Introduction C Programming Multiple Choi

You might also like

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 15

AISECT SKILL MISSION PMKK, SALEM, TAMILNADU.

C-DAC (SOFTWARE DEVELOPER)

INTERNAL ASSESSMENT –I

Student Name……………………… Time: 50 Min.

Roll No……………………………… Mark: 100.

Dear Student Read The All Questions Carefully. Attempt All Questions. Even Question Has 2 Mark.

1. The Onshore Software Outsourcing and Offshore Software Outsourcing are the ___ for software outsourcing?

A. Models
B. Systems
C. Schemes
D. None of these

Answer: A) Models

2. The BPO sector will provide ________ jobs at the end of 2011 and make a contribution of ____% of GDP.
   A.   15,000 & 5%
   B.  20,000 & 6%
   C.  29000 & 5%
   D.  15,000 & 8%
Ans: B

3. From the truth table below, determine the standard SOP expression.

A.

B.

C.
D.
Answer: Option D

4. A class D is derived from a class B, b is an object of class B, d is an object of class D, and pb is a pointer to class B
object. Which of the following assignment statement is not valid?

a. d = d;
b. b = d;
c. d = b;
d. *pb = d:

Answer: (c) d = b;

5. What will be the output of this program?

int main()
{
int a=10, b=20;
printf("a=%d b=%d",a,b);
a=a+b;
b=a-b;
a=a-b;
printf("a=%d b=%d",a,b);
return 0;
}
a. a = 20, b = 20
b. a = 10, b = 20
c. a = 20, b = 10
d. a = 10, b = 10

Answer: (c) a = 20, b = 10

6. What is the 16-bit compiler allowable range for integer constants?

a. -3.4e38 to 3.4e38
b. -32767 to 32768
c. -32668 to 32667
d. -32768 to 32767

Answer: (d) -32768 to 32767

7. Step by step instructions written to solve any problem is called


[A] pseducode

[B] algorithm

[C] assembler

[D] class

Answer & Explanation

Answer:OptionB

8. Derive the Boolean expression for the logic circuit shown below:

A.

B.

C.

D.
Answer: Option A

9. Diagrammatic or symbolic representation of an algorithm is called

[A] Data-Flow diagram

[B] E-R diagram

[C] Flowchart

[D] None of the above

Answer & Explanation

Answer: Option C

10. Object oriented programming method is followed in

[A] C programming language

[B] C++ programming language

[C] C# programming language


[D] Both [B] and [C]

Ans D
11. Procedural programming method is followed in

[A] C

[B] COBOL

[C] Cobra

[D] All of the above

Answer & Explanation

Answer: Option D

12. Informal high level description of an algorithm in English is called

[A] Function

[B] Class

[C] Pseudo code

[D] none of the above

Answer: Option C

13:- Stages in the Growth Life Cycle in the BPO Sector can be categorized as:
   A.   Stage 1: Start Up > Stage 2: Value Addition > Stage 3: Competence Accumulation > Stage 4: Third Party Service
   B.  Stage 1: Third Party Service > Stage 2: Value Addition > Stage 3: Competence Accumulation > Stage 4: Start Up
   C.  Stage 1: Start Up > Stage 2: Value Addition > Stage 3: Third Party Service > Stage 4: Competence Accumulation
   D.  Stage 1: Start Up > Stage 2: Competence Accumulation > Stage 3: Third Party Service > Stage 4: Value Addition

Ans: A

14. The geometrical figure shown below in flowchart represents

[A] Start/Stop

[B] Looping

[C] Processing

[D] Connector Answer

& Explanation

Answer: Option C
15:- which one of the following is a TRUE statement about Near-Shore Outsourcing characteristics
   A.   Use of providers in one's home country or region, typically a high skill, high cost country.
   B.  Use of providers in a different country or region, but with similar time-zone, culture or language skills.
   C.  Use of providers in a distant location with a different time-zone, culture or language skills.
   D.  All of the above
Ans: B

