Beruflich Dokumente
Kultur Dokumente
___is a consistent method for describing problems and solutions within the context
of the software process.
(A) Software process
(B) Task Set
(C) Umbrella activity
(D) Process Pattern
Correct
Option:D
Explanation:
Process
pattern is a
consistent
method for
describing
problems and
Question : 42
When to use Structured Evolutionary Prototyping Model
(i) Requirements are unstable or have to be clarified
(ii) Risk, funding, schedule, program complexity, or need for early realization of benefits
(A) Only (i)
(B) Only (ii)
(C) Both (i) and (ii)
(D) None of the above
Correct Option: A
Explanation:
Structured Evolutionary Prototyping Model when Requirements are unstable or have to be clarified
Question : 43
Group I Group II
(P)Modular decomposability
1.small change in the problem specification leads
to a change in just one (or a small number of )
modules.
2 Correct Option:B
Explanation:
Modular decomposability : starting at the uppermost components in the hierarchy and working
down the hierarchy level by level.
Modular composability : production of modules that may be freely combined to produce new
systems
Modular Continuity: small change in the problem specification leads to a change in just one (or a
small number of ) modules.
Modular protection: effect of an abnormal condition at run-time only effects one (or very few)
modules
Question : 46
Which of the following is not type of Cohesion
(A) Temporal Cohesion
(B) Functional Cohesion
(C) Common Cohesion
(D) Sequential Cohesion
Correct Option : A
Explanation:
In Basic Cocomo model Effort can be calculated by E = ab(KLOC) exp(bb),
and duration can be calculated by D = cb(E) exp(db)
Question : 48
Restructuring or re-writing part or all of a legacy system without changing its functionality
(D) Reusability
Correct Option:
D Explanation:
(51)
Regression
testing re-
Question : 50
Which of the following is not System Testing
(A) Alpha Testing
(B) Recovery testing
(C) Security testing
(D) Performance testing
Correct Option: A
Explanation:
System Testing are
- Recovery testing
- Security testing
- Performance testing
Question : 51
Correct Option:
C Explanation:
Both languages
are regular.
(i) Alphabet is
Question : 52
Correct Option : A
Explanation:
The set of regular languages is closed under the union operation, i.e., if A and B are regular languages
over the same alphabet 1, then A U B is also a regular language is also decidable problem.
Question : 53
A context-free grammar G = (V, 1, R, S) is said to be in Chomsky normal form, if every rule in R in
form,
(i) . A -> BC, where A, B, and C are elements of V , B != S, and C != S.
(ii) . A -> a, where A is an element of V and a is an element of 1.
(iii) S -> eps, where S is the start variable.
(A) (i) or (ii)
(B) (ii) or (iii)
(C) (i) or (iii)
(D) Any of the above form
Correct Option: D
A context-free grammar G = (V, 1, R, S) is said to be in Chomsky normal form, if every rule in R has one
of the following three forms:
(i) . A -> BC, where A, B, and C are elements of V , B != S, and C != S.
(ii) . A -> a, where A is an element of V and a is an element of I.
(iii) S -> eps, where S is the start variable.
Question : 54 Consider the
languages L1= {a n b a2n b
a3n : n > 0}.
L2= {a nb na n b n : n > 0}.
L3= { w G {a, b, c} * : w
contains more b's than a's
and w contains more c's
than a's }. Which of the
following statements is
true.
(A) L1,L2 is CFL but L3
is not CFL
(B) L3,L2 is CFL but L1
is not CFL
(C) L1,L2 and L3 are
not CFL
L3= { w G {a, b, c} * : w contains more b's than a's and w contains more c's than a's } is not CFL.
Question : 55
Which of the following computational models are equivalent
(i) One-tape Turing machines.
(ii) . k-tape Turing machines, for any k > 1.
(iii) Non-deterministic Turing machines.
(A) (i) and (ii) are equivalent but (iii) not
(B) (ii) and (iii) are equivalent but (i) not
(C) (i) and (iii) are equivalent but (ii) not
(D) All three (i), (ii) and (iii) are equivalent
Correct Option:
Explanation:
All computational models are equivalent
(i) One-tape Turing machines.
