1 Crore+ students have signed up on EduRev. Have you? Download the App |
What is the frequency of alternating current which is used in the house?
Which of the following standard library functions returns the length of the string?
The standard library function strlen(s) returns the length of its character string argument s, excluding the terminal ‘\0’.
The command line arguments are handled using main() function arguments where ______ refers to the number of arguments passed.
The default line spacing in Word is 1.15. By default, paragraphs are followed by a blank line and headings have a space above them.
In MS Excel, ctrl + ; is used to insert _________ in the workbook.
Ctrl +; is used to insert the current date in the workbook.
Formula ‘ = TEXT (CELL, “dddd”)’ is used to get the day's name from the given date.
Which of the following is not a multitasking operating system
In DOS, multiple tasks were done one after the other while windows, Linux and Unix are the multitasking and multi-threading operating systems.
Which of the following features is independent of CPU and allows certain hardware subsystems to access random access memory?
For this purpose, the DMA module must use the bus only when the processor does not need it, or it must force the processor to suspend operation temporarily.
The signed magnitude representation of 0 in 4-bit representation is:
+0 → 0000
-0 → 1000
In MS Excel, ‘highlighting cells rule’ comes under which of the following panes?
Users can quickly see which cells contain values less than 50% by using ‘Highlight Cell Rules’.
Which of the following is also called a 1 – operand machine?
e.g. load a, add b, store c.
Which of the following is also called as transparent flip flop:
When the clock is high, the Output Q follows the input. Hence D flip flop is known as the transparent flip flop.
The truth table of XOR gate is shown :
From the truth table, it is clear that when both the inputs are the same (either (0,0) or (1,1)) the output is zero and when both the inputs are different (either (0,1) or (1,0)), the output is 1.
Which task region in the spiral model is used to build one or more representations of the application?
Customer communication - tasks required to establish effective communication between developer and customer.
Planning - tasks required to define resources, timelines, and other project related information.
Risk analysis - tasks required to assess both technical and management risks.
Engineering - tasks required to build one or more representations of the application.
Construction and release - tasks required to construct, test, install, and provide user support (e.g., documentation and training).
Customer evaluation - tasks required to obtain customer feedback based on evaluation of the software representations created during the engineering stage and implemented during the installation stage.
__________ refers to the set of activities that ensure that software correctly implements a specific function.
Verification and validation encompasses a wide array of software quality assurance (SQA) activities that include formal technical reviews, quality and configuration audits, performance monitoring, simulation, feasibility study, documentation review, database review, algorithm analysis, development testing, qualification testing, and installation testing.
Data and Time are available on the desktop at _______.
The most acceptable range of LEO (Low Earth Orbit) is________.
The least distance of distinct vision for a young adult with normal vision is about
The network database model can be organized as _________.
__________ uses a series of phases, called the systems development life cycle (SDLC), to plan, analyze, design, implement, and support an information system.
Structured analysis is based on an overall plan which is similar to a blueprint for constructing a building, so it is called a predictive approach.
In Microsoft Word, File, edit, view etc. are provided in _______________.
__________ is any combination of columns that uniquely identifies a row in a table.
The minimal set of attributes that can uniquely identify a tuple is known as the candidate key.
A relation r1 may include among its attributes the primary key of another relation r2. This attribute is called a foreign key from r1, referencing r2.
Which among the following cannot be considered as a measure of improvement or national development?
Which of the following components of Microsoft Windows provides the ability to view and change system settings?
The control panel is used to configure and manage almost all aspects of Windows.
Which one of the following is not an example of a hardware device?
Computer hardware includes the physical parts or components of a computer, such as the central processing unit, monitor, keyboard, computer data storage, graphics card, sound card, speakers, mouse, and motherboard.
Microsoft Office is a family of client software, server software, and services developed by Microsoft.
The stability of a pond or ecosystem depends on which of the following?
Which of the following can be used to create a new data type name in the C programming language?
