| Q 1: | Statistical quality assurance involves |
| (1) | Using sampling in place of exhaustive testing of software |
| (2) | Surveying customers to find out their opinions about product quality |
| (3) | Tracing each defect to its underlying cause, isolating the "vital few" causes, and moving to correct them |
| (4) | Tracing each defect to its underlying causes and using the pareto principle to correct each problem found |
| Correct Answer: Tracing each defect to its underlying cause, isolating the "vital few" causes, and moving to correct them | |
| Q 2: |
In Digital Signature Schemes........... used for....................whereas.................is used for................... |
| (1) | Private Key, Encryption, Public Key, Decryption |
| (2) | Private Key, Decryption, Public Key, Encryption |
| (3) | DES, Encryption, DES, Decryption |
| (4) | None of the above |
| Correct Answer: Private Key, Encryption, Public Key, Decryption | |
| Q 3: |
In ASP.NET what does the following return <% Response.Write(System.Environment.WorkingSet. ToString())%> |
| (1) | Gives the memory working set |
| (2) | Return Null value |
| (3) | Gives Error |
| (4) | None of these |
| Correct Answer: Gives the memory working set | |
| Q 4: |
Immunity of the external schemas (or application programs) to changes in the conceptual schema is referred to as: |
| (1) | Physical Data Independence |
| (2) | Logical Data Independence |
| (3) | Both (a) and (b) |
| (4) | None of the above |
| Correct Answer: Logical Data Independence | |
| Q 5: |
The diagram that helps in understanding and representing user requirements for a software project using UML. (Unified Modeling Language) is |
| (1) | Deployment Diagram |
| (2) | Entity Relationship Diagram |
| (3) | Data Flow Diagram |
| (4) | Use Case Diagram |
| Correct Answer: Use Case Diagram | |
| Q 6: | The IEEE 802.11 wireless LANs use....................... types of frames |
| (1) | 4 |
| (2) | 6 |
| (3) | 5 |
| (4) | None of the above |
| Correct Answer: None of the above | |
| Q 7: | Which of the following service is supported by PGP (Pretty Good Privacy)? |
| (1) | Confidentiality |
| (2) | Compression |
| (3) | e-Mail Compatibility |
| (4) | All of the above |
| Correct Answer: All of the above | |
| Q 8: | If a relation with a Schema R is decomposed into two relations R1 and R2 such that (R1 R2) = R1 then which one of the following is to be satisfied for a lossless joint decomposition (→ indicates functional dependency) |
| (1) | a |
| (2) | b |
| (3) | c |
| (4) | d |
| Correct Answer: a | |
| Q 9: | Consider a schema R (A, B, C, D) and functional dependencies A B and C D. Then the decomposition R1 (A, B) and R2 (C, D) is |
| (1) | Dependency preserving but not lossless join |
| (2) | Dependency preserving and lossless join |
| (3) | Lossless join but not dependency preserving |
| (4) | Lossless join |
| Correct Answer: Dependency preserving but not lossless join | |
| Q 10: |
Which of the following are NOT considered when computing function points for a software project? NI: External inputs and outputs N2: Programming language to be used for the implementation N3: User interactions N4: External interfaces N5: Number of programmers in the software project N6 Files used by the system |
| (1) | N4, N6 |
| (2) | NI, N5 |
| (3) | N2, N3 |
| (4) | N2, N5 |
| Correct Answer: N2, N5 | |