Professional Documents
Culture Documents
Introduction C Programming Multiple Choi
Introduction C Programming Multiple Choi
Introduction C Programming Multiple Choi
INTERNAL ASSESSMENT –I
Dear Student Read The All Questions Carefully. Attempt All Questions. Even Question Has 2 Mark.
1. The Onshore Software Outsourcing and Offshore Software Outsourcing are the ___ for software outsourcing?
A. Models
B. Systems
C. Schemes
D. None of these
Answer: A) Models
2. The BPO sector will provide ________ jobs at the end of 2011 and make a contribution of ____% of GDP.
A. 15,000 & 5%
B. 20,000 & 6%
C. 29000 & 5%
D. 15,000 & 8%
Ans: B
3. From the truth table below, determine the standard SOP expression.
A.
B.
C.
D.
Answer: Option D
4. A class D is derived from a class B, b is an object of class B, d is an object of class D, and pb is a pointer to class B
object. Which of the following assignment statement is not valid?
a. d = d;
b. b = d;
c. d = b;
d. *pb = d:
Answer: (c) d = b;
int main()
{
int a=10, b=20;
printf("a=%d b=%d",a,b);
a=a+b;
b=a-b;
a=a-b;
printf("a=%d b=%d",a,b);
return 0;
}
a. a = 20, b = 20
b. a = 10, b = 20
c. a = 20, b = 10
d. a = 10, b = 10
Answer: (c) a = 20, b = 10
a. -3.4e38 to 3.4e38
b. -32767 to 32768
c. -32668 to 32667
d. -32768 to 32767
[B] algorithm
[C] assembler
[D] class
Answer:OptionB
8. Derive the Boolean expression for the logic circuit shown below:
A.
B.
C.
D.
Answer: Option A
[C] Flowchart
Answer: Option C
Ans D
11. Procedural programming method is followed in
[A] C
[B] COBOL
[C] Cobra
Answer: Option D
[A] Function
[B] Class
Answer: Option C
13:- Stages in the Growth Life Cycle in the BPO Sector can be categorized as:
A. Stage 1: Start Up > Stage 2: Value Addition > Stage 3: Competence Accumulation > Stage 4: Third Party Service
B. Stage 1: Third Party Service > Stage 2: Value Addition > Stage 3: Competence Accumulation > Stage 4: Start Up
C. Stage 1: Start Up > Stage 2: Value Addition > Stage 3: Third Party Service > Stage 4: Competence Accumulation
D. Stage 1: Start Up > Stage 2: Competence Accumulation > Stage 3: Third Party Service > Stage 4: Value Addition
Ans: A
[A] Start/Stop
[B] Looping
[C] Processing
& Explanation
Answer: Option C
15:- which one of the following is a TRUE statement about Near-Shore Outsourcing characteristics
A. Use of providers in one's home country or region, typically a high skill, high cost country.
B. Use of providers in a different country or region, but with similar time-zone, culture or language skills.
C. Use of providers in a distant location with a different time-zone, culture or language skills.
D. All of the above
Ans: B
[A] Input/Output
[B] Terminator
[C] Decision
[D] Looping
Answer: Option B
17. Outsourcing software development allows ___ to address the various challenges of reducing overheads.
A. Business organizations
B. System development
C. Communication
D. None of the mentioned above
[A] Input/Output
[C] Looping
[D] Decision
19. The geometrical figure shown below in flowchart represent
[A] Connector
[C] Looping
[D] Data
Answer: Option A
20. Which of the following statement / statements is / are best suited for Onshore Software Outsourcing.
A. An act of customer companies working with development teams of software companies that are located in the same
country.