For example, typedef int Point; makes the name Point a synonym for int. The type Point can be used in the declaration in exactly the same ways that the type int can be:
Point x, y;
Point *z[];
Which of the following commands is used to check disk errors in windows?
The simplification of Boolean function BC + BC’ + BA gives:
The given Boolean function is :
Y = BC + BC’ + BA
Y = B(C + C’ + A)
Using the identity C + C’ = 1
Y = B (1 + A)
Using the identity 1 + A = 1
Y = B.1 = B
The angle between the magnetic meridian and the geographical meridian at a place is _________.
A period in the periodic table is a horizontal row.
All elements in a row have the same number of electron shells.
Groups of elements in the same column have similar chemical and physical properties, reflecting the periodic law.
What is the pictorial representation of an algorithm called?
A flowchart is the graphical or pictorial representation of an algorithm with the help of different symbols, shapes and arrows in order to demonstrate a process or a program.
With algorithms, we can easily understand a program.
The objective of _________ is to gather data about project usability, costs, benefits, and schedules.
Which of the following file system is not supported by the windows
NTFS (New Technology File System) was introduced in 1993 with Windows NT and is currently the most common file system for the end user computers based on Windows.
FAT (File Allocation Table) is one of the simplest file system types, which has been around since the 1980s.
ReFS (Resilient File System) file system was developed by Microsoft as a new generation file system for server computers starting from Windows Server 2012.
HFS (Hierarchical File System) is a proprietary file system developed by Apple Inc. for use in computer systems running Mac OS.
Which of the following ‘BASIC’ command wipes all the text that were printed to the screen?
Commands:
CLS:
It is an abbreviation that stands for the words CLear Screen. It is used to clear the screen or console window of commands and any output generated by them.
PRINT:
This command writes to the screen. Each new PRINT command will start printing on a new line.
END:
It stops the program at that line; that is, anything that's added after that won't show.
Which of the following models delivers software in small but usable pieces?
The incremental model delivers software in small but usable pieces, called increments. In general, each increment builds on those that have already been delivered.
Who of the following drafted the 'Pakistan Resolution'?
The Lahore Resolution, commonly known as the Pakistan Resolution was a political resolution, or statement drafted in March 1940, by the 25-member Working Committee of the All-India Muslim League, and then formally adopted by the Muslim League membership at its general session on 23 March 1940, held at Lahore.
The resolution was presented at Minto Park, in Lahore, by Maulvi A.K. Fazlul Huq on the instructions of the Working Committee.
Among the following statements, the incorrect one is:-
Among the given options all are correct except argentite and cuprite. Cuprite is not an oxide.
Calamine ZnCO3 and Siderite FeCO3 .
Argentite Ag2S and Cuprite Cu2O .
Zinc blende ZnS and Pyrites FeS2 .
Malachite CuCO3.Cu(OH)2 and Azurite Cu3(CO3)2(OH)2 .
Consider the following statements:
I. Control hierarchy represents the organization of program components.
II. It represents a procedural aspect of software such as a sequence of process
III. The control hierarchy represents connectivity and visibility
Which of the above statements is true?
The control hierarchy also represents two subtly different characteristics of the software architecture: visibility and connectivity.
Which of the following is the capital cost in a nuclear power plant?
What is the end-product of the system analysis phase?
The design model is the equivalent of an architect’s plans for a house. The design model that is created for software provides a variety of different views of the computer software.
The Constitution of India was enforced on_______________.
On 29 August 1947, the Constituent Assembly set up a Drafting Committee under the Chairmanship of Dr. B.R. Ambedkar to prepare a draft Constitution for India.
The Constitution of India was adopted by the Constituent Assembly on 26th November, 1949 and came into force on 26th January, 1950.
Tension in the cable supporting an elevator is equal to the weight of the elevator. From this, we can conclude that the elevator is going up or down with a ______.
Valency of an element depends on which of the following?
I. Number of losing an electron
II. Number of gaining an electron
III. Number of sharing electron
Which of the following types of mirrors is used in the headlamp of cars?
Coding is the process of writing instructions that get executed by computers.
