Programmer
Programmer
19(~) (2)
- -- - - -- .--~ -
-2.- An expression ooritains relational, assigpment, and arithmetic operators. 1n the abs.ence
-ofparenthesesi the order of evaluation Will-be:
A) Assignment, re'latjonal, arithmefa~
~)· Arithmetic, rela,_tionaj, a§Sigrunent
C) Relational; arithmetic, assignment
DJ As&igrmi.ent anthmetic~J:~lational
4.. In a file ~oritai~ng.th~ line '~I ,am a bo,.y\r\n" then Qnr.eadmg this.line into the,·an:~y stF
tJSJb.:g fget~O-·'Wh~t wil,1sj'.r contain?
Ai ''I am a boy\t\h\0"·
B) ''lam a boy\r\O"
C) ·"i am aoqy\n\O'; '
D) "Iam abo:t-"
5. main() {
inti =4,J = i;
Jtiiik (&i, D ;
piintf ( '' \ri% d ¾'d"; i,,j ) ;
'}
junk(.int*i,intj ),{ *i·=*i* *i;j *"j ;}
A) 162
13-) 16'4
C) 4 4
D) 42
19(.A) (J)
6. intmainO
{
•
inti;
int a[ ] = {2, 4, 6, 8, 10};.
ahange (~. 5);
for (i=0; i<=4; i++)
printf("%d, '',,a,[i])i
return 0;.
}
void chan~e(int *b, intn)
{
inti;
for(i = O; i <n; i++)
*(b+l) = *(b+i)+5;
}
A) 7, 9, 11, 13, 15
B) 2, 15, 6, 8,, 10
G) 24 ,6810
D) 3,1, -1,-3,-5
19(A)
A;· •
8. What will l?e the 01,1tput 9fthe followin_g G c0.de't
#im~lude <stdio.h>
int.main~)
{
iht i = 97 = *p' = &i·
• ~ - , J ' ~
fo~(~i).;
printf('.'%d '', *p);
}
vold foo{fut ~pj
r
intj =2;t
p=&J;.
pr.intf('-'%4 ",,*pJ;
}'
A), 2 97
B) 22
CJ Compile tit;ne err0r
D) $egmentation .faultlcude cr®h
I
14. In Which ofthe folfowillg is a si.ngfe erttifY i:nstance· of one tytre·'relateo to many entity
.instai:rt es of anothertype?
A) One-to.:One Relationship.
B). ◊n~:.t0~Many,Relationship:
GJ Many-to-Many Relationship
D) CJompo~ite,Il~lati~nship
15. What is ~·snapshorofthe data in the database at a given inst.ant time called?
A) Dafa base instance
n, Database scheme
€) Database snap
D) Snap of database
16. .I n relational DatabaSe schemas, the transition constraints are also known as
A) Static Gonstraints
B) Dynamic Constraints
C) lmpliGit G0hstraints
D) Explicit constraints
19. The-abiUfy to query data, as well as·.insert_, delete, and alter tuples, is off~red by _ _ _
A) TCL{Transaction Coritr0lL~guage)
B') DCL (Data €ontrol Langt1age)
C) DDL (Dara Defiuitien b~gt14geJ
D) DML (Dara Manipulatipn Lan~~e)
21. When we update anY'ttlple ir1 the r~Jatien whl.9hA'uthorizatitm bh a relation allows a user
to_?
A) $elect authorization
B) Update authorization
C) Grantauthorizatien
D) • Define authorization
24. .Ori a system with 2a4 bytes-ofm:emocy and"fixed partitions, all oIsi2:e 65,536.Qytes what
is the minimum number G>f bits neeaee:lin an ~ntry in tp.e pl'OCess table t;_Q re~ord the
partition to which a pro<:-es~ has l:>.e~n allcoated?
A) 2 16 B) 2 8
C) 24 D) '232
25. A sequential access file has fixed size 15-byte records. Assuming the first rec.ord is
record 1, the first byte of record 5 will be at what logical location?
A). 65 B-), 69
C) 67 D) 61
19(A)
t
26. Op a system using a disk caclle, the mean acc.ess time is dependenron the m·ean cache
acces:s tir,ne, the i;nean.disk acGess time, and the bit rate. For ~e fellowing, what is the
mean access ti.me?
a) Cache: l ms; disk:100 ms; hit rate:25%
b) Cacbe: l ms-; disk:100 ms; hit rate:50%
A) a=75.25,. b=50.50
B) ~=70.25, b=5§.50.
C) a=75.25, b=SS.50
D) a=7tl.25, b=5Q.5o·
27. ___ are used to keep track ofboth real and virtual memory.
