You are on page 1of 88

Assertions are conditions which are true at the point of execution

A
Always
B
Sometimes
C
Many times
D
No time
Answer A
___________________________________________________________________________________________
Top down approach is used for
A
Development
B
Identification of faults
C
Testing and validation
D
Reverse engineering
Answer A
___________________________________________________________________________________________
The first item defined for a new system is its
A
Storage
B
Outputs
C
Inputs
D
Processing
Answer B
___________________________________________________________________________________________
Software engineering primarily aims on
A
reliable software
B
cost effective software
C
reliable and cost effective software
D
none of the above
Answer C
___________________________________________________________________________________________
Output comparators are used in
A
Static testing of single module
B
Dynamic testing of single module
C
Static testing of single and multiple module
D
Dynamic testing of single and multiple module
Answer D
___________________________________________________________________________________________
The feature of the object oriented paradigm which helps code reuse is
A
Object
B
Class
C
Inheritance
D
Aggregation
Answer C
___________________________________________________________________________________________

A key concept of quality control is that all work products


A
Are delivered on time and under budget
B
Have complete documentation
C
Have measurable specification for process outputs
D
Are thoroughly tested before delivery to the customer
Answer C
___________________________________________________________________________________________
What are the three generic phases of software engineering?
A
Definition, development, support
B
What, how, where
C
Programming, debugging, maintenance
D
Analysis, design, testing
Answer A
___________________________________________________________________________________________
Coupling and cohesion can be represented using a
A
Cause-effect graph
B
Dependence matrix
C
Structure chart
D
SRS
Answer B
___________________________________________________________________________________________
Software feasibility is based on which of the following
A Business and marketing concerns
B Scope, constraints, market
C Technology, finance, time, resources
D Technical prowess of the developers
Answer C
Which one of the items listed below is not one of the software engineering layers ?
A
Process
B
Manufacturing
C
Method
D
Tools
Answer B
___________________________________________________________________________________________
FP-based estimation techniques require problem decomposition based on
A
Information domain values
B
Project schedule
C
Software functions
D
Process activities
Answer C
___________________________________________________________________________________________

Software deteriorates rather than wears out because


A Software suffers from exposure to hostile environments
B
Defects are more likely to arise after software has been used often
C
Multiple change requests introduce errors in component interactions
D Software spare parts become harder to order
Answer B
___________________________________________________________________________________________
The worst type of coupling is
A
Data coupling
B
Control coupling
C
Stamp coupling
D
Content coupling
Answer D
___________________________________________________________________________________________
Function point metric of a software also depends on the
A
Number of function needed
B
Number of final users of the software
C
Number of external inputs and outputs
D
Time required for one set of output from a set of input data
Answer C
___________________________________________________________________________________________
Which of the following is not an attribute of software engineering
A
Efficiency
B
Scalability
C
Dependability
D
Usability
Answer C
___________________________________________________________________________________________
Which of these is not a characteristic of Personal Software Process?
A Emphasizes personal measurement of work product
B
Practitioner requires careful supervision by the project manager
C
Individual practitioner is responsible for estimating and scheduling
D Practitioner is empowered to control quality of software work products
Answer B
___________________________________________________________________________________________

Recorded software attributes can be used in the following endeavours :


(i) Cost and schedule estimates.
(ii) Software product reliability predictions.
(iii) Managing the development process.
(iv) No where
A
(i) (ii) (iv)
B
(ii) (iii) (iv)
C
(i) (ii) (iii)
D
(i) (ii) (iii) (iv)
Answer C
___________________________________________________________________________________________
A feasibility study should focus on
A
Technical feasibility
B
Economic feasibility
C
Operational feasibilty
D
All of these
Answer D
___________________________________________________________________________________________
Which is not a size metric?
A LOC
B Function count
C Program length
D Cyclomatic complexity
Answer D
The level at which the software uses scarce resources is
A
Reliability
B
Efficiency
C
Portability
D
All of the above
Answer B
___________________________________________________________________________________________
If the objects focus on the problem domain, then we are concerned with
A
Object Oriented Analysis
B
Object Oriented Design
C
Object Oriented Analysis & Design
D
None of the above
Answer A
___________________________________________________________________________________________

Which one of the following ISO standard is used for software process?
A
ISO 9000
B
ISO 9001
C
ISO 9003
D
ISO 9000-3
Answer D
___________________________________________________________________________________________
Software Engineering is a discipline that integrates _________ for the development of computer software.
A
Process
B
Methods
C
Tools
D
All
Answer D
___________________________________________________________________________________________
What is the first stage in program development ?
A
Specification and design
B
System Analysis
C
Testing
D
None of the above
Answer B
___________________________________________________________________________________________
Pseudocode can replace
A
Flowcharts
B
Structure charts
C
Decision tables
D
Cause-effect graphs
Answer A
___________________________________________________________________________________________
Modules X and Y operate on the same input and output data, then the cohesion is
A
Sequential
B
Communicational
C
Procedural
D
Logical
Answer B
___________________________________________________________________________________________
Main aim of software engineering is to produce
A
Program
B
Software
C
Within budget
D
Software within budget in the given schedule
Answer D
___________________________________________________________________________________________

IEEE 830-1993 is a IEEE recommended standard for


A
Software requirement specification
B
Software design
C
Testing
D
Both (A) and (B)
Answer A
___________________________________________________________________________________________
CASE Tool is
A Computer Aided Software Engineering
B Component Aided Software Engineering
C Constructive Aided Software Engineering
D Computer Analysis Software Engineering
Answer A
Key process areas of CMM level 4 are also classified by a process which is
A
CMM level 2
B
CMM level 3
C
CMM level 5
D
All of the above
Answer C
___________________________________________________________________________________________
Applications-software
A
is used to control the operating system
B
includes programs designed to help programmers
C
performs a specific task for computer users
D
all of the above
Answer C
___________________________________________________________________________________________
User interface design involves following issues
A
Error message handling
B
System response time
C
Command labelling
D
All of these
Answer D
___________________________________________________________________________________________
Which of the items listed below is not one of the software engineering layers?
A
Process
B
Tools
C
Methods
D
Manufacturing
Answer D
___________________________________________________________________________________________

Which of the following are advantages of using LOC (lines of code) as a size oriented metric?
A
LOC is easily computed
B
LOC is a language dependent measure
C
LOC is a language independent measure
D
LOC can be computed before a design is completed
Answer A
___________________________________________________________________________________________
FAST stands for
A
Functional Application Specification Technique
B
Fast Application Specification Technique
C
Facilitated Application Specification Technique
D
None of the above
Answer C
___________________________________________________________________________________________
An object encapsulates
A
Data
B
Behaviour
C
State
D
Both Data and behaviour
Answer D
___________________________________________________________________________________________
Which of the following statements is true
A
Abstract data types are the same as classes
B
Abstract data types do not allow inheritance
C
Classes cannot inherit from the same base class
D
Object have state and behavior
Answer B
___________________________________________________________________________________________
The ISO quality assurance standard that applies to software engineering is
A
ISO 9000
B
ISO 9001
C
ISO 9002
D
ISO 9003
Answer B
___________________________________________________________________________________________
The main activity of the design phase of the system life cycle is to
A Replace the old system with new one
B Develop and test the new system
C Understand the current system
D Propose alternatives to the current system
Answer D

In the light of software engineering software consists of


A
In the light of software engineering software consists of
B
Data
C
Documentation
D
All of the above
Answer D
___________________________________________________________________________________________
The desired level of coupling is
A
No coupling
B
Control coupling
C
Common coupling
D
Data coupling
Answer D
___________________________________________________________________________________________
The problem that threatens the success of a project but which has not yet happened is a
A
Bug
B
Error
C
Risk
D
Failure
Answer C
___________________________________________________________________________________________
The tools that support different stages of software development life cycle are called
A
CASE tools
B
CAME tools
C
CAQE tools
D
CARE tools
Answer A
___________________________________________________________________________________________
The incremental model of software development is
A
A reasonable approach when requirements are well defined
B
A good approach when a working core product is required quickly
C
The best approach to use for projects with large development teams
D
A revolutionary model that is not used for commercial products
Answer B
___________________________________________________________________________________________
Waterfall model is a
A
Linear model
B
Iterative model
C
Rapid model
D
Interactive model
Answer A
___________________________________________________________________________________________

Which leads to blocking states in which some project team members must wait for the other members of
the team to complete dependent tasks?
A
Ad hoc approach of prototyping
B
Iterative nature of spiral model
C
Linear nature of classic life cycle
D
None of the above
Answer C
___________________________________________________________________________________________
Many causes of the software crisis can be traced to mythology based on
A
Management Myths
B
Customer Myths
C
Practitioner Myths
D
All of the above
Answer D
___________________________________________________________________________________________
Prototyping is used to
A
test the software as an end product
B
expand design details
C
refine and establish requirements gathering
D
None of the above
Answer C
___________________________________________________________________________________________
The most important feature of spiral model is
A Requirement analysis
B Risk management
C Quality management
D Configuration management
Answer B
Which phase is not available in software life cycle?
A
Coding
B
Testing
C
Maintenance
D
Abstraction
Answer D
___________________________________________________________________________________________
Which model is popular for students small projects ?
A
Waterfall Model
B
Spiral Model
C
Quick and Fix model
D
Prototyping Model
Answer A
___________________________________________________________________________________________

Which is the most important feature of spiral model?


A
Quality management
B
Risk management
C
Performance management
D
Efficiency management
Answer B
___________________________________________________________________________________________
Evolutionary software process models
A
Are iterative in nature
B
Can easily accommodate product requirements changes
C
Do not generally produce throw away systems
D
All of the above
Answer D
___________________________________________________________________________________________
Waterfall model is also called
A
Classical Life Cycle model
B
Customer model
C
RAD
D
Spiral model
Answer A
___________________________________________________________________________________________
To which phase of SDLC, in file conversion related?
A
System design
B
System development
C
System analysis
D
System implementation
Answer D
___________________________________________________________________________________________
The model in which the requirements are implemented by category is
A
Evolutionary Development Model
B
Waterfall Model
C
Prototyping
D
Iterative Enhancement Model
Answer A
___________________________________________________________________________________________
For a data entry project for office staff who have never used computers before (user interface and userfriendliness are extremely important), one will use
A
Spiral model
B
Component based model
C
Prototyping
D
Waterfall model
Answer C
___________________________________________________________________________________________

What is an incremental software process model that emphasize an extremely short development cycle?
A
RAD
B
Prototyping
C
Spiral
D
None of these
Answer A
___________________________________________________________________________________________
Which of these terms is a level name in the Capability Maturity Model?
A
Ad hoc
B
Repeatable
C
Reusable
D
Organized
Answer C
For a well understood data processing application it is best to use
A
The waterfall model
B
Prototyping model
C
The evolutionary model
D
The spiral model
Answer A
___________________________________________________________________________________________
A major defect in waterfall model in software development is that
A
The documentation is difficult
B
A blunder at ant stage can be disastrous
C
A trial version is available at the end of the project
D
The maintenance of the software is difficult
Answer C
___________________________________________________________________________________________
A COCOMO model is
A
Common Cost Estimation Model
B
Constructive Cost Estimation Model
C
Complete Cost Estimation Model
D
Comprehensive Cost Estimation Model
Answer B
___________________________________________________________________________________________
The model remains operative until the software is retired
A
Waterfall
B
Incremental
C
Spiral
D
None of these
Answer C
___________________________________________________________________________________________

