Upload
kammara
View
254
Download
1
Embed Size (px)
Citation preview
8/7/2019 Placement Preparation S. Part Ha Sara Thy
1/151
8/7/2019 Placement Preparation S. Part Ha Sara Thy
2/151
Downloaded from www.books4career.blogspot.com
8/7/2019 Placement Preparation S. Part Ha Sara Thy
3/151
This page
intentionally left
blank
Downloaded from www.books4career.blogspot.com
8/7/2019 Placement Preparation S. Part Ha Sara Thy
4/151
Downloaded from www.books4career.blogspot.com
8/7/2019 Placement Preparation S. Part Ha Sara Thy
5/151
Copyright 2006 New Age International (P) Ltd., Publishers
Published by New Age International (P) Ltd., Publishers
All rights reserved.
No part of this ebook may be reproduced in any form, by photostat, microfilm,
xerography, or any other means, or incorporated into any information retrievalsystem, electronic or mechanical, without the written permission of the publisher.
All inquiries should be emailed to [email protected]
ISBN : 978-81-224-2421-8
PUBLISHINGFORONEWORLD
NEW AGE INTERNATIONAL (P) LIMITED, PUBLISHERS
4835/24, Ansari Road, Daryaganj, New Delhi - 110002
Visit us at www.newagepublishers.com
8/7/2019 Placement Preparation S. Part Ha Sara Thy
6/151
DEDICATED TO
MY BELOVED MOTHER
8/7/2019 Placement Preparation S. Part Ha Sara Thy
7/151
This page
intentionally left
blank
8/7/2019 Placement Preparation S. Part Ha Sara Thy
8/151
Preface
The IT indust ry is now in boom. Stu dent s ar e getting placed through both off-campus a nd on-
cam pus r ecru itment . Recru itment ha s become a process of rejection rat her t ha n selection due
to the lar ge outpu t from the inst itutions all over the coun try. The recruitment process normally
involves t he following sta ges:
Aptitude test Technical Test Techn ical Int erview Personal Interview
Of course, ma ny compa nies include group discussion also. The ar eas wh ere t he fresher s or
experienced professionals find it difficult are the second and third stages mentioned above.Though they have mastered many subjects in their graduation/post-graduation, they find it
difficult to quickly recapitulat e th e basics, which is m andat ory to clear a ny techn ical test /inter view.
Hence the need for the preparation of a textbook of this type consisting of more than 1000
questions (short a nswer an d objective type) on various hot t opics in Computer Science.
This text book is present ed as follows. There a re t otally twelve cha pters. The first eleven
chapters provide short answer quest ions in C Programming, C++ Programming, Data
Stru ctures & Algorith ms, DBMS, RDBMS, DDBMS, Softwar e En gineering, Softwar e Qua lity
and Software Testing, Operating System, Computer Applications, JAVA Programming and
Compu ter Networks. The last chapter provides objective type questions on th e various topics
discussed earlier. This Test Yourself chapter is given to readers to test themselves after
completely studying th e earlier chapt ers.
Being the first edition, th is book is prepared a nd pr esented in su ch a way th at everybody,even a beginner, will find it easy to have a quick glimpse of the various concepts in Computer
Science. The rea der can m ake u se of th e text book to prepa re for t echn ical test s an d technical
interviews conducted by software companies, competitive exams conducted by State Government
and the Government of India for the posts of IT officers, Programmers, IT Managers, and
Software Engineers, to clear the technical part of the exams like UGC-NET, SLET etc. The
book is ta rgetted at the u nder-gradua te an d post-gradua te stu dents of any bran ch, those who
aspire t o enter th e field Inform ation Technology. A list of books tha t h elped us t o prepar e th is
textbook is given in t he Bibliograp hy. Though great care ha s been ta ken in editing this book,
I would wholeheartedly accept suggestions for improvement offered by the readers. If you
have the patience to go through all the questions starting from the first chapter to the last
chapter, I am hopeful that the purpose of the book would be served.
My wholehearted thanks and acknowledgements are due in no smal l measure toDr. (Mrs.) Radha Thiagarajan, Chairman, Thiagarajar Col lege of Engineer ing (TCE),
Mr. T. Kanna n, Vice Chairm an Correspondent , Dr. V. Abhaiku mar , Principal, Dr. R. Rajaram ,
Head of th e Depart ment of Compu ter Science & Engineering, and my colleagues of the TCE,
friends an d fam ily. I am t ha nkful to Pr of. V. Sanka rasu bram anian , Head of the Depar tmen t of
En glish, The Ma dur a College, Madur ai, for h is invaluable comments an d suggestions du ring
the prepar at ion of this book. I sincerely acknowledge th e support extended by my fath er, who
is the motivating force behind this project. Finally, I am thankful to New Age International
(P) Limited, Publishers, New Delhi, for their support and encouragement.
S. PARTHASARATHY
8/7/2019 Placement Preparation S. Part Ha Sara Thy
9/151
This page
intentionally left
blank
8/7/2019 Placement Preparation S. Part Ha Sara Thy
10/151
Acronym s and Abbreviat ions
2P C Two-Phase Commit Protocol
3P C Three-Pha se Commit Pr otocol
4GL 4th Generat ion Lan guage
ALGOL Algorithmic Language
ANSI American National Sta ndards Institute
AP I Applicat ion Program ming In terface
ARP Address Resolution Protocol
ASCII American Sta nda rd Code for Informa tion Intercha nge
ATL Active Template Library
ATM Automatic Teller Machine
ATP Acceptance Test Procedure
ATR Acceptance Test Results
AUT Application Under Test
AWT Abstra ct Windowing Toolkit
B2C Business-to-Consumer
BASIC Beginners All Purpose Symbolic Instruction Code
BCNF Boyce-Codd Norm al F orm
BDK Bean Development Kit
BIOS Basic Input Output System
BIT Binar y Digit
BOM Bill of Mater ial
BP R Business P rocess Reengineering
BSC Binar y Symmetric Chan nel
BVA Bounda ry Value Ana lysis
C2B Consumer-to-Business
C2C Consumer-to-Consumer
CAD Computer Aided Design
CAM Comput er Aided Manufacturing
CASE Comput er Aided Softwar e En gineering
8/7/2019 Placement Preparation S. Part Ha Sara Thy
11/151
x Placem ent Preparation
CBD Component Based Development Model
CBSE Component Ba sed Software En gineering
CGI Common Gat eway Inter face
CMM Capa bility Matu rity Model
CMMI Capability Ma tur ity Model Int egration
CMOS Complementa ry Metal Oxide S emiconductor
CNF Chomsky Normal Form
COBOL Common Business Oriented Language
COCOMO Constructive Cost Model
COM Component Object Model
COQ Cost of Qua lity
CP M Critical Pat h Method
CRC Class Res ponsibility Collabora tor Modeling
CRM Customer Relationsh ip Mana gement
CSPEC Control Specification
CSPM Certified Software Project Manager
CSQA Certified Software Quality Analyst
CSQE Certified Softwar e Qua lity E ngineer
CSTE Certified Softwa re Test En gineer
DBA Database Administrator
DBMS Database Mana gement System
DCL Data Control Language
DDBMS Distributed Data base Management System
DD L Data Definition Lan guage
DES Data Encryption Standard
DF A Deterministic Finite Aut oma ta
DF D Data F low Diagra m
DHTML Dynam ic Hypertext Markup Language
DLL Dynamic Link Librar y
DMA Direct Memory Access
DML Data Man ipulation Langua ge
DNS Domain Name System
DOM Document Object Model
8/7/2019 Placement Preparation S. Part Ha Sara Thy
12/151
8/7/2019 Placement Preparation S. Part Ha Sara Thy
13/151
xii Placem ent Preparation
KP A Key Process Area
LAN Local Area Network
LOC Lines of Code
MAC Medium Access Control Sublayer
MAN Metropolitan Area Net work
MAR Memory Address Register
MFC Microsoft Foundation Classes
MIS Management Information System
MODEM Modulator-Demodulator
MP I Message Passing Int erfaceMRP Materials Requirements P lanning
MRP-II Manu facturing Resour ce Plann ing
MST Minimum Spanning Tree
MTBF Mean Time Between Failure
MTTF Mean Time to Failure
MTTR Mean Time t o Repair
NP Non-Deterministic Polynomial
NSP Network Service Provider
ODBC Open Dat abase Connectivity
OLAP On Line Analytical Processing
OLE Object Linking a nd E mbedding
OOAD Object Oriented Analysis a nd Design
OOPS Object Or iented Pr ogram ming System
OS I Open System Inter conn ection
OSPF Open Shortest Path First Protocol
PAL Program mable Arra y Logic
PCB Pr ocess Contr ol Block
PCMM People Capability Maturity Model
P DA Push Down Automata
PDL Program Design Language
PDT Pa rtition Description Table
PERT Program Evaluation and Review Technique
P OP Point to Point Protocol
POST Power On Self Test
PRO/SIM Prototyping an d Simu lation Tools
8/7/2019 Placement Preparation S. Part Ha Sara Thy
14/151
Acronym s and Abbreviations xiii
PROM Programmable Read Only Memory
P SP Persona l Softwar e Pr ocess
PSPEC Process Specification
QFD Quality F un ction Deployment
QOS Qua lity of Service
RAD Rapid Application Developmen t
RAID Redunda nt Arrays of Inexpensive Disks
RAM Random Access Memory
RARP Reverse Address Resolution Protocol
RDBMS Relationa l Data base Management SystemRIP Routing Information Protocol
RIS Risk Informa tion Sheet
RMMM Risk Mitigation Monitoring and Ma na gement plan
ROM Read On ly Memory
RP C Remote Procedur e Call
SADT Stru ctured Analysis an d Design Technique
SAP Systems, Applicat ions a nd P roducts in Data Pr ocessing
SCM Supply Chain Man agement
SCM Software Configura tion Mana gement
SDLC Softwa re Developmen t Lifecycle
