Computer Engineering Quiz 20 Related Post Computer Engineering Quiz 19 Computer Engineering Quiz 18 Computer Engineering Quiz 17 Computer Engineering Quiz 16 Computer Engineering Quiz 15 1. In order to test a software application, it is necessary to generate _______ which is used in the application. Test cases and test data Text and documentation Technical Documentation Coding of program 2. In packet Switched Network, data is transmitted in the form of: Bytes Frames Packets Switches 3. In real time computing, the correctness of operation depends both on the logical results of the computation and: Operands Instructions Cycle Time 4. In Swapping technique of Memory Management, the total amount transfer time is directly proportional to the _______________. Amount of space on backing store Amount of memory swapped Space on main memory Amount of files deleted 5. In the Fibonacci algorithms’ recursive case we make ______________. One recursive calls Three recursive calls Two recursive calls Four recursive calls 6. In twisted pair cable, two conductors of a single circuit are twisted together for the purposes of ________________ electromagnetic interference (EMI). Joining Mixing Canceling out Feeding 7. In_____________________, data is combined with procedures to give objects. Object-Oriented Paradigm Functional programming paradigms Imperative Paradigm Logic programming paradigms 8. Read Only Memory is ____________ in nature. Volatile Non Volatile Expensive Large 9. Indexes are form of database: Rows Views Objects Columns 10. Initialize the internal data, wait for events to arrive, identify an incoming event and react accordingly is the example of: Object Oriented Programming Event Driven Programming Visual Programming Batch Programming 11. Insertion, look up, and deletion can all be done in ________time in reasonably balanced Binary Search Tree. O(log n) O(n log n) 2O(log n) O(log n2) 12. Interactive GUI Programming has Object-Oriented Programming and: Modules Classes Objects Events 13. Internal structure of the software can be known by ________. Black box Testing Glass box Testing Architecture Documentation 14. ISP is used for: Informing of standard processing Interchange of standard protocols Interrupt service and its different procedures Instruction sets and there processing 15. It is an important requirement to maintain customer confidence and protect operations by keeping information ______________. Public Confidential Open Hidden 16. Jobs are relocated in main memory for the purpose of ________. Shuffling Swapping Loading Execution 17. Kernel threads are supported directly by the __________________. Devices CPU User Operating system 18. Laplace Transform is used to find __________________ using algebra. Static Equations Differential Equations Quadratic Equations Algebraic Equations 19. Length of the walk of the graph is ________________________. The number of edges in walk W Total number of edges in graph The number of vertices in walk W Total number of vertices in a graph 20. In fault tolerant software the two most obvious ways to limit the failure rate are ____________________________. Start-Stop Processors and Replication Low-High Processors and Consistency Fail-stop processors and Redundancy Best Processor and Duplication Loading … Question 1 of 20