Sie sind auf Seite 1von 75

Question : 41

___is a consistent method for describing problems and solutions within the context
of the software process.
(A) Software process
(B) Task Set
(C) Umbrella activity
(D) Process Pattern

Correct
Option:D
Explanation:
Process
pattern is a
consistent
method for
describing
problems and
Question : 42
When to use Structured Evolutionary Prototyping Model
(i) Requirements are unstable or have to be clarified
(ii) Risk, funding, schedule, program complexity, or need for early realization of benefits
(A) Only (i)
(B) Only (ii)
(C) Both (i) and (ii)
(D) None of the above

Correct Option: A

Explanation:
Structured Evolutionary Prototyping Model when Requirements are unstable or have to be clarified
Question : 43

Which of the following is not framework activity of Adaptive Software Development


(A) Speculation
(B) Collaboration
(C) Learning
(D) Postmortems
Correct Option: D

Explanation: Postmortems is not framework activity of Adaptive Software Development


Question : 44
Which of the following are not functional Requirements
(A) Availability
(B) External Interface
(C) Audit Tracking
(D) Authentications
Correct Option: A Explanation :
Availability is a not functional requirement. functional Requirements
- External Interface
- Audit Tracking
- Authentications
Question : 45
Match the following

Group I Group II
(P)Modular decomposability
1.small change in the problem specification leads
to a change in just one (or a small number of )
modules.

(Q)Modular composability 2.effect of an abnormal condition at run-time only


effects one (or very few) modules
(R )Modular Continuity
3.starting at the uppermost components in the
hierarchy and working down the hierarchy level by
level.
(S)Modular protection
4.production of modules that may be freely
combined to produce new systems

(A) P-3, Q-4, R-2,S-1

(B) P-3, Q-4, R-1, S-2

(C) P-2, Q-1, R-4, S-3

(D) P-4, Q-3, R-1,S-

2 Correct Option:B
Explanation:

Modular decomposability : starting at the uppermost components in the hierarchy and working
down the hierarchy level by level.
Modular composability : production of modules that may be freely combined to produce new
systems
Modular Continuity: small change in the problem specification leads to a change in just one (or a
small number of ) modules.
Modular protection: effect of an abnormal condition at run-time only effects one (or very few)
modules
Question : 46
Which of the following is not type of Cohesion
(A) Temporal Cohesion
(B) Functional Cohesion
(C) Common Cohesion
(D) Sequential Cohesion

Correct Option: C Explanation: Type of


Cohesion
- Temporal Cohesion
- Functional Cohesion
- Sequential Cohesion
Question : 47
Consider a Basic Constructive Cost Model model where E is the effort applied in person-months, D is the
development time in chronological months, KLOC is the estimated number of delivered lines of code (in
thousands) and ab and cb are multiplicative factors while cb, db are exponential factors. The basic
COCOMO equations are of the form.

(A) E = ab(KLOC) exp(bb), D = cb(E) exp(db)


(B) D = ab(KLOC) exp(bb), E = cb(D) exp(db)
(C) E = ab exp(bb), D = cb(KLOC) exp(db)
(D) E = ab exp(db), D = cb(KLOC) exp(bb)

Correct Option : A
Explanation:
In Basic Cocomo model Effort can be calculated by E = ab(KLOC) exp(bb),
and duration can be calculated by D = cb(E) exp(db)
Question : 48
Restructuring or re-writing part or all of a legacy system without changing its functionality

(A) Reuse Engineering


(B) Re - engineering
(C) Reverse Engineering

(D) Reusability

Correct Option: B Explanation:


Restructuring or re-writing part or all of a legacy system without changing its functionality
Is called System Re - engineering
Question : 49
Consider the statements below
(51) Regression testing allows the software team to assess its project on a frequent basis.
(52) Smoke Testing re-executes a small subset of tests that have already been conducted.
Which of the above is correct.
(A) Only S1
(B) Only S2
(C) Both S1 and S2
(D) None of the above

Correct Option:

D Explanation:
(51)
Regression
testing re-
Question : 50
Which of the following is not System Testing
(A) Alpha Testing
(B) Recovery testing
(C) Security testing
(D) Performance testing

Correct Option: A

Explanation:
System Testing are
- Recovery testing
- Security testing
- Performance testing
Question : 51

Consider the language over .