B. Makes communication easier
C. Making outsourcing more effective
D. All of the mentioned above
1. 1
2. A
3. A+ AB
4. AB
Answer: A
[A] Input/Output
[B] Looping
[C] Display
Answer:Option
[A] pseducode
[B] algorithm
[C] assembler
[D] class
Answer: Option B
[C] Flowchart
[D] None of the above
Answer: Option C
[A] C
[B] COBOL
[C] Cobra
Answer: Option D
[A] Function
[B] Class
Answer: Option C
30. The problem statement includes the ____________, which lists specific input numbers a program would typically
expect the user to enter and precise output values that a perfect program would return for those input values.
A. testing plan
B. error handler
C. IPO cycle
D. input-output specification
Answer: A
1) X+Y+Z
2) XY + YZ
3) X + YZ
4) XZ + Y
Answer: 3 X + YZ
32 . How many steps are in the systems development life cycle (SDLC)?
A. 4
B. 5
C. 6
D. 10
Answer: C
A. Table
B. Row
C. Database
D. Column
Answer: C) Database
34. The first step in the systems development life cycle (SDLC) is:
A. Analysis.
B. Design.
C. Problem/Opportunity Identification.
D. Development and Documentation.
Answer: C
35. Most modern software applications enable you to customize and automate various features using small custom-
built “miniprograms” called:
A. macros.
B. code.
C. routines.
D. subroutines.
Answer: A
A. MySQL
B. Oracle
C. Both A. and B.
D. None of the above
Explanation:
A. It can be used to create, modify and remove the definition that defines the data's organization.
B. It can be used to insert, modify and delete the actual data.
C. It can be used to retrieve the data that are used for different purposes by various applications.
D. It can be used to register and monitor users.
Answer: A) It can be used to create, modify and remove the definition that defines the data's organization
Explanation:
Data Definition can be used to create, modify and remove the definition that defines the data’s organization.
39. What is termed to be used to insert, modify and delete the actual data?
A. User Administration
B. Data Definition
C. Data Updation
D. Data Retrieval
40. Project ___ is a method in which a client hands over complete control of the product to a vendor?
A. System development
B. Outsourcing
C. Offshore
D. None of these
Answer: B) Outsourcing
41. Which of the following statement is best suited for Outsourcing Information Systems?
A+\bar{A}B=A+BA+AˉB=A+B
A+AB=BA+AB=B
(A+B)(A+C)=A+BC(A+B)(A+C)=A+BC
(A+\bar{B})(A+B)=A(A+Bˉ)(A+B)=A
Answer: A+AB=BA+AB=B
43. A qualified software outsourcing vendor carries out the ___ services.
A. Package
B. Working
C. Programming
D. None of these
Answer: C) Programming
13
97. What is the control character for
"a decimal integer".
a) %c
b) %d
c) %i
d) %p
Ans: b
Answer: Option D
13
97. What is the control character for "a decimal integer".
a) %c
b) %d
c) %i
d) %p
Ans: b
98. What is the control character for "a floating point number".
a) %c
b) %d
c) %i
d) %f
Ans: d
99. C supports the ______ statement to branch unconditionally from one point to another in the program.
a) continue
b) goto
c) break
d) for
Ans: b
45. What is termed to maintain the data integrity and enforcing the data security?
A. User Address
B. User Retrieval
C. User Annotation
D. User Administration
46. _____ Speed of the data processor and ______memory size is the requirement to run the software of DBMS.
A. Low, Small
B. Low, Large
C. High, Small
D. High, Large
47 . Which of the following operations can be performed on the file “NOTES.TXT” using the below code?
FILE *fp;
fp = fopen(“NOTES.TXT”, “r+”);
A. Reading
B. Writing
C. Appending
D. Read and Write
Answer: Option D
1) Commutative
2) Associative
3) Distributive
4) Idempotence
Answer: Commutative
1) Commutative
2) Associative
3) Distributive
4) Idempotence
Answer: Associative
50. Which statement will you add in the following program to work it correctly?
#include<stdio.h>
int main()
{
printf(“%f\n”, log(36.0));
return 0;
}
A. #include<conio.h>
B. #include<math.h>
C. #include<stdlib.h>
D. #include<dos.h>
Answer: Option B