Some bit field members are stored: I) left to right II) right to left III) in circular array
only (I) is true
Only (II) is true
Both (I) and (II) are true
All of the options (I, II and III) are true
Comma ( , ) is very dangerous because
Compiler does not recognise this symbol
It creates linkage problem
It causes side effects
All of the given options
_________ cause major portability issues
Loops
Bugs in code
Sizes of data types
Conditional Structures
In order to write a portable code which of the following guideline will be helpful:
Stick to the standards
Program in the mainstream
Size of data types
All of the given options
The complexity of a program may ______ if there are exceptional paths in it
Decrease
Increase
Remain same
All of given options
Vukwl- Virtual Education Solution
In order to make a code more portable, Instead of using vendor specific language extensions, use _______ as much as possible
STL
ANSI
ISO
CMMI
Complex expressions.
Make the code easy to modifyMake the code difficult to modify
Make the code easy to understand
Does not effect understandability
Make the code easy to modifyMake the code difficult to modify
Make the code easy to understand
Does not effect understandability
x = 0; // x is floating pt Which rewritten form of above line of code is more in line with the self-documentation philosophy than the code above.
x = false
x = NULL
x = 0.0;
x = ‘\0’
x = false
x = NULL
x = 0.0;
x = ‘\0’
Exception handling provides:
Portability mechanism
Code Usability mechanism
Error Handling mechanism
All of the given options
Some bit field members are stored: I) left to right II) right to left III) in circular array
only (I) is true
Only (II) is true
Both (I) and (II) are true
All of the options (I, II and III) are true
Question # 2 of 10
Comma ( , ) is very dangerous because
Compiler does not recognise this symbol
It creates linkage problem
It causes side effects
All of the given options
Question # 3 of 10
_________ cause major portability issues
Loops
Bugs in code
Sizes of data types
Conditional Structures
Question # 4 of 10
In order to write a portable code which of the following guideline will be helpful:
Stick to the standards
Program in the mainstream
Size of data types
All of the given options
Question # 5 of 10
The complexity of a program may ______ if there are exceptional paths in it
Decrease
Increase
Remain same
All of given options
Bit fields are a convenient way to express many difficult operations. However, bit fields suffer from one problem
Lack of usability
Lack of security
Lack of performance
Lack of portability
if (e.Title() == “CEO” || e.Salary() > 10000) in the above statement if e.Title()=="CEO") is TRUE then
Second part is not evaluated
Second part is always evaluated
Second part must also be TRUE
Second part is not evaluated but e.Salary() is called
A test case involves
Input/output specification plus a statement of the function under test
Steps to perform the function
Expected results that the software application produces
All of the given options
Client Server model tries to data and processing
DistributeMerge
Clone
Proceed
Anti- Patterns is another concept that corresponds to common in analysis and design.
Mistake
Issues
Problems
All of the given
Mistake
Issues
Problems
All of the given
Comma ( , ) is very dangerous because
Compiler does not recognise this symbol
It creates linkage problem
It causes side effects
All of the given options(Not sure)
Compiler does not recognise this symbol
It creates linkage problem
It causes side effects
All of the given options(Not sure)
using proper paranthesis normally makes the codeeasy to read
easy to understand
less ambiguous
All of the given options
easy to understand
less ambiguous
All of the given options
The use of comments should be minimized by making the code self-documenting by appropriate name choices and an explicit logical structure.TrueFalse
Bit fields allow the packing of data in a structure. using Bit fields we can:Read 9 bit integers
avoid memory leakages
avoid memory overflowAvoid syntax errors
avoid memory leakages
avoid memory overflowAvoid syntax errors
A self documented program/code contains the following attribute(s):
Size of each function
Choice of variable
Choice of variable
All of the given choices
"is" prefix should be used for------ variables and methods.
General
Boolean
Constant
None of the given
The use of comments should be minimized by making the code self-documenting by appropriate name choices and an
explicit logical structure.
TRUE
FALSE
Variables should be initialized where they are ------and they should be declared in the ------scope possible.
defined and smallest
declared and medium
defined and medium
declared and smallest
Unrelated variables should be declared in the same statement.
True
False
which of the following statements are same in output: 1) a = a >> 2 2) a = a / 4 3) a = a * 2.
(1) and (3) only
(2) and (3) only
(1) and (2) only
All produce the same result
Goto statements violate the idea of.
object oriented code
structured code
control structure
repetition structure
Size of each function
Choice of variable
Choice of variable
All of the given choices
"is" prefix should be used for------ variables and methods.
General
Boolean
Constant
None of the given
The use of comments should be minimized by making the code self-documenting by appropriate name choices and an
explicit logical structure.
TRUE
FALSE
Variables should be initialized where they are ------and they should be declared in the ------scope possible.
defined and smallest
declared and medium
defined and medium
declared and smallest
Unrelated variables should be declared in the same statement.
True
False
which of the following statements are same in output: 1) a = a >> 2 2) a = a / 4 3) a = a * 2.
(1) and (3) only
(2) and (3) only
(1) and (2) only
All produce the same result
Goto statements violate the idea of.
object oriented code
structured code
control structure
repetition structure
Be very careful when you use functions with side effects – functions that change the values of the ________.
Objects
Classes
Structures
Variables
Objects
Classes
Structures
Variables
A test case involves
Input/output specification plus a statement of the function under testSteps to perform the function
Expected results that the software application produces
All of the given options
Input/output specification plus a statement of the function under testSteps to perform the function
Expected results that the software application produces
All of the given options
The C/C++ language has not specified whether ____ is arithmetic or logical.