16. The geometrical figure shown below in flowchart represents

[A] Input/Output

[B] Terminator

[C] Decision

[D] Looping

Answer & Explanation

Answer: Option B

17. Outsourcing software development allows ___ to address the various challenges of reducing overheads.

A. Business organizations
B. System development
C. Communication
D. None of the mentioned above

Answer: A) Business organizations

18. The geometrical figure shown below in flowchart represent

[A] Input/Output

[B] Alternate process

[C] Looping

[D] Decision
19. The geometrical figure shown below in flowchart represent

[A] Connector

[B] Alternate process

[C] Looping

[D] Data

Answer & Explanation

Answer: Option A

20. Which of the following statement / statements is / are best suited for Onshore Software Outsourcing.
A. An act of customer companies working with development teams of software companies that are located in the same
country.
B. Makes communication easier
C. Making outsourcing more effective
D. All of the mentioned above

Answer: C) Making outsourcing more effective

21. Q.1. A + AB + ABC + ABCD + ABCDE + …… =

1. 1 
2. A
3. A+ AB
4. AB   

Answer: A

22. The geometrical figure shown below in flowchart represent

[A] Input/Output

[B] Looping

[C] Display

[D] Alternate process

Answer & Explanation

Answer:Option

23. Step by step instructions written to solve any problem is called

[A] pseducode

[B] algorithm

[C] assembler

[D] class

Answer & Explanation

Answer: Option B

24. Diagrammatic or symbolic representation of an algorithm is called

[A] Data-Flow diagram

[B] E-R diagram

[C] Flowchart
[D] None of the above

Answer & Explanation

Answer: Option C

25. Object oriented programming method is followed in

[A] C programming language

[B] C++ programming language

[C] C# programming language

[D] Both [B] and [C]


26. Procedural programming method is followed in

[A] C

[B] COBOL

[C] Cobra

[D] All of the above

Answer & Explanation

Answer: Option D

27. Informal high level description of an algorithm in English is called

[A] Function

[B] Class

[C] Pseudo code

[D] none of the above

Answer & Explanation

Answer: Option C

28. Which of the following expressions is in the sum-of-products (SOP) form?


A
(A + B)(C + D)
.
B. (A)B(CD)
C. AB(CD)
D
AB + CD
.
Answer: Option D
29. What are the factors which have an impact when deciding on a BPO destination?
   A.   Reliable telecommunications infrastructure
   B.  Cost of labour
   C.  Strong regulatory framework
   D.  All of the above
Ans: D

30. The problem statement includes the ____________, which lists specific input numbers a program would typically
expect the user to enter and precise output values that a perfect program would return for those input values.
A. testing plan
B. error handler
C. IPO cycle
D. input-output specification
Answer: A

31. The simplified form of the Boolean expression (X + Y + XY)(X + Z) is

1) X+Y+Z
2) XY + YZ
3) X + YZ
4) XZ + Y

Answer: 3 X + YZ

32 . How many steps are in the systems development life cycle (SDLC)?
A. 4
B. 5
C. 6
D. 10
Answer: C

33. To manage the __________, Database Management System is used.

A. Table
B. Row
C. Database
D. Column

Answer: C) Database

34. The first step in the systems development life cycle (SDLC) is:
A. Analysis.
B. Design.
C. Problem/Opportunity Identification.
D. Development and Documentation.

Answer: C

35. Most modern software applications enable you to customize and automate various features using small custom-
built “miniprograms” called:
A. macros.
B. code.
C. routines.
D. subroutines.
Answer: A

36. Which of the following is a very popular commercial database?

A. MySQL
B. Oracle
C. Both A. and B.
D. None of the above

Answer: C) Both A. and B.

