Sie sind auf Seite 1von 6

1. Which one of the following is the deadlock avoidance algorithm?

a) banker’s algorithm
b) round-robin algorithm
c) elevator algorithm
d) karn’s algorithm
View Answer
Answer: a
Explanation: None.

2. What is the time complexity to insert a node based on key in a priority queue?
a) O(nlogn)
b) O(logn)
c) O(n)
d) O(n2)
View Answer
Answer: c
Explanation: In the worst case, you might have to traverse the entire list.

3. The problem where process concurrency becomes an issue is called as ______


a) Philosophers problem
b) Bakery problem
c) Bankers problem
d) Reader-writer problem
View Answer
Answer: d
Explanation: None.

4. IDE disk is connected to the PCI BUS using ______ interface.


a) ISA
b) ISO
c) ANSI
d) IEEE
View Answer
Answer: a
Explanation: None.

5. Which diagram evolved from a desire to develop a procedural design representation that
would not allow violation of the structured constructs?
a) State transition diagram
b) Box diagram
c) ER diagram
d) None of the mentioned
View Answer
Answer: b
Explanation: None.

6. What type of software testing is generally used in Software Maintenance?


a) Regression Testing
b) System Testing
c) Integration Testing
d) Unit Testing
View Answer
Answer: a
Explanation: All other options are known as levels of software testing which further have types of
software testing.

7. Which of the following is the heuristics for State diagram?


a) Avoid concurrent composite states, especially those with synch states
b) Designate an initial state in every concurrent region of a concurrent composite state
c) Check that transitions to several concurrent sub-states go through a fork
d) All of the mentioned
View Answer
Answer: d
Explanation: All of the mentioned are the heuristics followed by state diagram.

8. What are Abstract Data Type?


a) They are a set of values and operations for manipulating those values
b) They are a scheme for storing values in computer memory
c) Arrays, stacks, queues, lists, and trees are all examples of abstract data types
d) They are a set of values and operations for manipulating those values, Arrays, stacks, queues,
lists, and trees are all examples of abstract data types
View Answer
Answer: d
Explanation: Data Structure is a scheme for storing values in computer memory and rest other
are true.
9. Which one of the following routing algorithm can be used for network layer design?
a) shortest path algorithm
b) distance vector routing
c) link state routing
d) all of the mentioned
View Answer
Answer: d
Explanation: None.

10. When a DNS server accepts and uses incorrect information from a host that has no authority
giving that information, then it is called
a) DNS lookup
b) DNS hijacking
c) DNS spoofing
d) None of the mentioned
View Answer
Answer: c
Explanation: DNS spoofing is the phenomenon for the above mentioned transaction.

11. Delete from r; r – relation


This command performs which of the following action ?
a) Remove relation
b) Clear relation entries
c) Delete fields
d) Delete rows
View Answer
Answer: b
Explanation: Delete command removes the entries in the table.

12. Which join refers to join records from the write table that have no matching key in the left
table are include in the result set:
a) Left outer join
b) Right outer join
c) Full outer join
d) Half outer join
View Answer
Answer: b
Explanation: A right outer join will return all the rows that an inner join returns plus one row for
each of the other rows in the second table that did not have a match in the first table. It is the
same as a left outer join with the tables specified in the opposite order.

13. A compiler for a high-level language that runs on one machine and produces code for a
different machine is called
a) Optimizing compiler
b) One pass compiler
c) Cross compiler
d) Multipass compiler
View Answer
Answer: c
Explanation: So done by the definition.

14. If programmer have defined parameterized constructor only, then __________________


a) Default constructor will not be created by the compiler implicitly
b) Default constructor will be created by the compiler implicitly
c) Default constructor will not be created but called at runtime
d) Compiler time error
View Answer
Answer: a
Explanation: When the programmer doesn’t specify any default constructor and only defines
some parameterized constructor. The compiler doesn’t provide any default constructor implicitly.
This is because it is assumed that the programmer will create the objects only with constructors.

15. What does a virtual function ensure for an object, among the following?
a) Correct method is called, regardless of the class defining it
b) Correct method is called, regardless of the object being called
c) Correct method is called, regardless of the type of reference used for function call
d) Correct method is called, regardless of the type of function being called by objects
View Answer
Answer: c
Explanation: It is property of the virtual function and one of their main use. Its use ensure that the
correct method is called even though it is been called from different pointer or references. This
also decreases chance of mistakes in program.

16. What translates IP address into MAC address?


a) Organizationally Unique Identifier
b) Address Resolution Protocol
c) Network Interface Card
d) Burned In Address
View Answer
Answer: c
Explanation: A MAC address is given to a adapter when it is manufactures. It is hardwired or
hard-coded onto your computer’s NIC and it is unique to it. Something called the ARP (Address
Resolution Protocol) translates an IP address into MAC address.

17. “When bogus reconfiguration commands are used to affect routers and switches to degrade
network performance.” Which type of Wireless network threat would you classify this under?
a) Network Injection
b) Malicious Association
c) Man in the middle attack
d) Denial Of Service
View Answer
Answer: a
Explanation: This threat falls under Network Injection.

18. Which of these functions is not a part of the servlet lifecycle


a) Checking if an instance of servlet exists or not
b) Invoking the service method of the servlet
c) Shutting down the servlet
d) Pausing the servlet for a given period of time.
View Answer
Answer: d
Explanation: Pausing the servlet for a given amount of time is not a part of the servlet lifecycle. A
servlet can be checked, invoked and destroyed but it cannot be paused.

19. Which of the following is a disadvantage of the dynamic hashing structure


a) Buckets can be allocated dynamically
b) Lookup involves additional level of indirection
c) It involves a lesser space overhead
d) Hash structure can be modified dynamically
View Answer
Answer: b
Explanation: In dynamic hashing, lookup involves an additional level of indirection. The rest of
the options are the advantages of dynamic hashing.
20. Given an empty AVL tree, how would you construct AVL tree when a set of numbers are
given without performing any rotations?
a) just build the tree with the given input
b) find the median of the set of elements given, make it as root and construct the tree
c) use trial and error
d) use dynamic programming to build the tree
View Answer
Answer: b
Explanation: Sort the given input, find the median element among them, make it as root and
construct left and right subtrees with elements lesser and greater than the median element
recursively. this ensures the subtrees differ only by height 1.