Академический Документы
Профессиональный Документы
Культура Документы
c
Packet-switched describes the type of network in which relatively small units of data called packets are
routed through a network based on the destination address contained within each packet. (Or)
A piece of a message transmitted over a packet-switching network. One of the key features of a packet
is that it contains the destination address in addition to the data. In IP networks, packets are often called
©
A Process is the instance of an application that resides in the main memory and is in an executable
state. (Or)
A process is a program that is running on your computer. This can be anything from a small background
task, such as a spell-checker or system events handler to a full-blown application like Internet Explorer
or Microsoft Word. All processes are composed of one or more threads.
^irtual Private Network (^PN) is the technology that uses the advantage of both public Internet and
private Intranet
Working: A ^PN is a secure, private communication tunnel between `two or more devices across a public
network (like the Internet). These ^PN devices can be either a computer running ^PN software or a
special device like a ^PN enabled router. It allows your home computer to be connected to your office
network or can allow two home computers in different locations to connect to each over the Internet.
The GET method is the most frequently used method. It is used by default to get static content. This
method can also be used to submit data from a HTML web page to the server. In GET method, the data
submitted will be sent as part of the URL.
A POST method is used to send data as part of the HTTP message body. In certain cases, the client may
need to send megabytes of information. In these situations, POST method is the right choice.
c
Dc cc$ c! $c
Symmetric Encryption is traditional scheme of encryption where the same secret key is used for
encryption and decryption. The sender and the receiver share the same secret key.
×c A Private Key: this corresponds to the Public Key and is possessed only by the owner of the file.
The public and Private Keys are related in such a way that when the Public Key is used to encrypt
messages, only the corresponding private key can be used to decrypt them.
##c
cc$cc&$c c
Inheritance is the process of creating new classes, called derived classes, from existing
classes or base classes. The derived class inherits all the capabilities of the base class,
but can add embellishments and refinements of its own.
Multiple inheritance refers to a feature of some object-oriented programming languages in which a class
can inherit behaviors and features from more than one superclass.(or) Multiple inheritance allows a
class to take on functionality from multiple other classes.
Any class that contain one are more abstract methods must also be declared as an abstract, there can
be no object of an abstract class, and we cannot directly instantiate the abstract classes. A.C can contain
concrete methods.
When an instance method declaration includes an abstract modifier, that method is said to be an
abstract method. Although an abstract method is implicitly also a virtual method, it cannot have the
modifier virtual.
5.cccc
ͻ Is a software template that defines the methods and variables to be included in a particular kind of
Object.
Dcc&'c
In object-oriented programming, an object is an instance (or instantiation) of a class. The class object
contains a combination of data and the instructions that operate on that data, making the object
capable of receiving messages, processing data, and sending messages to other objects. Objects have
state, behavior, and identity.
Define two or more methods within the same class (or) subclass that share the same name and their
parameter declarations are different then the methods are said to be overloaded. Overloaded methods
must differ in number of parameters & return type.c
× Overloaded methods are not required to have the same return type or the list of thrown exceptions.
× Overloading is particularly used while implementing several methods that implement similar
behavior but for different data types.c
Method overriding: When a method in a subclass has the same name, return type and parameters as
the method in the super class then the method in the subclass is override the method in the super class.
8.ccc& c
Abstraction is nothing but representing the essential futures without including background details.
)cccc
Access specifier gives access privileges to outside of application (or) others, they are Public, Protected,
Private, Defaults .
Access Specifiers o A.S gives access privileges to outside of application (or) others, they are Public,
Protected, Private, Defaults o A.M which gives additional meaning to data, methods and classes, final
cannot be modified at any point of time.
Access specifiers specify the accessibility of member variables and .member methods
Private: Accessible only within the class.
Public: Accessible externally (and also within the class).
Protected: Similar to private under normal circumstances.
ÿ(+c
,
Class diagrams are the backbone of almost every object oriented method, including UML. They describe
the static structure of a system.
#&',
Object diagrams describe the static structure of a system at a particular time. They can be used to test
class diagrams for accuracy.
ÿ
,
Use case diagrams model the functionality of systemusing actors and usecases.
-,
Sequence diagrams describe interactions among classes in terms of an exchange of messages over time.
& ,
Collaboration diagrams represent interactions between objects as a series of sequenced messages.
Collaboration diagrams describe both the static structure and the dynamic behavior of a system.
,
Statechart diagrams describe the dynamic behavior of a system in response to external stimuli.
Statechart diagrams are especially useful in modeling reactive objects whose states are triggered by
specific events.
,
Component diagrams describe the organization of physical software components, including source code,
run-time (binary) code, and executables.
,$, c
Deployment diagrams depict the physical resources in a system, including nodes, components, and
connections.
