Primilimnary round questions with answers


Published on

Published in: Education, Technology
1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Primilimnary round questions with answers

  1. 1. Date: Saturday,25 th February 2012 Venue: Meenakshi College for Women, Kodambakkam, Chennai-24. Young Mind Talent Showcase 2012
  2. 2. <ul><li>UNIVAC is </li></ul><ul><ul><li>Universal Automatic Computer </li></ul></ul><ul><ul><li>Universal Array Computer </li></ul></ul><ul><ul><li>Unique Automatic Computer </li></ul></ul><ul><ul><li>Unvalued Automatic Computer </li></ul></ul>(c) SB-Institute 02/28/12
  3. 3. 2) MSI stands for <ul><ul><li>Medium Scale Integrated Circuits </li></ul></ul><ul><ul><li>Medium System Integrated Circuits </li></ul></ul><ul><ul><li>Medium Scale Intelligent Circuit </li></ul></ul><ul><ul><li>Medium System Intelligent Circuit </li></ul></ul>(c) SB-Institute 02/28/12
  4. 4. 3) Pick the one that is used for logical operations or comparisons such as less than equal to or greater than . <ul><ul><li>Arithmetic and Logic Unit </li></ul></ul><ul><ul><li>Control Unit </li></ul></ul><ul><ul><li>Both of above </li></ul></ul><ul><ul><li>None of above </li></ul></ul>(c) SB-Institute 02/28/12
  5. 5. 4) Which of the following devices can be sued to directly image printed text? <ul><ul><li>OCR </li></ul></ul><ul><ul><li>OMR </li></ul></ul><ul><ul><li>MICR </li></ul></ul><ul><ul><li>All of above </li></ul></ul>(c) SB-Institute 02/28/12
  6. 6. 5) Who designed the first electronics computer – ENIAC? <ul><ul><li>Van-Neumann </li></ul></ul><ul><ul><li>Joseph M. Jacquard </li></ul></ul><ul><ul><li>J. Presper Eckert and John W Mauchly </li></ul></ul><ul><ul><li>All of above </li></ul></ul>(c) SB-Institute 02/28/12
  7. 7. 6) How many times the following ‘C’ program would print ‘good day’? main() { printf(“n good day”); main(); } <ul><li>Infinite number of times </li></ul><ul><li>32767 times </li></ul><ul><li>65535 times </li></ul><ul><li>till the stack doesn’t overflow </li></ul>(c) SB-Institute 02/28/12
  8. 8. 7) What does the following C statement print? printf(“%d”,++5); <ul><li>5 </li></ul><ul><li>6 </li></ul><ul><li>7 </li></ul><ul><li>an error message </li></ul>(c) SB-Institute 02/28/12
  9. 9. 8) We want to round off x, a float, to an int value. What is the correct way to do so? <ul><li>y=(int)(x+0.5); </li></ul><ul><li>y=int(x+0.5); </li></ul><ul><li>y=(int) x+0.5; </li></ul><ul><li>y=(int)((int)x+0.5) </li></ul>(c) SB-Institute 02/28/12
  10. 10. 9) To scan a and b given below which scanf() statement would you use? float a; double b; <ul><li>scanf(“%f%f”,&a,&b); </li></ul><ul><li>scanf(“%Lf%f”,&a,&b); </li></ul><ul><li>scanf(“%f%Lf”,&a,&b); </li></ul><ul><li>scanf(“%f%lf”,&a,&b); </li></ul>(c) SB-Institute 02/28/12
  11. 11. 10) What error would the following function given on compilation? F(int a, int b) { int a; a=20; return a; } <ul><li>missing parentheses in return statement </li></ul><ul><li>the function should be defined as int f(int a, int b) </li></ul><ul><li>redeclaration of a </li></ul><ul><li>None of the above . </li></ul>(c) SB-Institute 02/28/12
  12. 12. 11) Memory access in RISC architecture is limited to instructions <ul><ul><li>CALL and RET </li></ul></ul><ul><ul><li>PUSH and POP </li></ul></ul><ul><ul><li>STA and LDA </li></ul></ul><ul><ul><li>MOV and JMP </li></ul></ul>02/28/12 (c) SB-Institute
  13. 13. 12) Which of the following registers is used to keep track of address of the memory location where the next instruction is located? <ul><ul><li>Memory Address Register </li></ul></ul><ul><ul><li>Memory Data Register </li></ul></ul><ul><ul><li>Instruction Register </li></ul></ul><ul><ul><li>Program Register </li></ul></ul>(c) SB-Institute 02/28/12
