in/studytube/Software-Engineering-MCQ-with-answers/32fa665e-dd31-4709-bce9-
8b7851aa915d_p#
https://www.scribd.com/doc/144118425/Software-Engineering-Solved-Mcqs
logic
x'y’+y =x'+y
A+A’B=A+B
The CPU utilization =1- pn
Avg MA=h*hit+(1-h) miss
Assume N segments in memory and a page size of P bytes. The wastage on account of
internal fragmentation is NP/2 bytes.
Number of spanning trees in a complete graph with n vertices is n (n-2).
A grammar is LL(1) if it is possible to choose the next production by looking at only the next
token in the input string.
Formally, grammar G is LL(1) if and only if
First(A) ∩ Follow(A) = ∅
Full binary tree = strictly binary tree =if each node in the tree is either a leaf node or has exactly
two children.
Slotted aloha
Pure aloha
RFE (Return From Exception) is a privileged trap instruction that is executed when exception
occurs, so an exception is not allowed to execute.
If record are accessed for a particular value from table, hashing will do better. If records are
accessed in a range of values, ordered indexing will perform
Binary Trees
nodes.
The base case is t(0) = 1 and t(1) = 1, i.e. there is one empty BST and there is one BST with one
node.
a binary tree T is if each node is either a leaf or possesses exactly two child nodes.
a binary tree T with n levels is complete if all levels except possibly the last are completely full, and the last level has
all its nodes to the left side.
For an n-ary tree where each node has n children or no children, following
relation holds
L = (n-1)*I + 1
The height of a Max Heap is Θ(logn). If we perform binary search for finding the
correct position then we need to do Θ(LogLogn) comparisons.
Let order of leaf be m. A leaf node in B+ tree contains at most m record pointers, at most m
values, and one disk block pointer. r*m + V*m + p <= 1024 16m <= 1018 m =< 63
Bandwidth = 128kbps
= Propagation time /
transmission time
= n/(1+80/2)
A shift-reduce parser arries out the actions specified within braces immediately after reducing with the
corresponding rule of the grammar.
SxxW[print“1”]
Sy[print“2”]
WS2[print“3”], what is the translation of “x x x x y z z”?
(A) 1 1 2 3 1
(B) 1 1 2 3 3
(C) 2 3 1 3 1
(D) 2 3 3 2 1
Answer: C
Answer: B
Clearly this formula is satisfiable as there are 7 assignments for which it is true.
NDPDA can handle languages or grammars with ambiguity, but DPDA cannot
handle languages with ambiguity and any context-free grammar.
hreads share address space of Process. Virtually memory is concerned with processes not
with Threads. A thread is a basic unit of CPU utilization, consisting of a program counter, a
stack, and a set of registers, (and a thread ID.) As you can see, for a single thread of control -
there is one program counter, and one sequence of instructions that can be carried out at any
given time and for multi-threaded applications-there are multiple threads within a single
process, each having their own program counter, stack and set of registers, but sharing
common code, data, and certain structures such as open files.
An organization has a class B network and wishes to form subnets for 64
departments. The subnet mask would be:
(a) 255.255.0.0
(b) 255.255.64.0
(c) 255.255.128.0
(d) 255.255.252.0
Answer (d)
The size of network ID is 16 bit in class B networks. So bits after 16th bit must
be used to create 64 departments. Total 6 bits are needed to identify 64
different departments. Therefore, subnet mask will be 255.255.252.0.
Match
the following:
Codes:
a b c d
(A) iii ii i iv
(B) i iv iii ii
(C) iii iv i ii
(D) i ii iii iv
Answer: C
Are we building the right product?
(A) Verification
(B) Validation
(C) Testing
Answer: B
A. 135
B. 722
C. 675
D. 672
22 30 46
(A) O(nm)
(B) O(nm)
(C) O(nmn)
(D) O(nmmn)
Answer: C
(B) Cyclometric complexity for a flow graph G is V(G) = N–E+2, where E is the number of edges and N is the
number of nodes in the flow graph.
(C) Cyclometric complexity for a flow graph G is V(G) = E–N+2, where E is the number of edges & N is the
number of nodes in the flow graph.
(D) Cyclometric complexity for a flow graph G is V(G) = P + 1, where P is the number of predicate nodes
contained in the flow graph G.
https://www.tutorialspoint.com/digital_electronics/hamming_code_example_with_oddparity.asp
http://users.cis.fiu.edu/~downeyt/cop3402/hamming.html
▪ Sites are static. They might contain useful information, but there's no reason for a visitor to return to the site
later.