* c,c($c
c c cc** ccc *cc
The phases of waterfall model are: System Engineering, Requirement analysis, Designing, Coding,
Testing and Deployment.
c cc/c
SRS (Software Requirements Specification) is a document with list of requirements, scope of the project
and the analysis done with the models. It is the output of the Requirement analysis phase.
[c ccc"cc
A test case is a set of inputs to test a program that it is giving required output with particular parameters
already set.
Ôcc2cc*c,1,c
The context level of DFD represents the system as a whole, defining the external entities to the system.
The refinement of context level each time increases simplicity of each process in the previous level.
ÔÔcc,cc
In the data model the analyst defines all the data objects that are processed with in the system and the
relation between them.
ÔGcccc&'c
A data object (entity) is a representation of any composite information that must be understood by the
software that is being created.
Ôccc &c
A data attributes defines the properties of a data object, with respect to the system being built.
Ô-ccc!/c c
An ER (Entity Relation) diagram is a graphical tool used to model data. Some notations are:
Entity set: An entity set is an object or concept about which we want to store information.
Attributes: Attributes are the properties of an entity.
Relationships: Relationships illustrate how two entities are related.
Ô)ccccc
A code with no proper sequence in the executable statements is called Spaghetti code.
30.cWhat will be done if errors are found during Unit testing?
The errors found in Unit testing are logged in Defect Tracking System and then tracked till they are fixed.
Gcc"c
Testing is analysing software for its correctness.
G[cc *ccc
^erification refers to activities which ensure that the software correctly implements the specific
function. ^alidation refers to a different set of activities to ensure that software that has been built is
traceable to the customer requirements.
Gcc4c&2cc
Testing the system with out worrying about the internal functioning of the product is called Black box
testing.
G)ccc&2cc
Testing the system by knowing the internal functioning of the system, ensuring that all the internal
components and operations are exercised ʹ this is white box testing.
0cc $c&2cc
If the user has some knowledge about the system while testing then it is called Grey box testing.
ccc*cccc
Random generation, Equivalence partitioning, Boundary value analysis, Logic coverage are some test
case design methodologies.
Ôcc%cc
The software testing conducted in the developer͛s environment by the end-users is called Alpha testing.
Gcc4cc
The Software testing conducted in the end-users environment is called Beta testing.
Dcc** c&c.#cc
((c
International Quality Standard is a standard applicable for all types of industries and it does not specify
the activities that have to be done for quality improvement.
Capability Maturity Model is software specific standard and mandates many tasks that need to be done
to improve quality.
ccc*cc&7c*cc
Answer A large program is subdivided into a number of smaller programs or subprograms. Each
subprogram specifies one or more actions to be performed for a large program. such subprograms are
functions. The function supports only static and extern storage classes. By default, function assumes
extern storage class. functions have global scope. Only register or auto storage class is allowed in the
function parameters. Built-in functions that predefined and supplied along with the compiler are known
as built-in functions. They are also known as library functions.
$c88c2c* cc8c
Answer The expression n++ requires a single machine instruction such as INR to carry out the increment
operation whereas, n+1 requires more
cccc*c
Answer A static function is a function whose scope is limited to the current source file.
Scope refers to the visibility of a function or variable. If the function or variable is visible
outside of the current source file, it is said to have global, or external, scope. If the
function or variable is not visible outside of the current source file, it is said to have
local, or static, scope.
cccc c
Answer There is times when it͛s necessary to have a pointer that doesn͛t point to anything. The macro
NULL, defined in , has a value that͛s guaranteed to be different from any valid pointer. NULL is a literal
zero, possibly cast to void* or char*. Some people, notably C++ programmers, prefer to use 0 rather
than NULL. The null pointer is used in three ways:
1) To stop indirection in a recursive data structure
2) As an error value
3) As a sentinel value
ccc** c&c9c:*;cc9c<*=c
Answer When writing your C program, you can include files in two ways. The first way is to surround the
file you want to include with the angled brackets < and >. This method of inclusion tells the preprocessor
to look for the file in the predefined default location. This predefined default location is often an
INCLUDE environment variable that denotes the path to your include files. For instance, given the
INCLUDE variable
INCLUDE=C:\COMPILER\INCLUDE;S:\SOURCE\HEADERS;
using the #include version of file inclusion, the compiler first checks the
C:\COMPILER\INCLUDE
directory for the specified file. If the file is not found there, the compiler then checks the
S:\SOURCE\HEADERS directory. If the file is still not found, the preprocessor checks the current
directory. The second way to include files is to surround the file you want to include with double
quotation marks. This method of inclusion tells the preprocessor to look for the file in the current
directory first, then look for it in the predefined locations you have set up. Using the #include ͞file͟
version of file inclusion and applying it to the preceding example, the preprocessor first checks the
current directory for the specified file. If the file is not found in the current directory, the
C:COMPILERINCLUDE
directory is searched. If the file is still not found, the preprocessor checks the S:SOURCEHEADERS
directory. The #include method of file inclusion is often used to include standard
headers such as stdio.h or stdlib.h. This is because these headers are rarely (if ever) modified, and they
should always be read from your compiler͛s standard include file directory.