(i) Alphabet is I = {1}L = {w : w G I*, |w| = 2k + 1, k > 0}.
(ii) Alphabet is I = {a, b}. L = {w : w G I* , w does not contain substring bab}.
Which of the above is regular language.
(A) Only (i)
(B) Only (ii)
(C) Both (i) and (ii)
(D) None of the above

Correct Option:

C Explanation:

Both languages

are regular.
(i) Alphabet is
Question : 52

Which of the following is False.


(A) The set of regular languages is closed under the union operation, i.e., if A and B are regular
languages over the same alphabet 1, then A U B is also a regular language is undecidable
problem.
(B) A language A is called regular, if there exists a finite automaton M such that A = L(M) is a
decidable problem.
(C) Let N = (Q, 1, 5, q, F) be a nondeterministic finite automaton. There exists a deterministic
finite automaton M, such that L(M) = L(N) is decidable.
(D) None of the above

Correct Option : A

Explanation:
The set of regular languages is closed under the union operation, i.e., if A and B are regular languages
over the same alphabet 1, then A U B is also a regular language is also decidable problem.
Question : 53
A context-free grammar G = (V, 1, R, S) is said to be in Chomsky normal form, if every rule in R in
form,
(i) . A -> BC, where A, B, and C are elements of V , B != S, and C != S.
(ii) . A -> a, where A is an element of V and a is an element of 1.
(iii) S -> eps, where S is the start variable.
(A) (i) or (ii)
(B) (ii) or (iii)
(C) (i) or (iii)
(D) Any of the above form

Correct Option: D

A context-free grammar G = (V, 1, R, S) is said to be in Chomsky normal form, if every rule in R has one
of the following three forms:
(i) . A -> BC, where A, B, and C are elements of V , B != S, and C != S.
(ii) . A -> a, where A is an element of V and a is an element of I.
(iii) S -> eps, where S is the start variable.
Question : 54 Consider the
languages L1= {a n b a2n b
a3n : n > 0}.
L2= {a nb na n b n : n > 0}.
L3= { w G {a, b, c} * : w
contains more b's than a's
and w contains more c's
than a's }. Which of the
following statements is
true.
(A) L1,L2 is CFL but L3
is not CFL
(B) L3,L2 is CFL but L1
is not CFL
(C) L1,L2 and L3 are
not CFL
L3= { w G {a, b, c} * : w contains more b's than a's and w contains more c's than a's } is not CFL.
Question : 55
Which of the following computational models are equivalent
(i) One-tape Turing machines.
(ii) . k-tape Turing machines, for any k > 1.
(iii) Non-deterministic Turing machines.
(A) (i) and (ii) are equivalent but (iii) not
(B) (ii) and (iii) are equivalent but (i) not
(C) (i) and (iii) are equivalent but (ii) not
(D) All three (i), (ii) and (iii) are equivalent

Correct Option:

Explanation:
All computational models are equivalent
(i) One-tape Turing machines.
D
(ii) . k-tape Turing machines, for any k > 1.
(iii) Non-deterministic Turing machines
Question : 56 Consider
the statements
(51) ANFA = { M is a
nondeterministic finite
automaton that accepts
the string w} is decidable.
(52) L = {(P, w): P is a
Java program that
terminates on the input
string w} is undecidable.
Which of the following is
correct.
(A) Only S1
(B) Only S2
(C) Both S1 and S2
(S2) L = {(P, w): P is a Java program that terminates on the input string w} is undecidable.
Question : 57

Information about the name is entered into the symbol table during and

(A) lexical and syntactic analysis


(B) lexical and code generation
(C) lexical and error handler
(D) lexical and code optimization

Correct Option: A

Explanation:
Information about the name is entered into the symbol table during
lexical and syntactic analysis.
Question : 58
Syntax directed translation subroutines generate code.

(A) intermediate
(B) source
(C) object
(D) error

Correct Option: A

Explanation:
Syntax directed translation subroutines generate intermediate code.
Question : 59

Consider the following grammar:

S -> S and S | S or S | (S) | true | false

The first of S.