The instructions are written in a programming language which the computer can understand and use to perform a task or solve a problem.
Which of the following vi editor commands move the cursor to the end of the current line in the vi editor?
Which of the following computer viruses actively attacks an antivirus program or programs to prevent detection?
Which of the following is a form of software that automatically displays ads such as banners or pop-ups when a user is online.
Which of the following is the practice of testing a computer system, network or web application to find vulnerabilities that an attacker could exploit?
In which of the following oops properties, different properties and functions of a real-world entity is grouped or embedded into a single element?
Which of the following is provided by DHCP to the client?
The network that provides a constants bandwidth for the complete duration of a message transfer is:
Why is the tower model of CPU most appropriate and used widely?
Which data communication is used to send data over a serial communication link?
Which data structure is mainly used during shift reduction parsing?
A full binary tree with n non leaf nodes contained.
What is the difference between an Applet and an Application?
Which of the following pair of keywords must you use when invoking a method that might throw an exception?
Databases that support OLTP are most often referred to as _____.
Which one is the most important feature of a spiral model?
What kind of Protocol is used to provide Internet access from mobile?
Which tracking program records every keystroke you make on the computer?
What is the chief disadvantage of computer hardware technology, even if it is growing by leaps and bounds?
Which of the following code detects and corrects errors in data?
A system of concurrently processing programs submitted by different users is called:
The ……….. is a hardware that identifies each node in a network uniquely.
For a violation of 2NF to occur in a table in 1NF, the following condition(s) must exist:
A data dictionary is a repository that manages_______.
Which of the following is not a testable Web App security element?
The process of defining two or more methods within the same class that have the same name but different parameters list is _______.
Process of removing an element from stack is called __________
The attack that focuses on capturing small packets from the network transmitted by other computers and reading the data content in search of any type of information is ____
Which of the following is the correct option that allows users to bring together copies of workbooks that other users have worked on independently in MS Excel?
Data stored in an electronic memory cell can be accessed at random and on demand using
Process Control Block (PCB) of all running processes resides in which of the following?
How does deforestation cause an increase in greenhouse gases in the atmosphere?
Tropical forest trees, like all green plants, take in carbon dioxide and release oxygen during photosynthesis
Plants also carry out the opposite process known as respiration, in which they emit carbon dioxide, but generally in smaller amounts than they take in during photosynthesis; The surplus carbon is stored in the plant, helping it to grow.
When trees are cut down and burned or allowed to rot, their stored carbon is released into the air as carbon dioxide.
So, the levels of carbon dioxide will increase and cause global warming
And this is how deforestation and forest degradation contribute to the increase in greenhouse gases and hence global warming
Which of the following Rulers founded the Nalanda Mahavihara?
Nalanda Mahavihara was founded in the 5th century CE by Kumargupta I of the Gupta Dynasty.
It was an ancient Mahavihara, a Buddhist monastery.
The Gupta Empire was founded by Sri Gupta.
Chandragupta I was the first great ruler of the Gupta Empire, who assumed the title of Maharajadhiraja.
Samudragupta was the 2nd ruler of the Gupta Empire. He was also called Napoleon of India.
World Brain Day is observed on July 22 every year.
The day aims at promoting interest in neurology. Previously, World Brain Day has covered topics like dementia, epilepsy and stroke, in cooperation with other societies.
World Brain Day 2019 theme is Migraine: The Painful Truth.
This year, the focus is on migraine, which is known to be one of the world's most common brain diseases.
A force of 20 Newton acts on a body of mass 20 kg for 5 seconds. Change in its momentum is
Which is not the phase of the classical waterfall model?
Feasibility study
↓
Requirements analysis and specification
↓
Design
↓
Coding and unit testing
↓
Integration and system testing
↓
Maintenance
What is the shortcut key to apply the Date format with the day, month, and year in Excel?
Ctrl + Shift + $ ap.ply the Currency format with two decimal places.
Ctrl + Shift + % apply the Percentage format with no decimal places.
Ctrl + Shift + ^ apply the Scientific number format with two decimal places.