Spiral model begins with


A
Design
B
Risk analysis
C
Coding
D
Customer communication
Answer D
___________________________________________________________________________________________
Which model is simplest model in Software Development ?
A
Waterfall model
B
Prototyping
C
Iterative
D
None of these
Answer A
___________________________________________________________________________________________
Prototyping is preferred by
A
Customer
B
Developer
C
No one
D
Both
Answer B
___________________________________________________________________________________________
Process models are described as agile because they
A
Eliminate the need for cumbersome documentation
B
Emphasize maneuverability and adaptability
C
Do not waste development time on planning activities
D
Make extensive use of prototype creation
Answer B
___________________________________________________________________________________________
Waterfall model is not suitable for ?
A
Small Projects
B
Complex Projects
C
Accommodating change
D
None of Above
Answer C
___________________________________________________________________________________________
The formal methods model of software development makes use of mathematical methods to
A Define the specification for computer based systems
B Develop defect free computer based systems
C Verify the correctness of computer based systems
D All of the above
Answer D

In the spiral model risk analysis is performed


A
In the first loop
B
In the first and second loop
C
In every loop
D
Before using spiral model
Answer C
___________________________________________________________________________________________
An SRS
A
establishes the basis for agreement between client and the
supplier.
B
provides a reference for validation of the final product
C
is a prerequisite to high quality software
D
all of the above.
Answer D
___________________________________________________________________________________________
The prototyping model of software development is
A A reasonable approach when requirements are well defined
B
A useful approach when a customer cannot define requirements clearly
C
The best approach to use for projects with large development teams
D A risky model that rarely produces a meaningful product
Answer B
___________________________________________________________________________________________
The model that assumes that effort and development time are functions of product size alone is
A
Basic COCOMO model
B
Intermediate COCOMO model
C
Detailed COCOMO model
D
All the three COCOMO models
Answer A
___________________________________________________________________________________________
The component based development model is
A
Only appropriate for computer hardware design
B
Not able to support the development of reusable components
C
Works best when object technologies are available for support
D
Not cost effective by known quantifiable software metrics
Answer C
___________________________________________________________________________________________
The COCOMO model was introduced in the book title Software Engineering Economics authored by
A
Abraham Silberschatz
B
Barry Boehm
C
C.J. Date
D
D.E. Knuth
Answer B
___________________________________________________________________________________________

The spiral model of software development


A
Ends with the delivery of the software product
B
Is more chaotic than the incremental model
C
Includes project risks evaluation during each iteration
D
All of the above
Answer C
___________________________________________________________________________________________
Prototyping model begin with
A
Test prototype
B
Coding
C
Requirement gathering
D
None of the above
Answer B
___________________________________________________________________________________________
The concurrent development model is
A
Another name for the rapid application development model
B
Often used for the development of client/server applications
C
Only used for development of parallel or distributed systems
D
Used whenever a large number of change requests are anticipated
Answer B
___________________________________________________________________________________________
LOC measure is a
A Size oriented metrics
B Function oriented metrics
C Both a and b
D None of the above
Answer A
Which of these are the 5 generic software engineering framework activities ?
A Communication, planning, modelling, construction, deployment
B Communication, risk management, measurement, production, reviewing
C Analysis, designing, programming, Debugging, maintenance
D Analysis, planning, designing, programming, testing
Answer A
___________________________________________________________________________________________
Modifying the software to match changes in the ever changing environment is called
A
Adaptive maintenance
B
Corrective maintenance
C
Perfective maintenance
D
Preventive maintenance
Answer A
___________________________________________________________________________________________

Which is not a step of requirement engineering?


A
Requirements elicitation
B
Requirements analysis
C
Requirements design
D
Requirements documentation
Answer C
___________________________________________________________________________________________
The Warnier diagram enables analyst
A
to represent information hierarchy in a compact manner
B
to further identify requirement
C
to estimate the total cost involved
D
None of the above
Answer A
___________________________________________________________________________________________
Requirements can be refined using
A
The waterfall model
B
Prototyping model
C
The evolutionary model
D
The spiral model
Answer B
___________________________________________________________________________________________
During which phase ,the requirement analysis is performed?
A
System investigation phase
B
System development phase
C
System analysis phase
D
None of the above
Answer C
___________________________________________________________________________________________
The system specification is the first deliverable in the computer system engineering process which does not
include
A The system specification is the first deliverable in the computer system engineering process which does not
include
B Cost
C Schedule
D Technical Analysis
Answer A
___________________________________________________________________________________________

SRD stands for


A
Software requirements definition
B
Structured requirements definition
C
Software requirements diagram
D
Structured requirements diagram
Answer B
___________________________________________________________________________________________
If every requirement can be checked by a cost-effective process, then the SRS is
A
Verifiable
B
Traceable
C
Modifiable
D
Complete
Answer A
___________________________________________________________________________________________
Structured charts are a product of
A Requirements gathering
B Requirements analysis
C Design
D Coding
Answer C
If every requirement stated in the Software Requirement Specification (SRS) has only one interpretation,
SRS is said to be
A
Correct
B
Unambiguous
C
Consistent
D
Verifiable
Answer B
___________________________________________________________________________________________
If a program in its functioning has not met user requirements is some way, then it is
A
An error
B
A failure
C
A fault
D
A defect
Answer D
___________________________________________________________________________________________
Capability Maturity Model is meant for
A
Product
B
Process
C
Product and Process
D
None of the above
Answer B
___________________________________________________________________________________________

Which design model is analogous to the detailed drawings of the access points and external utilities for a
house?
A
Architectural design
B
Component-level design
C
Data design
D
Interface design
Answer D
___________________________________________________________________________________________
Which of the following models can be used to represent the architectural design of a piece of software?
A
Dynamic models
B
Functional models
C
Structural models
D
All of these
Answer D
___________________________________________________________________________________________
Design phase will usually be
A
top-down
B
bottom-up
C
random
D
centre fringing
Answer A
___________________________________________________________________________________________
In a function oriented design, we
A
minimize cohesion and maximize coupling
B
maximize cohesion and minimize coupling
C
maximize cohesion and maximize coupling
D
minimize cohesion and minimize coupling
Answer B
___________________________________________________________________________________________
Content design is conducted by
A
Copywriters and graphic designer
B
Web engineers
C
Both a and b
D
None of the above
Answer C
___________________________________________________________________________________________
Top-down design does not require
A
step-wise refinement
B
loop invariants
C
flow charting
D
modularity
Answer B
___________________________________________________________________________________________

Design phase will usually be


A Top down
B Bottom up
C Random
D Centre fringing
Answer A
Which of the following is not a characteristics common to all design methods?
A
Configuration management
B
Functional component
C
Notation quality assessment
D
Guidelines refinement heuristics
Answer A
___________________________________________________________________________________________
The importance of software design can be summarized in a single word
A
Accuracy
B
Complexity
C
Efficiency
D
Quality
Answer D
___________________________________________________________________________________________
In object oriented design of software , objects have
A
Attributes and names only
B
Operations and names only
C
Attributes, name and operations
D
None of above
Answer C
___________________________________________________________________________________________
Which design is analogous to the floor plan of a house?
A
Architectural design
B
Component-level design
C
Data design
D
Interface design
Answer A
___________________________________________________________________________________________
Data structure suitable for the application is discussed in
A
Data design
B
Architectural design
C
Procedural design
D
Interface design
Answer A
___________________________________________________________________________________________

The approach to software testing is to design test cases to


A
Break the software
B
Understand the software
C
Analyze the design of sub processes in the software
D
Analyze the output of the software
Answer D
___________________________________________________________________________________________
Alpha and Beta Testing are forms of
A
Acceptance testing
B
Integration testing
C
System Testing
D
Unit testing
Answer A
___________________________________________________________________________________________
Black refers in the Black-box testing means
A
Characters of the movie Black
B
I / O is hidden
C
Design is hidden
D
Users are hidden
Answer C
___________________________________________________________________________________________
Regression testing is primarily related to
A
Functional testing
B
Data flow testing
C
Development testing
D
Maintenance testing
Answer D
___________________________________________________________________________________________
White box testing, a software testing technique is sometimes called
A
Basic path
B
Graph Testing
C
Dataflow
D
Glass box testing
Answer D
While unit testing a module, it is found that for a set of test data, maximum 90% of the code alone were
tested with a probability of success 0.9. The reliability of the module is
A
Atleast greater than 0.9
B
Equal to 0.9
C
Atmost 0.81
D
Atleast 1/0.81
Answer C
___________________________________________________________________________________________

What are the testing levels?


A
Unit testing
B
Integration testing
C
System testing and acceptance
D
All of the above
Answer D
___________________________________________________________________________________________
Function testing is known as
A
Structural testing
B
Behavior testing
C
Regression testing
D
None of these
Answer B
___________________________________________________________________________________________
The main purpose of integration testing is to find
A
Design errors
B
Analysis errors
C
Procedure errors
D
Interface errors
Answer D
___________________________________________________________________________________________
Which of the following graph theoretic concept will be useful in software testing?
A
Cyclomatic number
B
Hamiltonian circuit
C
Eulerian cycle
D
None of the above
Answer A
___________________________________________________________________________________________
A non functional software testing done to check if the user interface is easy to use and understand
A
Usability testing
B
Security testing
C
Unit testing
D
Black box testing
Answer A
___________________________________________________________________________________________
One of the fault base testing techniques is
A
Unit testing
B
Beta testing
C
Stress testing
D
Mutation testing
Answer D
___________________________________________________________________________________________

A fault simulation testing technique is


A
Mutation testing
B
Stress testing
C
Black box testing
D
White box testing
Answer A
___________________________________________________________________________________________
The testing that focuses on the variables is called
A
Black box testing
B
White box testing
C
Data variable testing
D
Data flow testing
Answer A
___________________________________________________________________________________________
Which of the following testing methods is normally used as the acceptance test for a software system?
A
Regression testing
B
Integration testing
C
Unit testing
D
Functional testing
Answer D

OPERATING SYSTEM

Multiprogramming systems
A
Are easier to develop than single programming systems
B
Execute each job faster
C
Execute more jobs in the same time period
D
Are used only one large mainframe computers
Answer C
___________________________________________________________________________________________
The operating system creates _____ from the physical computer
A
Virtual space
B
Virtual computers
C
Virtual device
D
None
Answer B
___________________________________________________________________________________________
The primary purpose of an operating system is
A
To make the most efficient use of the computer hardware
B
To allow people to use the computer
C
To keep systems programmers employed
D
To make computers easier to use
Answer A
___________________________________________________________________________________________
Overlay is
A A part of Operating System
B A specific memory location
C A single contiguous memory that was used in the olden days for running large programs by swapping
D Overloading the system with many user files
Answer C
___________________________________________________________________________________________
Link encryption
A
Is more secure than end to end encryption
B
Is less secure than end to end encryption
C
Cannot be used in a large network
D
Is used only detect errors
Answer B
___________________________________________________________________________________________
Which is built directly on the hardware?
A
Computer Environment
B
Application Software
C
Operating System
D
Database System
Answer C
___________________________________________________________________________________________
An operating system
A
Is not required on large computers

C
D

Is always supplied with the BASIC


Consists of programs that help in the operation of computer
CPU does not perform the operation
Answer D
A
Data transfer
___________________________________________________________________________________________
B
Logic operation
C
Arithmetic operation
D
All of the above
Answer D
________________________________________________________________
___________________________
An example of an operating system is _______________
A
Windows XP
B
UNIX or LINUX
C
MAC OS
D
All of the above
Answer D
________________________________________________________________
___________________________
Two basic two types of record access methods are
A
Sequential and random
B
Direct and immediate
C
Sequential and indexed
D
Online and real time
Answer A
________________________________________________________________
___________________________
A chip having 150 gates will be classified as
A
MSI
B
SSI
C
LSI
D
VLSI
Answer A
________________________________________________________________
___________________________
Which of the following Operating System does not implement multitasking
truly?
A
Windows 98
B
Windows NT
C
Windows XP
D
MS DOS
Answer D
________________________________________________________________
___________________________

Which of the following is an example of a spooled device?