(A) FIRST( S ) = { "(", "true", "false" }


(B) FIRST(S) = { "true", "false"}
(C) FIRST(S ) = {"(", "true"}
(D) FIRST( S ) = { "(", "true", "false" ,")" }

Correct Option
A
Explanation:
FIRST(true) = { "true" }
FIRST(false) = { “false" }
FIRST( (S) ) = {"("}
FIRST( S and S ) = FIRST( S or S ) = FIRST( S ) = { "true", "false" }
Question : 60

This optimization technique works locally on the source code to transform it into an optimized code is
called
(A) Dead Code Elimination
(B) Strength Reduction
(C) Loop Optimization
(D) Peephole Optimization

Correct Option: D

Explanation: This optimization technique works locally on the source code to transform it into an
optimized code is called peephole optimization.
Question : 61
Consider the logic diagram

Logic expression for above diagram


(A) F = ABC+ A C'+ A'C
(B) F = ABC+ ABC'+ AB'C
(C) F = ABC+ ABC'+ A'BC
(D) F = ABC+ ABC'+ A'C

Correct Option: D
Explanation:
The Expression for logic diagram
Cl CoS-

F = ABC+ABC+ A'C
Question : 62
Consider the Boolean function in sum-of-products

F(w,x,y ,z) =Sum (2,3,4, 5,6,7, 11, 14, 15)


The POS for above Function:
(A) F=(A'+C)(B+C)(A'+B+D)
(B) F=(A'+C)(B+C')(A'+B+D)
(C) F=(A'+C)(B'+C)(A'+B+D)
(D) F=(A,+C)( B+C)(A,+B+D/)

Correct Option: A Explanation:

The POS for Boolean function in sum-of-products


F(w,x,y ,z) =Sum (2,3,4, 5,6,7, 11, 14, 15)

0 0 1 1

1 1 1 1

0 0 1 1

0 \±
0 1
|
--»-’
D
F'= AC + B'C +
AITD'
(A+C)(B + C)
/■'=•

,{A
+ B + D ),+B+D)
F=(A +C)(B+C)(A
Question : 63
Consider A sequential circuit has two D flip-flops A and B, two inputs x and y , and one output z.

The flip-flop input equations and the circuit output are

(A) DA = x’y + x'A; DB = x’B + xA; z = B


(B) DA = x’y' + xA; DB = x’B + xA; z = B
(C) DA = x’y + xA; DB = x’B + x'A'; z = B
(D) DA = x’y + xA; DB = x’B + xA; z = B
Correct Option: D

Explanation:
The sequential
circuit has two D
flip-flops A and B,
two inputs x and y ,
and one output z.
The flip-flop input
equations and the
circuit output are
DA = x’y + xA; DB =
x’B + xA; z = B
Question : 64
The content of a 4-bit register is initially 1101. The register is shifted six times to the right with the
serial input being 101101. What is the content of the register after shift
(A) 1111
(B) 0110
(C) 1101
(D) 1011
Correct Option: D

Explanation:

Input bits 4-bit register


Initial value
Question : 65

The 9’s complement of the following eight-digit decimal numbers: 12349876


(A) 87650123
(B) 87650133
(C) 87650113
(D) 87650132
Correct Option: A Explanation:
99999999- 12349876= 87650123
Question : 66
An instruction is stored at location 300 with its address field at location 301 . The address field has
the value 400. A processor register R 1 contains the number 200.
The effective address if the direct addressing mode is used
(A) 400
(B) 301
(C) 600
(D) 200
Correct Option: A

Explanation:
Address field has value 400
Question : 67
An instruction is stored at location 300 with its address field at location 301 . The address field has
the value 400. A processor register R 1 contains the number 200.
The effective address if the register indirect addressing mode is used
(A) 400
(B) 301
(C) 600
(D) 200
Correct Option: D

Explanation: A processor register R 1 contains the number 200.


