Searching for "US"

Q:

Pointing to a photograph, a woman says, "This man's son's sister is my mother-in-law." How is the woman's husband related to the man in the photograph ? 

A) Grandson B) Son
C) Son-in-law D) Nephew
 
Answer & Explanation Answer: A) Grandson

Explanation:

Man's son's sister — Man's daughter. So, the man's daughter is the mother of the woman's husband 

Thus, the woman's husband is the grandson of the man in the photograph. 

 

Report Error

View Answer Report Error Discuss

Filed Under: Blood Relations

Q:

In RDBMS, what is the efficient data structure used in the internal storage representation?

A) Stack B) Queue
C) B+ tree structure D) AVL tree Structure
 
Answer & Explanation Answer: C) B+ tree structure

Explanation:

B+ tree. Because in B+ tree, all the data is stored only in leaf nodes, that makes searching easier. This corresponds to the records that shall be stored in leaf nodes

Report Error

View Answer Report Error Discuss

Filed Under: Java

Q:

Should individuals/industries having treasures of national significance like nobel prizes, hand them over to central goverment for their safe custody? 

Arguments:

1. Yes. They d not have enough resources to protect them

2. No. These are the properties of Individuals /Industries who win them. So, they should be there int heir custody

A) Only 1 is true B) Only 2 is true
C) Either 1 or 2 is true D) Neither 1 nor 2 is true
 
Answer & Explanation Answer: B) Only 2 is true

Explanation:

The awards are given to the individual perfection and excellence.So only 2 holds

Report Error

View Answer Report Error Discuss

Q:

What methodologies have you used to develop test cases?

Answer

 I have used following 4 types of Methodologies: 


 


1. Boundary value analysis   


2. Equivalence partitioning   


3. Error guessing   


4. Cause effect graphing

Report Error

View answer Workspace Report Error Discuss

Subject: Software Testing

Q:

What are the types of Collision Resolution Techniques and the methods used in each of the type?

Answer

Open addressing (closed hashing),


The methods used include: Overflow block,


 Closed addressing (open hashing)


The methods used include: Linked list, Binary tree…

Report Error

View answer Workspace Report Error Discuss

Subject: Java

Q:

What is the value of a testing group? How do you justify your work and budget?

Answer

Testing is a process used for revealing defects in s/w and for establishing that the s/w has attained a specific degree of quality.


The s/w testing group’s main objective is to ensure that the s/w is doing what it is supposed to do as well as the s/w is not doing what it is not supposed to do. With this objective, it is clear that it is necessary to have a separate group for testing the s/w other than the group which developed it.


Also, bugs in the s/w can cause severe monetary as well as other loss to the organization. So it is important to allocate some budget for the testing group.

Report Error

View answer Workspace Report Error Discuss

Subject: Software Testing

Q:

Should high chimneys be installed in industries? 

Arguments:

1. Yes. It reduces pollution at ground level

2. No. It increments pollution in upper atmosphere

A) Only 1 is true B) Only 2 is true
C) Either 1 or 2 is true D) Neither 1 nor 2 is true
 
Answer & Explanation Answer: A) Only 1 is true

Explanation:

Pollution at ground level is the most hazardious in the way of being injuriousto human and animal life.So,argument 1 alone holds

Report Error

View Answer Report Error Discuss

Q:

What are the best way to prevent a computer virus from entering your computer?

Answer

1.Logout of your computer each time you have finished using it


2.Install and use anti-virus software on your computer 


3.Do not use emails on your machine


4.Make sure all your files are safely stored to your floppy disks

Report Error

View answer Workspace Report Error Discuss

Subject: Hardware