Networking/Databases/C/SE/SQL/HTML Test Set 2

1)   Which model depicts the profile of the end users of a computer system. (Software Engineering)

a. Spiral model
b. Iterative model
c. Waterfall model
d. User model
Answer  Explanation 

ANSWER: User model

The User modelling is a subdivision of human–computer interaction and it describes the process of building up and modifying a user model. The main goal of user modelling is customization and adaptation of systems to the user's specific needs

2)   How many types of Prototype models are there? (Software Engineering)

a. 2
b. 3
c. 5
d. 4
Answer  Explanation 


A prototype is a working model of a software for limited functionality. The type of prototype models are :
Throwaway/Rapid Prototyping, Evolutionary Prototyping, Incremental Prototyping, Extreme Prototyping

3)   Software Engineering : Software risk impact assessment should focus on consequences affecting,
1) Performance
2) Support
3) Cost
4) Schedule

a. Yes
b. No

Answer  Explanation 


The risk assessment consists of objective evaluation of risk in which the assumptions and the uncertainties are considered and present.

4)   Which one of the following is not an SQA activity? (Software Engineering)

a. Black box testing
b. White box testing
c. Integration testing
d. Unit testing
Answer  Explanation 

ANSWER: White box testing

White box testing is a testing method for a software where it tests internal structures or workings of an application, as opposed to its functionality (i.e. black-box testing).

5)   Fanin in an OO context indicates. (Software Engineering)

a. Objects
b. Inheritance
c. Messages
d. Polymorphism
Answer  Explanation 

ANSWER: Inheritance

Inheritance is where an object or class is based on another class or object using the same implementation to maintain the same behavior.

6)   Software Maturity Index is computed with the following formula: [MT (FA+FC+FD)]/MT.  (Software Engineering)

a. True
b. False

Answer  Explanation 


MT = number of modules in current version
FA = number of added modules in current version
FC = number of changed modules in current version
FD = number of deleted modules in current version compared to the previous version

7)   Networking : The octal equivalence of 111010 is

a. 81
b. 72
c. 71
d. None of above
Answer  Explanation 


Group 111010 into two groups as 111 and 010 then convert each group into octal like 111=7 and 010=2. Hence, the octal equivalence of 111010 will be 72.

8)   Which of the following registers is used to keep track of address of the memory location where the next instruction is located? (Networking)

a. Memory address register
b. Memory data register
c. Instruction register
d. Program counter
Answer  Explanation 

ANSWER: Program counter

The program counter is a register in a processor which contains the address of the instruction which is being executed at the current time. As soon as the instruction is fetched the instruction the counter increases by 1.

9)   How many address lines are needed to address each memory location in a 2048 x 4 memory chip? (Networking)

a. 10
b. 11
c. 8
d. 12
Answer  Explanation 


It means that a memory of 2048 words, where each word is 4 bits.
So to address 2048 (or 2K, where K means 2^10 or 1024), you need 11 bits, so 11 address lines.

10)   Which computer memory is used for storing programs and data currently being processed by the CPU? (Networking)

a. Mass memory
b. Internal memory
c. Non-volatile memory
Answer  Explanation 

ANSWER: Internal memory

The internal memory generally refers to chips rather than disk or tapes. It resides in the ROM and once the power is off the memory is erased.

11)   Which one of the following statement is true for a layer-4 firewall which is a device that can look at all protocol headers up to the transport layer? (Networking)

a. It cannot block TCP traffic from a specific user on a multiple-user system during 9.00pm and 5.00pm
b. It cannot stop incoming traffic from a specific IP address but allow outgoing traffic to the same IP address.
c. It cannot block entire HTTP traffic during 9.00 pm and 5.00pm
d. It cannot block all ICMP traffic.
Answer  Explanation 

ANSWER: It cannot block entire HTTP traffic during 9.00 pm and 5.00pm

The layer 4 firewall is a device that can look at all the protocol headers upto the transport layer and not the headers above that layer.

