1)   Which model depicts the profile of the end users of a computer system. (Software Engineering)
  
												                        
													                    a. Spiral model 
													                    b. Iterative model 
													                    c. Waterfall model 
													                    d. User model 
													                    
													                    
											                        
											                        
											                        | 
											                                Answer 
											                                Explanation 
											                                
											                         | 
											                         
											                        
											                        
											                                
                                                                            ANSWER: User model
                                                                             Explanation:  The User modelling is a subdivision of human–computer interaction and it describes the process of building up and modifying a user model. The main goal of user modelling is customization and adaptation of systems to the user's specific needs 
                                                                            
                                                                             											                        
											                         | 
											                         
											                        
											                          
											                         
															 | 
	
		
                                                            
												                        2)   How many types of Prototype models are there? (Software Engineering)
  
												                        
													                    a. 2 
													                    b. 3 
													                    c. 5 
													                    d. 4 
													                    
													                    
											                        
											                        
											                        | 
											                                Answer 
											                                Explanation 
											                                
											                         | 
											                         
											                        
											                        
											                                
                                                                            ANSWER: 4
                                                                             Explanation:  A prototype is a working model of a software for limited functionality. The type of prototype models are : Throwaway/Rapid Prototyping, Evolutionary Prototyping, Incremental Prototyping, Extreme Prototyping 
                                                                            
                                                                             											                        
											                         | 
											                         
											                        
											                          
											                         
															 | 
	
		
                                                            
												                        3)   Software Engineering : Software risk impact assessment should focus on consequences affecting, 1) Performance 2) Support 3) Cost 4) Schedule 
  
												                        
													                    a. Yes 
													                    b. No 
													                     
													                     
													                    
													                    
											                        
											                        
											                        | 
											                                Answer 
											                                Explanation 
											                                
											                         | 
											                         
											                        
											                        
											                                
                                                                            ANSWER: Yes
                                                                             Explanation:  The risk assessment consists of objective evaluation of risk in which the assumptions and the uncertainties are considered and present. 
                                                                            
                                                                             											                        
											                         | 
											                         
											                        
											                          
											                         
															 | 
	
		
                                                            
												                        4)   Which one of the following is not an SQA activity? (Software Engineering)
  
												                        
													                    a. Black box testing 
													                    b. White box testing 
													                    c. Integration testing 
													                    d. Unit testing 
													                    
													                    
											                        
											                        
											                        | 
											                                Answer 
											                                Explanation 
											                                
											                         | 
											                         
											                        
											                        
											                                
                                                                            ANSWER: White box testing
                                                                             Explanation:  White box testing is a testing method for a software where it tests internal structures or workings of an application, as opposed to its functionality (i.e. black-box testing). 
                                                                            
                                                                             											                        
											                         | 
											                         
											                        
											                          
											                         
															 | 
	
		
                                                            
												                        5)   Fanin in an OO context indicates. (Software Engineering)
  
												                        
													                    a. Objects 
													                    b. Inheritance 
													                    c. Messages 
													                    d. Polymorphism 
													                    
													                    
											                        
											                        
											                        | 
											                                Answer 
											                                Explanation 
											                                
											                         | 
											                         
											                        
											                        
											                                
                                                                            ANSWER: Inheritance
                                                                             Explanation:  Inheritance is where an object or class is based on another class or object using the same implementation to maintain the same behavior.  
                                                                            
                                                                             											                        
											                         | 
											                         
											                        
											                          
											                         
															 | 
	
		
                                                            
												                        6)   Software Maturity Index is computed with the following formula: [MT (FA+FC+FD)]/MT.  (Software Engineering)
  
												                        
													                    a. True 
													                    b. False 
													                     
													                     
													                    
													                    
											                        
											                        
											                        | 
											                                Answer 
											                                Explanation 
											                                
											                         | 
											                         
											                        
											                        
											                                
                                                                            ANSWER: True
                                                                             Explanation:  MT = number of modules in current version  	FA = number of added modules in current version  	FC = number of changed modules in current version  	FD = number of deleted modules in current version compared to the previous 	version  
                                                                            
                                                                             											                        
											                         | 
											                         
											                        
											                          
											                         
															 | 
	
		
                                                            
												                        7)   Networking : The octal equivalence of 111010 is
  
												                        
													                    a. 81 
													                    b. 72  
													                    c. 71  
													                    d. None of above 
													                    
													                    
											                        
											                        
											                        | 
											                                Answer 
											                                Explanation 
											                                
											                         | 
											                         
											                        
											                        
