Objective Questions of C with answer set-2

1. Hierarchy decides which operator
A) is most important
B) is used first
C) is fastest
D) Operates on largest numbers

2. A pointer can hold
A) Single address at a time
B) Two addresses at a time
C) Number of addresses at a time
D) No address
3. An integer constant in C must have
A) At least one digit
B) At least one decimal point
C) A comma along with digits
D) Digits separated by commas

4. main() {
                Int a=3, b=2, c*d*e;
                d=&a; e=&b;
                c=*d+*e;
                }
                Which one of the given answers is correct?
A) a=4, c-6
B) a=3, c=5
C) a=3, c=6
D) a=3, c=8

5. In C a variable cannot contain
A) Blank Spaces
B) Decimal Point
C) Hyphen
D) All of the above

6. Assume that variable x resides at memory location 1234, y at 1111 and p at 2222.
                Int x=1, y=2, *p;
                p=&x;
                y=*p;
What will be the value of y after execution of above code?
A) 2
B) 1
C) 1234
D) 1111

7. Which of the following is FALSE in C?
A) Keywords can be used as variable names
B) Variable names can contain a digit
C) Variable names do not contain a blank space
D) Capital letters can be used in variables

8. If an integer occupies 4 bytes and a character occupies 1 byte of memory, each element of the following structure would occupy how many bytes ?
                struct name {
                int age;
                char name[30];
                };
A) 30
B) 32
C) 34
D) 36

9. The expression x=4+2 % -8 evaluates to
A) -6
B) 6
C) 4
D) None of the above

10. A structure brings together a group of
A) items of the same data type
B) related data items and variables
C) integers with user defined names
D) floating points with user defined names

Answers:
1. B) is used first
2. A) Single address at a time
3. A) At least one digit
4. B) a=3, c=5
5. A) Blank Spaces
6. B) 1
7. A) Keywords …… variable names
8. C) 34
9. B) 6
10. B) related data items and variables

You Might also view the following Related Posts

Best 10 ways of making money online

Best 10 ways of making money online

Making money online is not easy task if you don't know about the best and easy ways for that. Since, Internet is itself a virtual world, so it may have several fraud offers. Selecting a best method of earning money online may be difficult task for anyone. You should be much careful while selecting the method for earning money online. You should select such a method which would be good and reliable source of income for your life time.
I have presented here some best ways of making money online. I hope that this post would become best guideline for you. 


1. Doing Freelance Writing: Freelance Writing is one of the most popular options for Internet money making. You don't need to invest any money for doing such jobs and you don't need to own a website. It is best for all the fields' writers to make quick money. Most all of such Freelance service providing websites takes some charge (about 10%) after completing the project from the job providers or writers. There are tons of places online where you can offer writing service to others but some of them are best all over for Freelance Writing.

2. Doing Affiliate Marketing: This is also the best choices method so far for making money online. In this method you are basically selling other people's stuff for a commission. For doing such jobs you may have to need your own website or blog but some of the affiliate marketing companies provide you a domain and a site also for promoting their stuffs.

3. Selling on eBay: Selling on eBay is a really good online business opportunity. The best part about launching an eBay store is that you don't really need to invest financially to get started. For the better profit find out what are the hot selling items in eBay, find a wholesaler, buy them in bulk which comes out way cheaper, and then sell them individually for a profit.

4. Starting a Blog: You can also make money online by starting your own blog. Now a day it is becoming increasingly popular. You should post good articles for the blog to get better result. You can generate revenue by displaying Adsense ads, by selling affiliate products, selling advertizing space and other more.

5. Sharing photos on Stock Photography sites: If you are professional photographer or you like photography and enjoy taking interesting pictures, there are a lot of such websites from where you can earn online by sharing your amazing, interesting and original photos on them. They generate revenue from the pages where your photos display by displaying Google Adsense or other online advertizing networks ads around the photos. Almost all such websites gives you over 50% revenue generated from your photos.