Ctrl + Shift + # apply the Date format with the day, month, and year.
Using demergers law
Y = (A + B) (A̅ + B̅)
Y = AA̅ + AB̅ + A̅B + BB̅
(AA̅ = BB̅ = 0)
Y = AB̅ + A̅B
Which is expression for EXOR gate
Which of the queries in SQL is an example of self-join?
I. SELECT a.column_name FROM table1 a, table1 b WHERE a.x = b.x;
II. SELECT b.column_name FROM table1 a, table2 b WHERE a.y = b.y;
A self-join is a join in which a table is joined with itself (which is also called Unary relationships), especially when the table has a FOREIGN KEY which references its own PRIMARY KEY.
To join a table itself means that each row of the table is combined with itself and with every other row of the table.
In query 1, only one relation is used, that is, table1 and hence it is a self-join but in query II, two different relations are used, that is, table1 and table2 and hence it cannot be an example of self-join.
The FULL OUTER JOIN (FULL JOIN) keyword returns all records when there is a match in either left (table1) or right table records and the record with unmatched data from BOTH tables.
The LEFT OUTER JOIN (LEFT JOIN) keyword returns all records when there is a match in either left (table1) or right table records and the record with unmatched data from LEFT tables.
The RIGHT OUTER JOIN (RIGHT JOIN) keyword returns all records when there is a match in either left (table1) or right table records and the record with unmatched data from RIGHT tables.
A file deleted from a folder can be recovered from
Recycle Bin is a location where deleted files or folders are temporarily stored in every version of Microsoft Windows since Windows 95.
The Recycle Bin allows users to recover files that have been deleted in Windows.
It is located on the desktop
If the plaintext in Caesar cipher is “mumbai” then what will be its ciphertext?
In a substitution cipher each letter or group of letters is replaced by another letter or group of letters to disguise it
One of the oldest known ciphers is the Caesar cipher, attributed to Julius Caesar.
In this method, a becomes D, b becomes E, c becomes F, ... and z becomes C
Plaintext’s letter is shifted by 3 positions and ciphertext is in upper case ciphertext is PXPEDL
Example of Java code with constructor:
public class MytestbookClass
{
int a;
public MytestbookClass(int b) //constructor has same name as class with no return type
//constructor can take parameter and type is int
{
a = b;
}
public static void main(String[] args)
{
MytestbookClass Obj = new MytestbookClass(5);
System.out.println(Obj.x);
}
}
Notes:
If Mytestbook Class constructor is not defined by user, then compiler will generate a default constructor with no parameter.
When a file is deleted, the data is not initially removed from the hard disk
Instead, the space on the disk that was occupied by the deleted data is "deallocated"
After it is deallocated, space is available for use when new data is written to the disk
Until space is overwritten, it is possible to recover the deleted data by using a low-level disk editor or data-recovery software
If we arrange different gases in decreasing order of their percentage available in the atmosphere. Which one of the options is correct?
Nitrogen and oxygen are two major gases of the atmosphere. Carbon dioxide (CO2), Helium, Ozone, Argon and hydrogen are found in lesser quantities. Apart from these gases, tiny dust particles are also present in the air.
The atmospheric composition of gases are as follow
Permanent Gases of the Atmosphere | |
Constituent | Percent by Volume |
Nitrogen (N2) | 78.084 |
Oxygen (O2) | 20.946 |
Argon (Ar) | 0.934 |
Carbon dioxide (CO2) | 0.036 |
Neon (Ne) | 0.00182 |
Helium (He) | 0.000524 |
Krypton (Kr) | 0.000114 |
Hydrogen (H2) | 0.00005 |
Which of the following rivers originates outside India?
River Sutlej originates outside India, at Mount Kailash, Tibet.
It enters India through Shipki la Pass.
Yamuna River originates at Yamunotri Glacier, Uttarakhand.
Ganga River originates at Gaumukh, Gangotri Glacier, Uttarakhand.
Luni is the only river that flows in Rajasthan.