SEI Software Engineering Institute
SGML Standard Graphic Markup Language
SLIP Serial Line Internet Protocol
SMS Short Messaging Service
SPOOL Simultaneous Peripheral Operations Online
SQA Software Qu ality Assuran ce
SQL Structured Query Language
S RS Software Requirements Specification
SSL Secure Socket Layer
SSP I Sta tistical Softwar e Pr ocess Impr ovement
STD State Transition Diagram
TCL Transaction Control Language
TCP/IP Transmission Control Protocol/Internet Protocol
TDM Time Division Mu ltiplexing
TFTP Trivial File Transfer Protocol
8/7/2019 Placement Preparation S. Part Ha Sara Thy
15/151
xiv Placem ent Preparation
TM Turing Machine
TQM Total Quality Managemen t
TSL Test Script Language
TSP Team Softwar e Pr ocess
TTL Transistor Transistor Logic
UDP User Datagram Protocol
UML Unified Modeling Language
URL Uniform Resource Locator
V&V Verification & Validation
VAN Value Added NetworkVP N Virtual Private Network
VRML Virtu al Reality Model Lan guage
WAN Wide Area Network
WBS Work Breakdown St ructure
WDM Wavelength Division Multiplexing
WFF Well-Formed-Formulae
WIDL Web Inter face Definition Langu age
WML Wireless Markup Language
WMS Warehouse Management System
XML Extensible Markup Language
XSL Extensible Style Lan guage
8/7/2019 Placement Preparation S. Part Ha Sara Thy
16/151
Acronym s and Abbreviations xv
Contents
Preface vii
Acronym s and Abbreviations ix
1. C Programming 1
2. C++ Programming 16
3. Software Engineer ing 27
4. Software Quality and Software Test ing 34
5. Data Structures and Algor ithms 42
6. Computer Applica t ions 47
7. J AVA Programming 52
8. Opera t ing System 64
9. Computer Networks 74
10. Digita l Pr inciples and Microprocessor 80
11. DBMS, RDBMS and DDBMS 85
12. Test Yourself (Object ive Type Quest ions) 93
Bibliography 134
Downloaded from www.books4career.blogspot.com
8/7/2019 Placement Preparation S. Part Ha Sara Thy
17/151
This page
intentionally left
blank
8/7/2019 Placement Preparation S. Part Ha Sara Thy
18/151
C Programming 1
1. Who developed the C language?Dennis M.Ritchie in 1972
2. What type of langua ge is C?Semi-high level language
3. What is main()?The main() is a special function used by the C system to tell the computer where theprogram star ts.
4. What is the function of th e newline char acter denoted as \ n?A newline character instructs the computer to go to the next (new) line.
5. What is the purpose of a comment statement?It increases the r eadability and un dersta nda bility of th e progra m an d helps in debuggingand t esting.
6. What is size of operator?It is a compile t ime operator and when used with a n operand, i t return s the n umber ofbytes th e operan d occupies.
7. How are the characters in C grouped?Letters, digits, special cha ra cters an d white spa ces8. What are trigraph characters ?
ANSI C int roduces the concept of tr igraph sequences to provide a way to ent er certa incharacters that are not available on some keyboards.
9. What is a constant?C constant refers to fixed values that do not change during the execution of a program.
10. How are t he const an ts classified?
Integer constants, real constants, single character constant, string constant.
11 . What is a variable?
A variable is a da ta name t hat may be used to store a data value. A variable may takedifferent values a t d ifferent times du ring execut ion.
12. What a re the basic data types used in C?
Char , int, float, and double
13. What is a storage class?
Variables in C can have n ot only data type but also stora ge class th at provides informa tion
about their location an d visibility. The st orage class decides the portion of the pr ogra m
within wh ich t he var iables are r ecognized.
1 C P rogramm ing
Downloaded from www.books4career.blogspot.com
8/7/2019 Placement Preparation S. Part Ha Sara Thy
19/151
2 Placem ent Preparation
14. List the various storage classes in C.
Auto, static, extern and register.
15. What is an operator?
An operator is a symbol that tells the computer to perform certain mathematical or
logical manipulations. It is used to manipulate data and variables in programs.
16. List the various C operators.
Arithmetic operators, relational operators, logical operators, assignment operators,
increment a nd decrement operators, conditiona l opera tors, bitwise operat ors and special
operators.
17 . What is stdio.h?
It is sta nda rd inpu t-out put hea der file. The inst ru ction #include tells the compilerto search for a file named stdio.h and place its contents at this point in the program.
18. List the various control statements in C.
if sta tem ent , switch sta tem ent , cond itional opera tor sta tem ent a nd goto sta tem ent .19. What is swi tch s tatement?
C ha s a bu ilt-in mu ltiway decision st atem ent known a s a s witch. It t ests t he value of a
given varia ble (or expression) again st a list of case values a nd wh en a ma tch is foun d, a
block of sta tem ent s ass ociat ed with t ha t case is execut ed.
20. What are the program loops available in C?
The while sta tem ent , th e do sta tem ent an d th e for sta tem ent .
21. Give the format of program loops in C.(a) While (t est condit ion) (b) do
{ {
body of the loop body of the loop
} } while (test condit ion);
(c) for (initialization; test condition; increment/decrement)
{
body of the loop
}
22. Wha t is th e ad ditiona l feat ur e in for loop?
More t ha n one var iable can be initialized at a t ime in t he for sta temen t.
23. What is an array? What are its types?An arr ay is a group of relat ed data items th at sha re a comm on n ame. A list of items can
give one variable name using only one subscript and such a variable is called a single-
subscripted variable or a one-dimensional ar ra y.
Two-dimensional arrays are declared as follows:
Type ar ra y-na me [row-size][colum n-size];
Multi-dimensiona l ar ra ys ar e declared a s follows:
Type ar ra y-na me [p1][p2][p3]..[px];
8/7/2019 Placement Preparation S. Part Ha Sara Thy
20/151
C Programming 3
24. What is a string?
A string is an ar ra y of cha ra cters. Any group of chara cters defined between double quotation
mar ks is a constan t str ing.
25. List th e string-han dling fun ction su pported by C librar y.
(a) Strcat() is used to concatenate two strings.
(b) Strcmp() is used to compare t wo strings.
(c) Str cpy() is used to copy one str ing over anoth er.
(d) Str len() is used to find th e length of a str ing.
26. How are C functions classified? Give examples.
C fun ctions can be classified as librar y function an d user -defined function. ma in() is a nexample of user-defined function and printf, scanf belong to the library functions.
27. List the various categories of C functions.
(a) Fun ctions with no arguments and no return values
(b) Funct ions with ar guments and return values
(c) Funct ions with ar guments and no return values
28. What is recursion ?
Recursion is a special case where a function calls itself.
29. How can a function return values?
A function may or may not return a value. If it does, it can return only one value.
30. What is structure in C?
C supports a constructed data type known as structure, which is a method for packing
dat a of different types.
31. What is stat ic structure in C?
A stru cture m ust be declared a s sta tic if it is t o be initialized inside a function.
32. What is union in C?
Unions are a concept borrowed from structures and therefore follow the same syntax as
structures. In structure each member has i ts own storage location, whereas all the
members of a union use the same location.
33. What is a bit field?A bit field is a set of adjacent bits whose size can be from 1 to 16 bits in length.
34. What is a file? List the basic file operations.
A file is a place on t he disk wher e a gr oup of relat ed da ta is stored. The ba sic file opera tions
ar e na ming a file, opening a file, reading dat a from a file, writing data to a file and closing
a file.
35. What ar e th e various high level I/O functions?
fopen (), fclose(), get c(), put c(), fpr int f(), fscan f(), getw(), pu tw(), fseek (), ftell() an d r ewind().
8/7/2019 Placement Preparation S. Part Ha Sara Thy
21/151
4 Placem ent Preparation
36. What is a comman d line argument?
It is a parameter supplied to a program when the program is invoked.
37 . What are argc and argv ?
The variable argc is an argument counter tha t count s the n umber of arguments on t he
comma nd line. The variable argv is an ar gument vector and r epresents a n ar ra y of chara cter
point ers th at point s to the comma nd line ar gument s. The size of th is arr ay will be equal
to the value of argc.
38. What is dynamic m emory a l locat ion ?
The process of allocating memory at run time is called dynamic m emory a l locat ion .
39. Nam e th e various m emory allocat ion functions.
ma lloc(), calloc(), free() an d realloc()
40. What is C preprocessor?
C preprocessor is a program that processes the source code before it passes through
the compiler. It operates under the control of what is known as preprocessor command
lines or directives. It is placed in the source program before the main() line.
41. How are the directives classified?
Macro substitution directives, file inclusion directives and compiler control directives.