6. Sharing files online: Similarly to the sharing photos on stock photography sites, you can earn online by uploading and sharing different types of files like Txt, PDF etc. If anyone downloads your file you can earn some amount.

7. Making videos and sharing: Similarly sharing your files, you can make interesting videos and upload on such sites which give revenue for you. Revver and Break etc. are such sites which will share a percentage of their ad revenue.

8. Participating on Paid Surveys: Participating on online surveys is one of the easiest ways of making money online. Market research companies get paid from their manufacturers and companies to gather feedback from their consumers. Such companies collect feedback by doing online surveys.

9. Getting paid by reading Emails: You can get paid by reading emails which you receive to your mailbox by registering on some site which paid to others for reading their emails.

10. Completing different offers: Some of the companies gives you some money for completing different types of offers like participating on surveys, visiting their ads, registering on the sites etc.


All of these methods which i have listed are based on the priorities of my suggestions for participating on them. If you have know about any other easiest and reliable methods of making money online or you have any comments about the post, you are welcomed to comment on the comment session.

Solved Objective questions of computer data structure set-3




1. Which of the following is not the type of queue?

A) Ordinary queue

B) Single ended queue

C) Circular queue

D) Priority queue


2. The property of binary tree is

A) The first subset is called left subtree

B) The second subtree is called right subtree

C) The root cannot contain NULL

D) The right subtree can be empty


3. State true or false.

i) The degree of root node is always zero.

ii) Nodes that are not root and not leaf are called as internal nodes.


A) True, True

B) True, False

C) False, True

D) False, False


4. Any node is the path from the root to the node is called

A) Successor node

B) Ancestor node

C) Internal node

D) None of the above


5. State true of false.

i) A node is a parent if it has successor nodes.

ii) A node is child node if out degree is one.

A) True, True

B) True, False

C) False, True

D) False, False


6. ………………. is not an operation performed on linear list

a) Insertion b) Deletion c) Retrieval d) Traversal

A) only a,b and c

B) only a and b

C) All of the above

D) None of the above


7. Which is/are the application(s) of stack

A) Function calls

B) Large number Arithmetic

C) Evaluation of arithmetic expressions

D) All of the above


8. A …………… is an acyclic digraph, which has only one node with indegree 0, and other nodes have in-degree 1.

A) Directed tree

B) Undirected tree

C) Dis-joint tree

D) Direction oriented tree


9. …………………. Is a directed tree in which outdegree of each node is less than or equal to two.

A) Unary tree

B) Binary tree

C) Trinary tree

D) Both B and C


10. State true or false.

i) An empty tree is also a binary tree.

ii) In strictly binary tree, the out-degree of every node is either o or 2.

A) True, False

B) False, True

C) True, True

D) False, False


11. Which of the following data structures are indexed structures?

A. Linear arrays

B. Linked lists

C. Queue

D. Stack


12. Which of the following data structure store the homogeneous data elements?

A. Arrays

B. Records

C. Pointers

D. Lists


13. When new data are to be inserted into a data structure, but there is not available space; this situation is usually called ....

A. Underflow

B. overflow

C. houseful

D. saturated


14. A data structure where elements can be added or removed at either end but not in the middle is called ...

A. linked lists

B. stacks

C. queues

D. dequeue


15. Operations on a data structure may be .....

A. creation

B. destruction

C. selection

D. all of the above


16. The way in which the data item or items are logically related defines .....

A. storage structure

B. data structure

C. data relationship

D. data operation


17. Which of the following are the operations applicable an primitive data structures?

A. create

B. destroy

C. update

D. all of the above


18. The use of pointers to refer elements of a data structure in which elements are logically adjacent is ....

A. pointers

B. linked allocation

C. stack

D. queue


19. Arrays are best data structures

A. for relatively permanent collections of data

B. for the size of the structure and the data in the structure are constantly changing

C. for both of above situation

D. for non of above situation


20. Which of the following statement is false?

A. Arrays are dense lists and static data structure.

B. Data elements in linked list need not be stored in adjacent space in memory

C. Pointers store the next data element of a list.

D. Linked lists are collection of the nodes that contain information part and next pointer.


Answers:


1. B) Single ended queue
2. D) The right ..... empty
3. C) False, True
4. B) Ancestor node
5. B) True, False
6. D) None of the above
7. D) All of the above
8. A) Directed tree
9. B) Binary tree
10. C) True, True
11. A. Linear arrays
12. B. Records
13. B. overflow
14. D. dequeue
15. D. all of the above
16. B. data structure
17. D. all of the above
18. B. linked allocation
20. C. Pointers store the next data element of a list.


Related Posts



For other more Multiple Choice Questions (MCQs): Click Here

 

Solved Objective Questions of Computer Fundamental set-2

1. The default setting for a horizontal rule is ..............
A) shaded
B) unshaded
C) both
D) none of the above

2. ............... tag is used to embed image in a webpage.
A) <img src="pic.gif">
B) <img src=pic.gif>
C) <img source="pic.gif">
D) None of the above

3. This is a global collection of high-powered computer that are connected together with cables, telephone lines, microwave dishes, satellites etc.
A) Arpanet
B) Internet
C) Network
D) All of the above

4. ............ is used to pointing / selecting the screen co-ordinates by detecting the light.
A) Light Pen
B) Bar Code Reader
C) Digital Camera
D) Smart Cards

5. ............... displays the information about the active document such as page number, section number, number of pages, insertion point, position, etc.
A) View Bar
B) Menu Bar
C) Status Bar
D) Ruler Line

6. ........... a record means a new record to the file.
A) Amending
B) Updating
C) Editing
D) Appending

7.  To move the cursor to end of the document, press ................
A) Ctrl+End
B) End
C) Alt+End
D) Shift+End

8. SMTP stands for
A) Simple Mail Transfer Protocol
B) Simple Mail Transport Protocol
C) Sample Mail Transfer Protocol
D) Sample Mail Transport Protocol

9. JPEG stands for ...............
A) Joint Photo Experts Group
B) Joint Photogenic Experts Group
C) Joint Photographic Experts Group
D) Joint Photoelectric Experts Group

10. The short cut key to start a new line without starting a new paragraph is ......
A) Ctrl+Enter
B) Shift+Enter
C) Alt+Enter
D) Enter

Answers:
1. A) shaded
2. A) <img src="pic.gif">
3. B) Internet
4. A) Light Pen
5. C) Status Bar
6. D) Appending
7. A) Ctrl+End
8. A) Simple Mail Transfer Protocol
9. C) Joint Photographic Experts Group
10. B) Shift+Enter

What is literal and non-literal copying of computer programs?

 literal and non-literal copying of computer programs

Copying a computer program can be literal, where the program code itself is copied, in which case the two programs are written in the same computer programming language. Alternatively, copying can be non-literal, where elements of the program such as its structure, sequence of operations, functions, interfaces and methodologies are copied but the program code is not directly copied.


Literal copying occurs where a person copies an existing program by disk to disk copying or by writing out or printing the program listing, perhaps to key it into another computer at a later date. In either case, the person making the copy may make some alterations to the copy. These may be to disguise its origins or to enhance the program, for example, by adding some additional functions. Literal copying is relatively easy for infringement. Even relatively small programs will be the result of the programmer's skill, experience and judgment. The following case in the first to seriously consider the issues relating to literal copying of computer programs and lays down some important precedents for software copyright.

The law's recognition of non-literal copying is important because otherwise it would be too easy to defeat copyright protection of computer programs. With some works of copyright, it is an easy matter to distinguish between the literal and non-literal elements. For example, with a work of literature, perhaps in the form of an historical novel, the literal element comprises the words, sentences and paragraphs as expressed in print, while the non-literal elements, in which case they may have their own copyright independent of the copyright subsisting in the finished novel. However, in the absence of such materials, it is clear that taking the non-literal elements can infringe.