  14. 14. 13) A Register is a group of ------- <ul><ul><li>OR gates   </li></ul></ul><ul><ul><li>OR & AND gate </li></ul></ul><ul><ul><li>Flip-flops </li></ul></ul><ul><ul><li>None of these </li></ul></ul>(c) SB-Institute 02/28/12
  15. 15. 14) Each Flip-flop stores ---------- bits <ul><ul><li>1 bit </li></ul></ul><ul><ul><li>8 bit   </li></ul></ul><ul><ul><li>16 bit   </li></ul></ul><ul><ul><li>2 bit </li></ul></ul>(c) SB-Institute 02/28/12
  16. 16. 15) A NOR gate is ON only when all its inputs are <ul><ul><li>ON   </li></ul></ul><ul><ul><li>positive   </li></ul></ul><ul><ul><li>high </li></ul></ul><ul><ul><li>OFF </li></ul></ul>(c) SB-Institute 02/28/12
  17. 17. 16) A derived class <ul><ul><li>Inherits data members and member functions from base class. </li></ul></ul><ul><ul><li>Inherits constructors and destructor. </li></ul></ul><ul><ul><li>Object can access protected members with the dot operator. </li></ul></ul><ul><ul><li>Inherits data members and member functions from base class as well as Inherits constructors and destructor. </li></ul></ul>(c) SB-Institute 02/28/12
  18. 18. 17) ______ means that both the data and the methods which may access it are defined together in the same unit. <ul><li>Data hiding. </li></ul><ul><li>Encapsulation </li></ul><ul><li>Data Binding </li></ul><ul><li>None of these options </li></ul>(c) SB-Institute 02/28/12
  19. 19. 18) An application uses encapsulation to achieve ________ <ul><li>Information hiding </li></ul><ul><li>Minimizing interdependencies among modules </li></ul><ul><li>Make implementation independent </li></ul><ul><li>All of these options </li></ul>(c) SB-Institute 02/28/12
  20. 20. 19) _______ provide useful conceptual framework. <ul><li>Inheritance </li></ul><ul><li>Polymorphism </li></ul><ul><li>Encapsulation </li></ul><ul><li>None of these options </li></ul>(c) SB-Institute 02/28/12
  21. 21. 20) Statement I: All the non-private members of the base class can be accessed from the derived class as if they were members of the derived class. Statement II: The protected data members can be accessed in the same class or in its derived class <ul><li>Both are true. </li></ul><ul><li>Both are false </li></ul><ul><li>Statement I is true, statement II is false </li></ul><ul><li>Statement I is false, statement II is true. </li></ul>(c) SB-Institute 02/28/12
  22. 22. 21) Which of the following data structure is not linear data structure? <ul><li>Arrays </li></ul><ul><li>Linked lists </li></ul><ul><li>Both of above </li></ul><ul><li>None of above </li></ul>(c) SB-Institute 02/28/12
  23. 23. 22) Arrays are best data structures <ul><li>for relatively permanent collections of data </li></ul><ul><li>for the size of the structure and the data in the structure are constantly changing </li></ul><ul><li>for both of above situation </li></ul><ul><li>for none of above situation </li></ul>(c) SB-Institute 02/28/12
  24. 24. 23) Linked lists are best suited <ul><li>for relatively permanent collections of data </li></ul><ul><li>for the size of the structure and the data in the structure are constantly changing </li></ul><ul><li>for both of above situation </li></ul><ul><li>for none of above situation </li></ul>(c) SB-Institute 02/28/12
  25. 25. 24) The elements of an array are stored successively in memory cells because <ul><li>by this way computer can keep track only the address of the first element and the addresses of other elements can be calculated </li></ul><ul><li>the architecture of computer memory does not allow arrays to store other than serially </li></ul><ul><li>both of above </li></ul><ul><li>none of above </li></ul>(c) SB-Institute 02/28/12
  26. 26. 25) Finding the location of the element with a given value is: <ul><li>Traversal </li></ul><ul><li>Search </li></ul><ul><li>Sort </li></ul><ul><li>None of above </li></ul>(c) SB-Institute 02/28/12
