Objective Questions of C with answer set-2

1. Hierarchy decides which operatorA) is most importantB) is used firstC) is fastestD) Operates on largest numbers2. A pointer can holdA) Single address at a timeB) Two addresses at a timeC) Number of addresses at a timeD) No address3. An integer constant in C must haveA) At least one digitB) At least one decimal pointC) A comma along with digitsD) Digits separated by commas4. main() {                Int a=3, b=2, c*d*e;                d=&a; e=&b;                c=*d+*e;                }               ...

Best 10 ways of making money online

Making money online is not easy task if you don't know about the best and easy ways for that. Since, Internet is itself a virtual world, so it may have several fraud offers. Selecting a best method of earning money online may be difficult task for anyone. You should be much careful while selecting the method for earning money online. You should select such a method which would be good and reliable source of income for your life time.I have presented here some best ways of making money online. I hope that this post would become best guideline for you. 1. Doing Freelance Writing: Freelance Writing is one of the most popular options for...

Solved Objective questions of computer data structure set-3

1. Which of the following is not the type of queue?A) Ordinary queueB) Single ended queueC) Circular queueD) Priority queue2. The property of binary tree isA) The first subset is called left subtreeB) The second subtree is called right subtreeC) The root cannot contain NULLD) The right subtree can be empty3. State true or false.i) The degree of root node is always zero.ii) Nodes that are not root and not leaf are called as internal nodes.A) True, TrueB) True, FalseC) False, TrueD) False, False4. Any node is the path from the root to the node is calledA) Successor nodeB) Ancestor nodeC) Internal nodeD) None of the above5. State true of false.i) A node is a parent if it has successor nodes.ii) A node is child node if out degree is one.A) True, TrueB) True, FalseC) False, TrueD) False, False6....

Solved Objective Questions of Computer Fundamental set-2

1. The default setting for a horizontal rule is ..............A) shadedB) unshadedC) bothD) none of the above2. ............... tag is used to embed image in a webpage.A) <img src="pic.gif">B) <img src=pic.gif>C) <img source="pic.gif">D) None of the above3. This is a global collection of high-powered computer that are connected together with cables, telephone lines, microwave dishes, satellites etc.A) ArpanetB) InternetC) NetworkD) All of the above4. ............ is used to pointing / selecting the screen co-ordinates by detecting the light.A) Light PenB) Bar Code ReaderC) Digital CameraD) Smart Cards5. ............... displays the information about the active document such as page number, section number, number of pages, insertion point, position, etc.A) View BarB) Menu...

What is literal and non-literal copying of computer programs?

Copying a computer program can be literal, where the program code itself is copied, in which case the two programs are written in the same computer programming language. Alternatively, copying can be non-literal, where elements of the program such as its structure, sequence of operations, functions, interfaces and methodologies are copied but the program code is not directly copied.Literal copying occurs where a person copies an existing program by disk to disk copying or by writing out or printing the program listing, perhaps to key it into another computer at a later date. In either case, the person making the copy may make some alterations...

Solved Objective Questions of System Analysis and Design set-5

1. ……………….. includes review of the existing procedures and information flow.A) Feasibility StudyB) Feasibility reportC) System DesignD) System analysis2. A rectangle in a DFD representsA) a processB) a data storeC) an external entityD) an input unit3. …………….. refers to the collection of information pertinent to systems Project.A) Data transferB) Data gatheringC) Data EmbeddingD) Data Request4. ………………….. means coordinated effort, to communicate the information of the system written form.A) System documentationB) Resource requiredC) Development scheduleD) User Document5. MDP stands forA) Master Development PlanB) Master Design ProgramC) Mandatory Database ProgramD) Master Database Plan6. External Entities may be aA) Source of input data onlyB) Source of input data or destination of resultsC)...

MCQ of System Analysis and Design with answer set-4

1. The rate of ……………. Is always an important factor for management especially in relation to the rate of returnA) CostB) BenefitC) SalesD) Investment2. Which of the following is / are the Characteristics of information?A) Accuracy and RelevanceB) Form of information and TimelinessC) Completeness and PurposeD) All A, B & C3. The data Flow Diagram is the basic component of …………… systemA) ConceptualB) LogicalC) PhysicalD) None of the above4. State True or False.i) Master Development Plan basically is a schedule of various applications to be comprised.ii) It consists of start and finish dates of a system analysis, design implementation and maintenance activities.A) i-True, ii-TrueB) i-False, ii-TrueC) i-True, ii-FalseD) i-False, ii-False5. The Key considerations involved in the feasibility...

