Tuesday 12 July 2016

Software Engineering Part 3


  1. At which level does the Software process rating start in continuous assessment model?

      2
      3
      1
      0

  2. What is the final level of the software process assessment ratings?

      Both of the listed options
      Optimised
      Completion
      None of the listed options

  3. Quantitative assessments are evaluated based on which of the following?

      Action taken
      Process planned
      Objective planned
      Scores
     

  4. Which of the following is an activity performed in SCAMPI method?

      Final reporting
      Primary activity
      Technical analysis
      Information gathering

Monday 27 June 2016

Software Engineering Part 2


  1. The approach to construction affects the project's ability to reduce complexity, anticipate change, and construct for verification. State whether the statement is TRUE or FALSE.

  2.   True
      False

  3. The choice pf construction method affects which of the following?

  4.   All of the given options
      the order in which construction prerequisite are performed
      and the degree to which construction prerequisites are expected to be completed before construction work begins
      extent to which construction prerequisites are performed
  5. What are the correct sequence of steps followed while debugging a piece of code?

  6.   1. Identify the exact place in the code causing it
      2. Find the defect in the code
      3. Identify the source of problem
      4. Test to check if the fix is working correctly
      5. Fix the defect
      1,2,3,4,5
      2,4,3,1,5
      2,3,1,5,4
      1,3,5,2,4

  7. Software Construction procedure high volume of configure items. Thus Software Construction is related Software Configuration Management. State whether the statement is True or False.

  8.   False
      True

  9. A measurement of code construction can be useful for which of the following purpose?
  10.   improving the construction process
      ensuring quality during construction
      managing construction
      all of the given options

Wednesday 8 June 2016

Software Engineering Part - I


  1. Which of the following diagram depicts the logic of use case descriptions. It shows the information that passes between objects in the system and throughout the execution of the use case?

  2.   activity diagram
      class diagram
      use case diagram
      flowchart diagram
      sequence diagram

     
  3. Requirements refinement and documentation takes place very early on in the project cycle. State True or False.

  4.   True
      False

     
  5. The activity diagram analysis technique is used in which of the below analysis areas?

  6.   Process flow analysis
      Structured Analysis
      Object-oriented analysis
      Solution Development Analysis

     
  7. Which of the below is NOT the most common type of Environmental requirement?

  8.   interface requirements
      audit requirements
      legal and regulatory requirements
      globalization and localization requirements

     
  9. Which of the below depicts workflow or a sequence of related activities by showing the order in which activities occur and the decisions that control the flow?

  10.   activity diagram
      dataflow diagram
      workflow diagram
      flowchart diagram
      sequence diagram

     
  11. What is the popluar model used by Business Analysts to analyze the requirements?

  12.   Usage Model
      Process and Flow model
      Data and Behaviour model
      All the listed options

     
  13. Which one of the following cannot be depicted using state machine diagrams about an object?

  14.   the transitions between states
      the events that cause the transitions
      data that flows within the domain
      the possible states it can be in
     

  15. The benefits of knowing how to refine requirements is that you will be able to _______

  16.   classify quality of service requirements according to type
      recognize the importance of considering assumptions and constraints when analyzing requirements
      effectively decompose requirements for documentation
      use appropriate techniques to document requirements
      All the listed options

  17. Functional requirements are required for all projects, and must be thoroughly documented and analyzed. State True or False.

  18.   True
      False

     
  19. UML defines standards for the format and components of activity diagrams.

  20.   True
      False

  21. Identify non functional requirement(s)?
  22.   Security
      All the listed options
      Performance
      Usability

  23. Identify the requirement that states -"A system must track all failed login attempts".

  24.   Operational requirement
      Interface requirement
      Environment requirement
      Performance requirement
      Privacy requirement

  25. The advantage of ____________ is that functional requirements are traceable and map to objectives.
  26.   flowchart
      models
      textual documentation
      matrix documentation
      diagrams

    Note: If any of the answer is wrong. Please post a comment.

Tuesday 17 May 2016

Sub Queries MCQ


  1. The SQL _______ Query is used to delete the existing records from a table.

  2.         DELETE
            REMOVE
            DELETIT

  3. Subqueries that return more than one row can only be used with multiple value operators, such as the IN operator.
    state True or False:

  4.         True
            False

  5. Which one of the following sorts rows in SQL?

  6.         SORT BY
            ALIGN BY
            ORDER BY
            GROUP BY

  7. We can test for the nonexistence of tuples in a subquery by using the _____ construct.

  8.         EXISTS
            NOT EXISTS
  9. Subquery is usually added in the WHERE Clause of the SQL statement.
    state True or False:

            True
            False

Thursday 14 April 2016

SQL MCQ Questions

  1. Which of the following creates temporary relation for the query on which it is defined ?
  2.         With
            From
            Where
            Select
  3. The EXISTS keyword will be true if:
  4.         Any row in the subquery meets the condition only.
            All rows in the subquery fail the condition only.
            Both of these two conditions are met.
            Neither of these two conditions is met.
  5. Which of the following relational algebra operations do not require the participating tables to be union-compatible?
  6.         Union
            Insertion
            Difference
            Join
  7. Which of the following operations need the participating relations to be union compatible?
  8.         Union
            Insertion
            Difference
            All the above
  9. Select name from instructor where salary <=100000 and salary >=90000;
    This query can be replaced by which of the following ?
  10.         Select name from instructor where salary between 90000 and 100000;
            Select name from employee where salary <= 90000 and salary>=100000;
            Select name from employee where salary between 90000 and 100000;
            Select name from instructor where salary between 100000 and 90000;
  11. Select __________
    from instructor
    where dept name= ’Comp. Sci.’;
    Which of the following should be used to find the mean of the salary ?
  12.         Mean(salary)
            Count(salary)
            Avg(salary)
            Sum(salary)
  13. Aggregate functions are functions that take a ___________ as input and return a single value
  14.         Collection of values
            Single value
            Aggregate value
            Both a & b