  27. 27. 26) Which of the following are valid statements? <ul><li>System.out.println(1+1); </li></ul><ul><li>b)int i=2+'2' ; </li></ul><ul><li>String s=&quot;on&quot;+'one'; </li></ul><ul><li>d)byte b=255; </li></ul>(c) SB-Institute 02/28/12
  28. 28. 27) Which of the following statements are true? <ul><li>The garbage collection algorithm in Java is vendor implemented </li></ul><ul><li>The size of primitives is platform dependent </li></ul><ul><li>The default type for a numerical literal with decimal component is a float. </li></ul><ul><li>You can modify the value in an Instance of the Integer class with the setValue method </li></ul>(c) SB-Institute 02/28/12
  29. 29. 28) float f=5.0f; float g=2.0f; double h; h=3+f%g+2; Referring to the above what is the expected value for h after execution? <ul><li>5.2 </li></ul><ul><li>6.0 </li></ul><ul><li>7.0 </li></ul><ul><li>7.5 </li></ul>(c) SB-Institute 02/28/12
  30. 30. 29) Which of the following statements are true? <ul><li>The String class is implemented as a char array, elements are addressed using the stringname[] convention. </li></ul><ul><li>The + operator is overloaded for concatenation for the String class </li></ul><ul><li>Strings are a primitive type in Java and the StringBuffer is used as the matching wrapper type </li></ul><ul><li>The size of a string can be retrieved using the length property. </li></ul>(c) SB-Institute 02/28/12
  31. 31. 30) What is the difference between a class and a object <ul><li>a class represents a collection of objects </li></ul><ul><li>a class defines the attributes and behaviors of an object </li></ul><ul><li>an object represents a collection of classes </li></ul><ul><li>they are the same thing. </li></ul>(c) SB-Institute 02/28/12
  32. 32. 31) The primary job of the operating systems of a computer is to <ul><li>Command resources </li></ul><ul><li>manage resources </li></ul><ul><li>provide utilities </li></ul><ul><li>All of these. </li></ul>(c) SB-Institute 02/28/12
  33. 33. 32) A critical section is a program segment <ul><li>which should run in a certain specified amount of time </li></ul><ul><li>which avoids deadlock </li></ul><ul><li>where shared resources are accessed </li></ul><ul><li>Which must be endorsed by a pair of semaphore operations, P and V. </li></ul>(c) SB-Institute 02/28/12
  34. 34. 33) Banker’s algorithm for resource allocation deals with <ul><li>deadlock prevention </li></ul><ul><li>deadlock avoidance </li></ul><ul><li>deadlock recovery </li></ul><ul><li>Cache coherence. </li></ul>(c) SB-Institute 02/28/12
  35. 35. 34) Logical address is <ul><li>an address generated by the CPU </li></ul><ul><li>address seen by the memory unit </li></ul><ul><li>both (a) and (b) </li></ul><ul><li>None of the above. </li></ul>(c) SB-Institute 02/28/12
  36. 36. 35) Which of the following statements is false? <ul><li>a small page size causes large page tables </li></ul><ul><li>Internal fragmentation is increased with small pages </li></ul><ul><li>a large page size causes instructions and data that will not be referenced brought into primary storage </li></ul><ul><li>I/O transfer are more efficient with large pages </li></ul>(c) SB-Institute 02/28/12
  37. 37. 36) In a large DBMS <ul><li>each user can “see” only a small part of the entire data base </li></ul><ul><li>each subschema contains every field in the logical schema </li></ul><ul><li>each user can access every subschema </li></ul><ul><li>all of these. </li></ul>(c) SB-Institute 02/28/12
  38. 38. 37) Which normal form is considered adequate for normal relational database design? <ul><li>2NF </li></ul><ul><li>5NF </li></ul><ul><li>4NF </li></ul><ul><li>3NF </li></ul>(c) SB-Institute 02/28/12
