Escolar Documentos
Profissional Documentos
Cultura Documentos
A Always
B Sometimes
C Many times
D No time
Answer A
___________________________________________________________________________________________
The feature of the object oriented paradigm which helps code reuse is
A Object
B Class
C Inheritance
D Aggregation
Answer C
___________________________________________________________________________________________
A key concept of quality control is that all work products
A Are delivered on time and under budget
B Have complete documentation
C Have measurable specification for process outputs
D Are thoroughly tested before delivery to the customer
Answer C
___________________________________________________________________________________________
If the objects focus on the problem domain, then we are concerned with
A Object Oriented Analysis
B Object Oriented Design
C Object Oriented Analysis & Design
D None of the above
Answer A
___________________________________________________________________________________________
Which one of the following ISO standard is used for software process?
A ISO 9000
B ISO 9001
C ISO 9003
D ISO 9000-3
Answer D
___________________________________________________________________________________________
Software Engineering is a discipline that integrates _________ for the development of computer software.
A Process
B Methods
C Tools
D All
Answer D
___________________________________________________________________________________________
Modules X and Y operate on the same input and output data, then the cohesion is
A Sequential
B Communicational
C Procedural
D Logical
Answer B
___________________________________________________________________________________________
CASE Tool is
A Computer Aided Software Engineering
B Component Aided Software Engineering
C Constructive Aided Software Engineering
D Computer Analysis Software Engineering
Answer A
Key process areas of CMM level 4 are also classified by a process which is
A CMM level 2
B CMM level 3
C CMM level 5
D All of the above
Answer C
___________________________________________________________________________________________
Applications-software
A is used to control the operating system
B includes programs designed to help programmers
C performs a specific task for computer users
D all of the above
Answer C
___________________________________________________________________________________________
Which of the items listed below is not one of the software engineering layers?
A Process
B Tools
C Methods
D Manufacturing
Answer D
___________________________________________________________________________________________
Which
A
B
C
D
______
FAST
A
B
C
D
______
An ob
A
B
C
D
______
Which of the following statements is true
A Abstract data types are the same as classes
B Abstract data types do not allow inheritance
C Classes cannot inherit from the same base class
D Object have state and behavior
Answer B
___________________________________________________________________________________________
The main activity of the design phase of the system life cycle is to
A Replace the old system with new one
B Develop and test the new system
C Understand the current system
D Propose alternatives to the current system
Answer D
In the light of software engineering software consists of
A In the light of software engineering software consists of
B Data
C Documentation
D All of the above
Answer D
___________________________________________________________________________________________
The problem that threatens the success of a project but which has not yet happened is a
A Bug
B Error
C Risk
D Failure
Answer C
___________________________________________________________________________________________
The tools that support different stages of software development life cycle are called
A CASE tools
B CAME tools
C CAQE tools
D CARE tools
Answer A
___________________________________________________________________________________________
Waterfall model is a
A Linear model
B Iterative model
C Rapid model
D Interactive model
Answer A
___________________________________________________________________________________________
Which leads to blocking states in which some project team members must wait for the other members of
the team to complete dependent tasks?
A Ad hoc approach of prototyping
B Iterative nature of spiral model
C Linear nature of classic life cycle
D None of the above
Answer C
___________________________________________________________________________________________
Prototyping is used to
A test the software as an end product
B expand design details
C refine and establish requirements gathering
D None of the above
Answer C
___________________________________________________________________________________________
For a data entry project for office staff who have never used computers before (user interface and user-
friendliness are extremely important), one will use
A Spiral model
B Component based model
C Prototyping
D Waterfall model
Answer C
___________________________________________________________________________________________
What is an incremental software process model that emphasize an extremely short development cycle?
A RAD
B Prototyping
C Spiral
D None of these
Answer A
___________________________________________________________________________________________
A COCOMO model is
A Common Cost Estimation Model
B Constructive Cost Estimation Model
C Complete Cost Estimation Model
D Comprehensive Cost Estimation Model
Answer B
___________________________________________________________________________________________
Prototyping is preferred by
A Customer
B Developer
C No one
D Both
Answer B
___________________________________________________________________________________________
The formal methods model of software development makes use of mathematical methods to
A Define the specification for computer based systems
B Develop defect free computer based systems
C Verify the correctness of computer based systems
D All of the above
Answer D
In the spiral model risk analysis is performed
A In the first loop
B In the first and second loop
C In every loop
D Before using spiral model
Answer C
___________________________________________________________________________________________
An SRS
A establishes the basis for agreement between client and the
supplier.
