1.
The definitions in an XML document are said
to be .............. when the tagging system and definitions in the DTD are all
in compliance.
(1)
well-formed
(2)
reasonable
(3) valid
(4) logical
Answer: 3
2. Consider
the JavaScript Code :
var y= “12”;
function f(
) {
var
y = “6”;
alert
(this.y);
function
g( ) {alert (y); }
g(
);
}
f( );
If M is the
number of alert dialog boxes generated by this JavaScript code and D1, D2, ............,
DM represents the content displayed in each of the M dialog boxes, then:
(1) M=3; D1
displays “12”; D2 displays “6”; D3 displays “12”.
(2) M=3; D1
displays “6”; D2 displays “12”; D3 displays “6”.
(3) M=2; D1
displays “6”; D2 displays “12”.
(4) M=2; D1
displays “12”; D2 displays “6”.
Answer: 4
3. What
is the output of the following JAVA program?
class simple
{
public
static void main(String[ ] args)
{
simple obj = new simple( );
obj.start(
);
}
void
start( )
{
long [ ] P= {3, 4, 5};
long [ ] Q= method (P);
System.out.print
(P[0] + P[1] + P[2]+”:”);
System.out.print
(Q[0] + Q[1] + Q[2]);
}
long
[ ] method (long [ ] R)
{
R [1]=7;
return
R;
}
} //end of
class
(1) 12 : 15
(2) 15 : 12
(3) 12 : 12
(4) 15 : 15
Answer: 4
4. What
is the output of the following ‘C’ program? (Assuming little - endian
representation of multi-byte data in which Least Significant Byte (LSB) is
stored at the lowest memory address.)
#include
<stdio.h>
#include
<stdlib.h>
/* Assume
short int occupies two bytes of storage */
int main ( )
{
union
saving
{
short int one;
char
two[2];
};
union
saving m;
m.two
[0] = 5;
m.two
[1] = 2;
printf(’’%d,
%d, %d\n”, m.two [0], m.two [1], m.one);
}/* end of
main */
(1) 5, 2,
1282
(2) 5, 2, 52
(3) 5, 2, 25
(4) 5, 2,
517
Answer: 4
5. Given
below are three implementations of the swap( ) function in C++ :
Which of
these would actually swap the contents of the two integer variables p and q?
(1) (a) only
(2) (b) only
(3) (c) only
(4) (b) and
(c) only
Answer: 2
6. In
Java, which of the following statements is/are True?
S1: The
‘final’ keyword applied to a class definition prevents the class from being
extended through derivation.
S2: A class
can only inherit one class but can implement multiple interfaces.
S3: Java
permits a class to replace the implementation of a method that it has
inherited. It is called method overloading.
Code:
(1) S1 and
S2 only
(2) S1 and
S3 only
(3) S2 and
S3 only
(4) All of
S1, S2 and S3
Answer: 1
7. Which
of the following statements is/are True?
P: C
programming language has a weak type system with static types.
Q: Java
programming language has a strong type system with static types.
Code:
(1) P only
(2) Q only
(3) Both P
and Q
(4) Neither
P nor Q
Answer: 3
8. A
graphic display system has a frame buffer that is 640 pixels wide, 480 pixels
high and 1 bit of color depth. If the access time for each pixel on the average
is 200 nanoseconds, then the refresh rate of this frame buffer is approximately:
(1) 16
frames per second
(2) 19
frames per second
(3) 21
frames per second
(4) 23
frames per second
Answer: 1
9. Which
of the following statements is/are True regarding the solution to the
visibility problem in 3D graphics?
S1: The
Painter’s algorithm sorts polygons by depth and then paints (scan - converts)
each Polygon on to the screen starting with the most nearest polygon.
S2: Backface
Culling refers to eliminating geometry with backfacing normals.
Code:
(1) S1 only
(2) S2 only
(3) Both S1
and S2
(4) Neither
S1 nor S2
Answer: 2
10. Consider
the matrix
representing
a set of planar (2D) geometric transformations in homogeneous coordinates.
Which of the following statements about the matrix M is True?
