InterviewSolution
Saved Bookmarks
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
How many address lines and data lines are required to provide a memory capacity of 16K x 16?(A)10,4(B)16,16(C)14,16(D)4,16 |
| Answer» | |
| 2. |
The value of the derivative of the sigmoid function given byf(x)= 1 / (1+e(-2x)) at x=0 is(A)0(B)12(C)14(D)∞ |
| Answer» | |
| 3. |
(A)0.625(B)0.725(C)0.775(D)0.825 |
|
Answer» Answer: (D) Explanation: Threat = Probability that an attack will occur = 0.25 Security = Likelihood of repelling an attack = 0.30 We know that integrity = (1-threat*(1-security)) = (1-0.25(1-0.30)) =1-0.175 =0.825 |
|
| 4. |
Consider the following C++ function f() :unsigned int f(unsigned int n){ unsigned int b=0;while(n){b+=n&1;n>>=1;} return b;}The function f() returns the int that represents the___p___in the binary representation of positive integer n, where P is(A)number of00’s(B)number of bits(C)number of consecutive1’s(D)number of1’s |
| Answer» | |
| 5. |
Which of the following statements is/are trueP : An XML document with correct syntax as specified by W3C is called “well formed”.Q : An XML documented validated against a DTD is both “Well-Formed” and “valid”.R : <xml version=”1.0″ encoding=”UTF-8″> is syntactically correct declaration for the version of an XML document.Select the correct answer from the options given below:(A)P and Q only(B)P and R only(C)Q and R only(D)All of P,Q and R |
| Answer» | |
| 6. |
Which of the following are the primary objectives of risk monitoring in software project tracking?P: To assess whether predicted risks do, in fact, occurQ: To ensure that risk aversion steps defined for the risk are being properly appliedR: To collect information that can be used for future risk analysis(A)Only P and Q(B)Only P and R(C)Only Q and R(D)All of P, Q, R |
| Answer» | |
| 7. |
Following table has two attributes Employee_id and Manager_id, where Employee_id is a primary key and manager_id is a foreign key referencing Employee_id with on-delete cascade:Employee_idManager_id204025403035352040454525On deleting the table (20,40), the set of other tuples that must be deleted to maintain the referential integrity of table is(A)(30,35)(B)(30,35)and(35,20)only(C)(35,20))only(D)(40,45)and(25,40)only |
| Answer» | |
| 8. |
Consider the following statements regarding 2D transforms in computer graphics:is a2×2matrix that reflects (mirrors) only2Dpoint about the X-axis.S2:A2×2matrix which mirrors any2Dpoint about theX-axis, is a rotation matrix.What can you say about the statementsS1andS2?(A)BothS1andS2are true(B)OnlyS1is true(C)OnlyS2is true(D)BothS1andS2are false |
| Answer» | |
| 9. |
Software products need are adaptive maintenance for which of the following reasons?(A)To rectify bugs observed while the system is in use(B)When the customers need the product to run on new platform(C)To support the new features that users want it to support(D)To overcome wear and tear caused by the repeated use of the software |
| Answer» | |