You may also wanted to view the following related posts

Solved Objective Questions of System Analysis and Design set-5

1. ……………….. includes review of the existing procedures and information flow.
A) Feasibility Study
B) Feasibility report
C) System Design
D) System analysis

2. A rectangle in a DFD represents
A) a process
B) a data store
C) an external entity
D) an input unit

3. …………….. refers to the collection of information pertinent to systems Project.
A) Data transfer
B) Data gathering
C) Data Embedding
D) Data Request

4. ………………….. means coordinated effort, to communicate the information of the system written form.
A) System documentation
B) Resource required
C) Development schedule
D) User Document

5. MDP stands for
A) Master Development Plan
B) Master Design Program
C) Mandatory Database Program
D) Master Database Plan

6. External Entities may be a
A) Source of input data only
B) Source of input data or destination of results
C) Destination of results only
D) Repository of data

7. …………………. is a group of interested components working together towards a common goal by accepting inputs and producing outputs in an organized transformation process.
A) System
B) Network
C) Team
D) System Unit

8. To create vehicle of information to provide evidence in the development process and to monitor the process. This is one of the objectives of
A) Analysis
B) Design
C) Development
D) Documentation

9. A …………. System is no more than idea
A) Conceptual
B) Logical
C) Physical
D) All of the above

10. By an external entity we mean a
A) Unit outside the system being designed which can be controlled by an analyst.
B) Unit outside the system whose behavior is independent of the system being designed
C) A unit external to the system being designed
D) A unit which is not part of a DFD



Answers:
1.   A) Feasibility Study
2.   C) an external entity
3.   B) Data gathering
4.   A) System documentation
5.   A) Master Development Plan
6.   B) Source of …… destination   of results
7.   A) System
8.   D) Documentation
9.   A) Conceptual
10.   C) A unit external …… being designed

MCQ of System Analysis and Design with answer set-4


1. The rate of ……………. Is always an important factor for management especially in relation to the rate of return
A) Cost
B) Benefit
C) Sales
D) Investment

2. Which of the following is / are the Characteristics of information?
A) Accuracy and Relevance
B) Form of information and Timeliness
C) Completeness and Purpose
D) All A, B & C


3. The data Flow Diagram is the basic component of …………… system
A) Conceptual
B) Logical
C) Physical
D) None of the above

4. State True or False.
i) Master Development Plan basically is a schedule of various applications to be comprised.
ii) It consists of start and finish dates of a system analysis, design implementation and maintenance activities.
A) i-True, ii-True
B) i-False, ii-True
C) i-True, ii-False
D) i-False, ii-False

5. The Key considerations involved in the feasibility analysis is / are ……………….
A) Economic
B) Technical
C) Behavioral
D) A, B, C

6. Data cannot flow between two data stores because
A) it is not allowed in DFD
B) a data store is a passive repository of data
C) data can get corrupted
D) they will get merged

7. …………………… is a schedule of various applications to be computerized.
A) Materials planning
B) Master development Plan
C) Manufacturing organization
D) None of the above

8. ……………. Costs for a computer based information system include the salaries of the system analysts and computer programmers. ………… costs for a computer based information system include the salaries of the computer operator and other data processing personnel.
A) Development, Development
B) Development, Operating
C) Operating, Development
C) Operating, Operating

9. The characteristics of well designed system are
a) Practical          b) Effective         c) Secure             d) Reliable           e) Flexible           f) Economical

A) a, b, c and d
B) a, c, d and e
C) a, b, c, d and e

D) a, b, c, d, e and f

10. …………….. gives defining the flow of the data through and organization or a company or series of tasks that may or may not represent computerized processing.
A) System process
B) System flowchart
C) System design
D) Structured System

Answers:
1.   D) Investment
2.   D) All A, B & C
3.   B) Logical
4.   A) i-True, ii-True
5.   D) A, B, C
6.   D) they will get merged
7.   B) Master development Plan
8.   B) Development, Operating
9.   D) a, b, c, d, e and f
10.   B) System flowchart

Top 10 article writing tips for blogger.