(1) M
represents first, a scaling of vector (2,1) followed by translation of vector
(1,1)
(2) M
represents first, a translation of vector (1,1) followed by scaling of vector
(2,1)
(3) M
represents first, a scaling of vector (3,1) followed by shearing of parameters
(-1,1)
(4) M
represents first, a shearing of parameters (-1,1) followed by scaling of vector
(3,1)
Answer: 2
11. Assume
the following regarding the development of a software system P:
- Estimated
lines of code of P: 33, 480 LOC
- Average
productivity for P: 620 LOC per person-month
- Number of
software developers: 6
- Average
salary of a software developer: Rs. 50,000 per month
If E, D and
C are the estimated development effort (in person-months), estimated
development time (in months), and estimated development cost (in Rs Lac)
respectively, then (E, D, C) = ...............
(1) (48, 8,
24)
(2) (54, 9,
27)
(3) (60, 10,
30)
(4) (42, 7,
21)
Answer: 2
12. Match
the following in Software Engineering:
List - I
(a) Product
Complexity
(b)
Structured System Analysis
(c) Coupling
and Cohesion
(d) Symbolic
Execution
List - II
(i) Software
Requirements Definition
(ii)
Software Design
(iii)
Validation Technique
(iv)
Software Cost Estimation
Code:
(a) (b) (c)
(d)
(1) (ii) (iii) (iv)
(i)
(2) (iii) (i) (iv)
(ii)
(3) (iv) (i) (ii)
(iii)
(4) (iii) (iv) (i) (ii)
Answer: 3
13. Which
one of the following is not typically provided by Source Code Management Software?
(1)
Synchronisation
(2)
Versioning and Revision history
(3) Syntax
highlighting
(4) Project
forking
Answer: 3
14. A
software system crashed 20 times in the year 2017 and for each crash, it took 2
minutes to restart. Approximately, what was the software availability in that
year?
(1) 96.9924%
(2) 97.9924%
(3) 98.9924%
(4) 99.9924%
Answer: 4
15. Match
the 5 CMM Maturity levels/CMMI staged representations in List- I with
their characterizations in List-II:
List - I
(a) Initial
(b)
Repeatable
(c) Defined
(d) Managed
(e)
Optimizing
List - II
(i)
Processes are improved quantitatively and continually.
(ii) The
plan for a project comes from a template for plans.
(iii) The
plan uses processes that can be measured quantitatively.
(iv) There
may not exist a plan or it may be abandoned.
(v) There’s
a plan and people stick to it.
Code:
(a) (b) (c)
(d) (e)
(1) (iv) (v) (i)
(iii) (ii)
(2) (i) (ii) (iv) (v)
(iii)
(3) (v) (iv) (ii)
(iii) (i)
(4) (iv) (v) (ii)
(iii) (i)
Answer: 4
16. Coupling
is a measure of the strength of the interconnections between software modules. Which
of the following are correct statements with respect to module coupling?
P: Common
coupling occurs when one module controls the flow of another module by passing
it information on what to do.
Q: In data
coupling, the complete data structure is passed from one module to another through
parameters.
R: Stamp
coupling occurs when modules share a composite data structure and use only parts
of it.
Code:
(1) P and Q
only
(2) P and R
only
(3) Q and R
only
(4) All of
P, Q and R
Answer: 3
17. A
software design pattern often used to restrict access to an object is:
(1) adapter
(2)
decorator
(3)
delegation
(4) proxy
Answer: 4
18. Reasons
to re-engineer a software include :
P: Allow
legacy software to quickly adapt to the changing requirements
Q: Upgrade
to newer technologies/platforms/paradigm (for example, object-oriented)
R: Improve
software maintainability
S: Allow
change in the functionality and architecture of the software
Code:
(1) P, R and
S only
(2) P and R
only
(3) P, Q and
S only
(4) P, Q and
R only
Answer: 4
19. Which
of the following is not a key strategy followed by the clean room approach to
software development?
(1) Formal
specification
(2) Dynamic
verification
(3)
Incremental development
(4)
Statistical testing of the system
Answer: 2
20. Which
of the following statements is/are True?
P:
Refactoring is the process of changing a software system in such a way that it
does not alter the external behaviour of the code yet improves the internal
architecture.
Q: An
example of refactoring is adding new features to satisfy a customer requirement
discovered after a project is shipped.
Code:
(1) P only
(2) Q only
(3) Both P
and Q
(4) Neither
P nor Q
Answer: 1
Pages 1 2 3 4 5
0 Comments