A The terminal used to enter the input data for a program being executed.
B The secondary memory device in a virtual memory system.
C A line printer used to print the output of a number of jobs.
D None of the above.
Answer C
________________________________________________________________
___________________________
Which runs on computer hardware and serve as platform for other
software to run on?
A
Operating System
B
Application Software
C
System Software
D
All
Answer A
________________________________________________________________
___________________________
Execution of two or more programs by a single CPU is known as
A
Multiprocessing
B
Time sharing
C
Multiprogramming
D
None of the above
Answer C
________________________________________________________________
___________________________
A bootstrap is
A A memory device
B A device to support the computer
C A small initialisation program to start up a computer
D An error correction technique
Answer C
________________________________________________________________
___________________________
Memory on your computer where data is stored
temporarily is called __________.
A
RAM
B
ROM
C
BIOS
D
CPU
Answer A

______ is used in operating system to separate mechanism from policy


A
Single level implementation
B
Two level implementation
C
Multi level implementation
D
None
Answer B
___________________________________________________________________
________________________
Object modules generated by assembler that contains unresolved external
references are resolved for two or more object module by a/an
A
Operating system
B
Loader
C
Linker
D
Compiler
Answer C
___________________________________________________________________
________________________
Which is the first program run on a computer when the computer boots up?
A
System software
B
Operating system
C
System operations
D
None
Answer B
___________________________________________________________________
________________________
Object code is the output of ______.
A
Operating System
B
Compiler or Assembler
C
only Assembler
D
only Compiler
Answer B
___________________________________________________________________
________________________
WINDOWS is a _________ operating.
A
Real time
B
Multi-user
C
Preemptive
D
Non-preemptive
Answer C
___________________________________________________________________
________________________

The multiuser operating system, 20 requests are made to use a particular


resource per hour, on an average the probability that no request are made in
45 minutes is
A
e-15
B
e-5
C
1 e-5
D
1 e-10
Answer A
___________________________________________________________________
________________________
Fence register is used for
A
CPU protection
B
Memory protection
C
File protection
D
All of the above
Answer B
___________________________________________________________________
________________________
The operating system that reads and reacts in terms of actual time is
A
Batch system
B
Quick response system
C
Real time system
D
Time sharing system
Answer C
___________________________________________________________________
________________________
Dirty bit is used to show
A Page with corrupted data
B Wrong page in the memory
C Page that is modified after being loaded into cache memory
D Page that is less frequently accessed
Answer C
___________________________________________________________________
________________________
What is a shell ?
A It is a hardware component
B It is a command interpreter
C It is a part in compiler
D It is a tool in CPU scheduling
Answer B

Which is the layer of a computer system between the hardware and the user
program
A
Operating environment
B
Operating system
C
System environment
D
None
Answer B
______________________________________________________________________
_____________________
A page fault means that we referenced a page
A
Outside the memory boundaries
B
With an incorrect I/O request
C
That was not in secondary storage
D
That was not in main memory
Answer D
______________________________________________________________________
_____________________
Protection against computer viruses
A Prevention
B Practice of safe computing
C Purchasing unopened software from vendors
D Avoiding free or pirated copies from public sources
Answer D
______________________________________________________________________
_____________________
A relationship between processes such that each has some part (critical section)
which must not be executed while the critical section of another is being executed,
is known as
A
Semaphore
B
Mutual exclusion
C
Multiprogramming
D
Message passing
Answer B
______________________________________________________________________
_____________________
Which of the following information bits used by the various page replacement
policies indicates if the page has been called lately?
A
Locality bit
B
Status bit
C
Referenced bit
D
Modified bit
Answer C
______________________________________________________________________
_____________________

A sequence of instructions,in a computer language to get the desired result is


known as
A
Process
B
Program
C
Software
D
None of these
Answer A
______________________________________________________________________
_____________________
Which is not the state of the process ?
A
Blocked
B
Running
C
Ready
D
Privileged
Answer D
______________________________________________________________________
_____________________
A process executes the code
fork();
fork();
fork();
A
3
B
4
C
7
D
8
Answer C
______________________________________________________________________
_____________________
Given memory partitions of 100K, 500K, 200K, 300K and 600K (in order) and
processes of 212K, 417K, 112K, and 426K (in order), using the first-fit algorithm
in which partition would the process requiring 426K be placed?
A
100K
B
500K
C
200K
D
600K
Answer D
______________________________________________________________________
_____________________
The only transition that is initiated by the user process itself is
A
Block
B
Dispatch
C
Wake up
D
None of Above
Answer A

Round robin scheduling is essentially the preemptive version of ________


A
FIFO
B
Shortest job first
C
Shortest remaining
D
Longest time first
Answer A
________________________________________________________________________
___________________
The operating system of a computer serves as a software interface between the user
and
A
Software
B
Hardware
C
Processor
D
Compiler
Answer C
________________________________________________________________________
___________________
The mechanism that bring a page into memory only when it is needed is called
A
Segmentation
B
Fragmentation
C
Demand Paging
D
Page Replacement
Answer C
________________________________________________________________________
___________________
With a four programs in memory and with 80% average I/O wait, the CPU
utilization is?
A
60%
B
70%
C
90%
D
100%
Answer A
________________________________________________________________________
___________________
In time sharing operating system ,when the time slot given to a process is
completed ,the process goes from running state to the
A
Blocked state
B
Ready state
C
Suspended state
D
Terminated state
Answer B
________________________________________________________________________
___________________

Situations where two or more processes are reading or writing some shared datas
and the final result depends on who runs precisely when are called
A
Race conditions
B
Critical sections
C
Mutual exclusions
D
Message passing
Answer A
________________________________________________________________________
___________________
Switching the CPU to another Process requires to save state of the old process and
loading new process state is called as
A
Process Blocking
B
Context Switch
C
Time Sharing
D
None of the above
Answer B
________________________________________________________________________
___________________
A page fault
A is an error specific page.
B is an access to the page not currently in memory.
C occur when a page program occur in a page memory.
D
page used in the previous page reference.
Answer B
________________________________________________________________________
___________________
Cooperating processes can
A Only share a logical address space directly that is, both code and data
B Access concurrently to shared data may result in data consistency
C Either directly share a logical address space or be allowed to share data only through
files or messages
D None of these responses are correct
Answer C
________________________________________________________________________
___________________
A program is located in the smallest available hole in the memory
is _________
A
best fit
B
first bit
C
worst fit
D
buddy
Answer A

A program in execution is called


A
Process
B
Instruction
C
Procedure
D
Function
Answer A
__________________________________________________________________________
_________________
In the blocked state
A The processes waiting for I/O are found
B
The process which is running is found
C
The processes waiting for the processor are found
D None of the above
Answer A
__________________________________________________________________________
_________________
A process executes the code
fork();
fork();
fork();
The total number of child processes created is
A
3
B
4
C
7
D
8
Answer C
__________________________________________________________________________
_________________
Several processes access and manipulate the same data concurrently and the outcome
of the execution depends on the particular order in which the access takes place, is
called a(n) ____________________ .
A
Shared memory segments
B
Race condition
C
Entry section
D
Process synchronization
Answer B
__________________________________________________________________________
_________________

A thread
A Is a lightweight process where the context switching is low
B Is a lightweight process where the context switching is high
C Is used to speed up paging
D None of the above
Answer A
__________________________________________________________________________
_________________
Inter process communication
A
Is never necessary
B
Allows processors to synchronize
C
Is required for all processes
D
Is usually done via disk drives
Answer B
__________________________________________________________________________
_________________
In round robin CPU scheduling as time quantum is increased the average turn around
time
A
increases
B
decreases
C
remains constant
D
varies irregularly
Answer D
__________________________________________________________________________
_________________
Pre-emptive scheduling is the strategy of temporarily suspending a gunning process
A
before the CPU time slice expires
B
to allow starving processes to run
C
when it requests I/O
D
to avoid collision
Answer A
__________________________________________________________________________
_________________
Cascading termination refers to termination of all child processes before the parent
terminates
A
Normally
B
Abnormally
C
Normally or abnormally
D
None of these
Answer C
__________________________________________________________________________
_________________

A special software that is used to create a job queue is called


A
Drive
B
Spooler
C
Interpreter
D
Linkage editor
Answer B
Assume N segments in memory and a page size of P bytes. The wastage on account of
internal fragmentation is
A
NP/2 bytes
B
P/2 bytes
C
N/2 bytes
D
NP bytes
Answer A
____________________________________________________________________________
_______________
In Round Robin cpu scheduling as the time quantum is increased ,the average turn
around time
A
Increases
B
Decreases
C
Remains constant
D
Varies irregularly
Answer D
____________________________________________________________________________
_______________
Consider the following transactions with data items P and Q initialized to zero:
T1 :read (P);
read (Q);
if P = 0 then Q := Q + 1 ;
write (Q).
T2 : read (Q);
read (P);
if Q = 0 then P := P + 1 ;
write (P).
Any non-serial interleaving of T1 and T2 for concurrent execution leads to
A a serializable schedule
B a schedule that is not conflict serializable
C a conflict serializable schedule
D a schedule for which a precedence graph cannot be drawn
Answer B
____________________________________________________________________________
_______________

Mutual exclusion problem occurs between


A
Two disjoint processes that do not interact
B
Processes that share resources
C
Processes that don not use the same rssources
D
None of these
Answer B
____________________________________________________________________________
_______________
Consider a logical address space of 8 pages of 1024 words mapped with memory of 32
frames. How many bits are there in the physical address ?
A
9 bits
B
11 bits
C
14 bits
D
15 bits
Answer D
____________________________________________________________________________
_______________
________ synchronizes critical resources to prevent dead lock
A
P-operator
B
V-operator
C
Semaphore
D
Swapping
Answer C
____________________________________________________________________________
_______________
___________ is a technique of improving the priority of process waiting in Queue for CPU
allocation
A
Starvation
B
Aging
C
Revocation
D
Relocation
Answer B
____________________________________________________________________________
_______________
Petersons solution to the critical-section problem
A Only satisfies mutual exclusion and progress requirements
B Is a hardware synchronization using locks
C Is a software-based solution
D All of the above
Answer C
____________________________________________________________________________
_______________

