Sunday, June 27, 2010

IT Fundamental - X

1. On the motherboard (the) … is the temporary computer memory area in which data can be stored.
a. expansion slot
b. math co-processor
c. RAM
d. ROM BIOS

2. The device used in a data communication network to perform the conversion between analogue and digital signals, is called a …
a. front end processor.
b. modem.
c. decoder.
d. multiplexer.

3.If you look carefully at the motherboard, you will notice that some chips are soldered to the board whilst others are plugged into the board. The removable chips allow you to ...
a. add extra power sources to your computer.
b. integrate the ALU and the system clock unit.
c. re-arrange the layout of your motherboard.
d. upgrade your computer components.

4. The Internet offers different services. Which one listed below is incorrect?
a. Chat room
b. Electronic mail
c. Off line shopping
d. World Wide Web

5. The Internet is ...
a. a global network of computers networks.
b. a government-owned agency that links computers.
c. software for sending e-mail around the world.
d. a specialised form of local area network.

6. The CPU deals with each instruction in a cycle. The sequence of instructions to carry out one machine instruction is called the instruction or machine cycle. The first action is to fetch the instruction from memory and then the program counter is updated (reset). The other three phases of the machine cycle in the correct order are:
a. Decode the instruction; Execute the instruction; Transfer the data.
b. Decode the instruction; Transfer the data; Execute the instruction.
c. Execute the instruction; Decode the instruction; Transfer the data.
d. Transfer the data; Execute the instruction; Decode the instruction.

7. When the electrical power is disrupted or cut off, data and programs are lost in/on (the) ...
a. basic tools.
b. hard disk.
c. memory.
d. secondary storage.

8. The communication bus which is used to fetch the address of an instruction from memory is called the …
a. address bus.
b. control bus.
c. data bus.
d. fetch bus.

9. Read Only Memory (ROM)
i. Is volatile
ii. Is programmable
iii. Is mounted on the mother board
iv. Contains the bootstrap loader
a. i and iii
b. i, ii and iv
c. ii, iii and iv
d. iii and iv

10. An online meeting allows users to ...
a. determine the receiver's geographic location.
b. leave voice messages for one or two people.
c. print to a web address that is associated to a particular printer.
d. share documents with others in real time.

Friday, June 18, 2010

Software Engg. - III

1) Business model is the part of designing phase of software engineering development life cycle
a. True
b. False

2) The state transition diagram
a. depicts relationships between data objects
b. depicts functions that transform the data flow
c. indicates how data are transformed by the system
d. indicates system reactions to external events

3) The best way to conduct a requirements validation review is to
a. Examine the system
b. Have the customer look over the requirements
c. Send them to the design team
d. Use checklist to examine the questions

4) The system specification describes the
a. Function, performance and constraints of a computer-based system
b. implementation of each allocated system
c. time required for simulation
d. element software architecture

5) For each of the following given Requirement indicate whether it is Functional (F) or Non-Functional (N) Requirement.
a. The System should be designed so it can later be extended to a Blue Line
reservation System.(N)
b. The System will allow the user to view the layout of seats in Bus.(F)
c. The System must be available at all times.(N)
d. A given seat can be assigned to only one person.(F)

6)Both the software engineer and customer take an active role in software requirements engineering-a set of activities that is often referred to as Requirement_______________
a. Managing
b. Recognition
c. Analysis
d. Modeling

7)_________ is a measure of independence of a module or component.
a. Cohesion
b. Coupling
c. Loop coupling
d. Loop cohesion

8) In the Functional design, the structure of the system revolves around __________
a. Functions
b. Sequences
c. Models
d. Flows

9)Use case is the part of designing phase of software engineering
a. True
b. False

10) Three categories of risks are
a. Business, personnel risks, budget risks
b. project risks, technical risks, business risks
c. planning risks, technical risks, personnel risks
d. management risks, technical risks, design risks

Sunday, June 13, 2010

Software Engg. - II

1. Decomposing the major project deliverables into smaller, more manageable components to provide better control is called:
a) Project planning.
b) Scope definition.
c) Project base lining.
d) Requirements verification.