B provides a reference for validation of the final product
C is a prerequisite to high quality software
D all of the above.
Answer D
___________________________________________________________________________________________
The model that assumes that effort and development time are functions of product size alone is
A Basic COCOMO model
B Intermediate COCOMO model
C Detailed COCOMO model
D All the three COCOMO models
Answer A
___________________________________________________________________________________________
The COCOMO model was introduced in the book title Software Engineering Economics authored by
A Abraham Silberschatz
B Barry Boehm
C C.J. Date
D D.E. Knuth
Answer B
___________________________________________________________________________________________
The spiral model of software development
A Ends with the delivery of the software product
B Is more chaotic than the incremental model
C Includes project risks evaluation during each iteration
D All of the above
Answer C
___________________________________________________________________________________________
LOC measure is a
A Size oriented metrics
B Function oriented metrics
C Both a and b
D None of the above
Answer A
Which of these are the 5 generic software engineering framework activities ?
A Communication, planning, modelling, construction, deployment
B Communication, risk management, measurement, production, reviewing
C Analysis, designing, programming, Debugging, maintenance
D Analysis, planning, designing, programming, testing
Answer A
___________________________________________________________________________________________
Modifying the software to match changes in the ever changing environment is called
A Adaptive maintenance
B Corrective maintenance
C Perfective maintenance
D Preventive maintenance
Answer A
___________________________________________________________________________________________
Which is not a step of requirement engineering?
A Requirements elicitation
B Requirements analysis
C Requirements design
D Requirements documentation
Answer C
___________________________________________________________________________________________
The system specification is the first deliverable in the computer system engineering process which does not
include
A The system specification is the first deliverable in the computer system engineering process which does not
include
B Cost
C Schedule
D Technical Analysis
Answer A
___________________________________________________________________________________________
SRD stands for
A Software requirements definition
B Structured requirements definition
C Software requirements diagram
D Structured requirements diagram
Answer B
___________________________________________________________________________________________
If a program in its functioning has not met user requirements is some way, then it is
A An error
B A failure
C A fault
D A defect
Answer D
___________________________________________________________________________________________
Which of the following models can be used to represent the architectural design of a piece of software?
A Dynamic models
B Functional models
C Structural models
D All of these
Answer D
___________________________________________________________________________________________
Which of the following graph theoretic concept will be useful in software testing?
A Cyclomatic number
B Hamiltonian circuit
C Eulerian cycle
D None of the above
Answer A
___________________________________________________________________________________________
A non functional software testing done to check if the user interface is easy to use and understand
A Usability testing
B Security testing
C Unit testing
D Black box testing
Answer A
___________________________________________________________________________________________
Which of the following testing methods is normally used as the acceptance test for a software system?
A Regression testing
B Integration testing
C Unit testing
D Functional testing
Answer D
OPERATING SYSTEM
Multiprogramming systems
The operating system creates _____ from the physical computer
A Virtual space
Are
B Virtual computers
easie
C Virtual device
rDto None
devel
Answer B
op
___________________________________________________________________________________________
than
singl Execute each job faster
e
progr
amm
ing
syste
msB
C Execute more jobs in the same time period
D Are used only one large mainframe computers
Answer C
____
____
____
____
____
____
____
____
____
____
____
____
____
____
____
____
____
____
____
____
____
____
___
Overlay is
A A part of Operating System
C A single contiguous memory that was used in the olden days for running large programs by swapping
D Overloading the system with many user
CPUfiles
does not perform the operation
Answer C A Data transfer
___________________________________________________________________________________________
B Logic operation
C Arithmetic operation
D All of the above
Answer D
________________________________________________________________
___________________________
A bootstrap is
A A memory device
B A device to support the computer
C A small initialisation program to start up a computer
D An error correction technique
Answer C
________________________________________________________________
___________________________
Which is the first program run on a computer when the computer boots up?