D
(ii) . k-tape Turing machines, for any k > 1.
(iii) Non-deterministic Turing machines
Question : 56 Consider
the statements
(51) ANFA = { M is a
nondeterministic finite
automaton that accepts
the string w} is decidable.
(52) L = {(P, w): P is a
Java program that
terminates on the input
string w} is undecidable.
Which of the following is
correct.
(A) Only S1
(B) Only S2
(C) Both S1 and S2
(S2) L = {(P, w): P is a Java program that terminates on the input string w} is undecidable.
Question : 57
Information about the name is entered into the symbol table during and
Correct Option: A
Explanation:
Information about the name is entered into the symbol table during
lexical and syntactic analysis.
Question : 58
Syntax directed translation subroutines generate code.
(A) intermediate
(B) source
(C) object
(D) error
Correct Option: A
Explanation:
Syntax directed translation subroutines generate intermediate code.
Question : 59
The first of S.
Correct Option
A
Explanation:
FIRST(true) = { "true" }
FIRST(false) = { “false" }
FIRST( (S) ) = {"("}
FIRST( S and S ) = FIRST( S or S ) = FIRST( S ) = { "true", "false" }
Question : 60
This optimization technique works locally on the source code to transform it into an optimized code is
called
(A) Dead Code Elimination
(B) Strength Reduction
(C) Loop Optimization
(D) Peephole Optimization
Correct Option: D
Explanation: This optimization technique works locally on the source code to transform it into an
optimized code is called peephole optimization.
Question : 61
Consider the logic diagram
Correct Option: D
Explanation:
The Expression for logic diagram
Cl CoS-
F = ABC+ABC+ A'C
Question : 62
Consider the Boolean function in sum-of-products
0 0 1 1
1 1 1 1
0 0 1 1
0 \±
0 1
|
--»-’
D
F'= AC + B'C +
AITD'
(A+C)(B + C)
/■'=•
,{A
+ B + D ),+B+D)
F=(A +C)(B+C)(A
Question : 63
Consider A sequential circuit has two D flip-flops A and B, two inputs x and y , and one output z.
Explanation:
The sequential
circuit has two D
flip-flops A and B,
two inputs x and y ,
and one output z.
The flip-flop input
equations and the
circuit output are
DA = x’y + xA; DB =
x’B + xA; z = B
Question : 64
The content of a 4-bit register is initially 1101. The register is shifted six times to the right with the
serial input being 101101. What is the content of the register after shift
(A) 1111
(B) 0110
(C) 1101
(D) 1011
Correct Option: D
Explanation:
Explanation:
Address field has value 400
Question : 67
An instruction is stored at location 300 with its address field at location 301 . The address field has
the value 400. A processor register R 1 contains the number 200.
The effective address if the register indirect addressing mode is used
(A) 400
(B) 301
(C) 600
(D) 200
Correct Option: D
Explanation:
Indexed: 200 + 400 = 600
Question : 69
A pipeline has 4-phases with duration 60ns,50ns,90ns and 80 ns. There is latch delay of 10 ns.The
pipelining cycle time
(A) 90ns
(B) 100ns
(C) 80ns
(D) 110 ns
Correct Option:
B
Explanation:
max(50,60,80,90)+10 = 100 ns
Question : 70
A pipeline has 4-phases with duration 60ns,50ns,90ns, and 80 ns. There is latch delay of 10 ns. The
pipelining time for 1000 tasks
(A) 1003
(B) 10030
(C) 100300
(D) None of the above
Correct Option: C
Explanation:
(1000+4-1)x100=100300
Question : 71
Which of these is a correct method to create a new array in Java Script?
A. var myArray
=
B. var myArray
=
C. var myArray= ();
= [];
=
D. myArrayB=Explanation:
varOption:
Correct new
=correct method toArray[];
create=a {};
new array in Java Script
var myArray = [];
Question : 72
Correct Option: D
Explanation: Threads exist in several states, a thread can be running, suspended, blocked, terminated &
ready to run.