											                                
                                                                            ANSWER: 72 
                                                                             Explanation:  Group 111010 into two groups as 111 and 010 then convert each group into octal like 111=7 and 010=2. Hence, the octal equivalence of 111010 will be 72. 
                                                                            
                                                                             											                        
											                         | 
											                         
											                        
											                          
											                         
															 | 
	
		
                                                            
												                        8)   Which of the following registers is used to keep track of address of the memory location where the next instruction is located? (Networking)
  
												                        
													                    a. Memory address register  
													                    b. Memory data register  
													                    c. Instruction register  
													                    d. Program counter 
													                    
													                    
											                        
											                        
											                        | 
											                                Answer 
											                                Explanation 
											                                
											                         | 
											                         
											                        
											                        
											                                
                                                                            ANSWER: Program counter
                                                                             Explanation:  The program counter is a register in a processor which contains the address of the instruction which is being executed at the current time. As soon as the instruction is fetched the instruction the counter increases by 1. 
                                                                            
                                                                             											                        
											                         | 
											                         
											                        
											                          
											                         
															 | 
	
		
                                                            
												                        9)   How many address lines are needed to address each memory location in a 2048 x 4 memory chip? (Networking)
  
												                        
													                    a. 10  
													                    b. 11 
													                    c. 8 
													                    d. 12 
													                    
													                    
											                        
											                        
											                        | 
											                                Answer 
											                                Explanation 
											                                
											                         | 
											                         
											                        
											                        
											                                
                                                                            ANSWER: 11
                                                                             Explanation:  It means that a memory of 2048 words, where each word is 4 bits.  So to address 2048 (or 2K, where K means 2^10 or 1024), you need 11 bits, so 11 address lines.  
                                                                            
                                                                             											                        
											                         | 
											                         
											                        
											                          
											                         
															 | 
	
		
                                                            
												                        10)   Which computer memory is used for storing programs and data currently being processed by the CPU? (Networking)
  
												                        
													                    a. Mass memory 
													                    b. Internal memory 
													                    c. Non-volatile memory 
													                    d. PROM 
													                    
													                    
											                        
											                        
											                        | 
											                                Answer 
											                                Explanation 
											                                
											                         | 
											                         
											                        
											                        
											                                
                                                                            ANSWER: Internal memory
                                                                             Explanation:  The internal memory generally refers to chips rather than disk or tapes. It resides in the ROM and once the power is off the memory is erased. 
                                                                            
                                                                             											                        
											                         | 
											                         
											                        
											                          
											                         
															 | 
	
		
                                                            
												                        11)   Which one of the following statement is true for a layer-4 firewall which is a device that can look at all protocol headers up to the transport layer? (Networking)
  
												                        
													                    a. It cannot block TCP traffic from a specific user on a multiple-user system during 9.00pm and 5.00pm 
													                    b. It cannot stop incoming traffic from a specific IP address but allow outgoing traffic to the same IP address. 
													                    c. It cannot block entire HTTP traffic during 9.00 pm and 5.00pm 
													                    d. It cannot block all ICMP traffic. 
													                    
													                    
											                        
											                        
											                        | 
											                                Answer 
											                                Explanation 
											                                
											                         | 
											                         
											                        
											                        
											                                
                                                                            ANSWER: It cannot block entire HTTP traffic during 9.00 pm and 5.00pm
                                                                             Explanation:  The layer 4 firewall is a device that can look at all the protocol headers upto the transport layer and not the headers above that layer.  
                                                                            
                                                                             											                        
											                         | 
											                         
											                        
											                          
											                         
															 | 
	
		
                                                            
												                        12)   Encryption is done at A and decryption is done at B. A adds a digital signature s to message S using public key cryptography, encrypts. (Networking)
  
												                        
													                    a. Encryption: A’s private key followed by B’s public key;   Decryption: B’s private key followed by A’s public key. 
													                    b. Encryption: A’s public key followed by B’s private key;  Decryption: B’s public key followed by A’s private key. 
													                    c. Encryption: A’s private key followed by B’s private key;  Decryption: A’s public key followed by B’s private key. 
													                    d. Encryption: A’s private key followed by B’s private key;  Decryption: A’s public key followed by B’s public key. 
													                    