Right shift >>Right shift <<
&&
||
Right shift >>Right shift <<
&&
||
Vukwl- Virtual Education Solution
Three tier architecture contains layers
MVC stands for
Fat client model is one of the configurations of model
Data-Centered
Layered
Reference
Client Server
Description of communicating objects and classes that are customized to solved a general problem in a particular context is called
System Patter
System Design
None of the Given
In the N-tire Architecture, the idea is to enhance scalability and by distributing both data and the application using multiple server machines.
Usability
Interpretability
None of the given
Thin Client model is one of the configurations of ….. model
Data Centered
Layered
Reference
Which of the is/are among ten things which the basis template of GOF design pattern includes.
Problem
Context
Forces
All of the above
Thin Client Model places a heavy processing load on…….
Only Server
Only Network
Both Server and Network(Not Sure)
Neither server nor network
Zero install architecture does not need any installation on ____________.
Server side (not Sure)
Client side
Client & Server Side (Not Sure)
None of the above
Which of the is/are among ten things which the basis template of GOF design pattern includes.
Problem
Context
Forces
All of the above
Thin Client Model places a heavy processing load on…….
Only Server
Only Network
Both Server and Network(Not Sure)
Neither server nor network
Zero install architecture does not need any installation on ____________.
Server side (not Sure)
Client side
Client & Server Side (Not Sure)
None of the above
Vukwl- Virtual Education Solution
Dynamic process model shows the process ………….. of the system
Components
Objects
Linkage
It ensures that a class only has one instance and provides a global point of access to it.
Singleton Pattern
Observer Pattern
Real Pattern
None of the given
STL Stnads for ------------------
Standard Type Link
Standard Tempo Line
None of the given
Three tier architecture contains ------------- layers
Select correct option:
Presentation
Application
Database
All of the above
Vukwl- Virtual Education Solution
Vertical partitioning is also known as…..
Select correct option:
Balancing
Mutating
Parallelizing
Patterns are devices that allow programs to share knowledge about their -------------.
Select correct option:
Vukwl- Virtual Education Solution
Code
Design
Analysis
None of the given
Client server model tries to …….data and processing.
Select correct option:
Distribute
Merge
Clone
Proceed
N-tier architecture stems from the struggle to find a ----------- between the fat-client architecture and the thin-client architecture.
Select correct option:
Concurrency
Distribution point
Middle ground
Similarity
Vertical partitioning divides the architecture application from a …… making perspective.
Decision
Design
Conclusion
Move
Vukwl- Virtual Education Solution
Distributing the responsibilities to different subsystems so that we get a software system which is easy to maintain, is called ………the architecture.
Select correct option:
Subtracting
Cloning
Balancing
The nominal case should be put in the if-part and the exception in the else-part of an if statement.
Select correct option:
TURE
FALSE
sec(s)
Charles Simonyi first discussed Hungarian Notation. He was of ------ .
Select correct option:
Microsoft
IBM
Dell
Cisco
sec(s)
The terms get/set must be used where an attribute is accessed
Select correct option:
Indirectly
Directly
sec(s)
A self documented program/code contains the following attribute(s):
Size of each function
Choice of variable
Choice of variable
All of the given choices
sec(s)
"is" prefix should be used for------ variables and methods.
Select correct option:
General
Boolean
Constant
None of the given
sec(s)
The use of comments should be minimized by making the code self-documenting by appropriate name choices and an
explicit logical structure.
Select correct option:
TRUE
FALSE
sec(s)
Variables should be initialized where they are ------and they should be declared in the ------scope possible.
Select correct option:
defined and smallest
declared and medium
defined and medium
declared and smallest
sec(s)
Unrelated variables should be declared in the same statement.
Select correct option:
True
False
sec(s)
Vukwl- Virtual Education Solution
which of the following statements are same in output: 1) a = a >> 2 2) a = a / 4 3) a = a * 2
Select correct option:
(1) and (3) only
(2) and (3) only
(1) and (2) only
All procduce the same result
sec(s)
Goto statements violate the idea of
Select correct option:
object oriented code
structured code
control structure
repetition structure
sec(s)
Vukwl- Virtual Education Solution
MVC pattern was based on the --------------- pattern.
Select correct option:
Observer
Structural
Behavioral
None of given
sec(s)
Which one is correct?
Select correct option:
double total = 0.5;
double total = .5;
double total = .50;
all of the given
sec(s)
Code should not be:
Select correct option:
commented
indented
cryptic
aligned
sec(s)
Global variables in C++ should always be referred to by using the
Select correct option:
:: operator
: operator
Without an operator
None of the given
sec(s)
_________ was the first pure Object Oriented language in which observer pattern was used in implementing its Model
View Controller pattern
Select correct option:
Smalltalk
PASCAL
JAVA
C++
sec(s)
using proper paranthesis normally makes the code
Select correct option:
easy to read
easy to understand
less ambigous
All of the given options
sec(s)
Vukwl- Virtual Education Solution
Which of the following shows a commented statement in C++
Select correct option:
# Ans = first + second
// Ans = first + second
\\ Ans = first + second
/# Ans = first + second
sec(s)
The form for (;;) should be used for
Select correct option:
nested loop
empty loop
more than 1000 iterations
sec(s)
sec(s)
Identifier names also play a significant role in enhancing the -------- of a program.