A) I/O tables
B) Memory tables
·Q) File tables
D) Process tables
11) 2h
. C) 2h+2 - I
D) 2h-tl
39. S.uppos-e w<th avean O(n) time algorithm that finds the median ofan unsorted_array. Now
consider a Quick$0rt implementation whete we first find the median usiirg'the above
algorithm, then mse the median as a piv:ot. W}latwiU be the worst-case time compiexity
ofthis modified QuickSort?
A) O(n"2 Logn)
B) O(n"2)
C) O(nLognLogn)
D) O(nLogn) .
40. Why is the ll1$eftion sort most efficient wlien the original data are almost s.orted in
order?
A) wh.enthe sorted portion of the array, has to move any elements at all.
B) when its inserting elements into the sorted portion of the array,- it barely has to
move any elements at all.
C) BothAandB
D) None of these
19(A) [I>.T.O.
:41. Stippose a circular.queue ofca:pacri~ (n -1 )'elements-is imptentelitedwith an ~Y ofn
.elements. Assume thattlie -ins'ettiort and deletion·bperations.are carrie<il'ot1t using){EA.R •
:and FRQNJ' as arra-y irtdex_variable"s; respeoti11,elr. lnitially, REAR.= FlldNT ~n. The.
coaditions t@ detect·que_u e"Jull ,and q.ueu:e,;e,mpty ·are •
' '
j\) F1;1ll~ 'OPSaE-+1.)mo.d n = FR0NJ;';.empty": REAR FRONT
~) P-ull: (REAR+l) mod :n ==E'RONT; empty: {FR.ONT+ l.J.n;iod.n - -REM -,
&) Full: REAR= FR:ON1',. emp~: (_JffiAf.l+lJmodtY=--FROOT
D) .fµll:/(FRQN'.I'+t) m-otln= RE)\R, empty:'l;$AR = f}lQ1',iT
'9. • •
A progi;am'P:r~ads in ~.OP int~ger~,in, th~ ,rapge [O.1 {OOJ ~pre~.ehp.ng tb-~ scores of S.Ql)
0
stjJden,ts:.It fhs:)i Nrinij'the ft:eq11,1n~y l'>feagp .sc,or~ ~pov~·50: \Watwould ~ t{ie besfwa.y
for P to (tore the ft~qvencies?
A) .An array of'50munbers·
B) Aft:ap:a.}' of 10() ndhib0r"s<
P,) . An·array of §.QQ numbers
D) A dyn~call,y ~Jioc~teds~ay b,f550 n.tunbefs
Consider an impl~m:entati'on ~r:an, ·uns()rted ,singly limk~d l ist. :SueP,,0S,e- b has its
repres-emtition with·a ;head p.:ointer Quly, Giv~n~;~-repre:se]1taijop~·wbich oftlre fdllow.fug
operation gau be.i;mp1,em:ented in ort) (ll;Ili'? -·- -
9 ·rnsertron a:t the front .o fthe linke-dlist
n, lti~erlie)). ~t the end of'thedi.rik:e;d li'sf
:rrp· Deletion oJ the rr~nt node of.the,. linlq:~d list
TV) Deletion of the last node oftlfe.lmked list
A) landII
B) r-andm
C) J, Il·an~IU.
D) l ~IlahdlV
i9fA)
i
46.. In a dynarr11e initializatfon, th~ initial v~ue qf an ob}~ct n:i~")rB'e pre-1/_i<ied clUI'lng
- - -time.
A) Co~pik
B) . Run
<:'.:) ·Bf)thA&:B
D) None
48. mC-++ does n0t pepnitan int v.u~e to be a,ut9matio.a lly COI)Veft~d to•-an.-'-.--__value..
A) Cli;tS~
B) Float
C) Enµm
~) lorigiht
. 50., llfemechaci.smofderivinga0las:sf11@manother:derivedclass.is,kmnvn.as _ __
A) Hiertu:chlcal inheritance
B) . Multilevel inheritance,:
CJ Singl~,11:lherit;ano.~
_D) Hybriil.iOMritance
51. The first argument argc _represents the number ofarguments in the commruid line known
as - - -
A) .argument vector
B) command-line arguments
C) ·counter
D) argument counter
53. When we use the sam~ functionj~ both the base and derived classes, the function in b~e
class is declated virtual using the keyword _ _ _ preceding its normal declaration.
A) virtual
B) pointer
·c). C.int
D) Static
-~
,~..
'~
54. The im~ortant appijcation of~e pointer is to return the object it points to, the following
invoke objectstatementwill be____ -:
A) returnQ; •I
l
B) return *this;
'
C) return(this) ·,
D) return &tbis;
55. The _ _ _ sets the specified flags a;nd leaves othe~ t,m.changed.
A) setf()
B) setwQ
C) flag()
D) precision() ' I
19(A) (14)
56. Arqmge the following a,ctivities to form a.gep.eral software engineering P!bce$s model.
1. Map.ufacture
2. Majntidn
3. Test
4. Install"
5. • Design
6. S~cification
A) 6, 5~1, }, 4, 2
B) 1, 2, 4, 3, 6, 5
C) "6, 1,.4, 2, 3, 5
D) l,, o"·s, 2., 3, 4.
