Posts

Showing posts from March, 2013

Objective Questions of C with answer set-2

1. Hierarchy decides which operator A) is most important B) is used first C) is fastest D) Operates on largest numbers 2. A pointer can hold A) Single address at a time B) Two addresses at a time C) Number of addresses at a time D) No address 3. An integer constant in C must have A) At least one digit B) At least one decimal point C) A comma along with digits D) Digits separated by commas 4. main() {                 Int a=3, b=2, c*d*e;                 d=&a; e=&b;                 c=*d+*e;                 }                 Which one of the given answers is correct? A) a=4, c-6 B) a=3, c=5 C) a=3, c=6 D) a=3, c=8 5. In C a variable cannot contain A) Blank Spaces B) Decimal Point C) Hyphen D) All of the above 6. Assume that variable x resides at memory location 1234, y at 1111 and p at 2222.                 Int x=1, y=2, *p;                 p=&x;                 y=*p; What will be the value of y after execution of above code? A) 2 B) 1 C) 1234 D) 1111 7. Which of the following

Solved Objective questions of computer data structure set-3

1. Which of the following is not the type of queue? A) Ordinary queue B) Single ended queue C) Circular queue D) Priority queue 2. The property of binary tree is A) The first subset is called left subtree B) The second subtree is called right subtree C) The root cannot contain NULL D) The right subtree can be empty 3. State true or false. i) The degree of root node is always zero. ii) Nodes that are not root and not leaf are called as internal nodes. A) True, True B) True, False C) False, True D) False, False 4. Any node is the path from the root to the node is called A) Successor node B) Ancestor node C) Internal node D) None of the above 5. State true of false. i) A node is a parent if it has successor nodes. ii) A node is child node if out degree is one. A) True, True B) True, False C) False, True D) False, False 6. ………………. is not an operation performed on linear list a) Insertion b) Deletion c) Retrieval d) Traversal A) only a,b and c B) only a and b C) All

List of top 7 Free bulk search engine submission tools

Image
Submitting a site on different search engine along with major search engines like Google, Yahoo and Bing is a first step of the search engine optimization (SEO) after creating a website. For submitting your site to those search engines, you have to submit manually on each search engine and it takes longer time to complete that. But if you have no time for that you can use some bulk search engine submission tools which are available on the web. You can submit your site on the search engine by using those tools on free as well as on paid. You can get better result if you use paid service.  Here, I have listed some top bulk search engine submission tools, which are offering free services also.  SubmitExpress.com: SubmitExpress is such a tool form which you can submit your site with 70 over search engines and directories. Those are all for free.  Addme.com: Addme provides a variety of powerful search engine submission services. Its free search engine submission service submits your s

Solved Objective Questions of Computer Fundamental set-2

1. The default setting for a horizontal rule is .............. A) shaded B) unshaded C) both D) none of the above 2. ............... tag is used to embed image in a webpage. A) <img src="pic.gif"> B) <img src=pic.gif> C) <img source="pic.gif"> D) None of the above 3. This is a global collection of high-powered computer that are connected together with cables, telephone lines, microwave dishes, satellites etc. A) Arpanet B) Internet C) Network D) All of the above 4. ............ is used to pointing / selecting the screen co-ordinates by detecting the light. A) Light Pen B) Bar Code Reader C) Digital Camera D) Smart Cards 5. ............... displays the information about the active document such as page number, section number, number of pages, insertion point, position, etc. A) View Bar B) Menu Bar C) Status Bar D) Ruler Line 6. ........... a record means a new record to the file. A) Amending B) Updating C) Editing D) Appending 7.  To move the cursor

How to earn online from Top revenue sharing sites?

Image
You have good writing skill in any one or more subject matter or you are good video producer or you are good photographer? If that, no wait more for earning online. Now, start to earn from online by exposing your ability. There are many methods of earning money online, but today I am going to tail a method of earning from revenue sharing sites. Revenue sharing sites are those, who share their earned revenue from publishing the articles written by their article writers to them. Mainly they generate revenue from their sites by displaying advertisements from Google Adsense Program and also from other Affiliate programs . So you can earn form those sites by writing good article in your interested subject matter or submitting your interesting and informative videos produced by yourself or submitting photography generated by you. They give you some percentage of the revenue they earned from publishing the page of your article or photos or videos. Such earnings are life time earnings, so th

What is literal and non-literal copying of computer programs?

Image
Copying a computer program can be literal, where the program code itself is copied, in which case the two programs are written in the same computer programming language. Alternatively, copying can be non-literal, where elements of the program such as its structure, sequence of operations, functions, interfaces and methodologies are copied but the program code is not directly copied. Literal copying occurs where a person copies an existing program by disk to disk copying or by writing out or printing the program listing, perhaps to key it into another computer at a later date. In either case, the person making the copy may make some alterations to the copy. These may be to disguise its origins or to enhance the program, for example, by adding some additional functions. Literal copying is relatively easy for infringement. Even relatively small programs will be the result of the programmer's skill, experience and judgment. The following case in the first to seriously consider the issu

Solved Objective Questions of System Analysis and Design set-5

1. ……………….. includes review of the existing procedures and information flow. A) Feasibility Study B) Feasibility report C) System Design D) System analysis 2. A rectangle in a DFD represents A) a process B) a data store C) an external entity D) an input unit 3. …………….. refers to the collection of information pertinent to systems Project. A) Data transfer B) Data gathering C) Data Embedding D) Data Request 4. ………………….. means coordinated effort, to communicate the information of the system written form. A) System documentation B) Resource required C) Development schedule D) User Document 5. MDP stands for A) Master Development Plan B) Master Design Program C) Mandatory Database Program D) Master Database Plan 6. External Entities may be a A) Source of input data only B) Source of input data or destination of results C) Destination of results only D) Repository of data 7. …………………. is a group of interested components working together towards a common goal by accepting inputs and producing