When a hydrocarbon is burnt it gives yellow flames with black smoke. Which of the following is true regarding hydrocarbon:
Concept:
Saturated Hydrocarbon:
Compounds of carbon, which are linked by only single bonds between the carbon atoms, are called saturated compounds.
Unsaturated Hydrocarbon:
Compounds of carbon having double or triple bonds between their carbon atoms are called unsaturated compounds.
Application:
Saturated hydrocarbons give a clean flame while unsaturated carbon compounds will give a yellow flame with lots of black smoke.
Which one of the items given below is not an item of the Menu Bar in MS Word?
Options given in Menu Bar of MS Word 2000:
File, edit, view, insert, format, tools, table, windows, help
Options of file: new, open, save, save as, exit etc.
Consider an array with 6 elements starting with index 0 given below
20, 10, 9, 40, 21, 19
Find the element at index 5 after 1st iteration if bubble sort is applied on a given set of data?
In 1st iteration:
STEPS
20 > 10 then swap
Array: 10, 20, 9, 40, 21, 19
20 > 9 then swap
Array: 10, 9, 20, 40, 21, 19
20 < 40 no swap
Array: 10, 9, 20, 40, 21, 19
40 > 21 then swap
Array: 10, 9, 20, 21, 40, 19
40 > 19 then swap
Array: 10, 9, 20, 21, 19, 40
At 5th index, element 40 is present
Processors located in the same ____ is/are examples of LAN.
Location | Network | Range |
City | MAN (Metropolitan Area Network) | 10 km-100 km |
Country | WAN (Wide Area Network) | 100 km-1000 km |
Campus | LAN (Local Area Network) | Around 1 km |
The vertical dimension of a sequence diagram represents-
Time dimension → vertical axis
Object dimension → horizontal axis
Lifeline (Lines) → represents an individual participant in the Interaction.
Message → defines a particular communication between Lifelines of an Interaction.
The simultaneous transmission of data to a number of stations is known as:
Broadcasting is a method of transferring a message to all recipients simultaneously.
Bandwidth is the amount of data that can be transmitted in a fixed amount of time.
Aloha refers to simple communications scheme in which each source (transmitter) in a network sends data whenever there is a frame to send
Analog transmission is a transmission method of conveying information using a continuous signal which varies in amplitude, phase, or some other property in proportion to that information
When an applet begins, which method is called first?
Methods | Description |
init() | First time Applet is loaded |
start() | Each time an Applet’s document is displayed |
stop() | Suspend thread that don’t need to run |
destroy() | When applets need to be removed completely from the memory |
A class is the blueprint from which individual objects are created. class classname { }
A class that is derived from another class is called a subclass (extended class). The class from which the subclass is derived is called a superclass (parent class)
Example:
class subclass extends superclass { }
class new thread extends Thread { }
Here new thread is subclass, and Thread is an extended class i.e., superclass.
Which one is the latest and effective means of modern communication?
Fax:
It is the telephonic transmission of scanned-in printed material (text or images), usually to a telephone number associated with a printer or other output device.
Email (Electronic Mail):
Email is like sending a letter, you can send the email, and it gets to the other person's email account within seconds.
If you have an email address, you can email anyone else who has an email address, including government agencies and lots of different kinds of businesses.
This is a method to send and receive electronic messages just like traditional mail but in a much faster, simpler, and more convenient manner
The fax was the means to send documents from one place to another electronically using telephone lines, email is a method where the user types text on his computer screen and instantly sends it across using the internet to any person anywhere in the world.
Traditional mail/Postal Mail in a sealed envelope or package is delivered to a home or post office box by a mail carrier.
Traditional mail delivery is handled at distribution centers where it is sorted and delivered to regional areas for delivery by a Postal worker.
You walk out to the mailbox to retrieve your letter.
To an observer on the earth, the stars appear to twinkle, this is because:
The atmospheric refraction occurs in a medium of gradually changing refractive index.
Since the atmosphere bends starlight towards the normal, the apparent position of the star is slightly different from its actual position.