A System software
B Operating system
C System operations
D None
Answer B
___________________________________________________________________
________________________
The operating system that reads and reacts in terms of actual time is
A Batch system
B Quick response system
C Real time system
D Time sharing system
Answer C
___________________________________________________________________
________________________
What is a shell ?
A It is a hardware component
B It is a command interpreter
C It is a part in compiler
D It is a tool in CPU scheduling
Answer B
Which is the layer of a computer system between the hardware and the user
program
A Operating environment
B Operating system
C System environment
D None
Answer B
______________________________________________________________________
_____________________
A relationship between processes such that each has some part (critical section)
which must not be executed while the critical section of another is being executed,
is known as
A Semaphore
B Mutual exclusion
C Multiprogramming
D Message passing
Answer B
______________________________________________________________________
_____________________
Which of the following information bits used by the various page replacement
policies indicates if the page has been called lately?
A Locality bit
B Status bit
C Referenced bit
D Modified bit
Answer C
______________________________________________________________________
_____________________
A sequence of instructions,in a computer language to get the desired result is
known as
A Process
B Program
C Software
D None of these
Answer A
______________________________________________________________________
_____________________
Given memory partitions of 100K, 500K, 200K, 300K and 600K (in order) and
processes of 212K, 417K, 112K, and 426K (in order), using the first-fit algorithm
in which partition would the process requiring 426K be placed?
A 100K
B 500K
C 200K
D 600K
Answer D
______________________________________________________________________
_____________________
The operating system of a computer serves as a software interface between the user
and
A Software
B Hardware
C Processor
D Compiler
Answer C
________________________________________________________________________
___________________
The mechanism that bring a page into memory only when it is needed is called
A Segmentation
B Fragmentation
C Demand Paging
D Page Replacement
Answer C
________________________________________________________________________
___________________
With a four programs in memory and with 80% average I/O wait, the CPU
utilization is?
A 60%
B 70%
C 90%
D 100%
Answer A
________________________________________________________________________
___________________
In time sharing operating system ,when the time slot given to a process is
completed ,the process goes from running state to the
A Blocked state
B Ready state
C Suspended state
D Terminated state
Answer B
________________________________________________________________________
___________________
Situations where two or more processes are reading or writing some shared datas
and the final result depends on who runs precisely when are called
A Race conditions
B Critical sections
C Mutual exclusions
D Message passing
Answer A
________________________________________________________________________
___________________
Switching the CPU to another Process requires to save state of the old process and
loading new process state is called as
A Process Blocking
B Context Switch
C Time Sharing
D None of the above
Answer B
________________________________________________________________________
___________________
A page fault
A is an error specific page.
B is an access to the page not currently in memory.
C occur when a page program occur in a page memory.
D page used in the previous page reference.
Answer B
________________________________________________________________________
___________________
Several processes access and manipulate the same data concurrently and the outcome
of the execution depends on the particular order in which the access takes place, is
called a(n) ____________________ .
A Shared memory segments
B Race condition
C Entry section
D Process synchronization
Answer B
__________________________________________________________________________
_________________
A thread
A Is a lightweight process where the context switching is low
B Is a lightweight process where the context switching is high
C Is used to speed up paging
D None of the above
Answer A
__________________________________________________________________________
_________________
In round robin CPU scheduling as time quantum is increased the average turn around
time
A increases
B decreases
C remains constant
D varies irregularly
Answer D
__________________________________________________________________________
_________________
Cascading termination refers to termination of all child processes before the parent
terminates
A Normally
B Abnormally
C Normally or abnormally
D None of these
Answer C
__________________________________________________________________________
_________________
A special software that is used to create a job queue is called
A Drive
B Spooler
C Interpreter
D Linkage editor
Answer B
Assume N segments in memory and a page size of P bytes. The wastage on account of
internal fragmentation is
A NP/2 bytes
B P/2 bytes
C N/2 bytes
D NP bytes
Answer A
____________________________________________________________________________
_______________
In Round Robin cpu scheduling as the time quantum is increased ,the average turn
around time
A Increases
B Decreases
C Remains constant
D Varies irregularly
Answer D
____________________________________________________________________________
_______________
Consider the following transactions with data items P and Q initialized to zero:
T1 :read (P);
read (Q);
if P = 0 then Q := Q + 1 ;
write (Q).