If you want to see your blog at the top ranking and want to get lot of quality traffic. For getting top position for your blog in the major search engines like Google, Yahoo and Bing, writing quality original articles is most important task along with Search Engine Optimization (SEO). You should write such quality articles that your visitors be interested to read that. From my writing experience and knowledge about it, I have decided some top key factors for creating original content-full and quality article and listed them here.
  1. To start your writing you should select good Title for the article which can attract the visitors. The first 3-5 words of your article Title determine the success of your article in terms of how much traffic your article will generate to your site. So select such title which have must searchable keywords. 
  2. Choose and create the list of top keywords related to your chosen article topic by using one of the best keyword research sites. You can also use Google keyword tool for keyword research. 
  3. Start to write an article by using those collected keywords in appropriate places in natural manner. Be careful, excessive use of keywords in un-natural manner may harm. 
  4. Do not write too short or too long article. It should be written between 250 to 700 words and writing about 500 words is the best. You can use any of the several styles like using bullet list, numbered list, question and answer approach, discussion of issues for creating articles. 
  5. Separate your article at least into three parts as introduction or summery part, main body part and conclusion part. 
  6. At the first part you should write the introduction or the summery of the whole article which can inspire the viewers to read more. 
  7. The main body part of the article should impart your expert strategies, tips and knowledge. It may be bullet-ed or numbered list for easily reading. Use Bold and Italics occasionally to attract the reader to those points, but not use them in excessive amount. 
  8. At the conclusion part of the article, write your personal view about that topic and words to retrieve the readers view and reaction about the topic and article. 
  9. Proof your work after finishing the writing for spelling and grammatical errors in any part of your article. Read thoroughly each word from starting to ending and catch the mistakes and correct them. 
  10. While publishing your article don't forget to include the words of your article title in the URL address of the article. For example, as the URL address given for this article.
You are welcomed to write your view about above points or you can suggest, if you know any other good ideas about writing quality articles as comment in the comment session.

You may also wanted to view the following related posts

What is the scope of computer science or IT study?

UDXKU67AY6AW Most of the sectors or the fields of study started from hundreds of years ago and going to be on saturation for their scope but IT sector is such one sector which is not as others. So far using computers was in IT specific offices and organizations but now they are widely using in almost every sectors like Automobiles, Banking, Business, Communication, Defense, Education, Electronics, Entertainment, Finance, Manufacturing, Marketing etc. So Jobs for computer science or IT engineer will always be there in IT as well as non IT fields. Its range is wide and scope is high, so have many opportunities in technology and other industries.

Now, almost all the universities of the world started to produce IT professionals by launching different IT degree programs like Bachelor in Computer Application (BCA), Bachelor of Science in Information Technology (BScIT), Bachelor of Science in Computer Science etc. for undergraduate studies and Master in Computer Application (MCA), Master of Science in Information Technology (MScIT), Master of Science in Computer Science etc. for post graduate studies. On the basis of interest and the tasks performed by the workers new areas of specialization were established today. As such specialization Software Engineer may be computer programmer, System Analyst, System Designer, Network Administrator, Database Administrator, Information System Manager, Online Editor, Software quality Analyst, Trainer, Web designer and developer, Graphic Designer etc. 

Software engineers having such specialized post, each have distinct responsibilities. For example System Analyst analyze the software to develop, System Designer design the program after analyzing that and finally computer programmer converts the designed program to executable codes. System Engineer work with different systems, databases and correcting problems, Computer security Engineer face the challenge of beating hackers, spammers and the like. 

Thus the field of the computer Science or IT is very huge and also increasing its scope day by day. Millions of new jobs were generated for each year in the world. So if you are interested in the field of IT and want to establish your career in the field of IT, you can join for any IT degree programs by selecting the best college or university. I wish for your brighten future. 