Select correct option:
Writ ability
Readability
Reliability
sec(s)
It ensures that a class only has one instance and provides a global point of access to it.
Select correct option:
Singleton Pattern
Observer Pattern
Real Pattern
None of the given
sec(s)
Names representing methods and functions should be----and written in mixed case starting
with -----case.
Select correct option:
Noun—lower
Verb----lower
Noun ---upper
Noun----upper
sec(s)
A function should not be larger in any case and should not exceed ______ in length .
Select correct option:
Half page
One page
Two pages
Three Pages
sec(s)
Vukwl- Virtual Education Solution
-----provides a unified interface to a set of interfaces in a sub-system.
Select correct option:
Observer Pattern
Singleton Pattern
Façade Pattern
All of the above
sec(s)
A function should not be larger in any case and should not exceed ______ in length .
Half page
One page
Two pages
Three Pages
-----provides a unified interface to a set of interfaces in a sub-system.
Observer Pattern
Singleton Pattern
Façade Pattern
All of the above
MVC stands for ---------------.
Model View Controller
Modern View Center
Model View Center
Modern View Controller
A self documenting code is a code that explains itself without the need of comments and
extraneous documentation, like _______.
Flowcharts
UML diagrams
Process-flow state diagrams
All of the given choices
Complex expressions:
Make the code easy to modify
Make the code difficult to modify
Make the code easy to understand
Does not effect understandability
Comments should NOT be indented relative to their position in the code.
TRUE
FALSE
MVC stands for ---------------
Select correct option:
Model View Controller
Modern View Center
Model View Center
Modern View Controller
sec(s)
A self documenting code is a code that explains itself without the need of comments and
extraneous documentation, like _______
Select correct option:
Flowcharts
UML diagrams
Process-flow state diagrams
All of the given choices
sec(s)
Complex expressions:
Select correct option:
Make the code easy to modify
Make the code difficult to modify
Make the code easy to understand
Does not effect understandablity
Comments should NOT be indented relative to their position in the code
Select correct option:
TRUE
FALSE
Vukwl- Virtual Education Solution
----Provides a unified interface to a set of interfaces in a sub-system
Observer Pattern
Singleton Pattern
Façade Pattern
All of the above
In Client Server model, there application is modeled as a set so --- that are provided by server
Application
Protocol
Services
All of the above
Vertical Partitioning is also know as
Balancing
Mutating
Parallizing
Vukwl- Virtual Education Solution
Façade Pattern provides a unified interface to a set of interfaces ina sub-system.
True
False
Which of the is/are among ten things which the basis template of GOF design pattern includes.
Problem
Context
Forces
All of the above
Anti- Patterns is another concept that corresponds to common in analysis and design.
Mistake
Issues
Problems
All of the given
Three tier architecture contains layers.
Presentation
Application
Database
All of the above
MVC stands for
Model View Controller
Modern View Center
Model View Center
Modern View Controller
Client Server model tries to data and processing.
DistributeMergeCloneProceed
Mistake
Issues
Problems
All of the given
Three tier architecture contains layers.
Presentation
Application
Database
All of the above
MVC stands for
Model View Controller
Modern View Center
Model View Center
Modern View Controller
Thin Client Model places a heavy processing load on……
Only Server
Only Network
Both Server and Network(Not Sure)
Neither server nor network
Zero install architecture does not need any installation on ____________.
Client side
Client & Server Side (Not Sure)
None of the above
Data-Centered Architectural Style is also called ….
Repository model
Client Server model
Sub system model
Reference model
In Huffman encoding, for a given message string, the frequency of occurrence (relative probability) of each __________in the message is done first.
Select correct option:
Word
Space
Digit
Character
Graphs cannot be represented by an adjacency matrix.
Select correct option:
True
False
In Huffman encoding, for a given message string, the frequency of occurrence (relative probability) of each character in the message is determined last.
Select correct option:
True
False
In solving Fractional Knapsack problem, we do not need sorting.
Select correct option:
True
False
In Activity Selection, we say that two activities are non-interfering if their start-finish interval _________ overlap.
Select correct option:
Do
Do not
Sometimes
Once
Each time we traverse graph by Breadth-first search algorithm, we count the distance from _________
Select correct option:
starting node
neighbors of the starting node
right most node
left most node
Counting Money problem is an example which can not be optimally solved by greedy algorithm.
Select correct option:
True
False
In Activity scheduling algorithm, the width of a rectangle ____________
Select correct option:
Is always ignored
Directs towards recursion
Should be maximized
Indicates the duration of an activity
In Huffman encoding, for the base case, n=1, the tree consists of a single leaf node, which is not optimal.
Select correct option:
True
False
x = 0; // x is floating pt Which rewritten form of above line of code is more in line with the self-documentation philosophy than the code above.
x = false
x = NULL
x = 0.0;
x = ‘\0’
If an application fulfills its specifications but deviates from users expectations or their desired behavior. This means, software is verified but not ------------
Validated
Corrected
Checked
Traced
The raising of the imaginary error flag is simply called raising or ________ an error.
Catching
Casting
Throwing
None of given options
struct packed_struct { unsigned int f1:1; } pack; Here in "packed_struct":
value of f1 = 1
size of f1 = 1 bit
value of f1 should not exceede 1
None of given options
The idea behind exception handling is to raise some error flag every time ________.