T2 : read (Q);
read (P);
if Q = 0 then P := P + 1 ;
write (P).
Any non-serial interleaving of T1 and T2 for concurrent execution leads to
A a serializable schedule
B a schedule that is not conflict serializable
C a conflict serializable schedule
D a schedule for which a precedence graph cannot be drawn
Answer B
____________________________________________________________________________
_______________
Mutual exclusion problem occurs between
A Two disjoint processes that do not interact
B Processes that share resources
C Processes that don not use the same rssources
D None of these
Answer B
____________________________________________________________________________
_______________
Consider a logical address space of 8 pages of 1024 words mapped with memory of 32
frames. How many bits are there in the physical address ?
A 9 bits
B 11 bits
C 14 bits
D 15 bits
Answer D
____________________________________________________________________________
_______________
___________ is a technique of improving the priority of process waiting in Queue for CPU
allocation
A Starvation
B Aging
C Revocation
D Relocation
Answer B
____________________________________________________________________________
_______________
A semaphore count of negative n means (s=n) that the queue contains ________ waiting
processes.
A n+1
B n
C n-1
D 0
Answer B
_______________________________________________________________________________
____________
Resources are allocated to the process on non-sharable basis is
A mutual exclusion
B hold and wait
C no pre-emption
D circular wait
Answer A
_______________________________________________________________________________
____________
In order to allow only one process to enter its critical section, binary semaphore are
initialized to
A 0
B 1
C 2
D 3
Answer B
_______________________________________________________________________________
____________
Consider the following page trace : 4,3, 2, 1, 4, 3, 5, 4, 3, 2, 1, 5. Percentage of page fault that
would occur if FIFO page replacement algorithm is used with number of frames for the JOB
m=4 will be
A 8
B 9
C 10
D 12
Answer C
_______________________________________________________________________________
____________
A system has 3 processes sharing 4 resources.If each process needs a maximum of 2 units
,then
A Deadlock can never occur
B Deadlock may occur
C Deadlock has to occur
D None of these
Answer A
_______________________________________________________________________________
____________
Consider the methods used by processes P1 and P2 for accessing their critical sections. The
initial values of shared Boolean variables S1 and S2 are randomly assigned,
P1 P2
while (S1 = = S2); while (S1 = = S2);
critical section critical section
S1 = S2; S1 = S2;
Which one of the following statements describes the properties achieved ?
A Mutual exclusion but not progress
B Progress but not mutual exclusion
C Neither mutual exclusion nor progress
D Both mutual exclusion and progress
Answer C
_______________________________________________________________________________
____________
The scheduling in which CPU is allocated to the process with least CPU-burst time is called
A Priority Scheduling
B Shortest job first Scheduling
C Round Robin Scheduling
D Multilevel Queue Scheduling
Answer B
_______________________________________________________________________________
____________
Which of the following approaches do not require knowledge of the system state?
A Deadlock detection
B Deadlock prevention
C Deadlock avoidance
D None of the above
Answer D
_________________________________________________________________________________
__________
Three concurrent processes X, Y, and Z execute three different code segments that access and
update certain shared variables. Process X executes the P operation (i.e., wait) on semaphores
a, b and c; process Y executes the P operation on semaphores b, c and d; process Z executes the
P operation on semaphores c, d, and a before entering the respective code segments. After
completing the execution of its code segment, each process invokes the V operation (i.e., signal)
on its three semaphores. All semaphores are binary semaphores initialized to one. Which one of
the following represents a deadlock- free order of invoking the P operations by the processes?
A X : P (a ) P (b) P (c ) Y : P (b ) P (c) P (d) Z : P (c ) P (d) P (a)
B X : P (b ) P (a) P (c ) Y : P (b ) P (c) P (d) Z : P (a ) P (c ) P (d)
C X : P (b ) P (a) P (c ) Y : P (c ) P (b) P (d) Z : P (a ) P (c ) P (d)
D X : P (a ) P (b) P (c ) Y : P (c ) P (b) P (d) Z : P (c ) P (d) P (a)
Answer B
_________________________________________________________________________________
The purpose of a Memory Management Unit is to ___________ .