_______ is one of pre-emptive scheduling algorithm.


A
RR
B
SSN
C
SSF
D
Priority based
Answer A
____________________________________________________________________________
_______________
Match the following :
(a) Disk scheduling
1. Round-robin
(b) Batch processing 2. SCAN
(c) Time sharing
3. LIFO
(d) Interrupt processing 4. FIFO
A
3 4 2 1
B
4 3 2 1
C
2 4 1 3
D
1 4 3 2
Answer C
Which of the following is scheme to deal with deadlock ?
A
Time out
B
Time in
C
Both (A) & (B)
D
None of the above
Answer A
_______________________________________________________________________________
____________
Which of the following resources can cause deadlock?
A
Read only files
B
Shared programs
C
Printers
D
All of these
Answer C
_______________________________________________________________________________
____________
A semaphore count of negative n means (s=n) that the queue contains ________ waiting
processes.
A
n+1
B
n
C
n-1
D
0
Answer B
_______________________________________________________________________________
____________

Resources are allocated to the process on non-sharable basis is


A
mutual exclusion
B
hold and wait
C
no pre-emption
D
circular wait
Answer A
_______________________________________________________________________________
____________
In order to allow only one process to enter its critical section, binary semaphore are
initialized to
A
0
B
1
C
2
D
3
Answer B
_______________________________________________________________________________
____________
Consider the following page trace : 4,3, 2, 1, 4, 3, 5, 4, 3, 2, 1, 5. Percentage of page fault that
would occur if FIFO page replacement algorithm is used with number of frames for the JOB
m=4 will be
A
8
B
9
C
10
D
12
Answer C
_______________________________________________________________________________
____________
A system has 3 processes sharing 4 resources.If each process needs a maximum of 2 units
,then
A
Deadlock can never occur
B
Deadlock may occur
C
Deadlock has to occur
D
None of these
Answer A
_______________________________________________________________________________
____________

Consider the methods used by processes P1 and P2 for accessing their critical sections. The
initial values of shared Boolean variables S1 and S2 are randomly assigned,
P1
P2
while (S1 = = S2);
while (S1 = = S2);
critical section
critical section
S1 = S2;
S1 = S2;
Which one of the following statements describes the properties achieved ?
A
Mutual exclusion but not progress
B
Progress but not mutual exclusion
C
Neither mutual exclusion nor progress
D
Both mutual exclusion and progress
Answer C
_______________________________________________________________________________
____________
The scheduling in which CPU is allocated to the process with least CPU-burst time is called
A
Priority Scheduling
B
Shortest job first Scheduling
C
Round Robin Scheduling
D
Multilevel Queue Scheduling
Answer B
_______________________________________________________________________________
____________
The simplest way to break a deadlock is to
A Preempt a resource
B Rollback
C Kill one of the processes
D Lock one of the processes
Answer C
A scheduler which selects processes from secondary storage device is called
A
Short term scheduler
B
Long term scheduler
C
Medium term scheduler
D
Process scheduler
Answer C
_________________________________________________________________________________
__________
Banker s algorithm for resource allocation deals with
A
Deadlock prevention
B
Deadlock avoidance
C
Deadlock recovery
D
Mutual exclusion
Answer B
_________________________________________________________________________________
__________

Interval between the time of submission and completion of job is called


A
Waiting time
B
Turn around time
C
Throughput
D
Response time
Answer B
_________________________________________________________________________________
__________
What problem is solved by Dijkstras Bankers algorithm?
A
Mutual exclusion
B
Deadlock recovery
C
Deadlock avoidance
D
Cache coherence
Answer B
_________________________________________________________________________________
__________
In the process management Round-robin method is essentially the pre-emptive version of
_________
A
FILO
B
FIFO
C
SSF
D
Longest time first
Answer B
_________________________________________________________________________________
__________
Which of the following statement is wrong ?
I. 2-phase locking protocol suffer from dead lock.
II. Time stamp protocol suffer from more aborts.
III. A block hole in a DFD is a data store with only inbound flows.
IV. Multivalued dependency among attribute is checked at 3 NF level.
V. An entity-relationship diagram is a tool to represent event model.
A
I, II, II
B
II, III, IV
C
III, IV, V
D
II, IV, V
Answer A
_________________________________________________________________________________
__________

The completion order of the 3 processes under the policies FCFS and RR2 (round robin
scheduling with CPU quantum of 2 time units) are
A
FCFS: P1, P2, P3 RR2: P1, P2, P3
B
FCFS: P1, P3, P2 RR2: P1, P3, P2
C
FCFS: P1, P2, P3 RR2: P1, P3, P2
D
FCFS: P1, P3, P2 RR2: P1, P2, P3
Answer C
_________________________________________________________________________________
__________
Indefinite blocking is called
A
Deadlock
B
Starvation
C
Both a and b
D
None of these
Answer B
_________________________________________________________________________________
__________
A solution to the critical section problem must satisfy which requirements?
A
Bounded waiting, monitor and relative speed
B
Semaphores, monitor and prevention of deadlock
C
Signal, wait and continue
D
Mutual exclusion, progress and bounded waiting
Answer D
_________________________________________________________________________________
__________
_____________ is one preemptive scheduling algorithm.
A
Shortest job first
B
Round robin
C
Priority based
D
Shortest job next
Answer A

It is not possible to have a deadlock involving only a single process. Why?


A This holds mutual exclusion, hold-and-wait and non-preemption
B This follows directly from the hold-and-wait condition
C Because single process not always in safe state
D None of the above
Answer B
_________________________________________________________________________________
__________
A Dead-lock in an Operating System is
A
Desirable process
B
Undesirable process
C
Definite waiting process
D
All of the above
Answer C
_________________________________________________________________________________
__________
Which of the following approaches do not require knowledge of the system state?
A
Deadlock detection
B
Deadlock prevention
C
Deadlock avoidance
D
None of the above
Answer D
_________________________________________________________________________________
__________
The simplest way to break a deadlock is to
A
Preempt a resource
B
Rollback
C
Kill one of the processes
D
Lock one of the processes
Answer C
_________________________________________________________________________________
__________
Three concurrent processes X, Y, and Z execute three different code segments that access and
update certain shared variables. Process X executes the P operation (i.e., wait) on semaphores
a, b and c; process Y executes the P operation on semaphores b, c and d; process Z executes the
P operation on semaphores c, d, and a before entering the respective code segments. After
completing the execution of its code segment, each process invokes the V operation (i.e., signal)
on its three semaphores. All semaphores are binary semaphores initialized to one. Which one of
the following represents a deadlock- free order of invoking the P operations by the processes?
A X : P (a ) P (b) P (c ) Y : P (b ) P (c) P (d) Z : P (c ) P (d) P (a)
B X : P (b ) P (a) P (c ) Y : P (b ) P (c) P (d) Z : P (a ) P (c ) P (d)
C X : P (b ) P (a) P (c ) Y : P (c ) P (b) P (d) Z : P (a ) P (c ) P (d)
D X : P (a ) P (b) P (c ) Y : P (c ) P (b) P (d) Z : P (c ) P (d) P (a)
Answer B
_________________________________________________________________________________

The purpose of a Memory Management Unit is to ___________ .


A Perform run-time mapping from virtual to physical addresses
B Ensure protection of the memory space allocated to every process
C Both A and B are correct responses
D None of these responses is correct
Answer A
___________________________________________________________________________________
________
In virtual memory systems, Dynamic address translation
A
Is the hardware necessary to implement paging
B
Stores pages at a specific location on disk
C
Is useless when swapping is used
D
Is part of the operating system paging algorithm
Answer A
___________________________________________________________________________________
________
Assertion(A): Bit maps are not often used in memory management.
Reason(R): Searching a bitmap for a run of given length is a slow operation.
A Both (A) and (R) are true and (R) is correct explanation for (A)
B Both(A) and (R) are true but (R) is not correct explanation for (A)
C (A) is true (R) is false
D (A) is false (R) is true
Answer A
___________________________________________________________________________________
________
The performance of cache memory is frequently measured in terms of a quantity called
A
Bit ratio
B
Nor ratio
C
No ratio
D
Hit ratio
Answer D
___________________________________________________________________________________
________
In which of the following page replacement policies Baladys anomaly occurs?
A
FIFO
B
LRU
C
LFU
D
NRU
Answer A
___________________________________________________________________________________
________

Suppose it takes 100 ns to access a page table and 20 ns to access associative memory with a 90%
hit rate, the average access time equals:
A
20 ns
B
28 ns
C
90 ns
D
100 ns
Answer B
___________________________________________________________________________________
________
Moving process from main memory to disk is called
A
Scheduling
B
Catching
C
Swapping
D
Spooling
Answer C
___________________________________________________________________________________
________
Virtual memory is
A
related to virtual reality
B
a form of ROM
C
a form of RAM
D
None of the above
Answer C
___________________________________________________________________________________
________
___________ is a technique of temporarily removing inactive programs from the memory of
computer system.
A
Swapping
B
Spooling
C
Semaphore
D
Scheduler
Answer A
___________________________________________________________________________________
________
Fragmentation of the file system
A Occurs only if file system is used improperly
B Can always be prevented
C Can be temporarily removed by compaction
D Is the characteristic of all the file systems
Answer C

The size of the virtual memory depends on the size of the


A
Data bus
B
Main memory
C
Address bus
D
None of the above
Answer C
______________________________________________________________________________________
_____
Variable partition memory management technique with compaction results in
A
Reduction of fragmentation
B
Minimal wastage
C
Segment sharing
D
None of the above
Answer A
______________________________________________________________________________________
_____
Loading operating system from secondary memory to primary memory is called
A
Compiling
B
Booting
C
Refreshing
D
Reassembling
Answer B
______________________________________________________________________________________
_____
Paging is a memory management scheme that ___________________.
A Permits the logical address space of a process to be noncontiguous
B Avoids external fragmentation and the need for compaction
C Solves the considerable problem of fitting memory chunks of fixed sizes onto the backing store
D All of the above
Answer B
______________________________________________________________________________________
_____
A static partitioned memory management system has a total of six partitions. If one is allocated to
the operating system, this will allow a total of
A
Five user jobs
B
Six user jobs
C
Thirty-two user jobs
D
Thirty-six user jobs
Answer A
______________________________________________________________________________________
_____

Consider the virtual page reference string


1, 2, 3, 2, 4, 1, 3, 2, 4, 1
on a demand paged virtual memory system running on a computer system that has main memory
size of 3 page frames which are initially empty. Let LRU, FIFO and OPTIMAL denote the number
of page faults under the corresponding page replacement policy. Then
A
OPTIMAL < LRU < FIFO
B
OPTIMAL < FIFO < LRU
C
OPTIMAL = LRU
D
OPTIMAL = FIFO
Answer B
______________________________________________________________________________________
_____
Virtual memory can be implemented with
A
Segmentation
B
Paging
C
None
D
All of the above
Answer D
______________________________________________________________________________________
_____
On a disk with 1000 cylinders (0 to 999) find the number of tracks, the disk arm must move to satisfy
all the requests in the disk queue. Assume the last request service was at track 345 and the head is
moving toward track 0. The queue in FIFO order contains requests for the following tracks :
123, 874, 692, 475, 105, 376
(Assume SCAN algorithm)
A
2013
B
1219
C
1967
D
1507
Answer B
______________________________________________________________________________________
_____
Memory utilization factor shall be computed as follows
A
Memory in use/allocated memory
B
Memory in use/total memory connected
C
Memory allocated/total memory available
D
Memory committed/total memory available
Answer B
______________________________________________________________________________________
_____
File attributes are
A Name
B Type
C Location
D All of these
Answer D

Which structure prohibits the sharing of files and directories?


