Technical Questions

Q:

Can I increase the size of a dynamically allocated array? < Yes / No> if yes, how?

Answer

Yes, using the realloc() function as shown below:


main()


{


        int *p;


        p = ( int *) malloc (20) ;


        t = p;


        t = (int *) realloc ( p, 40);


        if ( t == NULL )


        Printf (" Cannot reallocate, leaves previous allocated region unchanged ");


       else


       {


              if ( p ==t )


              ;  / * the array expanded at the same region */


             else


            { 


                 free ( p ); / * deallocate the original array */


                 p = t;  /* set p to newly allocated region */


             }


      }


}  

Report Error

View answer Workspace Report Error Discuss

Subject: Programming

1 4615
Q:

Describe how to perform Risk Analysis during software testing.

Answer

While a test plan is being created, risks involved in testing the product are to be taken into consideration along with possibility of their occurrence and the damage they may cause along with solutions; if any. Detailed study of this is called as Risk Analysis.


Some of the risks could be:


New Hardware 


New Technology 


New Automation Tool 


Sequence of code delivery 


Availability of application test resources 


Identify and describe the risk magnitude indicators: High, Medium and Low


High magnitude means the effect of the risk would be very high and non-tolerable. Company may face severe loss and its reputation is at risk. Must be tested.


Medium: tolerable but not desirable. Company may suffer financially but there is limited liability or loss of reputation. Should be tested.


Low: tolerable. Little or no external exposure. Little or no financial loss. Company’s reputation unaffected. Might be tested.


Three perspectives of Risk Assessment: Effect, Cause and Likelihood.


To assess risk by Effect, identify a condition, event or action and try to determine its impact.


To asses risk by Cause is opposite of by Effect. Begin by stating an undesirable event or condition and identify the set of events that could have permitted the condition to exist.


To asses risk by Likelihood is to determine the probability that a requirement will not be satisfied.

Report Error

View answer Workspace Report Error Discuss

Subject: Software Testing

0 4615
Q:

Can ROM be used as stack?

Answer

ROM cannot be used as stack because it is not possible to write to ROM.

Report Error

View answer Workspace Report Error Discuss

Subject: Hardware

6 4571
Q:

Where does the Real mode on the CPU come from?

Answer

The original 8086, which only had 1 MB of memory. This megabyte is split into low memory for IRQ tables, application memory and high memory.

Report Error

View answer Workspace Report Error Discuss

Subject: Hardware

3 4548
Q:

The coding or scrambling of data so that humans cannot read them, is known as _____.

A) Compression B) Encryption
C) Ergonomics D) Biometrics
 
Answer & Explanation Answer: B) Encryption

Explanation:

The coding or scrambling of data so that humans cannot read them is known as encryption.

Report Error

View Answer Report Error Discuss

Filed Under: Programming

9 4517
Q:

 In a 1:N relationship, the foreign key is placed in:

A) the parent table. B) the child table.
C) either table without specifying parent and child tables. D) either the parent table or the child table.
 
Answer & Explanation Answer: B) the child table.

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: Database

0 4517
Q:

What is 1st / 2nd / 3rd / 4th generation processor?

Answer

The processor made of PMOS / NMOS / HMOS / HCMOS technology is called 1st / 2nd / 3rd / 4th generation processor, and it is made up of 4 / 8 / 16 / 32 bits.

Report Error

View answer Workspace Report Error Discuss

Subject: Hardware

3 4486
Q:

Which layer 4 protocol is used for a Telnet connection?

A) UDP B) IP
C) TCP D) TCP/IP
 
Answer & Explanation Answer: C) TCP

Explanation:

Telnet uses TCP at layer 4. It uses IP at layer 3. We know that Telnet uses TCP/IP protocol, but in the question, it is asked specifically at layer 4 what is used in Telnet. So it is TCP at layer4 and IP at layer 3.

Report Error

View Answer Report Error Discuss

0 4479