The code compiles
The code links
Memory is allocated
Something goes wrong
Bit fields allow the packing of data in a structure. using Bit fields we can:
Read 9 bit integers
avoid memory leakages
avoid memory overflow
Avoid syntax errors
The order in which bytes of one word are stored is _________ dependent.
hardware
software
language
syntax
A __________ is a variance from a desired product attribute.
Exception
Error
Mistake
Defect
The C/C++ language does not define the alignment of items within.
structures
classes
unions
All of the given options
The raising of the imaginary error flag is simply called raising or ________ an error
Catching
Casting
Throwing
None of given options
Consider the following statement: int a,b=10; Which of the following is correct:variable "a" is initialized to 10
Variable "b" is initialized to 10
Both variables "a" and "b" are initialized to 10
variables can not be initialized this way
Exception handling is a powerful technique that separates error-handling code from ______ code.
Normal
Faulty
Buggy
Complex
Bit fields are a convenient way to express many difficult operations. However, bit fields suffer from one problem.
Lack of usability
Lack of security
Lack of performance
Lack of portability
The complexity of a program may ______ if there are exceptional paths in it
Decrease
Increase
Remain same
All of given options
When an error is thrown the overall system (on the lookout for this error flag) responds by ______ the error.
Ignoring
Casting
Catching
All of the given options(Not Sure)
In the N-tire Architecture, the idea is to enhance scalability and by distributing both data and the application using multiple server machines.
Usability
Performance
Interpretability
None of the given
Thin Client model is one of the configurations of ….. model.
Data Centered
Client Server
Layered
Reference
Dynamic process model shows the process ….…….. of the system.
Components
Objects
Structure
Linkage
It ensures that a class only has one instance and provides a global point of access to it.
Singleton Pattern
Observer Pattern
Real Pattern
None of the given
STL Stnads for ------------------ .
Standard Template Library
Standard Type Link
Standard Tempo Line
None of the given
Three tier architecture contains ------------- layers.
Presentation
Application
Database
All of the above
Which of following is/are among ten things, which the basic template of GOF design pattern includes.
Problem
Context
Forces
All of the given
Vertical partitioning is also known as….. .
Balancing
Mutating
Parallelizing
Factoring
Vertical partitioning is also known as…...
Balancing
Mutating
Parallelizing
Factoring
Patterns are devices that allow programs to share knowledge about their -------.
Code
Design
Analysis
None of the given
Client server model tries to …….data and processing.
Distribute
Merge
Clone
Proceed
N-tier architecture stems from the struggle to find a ----------- between the fat-client architecture and the thin-client architecture.
Concurrency
Distribution point
Middle ground
Similarity
Vertical partitioning divides the architecture application from a …… making perspective.
Decision
Design
Conclusion
Move
Distributing the responsibilities to different subsystems so that we get a software system which is easy to maintain, is called ………the architecture.
Subtracting
Partitioning
Cloning
Balancing
Data-Centered Architectural Style is also called …..
Repository model
Client Server model
Sub system model
Reference model
An optimization problem is one in which you want to find,
Not a solution
An algorithm
Good solution
The best solution
Although it requires more complicated data structures, Prim's algorithm for a minimum spanning tree is better than Kruskal's when the graph has a large number of vertices.
True
False
If a problem is in NP, it must also be in P.
True
False
unknown
What is generally true of Adjacency List and Adjacency Matrix representations of graphs
Lists require less space than matrices but take longer to find the weight of an edge (v1,v2)
Lists require less space than matrices and they are faster to find the weight of an edge (v1,v2)
Lists require more space than matrices and they take longer to find the weight of an edge (v1,v2)
Lists require more space than matrices but are faster to find the weight of an edge (v1,v2)
https://vukwl.blogspot.com/
If a graph has v vertices and e edges then to obtain a spanning tree we have to delete
v edges.
v – e + 5 edges
v + e edges.
None of these
Maximum number of vertices in a Directed Graph may be |V2|
True
False
The Huffman algorithm finds a (n) _____________ solution.
Optimal
Non-optimal
Exponential
Polynomial
The Huffman algorithm finds an exponential solution
True
False
The Huffman algorithm finds a polynomial solution
True
False https://vukwl.blogspot.com/
The greedy part of the Huffman encoding algorithm is to first find two nodes with larger frequency.
True
False
The codeword assigned to characters by the Huffman algorithm have the property that no codeword is the postfix of any other.
True
False
Huffman algorithm uses a greedy approach to generate a postfix code T that minimizes the expected length B (T) of the encoded string.
True
False
Shortest path problems can be solved efficiently by modeling the road map as a graph.
True
False
Dijkestra’s single source shortest path algorithm works if all edges weights are non-negative and there are negative cost cycles.
True
False
Vukwl- Virtual Education Solution
Bellman-Ford allows negative weights edges and negative cost cycles.
True
False
The term “coloring” came form the original application which was in architectural design.
True
False
In the clique cover problem, for two vertices to be in the same group, they must be adjacent to each other.
True
False
Dijkstra’s algorithm is operates by maintaining a subset of vertices
True
False
The difference between Prim’s algorithm and Dijkstra’s algorithm is that Dijkstra’s algorithm uses a different key.
True
False
Vukwl- Virtual Education Solution
https://vukwl.blogspot.com/
We do sorting to,
keep elements in random positions
keep the algorithm run in linear order
keep the algorithm run in (log n) order
keep elements in increasing or decreasing order
After partitioning array in Quick sort, pivot is placed in a position such that
Values smaller than pivot are on left and larger than pivot are on right
Values larger than pivot are on left and smaller than pivot are on right
Pivot is the first element of array
Pivot is the last element of array
Merge sort is stable sort, but not an in-place algorithm
True
False
When an error is thrown the overall system (on the lookout for this error flag) responds by ______ the error.