What is intellectual property law?


Intellectual property is that area of law which concerns legal rights associated with creative effort or commercial reputation and goodwill. The subject matter or intellectual property is very wide and includes literally and artistic works, films, computer programs, inventions, design and marks used by traders for their goods or services. The law deters others from copying or taking unfair advantage of the work or reputation of another and provides remedies should this happen. There are several different forms of rights or areas of law giving rise to rights that together make up intellectual property including Copyright, Patents and Trademarks.


Copyright law is one of the intellectual property law which includes protecting the photography, sound recordings, films and broadcasting, computer programs, databases, preparatory material and associated documentation(in printed or electronic form) from being unauthorized copying, uses or distribution. As with any other literary work, the copyright in a computer program is infringed by making, without the copyright owner's license, a copy of the program or of a substantial part of it. Substantiality is an issue of quality and therefore the copyright subsisting in a computer program can be infringed if the 'essence' of the program is copied, even if the part copied is relatively small quantitatively. 


Any human being who invents, their inventions are protected by the law called patents law. The inventor his invention cannot exclude rivals from manufacturing or using it. But he could expect an income commensurate with the extent of the use of his invention by others. Where revenue derived from this use very substantially exceeds his R and D costs, it may well provide him with a substantial benefit. 


Along with patents and copyright, trademarks constitute a key component of system of intellectual property rights. Trademark is any sign capable of being represented graphically which is capable of distinguishing goods or services of one undertaking from those of other undertakings. It may in particular, consist of words, designs, letters, numbers or sale of goods or their packaging. Details of trademarks are recorded in the register of trademarks, a document which is open. Microsoft and Google both are the examples of registered trademarks.

You may also wanted to view the following related posts

What is Cyber Crime and What are the types?


What is Cyber Crime
Cyber crime refers to all the activities done with criminal intent in cyberspace or using the medium of Internet. These could be either the criminal activities in the conventional sense or activities, newly evolved with the growth of the new medium. Any activity, which basically offends human sensibilities, can be included in the ambit of Cyber crimes.

Because of the anonymous nature of Internet , it is possible to engage in a variety of criminal activities with impunity, and people with intelligence, have been grossly misusing this aspect of the Internet to commit criminal activities in Cyberspace.

The field of the Cyber crime is just emerging and new forms of criminal activities in Cyberspace are coming to the forefront each day. For example, child pornography on Internet constitutes on serious cyber crime. Similarly, online pedophiles, using Internet to minor children into sex, are as much cyber criminals as any others.



There are basically Three major categories of Cyber crimes which are:

  1. Cyber Crimes against persons: Cyber crimes committed against persons include various crimes like transmission of child-pornography, harassment of any one with the use of a computer and cyber stalking. The trafficking, distribution, posting, and dissemination of obscene material including pornography, indecent exposure, and child pornography, constitutes on of the most important cyber crimes today. Similarly, Cyber harassment is a distinct cyber crime. Various kind s of harassment's can and do occur in cyberspace, or through the use of cyberspace. Harassment can be sexual, racial, religious or of any other nature.
  2. Cyber crime against property: The second category of Cyber crimes is Cyber crimes against all forms of property. These crimes include unauthorized computer trespassing through cyberspace, computer vandalism, transmission of harmful programs and unauthorized possession of computerized information.
  3. Cyber crimes against Government: Third category of Cyber crimes is Cyber crimes against Government. Cyber Terrorism is one distinct kind of crime in this category. The growth of Internet has shown that the medium of cyberspace is being used by individuals and groups of threaten international governments as also to terrorize the citizens of a country. This crime manifests itself into Cyber Terrorism when and individual "cracks" into a government or military maintained website, for the purpose of perpetuating terror.


 You may also wanted to view the following related posts



What is Cyber-law?