12)   Encryption is done at A and decryption is done at B. A adds a digital signature s to message S using public key cryptography, encrypts. (Networking)

a. Encryption: A’s private key followed by B’s public key;
Decryption: B’s private key followed by A’s public key.
b. Encryption: A’s public key followed by B’s private key;
Decryption: B’s public key followed by A’s private key.
c. Encryption: A’s private key followed by B’s private key;
Decryption: A’s public key followed by B’s private key.
d. Encryption: A’s private key followed by B’s private key;
Decryption: A’s public key followed by B’s public key.
Answer  Explanation 

ANSWER: Encryption: A’s private key followed by B’s public key;
Decryption: B’s private key followed by A’s public key.

Encryption is where plain text is converted into something which is random and meaningless(ciphertext) for the purpose of data security.
Decryption is where the ciphertext is converted into plain text or readable format.

13)   C programming: Which header file should be included to use functions like malloc() and calloc()?

a. memory.h
b. stdlib.h
c. string.h
d. dos.h
Answer  Explanation 

ANSWER: stdlib.h

This header file defines four variable type,several macros and various functions for general function.

14)   C programming:  What function should be used to free the memory allocated by calloc() ?

a. dealloc();
b. malloc(variable_name, 0)
c. free();
d. memalloc(variable_name, 0)
Answer  Explanation 

ANSWER: free();

The free() function deallocates the memory which was previously allocated by the call to alloc, malloc or calloc

15)   What is the purpose of fflush() function? (C programming)

a. flushes all streams and specified streams.
b. flushes only specified stream.
c. flushes input/output buffer.
d. flushes file buffer.
Answer  Explanation 

ANSWER: flushes all streams and specified streams.

The fflush() function is used in the program which flushes the output buffer of a stream.

16)   What would be the output of the following program? (C programming)

int a, b=5;
printf(“%d”, a);

a. 6
b. 5
c. 5 5
d. None
Answer  Explanation 


The value for b=5
a=b+null (null value is always 0)
Hence, the output is 5.

17)   Can we declare a function that can return a pointer to a function of the same type? (C programming)

a. Yes
b. No, we cannot do it directly

Answer  Explanation 

ANSWER: No, we cannot do it directly

We would need to declare typedef for it and typedef will do the job or then return void*.

18)   How can one convert numbers to strings? (C programming)

a. Using atoi()
b. Using printf()
c. Using sprint()
d. Using nsprintf()
Answer  Explanation 

ANSWER: Using sprint()

The sprint() writes the data into the array.

19)   Databases: The view of total database content is _____

a. Conceptual view.
b. Internal view.
c. External view
d. Physical View.
Answer  Explanation 

ANSWER: Conceptual view.

The conceptual view is where it describes what data are actually stored in the database. It contains information about the entire database in terms of small and simple structures.

20)   What are the important criteria for designing tables? (Datebases)

a. Meaningful grouping of attribute
b. No redundancy
c. No inapplicable attribute
d. All the above
Answer  Explanation 

ANSWER: All the above

The tables designed in a database are very important. If the above criteria are not fulfilled we would say that the table design is bad.

21)   Which of the following database object does not physically exist? (Database)

a. Base table
b. Index
c. View
d. None of the above
Answer  Explanation 


A view is a result set of a stored query on the data in which the database users can query just as they would in a database collection

22)   A transparent DBMS? (Database)

a. Can not hide sensitive information from users
b. Keep its logical structure hidden from users
c. Keeps its physical structure hidden from users
d. Both B and C
Answer  Explanation 

ANSWER: Keeps its physical structure hidden from users

A DBMS which keeps its physical structure hidden from the user is known as a transparent DBMS

23)   A trigger is ?

a. A statement that enables to start any DBMS
b. A statement that is executed by the user when debugging an application program
c. A condition the system tests for the validity of the database user
d. A statement that is executed automatically by the system as a side effect of modification to the database
Answer  Explanation 

ANSWER: A statement that is executed automatically by the system as a side effect of modification to the database

A database trigger is what is executed automatically in response to certain events on a particular table or view in a database. It is mostly used to maintain the integrity of the database.

24)   An unnormalized relation contains values ?

a. Atomic
b. Non - Atomic
c. Classified
d. None of these
Answer  Explanation 

ANSWER: Classified

No explanation is available for this question!

25)   Primitive operations common to all record management system include ? (Database)

a. Print
b. Sort
c. Look up
d. All of above
Answer  Explanation 

ANSWER: Look up

The Database lookup allows you to look up for the values in a database table. The lookup values are added as new fields onto the stream.