- At which level does the Software process rating start in continuous assessment model?
2
3
1
0
- What is the final level of the software process assessment ratings?
Both of the listed options
Optimised
Completion
None of the listed options
- Quantitative assessments are evaluated based on which of the following?
Action taken
Process planned
Objective planned
Scores
- Which of the following is an activity performed in SCAMPI method?
Final reporting
Primary activity
Technical analysis
Information gathering
Fresher Training
Tuesday, 12 July 2016
Software Engineering Part 3
Monday, 27 June 2016
Software Engineering Part 2
- The approach to construction affects the project's ability to reduce complexity, anticipate change, and construct for verification. State whether the statement is TRUE or FALSE.
- The choice pf construction method affects which of the following?
- What are the correct sequence of steps followed while debugging a piece of code?
- Software Construction procedure high volume of configure items. Thus Software Construction is related Software Configuration Management. State whether the statement is True or False.
- A measurement of code construction can be useful for which of the following purpose? improving the construction process
True
False
All of the given options
the order in which construction prerequisite are performed
and the degree to which construction prerequisites are expected to be completed before construction work begins
extent to which construction prerequisites are performed
1. Identify the exact place in the code causing it
2. Find the defect in the code
3. Identify the source of problem
4. Test to check if the fix is working correctly
5. Fix the defect
1,2,3,4,5
2,4,3,1,5
2,3,1,5,4
1,3,5,2,4
False
True
ensuring quality during construction
managing construction
all of the given options
Wednesday, 8 June 2016
Software Engineering Part - I
- Which of the following diagram depicts the logic of use case descriptions. It shows the information that passes between objects in the system and throughout the execution of the use case?
- Requirements refinement and documentation takes place very early on in the project cycle. State True or False.
- The activity diagram analysis technique is used in which of the below analysis areas?
- Which of the below is NOT the most common type of Environmental requirement?
- Which of the below depicts workflow or a sequence of related activities by showing the order in which activities occur and the decisions that control the flow?
- What is the popluar model used by Business Analysts to analyze the requirements?
- Which one of the following cannot be depicted using state machine diagrams about an object?
- The benefits of knowing how to refine requirements is that you will be able to _______
- Functional requirements are required for all projects, and must be thoroughly documented and analyzed. State True or False.
- UML defines standards for the format and components of activity diagrams.
- Identify non functional requirement(s)? Security
- Identify the requirement that states -"A system must track all failed login attempts".
- The advantage of ____________ is that functional requirements are traceable and map to objectives. flowchart
activity diagram
class diagram
use case diagram
flowchart diagram
sequence diagram
True
False
Process flow analysis
Structured Analysis
Object-oriented analysis
Solution Development Analysis
interface requirements
audit requirements
legal and regulatory requirements
globalization and localization requirements
activity diagram
dataflow diagram
workflow diagram
flowchart diagram
sequence diagram
Usage Model
Process and Flow model
Data and Behaviour model
All the listed options
the transitions between states
the events that cause the transitions
data that flows within the domain
the possible states it can be in
classify quality of service requirements according to type
recognize the importance of considering assumptions and constraints when analyzing requirements
effectively decompose requirements for documentation
use appropriate techniques to document requirements
All the listed options
True
False
True
False
All the listed options
Performance
Usability
Operational requirement
Interface requirement
Environment requirement
Performance requirement
Privacy requirement
models
textual documentation
matrix documentation
diagrams
Note: If any of the answer is wrong. Please post a comment.
Tuesday, 17 May 2016
Sub Queries MCQ
- The SQL _______ Query is used to delete the existing records from a table.
- Subqueries that return more than one row can only be used with multiple value operators, such as the IN operator.
state True or False: - Which one of the following sorts rows in SQL?
- We can test for the nonexistence of tuples in a subquery by using the _____ construct.
- Subquery is usually added in the WHERE Clause of the SQL statement.
state True or False:
True
False
DELETE
REMOVE
DELETIT
True
False
SORT BY
ALIGN BY
ORDER BY
GROUP BY
EXISTS
NOT EXISTS
Thursday, 14 April 2016
SQL MCQ Questions
- Which of the following creates temporary relation for the query on which it is defined ?
- The EXISTS keyword will be true if:
- Which of the following relational algebra operations do not require the participating tables to be union-compatible?
- Which of the following operations need the participating relations to be union compatible?
- Select name from instructor where salary <=100000 and salary >=90000;
This query can be replaced by which of the following ? - Select __________
from instructor
where dept name= ’Comp. Sci.’;
Which of the following should be used to find the mean of the salary ? - Aggregate functions are functions that take a ___________ as input and return a single value
With
From
Where
Select
Any row in the subquery meets the condition only.
All rows in the subquery fail the condition only.
Both of these two conditions are met.
Neither of these two conditions is met.
Union
Insertion
Difference
Join
Union
Insertion
Difference
All the above
Select name
from instructor
where salary between 90000 and 100000;
Select name
from employee
where salary <= 90000 and salary>=100000;
Select name
from employee
where salary between 90000 and 100000;
Select name
from instructor
where salary between 100000 and 90000;
Mean(salary)
Count(salary)
Avg(salary)
Sum(salary)
Collection of values
Single value
Aggregate value
Both a & b
Saturday, 19 March 2016
DBMS Questions
- A table is the primary unit of physical storage of data in a database.State True or False.
