w20 43 Q5 [4]
s20 43 Q2 [2]
s15 43 Q6.b
null pointer in a linked listw20 42 Q6 [1]
w20 42 Q5 [4]
StackQueueBinary TreeClassHash tablecritical path in a PERT chartw19 43 Q1 [1]
GANTT chartw19 43 Q1 [2]
w19 43 Q1 [2]
Example questions:
s20 43 Q7
Y or N.s20 42 Q4 [2]
o*w20 43 Q2 [4]
| Statement | Integration | Acceptance | Alpha | Beta |
|---|---|---|---|---|
| Software is tested in-house by dedicated testers | √ | √ | √ | |
| Software is tested by the client before it is signed off | √ | |||
| Software is tested by combining previously working modules | √ | |||
| Software is tested using normal, abnormal and boundary data | √ | √ | √ | √ |
| Software is tested by releasing it to selected customers | √ |
w20 42 Q4 [2]
CALL ProcedureName()STRING of size 100: DECLARE Name : ARRAY[0:99] OF STRING<-MID(str, index, length)%//random.randint(min, max) (inclusive)w18 43 Q2 [8]
Filename <- "myBooks.dat"
OPENFILE Filename FOR RANDOM
RecordLocation <- Hash(ISBN)
SEEK FileName, RecordLocation
GETRECORD FileName, BookInfo
CLOSEFILE FileName
s20 42 Q8 [3]
| Statement | Serial | Sequential | Random |
|---|---|---|---|
| Hashing algorithm | √ | ||
| No key field | √ | ||
| Collisions can occur | √ | ||
| Least efficient for large data | √ | ||
| Most efficient for large data | √ |
programming paradigmw18 43 Q1 [1]
programming paradigmsw18 43 Q1 [2]
Given object-oriented and tell two others.
imperative programmingw20 42 Q4 [2]
containmentw20 43 Q3 [2]
s20 42 Q6 [3]
inheritancew20 43 Q3 [2]
w20 42 Q4 [2]
polymorphismw20 43 Q3 [2]
w20 42 Q4 [2]
privatew18 43 Q5 [2]
w20 42 Q4 [2]
exceptions20 43 Q1 [1]
s20 43 Q1 [3]
s20 43 Q1 [2]
w19 43 Q3 [3]