CSC

1.With framework CASE tools IPSE can be achieved.IPSE is

           a.integrated product software engineering.

           b.integrated productivity simulation environment

           c.inner project software estimation

           d.integreted project support environment

2.Data structured system devolepment (DSDD) is also called one of the below which is evolved from work on information domain analysis

           a.j.d.methodology

           b.yourdon methodology

           c.warnier-or methodology

           d.Kevin-yenn methodology

 3.A).COCOMO estimation model is a single valued model to compute software development effort(and cost)as a function of program

          size expressed in estimated lines of codes.

    B).PUTNAM model is single valued model assuming a specific distribution of effort over life of software development project.

     Answer:

             a. only A)is correct

             b. only B)is correct

             c. A) and B)is correct

             d. A)and  B)is wrong

4.when in data coupling portion of a data structure(rather than simple argument)is passed via a model interface it is called one of the below

              a.control coupling

               b.stamp coupling

               c.sub-coupling

               d.reference coupling

5. What is measure of reliability for a computer based system if

MTBF=mean time between failure.MTTF=mean time to failure.

MTTR=mean time to recover

              a.MTBF=MTTF/MTTR

              B.MTBF=MTTF*MTTR

              C.MTTR=MTTF*MTBF

              D.MTBF=MTTF+MTTR

6.In FURPS quality factors by HEWERT PACKAR

    A).functionality is accessed by evaluating one feature of

         program and capability of algorithm only

    B).supportability means breath of potential application and depth

         of standards used

             a. A)and B)both correct

             b. A)correct B)wrong

             c. A)wrong   B) correct

             d. A)and     B) both are wrong

(this question is not clear try to understand. The question may be one of the below. Okay?)

7. The testing method of basis path testing, which software metric provides quantitative measure of logical complexity of program and

     set of independent path in basis set of program?

                                                                                  (or)

      Your testing of basis paw message means software devolepment quatiative measure of logical complexity program of

       independent path in search of program

          a.data cycle complexity

          b.path complexity metric

          c.cyclomatic complexity

          d.none of above

8.as a general rule

    a.MIS performane criteria determine management information need  and these needs determine the objective of the firm

     b.the objective of the firm determine the management information needs and these needs determine the MIS performance criteria

     c.management information needs determine the MIS performance criteria and these criteria determine the objective of firm

     d.the objectives of firm determine the MIS performance criteria and these criteria detemine the management information needs.

Answer: a) a b)  b c) c d) d

9.which of the following is not a component of decision support  system(dSS)?

            a.language sys

            b.knowledge sys

            c.problem processing sys

            d.none

10.A relatively small project is to be developed by a small team with good application experience needing to fulfill less than rigid requirements.           Using the basic COCOMA model calculate the effort in person-months if the estimated lines of code is 33,200

               a.95 person-months.

               b.111 person-months

               c.102 person-months

              d.87 person-moths

11.CRC modeling provides a way for identifying classes their responsibilities and their collaboration .a collabration refers to.

              a.services provided by a class to other classes

              b.requests sent by a class to other classes to fulfill its own responsibility.

             c.taxonomy of class types

             d.characterstics of a class

12.A software was developed using component assembly model.after some time and old componet is to be replaced by a new one

     without disturbing the overall fuctioning of the softwarwe.following statements is true.

             a.the new component should be developed in the same language as the old one

             b.the new component should have exactly the same attribute as the old one.

             c.the new component should implement exactly the same methods as the old one.

             d.The new component should provide exactly the same interface as the old one. 

13.A real time system is to be developed .the choice of database would most appropriately be

          a.distributed databases because the reduce redundancy of data.

          b.distributed databases because it facilitate parallel data  processing through miultitasking

          c.centralized databases because of high computing power the server has.

          d.centralized databases because they provide better deadlock handling mechanism.