  39. 39. 38) Which two files are used during operation of the DBMS? <ul><li>Query language and utilities </li></ul><ul><li>Data manipulation language and query language </li></ul><ul><li>Data dictionary and transaction log </li></ul><ul><li>Data dictionary and query language. </li></ul>(c) SB-Institute 02/28/12
  40. 40. 39) User defined exceptions must be declared and raised explicitly be _________ statements <ul><li>SELECT </li></ul><ul><li>ERROR </li></ul><ul><li>EXCEPTION </li></ul><ul><li>RAISE </li></ul>(c) SB-Institute 02/28/12
  41. 41. 40) The ascending order of a data hierarchy is: <ul><li>bit-byte-record-field-file-database </li></ul><ul><li>byte-bit-field-record-file-database </li></ul><ul><li>bit-byte-field-record-file-database </li></ul><ul><li>bit-byte-file-record-field-database </li></ul>(c) SB-Institute 02/28/12
  42. 42. 41) In OSI network architecture, the dialogue control and token management are responsibility of <ul><ul><li>session layer </li></ul></ul><ul><ul><li>network layer </li></ul></ul><ul><ul><li>transport layer </li></ul></ul><ul><ul><li>data link layer </li></ul></ul><ul><ul><li>none of above </li></ul></ul>(c) SB-Institute 02/28/12
  43. 43. 42) How many OSI layers are covered in the X.25 standard? <ul><ul><li>Two </li></ul></ul><ul><ul><li>Three </li></ul></ul><ul><ul><li>Seven </li></ul></ul><ul><ul><li>Six </li></ul></ul><ul><ul><li>None of above </li></ul></ul>(c) SB-Institute 02/28/12
  44. 44. 43) Which of the following communication modes support two-way traffic but in only one direction at a time? <ul><ul><li>simplex </li></ul></ul><ul><ul><li>half duplex </li></ul></ul><ul><ul><li>three-quarters duplex </li></ul></ul><ul><ul><li>all of the above </li></ul></ul><ul><ul><li>none of the above </li></ul></ul>(c) SB-Institute 02/28/12
  45. 45. 44) Which of the following statement is incorrect? <ul><ul><li>The difference between synchronous and asynchronous transmission is the clocking derived from the data in synchronous transmission. </li></ul></ul><ul><ul><li>Half duplex line is a communication line in which data can move in two directions, but not at the same time. </li></ul></ul><ul><ul><li>Teleprocessing combines telecommunications and DP techniques in online activities </li></ul></ul><ul><ul><li>Batch processing is the prefered processing mode for telecommunication operation . </li></ul></ul>(c) SB-Institute 02/28/12
  46. 46. 45) Which of the following statement is incorrect? <ul><ul><li>Multiplexers are designed to accept data from several I/O devices and transmit a unified stream of data on one communication line </li></ul></ul><ul><ul><li>HDLC is a standard synchronous communication protocol. </li></ul></ul><ul><ul><li>RTS/CTS is the way the DTE indicates that it is ready to transmit data and the way the DCW indicates that it is ready to accept data </li></ul></ul><ul><ul><li>RTS/CTS is the way the terminal indicates ringing </li></ul></ul>(c) SB-Institute 02/28/12
  47. 47. 46) The typical elements of the requirements engineering process are i) Problem analysis ii) software design iii) Analysis of staffing needs iv) External behavior specification <ul><li>i and ivi </li></ul><ul><li>i and iii </li></ul><ul><li>i, iii and iv </li></ul><ul><li>i, ii and iii </li></ul>(c) SB-Institute 02/28/12
  48. 48. 47) The elements of the software architecture of computing systems include i) software componentsii) class diagramsiii) connectors expressing relationships between software componentsiv) entity relationship diagram <ul><li>i and ii </li></ul><ul><li>i and iiii </li></ul><ul><li>iii and iv </li></ul><ul><li>i,ii, iii and iv </li></ul>(c) SB-Institute 02/28/12