Ignoring
Casting
Catching
All of the given options(Not Sure)
Ignoring
Casting
Catching
All of the given options(Not Sure)
Comments are not syntax checked
TRUE
FALSE
TRUE
FALSE
Modularity is a tool that can help us in increasing the size of individual functions, making them less readable.
TrueFalse
TrueFalse
In counting sort, once we know the ranks, we simply _________ numbers to their final positions in an output array.
Delete
copy
Mark
arrange
Vukwl- Virtual Education Solution
Dynamic programming algorithms need to store the results of intermediate sub-problems.
True
False
A p × q matrix A can be multiplied with a q × r matrix B. The result will be a p × r matrix C. There are (p . r) total entries in C and each takes _________ to compute.
O (q)
O (1)
O (n2)
O (n3)
A graph is said to be acyclic if it contains _____________
Select correct option:
at least one cycle
exactly one cycle
always more than one cycle
no cycles
Select correct option:
at least one cycle
exactly one cycle
always more than one cycle
no cycles
In Huffman encoding, for a given message string, the frequency of occurrence (relative probability) of each __________in the message is done first.
Select correct option:
Word
Space
Digit
Character
Vukwl- Virtual Education Solution
Graphs cannot be represented by an adjacency matrix.
Select correct option:
True
False
In Huffman encoding, for a given message string, the frequency of occurrence (relative probability) of each character in the message is determined last.
Select correct option:
True
False
In solving Fractional Knapsack problem, we do not need sorting.
Select correct option:
True
False
In Activity Selection, we say that two activities are non-interfering if their start-finish interval _________ overlap.
Select correct option:
Do
Do not
Sometimes
Once
Vukwl- Virtual Education Solution
Each time we traverse graph by Breadth-first search algorithm, we count the distance from _________
Select correct option:
starting node
neighbors of the starting node
right most node
left most node
Counting Money problem is an example which can not be optimally solved by greedy algorithm.
Select correct option:
True
False
In Activity scheduling algorithm, the width of a rectangle ____________
Select correct option:
Is always ignored
Directs towards recursion
Should be maximized
Indicates the duration of an activity
In Huffman encoding, for the base case, n=1, the tree consists of a single leaf node, which is not optimal.
Select correct option:
True
False
Greedy algorithm approach solves both 0/1 Knapsack and Fractional Knapsack problems.
True
Dynamic programming algorithm approach solves both 0/1 Knapsack and Fractional Knapsack problems.
True
False
Fractional Knapsack problems has no limit of weight.
True
False
Str = 0;// str is string Which rewritten from of above line of code is more in line with the self-documentation philosophy than the code above.
Str = false;
Str = false;
Str = NULL;
Str = ‘\0;
Str = 0.0;
Str = 0.0;
Struct packed_struct { unsigned int f1:1;} pack; Here in “packed_struct”:
Value of f1 =1
Size of f1 = 1 bit
Value of f1 should not exceede 1 (Not Sure)
None of given options
Value of f1 =1
Size of f1 = 1 bit
Value of f1 should not exceede 1 (Not Sure)
None of given options
Vukwl- Virtual Education Solution
Bit fields are a convenient way to express many difficult operations. However, bit fields suffer from one problem.
Lack of Usability
Lack of Security
Lack of Performance
Lack of Portability
Lack of Usability
Lack of Security
Lack of Performance
Lack of Portability
If(!(block < activeBlock)) is equvivalent to.
If ((block < activeBlock))
If ((block == activeBlock))
If ((block >= activeBlock))
None of the given
If ((block < activeBlock))
If ((block == activeBlock))
If ((block >= activeBlock))
None of the given
Bit fields allow the packing of data in a structure. Using Bit fields we can.
Read 9 bit integers
Avoid memory leakages
Avoid memory overflow
Avoid syntax errors
Read 9 bit integers
Avoid memory leakages
Avoid memory overflow
Avoid syntax errors
The order in which bytes of one word are stored is _________ dependent.
HardwareSoftware
Language
Syntax
HardwareSoftware
Language
Syntax
Vukwl- Virtual Education Solution
In order to write a portable code which of the following guideline will be helpful:
Stick to the standards
Program in the mainstream
Size of data types
All of give options
Stick to the standards
Program in the mainstream
Size of data types
All of give options
Complex expressions.
Make the code easy to modifyMake the code difficult to modify
Make the code easy to understand
Does not effect understandability
Make the code easy to modifyMake the code difficult to modify
Make the code easy to understand
Does not effect understandability
x = 0; // x is floating pt Which rewritten form of above line of code is more in line with the self-documentation philosophy than the code above.
x = false
x = NULL
x = 0.0;
x = ‘\0’
x = false
x = NULL
x = 0.0;
x = ‘\0’
using proper paranthesis normally makes the code.
easy to read
easy to understand
less ambiguous
All of the given options
easy to read
easy to understand
less ambiguous
All of the given options
The use of comments should be minimized by making the code self-documenting by appropriate name choices and an explicit logical structure.