14.the following statement is equavalence echo~

           a.echo SHOME

           b.SHOME

           c.pwd

           d.ps

15.the equavalent of following statement is echo~bin

            a.echosbin

            b.echo bin

            c.pwd

           d.echo pwd

16.The command that gives the process of ID of last command invoked

            a.$@

            b.$#

             c.$!

            d.$$

17.The output of the following shell script

      $set-a planets mecury venus

      $planets[9]=Pluto

       $print ${planets[*]}

       a.planets

       b.mercurity venus puto

      c.Pluto mercury Pluto

      d.gives an error

18."let"command is used for

        a.command substitution

        b.arithmetic calculation

        c.to create analias

        d.not used

19.name the relationship(s) that denotes some semantic dependency among otherwise unrelated classes.

          a.generilazation or specification.

          b.part of

          c.association

         d.all of the above

20.Object persistence is best described by the following

     a.the ability to retain an object throughout the execution of a method

     b.the ability to retain an object throughout the execution of a program

     c.the ability to save objects from one execution of a program to the text.

     d.the ability to retain an object throughout time and or space

21.what is socket ? how many required to make connection between two systems

          a.a socket is 2-tuple having protocol and port number and  requires 4 sockets

          b.a socket is 3-tuple having protocol address and port number and requires 4 sockets

          c.a socket is 2-tuple having protocol and address and requires 2 sockets

          d.a socket is 3-tuple having protocol ,address and port number and requires 2 sockets

22.TCP/IP runs on

         a.an Ehtener

         b.a token ring

        c.an x.25 net

       d.all of the above

23.The job of fragmentation and re-assembly of datagrams in TCP/IP protocol suite is done by

        a.network access layer

        b.internet layer

        c.transport layer

        d.application layer

24.the sequence number in TCP header is used to

          a.identify the first byte of the enclosed data in the segment

          b.identify the computer

          c. identify the port on which server is running

          d.none

25.What is output of the final echo command

         $x=hell0

         $ echo'x=goodbye'>sedtx

         $sh setx ;x=bye

         $echo $x

            a.hello

            b.goodbye

            c.bye

            d.none

26. what would be the output of the following echo command in sequence?

            $x=1

            $echo'x=2'>setx

            $sh setx

            $echo $x

            $x=3

            $setx

           $echo $x

                  a.2,2

                 b.1,2

                 c2,3

                 d.1,3

27.Memory reference instruction branch subroutine (BSB) IS given instruction transferming control to subroutine

       b.first word of the subroutine

       c.address of next instruction in sequence which is presently held in pc (return addres)

      d.another BSBinstruction

28.Assume memory units has 65536 words of 8 bits each. the number of bits in program counter, accumalator, memory address register,

      instruction register are respectively

         a.16,8,16,8

         b.16,16,8,8

         c.8,16,8,16

        d.8,8,16,16

29.Which of the following instruction is used to load 2050h address to HL register pair?

        a.LOD  H,2050H

       B.LOAD H,2050H

       C.LXI H,2050H

       D.LDA H,2050H

30.What will be the value of the accumalator having AAH after executing RLC instruction twice?

       a.55h

       b.abh

       c.bah

        d.aah

31.The top of the stack contains 5A & next byte down the stack is 14(all address in hexadecimal) the stack pointer (sp) containts

       3A56.an instruction call subroutine stored at location 67AE which is 3 bytes long is located at memory address 013F. What shall

       be the contents of Program Counter, SP and stack respectively after the call instruction is executed?    PC   SP   stack

             a. 67AE 3A58 42,01,5A,14

             b. 0142 3A58 01,42,5A,14

             c. 67AE 3A56 42,01,5A,14

             d. 0142 3A56 01,42,5A,14

32. Time oriented metrics is one of the below i.e. times it takes to analyze change request, design an appropriate modification,

        implement the change, test it and distribute to all users. 

            a. MTBR           b. MTTC           c. MTBW       d. MTTW

33. Which of the following is not a tool for application prototyping?

          a. Application Generators.

           b. Third Generation Languages

          c. Screen Generators

         d. Report Generators.

34. For Real time process control or embedded software application having high algorithmic complexity programs. Which software

       process metrics would be most suitable for project measurements?

                 a. size oriented metrics

                 b. Function point metrics

                 c. Feature Point metrics.

                 D6.3d functionpoint metrics

35. Regression testing is:

                a. Testing the System under extreme conditions.

                 b. Testing the System after a new component is integrated into it to make sure that no additional errors are introduced.

                 c. Testing the system with an exhaustive range of data to make sure that all the conditions are tested.

                  d. Testing of a module by its developer before releasing it for integration with the entire system.

36. For a module to be strongly cohesive:

                 a. it should ideally perform just one function.

                 b. it should have well defined relationships with other modules in the system.

                 c. It should be compact in size.

                 d. It should not take any data as input parameter.

