0% found this document useful (0 votes)
5 views5 pages

Pyq Combine File

Uploaded by

ashishmunda9050
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views5 pages

Pyq Combine File

Uploaded by

ashishmunda9050
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Q;-The function(s) that is/are in play when writing a proposal is/are:

A;- I. Persuading actions


II. Highlighting benefits
Q;- Which of the following is a shortcut key to undo last action in MS Word?
A;-CTRL+Z
2. Ctrl+J
3. Ctrl+I
4. Ctrl+K
Q;- Which of the following is an input device?
A;-JOYSTICK
Q;- Which of the following is a type of subprogram?
A;- I. Functions
II. Subroutines
QWhich of the following is a primary task of memory management system?
A;- I. It keeps track of which parts of the memory are currently being used
II. When space is available, it allocates memory to the programs that are next to be loaded
Q;- A 2D array in which there are different number of elements in each row is known as ______.
A;- Jagged Array
Q;- When does the .exe file is created in C language?
A;- The .exe file is created when you compile and link your C program using a compiler like gcc
Q;- The operator in C++, which is used to access a value referred by a pointer is known as ______.
A;- indirection operator
Q;- Sort the following elements using Bubble sort in ascending order. What is the intermediate sequence
of 37, 54, 21, 85, 68, 12, 9, 57 after second pass?
A;- 21, 37, 54, 12, 9, 57, 68, 85
Q;- What is the output of the code written in C?
void main()
{
int k, v;
k=(v=20,v+2);
printf("%d",k);
}
A;- 22
Q;- The following keys 22, 28, 23, 12 and 13 are inserted into initially empty hash table of length 9 using
open addressing with hash function h(k) = k mode 9 and linear probing. At what index key 13 is inserted?
A;-6
Q;- What is the file extension for Batch files?
A;- 1. .BAT
2. .BCH
3. .CTH
4. .BATCH
Q;- Which of the following is a type of Real time operating system?
A;- I. Hard real time system
II. Soft real time system
Q;- If b is the base of the positional number system. What is the range of symbols it consists of?
A;- 0 to (b – 1)

Q;- How many bits are required to represent any decimal number in the range from 0 to 2n–1 in base 2?
A;-n
Q;- Assigned ordering among the characters used by the computer is known as ______.
1. character sequence
2. linear sequence
3. collating sequence
4. data sequence
Q;- Which gate is represented by the following truth table?

A;- 1. NOR
2. NAND
3. XOR
4. XNOR
Q;- Astable multivibrator has ______ quasi-stable states.
A;- 2
Q;- Which of the following is correct regarding figure of merit of an IC?
A;- Propagation delay time × power
Q;- Which of the following is correct regarding T type flip flop?
A;- I. If T = 1, changes state for lining clock pulse
II. If T = 0, does not changes state
Q;- Which of the following represents XNOR gate?

A;-
Q;- Which of the following is oldest database model?
A;- 1. Deductive
2. Relational
3. Object-Oriented
4. Hierarchical
Q;-What is the full form of DDLC in database?
A;- Database Development Life Cycle
Q;- All candidate keys other than primary keys are known as _____
A;- 1. Foreign key
2. Secondary key
3. Alternate key
4. Remaining key
Q;- The left-hand side and the right-hand sides of a functional dependency are sometimes called ______
and ______ respectively.
A;- 1. domain; attributes
2. determinant; dependent
3. range; table
4. tuple; relation

Q;-______ are some problems that may arise while creating the Entity relationship model.
A;- 1. Connection traps
2. Transition traps
3. Groups traps
4. Data traps
Q;- Which of the following is a symbol of multivalued attribute in Entity relationship diagram?

A;- ,

Q;- ______ is the point of synchronisation between the database and the transaction log file in database
management system.
A;- 1. Checkpoint
2. Shadow point
3. Mapping point
4. Key point
Q;- How many address lines and input-output data lines are needed in 2k × 16 memory unit?
A;- 11 address line, 16 data line (JUST FIND THE WAY TO SOLVE IT)
Q;- How many full adders are required for n-bit binary adder?
A;-n
Q;- By including which logical gate binary adder circuit is used for both binary addition and subtraction?
A;- Ex - OR gate
Q;- The 8-bit register A and B initially have the following values.
A = 01110110
B = 10000101
What is the 8-bit value in each register after execution of the following micro-operation?
A←A+B
B←B+1
A;- A = 11111011, B = 10000110
Q;- Pseudo instruction is given to ______.
A;- assembler
Q;- Which property of CSS specifies the degree to which text should be emboldened?
A;- Font – weight
Q;- Which property of CSS enables to set multiple list properties at once?
A;- List – style
Q;- Which of the following is correct?
A;-Decrease in asset is credited
Increase in liabilities is credited
Q;- Which of the following is a feature of depreciation?.
A;- I. It is decline in the book value of fixed assets
II. It is a continuing process
Q;- What is the full form of ROCOF in Software Reliability?
A;- Rate of occurrence of failure
Q;- Match the symbol used in DFD with their function.

A;- 1-iv, 2-iii, 3-i, 4-ii


Q;- According to structured partitioning in software engineering a program ______.
A;- should be partitioned both horizontally and vertically
Q;- What is another name for level 0-DFD?
A;- Context diagram
Q;- What is COUPLING in software design?
A;- Coupling is measure of degree of functional interdependence between the two modules.
Q;- Which of the following statement(s) is/are correct regarding code walk-through in software
engineering?
A;- I. It is an informal technique for analysis of the code.

You might also like