q1) choose the correct answeruotechnology.edu.iq/dep-cs/mypdf/highstudy/1415/q/sw.pdf1 q1) choose...
TRANSCRIPT
1
Q1) choose the correct answer: 1-High level languages like C, Fortran are also known as ---------------
A- Procedural languages
B- Object oriented language
C- Form based language
D- Both a and b
2- One of the basic concepts in Object Oriented Programming approach is bundling both data
and functions into one unit known as ------------.
A- Simple variable
B- Object
C- bundle
D- Both a and b
3- Which of the following shows the Operator overloading feature in C++ in ---------------.
A- Polymorphism
B- Inheritance
C- Message passing
D- Both a and b
4-One of the alternative to nested if is the -------------
A- Break statement
B- Jump statement
C- Switch statement
D- Both a and b
5-In switch case statement, every case should have a ------------ statement as the last statement
A- Jump
B- Break
C- Exit
D- Both a and b
6-Conditional operator (?:) is a handy operator which acts like a shortcut for ----------
A- If else statement
B- Switch statement
C- Break statement
D- Goto statement
7-Arrays are----------- data types.
A- Primitive
B- Non-primitive
C- User defined
D- Both b and c
2
8-In two dimensional arrays, elements can be accessed by ----------- indexes.
A- One
B- Four
C- Three
D- Two
Q2/ By using object oriented program, write complete program for all operation
(push, pop empty) for stack principle.
3
Q3) Choose the correct answer: 1. Website is a collection of:
a. Web server
b. Web pages
c. Web browser
d. Www
2. Linux is a web browser:
a. Text based
b. Graphical based
c. Both a & b
d. None of these
3. To create and view an html document, which tools are used:
a. Text editor
b. Web browser
c. Both a and b
d. None of these
4. The first anchor element is specified with which attribute:
a. Name
b. Wfhy
c. Abfg
d. Href
5. Web publishing means:
a. Collecting the web pages
b. Publishing the web pages
c. Storing the web pages
d. None of these
6. JavaScript is used for:
a. Client-side applications
b. Data validation
c. Creating interactive forms
d. All of these
7. The sequence of methods invoked automatically when an applet is loaded till it is
destroyed is:
a. init(), paint(),start(),stop(),destroy()
b. start(),init(),paint(),stop(),destroy()
c. star(),paint(),init(),destroy(),stop()
d. init(),start(),paint(),stop(),destroy()
4
Q4) Write a program (in any web programming language) build a web page
enable the user to do the editor operations (add, delete, save, and
update).
5
Q5) Choose the correct answer:
1-
(a) e -3lnx =3x, (b) e -3lnx =3
1
x, (c) e -3lnx =
x3
1 .
2- If f(x) is Fourier cosine Half-range series this function defined as:-
(a) f(x)= a0 +
1n
(an cos
n x+ bn
nsin x),
(b) f(x)= a0 +
1n
( bn
nsin x),
(c) f(x)= a0 +
1n
(an cos
n x),
Where T is period function on interval – T < x < T.
3- The solution of following differential equation [ y˝ +4y = 0] is………
(a) y= c1 cos4x + c2 sin4x,
(b) y= c1 cosx + c2 sinx,
(c) y= c1 cos2x + c2 sin2x.
4- The solution of following differential equation [ y΄= 1] is………
cxyccx
ybcxya 22
),2
),)
5- f(x) is even function if defined as:
(1) f (-x) = -f(x), (2) f(x) = f (-x), ( 3) -f (x) = f(x),
6- If [3
1)(
ssf ], the inverse of Laplace transformation [f (t) = }
1{
3
1
sL ] is……
2),6),)
234 t
ctbta
7- If [W = f(x, y, z)]. Then the total differential of this function is defined as:
(a) dw =x
f
x
w
+ y
f
y
w
+z
f
z
w
, (b) dw =wx
f
+ wy
f
+wz
f
,
(c) dw = x
f
dx + y
f
dy + z
f
dz.
6
8- 29
1
x
dx is …………. ………
,3cos),)3
(sin),)9
(sin) 111 cxccx
bcx
a
Q 6 ) If [f (t) = iwte ]. Then find Laplace transformation [f(s) = L { iwt
e }]
7
Q7) Choose the correct answer:
1- ------------ takes both source program and input data and produce output data.
a- Translator
b- Compiler
c- Assembler
d- Interpreter
2- A lexical analyzer is called in some times--------- .
a- Scanner
b- syntax analyzer
c- Parser
d- intermediate code generator
3- bottom-up parser produces a parse tree for a given input string by starting
with --------------.
a- start symbol in the grammar
b- terminals of the given string
c- randomly
d- none of these
4- Ambiguity in syntax analysis means-----------.
a- more tokens
b- more parse trees
c- more types
d- more errors
5- The final phase of the compiler is to ----------- for a specific machine.
a- optimize code
b- generate code
c- analyze code
d- store code
6- Consider the grammar:S B x| y C | B C z S C x B.Then the
FIRST(S) is----------------.
a- {y}
b- x, y}
c- {y, z}
d- {x, y, z}
8
7- Consider the grammar: S B x | y C | B C z S C x B. Then the
FOLLOW(S) is----------------
a- {y}
b- {y, z}
c- { z}
d- {x, z}
Q8) Explain Loop Optimization with examples.