37. The approach used in Top Down Analysis and design is:

                 a. To identify a top level function by combining many smaller componen into a single entity.

                 b. To identify a top level function and then create a hierarchy of lower level modules and components.

                 c. To prepare flowchart after programming has completed.

                 d. None of the above.

38. Engineers use the CASE tolls to:

                  a. Analyze these requirements and determine their feasibility.

                  b. Design the system's general algorithms.

                  c. Design an actual detailed implementation in terms of target environment.

                  d. All of the above.

39. While constructing a data dictionary, the analyst considers:

                  a. Each data flow in the DFD has one data dictionary entry.

                  b. Definitions must be readily accessible by name.

                  c. There should be no redundancy in data definition.

                  d. All of the above.

40. The procedure for evaluating relative performance of defferent systems is referred to as:

                   a. Parallel processing.

                   b. Bench marking.

                   c. Comparative analysis.

                   d. Standard Evaluation.

41. The variable used to change the secondary promt string is:

                   a. PS3

                   b. PS1

                   c. PS2

                   d. Not possible.

42. The command used to send signals to specified job:

                    a. send

                    b. kill

                    c.stop

                    d. kill

43. When the complexity of a problem domain is modeled in an Object Oriented design, it takes the form of a

                     a. Hierarchy      b. Graph        c. Tree           d. none

44. Which of the following statements is true?

                    a. An object has a state, behaviour and identity.

                    b. An object has only state and behaviour.

                    c. An object has only behaviour and identity.

                   d. An object has state and identity.

45. Object Oriented Analysis is a method

        a. In which the system is viewed as a set of autonomous agents  that collaborate to perform higher level behaviour.

         b. In which programs are organized as co-operative collection of objects, each of which represents an instance of some classes

              and whose classes are all a members of a hierarchy classes united via inheritance relationships.

          c. Encompassing the process of object oriented decomposition and a notation for depicting both logical and physical as well as

              static and dynamic models of a system.

           d.That examines requirements from the perspective of the classes and objects found in the vocabulary of the problem domain.

46. Encapsulation constitutes:

          a. Identifying the essential characteristics of an object.

          b. Separation of contractual interface of an abstraction and its implementation.

          c. The property of a system that is decomposed into a set of acohesive and loosely coupled modules.

          d. Ordering of abstractions.

47. The enforcement of the class of an object is reffered to as:

          a. Modularity        b. Abstraction         c. Typing         d. Binding

48.The Gateway and the Router are used in the following sense :

      a. Gateway moves the data between different networks of the  same protocol and the Router moves the data between different

            network of different protocol.

       b. Gateway moves the data between different networks if different protocols and the Router moves the data between different

             network of the same protocol.

       c. Gateway and the router are used for security.

       d. None of the above.

49. Which of the following is a Network Mamagement Protocol?

         a.DNS

         B.CMIP

         C.TELLNET

          D.TCPMP

50.Ip uses 4bytes addressing. how many bytes address IPX uses-

           a.12

           b.16

           c.8

           d.10

51.Ipaddress 192.10.100.3is an example of the class

            a.A

            b.B

            c.C

            d.D

52. in TCP/IP protocol suite the protocol which controls the flow of data is-

            a.ARP

            b.ICMP

            c.RARP

            d.IP

53.ARP protocol is used to-

            a.map IP address to physical address

            b.map EthernetAddress to IP address

            c.both of above

            d.none of above

54.what is the output ofthe two echo commands

           $export x

           $x=1

            $sh -

           $echo sx

           $x=2

           $ctrl-d leave this shell

           $echo$sx

          a.1,1

b.1,2

c.blank,2

d.none oe abovge

55.The command

$sleep10;date&

a.sleep and date both run simultanously in background

b.sleep and date both run simultanously,sleep in foreground and date in background

c.after sleep finishes running in foreground than date runs in foreground

                           d.none

56.Following are the contents of a file file

echo $#

echo $*

echo$0

echo $1

      what would be output of following

$ shfiles 1,2,3

a.3

1,2,3

file

1

b.1,2,3

4

1

2

c.file 1

4

1

2

d.none

57.What will be the outputs of the following commands

expr 4+3

expr14/3

expr 4*3

expr 4*3

a. 7,2,8,syntax error,12

b.7,2,8,12,syntax error

c.7,2,1,12

d.7,2,12,syntax error

58. which of the statement is not true for sticky bit.