The #include ͞file͟ method of file inclusion is often used to include nonstandard header files that you
have created for use in your program. This is because these headers are often modified in the current
directory, and you will want the preprocessor to use your newly modified version of the header rather
than the older, unmodified version.
cc c
AnswerThe preprocessor is used to modify your program according to the preprocessor directives in
your source code. Preprocessor directives (such as #define) give the preprocessor specific instructions
on how to modify your source code. The preprocessor reads in all of your include files and the source
code you are compiling and creates a preprocessed version of your source code. This preprocessed
version has all of its macros and constant symbols replaced by their corresponding code and value
assignments. If your source code contains any conditional preprocessor directives (such as #if), the
preprocessor evaluates the condition and modifies your source code accordingly.
The preprocessor contains many features that are powerful to use, such as creating acros,
performing conditional compilation, inserting predefined environment variables into your code, and
turning compiler features on and off. For the professional programmer, in-depth knowledge of the
features of the preprocessor can be one of the keys to creating fast, efficient programs.
i%%c
c
2
c
cx
x
x
x
c
x
å
c
c2
2
c
c cc
c c
c c
ccc
c
c c
cc cc
c cc
cc
cccccc
å
c
2
c
cx
#
x
#
R
!
" c
2
c
2
#c
cR
"
R
x
2
c
cx "
x
%
2
c
&
&
'(
R R ) $%
'(
R R ) $%
'(
R R ) $%
& 2
R
c
'(
R R ) $%
& 2
R
c
'(
R R ) $%
&
R
c
*
'(
R R ) $%
&
c
'(
R R ) $%
& 2
c
-0xRR@x @x
'(
R R ) $%
& '
c
'(
R R ) $%
& '
c
+
'(
R R ) $%
& å
#
!
2 c
'(
R R ) $%
& '
!(
2 ) !
c
J
#
+
1
x 1
'(
R R ) $%
$%
2
2
#
$%
& 2
c
÷
0
÷
à
#
x
#
x
0
#
#
0#
#
#
#
*
x
"
x
c
c
2
2
c
#c
c
R
JJR
c
- 5
2
c
+,
+,
c
'
c
cx
#
cc
c
x
x
x- "J
cc
c
#
c
-+
8&
8&9c
- ;5
-
9c
R<6+-! 6c
,4(c
2
x c
xcccc
c
c
ccc
cc
c c c
c
cccc c
cc cc cc
cccc
c
c
2
x c
c
cc
c
c
c
cc
c
c ccc
c
c
c c
c
c c
c c
c
x c
cc
ccc
c
c
cc
cccc
c
c
cccc
c
cc
c !c
ccc
c
c
cccc cc
c
c
c c
cc
ccc
c
ccc
c
c ccc cc
x c
ccc" cc
2
x c
xcccc
cccccc
cccc
cc cc!c cc c
ccc ccc ccc ccc" c
cc
cc c
cc
c
c c
cc cc ccccc cc
c
%
c c
ccccc c
c cc
c
cc
c c
cc
c
cc
c c
c c
cc&
c
cc
c
c
cc
2
x c
xc
cc
ccc
ccc
cc
c c
c
2
x c
"ccc
cc c
c c c
cc c
c#
c'
c
(#')c cccc
c
cc
2
x c
xc#
c
cc cc,c-c ccccc,c c-c
cc
ccc
cc
c c
ccc
c
ccc ccccc
c
ccc ccc.c c/c ccc.0,1c2c/0,1c
c
c
c.0-1c2c/0-1c
c
c
ccc,c
cccc 3c c
ccc
c-cc
x c
c cccc
c c
c(c )cc
2
x c
"ccc c
ccc
c
cxc
c
c,c-ccc
c
cccc ccxcc,c c
c
c
cc c
c cc
2 #
x c
xc c
ccc c/ #cccc c. #c cc 4ccxc cccc
c c ccc
2 $
x c
xc c
ccc c5 #cccc c/ #c ccc#'c,cxc
cc
c ccc
c,ccc4ccc
2
A program in a database that gets called each time a row in a table is INSERTED UPDATED or DELETED.
Triggers allow you to check that any changes are correct or to fill in missing information before it is
commited. Triggers are normally written in PL/SQL or Java
c
c
c