58.. According to: ISO 9001, inspection and testing coqie uqd~r which management
responsibility?
A) Process control
B) Document control
• C) Control ofnonconforming products
D) Servicing
62. -A software company needs to develop a project t;hat is,estimated as 1000 function points
and is planning to use C++ as the programming language whos~ approximate lines of
codes per function point are accepted as 50. Considering a= l .4 as.the multiplicative
factor, d=0.33 as an expone1~tial factor for the basic COCOMO duration equation,
approximately how long does tr.e project take to complete?
A) 11.2 months •
B) 12.2 months
C) 13.2 months
D) 10.2 months
63. Assume the following r~garding the development of.a software system P: estimated
lines ofcodes ofp:33,480 LOC, Average productivity for p:620 LOC perperson month,
number of software developers:6, Average salary of a software developer:50,000 per
month. If E, D, and Care estimated development effott (in person months), estimated
development time (in months), and estimated development cost (in lac) respectively,
then E, D, and Care_ __ _
A) 48.,8,2
B) 54,9,27
C) 60,10,30
D) 42,7,21
64. A legacy software system has 940 mod~es. The latest release required that 90 of these
modules were removed. Compute the software maturity index for the system.
A) 0.849
B) 0.524
C) 0.725·
D) 0.923
65. The algorithm often took too long to converge the count to infinity problem, and it was
replaced by an entire1y new algorithm ~ailed_ _ __
A) Packets
B) Link state routing
C) Distance vector routing.
D) IPV6
19(A) (16)
66. DNS is defined in
A) RFCs 1034 & 1035
B) RFCs 1036 & 1037
C) RFCs 1086 & 1087
D) RFCs 1038 & 1039
67. The first class ofencryption algorithm used same key for decryption & encryption called_ · _
A) Symmetric -Key Algorithm
B) Assymmetric -Key Algorithm
C) Cipher Key Algorithm
D) AandB
68. The cipher was widely adopted by the industry for use in security products called__
A) DES-Data Encryption Standard
B) AES-Advanced Encryption Standard
C) Both DES &AES
D) None
77. Which define the interface to the stack independently ofthe details ofthe implementation.
A) PushO
B) PopO
C) PushO and PopQ
D) Noneoftheabove
79. The easiest way to create a thread is to create a class that implements the _ _ _
interface.
A) Runnable
B) Thread
C) StartO
D) MainO . '
.:
80. The four abstract classes built in Java stream-based 1/0 is
A) InputStream, OutputStream, Reader, Writer
B) Reader, Writer, File, Accept
C) lnput:file, Outputfile, exit,main
D) Noneoftheabove
82. The _ __ statement 1s optional, if we omit the execution will continue on the next
case. .
A) Break
B) Continue
.C) Switch
D) Default
~
83. _ _ _ _ is both a TCP/IP application and a.protocol for connecting a local computer • j
to a remote computer.
A) 1ELNEf
B) FIP
C) TCP
D) UDP
84. - --.--- -uses IP to deliver packets to the upper layer applications and provides a
reliaple·stream of data am¢mg computers on th~ network.
A) TEI.NET
B) HI1P
C) FIP
D) TCP/IP
86. In Http service by default uses port _ _ _ the gopher service uses port
A) 70,0
B) 50,80
C) 80,70
D) 10,70
19(A) (20)
87. The Scheme for ft).is pathn~e type ofURL is _ __
A) http
B) SMTP
C) F1P
D) URLs
88. In orderto keep all the files straight, each person is given a specific directory called
A) URL
B) Page directory
C) ffom.e directory
D) Event Directory
90.. Whicll servers run to allow them to respond to client requestfor information is
A) TIS •
B) Web clients
C) Web server
D) Browser
92. ~e architec~e that provides the foundation for managed execution in the .NET
Framework is known as - - - -
A) Common.Execution System (CES)
B) Common type system (CTS)
C) .NET Execution
D) Common Run Enivronme.tit (CRE)
93. Which of the following ex(ension is used to represent the Windoils Scripting source
file?
A) .WSF
B) .VBS
C) .nets
D) .SF
19(A) (21) . [P.T.O.
94. A procedure-level variable i$ declare.d using _ _ _ keyword.
.. ·.. A) Private ,
B) . Public
C) Dim
D) Static
, , ... . •95. The Visual Basic .~T language defines _ fundamental data types
A) 10
B) 12
.C) 7
D). 8
96. Unary Plus and Unary Minus can also be considered___operators in VB.
A) Aritlimetic
B) Relational
C) • Assignment
D) Concatenation
. 19(A) (22)
ROUGH WORK
19(A) [P.T.O.
I
ROUGH WORK
'
19{A) (24)