a.can be set for a file.

b.has no efect if the file is a dir.

c.tells unix to leave an executable in a memory after a program

has finished executaion

d.none

59.Make utility is

a.an editor on unix

b.to restore the system status

c.a utility for devlopment of program

d.none

60.the following input is absent on a romchip as compared to ram chip-

a. read input

b. write input

c. chipselect

d. both a & b

61.The digital computer has memory unit with 8 bits per word. The instruction set consist of six different operation.each instruction is stored in        one word of memory and  consist of op-code part and address part . how many words can be address in memory

a.32

b.64

c.128

d.256

62.Output of following will be

#include

main()

{

char p="A";

int q=65;

switch(1)

{

case 1:

printf("%dand %c",p.,q);

printf("%cand%d",p,q);

}

}

a.A AND 65

b.65 AND A

c.A and 65

  65 and A

d.65 and  A and 65

63.output of following will be

# include

#include

main()

{

unsigned short p=pow(2,15)+pow(2,9)+pow(2,6)+poe(2,0);

char c;

c=p;

printf("%c/n",c);

}

a.33345

b.45

c.A

d.none

64. p in following statement is

int (*p(char *a))[10];

a.integer

b.array

c.fuction

d.pointer

65.Value of expression *(((p))name +2)) at the end of programm

       will be

#include

main()

{

struct account

{

int accno,

char *name;

float balance;

}

agent *p=&agent;

agent.name=tom smith;

a.tom smith

b.o

c.m

d.none of them

66.state which one is correct SQL

a.

SELECT STORE ID.SUM(QTY*PRICE)

FROM SALES .TITLES

WHERE TITLES.TITLE_.ID=SALE.TITLE_ID

ORDER BY TITLE_ID

b.

SELECT STORE _ID ,SUM( QTY*PRICE)

FROM SALES,SALES

WHERE TITLES .TITLES_ID=SALES .TITLE_ID

GROUP BY STORE_ID ]

c.

_SELECT STORE _ID ,SUM( QTY*PRICE)

FROM SALES,SALES

GROUP BY STORE_ID

WHERE TITLES .TITLE_ID+SALES.TITLE_ID

d.7

SELECT STORE _ID ,SUM( QTY*PRICE)

FROM SALES,SALES

ORDER BY TITLE_ID

WHERE TITLES .TITLE_ID=SALES.TITLE_ID

67.Which type of join is used in following SQL

SELECT STORE_NAME.PUB_ID

FROM PUBLISHER .STORES

WHERE NOT PUBLISHER.STATE=STORES .STATE

a.EQUIJOIN

B.THETAJOIN

C.NOTQUIJOIN

D NONE OF THIS

68.EMPLOYEE DEPARTMENT  empid name deptid deptid deptname

1 A 11 11 AAAAA

2 B 11 22 BBBBB

3 C 22 33 CCCCC

4 D 22

5 E 23

SELECT NAME .DEPT_ID.DEPT_NAME

FROM EMPLOYEE EM,DEPARTMENT DP

WHERE EM.DEPT _ID =DP.DEPT_ID

GROUP BY DEPT_ID

which is the correct result set out of above SQL and table data

a. A 11 AAAAA

B 11 AAAAA

C 22 BBBBB

D 22 BBBBB

D 33 CCCCC

b;

A 11 AAAAA

C 22 BBBBB

E 33 CCCCC

C.

B 11 AAAAA

D 22 BBBBB

E 33 CCCCC

D.NONE

69.2 'S complement of binary 110110101

a.001001010

b.1101110101

c.001001011

d.101001010

70.Equivalent octal number for binary 10001010111

a.2127

b.1227

c.2217

d.111

71.while exucuting a programm if the 8085/8080 MPU fetches the machine code located at the memory address 2057H then the

      content of the programm counter is

a.2056H

B.2057H

C.2058H

D.2059H

72.Number of address line required on the chip of 2k memory

a.10

b.11

c.12

d.16

73Tthe sequence followed by the storage and retrieval of data bytes on the stacks

a.FIFO

B.LIFO

C.FILO

D.LILO

74.Another name for RS flip flop

a.a stable multivibrator

b.bistable multivibrator

c.monostable multivibrator

d.oscillotor

75.Equivelent BCDrepresentation of binary 1100010

a.01100010

b.10011000

c.1100010

d.11000100


Back to top