▪The writing and participating web (User-generated content) ▪ New applications may allow every users to interact and
collaborate with each other in a social media dialogue as creators of content
▪ Social Web
Web 3.0
▪ Artificial intelligence
▪ Personalization
▪ Mobility
▪ Semantic Web
Web 4.0
▪ Recognize you when you get in front of it because all of your devices are getting a little camera
▪ The entire web being a single operating system where information flows from any one point to any other
▪ Cloud ≈ multiple hardware machines combine their computing power and resources
▪ Public clouds
▪ Publicly in Internet
▪ Amazon AWS, Google App Engine, Microsoft Azure, Rackspace, AppFog, Heroku, AppHarbor,
A port number is used to distinguish between the individual networking applications that are running simultaneously
above the TCP/IP protocol stack
• Port numbers for standard TCP/IP services may be referred to as well-known port numbers
– 23 Telnet
Port Number
--- Description
1 TCP Port Service Multiplexer (TCPMUX)
7 ECHO
20 FTP -- Data
21 FTP -- Control
23 Telnet
29 MSG ICP
37 Time
43 WhoIs
70 Gopher Services
79 Finger
80 HTTP
109 POP2
110 POP3
161 SNMP
443 HTTPS
445 Microsoft-DS
563 SNEWS
569 MSN
1080 Socks
Application layer
BGP DHCP DNS FTP HTTP IMAP LDAP MGCP MQTT NNTP NTP POP ONC/RPC RTP RTSP RIP SIP SMTP SNMP SSH Telnet
TLS/SSL XMPP more...
Transport layer
Internet layer
Link layer
ARP NDP OSPF Tunnels L2TP PPP MAC Ethernet DSL ISDN FDDI more...
However, when GET is used, the submitted form data will be visible in the page
address field:
/action_page.php?firstname=Mickey&lastname=Mouse
Notes on GET:
Never use GET to send sensitive data! (will be visible in the URL)
Useful for form submissions where a user want to bookmark the result
Notes on POST:
POST has no size limitations, and can be used to send large amounts of data.
where s is the given message and e and n represent the public key integer pair. In the above
question, the plain text M = 5. Plain text needs to be encrypted using the above formula.
=53(mod 33)
= 125 (mod 33)
= 26
As a result, the encrypted message E(s) = 26.
Closed Under RE DCFL CFL CSL RE RE
G C
Union ᴗ Y N Y Y Y Y
Intersection ᴖ Y N N Y Y Y
Complement ' Y Y N Y Y N
Difference - Y N N Y Y N
Reverse R Y Y Y Y Y Y
Regular Intersection Y Y Y Y Y Y
Concatenation . * + λ Y N Y Y Y Y
Homomorphism Y N Y N N Y
Inverse Homomorphism Y Y Y Y Y Y
Right Quotient with a Regular language Y Y Y N Y
Left Quotient with a Regular language Y Y Y N Y
UID.H CID H H CD
Reverse, Regular language Intersection, Inverse Homomorphism => Y
Concatenation . * + λ => Same
Different Types of SQL JOINs
Here are the different types of the JOINs in SQL:
(INNER) JOIN: Returns records that have matching values in both tables
LEFT (OUTER) JOIN: Return all records from the left table, and the matched
records from the right table
RIGHT (OUTER) JOIN: Return all records from the right table, and the matched
records from the left table
FULL (OUTER) JOIN: Return all records when there is a match in either left or
right table
Theta Join, Equijoin, and Natural Join are called inner joins. An inner join includes
only those tuples with matching attributes and the rest are discarded in the resulting
relation.
Process Thread
New processes require duplication of the New threads are easily created.
Creation
parent process.
File descriptors
Most file descriptors are not shared. It shares file descriptors.
File system There is no sharing of file system context. It shares file system context.
Recursive descent LL(1) parser SLR parser LALR parser (C) LR parser
The Design and Analysis of Algorithms ( Anany Levitin)
1Introduction
1.1 What Is an Algorithm? 3
Exercises 1.1 7
1.2 Fundamentals of Algorithmic Problem Solving 9
Understanding the Problem 9
Ascertaining the Capabilities of the Computational Device 9
Choosing between Exact and Approximate Problem Solving 11
Algorithm Design Techniques 11
Designing an Algorithm and Data Structures 12
Methods of Specifying an Algorithm 12
Proving an Algorithm’s Correctness 13
Analyzing an Algorithm 14
Coding an Algorithm 15
Exercises 1.2 17
1.3 Important Problem Types 18
Sorting 19
Searching 20
String Processing 20
Graph Problems 21
Combinatorial Problems 21
Geometric Problems 22
Numerical Problems 22
Exercises 1.3 23
1.4 Fundamental Data Structures 25
Linear Data Structures 25
Graphs 28
Trees 31
Sets and Dictionaries 35
Exercises 1.4 37
Summary 38
5 Divide-and-Conquer
5.1 Mergesort 172
Exercises 5.1 174
5.2 Quicksort 176
Exercises 5.2 181
5.3 Binary Tree Traversals and Related Properties 182
Exercises 5.3 185
5.4 Multiplication of Large Integers and
Strassen’s Matrix Multiplication 186
Multiplication of Large Integers 187
Strassen’s Matrix Multiplication 189
Exercises 5.4 191
5.5 The Closest-Pair and Convex-Hull Problems
by Divide-and-Conquer 192
The Closest-Pair Problem 192
Convex-Hull Problem 195
Exercises 5.5 197
Summary 198