TrueFalse
TrueFalse
Bit fields allow the packing of data in a structure. using Bit fields we can:
Read 9 bit integers
Avoid memory leakages
Avoid memory overflow
Avoid syntax errors
Read 9 bit integers
Avoid memory leakages
Avoid memory overflow
Avoid syntax errors
1) x = (a + 2 > 3)? a : a-1 ; 2) if((a + 2)> 3) x = a; else x = a - 1;
Statement (2) is more complex than (1)Statement (2) is more complex than (1)
Both statements are very complex
None of the given option
Statement (2) is more complex than (1)Statement (2) is more complex than (1)
Both statements are very complex
None of the given option
80/20 rule states that:
you spend 80 percent of your time in 20 percent of the codeyou spend 20 percent of your time in 80 percent of the code
We should try to optimized 80 percent or at least 20 percent of the code
None of the given options.
you spend 80 percent of your time in 20 percent of the codeyou spend 20 percent of your time in 80 percent of the code
We should try to optimized 80 percent or at least 20 percent of the code
None of the given options.
Vukwl- Virtual Education Solution
Be very careful when you use functions with side effects – functions that change the values of the ________.
Objects
Classes
Structures
Variables
Objects
Classes
Structures
Variables
Comma ( , ) is very dangerous because.
Compiler does not recognise this symbol
It creates linkage problem
It causes side effects
All of the given options (Not Sure)
The C/C++ language has not specified whether ____ is arithmetic or logical.
Right shift >>
Right shift <<
&&
||
In order to make a code more portable, Instead of using vendor specific language extensions, use _______ as much as possible.
STL
ANSI
ISO
CMMI
The order in which bytes of one word are stored is _________ dependent.
hardware
software
language
syntax
Be very careful when you use functions with side effects – functions that change the values of the ________.Objects
Classes
Structures
Variables
Compiler does not recognise this symbol
It creates linkage problem
It causes side effects
All of the given options (Not Sure)
The C/C++ language has not specified whether ____ is arithmetic or logical.
Right shift >>
Right shift <<
&&
||
In order to make a code more portable, Instead of using vendor specific language extensions, use _______ as much as possible.
STL
ANSI
ISO
CMMI
The order in which bytes of one word are stored is _________ dependent.
hardware
software
language
syntax
Be very careful when you use functions with side effects – functions that change the values of the ________.Objects
Classes
Structures
Variables
When a small set of functions (which use each other) is so overwhelmingly the bottleneck, there are two alternatives:
use a better algorithm OR re-write the code
debug the code OR place assertions in code
remove the functions OR add more functions
changed programming language OR compiler at least
_______ cause major portability issues
Loops (Not Sure)
Bugs in code
Sizes of data types
Conditional Structures
In the switch statement, cases should always end with a -------statment.
Switch
Go
Break
Stop
use a better algorithm OR re-write the code
debug the code OR place assertions in code
remove the functions OR add more functions
changed programming language OR compiler at least
_______ cause major portability issues
Loops (Not Sure)
Bugs in code
Sizes of data types
Conditional Structures
In the switch statement, cases should always end with a -------statment.
Switch
Go
Break
Stop
Which of following is/are among ten things,which the basic template of GOF design pattern includes.
Select correct option:
Problem
Context
Forces
Vertical partitioning is also known as…..
Select correct option:
Balancing
Mutating
Parallelizing
Factoring
Some bit field members are stored: I) left to right II) right to left III) in circular array.
only (I) is true
Only (II) is true
Both (I) and (II) are true
All of the options (I, II and III) are true
only (I) is true
Only (II) is true
Both (I) and (II) are true
All of the options (I, II and III) are true
x = 0; // x is floating pt Which rewritten form of above line of code is more in line with the self-documentation philosophy than the code above.
x = false
x = NULL
x = 0.0;
x = ‘\0’
Comma ( , ) is very dangerous because
Compiler does not recognise this symbol
It creates linkage problem
It causes side effects
All of the given options(Not sure)
Compiler does not recognise this symbol
It creates linkage problem
It causes side effects
All of the given options(Not sure)
Vukwl- Virtual Education Solution
using proper paranthesis normally makes the codeeasy to read
easy to understand
less ambiguous
All of the given options
easy to understand
less ambiguous
All of the given options
The use of comments should be minimized by making the code self-documenting by appropriate name choices and an explicit logical structure.TrueFalse
Bit fields allow the packing of data in a structure. using Bit fields we can:Read 9 bit integers
avoid memory leakages
avoid memory overflowAvoid syntax errors
avoid memory leakages
avoid memory overflowAvoid syntax errors
Be very careful when you use functions with side effects – functions that change the values of the ________.
Objects
Classes
Structures
Variables
Objects
Classes
Structures
Variables
A test case involves
Input/output specification plus a statement of the function under testSteps to perform the function
Expected results that the software application produces
All of the given options
Input/output specification plus a statement of the function under testSteps to perform the function
Expected results that the software application produces
All of the given options
The C/C++ language has not specified whether ____ is arithmetic or logical.
Right shift >>Right shift <<
&&
||
Right shift >>Right shift <<
&&
||
If an application fulfills its specifications but deviates from users expectations or their desired behavior. This means, software is verified but not ------------
Validated
Corrected
Checked
Traced
The raising of the imaginary error flag is simply called raising or ________ an error.
Catching
Casting
Throwing
None of given options
Vukwl- Virtual Education Solution
struct packed_struct { unsigned int f1:1; } pack; Here in "packed_struct":
value of f1 = 1
size of f1 = 1 bit
value of f1 should not exceede 1
None of given options
The idea behind exception handling is to raise some error flag every time ________.