MCQ of System Analysis and Design with answer set-4

1. The rate of ……………. Is always an important factor for management especially in relation to the rate of return A) Cost B) Benefit C) Sales D) Investment 2. Which of the following is / are the Characteristics of information? A) Accuracy and Relevance B) Form of information and Timeliness C) Completeness and Purpose D) All A, B & C 3. The data Flow Diagram is the basic component of …………… system A) Conceptual B) Logical C) Physical D) None of the above 4. State True or False. i) Master Development Plan basically is a schedule of various applications to be comprised. ii) It consists of start and finish dates of a system analysis, design implementation and maintenance activities. A) i-True, ii-True B) i-False, ii-True C) i-True, ii-False D) i-False, ii-False 5. The Key considerations involved in the feasibility analysis is / are ………………. A) Economic B) Technical C) Behavioral D) A, B, C 6. Data cannot flow between two data stores because A) it is not allowed in DFD B) a data store is a

Top 10 article writing tips for blogger.

If you want to see your blog at the top ranking and want to get lot of quality traffic. For getting top position for your blog in the major search engines like Google, Yahoo and Bing, writing quality original articles is most important task along with Search Engine Optimization (SEO). You should write such quality articles that your visitors be interested to read that. From my writing experience and knowledge about it, I have decided some top key factors for creating original content-full and quality article and listed them here. To start your writing you should select good Title for the article which can attract the visitors. The first 3-5 words of your article Title determine the success of your article in terms of how much traffic your article will generate to your site. So select such title which have must searchable keywords.  Choose and create the list of top keywords related to your chosen article topic by using one of the best keyword research sites. You can also use Google k

What is the scope of computer science or IT study?

UDXKU67AY6AW   Most of the sectors or the fields of study started from hundreds of years ago and going to be on saturation for their scope but IT sector is such one sector which is not as others. So far using computers was in IT specific offices and organizations but now they are widely using in almost every sectors like Automobiles, Banking, Business, Communication, Defense, Education, Electronics, Entertainment, Finance, Manufacturing, Marketing etc. So Jobs for computer science or IT engineer will always be there in IT as well as non IT fields. Its range is wide and scope is high, so have many opportunities in technology and other industries. Now, almost all the universities of the world started to produce IT professionals by launching different IT degree programs like Bachelor in Computer Application (BCA), Bachelor of Science in Information Technology (BScIT), Bachelor of Science in Computer Science etc. for undergraduate studies and Master in Computer Application (MCA), Master o

What is intellectual property law?

Intellectual property is that area of law which concerns legal rights associated with creative effort or commercial reputation and goodwill. The subject matter or intellectual property is very wide and includes literally and artistic works, films, computer programs, inventions, design and marks used by traders for their goods or services. The law deters others from copying or taking unfair advantage of the work or reputation of another and provides remedies should this happen. There are several different forms of rights or areas of law giving rise to rights that together make up intellectual property including Copyright, Patents and Trademarks. Copyright law is one of the intellectual property law which includes protecting the photography, sound recordings, films and broadcasting, computer programs, databases, preparatory material and associated documentation(in printed or electronic form) from being unauthorized copying, uses or distribution. As with any other literary work, the copy

What is Cyber Crime and What are the types?

Image
Cyber crime refers to all the activities done with criminal intent in cyberspace or using the medium of Internet . These could be either the criminal activities in the conventional sense or activities, newly evolved with the growth of the new medium. Any activity, which basically offends human sensibilities, can be included in the ambit of Cyber crimes. Because of the anonymous nature of Internet , it is possible to engage in a variety of criminal activities with impunity, and people with intelligence, have been grossly misusing this aspect of the Internet to commit criminal activities in Cyberspace . The field of the Cyber crime is just emerging and new forms of criminal activities in Cyberspace are coming to the forefront each day. For example, child pornography on Internet constitutes on serious cyber crime. Similarly, online pedophiles, using Internet to minor children into sex, are as much cyber criminals as any others. There are basically Three major categories of Cyber crimes

What is Cyber-law?

Cyber law is a generic term which refers to all the legal and regular aspects of internet and the World Wide Web. Anything concerned with or related to or emanating from any legal aspects or issues concerning any activity of citizens and others, in cyberspace comes within the ambit of cyclone. In short term it can be says that "cyberspace is governed by a system of law and regulation called cyber law" . The term "cyberspace" was first used way back in 1984 by author William Gibson in his scientific novel Neuromancer to describe virtual world of computers. Today, cyberspace is how most people describe the word of the Net. The growth of Electronic Commerce has fuelled the need for vibrant and effective regulatory mechanisms, which would further strengthen the legal infrastructures, so crucial to the success of Electronic Commerce. All these regulatory mechanisms and legal infrastructures come within the domain of Cyberlaw. Cyberlaw is important because it touches almo

MCQ of Software Engineering with answer Set-2

1.  Reliability in a software system can be achieved using which of the following strategies. A) Fault avoidance B) Fault tolerance C) Fault detection D) All the above 2. ………………. strategy assumes that residual faults remain in the system and can continue in operation after some system failures have occurred. A) Fault avoidance B) Fault tolerance C) Fault detection D) None of the above 3. ……………… involves modifying the system so that the fault does not recur. A) Failure detection B) Damage assessment C) Fault recovery D) Fault repair 4. …………………… is an approach to program development whereby programmers assume that there may be undetected faults or inconsistencies in their programs. A) Defensive programming B) Effective programming C) Strong programming D) Known programming 5. ……………… is a classification scheme, which shows how an object class is related to other classes through common attributes and services. A) Hierarchy B) Inheritances C) Taxonomy D) None of the above 6. ……………. is a lis