42. What is macro substitution?
It is a pr ocess wher e an iden tifier in a pr ogra m is replaced by a predefined st ring composed
of one or more tokens
43. List t he various pr eprocessor directives.
#define, #un def, #includ e, #ifdef, # end if, #ifndef, #if an d #else.
44. List th e various forms of ma cro substitu tion.
Simple macro substitution, argument ed macro substitution a nd n ested macro substitution.
45. What is a pointer?
Since memory addresses are simply numbers they can be assigned to some variables
which can be st ored in m emory, like any other va riable. Such var iables that hold memory
addresses are called pointers.
46. How do we declare a point er var iable?
Data type * pointer-name;47. What is a nul l pointer?
A null pointer is an y pointer a ssigned th e integral value zero. A pointer t ha t is guar an teed
not to point to a valid object is called a null pointer.
48. What is meant by a pointer to a pointer?
A pointer to a pointer is a const ru ct u sed frequently in sophisticat ed programs. To declare
a pointer t o a pointer, pr ecede the va riable nam e with t wo successive asterisks. Exam ple:
int **q; This declares q to be a pointer to a pointer to an int.
8/7/2019 Placement Preparation S. Part Ha Sara Thy
22/151
C Programming 5
49. What is th e difference between #include and #include fi lename ?
If the filenam e is sur rounded by a ngle brackets, th e prepr ocessor looks in a special place
designated by the operating system. If the file is surrounded by double quotes, the
preprocessor looks in the directory containing the source file.
50. What is typedef ?C language allows us to create our own names for data types with the typedef keyword.
They are especially useful for abstracting global types that can be used throughout a
program.
51. What are break and continue statements?
Break prevents program flow from falling th rough t o the next sta temen t. It should be
used with caution since it forces program control to jump discont inuously to a n ew place.
Cont inue sta temen t pr ovides a m eans for r etur ning to th e top of a loop ear lier t ha nnormal. It is particularly useful when we want to bypass the remainder of the loop for
some reason.
52. What is an inf inite loop?
An infinite loop is a loop that does not contain a terminating condition or a loop in which
the terminating condition is never reached.
53. What is bit-manipulating operator?
The bit-man ipulation operations ena ble us to access specific bits within an object a nd t o
compa re t he bit sequences of pairs of objects. The operand s for all th e bit-manipulat ion
operators must be integers.
54. What are shift operators?
The two shift operators, >, enable us to shift the bits of an object a specified
number of places to the left or the right.
55. What is masking ?
The bit-ma nipulat ion operators ar e frequen tly used to implement a pr ogra mmin g techn ique
called masking which allows us to access a specific bit or a group of bits.
56. What is cast operator?
If enables us t o convert a va lue to a different type.
57 . What is meant by scope of a variable?
The scope of a variable determ ines th e region over wh ich we can a ccess th e varia ble by
name. There are four types of scope: program, file, function and block.
58. What are nested s tructures ?
When one of th e fields of a st ru cture is itself a str uctur e, it is called a nested str uctur e.
Nested structures are common in C programming because they enable us to create data
hierarchies.
59. What is function al lusion ?
A function allusion is a declaration of a function that is defined elsewhere, usually in a
different source file. The main purpose of the function allusion is to tell the compiler
what type of value the function returns.
8/7/2019 Placement Preparation S. Part Ha Sara Thy
23/151
6 Placem ent Preparation
60. Why ar e point ers t o fun ctions considered importa nt ?
Pointers to functions are a powerful tool because they provide an elegant way to call
different functions based on the input data.
61. What is a stream ?
A strea m consist s of an ordered ser ies of bytes. I/O is performed t hr ough str eam s th at
are associated with the files or devices.
62. List the stan dard stream s in C.
stdin, stdout a nd stderr.
63. What does cont ain?
(a) Pr ototype declara tions for all th e I/O fun ctions.
(b) Declaration of the FILE stru cture.
(c) Several macro constants .
64. What is errno variable?
Ther e is a global var iable called err no th at is used by a few of th e I/O fun ctions t o record
errors. errn o is an integer var iable declared in the errn o.h h eader file.
65. What is th e difference between a definit ion and the declaration of a variable?
Definition is th e place where t he var iable is created or assigned st orage whereas declara tion
refers to places where the nature of the variable is stated but no storage is allocated.
66. Can we use a swi tch statement to switch on strings?
No. The cases in a swi tch must either have integer constants or constant expressions.
67. Is it necessary that the header files should have an .h extens ion ?
No. Traditionally, they have been given an .h extension to identify them as something
different from th e .c program files.
68. Are the expressions *pointer++ and ++*pointer the same?
No. *pointer++ increments the pointer and not the value pointed by it, whereas the
++*pointer increments the value being pointed to by the pointer.
69. Give th e equ ivalent pointer expression for x[a][b][c][d].
*(*(*(*(x+a)+b)+c)+d)
70. Where do we use pointers?
Some of the important areas are: (a) Dynamic memory allocation (b) call by reference
(c) trees, graphs and so on.
71. How many bytes are occupied by near, far and huge pointers?
A near pointer is 2 bytes long and a far pointer and a huge pointer are 4 bytes long.
72. What is th e similarity between a str ucture, union a nd a n enu meration?
All of them let you define new data types.
8/7/2019 Placement Preparation S. Part Ha Sara Thy
24/151
C Programming 7
73. How would you check whether the contents of two structure variables are the same?
If we need to compare two structures, we will have to write our own function to do so
which carries out the comparison field by field.
74. What is the difference between a structure and a union?
A union is essentially a st ructu re in which all of the fields overlay each other . We can use
only one field at a time. We can also write to one field and read from another.
75. What is the use of bit fields in a structure declaration?
Bit fields are u sed to save space in str uctures having several binary flags or other small fields.
PREDICT THE OUTPUT OR ERROR FOR THE FOLLOWING
QUESTION NUMBER 76 TO 108
Not e :It is assum ed tha t necessary header files are included an d compiled using the t ur bo
C/C++ compiler.
76. #define N 100
# define A 2
main()
{
int a; a=A;
while(a
8/7/2019 Placement Preparation S. Part Ha Sara Thy
25/151
8 Placem ent Preparation
79. main(){in t b[5]={2,3};
pr int f (\ n%d%d%d,b[2]b[3]b[4]);
}
OUTPUT: ___________
80. main()
{
char *str1=xyzq;
char st rz[]=xyzq;
printf(%d%d%d,sizeof(str1),sizeof(str2),sizeof(xyzq));
}
OUTPUT: ___________
81. main()
{
char *cptr,c;
void *vptr,v;
c=20;v=0;
cptr=&c;vptr=&v;
printf(%c%v,c,v);
}
OUTPUT: ___________
82. void m ain()
{sta tic int i=5;
if(--i){
main();
printf(%d,i);
}
}
OUTPUT: ___________
83. main()
{ s t at ic in t b[20];
int j=0;
b[j]=j++;
pr int f(\ n%d%d%d,b[0],b[1],j);
}OUTPUT: ___________
84. main()
{
int x=3;
x=x++;
printf(%d,x);
}
OUTPUT: ___________
8/7/2019 Placement Preparation S. Part Ha Sara Thy
26/151
C Programming 9
85. main(){ in t x=2;
pr int f(\ n%d%d,++x,++x);
}
OUTPUT: ___________
86. main()
{ in t i=-3 ,j=2,k=0,m;
m=++i&&++j| | ++k;prin tf(\ n%d%d%d%d,i,j,k,m);
}
OUTPUT: ___________
87. main(){ in t a =-5, b=-2;
junk(a,&b);
pr int f(\ na =%d b=%d,a,b);
}jun k(int a,int *b)
{
a=a*a;
*b=*b**b;
}
OUTPUT: ___________
88. main()
{ int x[]={10,20,30,40,50};
int k;
for(k=0;k
8/7/2019 Placement Preparation S. Part Ha Sara Thy
27/151
10 Placem ent Preparation
91. #define ASK prog
main()
{
printf(ASK);
}
OUTPUT : ___________
92. #de fine M AX(x,y) (x>y? x:y)
main()
{
int a;
a=max(3+2,2+7);
printf(%d,a);
}
OUTPUT : ___________
93. int a bc(int I)
{
retu rn (I++);
}
main()
{ in t I=abc(10);
pr int f(%d\ n,--I);
}
OUTPUT: ___________
94. main()
{ in t a [10];
printf(%d,*a+1-*a+3);
}
OUTPUT: ___________
95. main()
{ if(strcmp(ask,ask\ 0))
print f(strin gs are not equa l\ n);
else
printf(strings a re equa l\ n);
}
OUTPUT: ___________96. main()
{
int ar r[]={0,1,2,3,4);
int *ptr;
for (ptr=a rr +4;ptr >=arr ;ptr--)
printf(%d,*ptr);
}
OUTPUT: ___________
8/7/2019 Placement Preparation S. Part Ha Sara Thy
28/151
C Programming 11
97. main(){ char s[]=abcdefghij!;
prin tf(\ n%d,*(s+strlen (s));
}
OUTPUT: ___________
98. main()
{ char str[]=abcdefghi;
char *s;s=&str[6]-6;
while(*s)
printf(%c,*s++);
}
OUTPUT: ___________
99. #includ e alloc.h
main()
{str uct node {
int data;
struct node *link;
};
struct node *p,*q;
p=ma lloc(sizeof(str uct node));
q=ma lloc(sizeof(st ru ct n ode));
pr int f(\ n%d%d,sizeof(p),sizeof(q));
}
OUTPUT: ___________
100. void ma in()
{ int i=10,j=2;
int *ip=&i,*jp=&j;
int k=*ip/*jp;
printf(%d,k);
}
OUTPUT: ___________
101. struct a
{ in t y;
struct a x;
}OUTPUT: ___________
102. main(){ in t I=300 ;
char *ptr=&I;
*++ptr=2;
printf(%d,I);
}
OUTPUT: ___________
8/7/2019 Placement Preparation S. Part Ha Sara Thy
29/151
12 Placem ent Preparation
103. main()
{
char *p;
p=%d\ n;
p++;p++;
printf(p-2,300);
}
OUTPUT: ___________
104. main()
{
char s[ ] =C is a philosophy of life;
char t[40];
char *ss, *tt;
ss=s;
tt=t;
while(*ss)
*tt++=*ss++;
*tt =\ o;
prin tf(\ n%s,t);
}
OUTPUT: ___________
105. main()
{ in t a rr [12];
prin tf(\ n%d,sizeof(ar r));
}
OUTPUT: ___________
106. main()
{ in t I=3;
prin tf(\ na ddres s of I=%u,&I);
pr int f(\ nva lueof I=%u,I);
}
OUTPUT: ___________
107. main()
{ in t I=3;
prin tf(\ nAddress of I=%u,&I);
pr int f(\ nva lue of I=%d,I);
pr int f(\ nva lue of I=%d,*(&I));
