• Save
Primilimnary round questions with answers
Upcoming SlideShare
Loading in...5
×
 

Primilimnary round questions with answers

on

  • 3,053 views

 

Statistics

Views

Total Views
3,053
Views on SlideShare
3,031
Embed Views
22

Actions

Likes
1
Downloads
0
Comments
0

2 Embeds 22

https://jujo00obo2o234ungd3t8qjfcjrs3o6k-a-sites-opensocial.googleusercontent.com 14
http://jujo00obo2o234ungd3t8qjfcjrs3o6k-a-sites-opensocial.googleusercontent.com 8

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Primilimnary round questions with answers Primilimnary round questions with answers Presentation Transcript

  • Date: Saturday,25 th February 2012 Venue: Meenakshi College for Women, Kodambakkam, Chennai-24. Young Mind Talent Showcase 2012
    • UNIVAC is
      • Universal Automatic Computer
      • Universal Array Computer
      • Unique Automatic Computer
      • Unvalued Automatic Computer
    (c) SB-Institute 02/28/12
  • 2) MSI stands for
      • Medium Scale Integrated Circuits
      • Medium System Integrated Circuits
      • Medium Scale Intelligent Circuit
      • Medium System Intelligent Circuit
    (c) SB-Institute 02/28/12
  • 3) Pick the one that is used for logical operations or comparisons such as less than equal to or greater than .
      • Arithmetic and Logic Unit
      • Control Unit
      • Both of above
      • None of above
    (c) SB-Institute 02/28/12
  • 4) Which of the following devices can be sued to directly image printed text?
      • OCR
      • OMR
      • MICR
      • All of above
    (c) SB-Institute 02/28/12
  • 5) Who designed the first electronics computer – ENIAC?
      • Van-Neumann
      • Joseph M. Jacquard
      • J. Presper Eckert and John W Mauchly
      • All of above
    (c) SB-Institute 02/28/12
  • 6) How many times the following ‘C’ program would print ‘good day’? main() { printf(“n good day”); main(); }
    • Infinite number of times
    • 32767 times
    • 65535 times
    • till the stack doesn’t overflow
    (c) SB-Institute 02/28/12
  • 7) What does the following C statement print? printf(“%d”,++5);
    • 5
    • 6
    • 7
    • an error message
    (c) SB-Institute 02/28/12
  • 8) We want to round off x, a float, to an int value. What is the correct way to do so?
    • y=(int)(x+0.5);
    • y=int(x+0.5);
    • y=(int) x+0.5;
    • y=(int)((int)x+0.5)
    (c) SB-Institute 02/28/12
  • 9) To scan a and b given below which scanf() statement would you use? float a; double b;
    • scanf(“%f%f”,&a,&b);
    • scanf(“%Lf%f”,&a,&b);
    • scanf(“%f%Lf”,&a,&b);
    • scanf(“%f%lf”,&a,&b);
    (c) SB-Institute 02/28/12
  • 10) What error would the following function given on compilation? F(int a, int b) { int a; a=20; return a; }
    • missing parentheses in return statement
    • the function should be defined as int f(int a, int b)
    • redeclaration of a
    • None of the above .
    (c) SB-Institute 02/28/12
  • 11) Memory access in RISC architecture is limited to instructions
      • CALL and RET
      • PUSH and POP
      • STA and LDA
      • MOV and JMP
    02/28/12 (c) SB-Institute
  • 12) Which of the following registers is used to keep track of address of the memory location where the next instruction is located?
      • Memory Address Register
      • Memory Data Register
      • Instruction Register
      • Program Register
    (c) SB-Institute 02/28/12
  • 13) A Register is a group of -------
      • OR gates  
      • OR & AND gate
      • Flip-flops
      • None of these
    (c) SB-Institute 02/28/12
  • 14) Each Flip-flop stores ---------- bits
      • 1 bit
      • 8 bit  
      • 16 bit  
      • 2 bit
    (c) SB-Institute 02/28/12
  • 15) A NOR gate is ON only when all its inputs are
      • ON  
      • positive  
      • high
      • OFF
    (c) SB-Institute 02/28/12
  • 16) A derived class
      • Inherits data members and member functions from base class.
      • Inherits constructors and destructor.
      • Object can access protected members with the dot operator.
      • Inherits data members and member functions from base class as well as Inherits constructors and destructor.
    (c) SB-Institute 02/28/12
  • 17) ______ means that both the data and the methods which may access it are defined together in the same unit.
    • Data hiding.
    • Encapsulation
    • Data Binding
    • None of these options
    (c) SB-Institute 02/28/12
  • 18) An application uses encapsulation to achieve ________
    • Information hiding
    • Minimizing interdependencies among modules
    • Make implementation independent
    • All of these options
    (c) SB-Institute 02/28/12
  • 19) _______ provide useful conceptual framework.
    • Inheritance
    • Polymorphism
    • Encapsulation
    • None of these options
    (c) SB-Institute 02/28/12
  • 20) Statement I: All the non-private members of the base class can be accessed from the derived class as if they were members of the derived class. Statement II: The protected data members can be accessed in the same class or in its derived class
    • Both are true.
    • Both are false
    • Statement I is true, statement II is false
    • Statement I is false, statement II is true.
    (c) SB-Institute 02/28/12
  • 21) Which of the following data structure is not linear data structure?
