intent
C. Context
D. Service

FPL2 Unit... #41

135. ADT stands for _____ .

A. Android development tools


B. Abstract Development toolkit
C. Advance development toolkit
D. none

FPL2 Unit... #33

136. ____ is responsible for java byte code to dalvik byte code conversion.

A. Java Compiler
B. Dalvik Compiler
C. C++ Compiler
D. None

FPL2 Unit... #23


137. Symbain OS is programmed in _______.

A. JAVA
B. C++
C. Python
D. VB

FPL2 Unit... #7

138. From the documentation of Andriod following is a general starting point.

A. Home tab
B. Dev tab
C. Video tab
D. SDK tab

FPL2 Unit... #47

139. Each android application runs in its own VM

TRUE
FPL2 Unit... #45

140. Dalvik VM is register based.

FALSE

FPL2 Unit... #5

141. Android run time is a part of application framework.

FALSE

FPL2 Unit... #13

142. Each task in android application is called activity.

TRUE

FPL2 Unit... #39

143. _______ provides the basic drivers for hardware components.

A. Linux Kernel
B. Library function
C. Android runtime
D. Package manager

FPL2 Unit... #37

Das könnte Ihnen auch gefallen