The code compiles
The code links
Memory is allocated
Something goes wrong
Bit fields allow the packing of data in a structure. using Bit fields we can:
Read 9 bit integers
avoid memory leakages
avoid memory overflow
Avoid syntax errors
The order in which bytes of one word are stored is _________ dependent.
hardware
software
language
syntax
A __________ is a variance from a desired product attribute.
Exception
Error
Mistake
Defect
The C/C++ language does not define the alignment of items within.
structures
classes
unions
All of the given options
The raising of the imaginary error flag is simply called raising or ________ an error
Catching
Casting
Throwing
None of given options
Consider the following statement: int a,b=10; Which of the following is correct:variable "a" is initialized to 10
Variable "b" is initialized to 10
Both variables "a" and "b" are initialized to 10
variables can not be initialized this way
Exception handling is a powerful technique that separates error-handling code from ______ code.
Normal
Faulty
Buggy
Complex
Bit fields are a convenient way to express many difficult operations. However, bit fields suffer from one problem.
Lack of usability
Lack of security
Lack of performance
Lack of portability
Vukwl- Virtual Education Solution
The complexity of a program may ______ if there are exceptional paths in it
Decrease
Increase
Remain same
All of given options
When an error is thrown the overall system (on the lookout for this error flag) responds by ______ the error.
Ignoring
Casting
Catching
All of the given options(Not Sure)
Comments are not syntax checked
TRUE
FALSE
TRUE
FALSE
Modularity is a tool that can help us in increasing the size of individual functions, making them less readable.
TrueFalse
TrueFalse
Client Server model tries to data and processing.
DistributeMergeCloneProceed
Anti- Patterns is another concept that corresponds to common in analysis and design.
Mistake
Issues
Problems
All of the given
Three tier architecture contains layers.
Presentation
Application
Database
All of the above
MVC stands for
Model View Controller
Modern View Center
Model View Center
Modern View Controller
Fat client model is one of the configurations of model.
Data-Centered
Layered
Reference
Client Server
Description of communicating objects and classes that are customized to solved a general problem in a particular context is called.
Design Pattern
System Patter
System Design
None of the Given
Mistake
Issues
Problems
All of the given
Three tier architecture contains layers.
Presentation
Application
Database
All of the above
MVC stands for
Model View Controller
Modern View Center
Model View Center
Modern View Controller
Fat client model is one of the configurations of model.
Data-Centered
Layered
Reference
Client Server
Description of communicating objects and classes that are customized to solved a general problem in a particular context is called.
Design Pattern
System Patter
System Design
None of the Given
Vukwl- Virtual Education Solution
In the N-tire Architecture, the idea is to enhance scalability and by distributing both data and the application using multiple server machines.
Usability
Performance
Interpretability
None of the given
Thin Client model is one of the configurations of ….. model.
Data Centered
Client Server
Layered
Reference
Dynamic process model shows the process ….…….. of the system.
Components
Objects
Structure
Linkage
It ensures that a class only has one instance and provides a global point of access to it.
Singleton Pattern
Observer Pattern
Real Pattern
None of the given
STL Stnads for ------------------ .
Standard Template Library
Standard Type Link
Standard Tempo Line
None of the given
Three tier architecture contains ------------- layers.
Presentation
Application
Database
All of the above
Which of following is/are among ten things, which the basic template of GOF design pattern includes.
Problem
Context
Forces
All of the given
Vertical partitioning is also known as….. .
Balancing
Mutating
Parallelizing
Factoring
Vertical partitioning is also known as…...
Balancing
Mutating
Parallelizing
Factoring
Patterns are devices that allow programs to share knowledge about their -------.
Code
Design
Analysis
None of the given
Client server model tries to …….data and processing.
Distribute
Merge
Clone
Proceed
N-tier architecture stems from the struggle to find a ----------- between the fat-client architecture and the thin-client architecture.
Concurrency
Distribution point
Middle ground
Similarity
Vertical partitioning divides the architecture application from a …… making perspective.
Decision
Design
Conclusion
Move
Distributing the responsibilities to different subsystems so that we get a software system which is easy to maintain, is called ………the architecture.
Subtracting
Partitioning
Cloning
Balancing
Vukwl- Virtual Education Solution
The nominal case should be put in the if-part and the exception in the else-part of an if statement.
TURE
FALSE
Charles Simonyi first discussed Hungarian Notation. He was of ------. .
Microsoft
IBM
Dell
Cisco
The terms get/set must be used where an attribute is accessed.
Indirectly
Directly
A self documented program/code contains the following attribute(s):
Size of each function
Choice of variable
Choice of variable
All of the given choices
"is" prefix should be used for------ variables and methods.
General
Boolean
Constant
None of the given
The use of comments should be minimized by making the code self-documenting by appropriate name choices and an
explicit logical structure.
TRUE
FALSE
Variables should be initialized where they are ------and they should be declared in the ------scope possible.
defined and smallest
declared and medium
defined and medium
declared and smallest
Unrelated variables should be declared in the same statement.
True
False
which of the following statements are same in output: 1) a = a >> 2 2) a = a / 4 3) a = a * 2.
(1) and (3) only
(2) and (3) only
(1) and (2) only
All produce the same result
Goto statements violate the idea of.
object oriented code
structured code
control structure
repetition structure
MVC pattern was based on the --------------- pattern.
Observer
Structural
Behavioral
None of given
Which one is correct?
double total = 0.5;
double total = .5;
double total = .50;
all of the given
TURE
FALSE
Charles Simonyi first discussed Hungarian Notation. He was of ------. .