A
Tree structure
B
One level structure
C
Two level structure
D
None of the these
Answer A
________________________________________________________________________________________
___
Best method for allocation is
A
Contiguous
B
Linked
C
Index
D
All of these
Answer B
________________________________________________________________________________________
___
Which one is best for memory allocation?
A
First fit
B
Best fit
C
Worst fit
D
All of these
Answer B
________________________________________________________________________________________
___
The simplest directory structure is
A
Single level directory
B
Two level directory
C
Tree structure directory
D
None of these
Answer C
________________________________________________________________________________________
___
A tree structured file directory system
A
Allows easy storage and retrieval of file names
B
Is a much debated unnecessary feature
C
Is not essential when we have millions of files
D
None of the above
Answer A
________________________________________________________________________________________
___

The file structure that redefines its first record at a base of zero uses the term
A
Relative organization
B
Key fielding
C
Dynamic reallocation
D
Hashing
Answer A
________________________________________________________________________________________
___
Which of the following types of terminals is entirely dependent for all its capabilities on the computer
system to which it is connected?
A
Smart terminal
B
Dumb terminal
C
Micro computer
D
None of these
Answer B
________________________________________________________________________________________
___
File record length
A
Should always be fixed
B
Should always be variable
C
Depends upon the size of the file
D
Should be chosen to match the data characteristics
Answer D
________________________________________________________________________________________
___
FAT stands for
A
File Accomodation Table
B
File Access Tape
C
File Allocation Table
D
File Activity Table
Answer C
________________________________________________________________________________________
___
________ is the time required by a sector to reach below read/write head.
A
Seek Time
B
Latency Time
C
Access time
D
None
Answer B

Which of the following is the principal difference between a monochrome monitor and an RGB monitor?
A
Number of electron guns
B
Resolution
C
Size
D
Cost
Answer A
__________________________________________________________________________________________
_
A file sometimes called a
A
Collection of input data
B
Data set
C
Temporary place to store data
D
Program
Answer B
__________________________________________________________________________________________
_
There are no cycles of
A
General graph directory
B
Cyclic graph directory
C
One level directory
D
Two level directory
Answer B
__________________________________________________________________________________________
_
Solution of name collision problem is
A
Single level directory
B
Two level directory
C
Tree structure
D
All of these
Answer B
__________________________________________________________________________________________
_
When used with I\O devices the term intelligent implies
A
A color output capability
B
Speech processing capability
C
High speed printing capability
D
Features to support off line and online tasks
Answer D
__________________________________________________________________________________________
_

Optical storage is a
A
high-speed direct access storage device.
B
low-speed direct access storage device.
C
medium-speed direct access storage device.
D
high-speed sequential access storage device.
Answer C
__________________________________________________________________________________________
_
Memory protection is normally done by the
A
Processor and the associated hardware
B
Operating system
C
Compiler
D
User program
Answer A
__________________________________________________________________________________________
_
Program threats are
A
Trojan horse
B
Trap door
C
Both A and B
D
None of these
Answer C
__________________________________________________________________________________________
_
Which of the following is the process by which a users access to physical data in the application is limited,
based on his privileges ?
A
Authorization
B
Authentication
C
Access Control
D
All of these
Answer C
__________________________________________________________________________________________
_
Worm was made up
A One program
B Two program
C Three program
D All of these
Answer B

Trojan horse
A
A code segment that misuses its file is called trojan horse
B
Good for file accessing
C
Both A and B
D
None of these
Answer A
___________________________________________________________________________________________
A major security problem for operating system is
A
Authentication problem
B
Physical problem
C
Human problem
D
None of these
Answer A
___________________________________________________________________________________________
To protect system,there are how many security levels?
A
One
B
Two
C
Three
D
Four
Answer C
___________________________________________________________________________________________
Which of the following topologies consists of multiple CPUs connected by a single communication line
running the length of the network?
A
Tree
B
Ring
C
Star
D
Bus
Answer D
___________________________________________________________________________________________
Which of the following is the process by which a users privileges ascertained ?
A
Authorization
B
Authentication
C
Access Control
D
None of these
Answer A
___________________________________________________________________________________________
An audit log
A
Simply records the time
B
User
C
Type of all access to an object
D
All of these
Answer B
___________________________________________________________________________________________

All of the following are examples of real security and privacy risks except
A
Hackers
B
Spam
C
Viruses
D
Identify theft
Answer B
___________________________________________________________________________________________
Security violation due to
A
Malicious
B
Accidental
C
Both A and B
D
None of these
Answer C
___________________________________________________________________________________________
A public key encryption system
A
Allows only the correct receiver to decode the data.
B
Allows only one to decode the transmission.
C
Allows only the correct sender to decode the data.
D
Does not encode the data before transmitting it.
Answer A
___________________________________________________________________________________________
Which model estimates the total effort in terms of person,months of the technical project staff?
A
Spiral
B
Waterfall
C
Prototyping
D
COCOMO model
Answer D
Lowest level of security is
A
A
B
B
C
C
D
D
Answer A
___________________________________________________________________________________________
Bootstrap or vector is called
A
Grappling hook program
B
Main program
C
Secondary program
D
Primary storage
Answer B
___________________________________________________________________________________________

In one time password


A
The password is different in each instance
B
The password is same in each instance
C
Both A and B
D
None of these
Answer A
___________________________________________________________________________________________
The DIR command in DOS operating system
A
Copies files
B
Erases files
C
Extracts a list of file names
D
None of these
Answer C
___________________________________________________________________________________________
Malicious access are
A
Unauthorized reading of data
B
Unauthorized modification of data
C
Unauthorized destruction of data
D
All of these
Answer D
___________________________________________________________________________________________
Audit log can be used to determine
A
How and when the problem occurred
B
What amount of damage was done
C
When security has been violated
D
All of these
Answer C
___________________________________________________________________________________________
The most common approach to authenticating a user identity is
A
User password
B
User log in
C
Hardware device
D
None of these
Answer A
___________________________________________________________________________________________
In which model advantage of better testing in software development?
A
Waterfall model
B
Prototyping
C
Iterative
D
All of these
Answer C
___________________________________________________________________________________________

Which model reduces the cost of development of software?


A
Waterfall model
B
Prototyping
C
Iterative
D
None of these
Answer B
WEB
The main function of a browser is to
A
Compile HTML
B
Interpret HTML
C
De-compile HTML
D
Interpret CGI programs
Answer B
___________________________________________________________________________________________
DMSP stands for
A
Distributed Mail System Protocol
B
Distributed Message System Protocol
C
Distributed Message System Pool
D
Distributed Mail System Pool
Answer A
___________________________________________________________________________________________
In HTML URI is used to
A
Create a frame document
B
Create a image map in the webpage
C
Customize the image in the webpage
D
Identify a name or a resource on the internet
Answer D
___________________________________________________________________________________________
Which tags are commonly used by search engines?
A
Headings
B
Title
C
Paragraph
D
All of these
Answer A
___________________________________________________________________________________________
The HTML tags are enclosed within
A
Curly braces
B
Parentheses
C
Angle brackets
D
Square brackets
Answer C
___________________________________________________________________________________________

A header in CGI script can specify


A
Format of the document
B
New locat ion of the document
C
A and B both
D
Start of the document
Answer A
___________________________________________________________________________________________
Which of the following tags below are used for multi line text input control?
A
Textml tag
B
Text tag
C
Textarea tag
D
Both a and b
Answer C
___________________________________________________________________________________________
What is the use of web font in HTML?
A
That is the core font that is used to develop web pages
B
That enables to use fonts over the web without installation
C
That is the special font that is developed by Microsoft corporation
D
All of the above
Answer B
___________________________________________________________________________________________
HTML is defined using SGML an _______ standard, information processing-text and office systems
(SGML) for text information processing.
A
ISO 8878
B
ISO 8879
C
ISO 8880
D
ISO 8881
Answer B
___________________________________________________________________________________________
The MIME text file is saved with
A HMT extension
B HTML extension
C THM extension
D None of these
Answer B
Which of the following attributes below are used for a font name?
A
Fontname
B
fn
C
Font
D
Face
Answer D
___________________________________________________________________________________________

What is the use of forms in HTML?


A
To display contents of e mails
B
To display animation effect
C
To collect users input
D
None of the above
Answer C
___________________________________________________________________________________________
Each list item in an ordered or unordered list has which tag?
A
List tag
B
Is tag
C
Li tag
D
Ol tag
Answer C
___________________________________________________________________________________________
Which of the following identifies a specific web page and its computer on the Web?
A
Web site
B
Web site address
C
URL
D
Domain Name
Answer D
___________________________________________________________________________________________
Which of the following protocol is not used in the internet?
A
Telnet
B
WIRL
C
HTTP
D
Gopher
Answer B
___________________________________________________________________________________________
Which of the following statement is true?
A
An XML document can have one root element.
B
An XML document can have one child element.
C
XML elements have to be in lower case.
D
All of the above.
Answer A
___________________________________________________________________________________________
Output of XML document can be viewed as
A
Word processor
B
Web browser
C
Notepad
D
None of the above
Answer B
___________________________________________________________________________________________

All exceptions in Java are subclasses of built in class called


A
Exception
B
Error
C
Throwable
D
Raise
Answer C
___________________________________________________________________________________________
XML is a
A
B
C
D

Imperative language
Declarative language
Standard
None of these
Answer B
___________________________________________________________________________________________
Node in XML is
A Any part of the document whether it is elements ,attributes or otherwise
B Referred only to the attributes
C Referred to the top element in the document
D None of these
Answer A
Well formed XML document means
A It contains a root element
B It contain an element
C It contains one or more elements
D Must contain one or more elements and root element must contain all other elements
Answer D
___________________________________________________________________________________________
XML DSOs has the property for the number of pages of data the recordset contains
A
Count
B
Number
C
Pagecount
D
Pagenumber
Answer C
___________________________________________________________________________________________
There is a way of describing XML data,how?
A
XML uses a DTD to describe the data.
B
XML uses XSL to describe data.
C
XML uses a description node to describe data
D
Both A and C.
Answer D
___________________________________________________________________________________________

XML uses the features of


A
HTML
B
XHTML
C
VML
D
SGML
Answer D
___________________________________________________________________________________________
DOM is a
A
B
C
D