}
OUTPUT: ___________
108. How would you declare the following?
(i) An Array of thr ee pointers to char s
(ii) An Array of thr ee char pointers
8/7/2019 Placement Preparation S. Part Ha Sara Thy
30/151
C Programming 13
ANSWERS FOR QUESTIONS 76 TO 108
76. OUTPUT
2
4
16
77. OUTPUT
12345
12345
0000012345
12345
987654
-987654
78. OUTPUT
ERROR in the program as the extern int k is a declaration and not a definition.
79. OUTPUT
0 0 0
80. OUTPUT
2 5 5
81 . OUTPUT
Compilation Error, since size of V is not known.
82. OUTPUT
0 0 0 0
83. OUTPUT
0 0 1
84 . OUTPUT
4
85. OUTPUT
No error. The output will vary from one compiler to another.
86. OUTPUT
2 3 0 1
87. OUTPUT
a= -5 b= 4
88. OUTPUT
Err or message
8/7/2019 Placement Preparation S. Part Ha Sara Thy
31/151
14 Placem ent Preparation
89. OUTPUT
100 300
90. OUTPUT
Error, re-declaration of x;
91. OUTPUT
ASK
92. OUTPUT
9
93. OUTPUT
9
94. OUTPUT
4
95. OUTPUT
Strings are equal
96. OUTPUT
4 3 2 1 0
97. OUTPUT
0
98. OUTPUT
abcdefghi
99. OUTPUT
2 2
100. OUTPUT
Compilation error
101. OUTPUT
Error, Improper usage of structure
102. OUTPUT
556
103. OUTPUT
300
104. OUTPUT
C is a philosophy of life.
8/7/2019 Placement Preparation S. Part Ha Sara Thy
32/151
C Programming 15
105. OUTPUT
24
106. OUTPUT
Address of i = 6485
Value of i = 3
107. OUTPUT
Address of i = 6485
Value of i = 3
Value of i = 3
108. OUTPUT
(i) Char *ptr[3];
(ii) Char *ptr[3];
8/7/2019 Placement Preparation S. Part Ha Sara Thy
33/151
16 Placem ent Preparation
1. Compare C and C++ programming .C++ is a superset of C. It a dds t o the C lan guage t he capability to implement OOP (object
oriented program ming). C is a procedur al langu age an d C++ is an object-orient ed langu age.
2. What are the two major components of an object?Data a nd the functions tha t act on tha t data .
3. What is a member function in C++?A fun ction cont ained with in a class is called a m ember function.
4. What is Data hiding?Pr otecting dat a from access by una ut horized function is called da ta h iding.
5. What are the OOPS concepts?Encapsulation, Inheritance and Polymorphism.
6. What is Polymorphism?The ability of a function or operator to act in different ways on different data types is
called polymorphism .
7. Name the header file that enables the user to use cout and cin in C++?IOSTREAM.H
8. Which operat or is related to concatena tion of two str ings?ar ithm etic operat or (+)
9. If we use the small memory model, what library file must be linked to our program toprovide sta nda rd librar y fun ctions?
CS.LIB
10. What is Encapsulat ion?
It is the m echan ism that binds together the code and t he data i t man ipulates, and k eeps
both safe from outside interference and misuse.
11 . What is Inheri tance?It is a process of creating new classes called derived classes from existing or base classes.
12. How does C++ implement Polymorphism?
Using (a) Function overloading (b) Operator overloading (c) Virtual functions.
13. Distinguish between Object-oriented langua ge and Object-based langua ge.
Object-based languages support only objects and classes, whereas Object-oriented languages
also support featu res like inher itan ce and polymorphism. Visual Basic is an Object-based
langua ge Whereas Visual C++ is an Object-orient ed langua ge.
2 C++ Program min g
8/7/2019 Placement Preparation S. Part Ha Sara Thy
34/151
C++ Programming 17
14. Arrange in order of preference (highest first) the following kinds of operators: logical,un ar y, arithm etic, assignment , relational, conditiona l.
(1) Un ar y (2) Arit hm etic (3) Relat iona l (4) Logical (5) Conditional (6) Assignmen t
15. What is a structure variable ?
When a ccessing a st ru ctu re mem ber, the ident ifier to the left of the dot operator is called
a structure variable.
16. What is the purpose of the enume rated data type?
It brings together a group of integers with user-defined names and constant values.
17. What is a funct ion argument?
It is a value sent to the function by the calling program.
18. How many values can be returned by a function?
One.
19. What is the scope of global variables with respect to functions?
Global variables can be accessed from any function.
20. What fun ctions can a ccess an au tomat ic variable?
The functions in which a n a utoma tic var iable is defined.
21. What is the purpose of a static automatic variable ?
It m akes a variable visible to only one function a nd r etains a valu e when a function is n ot
executing.
22. What is the significan ce for pa ssing argu ment s by reference?
To change the original argument.
23. What is the purpose of a class specifier (declaration)?
A class specifier describes how objects of a class will look when they are created.
24. What are a class and an object ?
A class is a s pecification for a nu mber of objects. Objects consist of both da ta an d fun ctions
tha t operate on th ose data.
25. What is a Constructor?
It is a mem ber function with t he sam e nam e as its class, which is executed every time an
object of the class is created.
26. What is a Destructor?
It is a member function with the same name as its class but preceded by a tilde (~)
symbol. It is called when an object is destroyed.
27. Compare Constructor and De structor in C++.
A constru ctor ha s no retur n t ype but can ta ke ar gument s. Constr uctors can be overloaded.
A destructor ta kes no arguments an d has n o return value.
8/7/2019 Placement Preparation S. Part Ha Sara Thy
35/151
18 Placem ent Preparation
28. If three objects of a class are defined, how many copies of the classs data items arestored in memory? How many copies of member function?
Three, One.
29. What is th e difference between structures and classes in C++?
Member functions a nd da ta are, by defau lt, public in str uctur e but pr ivat e in classes.
30. What is funct ion ove rloading?
Defining multiple functions with the same name is called function overloading. These
functions must differ in their number, order or types of arguments.
31. What are Library func tions ?
Libra ry fun ctions ar e a collection of predefined fun ctions. T hey a re s tored in .lib files
that are shipped with the compiler.
32. List th e various ways of passing variables to a function.
(a) Call by value (b) Call by referen ce
33. What is an Inl ine function?
The function whose code gets inserted, instead of a jump to the function, at the place
where ther e is a fun ction call is known a s a n Inline function.
34. What is operator overloading ?
It gives th e capability to t he operat or to work on different types of operan ds.
35. List the access specifiers in C++.
There are three access specifiers in C++ namely Public, Private and Protected.
36. What are Public, Private and Protected ?
Public data members or member functions can be accessed from anywhere, within the
class or from outside the class. Private data members cannot be accessed from outside
th e class. They can only be accessed within t he class. The protected members of the base
class are accessible only to the derived classes.
37. Compa re t he following two stat ement s:
example ex( ); example el(10,200);
The first statement is creating an object ex using a zero-argument constructor. It can
also be interpreted as a prototype of function ex( ) whose return type is example. The
second statement is creating an object using a two-argument constructor.
38. What is a dangl ing pointer?Suppose we allocate a chun k of memory an d store its ad dress in a pointer . If th is chu nk
of memory is freed and if the pointer continues to point to that location, the pointer is
said to be a dangl ing pointer .
39. How do we create a this pointer?
The th is pointer gets crea ted wh en a mem ber fun ction (non-sta tic) of a class is called.
40 . What is the outcome wh en we call th e const ru ctor explicitly?
Whenever t he const ru ctor is called explicitly a n am eless object gets creat ed.
8/7/2019 Placement Preparation S. Part Ha Sara Thy
36/151
C++ Programming 19
41. How do we create an object dynamically?
The k eyword ne w allows us to create an object dynamically.
