Database Design and Applications- Quiz-3 - MTech Software Systems- BITS Pilani WILP

Database Design and Applications (SSZG518)- Quiz-3
MTech Software Systems- WILP(Work Integrated Learning Programmes)  
Birla Institute of Technology and Science, Pilani

1. A schedule that will always produce identical results are serial schedule.
Select one:
True
False

Ans: False

2. Every view serializable schedule that is not conflict  serializable has blind writes.

Select one:
True
False

Ans: True

3. The point in the schedule where the transaction has obtained its final lock is known as Commit point.
Select one:
True
False

Ans: False

4. The write ahead logging protocol guarantees atomicity and durability
Select one:
True
False

Ans: True

5. The schedule is deadlock free if the Precedence graph is acyclic
Select one:
True
False

Ans: True

6. Only one exclusive lock can be placed on a resource at a time.
Select one:
True
False

Ans: True

7. Every conflict serializable schedule is also view serializable.
Select one:
True
False

Ans: True


8. There can exist view serializable schedule which is not conflict serializable.
Select one:
True
False

Ans: True


9. The DBMS creates a logpoint, in order to minimize the time taken to recover in the event of a system crash.
Select one:
True
False

Ans: Fasle


10.Locks are released when the transaction is committed successfully.
Select one:
True
False

Ans: True


BITS PILANI WILP - M Tec Software Systems - Data Structures and Algorithms Design Mid-Semester Regular Test Question Paper 2016 - 2017


SS ZG519: Data Structures and Algorithms Design
Mid-Semester Test (Regular) -2016 - 2017

MTech Software Systems- WILP(Work Integrated Learning Programmes)  

Birla Institute of Technology and Science, 


BITS PILANI- WILP - M.Tec. - Software Systems- Object Oriented Analysis and Design - Quiz 3

Object Oriented Analysis and Design - Quiz 3

BITS PILANI- WILP - M.Tec. - Software Systems



1. ISP states that
Select one:
a. High-level modules should not depend on low-level modules
b. BOTH Clients should not be forced to depend on methods they do not use AND Design
cohesive interfaces and avoid "fat" interfaces
c. Design cohesive interfaces and avoid "fat" interfaces
d. Clients should not be forced to depend on methods they do not use

Ans: d. Clients should not be forced to depend on methods they do not use

2. F2166b:What is true about Structural desing pattern?
Select one:
 a. Makes the system independent of how the objects are created, composed and represented.
 b. Abstract the instantiation process
 c. All the given choices
 d. How classes and objects are composed to form larger structures?

Ans: d. How classes and objects are composed to form larger structures?

3. F2109:Which of the following statements are true about Package Diagrams?
Select one:
 a. Dependency is indicated by a solid line with arrow head at one end
 b. Package diagrams are particularly useful for testing
 c. Package is an object-oriented approach in managing system structure
 d. Package is a grouping mechanism that can be applied to classes only
 e. Package in UML is similar to Java, to avoid name collision
 f. Package dependency and class dependency are not the same.

Ans:  b. Package diagrams are particularly useful for testing

4. F2155: Which of the following is NOT creational design pattern?
Select one:
 a. String builder
 b. Factroy Method
 c. SIngleton
 d. Abstract Factory

Ans:  a. String builder

5. F2138:How to handle alternatives based on type?
Select one:
 a. Use protected variations
 b. Use Polymorphism
 c. User Expert
 d. Use adapter

Ans:  b. Use Polymorphism

6. F2188:Encapsulate a request as an object, thereby letting you parameterize clients with different requests, queue or log requests, and support undoable operations.
Select one:
 a. Use Facade
 b. Use Chain Of Responsibility
 c. Use Interpreter
 d. Use Command pattern

Ans: d. Use Command pattern

7. F2142:How to design elements (objects, subsystems, and systems) so that the variations or instability in these elements does not have an undesirable impact on other elements?
Select one:
 a. Use creator
 b. Use Protected Variations
 c. Use Indirection
 d. Use Expert

Ans:  b. Use Protected Variations

8. F2146:Subtypes must be substitutable for their base types, is suggested by
Select one:
 a. SRP
 b. LSP
 c. OCP
 d. DIP

Ans:  b. LSP

9. F2165: GoF patterns can be classified as
Select one:
 a. Creational
 b. Structural
 c. Behavioural
 d. All the given choices

Ans :  d. All the given choices

10. F2118:Which of following are false?
Select one:
 a. Domain model shows conceptual perspective
 b. Domain model does not represent class diagrams.
 c. Design class diagram shows software perspective

Ans:  b. Domain model does not represent class diagrams.

11. F2153:Which design pattern would resolve who should be responsible for creating objects when there are special considerations such as complex creation logic, a desire to separate the creation responsibilities for better cohesion and so forth?
Select one:
 a. Singleton
 b. Creator
 c. Abstract factory
 d. Factory

Ans: d. Factory

12. F2145: While implementing OCP what are the guidelines?
Select one:
 a. Look for internal relationships
 b. Both Look for duplicated code AND Look at the change history
 c. Look for duplicated code
 d. Look at the change history
 e. Look at hidden methods

Ans:  b. Both Look for duplicated code AND Look at the change history

13. F2107a:Which of the following statements are true?
Select one:
 a. Within a specification perspective, derived associations and attributes indicate a constraint between values.
 b. All the given choices
 c. Derived associations and attributes can be found in class diagrams only.
 d. Within a specification perspective, derived associations and attributes indicate an implementation option e.g. optimization and performance considerations.
 
Ans:  b. All the given choices

14. F2168:Which of following is NOT true for behavioural design pattern?
Select one:
 a. Abstract the instantiation process
 b. Concerned with algorithms and assignment of responsibilities between objects
 c. Describe the patterns of communication between objects
 d. All the given choices

Ans:  a. Abstract the instantiation process

15. F2189:Given a language, define a representation for its grammar along with an interpreter that uses the representation to interpret sentences in the language.
Select one:
 a. Use Command
 b. Use Composite
 c. Use Interpreter
 d. Use Facade

Ans :  c. Use Interpreter

16. F2168A:Which of following is NOT true for behavioural design pattern?
Select one:
 a. Neither of the given choices
 b. Behavioral class patterns use inheritance to distribute behavior between classes
 c. Concerned with algorithms and assignment of responsibilities between objects
 d. Both the given choices

Ans: a. Neither of the given choices

17. F2139:What object should have the responsibility, when you do not want to violate High Cohesion and Low Coupling, or other goals, but solutions offered by Exert (for example) are not appropriate?
Select one:
 a. Cohesion
 b. Expert
 c. Pure Fabrication
 d. Protected Variation

Ans:  d. Protected Variation

18. F2102:Package diagrams are designed for:
Select one:
 a. reducing dependency
 b. Organizing a large project into components
 c. All the given choices
 d. assisting deployment

Ans:  b. Organizing a large project into components

19. F2125:To partition the domain model into packages, place elements together that
Select one:
 a. Are weakly associate
 b. Participate in different use case
 c. Are in a class hierarchy together
 d. Are in same subject area
 e. Are in same subject area or Are in a class hierarchy together

Ans:  e. Are in same subject area or Are in a class hierarchy together

20. F2116:The property string specified in operations syntax can include
Select one:
 a. Abstract operation
 b. Exceptions that may arise
 c. Return type
 d. Exceptions that may arise and Abstract operation

Ans:  d. Exceptions that may arise and Abstract operation

21. F2191:______ promotes loose coupling by keeping objects from referring to each other explicitly, and it lets you vary their interaction independently.
Select one:
 a. Mediator
 b. Command
 c. Iterator
 d. Interpreter

Ans:  a. Mediator

22. F2191:______ promotes loose coupling by keeping objects from referring to each other explicitly, and it lets you vary their interaction independently.
Select one:
 a. Mediator
 b. Command
 c. Iterator
 d. Interpreter

Ans:  a. Mediator

23. F2180:How to change our design to reuse the logic to place an order and, at the same time, reducing the probability of being affected by changes in interfaces?
Select one:
 a. Use Facade
 b. Use Composite
 c. Use Observer

Ans: a. Use Facade

24. F2108:Which of the following statement is true about visibility?
Select one:
 a. UML adopts Java's convention
 b. UML uses # for public element
 c. UML uses - for private element
 d. UML uses * for protected element

Ans: c. UML uses - for private element

25.F2174: Which of following is NOT component of Strategy pattern?
Select one:
 a. Strategy
 b. Context
 c. Adaptee
 d. Concrete Strategy

Ans:  c. Adaptee

Software Architectures Quiz - 3 - M Tec - Software Systems - BITS PILANI WILP



Software Architectures Quiz - 3

BITS PILANI- WILP - M.Tec. - Software Systems

1. Which of the following statement is perfectly fitting for Cloud Computing?
Select one:
 a. It’s always going to be less expensive and more secure than local computing
 b. You can access your data from any computer in the world, as long as you have an Internet connection
 c. Only a few small companies are investing in the technology, making it a risky venture.
 d. None of the above

Ans: a. It’s always going to be less expensive and more secure than local computing

2. What is private cloud?
Select one:
 a. A standard cloud service offered via the Internet
 b. A cloud architecture maintained within an enterprise data center
 c. A cloud service inaccessible to anyone but the cultural elite
 d. All of the above

Ans: b. A cloud architecture maintained within an enterprise data center

3. class Asset { ... }
class Player {
Asset asset;
public Player(Assest purchasedAsset) { ... } /*Set the asset via Constructor or a setter*/
}

Which of the following concept of UML is represented via above diagram and code snippet :
Select one:
 a. Generalization
 b. Composition
 c. Dependency
 d. Association

Ans: d. Association

4. A good cloud computing network can be adjusted to provide bandwidth on demand.
Select one:
 a. False
 b. True

Ans: b

5. What is server virtualization?
Select one:
 a. It’s a problem that crops up with cloud computing when servers go offline.
 b. It’s a method of modeling a cloud computing network before you actually build it so that it works properly.
 c. It’s partitioning a normal server so that it behaves as if it’s multiple servers.
 d. All of the above

Ans: c. It’s partitioning a normal server so that it behaves as if it’s multiple servers.

6. In a scenario where House can contain multiple rooms - there is no independent life of room and any room can not belong to two different houses. If we delete the house - room will automatically be deleted. Which of the following concept of UML will best represent the above scenario?
Select one:
 a. Association
 b. Aggregation
 c. Composition
 d. Generalization
 e. None

Ans: c. Composition

7. Which of the following isn't an advantage of cloud?
Select one:
 a. No worries about running out of storage
 b. Immediate access to computing resources
 c. Paying only for what you use
 d. Easier to maintain a cloud network

Ans: d. Easier to maintain a cloud network

8. Network automation is unnecessary in cloud networks.
Select one:
 a. True
 b. False

Ans:  b. False

9. In UML diagrams, relationship between object and component parts is represented by
Select one:
 a. segregation
 b. aggregation
 c. ordination
 d. increment

Ans:  b. aggregation

10 Google Docs’ is example of:
Select one:
 a. Software as a Service
 b. Platform as a Service
 c. Infrastructure as a Service
 d. All of the above

Ans : a. Software as a Service

11. Amazon Web Services is which type of cloud computing distribution model?
Select one:
 a. Software as a service
 b. Infrastructure as a service
 c. Platform as a service
 d. All of the above

Ans :   b. Infrastructure as a service

12. A company is interested in Cloud Computing is looking for a provider who offers set of basic services such as Virtual server provisioning and on demand storage that can be combined into a platform for deploying and running customized application. What type of cloud computing model fits these requirements?
Select one:
 a. SaaS
 b. PaaS
 c. IaaS
 d. All of the above

Ans: c. IaaS

13. Object diagram captures the behavior of a single use case.’ This statement is:
Select one:
 a. False
 b. True

Ans: a. False

14. What is Redundant System?
Select one:
 a. It’s a system that has multiple data backups spread across multiple machines to guard against data loss.
 b. It’s a computer network that duplicates the services already provided by another network.
 c. It’s a computer network struck with a virus that causes it to perform the same operations repeatedly.

Ans: b. It’s a computer network that duplicates the services already provided by another network.

15. ‘B2 is the super class and A2 is the subclass in the relationship.’ Most appropriate UML notation will be:
Select one:
 a. Generalization
 b. Realization
 c. Aggregation
 d. Association

Ans: a. Generalization

16. Which diagram shows the configuration of run-time processing elements of the system?
Select one:
 a. Deployment diagram
 b. ER-diagram
 c. Component diagram
 d. Class diagram

Ans:  a. Deployment diagram

17. ‘Open source development involves making the source code of a system publicly available.’ Statement is:
Select one:
 a. True
 b. False

Ans: a. True

18. In a scenario where a single teacher can not belong to multiple departments, but if we delete the department, the teacher object will not be destroyed. Which of the following concept of UML will best represent the above scenario?
Select one:
 a. Association
 b. Aggregation
 c. Dependency
 d. Generalization
 e. Composition

Ans: b. Aggregation

19. If you are working on real-time process control applications or systems that involve concurrent processing, you would use a
Select one:
 a. Activity diagram
 b. Sequence diagram
 c. Object diagram
 d. Statechart diagram

Ans: d. Statechart diagram

20. Which diagram in UML emphasizes the time-ordering of messages?
Select one:
 a. Collaboration
 b. Class
 c. Activity
 d. Sequence

Ans: d. Sequence   

OBJECT ORIENTED ANALYSIS & DESIGN Comprehensive Examination - Regular Question Paper

SS ZG514: OBJECT ORIENTED ANALYSIS & DESIGN

Comprehensive Examination - Regular Question Paper 2015-2016
MTech Software Systems- BITS WILP



Data Structures and Algorithms Design (SSZG519) Comprehensive Examination - Regular Question Paper 2015-2016 MTech Software Systems- BITS WILP

Data Structures and Algorithms Design (SSZG519)

Comprehensive Examination - Regular Question Paper 2015-2016
MTech Software Systems- BITS WILP


Data Structures and Algorithms Design (SSZG519)- Quiz-2-MTech Software Systems- BITS Pilani-WILP

Data Structures and Algorithms Design (SSZG519)- Quiz- 2
MTech Software Systems- WILP(Work Integrated Learning Programmes) 
Birla Institute of Technology and Science, Pilani



1. Consider the following statements.

i) External nodes of heap does not store any keys or elements
ii) Insertion and deletion in heap can be done in O(logn) time
iii) Min can be found in constant time.

Select one:
a. None of the above
b. i, ii are true and iii is false
c. i is true  and ii, iii are false
d. All of them are true
e. All of them are false

Ans: d. All of them are true

2. Which of the sorting algorithm has same running time for every input of size n?

Select one:
a. Heap sort
b. Insertion Sort
c. Selection Sort
d. None of the above

Ans: c. Selection Sort

3. What is the best case running time for heap sort?

Select one:
a. O(n log n)
b. O(n)
c. None of the above
d. O(log n)
e. O(n²)

Ans: a. O(n log n)

4. Which of the following has more than O(n) space requirement where n is the number of items stored.

Select one:
a. Direct Address Table
b. Look-up Table
c. None of the above
d. Binary Search Tree
e. Log File

Ans: a. Direct Address Table

5. Which of the following statements are true?

i. In linear probing method, there are only m different probe sequences are possible.
ii. In quadratic probing method,  there are m^2 different probe sequences are possible
iii. In double hashing, there are only m different probe sequences are possible.

Select one:
a. None of the above
b. All of them are true
c. i is true  and ii, iii are false
d. All of them are false
e. i, ii are true and iii is false

Ans: e. i, ii are true and iii is false

6. A binary search tree has n internal nodes. The number of external nodes is at most

Select one:
a. n
b. n+1
c. None of these
d. 2n
e. log n

Ans: d. 2n

7. Let T be a binary search tree built by receiving keys 3, 5, 10, 4, 8, 12, 2, 9. The in-order traversal of T is

Select one:
a. Any random order of 3, 5, 10, 4, 8, 12, 2, 9
b. 2, 3, 4, 5, 8, 9, 10, 12
c. 12, 10, 9, 8, 5, 4, 3, 2
d. None of the above
e. 3, 5, 10, 4, 8, 12, 2, 9

Ans: b. 2, 3, 4, 5, 8, 9, 10, 12

8. The worst case running time to find a maximum element in Binary search tree with n items is

Select one:
a. O(1)
b. O(n2)
c. None of the above
d. O(n)
e. O(logn)

Ans: d. O(n)

9. Which of the following  have O(1) running time for insert operation.

Select one:
a. Binary Search Tree, Look-up Table
b. Look-up Table, Hash Table
c. Hash Table, Binary Search Tree
d. Log File, Hash Table
e. None of the above

Ans: d. Log File, Hash Table

10. Keys { 200,205,210,...,600} are stored in a chained hash table.

Let h(k) = k mod 101, alpha be the load factor, and v be the maximum number of keys stored in a single slot. Which of the following is true?

Select one:
a. alpha > 1
b. alpha >v
c. None of the above
d. alpha =v
e. alpha < v

Ans: e. alpha < v

11. Assume the keys are inserted in the following order. 1055, 1492, 1776, 1812, 1918, 1945.
1945 is stored in the slot ________ if linear probing policy is used and h(k) =5*x mod 8 is the auxiliary hash function.

Select one:
a. 0
b. 6
c. None of the above
d. 7
e. 5

Ans: d. 7

12. Keys "63, 73, 43, 98, 110" are stored in a direct address table.

"43"  will be stored in the slot ____________

Select one:
a. 43
b. 44
c. None of the above
d. 3
e. 0

Ans: a. 43

13. Let m is the size of the hash table and n is the number of elements in the hash table. Simple uniform hashing is impossible if

Select one:
a. n>m
b. n=2m
c. n<m
d. n=m
e. None of the above

Ans:  c. n<m

14. When using linear probing policy, the probability of an empty slot gets filled if it is preceded by i full slots.


Select one:
a. 1/m
b. (i+1)/m
c. None of the above
d. (i+1)/n
e. 1/n

Ans: b. (i+1)/m

15. Keys "63, 73, 43, 98, 110" are stored in a direct address table
What is the minimum size of the table?

Select one:
a. None of the above
b. 111
c. 109
d. 4
e. 5

Ans: b. 111

16. Which of the following input sequence stores the items { 1,2,3,4,5,6,7} in a size-balanced binary search tree (that is for every node v the number of nodes in the left subtree of v is same as the number of nodes in right subtree of v)

Select one:
a. 1,2,3,4,5,6,7
b. None of the above
c. 4,2,1,3,6,5,7
d. 4,3,1,2,7,5,6
e. 7,6,5,4,3,2,1

Ans: c. 4,2,1,3,6,5,7

17. Keys { 200,205,210,...,600} are stored in a chained hash table.

Suppose h(k) = k mod 100 is used, which slot will have maximum number of keys?

Select one:
a. 200
b. None of the above
c. 100
d. 99
e. 0

Ans: e. 0

18. Assume the keys are inserted in the following order. 1055, 1492, 1776, 1812, 1918, 1945.
Find the the total number of key comparisons if linear probing policy is used and h(k) = 5*x mod 8 is the auxiliary hash function.


Select one:
a. 6
b. 9
c. None of the above
d. 7
e. 4


Ans: b. 9

19. Assume the keys are inserted in the following order. 1055, 1492, 1776, 1812, 1918, 1945.
1812 is stored in the slot ___________ if double hashing policy is used with h_1(k) = 5*x mod 8 and h_2(x) = 1+ (k mod 7).


Select one:
a. 7
b. 4
c. 3
d. 1
e. None of the above

Ans: c. 3

20. Suppose a simple uniform hashing function is used with chaining. The expected number of key comparisons in successful search is at most __________


Select one:
a. None of the above
b. alpha
c. 1+ alpha/2 - alpha/(2n)
d. 1
e. 1+alpha

Ans: c. 1+ alpha/2 - alpha/(2n)