- Which one of the following is a large database from which information can be extracted and analyzed?
- Which one of the following data model resembles like a tree structure?
- Which of the given option is true regarding the database?
- DBMS can replace a file processing system. State True or False.TrueFalse
- What is the advantage of minimizing the data redundancy?
Avoid inaccuracies and inconsistencies in the data
Save Time in processing the data
All the above
To free up the storage space - Which of the following are the types of data models
All of the listed option
Network Model
Hierarchial Model
Relational Model
-
Database system is used to restrict the user from unauthorized access.State True or False
True
False - Which one of the following is true about RDBMS?
1. It has relations data integrity
2. It can maintain many users at the same time
3. It doesn’t support client/server based application
4. It is a relational database system
5. It cant maintain many user at the same time.
1,3
2,4
3,4,5
1,2,4
4,5
- What is the main component of DBMS?
Data Modelling
Data Dictionary
OLAP Database
Data Sharing - In which form does the data gets stored in the database?
Electronic form
Rich text form
Non Electronic form
None of the listed options
- Which of the given term refers to Data about the data?
Data Abstraction
Views
Metadata
Program
- DBMS controls redundancy.State True or False.
False
True - DBMS helps us to?
1. Define Schemas and Subschemas in a database and establish relationships between different data elements
2. Enter Data Into Database
3. Manipulate and Process Data
4. None of the listed options
1&2
1&3
4
1&2&3 - The traditional storage of data which is organized by the customers by storing it in separate folders. This is the example of which type of database system?
Object oriented
Hierarchical
Relational
Network - Arena is married to Vasu and she has a unique SSN. This is an example of a (an):
Unary Relationship
Binary Relationship
Hierarchical Relationship
Ternary Relationship - In DBMS, what will be the outcome when we map a multivalued attribute for any entity from the ER model to the relational model?
None of the above
Many relations, one for each of the distinct values of the attribute
A column in the relation that represents the entity E
One relation that contains a foreign key and a column for the attribute - The efficient performance of the database is based on which of the following factors?
1. Database Design
2. Application Design
3. Network Speed
4. None of the listed option
1,2,3
1,3
1,2
4 - There are two tables Customers and Orders. The customers table would include information about the names , addresses and phone numbers of customers, the order table would include information about the products ordered , the customers,order dates and sales prices ,the Sales manager wants to view only the number of orders placed by each customer on a given date, A Finance Manager in the same company can group the table entries to view only the names and addresses of customers with pending payments.This Grouping of data is possible in?
Hierarchical Database
Relational Databse
Network Database
Object Oriented Database
True
False
Database
Sysbase
Datawarebase
DBMS
Network model
Database model
Relational model
Hierarchical model
Data Sharing
Data concurrency
All the listed options
Data Integrity
Data security
Note: If any of the answer is wrong please post a comment. I will update it.
Decipher my Ciphertext
In the language of cryptography, ciphertext refers to a message encoded with a particular key. Plaintext refers to the original, unencoded text. In this problem, both the ciphertext and the key are simply strings of upper-case characters. The ciphertext is generated from the plaintext by “adding” corresponding characters of the plaintext and the key together. If the plaintext is shorter than the key, only some of the key will be used. Similarly, if the plaintext is shorter than the key, the key will be used multiple times.
Plaintext: HELLO
Key: CATCA
Ciphertext: KFFOP
And to encode the plaintext “DOG” with the key “FIDO”:
Plaintext: DOG
Key: FID
Ciphertext: JXK
To add two letters together, use the following convention: A=1, B=2, …, Z=26. If the sum of two letters is greater than 26, subtract 26 from the sum. For example: A + E = 1 + 5 = 6 = F, and D + X = 4 + 24 = 28 = 2 = B.
Given a ciphertext/key pair, determine the corresponding plaintext.
Input Format :
Input will consist of pairs of lines, with the first line being the ciphertext and the second line being the key. Both will consist of only uppercase letters.
Output Format:
For each ciphertext/key pair, print the corresponding plaintext message.
Example:
Sample Input:
HELLO
CAT
Sample Output:
KFFOP
Code:
#include<stdio.h> #include<string.h> int main() { char p[50]={0},key[50]={0}; int x=0; char c[50]={0}; int i,l1,l2; scanf("%s",p); scanf("%s",key); l1=strlen(p); l2=strlen(key); if(l1<=l2) { goto END; } else if(l1>l2) { for(i=l2;i<l1;i++) { key[i]=key[x]; x++; } //printf("\n%s",key); goto END; } END: for(i=0;i<l1;i++) { p[i]=(int)p[i]-64; key[i]=(int)key[i]-64; c[i]=p[i]+key[i]; if(c[i]>26) c[i]=c[i]-26; c[i]=c[i]+64; printf("%c",c[i]); } return 0; }
Subscribe to:
Posts (Atom)