42. Can constructors return a value? How does it handle error values?
An error value can never be ret ur ned from a const ru ctor. An exception alone can be thr own
from within the constructor. Constructor is called whenever an object gets created. There
can be no situation where we want to return a value at the time of creation of an object.
43. How do we overload constructors an d de structors?
Destructors cannot be overloaded. Constructors can be overloaded, as it is like other
member functions of the class. But it will not return any value.
44. Show th e usa ge of a scope resolut ion operator .
Void length :: addlength (length L1, length L2)
1 2 3 4 5 6
1- Retu rn type 2- Na me of class of which function is a mem ber
3- Scope resolu tion oper at or 4- F un ct ion n am e 5,6 F un ct ion a rgu men ts
45. Name some operators which cannot be overloaded?
(a) Member access or dot operator (.) (b) Scope resolution operator (::)
(c) Conditional operator (?:) (d) Pointer-to-member operator (.*)
46. What is the purpose ofoperator overloading?
It makes C++ operators work with objects and gives new meanings to existing C++
operators.
47. What will happen when you overload an arithmetic assignment operator?It goes in the object to the left of the operator.
48. What is mult iple inheri tance?
A class th at can be derived from more th an one base class is called a mu ltiple inherita nce.
49. What is the significan ce of using Inh eritan ce?
Inh eritan ce perm its th e r eusability of softwar e; derived classes can extend t he capabilities
of base classes with no need to modify or even access the source code of the base class.
50. How will you sort ma ny lar ge objects or stru ctures?
Place pointers to them in an arra y and sort the ar ray.
51. What is an Abstract class?
It is often defined a s one th at will not be u sed to create a ny objects, but exists only to act
as a base class of other classes.
52. What is a friend fun ction ?
A friend can access a class private data, even though it is not a member function of the class.
53. What is a static function?
A static fun ction is one tha t operat es on t he class in genera l rat her t ha n on objects of th e
class. It can opera te on sta tic varia bles.
8/7/2019 Placement Preparation S. Part Ha Sara Thy
37/151
20 Placem ent Preparation
54. Why is assignmen t operat or overloaded?
This is necessary when it mu st do more tha n mer ely coping one objects cont ent s into an other.
55. What is a pure virtual function?
It is a virtual function that has no body and is used in a base class.
56. Write a sta temen t th at a mem ber function can u se to retur n th e entire object of which it
is a member, without creating any temporary objects.
return *this;
57. Compare the operations of the assignment operator and that of the copy constructor.
They ar e similar, except t ha t t he copy constru ctor creat es a new object. They ar e different
except that they both create a new object.
58. Does the expression delete P delete the pointer or the object being pointed to by P?
The expression delete P deletes t he object being pointed t o by P.
59. Is it necessary to accept a reference in the copy constructor?
It is essent ial, becau se if in t he copy constru ctor a n object is accepted by value t hen th e
copy constructor will fall in a recursive loop.
60. Give an example of pur e virtua l fun ction?
A Pure virtu al function is a virtua l fun ction with th e expression = 0 added to th e declarat ion.
Exam ple : Class example
{ Public :
virtual void ex ( ) = 0;
};The function ex ( ) is kn own a s a pur e virtua l fun ction.
61. Compare s tat ic binding and dynamic binding .
When a function call gets resolved at compile-time it is called static binding or early
binding. When th e call gets resolved at ru nt ime it is called dynam ic binding or late binding.
62. What is a stream ?
It is used t o represent t he flow of dat a. For different kinds of dat a, different str eams a re
used.
63. Name the three parts of an ios tream system .
A buffer, a specificat ion system an d a tr an slation system.
64. Compare manipulator and setf( ) function.
The I/O specification class (ios) is at th e root of th e iostr eam class hiera rchy. Manipu lators
are the instructions to the output stream to modify the output in various ways. The setf( )
function is used t o set t he flags of th e ios but man ipulators directly insert th e format ting
instructions into the str eam.
65 . List the three stream classes that are commonly used for disk I/O.
ifstr eam, ofstr eam an d fstream . They are u sed for inpu t from file, out put to file an d both
input & outp ut respectively. These classes a re declared in fstream.h
8/7/2019 Placement Preparation S. Part Ha Sara Thy
38/151
C++ Programming 21
66. Compare i terator and iteration .
An iterator is an object that moves through the container accessing each element in the
container. The process of moving from element to element in the container is called
iteration.
67. What is friend c lass?
It is a class where all the member functions and data members of the class become
friends.
68. How do we get the information about the object at runtime?
Using t ypeid( ) operat or an d dyna mic_cast opera tor.
69. What is the base class for most stream classes?
ios.
70. Define wha t curr ent position mean s when applied to files.
The byte location at which the next read or write operation will take place.
71. What is class l ibrary?
A group of related classes, supp lied as a s epara te pr oduct, is often called a class librar y.
72. What are templates?
By using templates, we can design a single class/function that operates on many data
types, instead of ha ving to creat e a separa te class/fun ction for ea ch t ype. When used with
functions t hey ar e known a s fun ction templat es, whereas when used with classes t hey
ar e called class t empla tes.
73. How do we return an error value from the constructor?
We can not retu rn an y error value from th e constru ctor, as t he const ru ctor doesnt h ave
an y retu rn type. However, by thr owing an exception we can pa ss value t o catch block.
74. When is a class template instant iated?
A class template is instantiated by defining an object using the template arguments.
75. What is the size of an object of an empty class?
One byte.
PREDICT THE OUTPUT/ERRORS FOR THE FOLLOWING
QUESTION NUMBER : 76 TO 9076. main()
{
char str[] = abcdefxyz;
cout
8/7/2019 Placement Preparation S. Part Ha Sara Thy
39/151
22 Placem ent Preparation
77. void m ain(){
int j;
for ( j=0;j
8/7/2019 Placement Preparation S. Part Ha Sara Thy
40/151
C++ Programming 23
pa=&a; ra=a;cout
8/7/2019 Placement Preparation S. Part Ha Sara Thy
41/151
24 Placem ent Preparation
87. class control{ public:
control()
{ calculate();
cout
8/7/2019 Placement Preparation S. Part Ha Sara Thy
42/151
C++ Programming 25
sample t;t=s;
return t ;
}
};
void ma in()
{
sample s1,s2,s3;
s3=s1.fun(s2);
}
OUTPUT: __________
ANSWERS FOR QUESTIONS 76 TO 9076. OUTPUT:
abcdefxyz
77. OUTPUT:
0 1 4 9 16 25 36 49 64 81 100
78. OUTPUT:
x x x x x x x x x
79. OUTPUT:
Su n
MonTu e
Wed
Thurs
Fri
Sat
80. OUTPUT:
Compilation E rr or: fun ction void pr int (int *) alr eady h as a body.
81. OUTPUT:
Compiler Er ror: ra , reference mu st be in itialized.
82. OutputDisplays 1 to 11 each in a n ew line.
83. OUTPUT:
hai
hai
hai
example
8/7/2019 Placement Preparation S. Part Ha Sara Thy
43/151
26 Placem ent Preparation
84. OUTPUT:10
10
10
10
85. OUTPUT:
Compilation error due to type mismatch.
86. OUTPUT:
Error
87. OUTPUT:
pqrxyz
abcd
88. OUTPUT:
No error class a is considered as return type of main().
89. OUTPUT:
example
examination
0x8fa20fea
0x8f55oo11
90. OUTPUT:
Copy constr uctorCopy constr uctor
8/7/2019 Placement Preparation S. Part Ha Sara Thy
44/151
S oftware Engineering 27
1. What is Software Engineering?Software engineering is a discipline that integrates process, methods and tools for the
development of computer software.
2. What are the layers in software engineering?Tools, Methods, Process and Quality focus.
3. What is KP A in softwar e engineering?
The foun dat ion for softwa re engineer ing is the process layer . Process defines a fra mework
for a set of key process areas (KPA) that must be established for effective delivery of the
software engineering technology.
4. List th e um brella activities in softwar e engineering.Software project tracking and control, formal technical reviews, document preparation
an d production, reusa bility man agement , measu remen t, risk ma na gement, software quality
assurance and software configuration management.
5. List th e various softwar e engineering models.Linear sequen tial m odel, prototyping m odel, RAD (Rapid Application Developmen t) model,
evolutionary software process models, component-based development model, formal
meth ods model.6. What is RAD?It is an incremental software development process model that emphasizes an extremely
short development cycle.
7. List the various evolutionary software process models.The incremental model, the spiral model, the WINWIN spiral model, the concurrent
development model.
8. What is a spiral model?This model was proposed by Boehm. It is an evolutionary software process model that
couples th e itera tive nat ur e of prototyping with th e cont rolled an d systema tic aspects of
the linear sequential model.9. What is a task region ?A spiral model is divided into a nu mber of fra mework activities called t ask regions.
10. What is a WINWIN spira l mod el?
This model defines a set of negotiation activities at the beginning of each pass around
the spiral. The objective of this activity is to elicit project requirements from the
customer.
3 Software Engineer ing
8/7/2019 Placement Preparation S. Part Ha Sara Thy
45/151
28 Placem ent Preparation
11. What is a CBD model?
The component based d evelopment (CBD) model incorpora tes man y of the char acteristics
of th e spiral model. It is evolut iona ry in na tur e, demanding an iterat ive appr oach t o the
creation of software.