A Perform run-time mapping from virtual to physical addresses
B Ensure protection of the memory space allocated to every process
C Both A and B are correct responses
D None of these responses is correct
Answer A
___________________________________________________________________________________
________
Virtual memory is
A related to virtual reality
B a form of ROM
C a form of RAM
D None of the above
Answer C
___________________________________________________________________________________
________
A static partitioned memory management system has a total of six partitions. If one is allocated to
the operating system, this will allow a total of
A Five user jobs
B Six user jobs
C Thirty-two user jobs
D Thirty-six user jobs
Answer A
______________________________________________________________________________________
_____
Consider the virtual page reference string
1, 2, 3, 2, 4, 1, 3, 2, 4, 1
on a demand paged virtual memory system running on a computer system that has main memory
size of 3 page frames which are initially empty. Let LRU, FIFO and OPTIMAL denote the number
of page faults under the corresponding page replacement policy. Then
A OPTIMAL < LRU < FIFO
B OPTIMAL < FIFO < LRU
C OPTIMAL = LRU
D OPTIMAL = FIFO
Answer B
______________________________________________________________________________________
_____
On a disk with 1000 cylinders (0 to 999) find the number of tracks, the disk arm must move to satisfy
all the requests in the disk queue. Assume the last request service was at track 345 and the head is
moving toward track 0. The queue in FIFO order contains requests for the following tracks :
123, 874, 692, 475, 105, 376
(Assume SCAN algorithm)
A 2013
B 1219
C 1967
D 1507
Answer B
______________________________________________________________________________________
_____
Which of the following types of terminals is entirely dependent for all its capabilities on the computer
system to which it is connected?
A Smart terminal
B Dumb terminal
C Micro computer
D None of these
Answer B
________________________________________________________________________________________
___
Which of the following is the process by which a users access to physical data in the application is limited,
based on his privileges ?
A Authorization
B Authentication
C Access Control
D All of these
Answer C
__________________________________________________________________________________________
_
Which of the following topologies consists of multiple CPUs connected by a single communication line
running the length of the network?
A Tree
B Ring
C Star
D Bus
Answer D
___________________________________________________________________________________________
An audit log
A Simply records the time
B User
C Type of all access to an object
D All of these
Answer B
___________________________________________________________________________________________
All of the following are examples of real security and privacy risks except
A Hackers
B Spam
C Viruses
D Identify theft
Answer B
___________________________________________________________________________________________
Which model estimates the total effort in terms of person,months of the technical project staff?
A Spiral
B Waterfall
C Prototyping
D COCOMO model
Answer D
Lowest level of security is
A A
B B
C C
D D
Answer A
___________________________________________________________________________________________
______
Which
A
B
C
D
______
What
A T
B T
C T
D A
A
______
HTML is defined using SGML an _______ standard, information processing-text and office systems
(SGML) for text information processing.
A ISO 8878
B ISO 8879
C ISO 8880
D ISO 8881
Answer B
___________________________________________________________________________________________
Which of the following identifies a specific web page and its computer on the Web?
A Web site
B Web site address
C URL
D Domain Name
Answer D
___________________________________________________________________________________________
XML is a
A Imperative language
B Declarative language
C Standard
D None of these
Answer B
___________________________________________________________________________________________
Node in XML is
A Any part of the document whether it is elements ,attributes or otherwise
B Referred only to the attributes
C Referred to the top element in the document
D None of these
Answer A
Well formed XML document means
A It contains a root element
B It contain an element
C It contains one or more elements
D Must contain one or more elements and root element must contain all other elements
Answer D
___________________________________________________________________________________________
XML DSOs has the property for the number of pages of data the recordset contains
A Count
B Number
C Pagecount
D Pagenumber
Answer C
___________________________________________________________________________________________
DOM is a
A A parser
B Specification
C Coding style
D None of these
Answer A
___________________________________________________________________________________________
XPATH used to
A Address your documents by specifying a location path
B Address the server
C Store the IP of the server
D None of these
Answer A
___________________________________________________________________________________________
Microsoft XML schema data types for hexadecimal digits representing octates
A UID
B UXID
C UUID
D XXID
Answer C
___________________________________________________________________________________________
The tags in XML are
A Case insensitive
B Case sensitive
C Browser dependent
D None of these
Answer B
___________________________________________________________________________________________
What is XML?