Microsoft
IBM
Dell
Cisco
The terms get/set must be used where an attribute is accessed.
Indirectly
Directly
A self documented program/code contains the following attribute(s):
Size of each function
Choice of variable
Choice of variable
All of the given choices
"is" prefix should be used for------ variables and methods.
General
Boolean
Constant
None of the given
The use of comments should be minimized by making the code self-documenting by appropriate name choices and an
explicit logical structure.
TRUE
FALSE
Variables should be initialized where they are ------and they should be declared in the ------scope possible.
defined and smallest
declared and medium
defined and medium
declared and smallest
Unrelated variables should be declared in the same statement.
True
False
which of the following statements are same in output: 1) a = a >> 2 2) a = a / 4 3) a = a * 2.
(1) and (3) only
(2) and (3) only
(1) and (2) only
All produce the same result
Goto statements violate the idea of.
object oriented code
structured code
control structure
repetition structure
MVC pattern was based on the --------------- pattern.
Observer
Structural
Behavioral
None of given
Which one is correct?
double total = 0.5;
double total = .5;
double total = .50;
all of the given
Vukwl- Virtual Education Solution
Code should not be:
commented
indented
cryptic
aligned
Global variables in C++ should always be referred to by using the.
:: operator
: operator
Without an operator
None of the given
_________ was the first pure Object Oriented language in which observer pattern was used in implementing its Model.
View Controller pattern
Smalltalk
PASCAL
JAVA
C++
Using proper paranthesis normally makes the code.
easy to read
easy to understand
less ambigous
All of the given options
Which of the following shows a commented statement in C++.
# Ans = first + second
// Ans = first + second
\\ Ans = first + second
/# Ans = first + second
The form for (;;) should be used for.
nested loop
empty loop
more than 1000 iterations
Identifier names also play a significant role in enhancing the -------- of a program.
Writ ability
Readability
Reliability
It ensures that a class only has one instance and provides a global point of access to it.
Singleton Pattern
Observer Pattern
Real Pattern
None of the given
Names representing methods and functions should be----and written in mixed case starting
with -----case.
Noun—lower
Verb----lower
Noun ---upper
A function should not be larger in any case and should not exceed ______ in length .
Half page
One page
Two pages
Three Pages
commented
indented
cryptic
aligned
Global variables in C++ should always be referred to by using the.
:: operator
: operator
Without an operator
None of the given
_________ was the first pure Object Oriented language in which observer pattern was used in implementing its Model.
View Controller pattern
Smalltalk
PASCAL
JAVA
C++
Using proper paranthesis normally makes the code.
easy to read
easy to understand
less ambigous
All of the given options
Which of the following shows a commented statement in C++.
# Ans = first + second
// Ans = first + second
\\ Ans = first + second
/# Ans = first + second
The form for (;;) should be used for.
nested loop
empty loop
more than 1000 iterations
Identifier names also play a significant role in enhancing the -------- of a program.
Writ ability
Readability
Reliability
It ensures that a class only has one instance and provides a global point of access to it.
Singleton Pattern
Observer Pattern
Real Pattern
None of the given
Names representing methods and functions should be----and written in mixed case starting
with -----case.
Noun—lower
Verb----lower
Noun ---upper
A function should not be larger in any case and should not exceed ______ in length .
Half page
One page
Two pages
Three Pages
Vukwl- Virtual Education Solution
-----provides a unified interface to a set of interfaces in a sub-system.
Observer Pattern
Singleton Pattern
Façade Pattern
All of the above
MVC stands for ---------------.
Model View Controller
Modern View Center
Model View Center
Modern View Controller
A self documenting code is a code that explains itself without the need of comments and
extraneous documentation, like _______.
Flowcharts
UML diagrams
Process-flow state diagrams
All of the given choices
Complex expressions:
Make the code easy to modify
Make the code difficult to modify
Make the code easy to understand
Does not effect understandability
Comments should NOT be indented relative to their position in the code.
TRUE
FALSE
----Provides a unified interface to a set of interfaces in a sub-system.
Observer Pattern
Singleton Pattern
Façade Pattern
All of the above
In Client Server model, there application is modeled as a set so --- that are provided by server.
Application
Protocol
Services
All of the above
Vertical Partitioning is also know as.
Balancing
Mutating
Parallizing
Factoring
Façade Pattern provides a unified interface to a set of interfaces ina sub-system.
True
False
Observer Pattern
Singleton Pattern
Façade Pattern
All of the above
MVC stands for ---------------.
Model View Controller
Modern View Center
Model View Center
Modern View Controller
A self documenting code is a code that explains itself without the need of comments and
extraneous documentation, like _______.
Flowcharts
UML diagrams
Process-flow state diagrams
All of the given choices
Complex expressions:
Make the code easy to modify
Make the code difficult to modify
Make the code easy to understand
Does not effect understandability
Comments should NOT be indented relative to their position in the code.
TRUE
FALSE
----Provides a unified interface to a set of interfaces in a sub-system.
Observer Pattern
Singleton Pattern
Façade Pattern
All of the above
In Client Server model, there application is modeled as a set so --- that are provided by server.
Application
Protocol
Services
All of the above
Vertical Partitioning is also know as.
Balancing
Mutating
Parallizing
Factoring
Façade Pattern provides a unified interface to a set of interfaces ina sub-system.
True
False
Vukwl- Virtual Education Solution
Data-Centered Architectural Style is also called …..
Repository model
Client Server model
Sub system model
Reference model