Which of the following print user and group information for the specified username?
The Fourth Anglo Mysore war was fought between the Mysore Kingdom and The East India Company in 1799.
Tipu Sultan was killed in the battle.
The First Anglo Mysore war was fought between Hyder Ali and The East India Company in 1767.
The Second Anglo Mysore war was fought between Hyder Ali and The East India Company in 1782.
The Third Anglo Mysore war was fought between Tipu Sultan and The East India Company in 1791.
Which of the following is an invalid identifier?
An identifier cannot start with numbers
An identifier cannot start with a special symbol like ‘&’
An identifier can start with an underscore
Important Points:
continue is also a loop control statement just like the break statement. continue statement is opposite to that of break statement, instead of terminating the loop, it forces the next iteration of the loop.
In which addressing mode, the operand is specified in the instruction itself?
Immediate Mode: In this mode the operand is specified in the instruction itself. In other words, an immediate-mode instruction has an operand field rather than an address field.
The operand field contains the actual operand to be used in conjunction with the operation specified in the instruction.
Immediate-mode instructions are useful for initializing registers to a constant value.
Example: ADD R1, 100 // 100 is operand
Which of the following is/are true?
I. last element points to head, in a single linked list
II. Binary search works efficiently on any array data structure.
A linked list is a data structure used for storing non-homogeneous data. In a single linked list the last element always points to null. Head always points to the 1st element of the linked list.
Binary search works efficiently with sorted array, but it cannot be implemented efficiently on unsorted array because binary search algorithm is based on sorted element index.
Which command displays all the abbreviations in vi editor?
‘map’ command displays all created macros on the status line.
‘unmap’ command removes the macro definition for the key.
‘ab’ command displays all abbreviations.
Which method is overloaded by Java’s Math class to handle the absolute value of all numeric types?
Important Points:
In C programming language,
Function | Description |
fabs() | Absolute value for float data type |
labs() | Absolute value for long data type |
abs() | Absolute value for integer data type |
ab() is not a function in Java or C or C++.
What is the cell address of the 4th row and 4th column?
Cell address of 4th row and 4th column is D4
Muhammad Lodhi was defeated by Babur in this battle.
The Battle of Ghaghra was the decisive battle for the Mughals in India as It led to the complete control of the Mughals in North India.
A linker is a computer utility program that takes one or more object files generated by a compiler and combines them into a single executable file, library file, or another 'object' file...the
The separate object modules are then combined by a linker into a load module, an executable file
Source code → compiler → Assembler → Object code → Linker → Executable file
The <table> tag defines an HTML table and it consists of the <table> element and one or more <tr>, <th>, and <td> elements.
Which of the following represents the system in terms of data and the processes that act upon that data?
Structured analysis uses a set of process models to describe a system graphically. Because it focuses on processes that transform data into useful information, structured analysis is called a process-centered technique.
Which are the tools not used for System Analysis?
System - test data is the data that is used in tests of a software system
During Structured Analysis, various tools are used for system development
Data Flow Diagrams
Flow chart
Decision Table
Binary operator operates on two operands.
Unary operator operates on one operand.
Binary | Description | Type of operator |
& | Bitwise AND | Binary |
| | Bitwise OR | Binary |
^ | Bitwise Exclusive OR | Binary |
~ | Bitwise NOT | Unary |
Example: ~ (1011 0100)
Output: 0100 1011
To maximize workbooks in MS Excel ___________ is used.
Ctrl + F9 minimizes a workbook window to an icon.
Ctrl + F10 maximizes or restores the selected workbook window.
Ctrl + F5 restores the window size of the selected workbook window.
Ctrl + F6 switches to the next workbook window when more than one workbook window is open.
Which of the following gain unauthorized access to the user system and demand ransom to regain access?
Ransomware is a type of malicious software that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid
In May 2017, WannaCry ransomware targeted computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in the Bitcoin cryptocurrency
Around 37 incidents of ransomware attacks were reported to the Indian Computer Emergency Response Team (CERT-In), according to Minister of State for Electronics and IT.