12. What is the formal method m odel?
It encompasses a set of activities that lead to the formal mathematical specification of
compu ter softwar e. Formal meth ods enable a softwar e engineer to specify, develop a nd
verify a compu ter-based system by a pplying a rigorous, mat hema tical nota tion.
13. What is sof tware project man agement ?
It is an umbrella activity within software engineering. It begins before any technical
activity is initiated an d cont inues t hroughout t he definition, development a nd su pport of
compu ter softwar e.
14. Nam e the factors influencing softwar e project m an agement .
People, Product and Process.
15. Define the term software metric.
It r efers to a broad r an ge of measur ement s for compu ter softwar e. Measur ement s can be
applied to the software process with the intent of improving it on a continuous basis.
Software metrics are analyzed and assessed by software managers. Measures are often
collected by software engineers.
16. What is P SP ?
The Personal software process (PSP) is a s t ructured set of process descript ions,
measurements , and methods tha t can he lp engineers to improve the i r personal
performance.
17. What is SSP I?
SSPI (Statistical Softwar e P rocess Im provement) uses softwar e failure a na lysis t o collect
informa tion a bout all errors an d defects en counter ed as a n a pplicat ion, system or pr oduct
is developed a nd used.
18. What is th e difference between direct and indirect sof tware m easures?
Direct measures of the software engineering process include cost and effort applied.
Direct measures of the product include lines of code (LOC) produced, execution
speed, memory size and defects reported over some set per iod of time. Indirect m easur es
of the product include functionality, quality, complexity, efficiency, reliability and
maintainability.
19. What are the indicators ofsoftware quality?
Correctness, maintainability, integrity and usability of software are the indicators of
software quality.
20. How can the integrity of a system be defined?
Integrity = summation [(1-threat) x (1-security)] where threat and security are summed
over ea ch type of atta ck.
8/7/2019 Placement Preparation S. Part Ha Sara Thy
46/151
S oftware Engineering 29
21. What is DRE?
DRE (Defect Remova l Efficiency) is a measur e of th e filtering ability of qua lity assu ra nce
and control activities as they are applied throughout all process framework activities.
DRE = E/(E+D) where E is the number of errors found before delivery of the software to
th e end-user a nd D is t he n um ber of defects foun d after delivery.
22. What is software project planning ?
The objective of software project planning is to provide a framework that enables the
manager to make reasonable estimates of resources, cost and schedule.
23. What is meant by sof tware scope?
The first a ctivity in softwar e project pla nn ing is th e determ inat ion of softwar e scope. It
describes th e dat a an d cont rol to be processed, fun ction, performa nce, const ra ints, int erfaces
and reliability.
24. What are th e resources influencing softwar e project?
People, reu sable softwar e components , ha rdwar e/softwar e t ools.
25. What is the empirical es t imation mo del?
An estimation model for computer software uses empirically derived formula to predict
effort as a function of LOC or FP. A typical estimation model is derived using regression
an alysis on dat a collected from past softwar e pr ojects.
26. What is the COCOMO m ode l?
The COCOMO (Constr uctive Cost Model) is a hiera rchy of estim at ion m odels th at add ress
th e applicat ion composition model, the early design sta ge model and t he post-architectu re
sta ge model. Thr ee different s izing options ava ilable here a re object point s, fun ction pointsand lines of source code.
27. What is sof tware equat ion?
It is a dynam ic mu ltivariable model that assu mes a specific distr ibution of effort over th e
life of a software development project.
28. What is meant by outsourcing?
It is a concept where the software engineering activities are contracted to a third party
who does the work at lower cost and hopefully provides higher quality.
29. What are Risk Analysis and Management?
Risk an alysis and ma nagement a re a series of steps that help a software team to understand
and manage uncertainty. Everyone involved in the software process participate in riskana lysis and ma nagement.
30. What types of risks are we likely to encounter as the software is built?
Pr oject r isks, Techn ical r isks, Business r isks.
31. What is meant by Risk Identif ication ?
Risk identification is a systematic attempt to specify threats to the project plan. One
meth od for ident ifying risks is t o creat e a risk item checklist.
8/7/2019 Placement Preparation S. Part Ha Sara Thy
47/151
30 Placem ent Preparation
32. What is Risk Projection ?
Risk projection, also called risk estimation, attempts to rate each risk in two ways: the
likelihood or probability that the risk is real and the consequences of the problems
associated with th e risk, should it occur.
33. What is a Risk table ?
A Risk t able provides a project m an ager with a simple technique for r isk projection.
34. What is sof tware safety and h azard analys i s?
Softwar e safety and ha zard a na lysis are softwar e quality assur an ce activities tha t focus
on the identification and assessment of potential hazards that may affect software
negatively an d cause an entire system to fail.
35. What is RMMM plan?The RMMM (Risk Mitigation Monitoring an d Man agement plan) docum ents all th e work
performed as part of risk analysis and is used by the project manager as part of the
overall project plan.
36. What is RIS?
Ea ch r isk is docum ented in dividua lly using a risk informa tion sheet (RIS). In most cases,
the RIS is maintained using a data base system.
37. What is software project scheduling?
It is an a ctivity tha t distr ibutes th e estimat ed effort a cross the plan ned project dura tion
by allocating the efforts to specific software engineering tasks.
38. List th e nu mber of basic principles tha t gu ide softwar e project scheduling.
Compartmentalization, Interdependency, time allocation, effort validation, defined
responsibilities, defined outcomes and defined milestones are the basic principles guiding
software project scheduling.
39. What ar e the two project schedu ling methods th at can be ap plied to softwar e development ?
(a) PERT (Pr ogram Evalua tion a nd Review Technique) (b) CP M (Critical Pat h Meth od)
40. What is an earned value system?
A techn ique for p erformin g th e qua ntita tive ana lysis of progress does exist. It is called
earned value analysis (EVA). The earned value system provides a common value scale
for every software project task, regardless of the type of work being performed. The total
hours to do the whole project are estimated, and every task is given an earned value
based on its estimated percentage of the total.
41 . What is sof tware con f igurat ion managemen t?
SCM (Software Configuration Management) is an umbrella activity that is applied
throughout the software process. SCM is developed to identify change, to control change,
to ensure t ha t change is being properly implemented a nd to report changes to other s who
may be interested.
42. Why is SCM so importan t?
It is an import an t element of software qua lity assu ra nce. Its pr imar y responsibility is the
control of change.
8/7/2019 Placement Preparation S. Part Ha Sara Thy
48/151
S oftware Engineering 31
43. What is vers ion control?
Version contr ol combin es procedur es an d tools to man age differen t vers ions of configurat ion
objects that are created during the software process.
44. What is software configuration audit?
It complements the formal technical review by assessing a configuration object for
chara cteristics tha t a re genera lly not considered du ring review.
45. What is System engineering?
Software engineering occurs as a consequence of a process called system engineering .
Instead of concentrating solely on software, system engineering focuses on a variety of
elements, ana lyzing, designing and organizing those element s into a system t ha t can be a
product, a service or a technology for the transformation of information or control.
46. What is Business process engineering?
The system engineering process is called business process engineering when the cont ext
of th e engineering work focuses on a business en terpr ise.
47. What is Product engineering?
When a product is to be built, the process is called product engineering. Both business
process engineering and product engineering att empt t o bring order to the development
of computer-based systems.
48. What is Software requirements analys i s?
It is a process of discovery, refinement, modeling and specification.
49. What is Requirements analys i s?It is a softwar e engineering task th at br idges the gap between system level requirements
engineering an d softwar e design.
50. What are t he various ph ases in software r equirement ana lysis?
(a) Problem r ecognition (b) Evaluation & synthesis (c) Modelin g (d) Specification
(e) Review
51. What is FAST?
FAST (Facilitat ed Applicat ion Sp ecification Techniqu e) encoura ges th e creat ion of a joint
team of customers and developers who work together to identify the problem, propose
elements of the solution, negotiat e different appr oaches a nd specify a preliminary set of
solution requirements.
52. What is QF D?
QFD (Quality Function Deployment) is a quality management technique that translates
th e needs of the customer int o techn ical requ irement s for softwar e. QFD identifies thr ee
types of requirements: (i) Normal requirements (ii) Expected requ irement s (ii i) Excitin g
requirements.
53. What types of models do we creat e dur ing requiremen ts a na lysis?
Fu nctiona l models a nd Beha viora l models.
8/7/2019 Placement Preparation S. Part Ha Sara Thy
49/151
32 Placem ent Preparation
54. What is Prototyping?
Prototyping offers an alternat ive approach to the r equirements gathering phase tha t r esults
in an execut able model of the softwar e from wh ich r equirement s can be r efined.
55. What ar e th e prima ry objectives of an analys i s model?
(a) To describe what the customer requires.
(b) To establish a ba sis for the creation of a softwar e design.
(c) To define a set of requiremen ts th at can be validated once the softwar e is built.
56. What are the elements of the analysis model?
(a) Entity relationship diagram (b) Data flow diagram (c) State-tra nsition diagram and
(d) At the core of the model lies the data dictionary.
57. What is Cardinality?
Cardinality is the specification of the number of occurrences of one [object] that can be
related to the number of occurrences of another [object].
58 . What is Modality?
The m odality of a r elat ionship is 0 if th ere is no explicit n eed for t he r elat ions hip to occur
or the relationship is optional. The modality is 1 if an occurrence of the relationship is
mandatory.