Question : 73
XML uses the features of
A. HTML
B. XHTML
C. VML
D. SGML
Correct Option: D
Explanation:
Assume that the size of an integer is 32 bit. What is the output of the following program?
#include<stdio.h>
struct st { int x;
int y; };
int main()
{ printf("%d
",
sizeof(
(A) struct
4
st));
(B)
8 return
(C) Compiler Error
(D) Runtime Error
Correct Option: B
Explanation:
The size of the
integer is 4 bytes.
So 4+4= 8
Question: 75
Correct Option: A
Explanation:
Encapsulation can
be achieved in C+
+ using an access
specifier.
Question: 76
(A) If we derive an abstract class and do not implement all the abstract methods, then the derived
class should also be marked as abstract using 'abstract' keyword
Correct Option:D
Explanation: A class can inherit from multiple abstract classes is false because Multiple inheritance is
ratio means
(A) Number of
pixels
(B) Ratio of
vertical points to
horizontal points
(C) Ratio of
horizontal points to
vertical points
(A) AND
(B) OR
(C) NOT
(D) NOR
Correct Option: B
Explanation:
The logical OR of the endpoint codes determines if the line is completely inside the window. If the
logical OR is zero, the line can be trivially accepted.
Question: 79
Type of Parallel Projection, when a direction of projection makes 45° angle with a Projection plane is
called.........
(A) Cabinet projection
(B) Cavalier projection
(C) Oblique projection
(D) Orthographic projection
Correct Option: B
Explanation: Type of Parallel Projection, when a direction of projection makes 45° angle with a
Projection plane is called Cavalier projection.
Question: 80
A point P(7,1) is rotated by 90 o about a pivot point (2,2). What is the coordinate of new
transformed point P’?
A. (3,7)
B. (7,3)
C. (3,5)
D. (5,8)
Correct
Option:
x'=xcosd-ysind
Commented [1]: solution is missing
y'=xsind+ycos
d
After putting
value we have
new co-
Question: 81
a)Transport P)Framing
b)Physical Q)End-to-end connection
Answer:
[C]Transport-->End-to-end connection,Physical-->Conversion to bits,Data Link-->Framing,Network--
Commented [2]: explanation missing
>Routing
Question: 82
A company having a network address 192.168.10.0 and using the subnet mask 255.255.255.192 .
How many subnets consist of this network 192.168.10.0/26 ?
a] 8 Subnets
b] 12 Subnets
c] 4 Subnets
d] 62 Subnets
Correct Option: C
Explanation:
Total bits for the subnet is 2 so the number of Subnet is 4.
Question: 83
A company having a network address 192.168.10.0 and using the subnet mask 255.255.255.192
.How many hosts per subnets
(A) 32 hosts
(B) 64 hosts
(C) 62 hosts
(D) 48 hosts
Correct Option: C
Explanation: Total host bits are 6 in each subnet , so the number of hosts are 62.
Question: 84
A company having a network address 192.168.10.0 and using the subnet mask 255.255.255.192
.What are the valid subnets for 192.168.10.0/26 ?
0,64,128,192.
Question: 85
A company having a network address 192.168.10.0 and using the subnet mask 255.255.255.192.
What is the first valid address for the host in above the network address.
(A) 192.168.10.0
(B) 192.168.10.1
(C) 192.0.0.1
(D) 192.168.0.1
Correct option: B
A company having a network address 192.168.10.0 and using the subnet mask 255.255.255.192.
What is the broadcast address for this network?
(A) 192.168.10.255
(B) 192.168.10.254
(C) 192.168.10.63
(D) 192.168.10.64
In link state routing algorithm after construction of link state packets, new routes are computed using:
A. Distance Vector Algorithm
B. Dijkstra's algorithm
C. Bellman-Ford algorithm
D. ARPANET routing algorithm
Correct Option: B
Explanation: In link state routing algorithm after construction of link state packets, new routes are
computed using Dijkstra's algorithm.
Question: 89
In GoBack N ARQ,if sequence bits are taken as 5, then what would be the sender window size and
receiver's windows size.
(A) Sender window size=24,Receiver window size=4
(B) Sender window size=31,Receiver window size=1
(C) Sender window size=32,Receiver window size=2