    • Arrays
    • Linked lists
    • Both of above
    • None of above
    (c) SB-Institute 02/28/12
  • 22) Arrays are best data structures
    • for relatively permanent collections of data
    • for the size of the structure and the data in the structure are constantly changing
    • for both of above situation
    • for none of above situation
    (c) SB-Institute 02/28/12
  • 23) Linked lists are best suited
    • for relatively permanent collections of data
    • for the size of the structure and the data in the structure are constantly changing
    • for both of above situation
    • for none of above situation
    (c) SB-Institute 02/28/12
  • 24) The elements of an array are stored successively in memory cells because
    • by this way computer can keep track only the address of the first element and the addresses of other elements can be calculated
    • the architecture of computer memory does not allow arrays to store other than serially
    • both of above
    • none of above
    (c) SB-Institute 02/28/12
  • 25) Finding the location of the element with a given value is:
    • Traversal
    • Search
    • Sort
    • None of above
    (c) SB-Institute 02/28/12
  • 26) Which of the following are valid statements?
    • System.out.println(1+1);
    • b)int i=2+'2' ;
    • String s="on"+'one';
    • d)byte b=255;
    (c) SB-Institute 02/28/12
  • 27) Which of the following statements are true?
    • The garbage collection algorithm in Java is vendor implemented
    • The size of primitives is platform dependent
    • The default type for a numerical literal with decimal component is a float.
    • You can modify the value in an Instance of the Integer class with the setValue method
    (c) SB-Institute 02/28/12
  • 28) float f=5.0f; float g=2.0f; double h; h=3+f%g+2; Referring to the above what is the expected value for h after execution?
    • 5.2
    • 6.0
    • 7.0
    • 7.5
    (c) SB-Institute 02/28/12
  • 29) Which of the following statements are true?
    • The String class is implemented as a char array, elements are addressed using the stringname[] convention.
    • The + operator is overloaded for concatenation for the String class
    • Strings are a primitive type in Java and the StringBuffer is used as the matching wrapper type
    • The size of a string can be retrieved using the length property.
    (c) SB-Institute 02/28/12
  • 30) What is the difference between a class and a object
    • a class represents a collection of objects
    • a class defines the attributes and behaviors of an object
    • an object represents a collection of classes
    • they are the same thing.
    (c) SB-Institute 02/28/12
  • 31) The primary job of the operating systems of a computer is to
    • Command resources
    • manage resources
    • provide utilities
    • All of these.
    (c) SB-Institute 02/28/12
  • 32) A critical section is a program segment
    • which should run in a certain specified amount of time
    • which avoids deadlock
    • where shared resources are accessed
    • Which must be endorsed by a pair of semaphore operations, P and V.
    (c) SB-Institute 02/28/12
  • 33) Banker’s algorithm for resource allocation deals with
    • deadlock prevention
    • deadlock avoidance
    • deadlock recovery
    • Cache coherence.
    (c) SB-Institute 02/28/12
  • 34) Logical address is
    • an address generated by the CPU
    • address seen by the memory unit
    • both (a) and (b)
    • None of the above.
    (c) SB-Institute 02/28/12
  • 35) Which of the following statements is false?
    • a small page size causes large page tables
    • Internal fragmentation is increased with small pages
    • a large page size causes instructions and data that will not be referenced brought into primary storage
    • I/O transfer are more efficient with large pages
    (c) SB-Institute 02/28/12
  • 36) In a large DBMS
    • each user can “see” only a small part of the entire data base
    • each subschema contains every field in the logical schema
    • each user can access every subschema
    • all of these.
    (c) SB-Institute 02/28/12
  • 37) Which normal form is considered adequate for normal relational database design?
    • 2NF
    • 5NF
    • 4NF
    • 3NF
    (c) SB-Institute 02/28/12
  • 38) Which two files are used during operation of the DBMS?
    • Query language and utilities
    • Data manipulation language and query language
    • Data dictionary and transaction log
    • Data dictionary and query language.
    (c) SB-Institute 02/28/12
  • 39) User defined exceptions must be declared and raised explicitly be _________ statements
    • SELECT
    • ERROR
    • EXCEPTION
    • RAISE
    (c) SB-Institute 02/28/12
  • 40) The ascending order of a data hierarchy is:
    • bit-byte-record-field-file-database
    • byte-bit-field-record-file-database
    • bit-byte-field-record-file-database
    • bit-byte-file-record-field-database
    (c) SB-Institute 02/28/12
  • 41) In OSI network architecture, the dialogue control and token management are responsibility of
      • session layer
      • network layer
      • transport layer
      • data link layer
      • none of above
    (c) SB-Institute 02/28/12
  • 42) How many OSI layers are covered in the X.25 standard?