Top 10 article writing tips for blogger.

If you want to see your blog at the top ranking and want to get lot of quality traffic. For getting top position for your blog in the major search engines like Google, Yahoo and Bing, writing quality original articles is most important task along with Search Engine Optimization (SEO). You should write such quality articles that your visitors be interested to read that. From my writing experience and knowledge about it, I have decided some top key factors for creating original content-full and quality article and listed them here.To start your writing you should select good Title for the article which can attract the visitors. The first 3-5 words of your article Title determine the success of your article in terms of how much traffic your article will generate to your site. So select such title...

What is the scope of computer science or IT study?

UDXKU67AY6AW Most of the sectors or the fields of study started from hundreds of years ago and going to be on saturation for their scope but IT sector is such one sector which is not as others. So far using computers was in IT specific offices and organizations but now they are widely using in almost every sectors like Automobiles, Banking, Business, Communication, Defense, Education, Electronics, Entertainment, Finance, Manufacturing, Marketing etc. So Jobs for computer science or IT engineer will always be there in IT as well as non IT fields. Its range is wide and scope is high, so have many opportunities in technology and other industries.Now, almost all the universities of the world started to produce IT professionals by launching different IT degree programs like Bachelor in Computer...

What is intellectual property law?

Intellectual property is that area of law which concerns legal rights associated with creative effort or commercial reputation and goodwill. The subject matter or intellectual property is very wide and includes literally and artistic works, films, computer programs, inventions, design and marks used by traders for their goods or services. The law deters others from copying or taking unfair advantage of the work or reputation of another and provides remedies should this happen. There are several different forms of rights or areas of law giving rise to rights that together make up intellectual property including Copyright, Patents and Trademarks.Copyright law is one of the intellectual property law which includes protecting the photography, sound recordings, films and broadcasting, computer...

What is Cyber Crime and What are the types?

Cyber crime refers to all the activities done with criminal intent in cyberspace or using the medium of Internet. These could be either the criminal activities in the conventional sense or activities, newly evolved with the growth of the new medium. Any activity, which basically offends human sensibilities, can be included in the ambit of Cyber crimes.Because of the anonymous nature of Internet , it is possible to engage in a variety of criminal activities with impunity, and people with intelligence, have been grossly misusing this aspect of the Internet to commit criminal activities in Cyberspace. The field of the Cyber crime is just emerging...

What is Cyber-law?

Cyber law is a generic term which refers to all the legal and regular aspects of internet and the World Wide Web. Anything concerned with or related to or emanating from any legal aspects or issues concerning any activity of citizens and others, in cyberspace comes within the ambit of cyclone. In short term it can be says that "cyberspace is governed by a system of law and regulation called cyber law".The term "cyberspace" was first used way back in 1984 by author William Gibson in his scientific novel Neuromancer to describe virtual world of computers. Today, cyberspace is how most people describe the word of the Net. The growth of Electronic Commerce has fuelled the need for vibrant and effective regulatory mechanisms, which would further strengthen the legal infrastructures, so crucial...

MCQ of Software Engineering with answer Set-2

1.  Reliability in a software system can be achieved using which of the following strategies.A) Fault avoidanceB) Fault toleranceC) Fault detectionD) All the above2. ………………. strategy assumes that residual faults remain in the system and can continue in operation after some system failures have occurred.A) Fault avoidanceB) Fault toleranceC) Fault detectionD) None of the above3. ……………… involves modifying the system so that the fault does not recur.A) Failure detectionB) Damage assessmentC) Fault recoveryD) Fault repair4. …………………… is an approach to program development whereby programmers assume that there may be undetected faults or inconsistencies in their programs.A) Defensive programmingB) Effective programmingC) Strong programmingD) Known programming5. ……………… is a classification scheme,...

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Cheap Web Hosting