w20 43 Q5 [4]
s20 43 Q2 [2]
s15 43 Q6.b
null pointer
in a linked listw20 42 Q6 [1]
w20 42 Q5 [4]
Stack
Queue
Binary Tree
Class
Hash table
critical path
in a PERT chartw19 43 Q1 [1]
GANTT
chartw19 43 Q1 [2]
w19 43 Q1 [2]
Example questions:
s20 43 Q7
Y
or N
.s20 42 Q4 [2]
o
*
w20 43 Q2 [4]
Statement | Integration | Acceptance | Alpha | Beta |
---|---|---|---|---|
Software is tested in-house by dedicated testers | √ | √ | √ | |
Software is tested by the client before it is signed off | √ | |||
Software is tested by combining previously working modules | √ | |||
Software is tested using normal, abnormal and boundary data | √ | √ | √ | √ |
Software is tested by releasing it to selected customers | √ |
w20 42 Q4 [2]
CALL ProcedureName()
STRING
of size 100: DECLARE Name : ARRAY[0:99] OF STRING
<-
MID(str, index, length)
%
//
random.randint(min, max)
(inclusive)w18 43 Q2 [8]
Filename <- "myBooks.dat"
OPENFILE Filename FOR RANDOM
RecordLocation <- Hash(ISBN)
SEEK FileName, RecordLocation
GETRECORD FileName, BookInfo
CLOSEFILE FileName
s20 42 Q8 [3]
Statement | Serial | Sequential | Random |
---|---|---|---|
Hashing algorithm | √ | ||
No key field | √ | ||
Collisions can occur | √ | ||
Least efficient for large data | √ | ||
Most efficient for large data | √ |
programming paradigm
w18 43 Q1 [1]
programming paradigm
sw18 43 Q1 [2]
Given object-oriented and tell two others.
imperative programming
w20 42 Q4 [2]
containment
w20 43 Q3 [2]
s20 42 Q6 [3]
inheritance
w20 43 Q3 [2]
w20 42 Q4 [2]
polymorphism
w20 43 Q3 [2]
w20 42 Q4 [2]
private
w18 43 Q5 [2]
w20 42 Q4 [2]
exception
s20 43 Q1 [1]
s20 43 Q1 [3]
s20 43 Q1 [2]
w19 43 Q3 [3]