Q 1: | Statistical quality assurance involves |
(1) | Using sampling in place of exhaustive testing of software |
(2) | Surveying customers to find out their opinions about product quality |
(3) | Tracing each defect to its underlying cause, isolating the "vital few" causes, and moving to correct them |
(4) | Tracing each defect to its underlying causes and using the pareto principle to correct each problem found |
Correct Answer: Tracing each defect to its underlying cause, isolating the "vital few" causes, and moving to correct them | |
Q 2: |
In Digital Signature Schemes........... used for....................whereas.................is used for................... |
(1) | Private Key, Encryption, Public Key, Decryption |
(2) | Private Key, Decryption, Public Key, Encryption |
(3) | DES, Encryption, DES, Decryption |
(4) | None of the above |
Correct Answer: Private Key, Encryption, Public Key, Decryption | |
Q 3: |
In ASP.NET what does the following return <% Response.Write(System.Environment.WorkingSet. ToString())%> |
(1) | Gives the memory working set |
(2) | Return Null value |
(3) | Gives Error |
(4) | None of these |
Correct Answer: Gives the memory working set | |
Q 4: |
Immunity of the external schemas (or application programs) to changes in the conceptual schema is referred to as: |
(1) | Physical Data Independence |
(2) | Logical Data Independence |
(3) | Both (a) and (b) |
(4) | None of the above |
Correct Answer: Logical Data Independence | |
Q 5: |
The diagram that helps in understanding and representing user requirements for a software project using UML. (Unified Modeling Language) is |
(1) | Deployment Diagram |
(2) | Entity Relationship Diagram |
(3) | Data Flow Diagram |
(4) | Use Case Diagram |
Correct Answer: Use Case Diagram | |
Q 6: | The IEEE 802.11 wireless LANs use....................... types of frames |
(1) | 4 |
(2) | 6 |
(3) | 5 |
(4) | None of the above |
Correct Answer: None of the above | |
Q 7: | Which of the following service is supported by PGP (Pretty Good Privacy)? |
(1) | Confidentiality |
(2) | Compression |
(3) | e-Mail Compatibility |
(4) | All of the above |
Correct Answer: All of the above | |
Q 8: | If a relation with a Schema R is decomposed into two relations R1 and R2 such that (R1 R2) = R1 then which one of the following is to be satisfied for a lossless joint decomposition (→ indicates functional dependency) |
(1) | a |
(2) | b |
(3) | c |
(4) | d |
Correct Answer: a | |
Q 9: | Consider a schema R (A, B, C, D) and functional dependencies A B and C D. Then the decomposition R1 (A, B) and R2 (C, D) is |
(1) | Dependency preserving but not lossless join |
(2) | Dependency preserving and lossless join |
(3) | Lossless join but not dependency preserving |
(4) | Lossless join |
Correct Answer: Dependency preserving but not lossless join | |
Q 10: |
Which of the following are NOT considered when computing function points for a software project? NI: External inputs and outputs N2: Programming language to be used for the implementation N3: User interactions N4: External interfaces N5: Number of programmers in the software project N6 Files used by the system |
(1) | N4, N6 |
(2) | NI, N5 |
(3) | N2, N3 |
(4) | N2, N5 |
Correct Answer: N2, N5 | |