  49. 49. 48) Which of the following types of test plans is most likely to arise form the requirements specification process? <ul><li>system integration test plan </li></ul><ul><li>acceptance test plan </li></ul><ul><li>sub-system integration test plan </li></ul><ul><li>module test plan </li></ul>(c) SB-Institute 02/28/12
  50. 50. 49) Pick up the correct sequence of processes <ul><li>Requirements, Analysis, Test case design, Design </li></ul><ul><li>Requirements, Test case design, Analysis, Design </li></ul><ul><li>Requirements, Analysis, Design, Test case design </li></ul>(c) SB-Institute 02/28/12
  51. 51. 50) Four important characteristics of a software product are <ul><li>dependability, usability, reliability, robustness </li></ul><ul><li>maintainability, dependability, efficiency, usability </li></ul><ul><li>Supportability, maintainability, visibility, rapididty </li></ul>(c) SB-Institute 02/28/12
  52. 52. 51) VGA is <ul><li>Video Graphics Array </li></ul><ul><li>Visual Graphics Array </li></ul><ul><li>Volatile Graphics Array </li></ul><ul><li>Video Graphics Adapter </li></ul>(c) SB-Institute 02/28/12
  53. 53. 52) This projection technique has the direction of projection perpendicular to the viewing plane, but the viewing direction is NOT perpendicular to one of the principle faces. <ul><li>Orthographic Parallel Projection </li></ul><ul><li>Axonometric Parallel Projection </li></ul><ul><li>Oblique Parallel Projection </li></ul>(c) SB-Institute 02/28/12
  54. 54. 53) When transforming a random Axis-Aligned Bounding Box defined by the points (nearx, neary, nearz) and (farx, fary, farz) to the standard orthographic viewing box, which affine transforms are used? <ul><li>shear and translation </li></ul><ul><li>rotation and scale </li></ul><ul><li>scale and shear </li></ul><ul><li>translation and scale </li></ul>(c) SB-Institute 02/28/12
  55. 55. 54) Which of the following does NOT figure into the Field of View of a pinhole camera? <ul><li>The direction of projection </li></ul><ul><li>The distance from the center of projection to the projection plane </li></ul><ul><li>The size of the projection plane </li></ul>(c) SB-Institute 02/28/12
  56. 56. 55) Which of the following is NOT true about quaternion? <ul><ul><li>They are made up of 4 numbers </li></ul></ul><ul><ul><li>They should always be normalized to length 1 </li></ul></ul><ul><ul><li>They can be used to represent all affine transforms </li></ul></ul><ul><ul><li>They can be used to define the rotation of an object </li></ul></ul>(c) SB-Institute 02/28/12
  57. 57. 56) _ _ _ _ _ _ _ _ _ _ is used to graphically represent the flow of events of a use case <ul><li>Class diagram </li></ul><ul><li>Use case diagram </li></ul><ul><li>sequence diagram </li></ul><ul><li>Activity diagram </li></ul>(c) SB-Institute 02/28/12
  58. 58. 57) Which of the following is NOT present in a Use Case Diagram? <ul><li>Note </li></ul><ul><li>Actor </li></ul><ul><li>Constraint </li></ul><ul><li>Collaboration </li></ul>(c) SB-Institute 02/28/12
  59. 59. 58) Objects placed in an Activity Diagram are connected to the activity or transition using _ _ _ _ _ _ _ _ _ _ _ _ relationship <ul><li>Association </li></ul><ul><li>Generalization </li></ul><ul><li>Dependency </li></ul><ul><li>Realization </li></ul>(c) SB-Institute 02/28/12
  60. 60. 59) Internal event occurs when <ul><li>The User Presses a Button </li></ul><ul><li>A method is invoked via a message </li></ul><ul><li>The System changes the state </li></ul><ul><li>The operation of the object is completed </li></ul>(c) SB-Institute 02/28/12
  61. 61. 60) Diagram is used to model reactive objects. <ul><li>Class Diagram </li></ul><ul><li>Object Diagram </li></ul><ul><li>State Chart Diagram </li></ul><ul><li>Sequence Diagram </li></ul>(c) SB-Institute 02/28/12
  62. 62. (c) SB-Institute 02/28/12 Quiz Master: Dr. C.V. Suresh Babu Email: [email_address] Site: