CSE -IT TECHNICAL INTERVIEW QUESTIONAIRE
Q1 What is Client and Server?
Ans: Often, as a network grows and more computers are added, one computer will act as a server—a central storage point for files or application programs shared on the network.
Servers also provide connections to shared peripherals such as printers. Setting up one computer as a server prevents you from having to outfit every networked computer with extensive storage capability and duplicate costly peripherals. The computers that connect to the server are called clients.
Difficulty Rating: 1/5
Q2 What are 10Base2, 10Base5 and 10BaseT Ethernet LANs ?
Ans: 10Base2—An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling, with a contiguous cable segment length of 100 meters and a maximum of 2 segments.
10Base5—An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling, with 5 continuous segments not exceeding 100 meters per segment.
10BaseT—An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling and twisted pair cabling.
Difficulty Rating: 1/5
Q3. What is Bandwidth?
Ans: Every line has an upper limit and a lower limit on the frequency of signals it can carry. This limited range is called the bandwidth.
Difficulty Rating: 1/5
Q4. What is packet filter?
Ans: Packet filter is a standard router equipped with some extra functionality. The extra functionality allows every incoming or outgoing packet to be inspected. Packets meeting some criterion are forwarded normally. Those that fail the test are dropped.
Difficulty Rating: 1/5
Q5. What is virtual path?
Ans: Along any transmission path from a given source to a given destination, a group of virtual circuits can be grouped together into what is called path.
Difficulty Rating: 1/5
Q6. What is RIP (Routing Information Protocol)?
Ans: It is a simple protocol used to exchange information between the routers.
Difficulty Rating: 2/5
Q7. What is Proxy ARP?
Ans: It is using a router to answer ARP requests. This will be done when the originating host believes that a destination is local, when in fact is lies beyond router.
Difficulty Rating: 2/5
Q8. What is the range of addresses in the classes of internet addresses
Ans: Class A 0.0.0.0 - 126.255.255.255
Class B 128.0.0.0 - 191.255.255.255
Class C 192.0.0.0 - 223.255.255.255
Class D 224.0.0.0 - 239.255.255.255
Class E 240.0.0.0 - 247.255.255.255
Difficulty Rating: 2/5
Q9. What is MAC address?
Ans: The address for a device as it is identified at the Media Access Control (MAC) layer in the network architecture. MAC address is usually stored in ROM on the network adapter card and is unique.
Difficulty Rating: 2/5
Q10. What protocol is used by DNS name servers?
Ans: DNS uses UDP for communication between servers. It is a better choice than TCP because of the improved speed a connectionless protocol offers. Of course, transmission reliability suffers with UDP.
Difficulty Rating: 3/5
Q11. What is autonomous system?
Ans: It is a collection of routers under the control of a single administrative authority and that uses a common Interior Gateway Protocol.
Difficulty Rating: 3/5
Q12. What is region?
Ans: When hierarchical routing is used, the routers are divided into what we call regions, with each router knowing all the details about how to route packets to destinations within its own region, but knowing nothing about the internal structure of other regions
Difficulty Rating: 3/5
Q13. Difference between bit rate and baud rate.
Ans: Bit rate is the number of bits transmitted during one second whereas baud rate refers to the number of signal units per second that are required to represent those bits.
baud rate = bit rate / N, where N is no-of-bits represented by each signal shift.
Difficulty Rating: 3/5
Q14. What is source route?
Ans: It is a sequence of IP addresses identifying the route a datagram must follow. A source route may
optionally be included in an IP datagram header.
Difficulty Rating: 4/5
Q15. What is Gateway-to-Gateway protocol?
Ans: It is a protocol formerly used to exchange routing information between Internet core routers.
Difficulty Rating: 4/5
Q16. What is difference between ARP and RARP?
Ans: The address resolution protocol (ARP) is used to associate the 32 bit IP address with the 48 bit physical address, used by a host or a router to find the physical address of another host on its network by sending a ARP query packet that includes the IP address of the receiver.
The reverse address resolution protocol (RARP) allows a host to discover its Internet address when it knows only its physical address.
Difficulty Rating: 4/5
Q17. What is RAID?
Ans: A method for providing fault tolerance by using multiple hard disk drives.
Difficulty Rating: 4/5
Q18. What is Kerberos?
Ans: It is an authentication service developed at the Massachusetts Institute of Technology. Kerberos uses encryption to prevent intruders from discovering passwords and gaining unauthorized access to files.
Difficulty Rating: 5/5
Q19. What is ICMP?
Ans: ICMP is Internet Control Message Protocol, a network layer protocol of the TCP/IP suite used by hosts and gateways to send notification of datagram problems back to the sender. It uses the echo test / reply to test whether a destination is reachable and responding. It also handles both control and error messages.
Difficulty Rating: 5/5
Q20. What is Beaconing
Ans: The process that allows a network to self-repair networks problems. The stations on the network notify the other stations on the ring when they are not receiving the transmissions. Beaconing is used in Token ring and FDDI networks.
Difficulty Rating: 5/5
Q21. Describe the three levels of data abstraction?
Ans: There are three levels of abstraction:
Physical level: The lowest level of abstraction describes how data are stored.
Logical level: The next higher level of abstraction, describes what data are stored in database and what relationship among those data.
View level: The highest level of abstraction describes only part of entire database.
Difficulty Rating 3/5
Q22. What is the SQL syntax for sorting, and which is the default order?
Ans:. The default sorting order is ascending. These two statements are identical:
select from order by
select from order by asc
For descending order, simply replace “asc” with “desc.”
Difficulty Rating 3.5/5
Ans: Both primary key and unique enforce uniqueness of the column on which they are defined. But by default primary key creates a clustered index on the column, where are unique creates a nonclustered index by default. Another major difference is that, primary key doesn't allow NULLs, but unique key allows one NULL only.
Difficulty Rating 4/5
Q24) What are the disadvantages of cursors?
Ans.: Disadvantages of cursors: Each time you fetch a row from the cursor, it results in a network roundtrip, where as a normal SELECT query makes only one rowundtrip, however large the resultset is. Cursors are also costly because they require more resources and temporary storage (results in more IO operations). Furthere, there are restrictions on the SELECT statements that can be used with some types of cursors.
Difficulty Rating 4.5/5
Q25) Difference between a "where" clause and a "having" clause.
Ans: Having clause is used only with group functions whereas Where is not used with.
Difficulty Rating 2.5/5
Q26) What are triggers? How to invoke a trigger on demand?
Ans: Triggers are special kind of stored procedures that get executed automatically when an INSERT, UPDATE or DELETE operation takes place on a table.
Triggers can't be invoked on demand. They get triggered only when an associated action (INSERT, UPDATE, DELETE) happens on the table on which they are defined.
Triggers are generally used to implement business rules, auditing. Triggers can also be used to extend the referential integrity checks, but wherever possible, use constraints for this purpose, instead of triggers, as constraints are much faster.
Difficulty Rating 4/5
Q27) Define the “integrity rules”?
Ans: There are two Integrity rules.
Entity Integrity: States that "Primary key cannot have NULL value"
Referential Integrity: States that "Foreign Key can be either a NULL value or should be Primary Key value of other relation.
Difficulty Rating 3.5/5
Q28) What is a view?
Ans.: A view may be thought of as a virtual table, that is, a table that does not really exist in its own right but is instead derived from one or more underlying base table. In other words, there is no stored file that direct represents the view instead a definition of view is stored in data dictionary.
Difficulty Rating 3/5
Q29) What is Object Oriented model?
Ans.: This model is based on collection of objects. An object contains values stored in instance variables with in the object. An object also contains bodies of code that operate on the object. These bodies of code are called methods. Objects that contain same types of values and the same methods are grouped together into classes.
Difficulty Rating 3/5
Ans: SELECT * FROM people WHERE empname LIKE '%ab%'
Would return a recordset with records consisting empname the sequence 'ab' in empname .
Would return a recordset with records consisting empname the sequence 'ab' in empname .
Difficulty Rating 4/5
Q31) What number should come next in the series 2, 1, (1/2), (1/4), ...
Ans. 1/8
Explanation:
This is a simple division series; each number is one-half of the previous number.
In other terms to say, the number is divided by 2 successively to get the next result.
4/2 = 2
2/2 = 1
1/2 = 1/2
(1/2)/2 = 1/4
(1/4)/2 = 1/8 and so on.
Difficulty 2/5
Q32) ELFA, GLHA, ILJA, _____, MLNA
Ans. KLLA
Explanation:
The second and forth letters in the series, L and A, are static. The first and third letters consist of an alphabetical order beginning with the letter E.
Difficulty 3/5
Q33) Two fathers took their sons to a fruit stall. Each man and son bought an apple, But when they returned home, they had only 3 apples. They did not eat, lost, or thrown. How could this be possible?
Ans. There were only three people. Son, his father and his grandfather.
Difficulty 2/5
Q34) Michael have ten pairs of black socks, eight pairs of white socks and seven pairs of green socks. Everything is mixed in a draw. As there is no light he were not able to identify the color of the socks. How many of the socks did he want to take to match one pair.
Ans. Although there are many socks in the draw, there are only three colors. So, four socks are enough to match one pair. Difficulty 3/5
Q35) Anne, Olivia and Jenita are daughters of Mr.Jack, Mr.Brown and Mr.Ran. Four of these people are playing badminton doubles. Mr.Ran's daughter and Mr.Jack are partners. Anne's father and Mr.Brown's daughter are also partners. There are not any father-daughter combinations. Who is Anne's father?
Ans. As there are not any father-daughter combinations, Mr.Brown is not Anne's father. Anne can play with Mr.Jack, so he cannot be his father. Therefore, Mr.Ran is Anne's father.
Dificulty 4/5
Q36) A man has 53 socks in his drawer: 21 identical blue, 15 identical black and 17 identical red. The lights are fused and he is completely in the dark. How many socks must he take out to make 100 per cent certain he has a pair of black socks?
Ans. 40 socks
Explanation:
If he takes out 38 socks, although it is very unlikely, it is possible they could all be blue and red. To make 100 percent certain that he also has a pair of black socks he must take out a further two socks.
Difficulty 3/5
Q37) A photograph measuring 8.5 by 7.5 cm is to be enlarged. If the enlargement of the longer side is 13.6 cm, what is the length of the smaller side?
Ans. 12 cm
Explanation:
(13.6 ÷ 8.5) × 7.5
= 12 cm.
Difficulty: 2/5
Q38) From a book, a number of consecutive pages are missing. The sum of the page numbers of these pages is 9808. Which pages are missing?
Ans. The pages 291 up to and including 322 are missing.
Explanation:
Let the number of missing pages be n and the first missing page p+1. Then the pages p+1 up to and including p+n are missing, and n times the average of the numbers of the missing pages must be equal to 9808:
n*( ((p+1)+(p+n))/2 ) = 9808
In other words:
n*(2*p+n+1)/2 = 2*2*2*2*613
So:
n*(2*p+n+1) = 2*2*2*2*2*613
One of the two terms n and 2*p+n+1 must be even, and the other one must be odd. Moreover, the term n must be smaller than the term 2*p+n+1. It follows that there are only two solutions:
n=1 and 2*p+n+1=2*2*2*2*2*613, so n=1 and p=9808, so only page 9808 is missing.
n=2*2*2*2*2 and 2*p+n+1=613, so n=32 and p=290, so the pages 291 up to and including 322 are missing.
Because it is asked which pages (plural) are missing, the solution is: the pages 291 up to and including 322 are missing.
Difficulty 5/5
Q39) There are 10 barrels of gold coins. In that, some of the barrels contain 1 gram gold coins and some of the barrels contain 2 gram gold coins. There is a weighing machine which is allowed to weigh only once. Which of the barrels contain 2 gram coins?
Ans. 2 gram coins are on 2, 4 and 8 barrels.
Explanation:
There are 10 barrels totally. Let's take the coins from the barrel in the power of 2. Take 1 coin 20 from first barrel, 2 coins 21 from first barrel, 4 coins 22 from first barrel, as on for ten barrels till 512 coins 29. Now consider that if every barrel contains 1 gram coins, the total weight of the coins picked from the barrels will be 1023 grams.
In this many of the barrel contains 2 gram coins, so we would have to subtract repeatedly from the last. For example, if the weight was 1289 grams. First subtract from the considered weight 1023 from the total weight. Now the value will be 266. Now take the nearest equal power which is less than or equal to the value. 256 is the largest number that is less than 266, so note that 8th barrel contains 2 gram gold coins. Now subtract 256 from 256, 10 will be the value. Again see the nearest equal value. 8 is less than the value, so note that the barrel 4 contains the 2 gram gold coins. At last subtract 8 from 10, 2 will be the value. 2 is equal to the barrel 2. Finally the 2 gram coins are on 2, 4 and 8 barrels.
Difficulty 5/5
Q40) A frog is at the bottom of the well which is 20 meters deep. Everyday the frog jumps 5 meters upwards and fall 4 meters down. How many days it will take for the frog to reach the top?
Ans. 16th day
Explanation:
First day it jumps 5 meters and falls 4 meters. Now it will be at a height of 1 meter.
Second day it jumps to 6 meters and falls back to 2 meter.
Third day it jumps to 7 meters and falls back to 3 meter.
..........
..........
..........
Fifteenth day it jumps to 19 meters and falls back to 15 meters.
Finally, sixteenth day it jumps to 20 meters, but now the frog have reached the top of the well.
So the Frog reaches the top of the well at the sixteenth day.
Difficulty: 3/5
Q41) Sequence of numbers are 1, 11, 21, 1211, 111221. What will be the next one in the above sequence?
Ans. 312211
Explanation:
It is a strange sequence. Each number describes the resemblance of the previous one, except the first one.
11 describes the previous '1' which contains one '1'
21 describes the previous '11' which contains two '1'
1211 describes the previous '21' which contains one '2' and one '1'
111221 describes the previous '1211' which contains one '1', one '2' and two '1'.
So the next sequence will be 312211, that is the previous '111221' contains three '1', two '2' and one '1'.
Difficulty: 4/5
Q42) Miss Anne has eleven kids in her class. She has a bowl containing eleven apples. Now Miss Anne want to divide the eleven apples to the kids, in such a way that a apple should remain in her bowl. How can Miss Anne do it?
Ans. Ten kids will get each one apple. The eleventh kid will get the apple with the bowl
Difficulty 3/5
Q43) A light bulb is hanging in the first floor of the room. There are three switches in the ground floor room. One of these switches belongs to that light bulb. The light bulb is not lit and the switches are in off state. There is only one chance to visit the room. How can it be determined which of these switch is connected to the light bulb.
Ans. First turn ON the first switch and leave it for few minutes. Then turn OFF the first switch and ON the second switch. Now enter the first floor room. If the light bulb is lit, the second switch must be connected to it. If it is not lit, it might the first or the third switch. Now touch the light bulb, it is hot it will be the connected to the first switch. Nor if it is cold, then it should be the third one.
Difficulty 4/5
Q44) There are three boxes in a table. One of the box contains Gold and the other two are empty. A printed message contains in each box. One of the message is true and the other two are lies. The first box says 'The Gold is not here'. The Second box says 'The Gold is not here'. The Third box says 'The Gold is in the Second box'. Which box has the Gold?
Ans. Gold is in the first box.
Explanation: As the message contains one truth, the third says that the gold is in the second box, if it is to be true, then the first box message will also become true. So Gold cannot be in second and third boxes. Gold is in the first box Difficulty 3/5
Q45) A bottle fully contains honey. The honey bottle weighed 1.5kg. Then the bottle was weighed with half of the honey, it was 900 grams. Now guess what would be the weight of the bottle?
Ans. 300 grams
Explanation:
Let the bottle weight be x
Let the bottle weight be x
Let the honey weight be y
The weight of the bottle with honey is 1.5kg
Therefore x + y = 1500 grams -> (1)
Then the weight of the bottle with half of the honey is 900 grams
Therefore x + (y/2) = 900 grams
That is 2x + y = 1800 -> (2)
Solving the first and second equation
2x + y = 1800
x + y = 1500
-------------------------
x = 300
-------------------------
Therefore the weight of the bottle is 300 grams.
Difficulty 2/5
Q46 What is object-oriented programming (OOP)?
Ans: OOP is a technique to develop logical modules, such as classes that contain properties, methods, fields, and events. An object is created in the program to represent a class. Therefore, an object encapsulates all the features, such as data and behavior that are associated to a class. OOP allows developers to develop modular programs and assemble them as software. Objects are used to access data and behaviours of different software modules, such as classes, namespaces, and sharable assemblies. .NET Framework supports only OOP languages, such as Visual Basic .NET, Visual C#, and Visual C++.
Difficulty Rating: 1/5
Q47 What is a class?
Ans: A class describes all the attributes of objects, as well as the methods that implement the behavior of member objects. It is a comprehensive data type, which represents a blue print of objects. It is a template of object.
A class can be defined as the primary building block of OOP. It also serves as a template that describes the properties, state, and behaviors common to a particular group of objects.
A class contains data and behavior of an entity. For example, the aircraft class can contain data, such as model number, category, and color and behavior, such as duration of flight, speed, and number of passengers. A class inherits the data members and behaviors of other classes by extending from them.
A class can be defined as the primary building block of OOP. It also serves as a template that describes the properties, state, and behaviors common to a particular group of objects.
A class contains data and behavior of an entity. For example, the aircraft class can contain data, such as model number, category, and color and behavior, such as duration of flight, speed, and number of passengers. A class inherits the data members and behaviors of other classes by extending from them.
Difficulty Rating: 1/5
Q48. What is an object?
Ans: They are instance of classes. It is a basic unit of a system. An object is an entity that has attributes, behavior, and identity. Attributes and behavior of an object are defined by the class definition.
Difficulty Rating: 1/5
Q49. What is the relationship between a class and an object?
Ans: A class acts as a blue-print that defines the properties, states, and behaviors that are common to a number of objects. An object is an instance of the class. For example, you have a class called Vehicle and Car is the object of that class. You can create any number of objects for the class named Vehicle, such as Van, Truck, and Auto.
The new operator is used to create an object of a class. When an object of a class is instantiated, the system allocates memory for every data member that is present in the class.
The new operator is used to create an object of a class. When an object of a class is instantiated, the system allocates memory for every data member that is present in the class.
Difficulty Rating: 1/5
Q50. Explain the basic features of OOPs.
Ans: The following are the four basic features of OOP:
Abstraction - Refers to the process of exposing only the relevant and essential data to the users without showing unnecessary information.
Polymorphism - Allows you to use an entity in multiple forms.
Encapsulation - Prevents the data from unwanted access by binding of code and data in a single unit called object.
Inheritance - Promotes the reusability of code and eliminates the use of redundant code. It is the property through which a child class obtains all the features defined in its parent class. When a class inherits the common properties of another class, the class inheriting the properties is called a derived class and the class that allows inheritance of its common properties is called a base class.
Difficulty Rating: 1/5
Q51. What is abstract class?
Ans: Abstract class is a class that defines an interface, but does not necessarily provide implementations for all its member functions. No objects of an abstract class exist, i.e, it cannot be instantiated.
Difficulty Rating: 2/5
Q52. What is function overloading and operator overloading?
Ans: A function name having several definitions that are differentiable by the number or types of their arguments is known as function overloading.
Operator overloading is a specific case of polymorphism in C++. In operator overloading, different operators have different implementations, depending on their arguments.
Operator overloading is a specific case of polymorphism in C++. In operator overloading, different operators have different implementations, depending on their arguments.
Difficulty Rating: 2/5
Q53. What is a ‘friend’ function?
Ans: A friend function in C++ is a function which allows access to private or protected data in a class from outside. Friend functions are declared using the ‘friend’ keyword.
Difficulty Rating: 2/5
Q54. What is concrete class?
Ans: A concrete class is a derived class of an abstract class that implements all the missing functionality. A concrete class can be instantiated.
Difficulty Rating: 2/5
Q55. What is the difference between arrays and collection?
Ans: Array: You need to specify the size of an array at the time of its declaration. It cannot be resized dynamically.
The members of an array should be of the same data type.
Collection: The size of a collection can be adjusted dynamically, as per the user's requirement. It does not have fixed size.
Collection can have elements of different types.
Difficulty Rating: 3/5
Q56. What is autonomous system?
Ans: It is a collection of routers under the control of a single administrative authority and that uses a common Interior Gateway Protocol.
Difficulty Rating: 3/5
Q57. Why is the virtual keyword used in code?
Ans: The virtual keyword is used while defining a class to specify that the methods and the properties of that class can be overridden in derived classes.
Difficulty Rating: 3/5
Q58. Define enumeration.
Ans: Enumeration is defined as a value type that consists of a set of named values. These values are constants and are called enumerators. An enumeration type is declared using the enum keyword. Each enumerator in an enumeration is associated with an underlying type that is set, by default, on the enumerator. The following is an example that creates an enumeration to store different varieties of fruits:
enum Fruits {Mango, Apple, orange, Guava};
In the preceding example, an enumeration Fruits is created, where number 0 is associated with Mango, number 1 with Apple, number 2 with Orange, and number 3 with Guava. You can access the enumerators of an enumeration by these values.
enum Fruits {Mango, Apple, orange, Guava};
In the preceding example, an enumeration Fruits is created, where number 0 is associated with Mango, number 1 with Apple, number 2 with Orange, and number 3 with Guava. You can access the enumerators of an enumeration by these values.
Difficulty Rating: 4/5
Q59. How can you prevent your class to be inherited further?
Ans: You can prevent a class from being inherited further by defining it with the sealed keyword.
Difficulty Rating: 4/5
Q60. What are collections and generics?
Ans: A collection can be defined as a group of related items that can be referred to as a single unit. TheSystem.Collections namespace provides you with many classes and interfaces. Some of them are -ArrayList, List, Stack, ICollection, IEnumerable, and IDictionary. Generics provide the type-safety to your class at the compile time. While creating a data structure, you never need to specify the data type at the time of declaration. The System.Collections.Generic namespace contains all the generic collections.
Difficulty Rating: 5/5
Q61. What is a multicast delegate?
Ans: Each delegate object holds reference to a single method. However, it is possible for a delegate object to hold references of and invoke multiple methods. Such delegate objects are called multicast delegates or combinable delegates.
Difficulty Rating: 5/5
Q62. Can you declare an overridden method to be static if the original method is not static?
Ans: No. Two virtual methods must have the same signature.
Difficulty Rating: 5/5
Q63. What is RUP?
Ans. The Rational Unified Process (RUP) is an iterative software development process framework created by the Rational Software Corporation, a division of IBM since 2003. RUP is not a single concrete prescriptive process, but rather an adaptable process framework, intended to be tailored by the development organizations and software project teams that will select the elements of the process that are appropriate for their needs. RUP is a specific implementation of the Unified Process. It consists of following phases:
Inception Phase
Elaboration Phase
Construction Phase
Transition Phase
Difficulty rating (3/5)
64. Define RAD.
Ans. Rapid application development (RAD) is a software development methodology that uses minimal planning in favor of rapid prototyping. The "planning" of software developed using RAD is interleaved with writing the software itself. The lack of extensive pre-planning generally allows software to be written much faster, and makes it easier to change requirements. It consists of following phases:
Requirements Planning phase
User design phase Construction phase Cutover phase
RAD promotes strong collaborative atmosphere and dynamic gathering of requirements. Business owner actively participates in prototyping, writing test cases and performing unit testing.
Difficulty rating(3/5)
65. What is Agile model?
Ans. Minimizes feature creep by developing in short intervals resulting in miniature software projects and releasing the product in mini-increments
Short iteration may add too little functionality, leading to significant delays in final iterations. Since Agile emphasizes real-time communication (preferably face-to-face), using it is problematic for large multi-team distributed system development. Agile methods produce very little written documentation and require a significant amount of post-project documentation.
Difficulty rating(3/5)
66. State the difference between Smoke and Sanity testing
Ans.:
smoke Testing is performed to ascertain that the critical functionalities of the program is working fine | Sanity Testing is done to check the new functionality / bugs have been fixed |
The objective of this testing is to verify the "stability" of the system in order to proceed with more rigorous testing | The objective of the testing is to verify the "rationality" of the system in order to proceed with more rigorous testing |
This testing is performed by the developers or testers | Sanity testing is usually performed by testers |
Smoke testing is usually documented or scripted | Sanity testing is usually not documented and is unscripted |
Smoke testing is a subset of Regression testing | Sanity testing is a subset of Acceptance testing |
Smoke testing exercises the entire system from end to end | Sanity testing exercises only the particular component of the entire system |
Smoke testing is like General Health Check Up | Sanity Testing is like specialized health check up |
Difficulty rating(5/5)
67. What are Functional and non-functional requirements
Ans. In systems engineering and requirements engineering, a non-functional requirement is a requirement that specifies criteria that can be used to judge the operation of a system, rather than specific behaviors. This should be contrasted with functional requirements that define specific behavior or functions. The plan for implementing functional requirements is detailed in the systemdesign. The plan for implementing non-functional requirements is detailed in the system architecture.
Broadly, functional requirements define what a system is supposed to do and non-functional requirements define how a system is supposed to be..
Non-functional requirements are often called qualities of a system. Other terms for non-functional requirements are "constraints", "quality attributes", "quality goals", "quality of service requirements" and "non-behavioral requirements".[1] Informally these are sometimes called the "ilities", from attributes like stability and portability.
Difficulty rating(2/5)
68.What do you understand by the term UML?
Ans. Unified Modeling Language (UML) is a standardized (ISO/IEC 19501:2005), general-purpose modeling language in the field of software engineering. The Unified Modeling Language includes a set of graphic notation techniques to create visual models of object-oriented software-intensive systems.
Class diagram
Object diag
Usecase diag.
Sequence diag
Activity diag. etc
Difficulty rating(2/5)
69. Explain in brief CMM.
Ans. Capability Maturity Model is a bench-mark for measuring the maturity of anorganization’s software process. It is a methodology used to develop and refine an organization’s software development process. CMM can be used to assess an organization against a scale of five process maturity levels based on certain Key Process Areas (KPA). It describes the maturity of the company based upon the project the company is dealing with and the clients. Each level ranks the organization according to its standardization of processes in the subject area being assessed. CMMI models with a staged representation, there are five maturity levels designated by the numbers 1 through 5 as shown below:
Initial
Managed
Defined
Quantitatively Managed
Optimizing
Difficulty rating(2/5)
70. What is HTML5?
Ans. HTML5 is a markup language used for structuring and presenting content for the World Wide Web and a core technology of the Internet. It is the fifth revision of the HTML standard (created in 1990 and standardized as HTML 4 as of 1997)[2] and, as of December 2012, is a candidate recommendationof the World Wide Web Consortium (W3C) .Its core aims have been to improve the language with support for the latest multimedia while keeping it easily readable by humans and consistently understood by computers and devices (web browsers, parsers, etc.). HTML5 is intended to subsume not only HTML 4, but also XHTML 1.
Difficulty rating(4/5)