													                    
											                        
											                        
											                        | 
											                                Answer 
											                                Explanation 
											                                
											                         | 
											                         
											                        
											                        
											                                
                                                                            ANSWER: Encryption: A’s private key followed by B’s public key;   Decryption: B’s private key followed by A’s public key.
                                                                             Explanation:  Encryption is where plain text is converted into something which is random and meaningless(ciphertext) for the purpose of data security. Decryption is where the ciphertext is converted into plain text or readable format. 
                                                                            
                                                                             											                        
											                         | 
											                         
											                        
											                          
											                         
															 | 
	
		
                                                            
												                        13)   C programming: Which header file should be included to use functions like malloc() and calloc()?
  
												                        
													                    a. memory.h 
													                    b. stdlib.h 
													                    c. string.h 
													                    d. dos.h 
													                    
													                    
											                        
											                        
											                        | 
											                                Answer 
											                                Explanation 
											                                
											                         | 
											                         
											                        
											                        
											                                
                                                                            ANSWER: stdlib.h
                                                                             Explanation:  This header file defines four variable type,several macros and various functions for general function. 
                                                                            
                                                                             											                        
											                         | 
											                         
											                        
											                          
											                         
															 | 
	
		
                                                            
												                        14)   C programming:  What function should be used to free the memory allocated by calloc() ?
  
												                        
													                    a. dealloc(); 
													                    b. malloc(variable_name, 0) 
													                    c. free(); 
													                    d. memalloc(variable_name, 0)  
													                    
													                    
											                        
											                        
											                        | 
											                                Answer 
											                                Explanation 
											                                
											                         | 
											                         
											                        
											                        
											                                
                                                                            ANSWER: free();
                                                                             Explanation:  The free() function deallocates the memory which was previously allocated by the call to alloc, malloc or calloc 
                                                                            
                                                                             											                        
											                         | 
											                         
											                        
											                          
											                         
															 | 
	
		
                                                            
												                        15)   What is the purpose of fflush() function? (C programming)
  
												                        
													                    a. flushes all streams and specified streams. 
													                    b. flushes only specified stream. 
													                    c. flushes input/output buffer. 
													                    d. flushes file buffer. 
													                    
													                    
											                        
											                        
											                        | 
											                                Answer 
											                                Explanation 
											                                
											                         | 
											                         
											                        
											                        
											                                
                                                                            ANSWER: flushes all streams and specified streams.
                                                                             Explanation:  The fflush() function is used in the program which flushes the output buffer of a stream. 
                                                                            
                                                                             											                        
											                         | 
											                         
											                        
											                          
											                         
															 | 
	
		
                                                            
												                        16)   What would be the output of the following program? (C programming)
   #include”stdio.h” main() { int a, b=5; a=b+NULL; printf(“%d”, a); }
  
												                        
													                    a. 6 
													                    b. 5 
													                    c. 5 5 
													                    d. None  
													                    
													                    
											                        
											                        
											                        | 
											                                Answer 
											                                Explanation 
											                                
											                         | 
											                         
											                        
											                        
											                                
                                                                            ANSWER: 5
                                                                             Explanation:  The value for b=5 a=b+null (null value is always 0) a=5+0 a=5 Hence, the output is 5. 
                                                                            
                                                                             											                        
											                         | 
											                         
											                        
											                          
											                         
															 | 
	
		
                                                            
												                        17)   Can we declare a function that can return a pointer to a function of the same type? (C programming)
  
												                        
													                    a. Yes 
													                    b. No, we cannot do it directly 
													                     
													                     
													                    
													                    
											                        
											                        
											                        | 
											                                Answer 
											                                Explanation 
											                                
											                         | 
											                         
											                        
											                        
											                                
                                                                            ANSWER: No, we cannot do it directly
                                                                             Explanation:  We would need to declare typedef for it and typedef will do the job or then return void*. 
                                                                            
                                                                             											                        
											                         | 
											                         
											                        
											                          
											                         
															 | 
	
		
                                                            
												                        18)   How can one convert numbers to strings? (C programming)
  
												                        
													                    a. Using atoi()  
													                    b. Using printf() 
													                    c. Using sprint() 
													                    d. Using nsprintf() 
													                    
													                    
											                        
											                        
											                        | 
											                                Answer 
											                                Explanation 
											                                
											                         | 
											                         
											                        
											                        
											                                
                                                                            ANSWER: Using sprint()
                                                                             Explanation:  The sprint() writes the data into the array. 
                                                                            
                                                                             											                        
											                         | 
											                         
											                        
											                          
											                         
															 | 
	
		
                                                            
												                        19)   Databases: The view of total database content is _____
  
												                        
													                    a. Conceptual view. 
													                    b. Internal view. 
													                    c. External view 
													                    d. Physical View. 
													                    