Adware is any software application in which advertising banners are displayed while a program is running.
Spyware is mostly used for the purposes of tracking and storing internet user movements on the web and provides pop-up ads to the internet user.
Trojan horse is a program that appears harmless but,. in fact malicious which misleads user of its true intent
What is India's position in the Global Innovation Index (GII) 2019?
Union Minister of Commerce & Industry and Railways, Piyush Goyal, launched the Global Innovation Index (GII) 2019 in New Delhi on 24 July 2019.
India jumped five places to improve its position from 57th last year to 52nd in 2019.
Switzerland remains number one in the GII index followed by Sweden, the United States of America, the Netherlands, and the United Kingdom in the top 5.
Each manual page has a short description available within it. which searches the manual page names and displays the manual page descriptions of any name matched.
Which of the following is true about the heuristic technique?
I. If basic parameters are known, then other parameters can be determined using mathematical expression.
II. Heuristic technique model is broadly divided into single variables and double variables.
Heuristic techniques assume that the relationships that exist among the different project parameters can be satisfactorily modelled using suitable mathematical expressions.
Once the basic (independent) parameters are known, the other (dependent) parameters can be easily determined by substituting the values of the independent parameters in the corresponding mathematical expression.
Different heuristic estimation models can be divided into the following two broad categories: single variable and multivariable models.
Single variable estimation models assume that various project characteristics can be predicted based on a single previously estimated basic (independent) characteristic of the software such as its size.
A multivariable cost estimation model assumes that a parameter can be predicted based on the values of more than one independent parameter.
Chose the best appropriate answer for the below given code:
#include
int main()
{
printf("TESTBOOK");
main();
return 0;
}
There is no restriction of main() calling main(), that is, recursion can happen for main() function also
There is no explicit termination condition mentioned for main() recursion; So main() would be calling main() after printing TESTBOOK, this will go on until Stack of the program would be filled completely
Important Points:
Stack stores the calling function sequence, that is, which function has called which function so that the control can be returned when the called function returns. That’s why here in the program, main() would continue to call main() until the complete stack is over, that is, stack-overflow occurs.
Which of the following is a sequential access memory?
Magnetic tape is secondary storage device used for storing files of data; Example: a company’s payroll record
Access is sequential and consists of records that can be accessed one after another as the tape moves along a stationary read-write mechanism
A hard disk is an electromechanical data storage device from which data is accessed in a random-access manner, individual blocks of data can be stored or retrieved in any order
Both sequential and random access of data is possible in hard disk
In random-access memory (RAM) the memory cells can be accessed for information transfer from any desired random location
That is, the process of locating a word in memory is the same and requires an equal amount of time no matter where the cells are located physically in memory; Hence RAM is random access
An Interpreter gives better error diagnostics than a compiler because it executes the source program statement by statement
In compiler, user input is given to assembly language produced by compiler is mapped with output, hence it is faster but in case of interpreter user input is given to source program; Therefore, it takes more time
Which command searches a file for lines that have a certain pattern?
Commands | Description |
ls | List down all the files |
chmod | change the access permissions (read, write execute) of file |
grep | Searching a file following certain pattern |
mkdir | Make directory |
A potential difference between two points of a wire carrying 4-ampere current is 0.5 volt. The resistance of the wire is
Potential difference = 0.5 V
I = 4 A
R = ?
R = V/I
V stands for potential difference
R = 0.5/4
R = 1/8
R = 0.125 Ω
Ethanoic acid reacts with absolute ethanol to give a compound X. The compound X is used in making perfumes and as a flavouring agent. The compound X is:
Concept:
Esterification reaction:
Esters are formed by reaction of an acid and an alcohol.
Ethanoic acid reacts with absolute ethanol in the presence of an acid catalyst to give an ester.
Esters are sweet-smelling substances. These are used in making perfumes and as flavouring agents
Reaction:
CH3 – COOH + CH3 CH2 COOH → CH3 – CO – O – CH2 – CH3