Question : 68
An instruction is stored at location 300 with its address field at location 301 . The address field has
the value 400. A processor register R 1 contains the number 200.
The effective address if the register indexed addressing mode is used
(A) 400
(B) 301
(C) 600
(D) 200
Correct Option: C

Explanation:
Indexed: 200 + 400 = 600
Question : 69
A pipeline has 4-phases with duration 60ns,50ns,90ns and 80 ns. There is latch delay of 10 ns.The
pipelining cycle time

(A) 90ns
(B) 100ns
(C) 80ns
(D) 110 ns
Correct Option:
B

Explanation:
max(50,60,80,90)+10 = 100 ns
Question : 70
A pipeline has 4-phases with duration 60ns,50ns,90ns, and 80 ns. There is latch delay of 10 ns. The
pipelining time for 1000 tasks
(A) 1003
(B) 10030
(C) 100300
(D) None of the above
Correct Option: C

Explanation:
(1000+4-1)x100=100300
Question : 71
Which of these is a correct method to create a new array in Java Script?
A. var myArray
=
B. var myArray
=
C. var myArray= ();
= [];
=
D. myArrayB=Explanation:
varOption:
Correct new
=correct method toArray[];
create=a {};
new array in Java Script
var myArray = [];
Question : 72

Which of these statements is not true?


a) By multithreading CPU idle time is minimized, and we can take maximum use of it
b) By multitasking CPU idle time is minimized, and we can take maximum use of it
c) Two thread in Java can have the same priority
d) A thread can exist only in two states, running and blocked

Correct Option: D

Explanation: Threads exist in several states, a thread can be running, suspended, blocked, terminated &
ready to run.
Question : 73
XML uses the features of
A. HTML
B. XHTML
C. VML
D. SGML
Correct Option: D
Explanation:

XML Uses the features of SGML (Standard Generalized Markup Language)


Question: 74

Assume that the size of an integer is 32 bit. What is the output of the following program?

#include<stdio.h>

struct st { int x;
int y; };
int main()
{ printf("%d
",
sizeof(
(A) struct
4
st));
(B)
8 return
(C) Compiler Error
(D) Runtime Error

Correct Option: B
Explanation:
The size of the
integer is 4 bytes.
So 4+4= 8
Question: 75

How can Encapsulation be achieved in C++?


(A) Using Access Specifiers
(B) Using only private members
(C) Using inheritance
(D) Using Abstraction

Correct Option: A
Explanation:
Encapsulation can
be achieved in C+
+ using an access
specifier.
Question: 76

Which of the following is FALSE about abstract classes in Java

(A) If we derive an abstract class and do not implement all the abstract methods, then the derived
class should also be marked as abstract using 'abstract' keyword

(B) Abstract classes can have constructors

(C) A class can be made abstract without any abstract method

(D) A class can inherit from multiple abstract classes.

Correct Option:D

Explanation: A class can inherit from multiple abstract classes is false because Multiple inheritance is

not allowed in Java.


Question: 77 Aspect

ratio means

(A) Number of

pixels

(B) Ratio of

vertical points to

horizontal points

(C) Ratio of

horizontal points to

vertical points

(D) Both B and C


Question: 78
In Cohen Sutherland line clipping algorithm, the logical_of the endpoint codes determines if

the line is completely inside the window.

(A) AND

(B) OR

(C) NOT

(D) NOR

Correct Option: B

Explanation:
The logical OR of the endpoint codes determines if the line is completely inside the window. If the
logical OR is zero, the line can be trivially accepted.
Question: 79

Type of Parallel Projection, when a direction of projection makes 45° angle with a Projection plane is
called.........
(A) Cabinet projection
(B) Cavalier projection
(C) Oblique projection
(D) Orthographic projection

Correct Option: B

Explanation: Type of Parallel Projection, when a direction of projection makes 45° angle with a
Projection plane is called Cavalier projection.
Question: 80

A point P(7,1) is rotated by 90 o about a pivot point (2,2). What is the coordinate of new
transformed point P’?
A. (3,7)
B. (7,3)
C. (3,5)
D. (5,8)

Correct
Option:
x'=xcosd-ysind
Commented [1]: solution is missing
y'=xsind+ycos
d
After putting
value we have
new co-
Question: 81