													                    
											                        
											                        
											                        | 
											                                Answer 
											                                Explanation 
											                                
											                         | 
											                         
											                        
											                        
											                                
                                                                            ANSWER: Conceptual view.
                                                                             Explanation:  The conceptual view is where it describes what data are actually stored in the database. It contains information about the entire database in terms of small and simple structures.  
                                                                            
                                                                             											                        
											                         | 
											                         
											                        
											                          
											                         
															 | 
	
		
                                                            
												                        20)   What are the important criteria for designing tables? (Datebases)
  
												                        
													                    a. Meaningful grouping of attribute 
													                    b. No redundancy 
													                    c. No inapplicable attribute 
													                    d. All the above 
													                    
													                    
											                        
											                        
											                        | 
											                                Answer 
											                                Explanation 
											                                
											                         | 
											                         
											                        
											                        
											                                
                                                                            ANSWER: All the above
                                                                             Explanation:  The tables designed in a database are very important. If the above criteria are not fulfilled we would say that the table design is bad. 
                                                                            
                                                                             											                        
											                         | 
											                         
											                        
											                          
											                         
															 | 
	
		
                                                            
												                        21)   Which of the following database object does not physically exist? (Database)
  
												                        
													                    a. Base table 
													                    b. Index 
													                    c. View 
													                    d. None of the above 
													                    
													                    
											                        
											                        
											                        | 
											                                Answer 
											                                Explanation 
											                                
											                         | 
											                         
											                        
											                        
											                                
                                                                            ANSWER: View
                                                                             Explanation:  A view is a result set of a stored query on the data in which the database users can query just as they would in a database collection 
                                                                            
                                                                             											                        
											                         | 
											                         
											                        
											                          
											                         
															 | 
	
		
                                                            
												                        22)   A transparent DBMS? (Database)
  
												                        
													                    a. Can not hide sensitive information from users 
													                    b. Keep its logical structure hidden from users 
													                    c. Keeps its physical structure hidden from users 
													                    d. Both B and C 
													                    
													                    
											                        
											                        
											                        | 
											                                Answer 
											                                Explanation 
											                                
											                         | 
											                         
											                        
											                        
											                                
                                                                            ANSWER: Keeps its physical structure hidden from users
                                                                             Explanation:  A DBMS which keeps its physical structure hidden from the user is known as a transparent DBMS 
                                                                            
                                                                             											                        
											                         | 
											                         
											                        
											                          
											                         
															 | 
	
		
                                                            
												                        23)   A trigger is ?
  
												                        
													                    a. A statement that enables to start any DBMS 
													                    b. A statement that is executed by the user when debugging an application program 
													                    c. A condition the system tests for the validity of the database user 
													                    d. A statement that is executed automatically by the system as a side effect of modification to the database 
													                    
													                    
											                        
											                        
											                        | 
											                                Answer 
											                                Explanation 
											                                
											                         | 
											                         
											                        
											                        
											                                
                                                                            ANSWER: A statement that is executed automatically by the system as a side effect of modification to the database
                                                                             Explanation:  A database trigger is what is executed automatically in response to certain events on a particular table or view in a database. It is mostly used to maintain the integrity of the database. 
                                                                            
                                                                             											                        
											                         | 
											                         
											                        
											                          
											                         
															 | 
	
		
                                                            
												                        24)   An unnormalized relation contains values ? 
  
												                        
													                    a. Atomic 
													                    b. Non - Atomic 
													                    c. Classified 
													                    d. None of these  
													                    
													                    
											                        
											                        
											                        | 
											                                Answer 
											                                Explanation 
											                                
											                         | 
											                         
											                        
											                        
											                                
                                                                            ANSWER: Classified
                                                                             Explanation:  No explanation is available for this question! 
                                                                            
                                                                             											                        
											                         | 
											                         
											                        
											                          
											                         
															 | 
	
		
                                                            
												                        25)   Primitive operations common to all record management system include ? (Database)
  
												                        
													                    a. Print 
													                    b. Sort 
													                    c. Look up 
													                    d. All of above 
													                    
													                    
											                        
											                        
											                        | 
											                                Answer 
											                                Explanation 
											                                
											                         | 
											                         
											                        
											                        
											                                
                                                                            ANSWER: Look up
                                                                             Explanation:  The Database lookup allows you to look up for the values in a database table. The lookup values are added as new fields onto the stream. 
                                                                            
                                                                             											                        
											                         | 
											                         
											                        
											                          
											                         
															 |