2. Select one aspect that is NOT included in a feasibility analysis for new system?
a) Organisational objectives
b) Cost effectiveness
c) Technical feasibility
d) Budgetary constraints
e) Requirements validation

3. One of the fundamental tenets of quality management is that quality:
a) Must exceed customer expectations.
b) Is planned in and not inspected in.
c) Will increase cost.
d) Costs must all be passed onto the customer.

4. In the Shewhart and Deming Quality cycle, the letters P D C A stands for:
a) Purchase, deliver, cost, and acquisition.
b) Prevent defects caused by anyone.
c) Plan, do, check, and act.
d) Please don’t cause accidents.

5. Which is NOT included in the software requirements specification?
a) test specifications for each mandatory requirement
b) project schedule and WBS
c) functional description of user requirements
d) performance description for each non-functional requirement
e) data dictionary

6. A data dictionary was created during the requirements analysis phase of a software engineering project. What information does it contain?
a) interface design criteria
b) data types and description of database table entries
c) restrictions on security
d) list of main functional requirements

7. A software project classifies system entities, their activities and relationships. The classification and abstraction of system entities is important. Which modelling methodology most clearly shows the classification and abstraction of entities in the system?
a) data flow model
b) event driven model
c) object oriented model
d) entity-relationship model

8. Which of the following is NOT a non-functional system requirement component?
a) cost
b) reliability
c) usability
d) performance
e) maintainability

9. What is the purpose of a test case specification in software engineering?
a) to specify the sequence of actions for the execution of a number of sequential tests
b) to specify inputs, predicted results, and a set of execution conditions for a test item
c) to list the test procedures to be performed on the integration of the system database
d) to report the specific tests results when integrating software modules

10. In the software testing process, when is validation testing performed?
a) after coding
b) after unit testing
c) after module testing
d) after integration testing

Saturday, June 12, 2010

C# DotNet Questions

1. What’s the implicit name of the parameter that gets passed into the class’ set method?
Value, and its datatype depends on whatever variable we’re changing.

2. How do you inherit from a class in C#?
Place a colon and then the name of the base class. Notice that it’s double colon in C++.

3. Does C# support multiple inheritance?
No, use interfaces instead.

4. When you inherit a protected class-level variable, who is it available to?
Classes in the same namespace.

5. Are private class-level variables inherited?
Yes, but they are not accessible, so looking at it you can honestly say that they are not inherited. But they are.

6. Describe the accessibility modifier protected internal.
It’s available to derived classes and classes within the same Assembly (and naturally from the base class it’s declared in).

7. C# provides a default constructor for me. I write a constructor that takes a string as a parameter, but want to keep the no parameter one. How many constructors should I write?
Two. Once you write at least one constructor, C# cancels the freebie constructor, and now you have to write one yourself, even if there’s no implementation in it.

8. What’s the top .NET class that everything is derived from?
System.Object.

9. How’s method overriding different from overloading?
When overriding, you change the method behavior for a derived class. Overloading simply involves having a method with the same name within the class.

10. What does the keyword virtual mean in the method definition?
The method can be over-ridden.

11. Can you declare the override method static while the original method is non-static?
No, you can’t, the signature of the virtual method must remain the same, only the keyword virtual is changed to keyword override.

12. Can you override private virtual methods?
No, moreover, you cannot access private methods in inherited classes, have to be protected in the base class to allow any sort of access.

13. Can you prevent your class from being inherited and becoming a base class for some other classes?
Yes, that’s what keyword sealed in the class definition is for. The developer trying to derive from your class will get a message: cannot inherit from Sealed class WhateverBaseClassName. It’s the same concept as final class in Java.

14. Can you allow class to be inherited, but prevent the method from being over-ridden?
Yes, just leave the class public and make the method sealed.

15. What’s an abstract class?
A class that cannot be instantiated. A concept in C++ known as pure virtual method. A class that must be inherited and have the methods over-ridden. Essentially, it’s a blueprint for a class without any implementation.

Search Aptipedia