A parser
Specification
Coding style
None of these
Answer A
___________________________________________________________________________________________
XPATH used to
A
Address your documents by specifying a location path
B
Address the server
C
Store the IP of the server
D
None of these
Answer A
___________________________________________________________________________________________
The XML DOM object is
A
Entity
B
Entity reference
C
Comment reference
D
Comment data
Answer B
___________________________________________________________________________________________
XML document can be viewed in
A
IE 3.0
B
IE 2.0
C
IE 6.0
D
IE X.0
Answer C
___________________________________________________________________________________________
What is so great about XML?
A
Easy data exchange
B
High speed on network
C
Both A and B
D
None of the above
Answer C
___________________________________________________________________________________________

The most popular way to materialize XML document is to use


A
DTD
B
XSLT
C
HTML
D
SOAP
Answer B
Namespace
A
Distinguishes one XML vocabulary from another
B
Provides the spaces in the names
C
Is a querying language
D
None of these
Answer A
___________________________________________________________________________________________
Which of the following statement is true?
A
All the statements are true.
B
All XML elements must have closing tag.
C
All XML elements must be lower case.
D
All XML documents must have a DTD.
Answer B
___________________________________________________________________________________________
How many root element can an XML document have ?
A
One
B
Two
C
Three
D
As many as the memory provides
Answer A
___________________________________________________________________________________________
Attributes in XML are
A Elements inXML
B Child nodes
C A way of attaching characteristics or properties to elements of a document
D None of these
Answer C
___________________________________________________________________________________________
Microsoft XML schema data types for hexadecimal digits representing octates
A
UID
B
UXID
C
UUID
D
XXID
Answer C
___________________________________________________________________________________________

The tags in XML are


A
Case insensitive
B
Case sensitive
C
Browser dependent
D
None of these
Answer B
___________________________________________________________________________________________
What is XML?
A
Subset of SGML,Extensible Markup Language
B
Superset of SGML,Extensible Markup Language
C
Like SGML ,Extended Markup Language
D
None of these
Answer A
___________________________________________________________________________________________
XML
A
B
C
D

Can be used as a database


Cannot be used as a database
XML is not a database ,it is language
None of these
Answer A
___________________________________________________________________________________________
CIDR stands for
A
Classified Internet Domain Routing
B
Classless Inter Domain Routing
C
Classless Internet Domain Routing
D
Classified Inter Domain Routing
Answer B
___________________________________________________________________________________________
The term byte stuf fing refers to
A Data stuffing used wi th character oriented hardware
B Data stuffing used wi th bi t oriented hardware
C Data stuffing used with both A and B
D Data stuffing used wi th byte oriented hardware
Answer A
What are empty elements and is it valid?
A
No there is no such terms as empty element
B
Empty elements are element with no data
C
No it is not valid to use empty element
D
None of these
Answer B
___________________________________________________________________________________________

www is based on which model?


A
Local server
B
Client server
C
3 tier
D
None of these
Answer B
___________________________________________________________________________________________
Let most segment of a name inn DNS represents
A
Individual Network
B
Individual computer
C
Domain name
D
Network type
Answer B
___________________________________________________________________________________________
Characteristic encoding is
A
Method used to represent numbers in a character
B
Method used to represent character in a number
C
Not a method
D
None of these
Answer A
___________________________________________________________________________________________
The web standard allows programmers on many different computer platforms to dispersed format and
display the information server.These programs are called
A
Web browsers
B
HTML
C
Internet Explorer
D
None of these
Answer A
___________________________________________________________________________________________
BCC in the internet refers to
A
Black carbon copy
B
Blind carbon copy
C
Blank carbon copy
D
Beautiful carbon copy
Answer B
___________________________________________________________________________________________
Which type of web document is run at the client site
A
Static
___________________________________________________________________________________________

Hardware that calculates CRC uses


A
Shift register
B
Xor unit
C
Both A and B
D
Instruction register
Answer B
___________________________________________________________________________________________
MSXML is
A
A Microsoft language
B
XML parser that ships with IE5.0
C
Used for interacting with XML
D
None of these
Answer B
___________________________________________________________________________________________
Address 192.5.48.3 belongs to
A
Class A
B
Class B
C
Class C
D
Class D
Answer C
What does the URL need to access documents ?
I. Path name
II. Host name
III. DNS
IV. Retrieval method
V. Server port number
A
I, II, III
B
I, III, V
C
I, II, IV
D
III, IV, V
Answer B
___________________________________________________________________________________________
Which Layer is not present in TCP/ IP model?
A
Application Layer
B
Internet Layer
C
Transport Layer
D
Presentation Layer
Answer D
___________________________________________________________________________________________

Unl ike Ipv4, Ipv6 does not include the following field in the base header
A
Next Header field
B
Field for Fragmentation information
C
Flow Label
D
Kind field
Answer B
___________________________________________________________________________________________
FDDI (Fiber Distributed Data Interconnect) is an example of
A
Token ring
B
Token bus
C
Star topology
D
Multipoint network
Answer A
UNIX LINUX
Which of the following statement best explains a process?
A
It is a program.
B
It is a program in execution.
C
It is an instance of a program in execution.
D
It is a program that uses system calls.
Answer C
___________________________________________________________________________________________
In which section of a process,the information about the arguments to the program are available?
A
Data
B
Text
C
Stack
D
User block
Answer C
___________________________________________________________________________________________
Choose the incorrect statement
A
Shell scripts can accept arguments
B
Shell scripts are interpreted
C
Shell is a programming language
D
Shell scripts are compiled
Answer D
___________________________________________________________________________________________
UNIX was developed by
A
Bell labs
B
Berkley software
C
California university
D
American defence academy
Answer A
___________________________________________________________________________________________

Kernel is not involved


A
When a read operation is done
B
When a pressed key is echoed on to the screen
C
In resource allocation
D
None of the above
Answer D
___________________________________________________________________________________________
Choose the correct statement.
A Kernel is non preemptive.
B
Interrupts are blocked when critical section of a code is being executed.
C
No process can put another process to sleep.
D None of the above.
Answer C
___________________________________________________________________________________________
The exception to the fact that any process in UNIX ,has a parent is
A
Dev
B
Sh
C
Kernel
D
Login
Answer C
___________________________________________________________________________________________
Lint should be used
A
Before compilation
B
After compilation
C
To analyze a C code
D
None of the above
Answer A
___________________________________________________________________________________________
Which command is used to display the top of the file?
A
Cat
B
More
C
Head
D
Grep
Answer C
___________________________________________________________________________________________
Which one of the following options is not a shell in UNIX system?
A
Bourne Shell
B
C Shell
C
Net Shell
D
Korn Shell
Answer C

The command that can be used to restrict incoming messages to a user is


A
Mesg
B
Halt
C
Grep
D
Sleep
Answer A
___________________________________________________________________________________________
The sort command in UNIX
A
Used to sort a file
B
Used to sort the list of files in a directory
C
Both A and B
D
None of the above
Answer A
___________________________________________________________________________________________
Which of the following keys is used to replace a single character with new text?
A
S
B
s
C
r
D
C
Answer B
___________________________________________________________________________________________
Which command is used to remove a directory?
A
rd
B
rmdir
C
dldir
D
rdir
Answer B
___________________________________________________________________________________________
The tail command in UNIX
A
Can be used to look at the tail or bottom of the file
B
Can be used to display the list of last 10 files in the current directory
C
Can be used to display the list of last 15 in the current directory
D
None of the above
Answer A
___________________________________________________________________________________________
Which command is used to remove a file
A
Rename
B
MV
C
RM
D
Del
Answer C
___________________________________________________________________________________________

Which command is used to change protection mode of files starting with the string emp and ending with 1,2, or 3?

A
B
C
D

chmod 777 emp*


chmod u x emp[l-3]
chmod u r ??? emp
chmod 222 emp?
Answer B
___________________________________________________________________________________________
Which command will be used with vi editor to append text at end of line?
A
A
B
i
C
a
D
I
Answer A
___________________________________________________________________________________________
Which of the following command the file names in multiple columns?
A
ISX
B
IS
C
IS1
D
ISfX
Answer B
___________________________________________________________________________________________
Which command is used to display the device name of the terminal you are using?
A
who
B
ls
C
tty
D
stty
Answer C
Which command allows you to view your file 24 lines at a time ?
A
More
B
Cat
C
Pg
D
None of the above
Answer A
___________________________________________________________________________________________
Which of the following is not a communication command?
A
Write
B
Mail
C
Mesg
D
Grep
Answer D
___________________________________________________________________________________________

Which command is used to extract specific columns from the file?


A
cut
B
grep
C
Past
D
cat
Answer A
___________________________________________________________________________________________
Which command is used with vi editor to move the cursor to the left?
A
i
B
k
C
j
D
h
Answer D
___________________________________________________________________________________________
Which command is used to create a directory?
A
CRDIR
B
MKDIR
C
MD
D
CR
Answer B
___________________________________________________________________________________________
Which of the following changes permission to deny write permission to group and others?
A
Chmod go-w filex
B
Chmod go w filex
C
Chmod go=w file
D
None of the above
Answer A
___________________________________________________________________________________________
Which command is used with vi editor to delete a single character?
A
Z
B
y
C
a
D
x
Answer D
___________________________________________________________________________________________
The tar command in UNIX
A
Used to create compressed archives of directories and files
B
Used to extract directories and files from an archives
C
Both A and B
D
None of the above
Answer C
___________________________________________________________________________________________

Which command is used to sort the lines of data in a file in reverse order
A
sort
B
sh
C
st
D
sort -r
Answer D
___________________________________________________________________________________________
Which of the following commands is used to rename a file?
A
Rename
B
MV
C
Remove
D
Ren
Answer B
Which of the following calls never returns an error?
A
Getpid
B
Fork
C
Ioct1
D
Open
Answer A
___________________________________________________________________________________________
Which command is used to display a file contents in octal form?
A
cd
B
of
C
od
D
oct
Answer C
___________________________________________________________________________________________
Which of the following is not a communication command?
A
write
B
mail
C
mesg
D
grep
Answer D
___________________________________________________________________________________________
Which of the following commands is used to count the total number of lines,words and characters
contained in a file?
A
count p
B
wcount
C
wc
D
count w
Answer C
___________________________________________________________________________________________

The cc command makes a total of


A
1 pass
B
2 pass
C
4 pass
D
5 pass
Answer D
___________________________________________________________________________________________
Which of the following commands is used for an automatic remainder service?
A
Write
B
Calender
C
Mail
D
Mesg
Answer B
___________________________________________________________________________________________
The Unix command used to find out the number of characters in a file is
A
nc
B
wc
C
chcnt
D
c
Answer B
___________________________________________________________________________________________
In a system ,if 5 people are currently using vi editor ,then the number of corresponding processes will be
A
1
B
5
C
3
D
0
Answer B
___________________________________________________________________________________________
Which set option is used with vi editor to display line numbers on screen?
A
nm
B
nu
C
ic
D
li
Answer B
___________________________________________________________________________________________
Which command will be used with vi editor to move back to the beginning of a word?
A
b
B
e
C
a
D
w
Answer A

When a process makes a system call ,its mode changes from


A
User to kernel
B
Kernel to user
C
Restricted to unrestricted
D
Unrestricted to restricted
Answer A
___________________________________________________________________________________________
Which of the following are not system calls?
A
Chmod
B
Open
C
Lseek
D
Getc
Answer D
___________________________________________________________________________________________
The advantage of binary files over text files is that
A
It is compact
B
It can be accessed faster
C
Many commands assume the named file to be a binary file
D
They are more reliable
Answer D
___________________________________________________________________________________________
Mounting a file system results in the loading of
A
Boot block
B
Super block
C
i-node table
D
All of these
Answer B
___________________________________________________________________________________________
If cat x ,prints garbage ,then x is probably a
A
Data file
B
Binary file
C
Text file
D
Source file
Answer B
___________________________________________________________________________________________
Which of the following system calls transforms an executable binary file into a process?
A
Fork
B
Exec
C
Ioct1
D
Longjmp
Answer B
___________________________________________________________________________________________

The cat command is used to


A
Print a file
B
Display a file
C
Capture a file
D
Copy a file
Answer B
___________________________________________________________________________________________
An attempt to read from locked file,results in
A
Prematured termination
B
A deadlock
C
An indefinite wait
D
None of the above
Answer D
___________________________________________________________________________________________
Which of the following file names can be found in more than one directory?
A
Passwd
B
Bin
C
Date
D
None of the above
Answer A
___________________________________________________________________________________________
Command_________compares two files byte by byte and displays the first mismatch.
A
cmp
B
comp
C
cmap
D
None of these
Answer A
When the read system call encounters EOF ,it returns
A
Some positive integer
B
Some negative integer
C
0
D
-1
Answer C
___________________________________________________________________________________________
To allow only one user to work with a particular file at a particular time ,one has to
A
Semaphore
B
Critical region
C
Locking
D
Dedicated mode
Answer C
___________________________________________________________________________________________

Which of the following are character special files?


A
Terminal
B
Printer
C
Modem
D
Tape drive
Answer B
___________________________________________________________________________________________
Which of the following sections of an executable binary file has all uninitialized data items?
A
BSS
B
Data
C
Header
D
Symbol
Answer A
___________________________________________________________________________________________
Which of the following files contains information related to password aging?
A
Shadow
B
Profile
C
Password
D
All of these
Answer C
___________________________________________________________________________________________
Which of the following system calls,does not return control to the calling point, on termination?
A
Fork
B
Exec
C
Ioct1
D
Longjmp
Answer B
___________________________________________________________________________________________
Which command is used to display the characteristics of a process?
A
pid
B
ps
C
du
D
au
Answer D
___________________________________________________________________________________________
The first thing that is searched when a command references a file is its
A
i node
B
i node number
C
Permission
D
None of the above
Answer B
___________________________________________________________________________________________

Profilers are
A
Tools that analyze the run time behavior of a program
B
Tools that check C code for cross file consistency
C
Tools that keep track of evolving versions of a file
D
None of the above
Answer A
___________________________________________________________________________________________
Which of the following tools can be used to keep track of evolving version of a file?
A
Make
B
Yacc
C
SCCS
D
dv
Answer C
Which command is used to display and create files?
A
cat
B
ed
C
vi
D
lyrix
Answer A
___________________________________________________________________________________________
Files that can store data in the same format as used in program are called
A
Binary files
B
Source file
C
Text file
D
Core
Answer A
___________________________________________________________________________________________
The file that stores an integer as a sequence of characters is a
A
Text file
B
Data file
C
Binary file
D
Core
Answer A
___________________________________________________________________________________________
Which is the earliest and most widely used shell that came with the UNIX system?
A
C Shell
B
Korn Shell
C
Bourne Shell
D
Smith Shell
Answer C
___________________________________________________________________________________________

Environment variables can be accessed by


A
System programs
B
C programs
C
Shell scripts
D
None of the above
Answer C
___________________________________________________________________________________________
Which of the following are not filter programs?
A
Date
B
Sort
C
Cat
D
Grep
Answer A
___________________________________________________________________________________________
Which of the following shell scripts looping features does not recognize the break command?
A
While
B
Until
C
For
D
None of the above
Answer D
___________________________________________________________________________________________
Which of the following is not a filter?
A
cat
B
wc
C
grep
D
sort
Answer A
___________________________________________________________________________________________
Shell functions
A Are another name for shell procedures
B Execute faster than shell procedures
C Are executed by a new shell
D Are not executed by new shell
Answer D
OOP
The members of a class by default are
A
Public
B
Protected
C
Private
D
Mandatory to specify
Answer C
___________________________________________________________________________________________

Exception handling is targeted at


A
Run-time error
B
Compile time error
C
Logical error
D
All of the above
Answer A
___________________________________________________________________________________________
It is possible to declare as a friend
A
A member function
B
A global function
C
A class
D
All of the above
Answer D
___________________________________________________________________________________________
You separated a derived class name from its access specifier with
A
A colon
B
Two colons
C
Atleast one space
D
A semi colon
Answer B
___________________________________________________________________________________________
An exception is caused by
A
A hardware problem
B
A problem in the operating system
C
A syntax error
D
A run-time error
Answer D
___________________________________________________________________________________________
The following can be declared as friend in a class
A
An object
B
A class
C
A public data member
D
A private data member
Answer B
___________________________________________________________________________________________
Which of the following statements is NOT valid about operator overloading?
A Only existing operators can be overloaded
B
Overloaded operator must have at least one operand of its class type
C
The overloaded operators follow the syntax rules of the original operator
D None of the above
Answer D
___________________________________________________________________________________________

A copy constructor takes


A
No argument
B
One argument
C
Two arguments
D
Arbitrary no. of arguments
Answer B
___________________________________________________________________________________________
An object is
A
One instance of a class
B
Another word for a class
C
A class with static method
D
A method that accesses class
Answer A
___________________________________________________________________________________________
cfront
A is the front end of a C compiler
B is the per-process of a C compiler
C is a tool that is translated a C++ code to its equivalent C code
D None of above
Answer C
A class defined within another class is
A
Nested class
B
Inheritance
C
Containership
D
Encapsulation
Answer A
___________________________________________________________________________________________
A blueprint for a software object is called a
A
Object
B
Class
C
Instance
D
None of these
Answer B
___________________________________________________________________________________________
At which point of time a variable comes into existence in memory is determined by its
A
Scope
B
Storage class
C
Data type
D
All of the above
Answer B
___________________________________________________________________________________________

A virtual class is the same as


A
An abstract class
B
A class with a virtual function
C
A base class
D
None of the above
Answer D
___________________________________________________________________________________________
A static data member is given a value
A
Within the class definition
B
Outside the class definition
C
When the program is exeuted
D
Never
Answer D
___________________________________________________________________________________________
Which of the following is false for cin?
A
It represents standard input
B
It is an object of istream class.
C
It is a class of which stream is an object
D
Using cin the data can be read from users terminal
Answer C
___________________________________________________________________________________________
Member functions, when defined within the class specification
A
Are always inline
B
Are not inline
C
Are inline by default, unless they are too big or too complicated
D
Are not inline by default.
Answer A
___________________________________________________________________________________________
Access to private data
A
Restricted to methods of the same class
B
Restricted to methods of other classes
C
Available to methods of the same class and other classes
D
Not an issue because the program will not compile
Answer B
___________________________________________________________________________________________
C++ was originally developed by
A
Clocksin and Melish
B
Donald E.Knuth
C
Sir Richard Hadlee
D
Bjarne Stroustrup
Answer D
___________________________________________________________________________________________

Use of virtual functions implies


A Overloading
B Overriding
C Static binding
D Dynamic binding
Answer D
Which of the statements is true in a protected derivation of a derived class from a base class?
A Private members of the base class become protected members of the derived class
B Protected members of the base class become public members of the derived class
C Public members of the base class become protected members of the derived class
D Protected derivation does not affect private and protected members of the derived class
Answer C
___________________________________________________________________________________________
The keyword friend does not appear in
A
The class allowing access to another class
B
The class desiring access to another class
C
The private section of a class
D
The public section of a class
Answer C
___________________________________________________________________________________________
Data members which are static
A
Cannot be assigned a value
B
Can only be used in static functions
C
Cannot be defined in a Union
D
Can be accessed outside the class
Answer B
___________________________________________________________________________________________
Which can be passed as an argument to a function?
A
Constant
B
Expression
C
Another function
D
All of the above
Answer A
___________________________________________________________________________________________
Function templates can accept
A
Any type of parameters
B
Only one parameter
C
Only parameters of the basic type
D
Only parameters of the derived type
Answer C
___________________________________________________________________________________________

In which case is it mandatory to provide a destructor in a class?


A
Almost in every class
B
Class for which two or more than two objects will be created
C
Class for which copy constructor is defined
D
Class whose objects will be created dynamically
Answer D
___________________________________________________________________________________________
A pointer to the base class can hold address of
A
Only base class object
B
Only derived class object
C
Base class object as well as derived class object
D
None of the above
Answer C
___________________________________________________________________________________________
Member of a class specified as _______ are accessible only to method of the class.
A
private
B
public
C
protected
D
derive
Answer A
___________________________________________________________________________________________
When a child class function is called,the compiler looks first for a matching function name in the
A
Class of the object using the function name
B
Immediate ancestor class
C
Base class
D
Descendant class
Answer A
___________________________________________________________________________________________
Maximum number of template arguments in a function template is
A
One
B
Two
C
Three
D
Many
Answer D
If you wanted to sort many large objects or structures, it would be most efficient to
A
Place them in an array and sort the array.
B
Place pointers to them in an array and sort the array.
C
Place them in a linked list and sort the linked list.
D
Place references to them in an array and sort the array.
Answer C
___________________________________________________________________________________________
Match the following :
(a) Garbage collection in 1. Java
(b) Nameless object
2. generic programming
(c) Template support
3. defines a class
(d) A forward reference
4. member function

(e) Derived class inherits


from base class
A
1 5 4 2 3
B
1 5 2 3 4
C
5 1 2 3 4
D
5 4 3 1 2
Answer B
___________________________________________________________________________________________
A struct is the same as a class except that
A
There are no member functions
B
All members are public
C
Cannot be used in inheritance hierarchy
D
It does have a this pointer
Answer C
___________________________________________________________________________________________
Which of the following is not the characteristic of constructor?
A
They should be declared in the public section.
B
They do not have return type.
C
They can not be inherited.
D
They can be virtual.
Answer D
___________________________________________________________________________________________
The friend functions are used in situations where:
A
We want to have access to unrelated classes
B
Dynamic binding is required
C
Exchange of data between classes to take place
D
None of the above
Answer D
___________________________________________________________________________________________
A template class
A
Is designed to be stored in different containers
B
Works with different data types
C
Generates objects which must be identical
D
Generates classes with different numbers of member functions
Answer B
___________________________________________________________________________________________
Pure virtual functions
A
Have to be redefined in the inherited class
B
Cannot have public access specification
C
Are mandatory for a virtual class
D
None of the above
Answer A
___________________________________________________________________________________________
Overloading a postfix increment operator by means of a member function takes
A
No argument
B
One argument
C
Two arguments
D
Three arguments
Answer A
___________________________________________________________________________________________
A class which can use all the features of an established class,is
A
A static class
B
A super class
C
A subclass