9
Q9) Choose the correct answer:
1. …………….. is one color space, which describe color as perceived by human
being :
a. RGB color space.
b. HSL color space.
c. PCT color space.
d. None of the above
2. One of the below edge detection mask is called "compass" mask .
a. Sobel edge detector.
b. Perwitt edge detector.
c. Kirch edge detector.
d. Canny edge detector.
3. To remove Salt type noise from an image , we have to use ……… filter.
a. Mean filter.
b. Median filter.
c. Min filter.
d. Max filter.
4. The first order hold method is used to enlarge ( N × N ) image to the size of
………….
a. ( N - 1 ) × ( N - 1 ).
b. ( 2 N - 1 ) × ( 2 N - 1 ).
c. ( N + 1 ) × ( N + 1 ).
d. ( 2 N + 1 ) × ( 2 N + 1 ).
5. ………… is a technique where the histogram of the resultant image is as flat
as possible.
a. Histogram equalization.
b. Histogram modification.
c. Image restoration.
d. Image geometry.
6. ………… is the most efficient edge detector.
a. Sobel edge detector.
b. Perwitt edge detector.
c. kirch edge detector.
d. Canny edge detector.
01
7. In region growing segmentation technique, a pixel is added to a region if and
only if it satisfy the condition …………..
a. It has not been assigned to any other regions.
b. It is a neighbor of that region.
c. The new region created by addition of this pixel is still uniform.
d. All the above.
8. When using region growing segmentation technique image pixels whose
intensity corresponds to ……………. Can be used as a seed.
a. First element of a look-up table.
b. Histogram peak.
c. Largest gray level value.
d. None of the above.
Q10) Identify the steps that are required to enlarge ( N × N ) image by factor of K .
11
Q11) Choose the correct answer:
1. The average time required to reach a storage location in memory and obtain its contents is
called the ------------.
A. seek time
B. turnaround time
C. access time
D. transfer time
2. Which of the following is lowest in memory hierarchy?
A. Cache memory
B. Secondary memory
C. Registers
D. RAM
3. ----------------, Write Through technique is used in which memory for updating the data
A. Virtual memory
B. Main memory
C. Auxiliary memory
D. Cache memory
4. In a program using subroutine call instruction, it is necessary ---------------
A. Initialize program counter
B. Clear the accumulator
C. Reset the microprocessor
D. Clear the instruction register
5. Cache memory works on the principle of --------------.
A. Locality of data
B. Locality of memory
C. Locality of reference
D. Locality of reference & memory
6. -----------------register keeps tracks of the instructions stored in program stored in memory.
A. AR (Address Register)
B. XR (Index Register)
C. PC (Program Counter)
D. AC (Accumulator)
7. The BSA instruction is ---------------.
A. Branch and store accumulator
B. Branch and save return address
C. Branch and shift address
D. Branch and show accumulator
12
Q12) What is the difference between isolated mapped input/output and memory
mapped input/output.
31
Q13) choose the correct answer:
1. Which one of the following is not a real time operating system?
a) VxWorks
b) Windows CE
c) RTLinux
d) Palm OS
2. What is a long-term scheduler ?
a) It selects which process has to be brought into the ready queue
b) It selects which process has to be executed next and allocates CPU
c) It selects which process to remove from memory by swapping
d) None of these
3. Those processes should be aborted on occurrence of a deadlock, the
termination of which ------------.
a) is more time consuming
b) incurs minimum cost
c) safety is not hampered
d) All of these
4. The interval from the time of submission of a process to the time of
completion is termed as -------------.
a) waiting time
b) turnaround time
c) response time
d) throughput
5. Process are classified into different groups in -------------.
a) shortest job scheduling algorithm
b) round robin scheduling algorithm
c) priority scheduling algorithm
d) multilevel queue scheduling algorithm
6. External fragmentation will not occur when -------------.
a) first fit is used
b) best fit is used
c) worst fit is used
d) no matter which algorithm is used, it will always occur
7. The operating system maintains a ----------- table that keeps track of how many
frames have been allocated, how many are there, and how many are available.
a) page
b) mapping
c) frame
d) memory
31
8. What is common problem found in distributed operatingsystem?
a) Process Synchronization
b) Communication synchronization
c) Deadlock problem
d) Power failure
Q14) What are the CPU Scheduling benefits? List its algorithms with brief explain.
51
Q15) choose the correct answer:
1- __________ enhances performance and functionality of the software after delivery.
A. re-designs
B. Re-engineering
C. Maintenance
D. Post checking
2- Traditionally, the phase of software development where a formal approach used is ----.
A. Programming
B. Design
C. Requirements
D. Planning
3- Black box testing is also called -----------.
A. Specification-based testing
B. Structural testing
C. Verification
D. Unit testing
4- During software development which factor is most crucial -----------.
A. People
B. Process
C. Product
D. project
5- Which of these truly defines software design --------------.
A. Software design is an activity subjected to constraints
B. Software Design specifies nature and composition of software product
C. Software Design satisfies client needs and desires
D. All of the mentioned
6- Software Engineering approach is used to achieve -----------.
A. Better performance of hardware
B. Error free software
C. Reusable software
D. Quality software product
7- RAD stands for
A. Rapid Application Development
B. Relative Application Development
C. Ready Application Development
D. Repeated Application Development
51
Q16) How does the risk factor affect the spiral model of software development?