59. What are Control specif ication (CSPEC) and Proces s spec if ication (PSPEC)?
CSPEC r epresent s th e behavior of the system. P SPE C is used t o describe all flow model
processes tha t a ppear at th e final level of refinement .
60. What is Data dictionary?
It is an organized listing of all data elements that are pertinent to the system, with
precise, rigorous definitions so that both user and system analyst will have a common
un dersta nding of input s, out put s, component s of stores an d inter mediate calculat ions.
61. What are Cohesion and Coupling?
Cohesion is a qualitative indication of the degree to which a module focuses on just one
th ing. Coupling is a measu re of the r elative interdependen ce am ong modules. Cohesion is
a measure of the relative functional strength of a module.
62. What is Software architecture?
Softwar e ar chitectu re pr ovides a h olisting view of th e system to be built. It depicts th e
str uctur e an d organization of software components, t heir pr opert ies, an d th e conn ections
between t hem.
63. What is Architec tural design?
It represents t he stru cture of data and program components that are r equired to build a
comput er-based system.
64 . What is User interface des ign ?
It creates an effective communication medium between a human and a computer. User
interface design begins with the ident i f icat ion of user , task and environmental
requirements.
8/7/2019 Placement Preparation S. Part Ha Sara Thy
50/151
S oftware Engineering 33
65. When will Component-level design take place?
Component-level design, also called procedural design, occurs after data, architectural
an d interface designs ha ve been esta blished.
66. How is software re l iabil ity measured?
It is measured in terms of mean time between failures (MTBF).
67. Has the software crisis been overcome?
No, not yet. One of the main reasons for the software crisis is the lack of thrust for
softwar e test ing. Test engineers can contribute significan tly to th e softwar e qua lity.
68. What is CASE an d who does it?
CASE (Computer-Aided Software Engineering) tools assist software engineering
ma na gers an d pra ctitioners in every activity ass ociated with t he softwar e process. Project
mangers and software engineers use CASE.
8/7/2019 Placement Preparation S. Part Ha Sara Thy
51/151
34 Placem ent Preparation
4Softw are Quali ty and
Softw are Test ing
1. What is SQA?
SQA (Software Quality Assurance) is an um brella activity tha t is applied throughout
th e softwar e process.
2. What are Quality of design and Quality of conformance ?
Qua lity of design refers to th e chara cteristics t ha t designers specify for an item. Qua lity
of conformance is the degree to which the design specifications are followed during
ma nu factur ing. The great er t he degree of conforma nce, the h igher th e level of quality ofconformance.
3. What is Software quality control?
Quality control involves the series of inspections, reviews and tests used throught the
software process to ensure each work product meets the requirements placed upon it.
4. What is Quality assurance ?
Qua lity assu ra nce consists of the au diting and r eport ing fun ctions of man agement . It will
ensure that product quality meets its goals.
5. What are the components of cost of quality?
Cost of qua lity includes a ll costs incurr ed in th e pur suit of quality or in p erform ing qua lity-
related activities. Quality cost may be divided into costs associated with prevention,appra isal and failure.
6. How do we define Software quality?
Softwa re qua lity is defined a s conform an ce to explicitly sta ted fun ctiona l and per form an ce
requirem ents, explicitly document ed development st an dar ds, and implicit chara cteristics
that are expected of all professionally developed software.
7. What is the role of an SQA group?
(a) Prepares a n SQA plan for a project.
(b) Pa rt icipates in t he development of the projects softwa re pr ocess description.
(c) Reviews softwar e engineering a ctivities to verify compliance with the defined softwar e
process.
(d) Audit designa ted softwa re work products.
(e) En sures th at deviation in softwar e work an d work products is documen ted an d han dled
according to a docum ented procedure.
(f) Records a ny noncompliance and reports to senior mana gement.
8. What is FTR ?
FTR (Formal tech nical review ) is a softwar e quality assu ra nce activity performed by
software engineers. The primary objectives of FTR are: (a) To uncover errors in function,
8/7/2019 Placement Preparation S. Part Ha Sara Thy
52/151
S oftware Quality and S oftware Testing 35
logic, or implementation for any representation of the software (b) To verify that thesoftware under review meets its requirements.
9. What is statist ical software quality assurance ?It r eflects a growing trend t hroughout indu stry t o become more qua ntita tive about quality.
It is carried out through information about software defects, using the Pareto principle
an d tr acing each defect t o its u nderlying cau se.
10. What is software rel iabil i ty?
It is d efined in s tat istical t erms as th e probability of failure free operat ion of a compu ter
program in a specified environment for a specified time.
11. What is MTBF?
MTBF = MTTF + MTTRMTBF = Mean time between failures.
MTTF = Mean time to failure
MTTR = Mean time to repair.
12. What is software ava ilabil i ty?
It is the probability that a program is operating according to requirements at a given
point in time an d is defined as
Availability = [MTTF / (MTTF + MTTR)] * 100%
13. What is software safety?
It is a softwa re qua lity assu ra nce activity tha t focuses on th e identification and a ssessmen t
of potential hazards that may affect software negatively and cause an entire system tofail.
14. What is ISO 9001 standard?
It is th e quality assuran ce stan dard tha t a pplies to software engineering. The standa rd
cont ains 20 requiremen ts th at m ust be presen t for an effective quality assu ra nce system.
15. Why is software quality assurance important?
It is th e mapp ing of the ma na gerial precepts a nd design disciplines of quality assu ra nce
onto the applicable managerial and technological space of software engineering.
16. Name some software quality metrics .
(i) Num ber of defects foun d per KDSI (known as defect den sity)
(ii) Num ber of changes requested by the cust omer after th e software is delivered.(iii) MTBF (Mean time between failures) i.e. the average time between failures.
(iv) MTTR (Mean time to repair) i.e. th e average time r equired to remove a defect a fter it
is detected.
17. Compare Product Quality Metrics and Process Quality Metrics.
The product quality metrics are different from the process quality metrics. The product
quality metrics reflect the quality of the product whereas the process quality metrics
reflect how well the process is defined.
8/7/2019 Placement Preparation S. Part Ha Sara Thy
53/151
36 Placem ent Preparation
18. What is CMM?
CMM (Capa bility Mat ur ity Model) is a m odel developed by the softwa re engineering inst itut e
to grade softwar e development organizations based on th eir process mat ur ity.
19. What is sof tware process maturi ty?
The extent to which a process is explicitly defined, managed, measured, controlled and
effective is defined as software process maturity.
20. What are the levels in CMM?
An organization is given one of the 5 grades or levels as level 1 to level 5.
Level 1 organ ization does not follow an y processes to develop softwa re. Th ey do everyt hing
on ad hoc basis. Level 5 organizations have very mature processes and continuously
improve their processes to improve product quality. However, CMM levels indicate onlyth e process quality and n ot product qua lity.
21. Compare TQM and CMM.
CMM addr esses th e ma na gement of quality of softwar e aspects of the pr oject i.e. CMM is
confined t o softwar e qua lity ma na gement of the organization wherea s TQM (Tota l quality
man agement) addresses both har dware an d software qua lity man agement.
22. What is CMMI?
The Ca pability ma tu rity model integrat ion (CMMI) for softwar e engineering is th e resu lt
of th e SEIs efforts t o develop an in tegr at ed impr ovement fra mework for th e following
standa rds for quality system man agement:
(i) CMM for software (SW CMM)
(ii) EIA / IS 731(iii) IPD CMM VO.98
There are two representations of CMMI framework namely staged and continuous.
23. Why is P SP required?
Th e SEI (Software Engineering Institute) developed the personal software process
(PSP ) which defines t he pr ocesses t o be followed by individua ls. The ph ilosophy of PS P is
simple: plan year work, track your work and analyze your work so that you will
continuously improve yourself.
24. What is PCMM leve l?
The people capability mat ur ity model (PCMM) was developed at th e SEI t o measur e and
improve the h uma n r esour ces development pr actices. Organizations ar e graded from level
1 to level 5 to mea sur e th e effectiveness of hu man resources development p ractices.
25. What is software test ing?
It is a critical element of software quality assurance and represents the ultimate review
of specification, design and code generation.
26. Who does th e softwar e testing?
During early stages of testing, a software engineer performs all tests. However, as the
testing process progresses, testing specialists may become involved.
8/7/2019 Placement Preparation S. Part Ha Sara Thy
54/151
S oftware Quality and S oftware Testing 37
27. What ar e the att ributes of a good test?
(a) A good test ha s a high probability of finding a n er ror.
(b) A good test is not redunda nt.
(c) A good test should be the best of breed .
(d)A good test should be neither too simple nor too complex.
28. What are BlackBox tes t ing an d WhiteBox test ing ?
Whitebox testing, sometimes called glassbox test ing is a test case design method
that uses the control structure of the procedural design to derive the test cases. Black
box testing, also called behavioral tes t ing , focuses on the functional requirements of
the software.
29. What is Basis path test ing?It is a whitebox testing technique first proposed by McCabe. It enables the test case
designer to derive a logical complexity measu re of a pr ocedur al design an d use t his mea sur e
as a guide for defining a basis set of execut ion pat hs.
30. How is basis path testing carried out?
Using repr esenta tions like flow graph , graph ma trix an d softwar e metr ics like cycloma tic
complexity an d cont rol structu re test ing.