D
Overloaded
Answer C
___________________________________________________________________________________________
A friend function to a class, C cannot access
A
Private data members and member functions
B
Public data members and member functions
C
Protected data members and member functions
D
The data members of the derived class of C
Answer D
In access control in a protected derivation, visibility modes will change as follows
A
Private, public and protected become protected
B
Only public becomes protected
C
Public and protected become protected
D
Only private becomes protected
Answer C
___________________________________________________________________________________________
Which of the following cannot be legitimately passed to a function
A
A constant
B
A variable
C
A structure
D
A header file
Answer D
___________________________________________________________________________________________
When the compiler cannot differentiate between two overloaded constructors, they are called
A
Overloaded
B
Destructed
C
Ambiguous
D
Dubious
Answer C
___________________________________________________________________________________________
If a base class destructor is not virtual, then
A
It can not have a function body
B
It can not be called
C
It can not be called when accessed from pointer
D
Destructor in derived class can not be called when accessed through a pointer to the base class
Answer D
___________________________________________________________________________________________
A function call mechanism that passes arguments to a function by passing a copy of the values of the arguments is
__________
A
Call by name
B
Call by value
C
Call by reference
D
Call by value result
Answer B
___________________________________________________________________________________________
A variable defined within a block is visible
A
From the point of definition onward in the program
B
From the point of definition onward in the function
C
From the point of definition onward in the block
D
Throughout the function
Answer C
___________________________________________________________________________________________
RunTime polymorphism is achieved by ___________

A
Friend function
B
Virtual function
C
Operator overloading
D
Function overloading
Answer B
___________________________________________________________________________________________
This pointer
A
Implicitly points to an object
B
Can be explicitly used in a class
C
Can be used to return an object
D
All of the above
Answer D
___________________________________________________________________________________________
A __________ is a special method used to initialize the instance variable of a class.
A
Member function
B
Destructor
C
Constructor
D
Structure
Answer C
___________________________________________________________________________________________
Additional information sent when an exception is thrown may be placed in
A
The throw keyword
B
The function that caused the error
C
The catch block
D
An object of the exception class
Answer C

Mechanism of deriving a class from another derived class is known as____


A
Polymorphism
B
Single Inheritance
C
Multilevel Inheritance
D
Message Passing
Answer C
___________________________________________________________________________________________
Mechanism of deriving a class from another derived class is known as
A
Polymorphism
B
Single inheritance
C
Multilevel inheritance
D
Message passing
Answer C
___________________________________________________________________________________________
The concept of hierarchical classification is related to
A
Abstraction
B
Inheritance
C
Function overloading
D
None
Answer B
___________________________________________________________________________________________
The process of extracting the relevant attributes of an object is known as
A
Polymorphism
B
Inheritence

C
Abstraction
D
Data hiding
Answer B
___________________________________________________________________________________________
If a class C is derived from class B, which is derived from class A, all through public inheritance, then a class C
member function can access
A
Protected and public data only in C and B
B
Protected and public data only in C
C
Private data in A and B
D
Protected data in A and B
Answer D
___________________________________________________________________________________________
The process of building new classes from existing one is called ______.
A
Polymorphism
B
Structure
C
Inheritance
D
Cascading
Answer C
___________________________________________________________________________________________
This type of inheritance is a mixture of multiple inheritance and hierarchical inheritance
A
Single inheritance
B
Multiple inheritance
C
Hierarchical inheritance
D
Hybrid inheritance
Answer D
___________________________________________________________________________________________
The base class access specification determines how ___________ members in the base class may be accessed by
derived classes.
A
Private
B
Public
C
Protected
D
A,Band C
Answer D
___________________________________________________________________________________________
A base class may also be called a
A
Child class
B
Subclass
C
Derived class
D
Parent class
Answer D
___________________________________________________________________________________________
In multiple inheritance
A
The base classes must have only default constructors
B
Cannot have virtual functions
C
Can include virtual classes
D
None of the above
Answer C
Which of the statements are true ?
I. Function overloading is done at compile time.
II. Protected members are accessible to the member of derived class.
III. A derived class inherits constructors and destructors.
IV. A friend function can be called like a normal function.
V. Nested class is a derived class.

A
I, II, III
B
II, III, V
C
III, IV, V
D
I, II, IV
Answer D
___________________________________________________________________________________________
_________ members of a base class are never accessible to a derived class.
A
Public
B
Private
C
Protected
D
A,B and C
Answer B
___________________________________________________________________________________________
Assume that we have constructor functions for both base class and derived class. Now consider the declaration in main(
). Base * P = New Derived; in what sequence will the constructor be called ?
A
Derived class constructor followed by Base class constructor.
B
Base class constructor followed by derived class constructor.
C
Base class constructor will not be called.
D
Base class constructor will not be called.
Answer B
___________________________________________________________________________________________
When a sub class is inherited from only one super class .It is known as
A
Single inheritance
B
Multiple inheritance
C
Hierarchical inheritance
D
Multilevel inheritance
Answer A
___________________________________________________________________________________________
In multiple inheritance
A
The base classes must have only default constructors
B
Cannot have virtual functions
C
Cannot have virtual classes
D
None of the above
Answer C
___________________________________________________________________________________________
The polymorphism can be characterized by the phrase
A
One interface,multiple methods
B
Multiple interfaces,one method
C
One interface,one method
D
None of the above
Answer A
___________________________________________________________________________________________
The mechanism that binds code and data together and keeps them secure from outside world is known as
A
Abstraction
B
Inheritance
C
Encapsulation
D
Polymorphism
Answer C
___________________________________________________________________________________________
The term __________ means the ability to take many forms.
A
Inheritance
B
Polymorphism
C
Member function
D
Encapsulation

Answer B
___________________________________________________________________________________________
Runtime polymorphism is achieved by
A
Friend function
B
Virtual function
C
Operator overloading
D
Function overloading
Answer B
___________________________________________________________________________________________
RunTime Polymorphism is achieved by ______
A
Friend function
B
Virtual function
C
Operator overloading
D
Function overloading
Answer B
Usually a pure virtual function
A
Has complete function body
B
Will never be called
C
Will be called only to delete an object
D
Is defined only in derived class
Answer D
___________________________________________________________________________________________
Encapsulation is
A
Dynamic binding
B
A mechanism to associate the code and data.
C
Data abstraction
D
Creating new class
Answer B
___________________________________________________________________________________________
Identify the operator that is NOT used with pointers
A
->
B
&
C
*
D
>>
Answer D
___________________________________________________________________________________________

Consider the following statements


char *ptr;
ptr = hello;
cout << *ptr;
What will be printed?
A
first letter
B
entire string
C
it is a syntax error
D
last letter
Answer A
___________________________________________________________________________________________
Which of the following operator can be overloaded through friend function?
A
->
B
=
C
()
D
*
Answer D
___________________________________________________________________________________________
What will be the output of the following program?
#include<iostream.h>
void main()
{
float x=5,y=2;
int result;
result=x % y;
cout<<result;
}
A
1
B
1.0
C
Error message
D
2.5
Answer C
___________________________________________________________________________________________
Which of the following declarations are illegal?
A
void *ptr;
B
char *str = hello;
C
char str = hello;
D
const *int p1;
Answer C
___________________________________________________________________________________________

If we create a file by ifstream, then the default mode of the file is _________
A
ios :: out
B
ios :: in
C
ios :: app
D
ios :: binary
Answer B
___________________________________________________________________________________________
If the variable count exceeds 100, a single statement that prints Too many is
A
if (count<100) cout << Too many;
B
if (count>100) cout >> Too many;
C
if (count>100) cout << Too many;
D
None of these.
Answer C
___________________________________________________________________________________________
What is the following code segment doing?
void fn( ){
char c;
cin.get(c);
if (c != \n) {
fn( );
cout.put(c);
}
}
A The string entered is printed as it is.
B The string entered is printed as it is.
C It will go in an infinite loop.
D It will print an empty line.
Answer B
Which of the following will produce a value 10 if x = 9.7?
A
floor(x)
B
abs(x)
C
log(x)
D
ceil(x)
Answer D
___________________________________________________________________________________________
The address of a variable temp of type float is
A
*temp
B
&temp
C
float& temp
D
float temp&
Answer B
___________________________________________________________________________________________
What will be the values of x, m and n after the execution of the following statements?
int x, m, n;
m = 10;
n = 15;
x = ++m + n++;
A
x=25, m=10, n=15
B
x=26, m=11, n=16
C
x=27, m=11, n=16

D
x=27, m=10, n=15
Answer B
___________________________________________________________________________________________
for (; ;)
A
means the test which is done using some expression is always true
B
is not valid
C
will loop forever
D
should be written as for( )
Answer C
___________________________________________________________________________________________
Consider the following statements:
int x = 22,y=15;
x = (x>y) ? (x+y) : (x-y);
What will be the value of x after executing these statements?
A
22
B
37
C
7
D
5
Answer B
___________________________________________________________________________________________
If an array is declared as int a[4] = {3, 0, 1, 2}, then values assigned to a[0] & a[4] will be ________
A
3, 2
B
0, 2
C
3, 0
D
0, 4
Answer C
___________________________________________________________________________________________
To access the public function fbase() in the base class, a statement in a derived class function fder() uses the
statement.fbase();
A
fbase();
B
fder();
C
base::fbase();
D
der::fder();
Answer A
___________________________________________________________________________________________
If x =5, y =2 then x ^y equals________.
(where ^ is a bitwise XOR operator)
A
00000111
B
10000010
C
10100000
D
11001000
Answer A
___________________________________________________________________________________________
What will be the output of following program?
#include<iostream.h>
void main()
{
float x;
x=(float)9/2;
cout<<x;
}
A
4.5
B
4.0
C
4

D
5
Answer A
___________________________________________________________________________________________
The operator << when overloaded in a class
A
must be a member function
B
must be a non member function
C
can be both (A) & (B) above
D
cannot be overloaded
Answer C
Which of the following is the valid class declaration header for the derived class d with base classes b1 and
b2?
A
class d : public b1, public b2
B
class d : class b1, class b2
C
class d : public b1, b2
D
class d : b1, b2
Answer A
___________________________________________________________________________________________
In C++, dynamic memory allocation is accomplished with the operator ____
A
new
B
this
C
malloc( )
D
delete
Answer A
___________________________________________________________________________________________
What is the error in the following code?
class t
{
virtual void print();
}
A
No error
B
Function print() should be declared as static.
C
Function print() should be defined.
D
Class t should contain data members.
Answer A
___________________________________________________________________________________________
What is the output of the following code
char symbol[3]={a,b,c};
for (int index=0; index<3; index++)
cout << symbol [index];
A
abc
B
abc
C
abc
D
abc
Answer C
___________________________________________________________________________________________

What will be the result of the expression 13 & 25?


A
38
B
25
C
9
D
12
Answer C
___________________________________________________________________________________________
The operator that cannot be overloaded is
A
++
B
::
C
~
D
()
Answer B

You might also like