Saturday 19 March 2016

DBMS Questions


  1. A table is the primary unit of physical storage of data in a database.State True or False.
  2.         True
            False

  3. Which one of the following is a large database from which information can be extracted and analyzed?
  4.         Database
           Sysbase
           Datawarebase
           DBMS

  5. Which one of the following data model resembles like a tree structure?
  6.         Network model
            Database model
            Relational model
            Hierarchical model

  7. Which of the given option is true regarding the database?
  8.         Data Sharing
            Data concurrency
            All the listed options
            Data Integrity
            Data security

  9. DBMS can replace a file processing system. State True or False.
            True
            False

  10. What is the advantage of minimizing the data redundancy?
            Avoid inaccuracies and inconsistencies in the data
            Save Time in processing the data
            All the above
  11.        To free up the storage space

  12. Which of the following are the types of data models
            All of the listed option
            Network Model
            Hierarchial Model
            Relational Model

  13. Database system is used to restrict the user from unauthorized access.State True or False
            True
            False

  14. Which one of the following is true about RDBMS?
      1. It has relations data integrity
      2. It can maintain many users at the same time
      3. It doesn’t support client/server based application
      4. It is a relational database system
      5. It cant maintain many user at the same time.
            1,3
            2,4
            3,4,5
            1,2,4
            4,5

  15. What is the main component of DBMS?
            Data Modelling
            Data Dictionary
            OLAP Database
            Data Sharing

  16. In which form does the data gets stored in the database?
            Electronic form
            Rich text form
            Non Electronic form
            None of the listed options

  17. Which of the given term refers to Data about the data?
            Data Abstraction
            Views
            Metadata
            Program

  18. DBMS controls redundancy.State True or False.
            False
            True

  19. DBMS helps us to?
      1. Define Schemas and Subschemas in a database and establish relationships between different data elements
      2. Enter Data Into Database
      3. Manipulate and Process Data
      4. None of the listed options
            1&2
            1&3
            4
            1&2&3

  20. The traditional storage of data which is organized by the customers by storing it in separate folders. This is the example of which type of database system?
            Object oriented
            Hierarchical
            Relational
            Network

  21. Arena is married to Vasu and she has a unique SSN. This is an example of a (an):
            Unary Relationship
            Binary Relationship
            Hierarchical Relationship
            Ternary Relationship

  22. In DBMS, what will be the outcome when we map a multivalued attribute for any entity from the ER model to the relational model?
            None of the above
            Many relations, one for each of the distinct values of the attribute
            A column in the relation that represents the entity E
            One relation that contains a foreign key and a column for the attribute

  23. The efficient performance of the database is based on which of the following factors?
      1. Database Design
      2. Application Design
      3. Network Speed
      4. None of the listed option
           1,2,3
            1,3
            1,2
            4

  24. There are two tables Customers and Orders. The customers table would include information about the names , addresses and phone numbers of customers, the order table would include information about the products ordered , the customers,order dates and sales prices ,the Sales manager wants to view only the number of orders placed by each customer on a given date, A Finance Manager in the same company can group the table entries to view only the names and addresses of customers with pending payments.This Grouping of data is possible in?
           Hierarchical Database
            Relational Databse
            Network Database
            Object Oriented Database

Note: If any of the answer is wrong please post a comment. I will update it.

Decipher my Ciphertext


In the language of cryptography, ciphertext refers to a message encoded with a particular key. Plaintext refers to the original, unencoded text. In this problem, both the ciphertext and the key are simply strings of upper-case characters. The ciphertext is generated from the plaintext by “adding” corresponding characters of the plaintext and the key together. If the plaintext is shorter than the key, only some of the key will be used. Similarly, if the plaintext is shorter than the key, the key will be used multiple times.

For example, to encode the plaintext “HELLO” with the key “CAT”:
Plaintext: HELLO
Key: CATCA
Ciphertext: KFFOP

And to encode the plaintext “DOG” with the key “FIDO”:
Plaintext: DOG
Key: FID
Ciphertext: JXK

To add two letters together, use the following convention: A=1, B=2, …, Z=26. If the sum of two letters is greater than 26, subtract 26 from the sum. For example: A + E = 1 + 5 = 6 = F, and D + X = 4 + 24 = 28 = 2 = B.

Given a ciphertext/key pair, determine the corresponding plaintext.

Input Format :
Input will consist of pairs of lines, with the first line being the ciphertext and the second line being the key. Both will consist of only uppercase letters.
Output Format:
For each ciphertext/key pair, print the corresponding plaintext message.

Example:
Sample Input:
HELLO
CAT

Sample Output:
KFFOP

Code:
  #include<stdio.h>
#include<string.h>
int main()
{
  char p[50]={0},key[50]={0};
    int x=0;
  char c[50]={0};
  int i,l1,l2;
  scanf("%s",p);
  scanf("%s",key);
  l1=strlen(p);
  l2=strlen(key);
  if(l1<=l2)
  {
    goto END;
  }
  else if(l1>l2)
  {
    for(i=l2;i<l1;i++)
    {
      key[i]=key[x];
      x++;
    }
    //printf("\n%s",key);
    goto END;
  } 
  END:
  for(i=0;i<l1;i++)
  {
    p[i]=(int)p[i]-64;
    key[i]=(int)key[i]-64;
    c[i]=p[i]+key[i];
    if(c[i]>26)
      c[i]=c[i]-26;
    c[i]=c[i]+64;
    printf("%c",c[i]);
  }
  return 0;
}