A Subset of SGML,Extensible Markup Language
B Superset of SGML,Extensible Markup Language
C Like SGML ,Extended Markup Language
D None of these
Answer A
___________________________________________________________________________________________
XML
A Can be used as a database
B Cannot be used as a database
C XML is not a database ,it is language
D None of these
Answer A
___________________________________________________________________________________________
Characteristic encoding is
A Method used to represent numbers in a character
B Method used to represent character in a number
C Not a method
D None of these
Answer A
___________________________________________________________________________________________
The web standard allows programmers on many different computer platforms to dispersed format and
display the information server.These programs are called
A Web browsers
B HTML
C Internet Explorer
D None of these
Answer A
___________________________________________________________________________________________
MSXML is
A A Microsoft language
B XML parser that ships with IE5.0
C Used for interacting with XML
D None of these
Answer B
___________________________________________________________________________________________
In which section of a process,the information about the arguments to the program are available?
A Data
B Text
C Stack
D User block
Answer C
___________________________________________________________________________________________
The exception to the fact that any process in UNIX ,has a parent is
A Dev
B Sh
C Kernel
D Login
Answer C
___________________________________________________________________________________________
Which of the following keys is used to replace a single character with new text?
A S
B s
C r
D C
Answer B
___________________________________________________________________________________________
Which command will be used with vi editor to append text at end of line?
A A
B i
C a
D I
Answer A
___________________________________________________________________________________________
Which command is used to display the device name of the terminal you are using?
A who
B ls
C tty
D stty
Answer C
Which command allows you to view your file 24 lines at a time ?
A More
B Cat
C Pg
D None of the above
Answer A
___________________________________________________________________________________________
Which command is used with vi editor to move the cursor to the left?
A i
B k
C j
D h
Answer D
___________________________________________________________________________________________
Which of the following changes permission to deny write permission to group and others?
A Chmod go-w filex
B Chmod go w filex
C Chmod go=w file
D None of the above
Answer A
___________________________________________________________________________________________
Which of the following commands is used to count the total number of lines,words and characters
contained in a file?
A count p
B wcount
C wc
D count w
Answer C
___________________________________________________________________________________________
The cc command makes a total of
A 1 pass
B 2 pass
C 4 pass
D 5 pass
Answer D
___________________________________________________________________________________________
The Unix command used to find out the number of characters in a file is
A nc
B wc
C chcnt
D c
Answer B
___________________________________________________________________________________________
In a system ,if 5 people are currently using vi editor ,then the number of corresponding processes will be
A 1
B 5
C 3
D 0
Answer B
___________________________________________________________________________________________
Which set option is used with vi editor to display line numbers on screen?
A nm
B nu
C ic
D li
Answer B
___________________________________________________________________________________________
Which command will be used with vi editor to move back to the beginning of a word?
A b
B e
C a
D w
Answer A
When a process makes a system call ,its mode changes from
A User to kernel
B Kernel to user
C Restricted to unrestricted
D Unrestricted to restricted
Answer A
___________________________________________________________________________________________
Which of the following system calls transforms an executable binary file into a process?
A Fork
B Exec
C Ioct1
D Longjmp
Answer B
___________________________________________________________________________________________
The cat command is used to
A Print a file
B Display a file
C Capture a file
D Copy a file
Answer B
___________________________________________________________________________________________
Which of the following file names can be found in more than one directory?
A Passwd
B Bin
C Date
D None of the above
Answer A
___________________________________________________________________________________________
Command_________compares two files byte by byte and displays the first mismatch.
A cmp
B comp
C cmap
D None of these
Answer A
When the read system call encounters EOF ,it returns
A Some positive integer
B Some negative integer
C 0
D -1
Answer C
___________________________________________________________________________________________
To allow only one user to work with a particular file at a particular time ,one has to
A Semaphore
B Critical region
C Locking
D Dedicated mode
Answer C
___________________________________________________________________________________________
Which of the following are character special files?
A Terminal
B Printer
C Modem
D Tape drive
Answer B
___________________________________________________________________________________________
Which of the following sections of an executable binary file has all uninitialized data items?
A BSS
B Data
C Header
D Symbol
Answer A
___________________________________________________________________________________________
Which of the following system calls,does not return control to the calling point, on termination?
A Fork
B Exec
C Ioct1
D Longjmp
Answer B
___________________________________________________________________________________________
The first thing that is searched when a command references a file is its
A i node
B i node number
C Permission
D None of the above
Answer B
___________________________________________________________________________________________
Profilers are
A Tools that analyze the run time behavior of a program
B Tools that check C code for cross file consistency
C Tools that keep track of evolving versions of a file
D None of the above
Answer A
___________________________________________________________________________________________
Which of the following tools can be used to keep track of evolving version of a file?
A Make
B Yacc
C SCCS
D dv
Answer C
Which command is used to display and create files?
A cat
B ed
C vi
D lyrix
Answer A
___________________________________________________________________________________________
Files that can store data in the same format as used in program are called
A Binary files
B Source file
C Text file
D Core
Answer A
___________________________________________________________________________________________
Which is the earliest and most widely used shell that came with the UNIX system?
A C Shell
B Korn Shell
C Bourne Shell
D Smith Shell
Answer C
___________________________________________________________________________________________
Environment variables can be accessed by
A System programs
B C programs
C Shell scripts
D None of the above
Answer C
___________________________________________________________________________________________
Which of the following shell scripts looping features does not recognize the break command?
A While
B Until
C For
D None of the above
Answer D
___________________________________________________________________________________________
Shell functions
A Are another name for shell procedures
B Execute faster than shell procedures
C Are executed by a new shell
D Are not executed by new shell
Answer D
OOP
The members of a class by default are
A Public
B Protected
C Private
D Mandatory to specify
Answer C
___________________________________________________________________________________________
Exception handling is targeted at
A Run-time error
B Compile time error
C Logical error
D All of the above
Answer A
___________________________________________________________________________________________
You separated a derived class name from its access specifier with
A A colon
B Two colons
C Atleast one space
D A semi colon
Answer B
___________________________________________________________________________________________
An exception is caused by
A A hardware problem
B A problem in the operating system
C A syntax error
D A run-time error
Answer D
___________________________________________________________________________________________
An object is
A One instance of a class
B Another word for a class
C A class with static method
D A method that accesses class
Answer A
___________________________________________________________________________________________
cfront
A is the front end of a C compiler
B is the per-process of a C compiler
C is a tool that is translated a C++ code to its equivalent C code
D None of above
Answer C
A class defined within another class is
A Nested class
B Inheritance
C Containership
D Encapsulation
Answer A
___________________________________________________________________________________________
At which point of time a variable comes into existence in memory is determined by its
A Scope
B Storage class
C Data type
D All of the above
Answer B
___________________________________________________________________________________________
A virtual class is the same as
A An abstract class
B A class with a virtual function
C A base class
D None of the above
Answer D
___________________________________________________________________________________________
Member of a class specified as _______ are accessible only to method of the class.
A private
B public
C protected
D derive
Answer A
___________________________________________________________________________________________
When a child class function is called,the compiler looks first for a matching function name in the
A Class of the object using the function name
B Immediate ancestor class
C Base class
D Descendant class
Answer A
___________________________________________________________________________________________
Encapsulation is
A Dynamic binding
B A mechanism to associate the code and data.
C Data abstraction
D Creating new class
Answer B
___________________________________________________________________________________________
If the variable count exceeds 100, a single statement that prints Too many is
A if (count<100) cout << Too many;
B if (count>100) cout >> Too many;
C if (count>100) cout << Too many;
D None of these.
Answer C
___________________________________________________________________________________________
Which of the following is the valid class declaration header for the derived class d with base classes b1 and
b2?
A class d : public b1, public b2
B class d : class b1, class b2
C class d : public b1, b2
D class d : b1, b2
Answer A
___________________________________________________________________________________________