      • Two
      • Three
      • Seven
      • Six
      • None of above
    (c) SB-Institute 02/28/12
  • 43) Which of the following communication modes support two-way traffic but in only one direction at a time?
      • simplex
      • half duplex
      • three-quarters duplex
      • all of the above
      • none of the above
    (c) SB-Institute 02/28/12
  • 44) Which of the following statement is incorrect?
      • The difference between synchronous and asynchronous transmission is the clocking derived from the data in synchronous transmission.
      • Half duplex line is a communication line in which data can move in two directions, but not at the same time.
      • Teleprocessing combines telecommunications and DP techniques in online activities
      • Batch processing is the prefered processing mode for telecommunication operation .
    (c) SB-Institute 02/28/12
  • 45) Which of the following statement is incorrect?
      • Multiplexers are designed to accept data from several I/O devices and transmit a unified stream of data on one communication line
      • HDLC is a standard synchronous communication protocol.
      • RTS/CTS is the way the DTE indicates that it is ready to transmit data and the way the DCW indicates that it is ready to accept data
      • RTS/CTS is the way the terminal indicates ringing
    (c) SB-Institute 02/28/12
  • 46) The typical elements of the requirements engineering process are i) Problem analysis ii) software design iii) Analysis of staffing needs iv) External behavior specification
    • i and ivi
    • i and iii
    • i, iii and iv
    • i, ii and iii
    (c) SB-Institute 02/28/12
  • 47) The elements of the software architecture of computing systems include i) software componentsii) class diagramsiii) connectors expressing relationships between software componentsiv) entity relationship diagram
    • i and ii
    • i and iiii
    • iii and iv
    • i,ii, iii and iv
    (c) SB-Institute 02/28/12
  • 48) Which of the following types of test plans is most likely to arise form the requirements specification process?
    • system integration test plan
    • acceptance test plan
    • sub-system integration test plan
    • module test plan
    (c) SB-Institute 02/28/12
  • 49) Pick up the correct sequence of processes
    • Requirements, Analysis, Test case design, Design
    • Requirements, Test case design, Analysis, Design
    • Requirements, Analysis, Design, Test case design
    (c) SB-Institute 02/28/12
  • 50) Four important characteristics of a software product are
    • dependability, usability, reliability, robustness
    • maintainability, dependability, efficiency, usability
    • Supportability, maintainability, visibility, rapididty
    (c) SB-Institute 02/28/12
  • 51) VGA is
    • Video Graphics Array
    • Visual Graphics Array
    • Volatile Graphics Array
    • Video Graphics Adapter
    (c) SB-Institute 02/28/12
  • 52) This projection technique has the direction of projection perpendicular to the viewing plane, but the viewing direction is NOT perpendicular to one of the principle faces.
    • Orthographic Parallel Projection
    • Axonometric Parallel Projection
    • Oblique Parallel Projection
    (c) SB-Institute 02/28/12
  • 53) When transforming a random Axis-Aligned Bounding Box defined by the points (nearx, neary, nearz) and (farx, fary, farz) to the standard orthographic viewing box, which affine transforms are used?
    • shear and translation
    • rotation and scale
    • scale and shear
    • translation and scale
    (c) SB-Institute 02/28/12
  • 54) Which of the following does NOT figure into the Field of View of a pinhole camera?
    • The direction of projection
    • The distance from the center of projection to the projection plane
    • The size of the projection plane
    (c) SB-Institute 02/28/12
  • 55) Which of the following is NOT true about quaternion?
      • They are made up of 4 numbers
      • They should always be normalized to length 1
      • They can be used to represent all affine transforms
      • They can be used to define the rotation of an object
    (c) SB-Institute 02/28/12
  • 56) _ _ _ _ _ _ _ _ _ _ is used to graphically represent the flow of events of a use case
    • Class diagram
    • Use case diagram
    • sequence diagram
    • Activity diagram
    (c) SB-Institute 02/28/12
  • 57) Which of the following is NOT present in a Use Case Diagram?
    • Note
    • Actor
    • Constraint
    • Collaboration
    (c) SB-Institute 02/28/12
  • 58) Objects placed in an Activity Diagram are connected to the activity or transition using _ _ _ _ _ _ _ _ _ _ _ _ relationship
    • Association
    • Generalization
    • Dependency
    • Realization
    (c) SB-Institute 02/28/12
  • 59) Internal event occurs when
    • The User Presses a Button
    • A method is invoked via a message
    • The System changes the state
    • The operation of the object is completed
    (c) SB-Institute 02/28/12
  • 60) Diagram is used to model reactive objects.
    • Class Diagram
    • Object Diagram
    • State Chart Diagram
    • Sequence Diagram
    (c) SB-Institute 02/28/12
  • (c) SB-Institute 02/28/12 Quiz Master: Dr. C.V. Suresh Babu Email: [email_address] Site:https://sites.google.com/site/anniyappa/