Match the following


Layer Description

a)Transport P)Framing
b)Physical Q)End-to-end connection

c)Data Link R)Routing

d)Network S)Conversion to bits

A]Transport --> Framing,Physical-->End-to-end connection,Data Link—>Routing,Network


>Conversion to bits
B] Data Link—>Framing,Network-->Conversion to bits,Transport -->Routing ,Physical-->End-to-end
connection
C] Transport-->End-to-end connection,Physical-->Conversion to bits,Data Link-->Framing,Network--
>Routing
D] Network-->Conversion to bits,Data Link—>Framing,Transport --> Framing,Physical-->End-to-end
connection

Answer:
[C]Transport-->End-to-end connection,Physical-->Conversion to bits,Data Link-->Framing,Network--
Commented [2]: explanation missing
>Routing
Question: 82

A company having a network address 192.168.10.0 and using the subnet mask 255.255.255.192 .
How many subnets consist of this network 192.168.10.0/26 ?

a] 8 Subnets

b] 12 Subnets

c] 4 Subnets

d] 62 Subnets

Correct Option: C

Explanation:
Total bits for the subnet is 2 so the number of Subnet is 4.
Question: 83

A company having a network address 192.168.10.0 and using the subnet mask 255.255.255.192
.How many hosts per subnets

(A) 32 hosts
(B) 64 hosts
(C) 62 hosts
(D) 48 hosts
Correct Option: C

Explanation: Total host bits are 6 in each subnet , so the number of hosts are 62.
Question: 84

A company having a network address 192.168.10.0 and using the subnet mask 255.255.255.192
.What are the valid subnets for 192.168.10.0/26 ?

(A) Valid subnets are 0,64,128,192,228


(B) Valid subnets are 0,64,128,192
(C) Valid subnets are 1,32,64,96,128

(D) Valid subnets are 0,8,16,32,48,54

Correct Option: B Explanation:

we have 4 Valid subnets are

0,64,128,192.
Question: 85

A company having a network address 192.168.10.0 and using the subnet mask 255.255.255.192.
What is the first valid address for the host in above the network address.

(A) 192.168.10.0
(B) 192.168.10.1
(C) 192.0.0.1
(D) 192.168.0.1
Correct option: B

The 192.168.10.0 is network Id so host address will be 192.168.10.1.


Question: 86

A company having a network address 192.168.10.0 and using the subnet mask 255.255.255.192.
What is the broadcast address for this network?

(A) 192.168.10.255
(B) 192.168.10.254
(C) 192.168.10.63

(D) 192.168.10.64

Correct Option: C Explanation:

For the network 192.168.10.0/26 have broadcast address 192.168.10.63.


Question: 87

Stream Control Transmission Protocol works in layer__

(A) Network layer


(B) Transport layer
(C) Application Layer
(D) Session Layer
Correct Option: B

Explanation: The Stream Control Transmission Protocol (SCTP) is a computer networking


communications protocol which operates at the transport layer
Question: 88

In link state routing algorithm after construction of link state packets, new routes are computed using:
A. Distance Vector Algorithm
B. Dijkstra's algorithm
C. Bellman-Ford algorithm
D. ARPANET routing algorithm
Correct Option: B

Explanation: In link state routing algorithm after construction of link state packets, new routes are
computed using Dijkstra's algorithm.
Question: 89

Geostationary satellites are not useful for

(A) For radio transmission


(B) For Television Transmission
(C) For mobile phones and data transmission
(D) None of the above
Correct Option: C
Explanation: Geostationary satellites are not useful for global coverage for small mobile phones
and data transmission, typically used for radio and TV transmission
Question: 90

In GoBack N ARQ,if sequence bits are taken as 5, then what would be the sender window size and
receiver's windows size.
(A) Sender window size=24,Receiver window size=4
(B) Sender window size=31,Receiver window size=1
(C) Sender window size=32,Receiver window size=2

(D) Sender window size=27,Receiver window size=5

Correct Option: B Explanation:

For 5 bits sequence number in GoBack N ARQ,

Sender window size will be 31 Receiver window size will be 1

Das könnte Ihnen auch gefallen