37. Outsourcing staffing means -

A. Hiring of employees resources


B. Hiring of employees resources internally
C. Hiring of employees resources externally
D. None of the above mentioned

Answer: C) Hiring of employees resources externally

Explanation:

38. What is TRUE about Data Definition?

A. It can be used to create, modify and remove the definition that defines the data's organization.
B. It can be used to insert, modify and delete the actual data.
C. It can be used to retrieve the data that are used for different purposes by various applications.
D. It can be used to register and monitor users.

Answer: A) It can be used to create, modify and remove the definition that defines the data's organization

Explanation:

Data Definition can be used to create, modify and remove the definition that defines the data’s organization.

39. What is termed to be used to insert, modify and delete the actual data?

A. User Administration
B. Data Definition
C. Data Updation
D. Data Retrieval

Answer: D) Data Retrieval

40. Project ___ is a method in which a client hands over complete control of the product to a vendor?

A. System development
B. Outsourcing
C. Offshore
D. None of these

Answer: B) Outsourcing

41. Which of the following statement is best suited for Outsourcing Information Systems?

A. Data storing to a third-party vendor


B. Reduce data storage costs
C. Ensure data security
D. All of the mentioned above

Answer: D) All of the mentioned above

42. Which of the following Boolean algebraic expressions is incorrect?

A+\bar{A}B=A+BA+AˉB=A+B

A+AB=BA+AB=B

(A+B)(A+C)=A+BC(A+B)(A+C)=A+BC

(A+\bar{B})(A+B)=A(A+Bˉ)(A+B)=A

Answer: A+AB=BA+AB=B

43. A qualified software outsourcing vendor carries out the ___ services.

A. Package
B. Working
C. Programming
D. None of these

Answer: C) Programming
13
97. What is the control character for
"a decimal integer".
a) %c
b) %d
c) %i
d) %p
Ans: b

98. What is the control character for


"a floating point number".
a) %c
b) %d
c) %i
d) %f
Ans: d
99. C supports the ______ statement
to branch unconditionally from one
point to another in the program.
a) continue
b) goto
c) break
d) for
Ans: b
96. What is the control character for
"a single character".
a) %c b) %d
c) %i d) %p
Ans: a
96. What is the control character for
"a single character".
a) %c b) %d
c) %i d) %p
Ans: a
44. What will be printed after execution of the following program code?
main ()
{
printf(“\\nab”);
printf(“\\bsi”);
printf(“\\rha”);
}
A. absiha
B. asiha
C. haasi
D. hai

Answer: Option D

13
97. What is the control character for "a decimal integer".
a) %c
b) %d
c) %i
d) %p
Ans: b

98. What is the control character for "a floating point number".
a) %c
b) %d
c) %i
d) %f
Ans: d

99. C supports the ______ statement to branch unconditionally from one point to another in the program.
a) continue
b) goto
c) break
d) for
Ans: b

45. What is termed to maintain the data integrity and enforcing the data security?

A. User Address
B. User Retrieval
C. User Annotation
D. User Administration

Answer: D) User Administration

46. _____ Speed of the data processor and ______memory size is the requirement to run the software of DBMS.
A. Low, Small
B. Low, Large
C. High, Small
D. High, Large

Answer: D) High, Large

47 . Which of the following operations can be performed on the file “NOTES.TXT” using the below code?
FILE *fp;
fp = fopen(“NOTES.TXT”, “r+”);
A. Reading
B. Writing
C. Appending
D. Read and Write

Answer: Option D

48. A + B = B + A; AB = BA represent which laws?

1) Commutative
2) Associative
3) Distributive
4) Idempotence

Answer: Commutative

49. (A + B) + C = A + (B + C); (AB)C = A(BC) represent which laws?

1) Commutative
2) Associative
3) Distributive
4) Idempotence  

Answer: Associative

50. Which statement will you add in the following program to work it correctly?
#include<stdio.h>
int main()
{
printf(“%f\n”, log(36.0));
return 0;
}
A. #include<conio.h>
B. #include<math.h>
C. #include<stdlib.h>
D. #include<dos.h>

Answer: Option B

You might also like