31. What is control structure test ing ?
The control structure testing completely scans all the logical conditions, data flow and
loops thr ough condition test ing, data flow testing a nd loop testing.
32. What are Condition test ing an d Data f low test ing?
Condition test ing is a test case d esign meth od tha t exercises the logical conditions cont ained
in a program module. The data flow testing method selects test paths of a program
according to the locations of definitions and uses of variables in the program.
33. What is loop test ing?
It is a white-box testing technique that focuses exclusively on the validity of loop constructs.
Four different classes of loops can be defined simple loops, concatenated loops, nested
loops and u nst ru ctu red loops.
34. What is equivalence part it ioning?
It is a black-box testing met hod tha t divides the inpu t domain of a pr ogra m int o classes of
data from which test cases can be derived.
35. What is boundary value ana lys i s?Values tha t a re on th e boun dar y of equivalence classes ar e high field test cases. Example:
for (I=0;I
8/7/2019 Placement Preparation S. Part Ha Sara Thy
55/151
38 Placem ent Preparation
37. What are verif ication and val idation?
Verification r efers t o the set of activities th at ensu re t ha t software correctly implements
a specific function. Validation refers to a different set of activities that ensure that the
software that has been built is traceable to customer requirements.
38. What is the overall strat egy for software test ing?
Four t ypes of testing are condu cted to the softwar e product. Unit test ing begins first an d
concentrates on each unit of the software as implemented in source code. Then comes
integration testing, where focus is on design and the construction of the software
architecture. Next is validation testing, where requirements established as part of software
requirements analysis are validated against software. Finally comes the system testing
where the software and other system elements are tested as a whole.
39. When are we done with software testing?
There is n o definitive answer t o this question. We can never say t ha t t esting is over; the
burden simply shifts from the software engineer to the customer. Every time the user
executes the computer program, the program is being tested.
40. What are the two levels in integrat ion test ing ?
Top-down int egration an d bottom-up int egration.
41. What is regress ion test ing?
In the context of an integration test strategy regression testing is the re-execution of
some subset of tests that has already been conducted to ensure that changes have not
propagated un intended side effects.
42. What is smoke test ing?
It is an integrat ion t esting approach th at is commonly used when shrin k wra pped softwar e
products are being developed.
43. What is Alpha and Beta test ing?
The a lpha t est is condu cted at t he developers site by a customer. The beta test is condu cted
at one or more customer sites by the end-user of the software.
44. What is system test ing?
It is actually a series of different tests whose primary purpose is to fully exercise the
computer based system. Types of system tests include (1) Recovery testing (2) Security
testing (3) Str ess testing a nd (4) Perform an ce testing.
45. What is Debugging?Debugging is the process that results in the removal of the error. It is not testing but
always occurs as a consequence of testing.
46. What is Mutation test ing?
Mutation testing is required to ensure that the software does not fail. It is also a good
debugging mechan ism. After th e softwa re works corr ectly, mut at ion t esting can be done
to simulate wrong inputs.
8/7/2019 Placement Preparation S. Part Ha Sara Thy
56/151
S oftware Quality and S oftware Testing 39
47. What is WinRunner?
It is a very powerful automated testing tool for functional/regression testing. Using
WinRunner, we can record GUI operations. While recording, WinRunner automatically
creates a test script. This test script can be run automatically later on for carrying out
una ttended testing.
48. What is TS L?
Test Script Langu age (TSL) is a scripting lan guage with synta x similar to C langua ge.
There are four categories of TSL functions. They are:
(a) Analog funct ions (b) Cont ext sensitive fun ctions
(c) Customiza t ion funct ions (d) Standard functions
49. What are the features of the WinRunner application?(a) Syn ch ron iza tion of t est ca ses (b) Data dr iven test ing
(c) Rapid test ing (d) GUI check points
50. What is Data driven test ing?
Data driven testing simplifies the testing process as we can just generate one test case
with constants, and then replace these constants with variables. This type of testing is
very importa nt for most data base applications.
51. What is SilkTest?
To facilitate u na tten ded test ing, silktest h as a n in-built customizable recovery system. It
can be u sed for t esting a variety of applicat ions s uch a s VB, stand alone J AVA, websites,
databases, etc.
52. What are the components of Silktest?
It has two components that execute as separate processes: (a) Host softwa re (b) Agent
software. Host software is the component that is used to develop test plans and test
scripts. The agent softwa re is the component th at inter acts with t he GUI of our application.
53. What are the steps in silk test testing process?
(1) Creating a t est plan (2) Recording a test fra me (3) Creat ing test cases (4) Runn ing test
cases an d interpreting these results.
54. What is LoadRunner?
The Mercury In tera ctives LoadRunn er is u sed to test th e client/server applicat ions such
as database management systems and websi tes . Using LoadRunner , wi th minimal
infrastructure and manpower, performance testing can be carried out. LoadRunnersimulates multiple transactions from the same machine and hence it creates a scenario
of simu lta neous a ccess to th e app licat ion. H ence inst ead of rea l user s, virtu al user s ar e
simulated.
55. What is an Apache JMeter?
It is an open source testing t ool used to test t he performa nce of the applicat ion wh en it is
under heavy load. It can be used to test both static and non-static data. It puts a heavy
load on the server, tests the performance and analyzes the results when many users
access th e a pplicat ion simultan eously.
8/7/2019 Placement Preparation S. Part Ha Sara Thy
57/151
40 Placem ent Preparation
56. What is Test Director?
Test engineers need to study the requirem ents of the softwar e in detail. The requiremen ts
define wha t n eeds to be tested. H ence an SRS documen t gives the t esting objectives. The
TestDirector provides the features of linking the tests with the requirements. It can be
integrated with other tools such as WinRunner and LoadRunner. Hence, the test scripts
generated using these tools can be incorporated in the test plan.
57. List th e non-fun ctional requiremen t of a softwar e product.
Reliability, portability, usability, efficiency, delivery, time, and safety requirements etc.
58. What is open sou rce sof tware ?
It is a r evolutiona ry concept in softwar e developmen t. The sour ce code is freely distribu ted
by the author, and it can be redistributed without any license fee.
59. What is sof tware process?
The st ep-by-step p rocedur e to convert a p roblem definition in to a workin g softwa re pr oduct.
This procedure is divided into different sta ges such as r equirement s engineering design,
coding, testing and maintenance.
60. Does every software project need testing?
While all projects will benefit from testing, some projects may not require independent
test sta ff to succeed. The an swer depends on the size an d cont ext of th e project, th e risks,
th e developmen t m eth odology, the skill and experience of the developers, a nd oth er factors.
61. Why does softwa re h ave bugs?
Bugs a re norm ally found in softwar e becau se of softwa re complexity, program min g errors,
changing r equirement s a nd poor scheduling of software pr ojects.
62. What is a walkthrough?
A walkthrough is an informa l meeting for evalua tion or informa tional pur poses. Little
or no preparation is usually required.
63. What is an inspect ion?
An inspection is more formalized th an a walkthrough , typically with 3-8 people including
a moderator, a reader and a recorder to take notes.
64. What are the common problems in the software development process?
Poor requirem ents, un realistic schedule, inadequa te testin g, walkth roughs an d inspections.
65. What is good code ?
A good code is a code that works, is bug free and is readable and maintainable.
66. What makes a good software test engineer?
A good test en gineer ha s a test to break att itude, an ability to ta ke th e point of view of
the customer and a strong desire for quality.
67. What makes a good sof tware qual i ty assurance en gineer?
The same qualit ies a good tester has are useful for a quality assurance engineer.
Additionally, software quality assurance engineer must be able to understand the entire
8/7/2019 Placement Preparation S. Part Ha Sara Thy
58/151
S oftware Quality and S oftware Testing 41
softwar e development pr ocess an d how it can fit into the bu siness appr oach a nd goals ofth e organ izat ion.
68. What is a test plan?
A software pr oject test plan is a docum ent th at describes th e objectives, scope, appr oach
an d focus of a softwar e testin g effort. The pr ocess of prepar ing a t est plan is a u seful way
to th ink t hr ough th e efforts needed to validate t he a cceptability of a softwar e product.
69. What is a tes t case?
A test case is a document that describes an input, action, or event and an expected
response, to determine whether an application is working correctly.
70. How will you carryout softwar e test ing when you dont h ave enough t ime?
One way is to use risk analysis to determine where testing should be focused.
71. What is Extreme Programming?
Extreme Programming (XP) is a software development approach for small teams on
risk-prone projects with unstable requirements.
72. Will automated testing tools make testing easier?
For small projects, the time needed to learn and implement the automated testing tools
ma y not be wort hier un less the testing t eam is alrea dy fam iliar with t he tools. For lar ger
projects, or on-going long-term projects, these tools can be of high value.
73. Name some certif ications for software quality assurance and test engineers.
CSQE (Certified Softwar e Qua lity E ngineer) program, CSQA (Certified Software Quality
Analyst), CSTE (Certified Software Test Engineer) and CSPM (Cert ified S oftwa re Pr ojectManager) certifications, ISTQB (International Software Testing Qualifications Board)
certified tester .
8/7/2019 Placement Preparation S. Part Ha Sara Thy
59/151
42 Placem ent Preparation
5Data Structures an d
Algorithms
1. What is an algorithm?It is a ny well-defined compu tat iona l procedur e th at ta kes some value, or set of values, as
input and produces some value, or set of valu