Cyber law is a generic term which refers to all the legal and regular aspects of internet and the World Wide Web. Anything concerned with or related to or emanating from any legal aspects or issues concerning any activity of citizens and others, in cyberspace comes within the ambit of cyclone. In short term it can be says that "cyberspace is governed by a system of law and regulation called cyber law".


The term "cyberspace" was first used way back in 1984 by author William Gibson in his scientific novel Neuromancer to describe virtual world of computers. Today, cyberspace is how most people describe the word of the Net. The growth of Electronic Commerce has fuelled the need for vibrant and effective regulatory mechanisms, which would further strengthen the legal infrastructures, so crucial to the success of Electronic Commerce. All these regulatory mechanisms and legal infrastructures come within the domain of Cyberlaw. Cyberlaw is important because it touches almost all aspects of transactions and activities
concerning the internet, the World Wide Web and Cyberlaw. 

Cyberlaw concerns everyone. As the nature and scope of internet is changing and this new medium is being seen as the ultimate medium ever evolved in human history, every activity of yours in cyberspace can and will have cyber legal perspective. 

Today, the awareness about Cyberlaw is beginning to grow. Earlier, many technical experts felt that legal regulation of internet was not necessary. But with the rapid growth of technologies and Internet, it is clear that no activity on Internet can remain free from the influence of Cyberlaw. Publishing a web page is an excellent way for any commercial business or entity to vastly increase its exposures to millions of persons, organizations and governments worldwide. It is this feature of the Internet, which is causing much controversy in the legal fraternity. 

Cyberlaw is a constantly evolving process. As new opportunities and challenges are surfacing, Cyberlaw, being a constantly evolving process, is suitably modifying itself to fit the needs of the time. As the Internet grows, numerous legal issues arise relating to Domain Names, Intellectual Property Rights, Electronic Commerce, Privacy, Encryption, Electronic Contracts, Cybercrime, Online Banking, and Spamming and so on.

MCQ of Software Engineering with answer Set-2


1.  Reliability in a software system can be achieved using which of the following strategies.
A) Fault avoidance
B) Fault tolerance
C) Fault detection
D) All the above

2. ………………. strategy assumes that residual faults remain in the system and can continue in operation after some system failures have occurred.
A) Fault avoidance
B) Fault tolerance
C) Fault detection
D) None of the above


3. ……………… involves modifying the system so that the fault does not recur.
A) Failure detection
B) Damage assessment
C) Fault recovery
D) Fault repair

4. …………………… is an approach to program development whereby programmers assume that there may be undetected faults or inconsistencies in their programs.
A) Defensive programming
B) Effective programming
C) Strong programming
D) Known programming

5. ……………… is a classification scheme, which shows how an object class is related to other classes through common attributes and services.
A) Hierarchy
B) Inheritances
C) Taxonomy
D) None of the above

6. ……………. is a list of names used by the systems, arranged alphabetically.
A) Data Library
B) Data Dictionary
C) Name Dictionary
D) System Dictionary

7. The ………………….. model of system design is a distributed system model which show how data and processing is distributed across a range of processors.
A) repository
B) client-server
C) abstract machine
D) None of the above

8. The main design activities in the software design process are
i) System specification                   iii) Component design
ii) interface design                           iv) algorithm design
A)  ii, iii and iv only
B) i, ii and iii only
C) i, iii and iv only
D) All i, ii, iii and iv

9. ……………………. is the process, which controls the changes made to a system, and manages the different versions of the evolving software product.
A) Software management
B) Configuration management
C) Version management
D) Release management

10. The different types of software maintenance systems are
A) Corrective maintenance
B) Adaptive maintenance
C) Perfective maintenance
D) All the above

Answers:
1.    D) All the above
2.    B) Fault tolerance
3.    D) Fault repair
4.    A) Defensive programming
5.    C) Taxonomy
6.    B) Data Dictionary
7.    B) client-server
8.    D) All i, ii, iii and iv
9.    B) Configuration management
10.   D) All the above

You Might also view the following Related Posts

You can view the following other posts

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Cheap Web Hosting