Friday, September 26, 2008

C-programming SCDL Assignment

Multiple Choice Single Answer
Question
When the method is chosen and performed on the data, the object status changes. The static object assumes :-
Correct Answer Dynamic state
Your Answer Static state
True/FalseQuestion
Functions are written to avoid rewriting the same section of code which requires oftenly.
Correct Answer TrueYour Answer
TrueMultiple Choice Single AnswerQuestion
Use case defines and describes what happens in the system in logical order. This is termed as :-Correct Answer System behaviour
Your Answer System designing
Multiple Choice Single AnswerQuestion
Due to complex interactions, interaction diagrams are usually difficult to draw & read. The remedy for this is :-
Correct Answer To split the use cases into smaller activities or tasks with specifi goals
Your Answer To split the use cases into smaller activities or tasks with specifi goals
True/FalseQuestion
A structure variable can be passed to a function.
Correct Answer True
Your Answer True
Select The BlankQuestion
The address of the zeroth element can also be passed by just passing the ________ of the array.
Correct Answer Name
Your Answer Name
Select The BlankQuestion The link between the program and the operating systme is a structure called ________
Correct Answer FILE
Your Answer stream
Multiple Choice Multiple AnswerQuestion
When an array has both rows and columns it is called as:-
Correct Answer 2-D array , Matrix
Your Answer 2-D array
True/FalseQuestion
When function is called by itself, it is known as recursive function.
Correct Answer True
Your Answer True
Select The BlankQuestion
________ is an assignment operator.
Correct Answer =
Your Answer ==
Multiple Choice Multiple AnswerQuestion
Two dimensional array has :-
Correct Answer Rows , Columns
Your Answer Rows , Columns
Multiple Choice Single AnswerQuestion
A single dimensional array has :-
Correct Answer Only rows
Your Answer Dimension never refers to no. of rows and columns
Select The BlankQuestion Operation between ________ and integer always yields an integer result
Correct Answer an integer
Your Answer an integer
Multiple Choice Single AnswerQuestion
Studying system domain, identifying classes & objects with their properties and expressing them with eight notations/diagrams is called as
Correct Answer Object modeling of system.
Your Answer Object modeling of system.
True/FalseQuestion
There is no three dimensional array
Correct Answer False
Your Answer True
Multiple Choice Single AnswerQuestion
Which function is used to close a file?
Correct Answer fclose
Your Answer fclose
Multiple Choice Single AnswerQuestion
In logical AND :-
Correct Answer Both the conditions have to be TRUE
Your Answer Both the conditions have to be TRUEMultiple
Choice Single AnswerQuestion
The language used by UA to develop Object Oriented systems is :-
Correct Answer UML
Your Answer UML
Multiple Choice Single AnswerQuestion
A sequence diagram shows an interaction arranged in time sequence in its :-
Correct Answer Logical order
Your Answer Logical order
Multiple Choice Single AnswerQuestion
In this the condition is specified at the beginning of the loop :-
Correct Answer while
Your Answer while
Multiple Choice Multiple AnswerQuestion
Which of the following are basic data types in C?
Correct Answer int , float , char
Your Answer int , float , char
Multiple Choice Single AnswerQuestion
Use case steps are executed in :-
Correct Answer Logical order
Your Answer Serial orderMatch
The FollowingQuestionCorrect AnswerYour AnswerAccess Layer under OOAObjects whose role is to communicate to data storage.Objects whose role is to communicate to data storage.Layered architecture under TSDUser interface tightly coupled with dataObjects with which user interacts.Business Layer under OOAObjects that represent business with data and behaviour.Objects that represent business with data and behaviour.UI layer under OOAObjects with which user interacts.User interface tightly coupled with data
Multiple Choice Multiple AnswerQuestion
What will be the output of the following main(){ char c='d';float f=1; printf("%c", c); printf("%f", c * f);}
Correct Answer d , 100.000000
Your Answer d , 100.000000
Multiple Choice Multiple AnswerQuestion
Which tasks are performed on opening a file in read mode?
Correct Answer searches a file on the disk , loading a file into memory in presense and returning NULL in case of absent , setting up a character pointer to the first character
Your Answer searches a file on the disk , loading a file into memory in presense and returning NULL in case of absent , setting up a character pointer to the first characterMultiple Choice Multiple AnswerQuestion
Which of the following functions are used to set all / n characters of a string to a given character?Correct Answer strset , strnset
Your Answer strchr
Multiple Choice Single AnswerQuestion
This funciton is used to convert a string to lowercase :-
Correct Answer strlwr
Your Answer strlwr
Multiple Choice Multiple AnswerQuestion
Which of the following functions are used for formatted input/output operations?
Correct Answer printf , scanf
Your Answer printf , scanf , getch()
Select The BlankQuestion
Any C statement ends with ________.
Correct Answer ;
Your Answer ;
Multiple Choice Single AnswerQuestion
The approach of object oriented analysis and design that centers on understanding how the system is actually used is :-Correct Answer Use-case-driven designYour Answer Object oriented systemMultiple Choice Single AnswerQuestion Which funciton is used to append first n characters of a string at the end of another?Correct Answer strncatYour Answer strncatMultiple Choice Single AnswerQuestion UML uses :Correct Answer OCL [ object Constraint Language ]Your Answer XML [ Extended mark up language ]True/FalseQuestion Only one comment can be given in a C programCorrect Answer FalseYour Answer FalseMultiple Choice Single AnswerQuestion It is an idendical function to strcmpi function :-Correct Answer stricmpYour Answer stricmpSelect The BlankQuestion ________ means type of return value of a function.Correct Answer prototypeYour Answer returntypeTrue/FalseQuestion strstr() finds number of occurences of a give string in another string.Correct Answer FalseYour Answer FalseMatch The FollowingQuestionCorrect AnswerYour Answerputch()displays a single characterdisplays a single charactergetche()echoes a typed characterechoes a typed character, but an enter key should be hitted.getch()does not echo a typed characterechoes a typed charactergetchar()echoes a typed character, but an enter key should be hitted.accepts a stringMultiple Choice Single AnswerQuestion Individual element in the array can be referred with :-Correct Answer SubscriptYour Answer PointerSelect The BlankQuestion ________ is logical OR operatorCorrect Answer Your Answer Select The BlankQuestion In call by reference of passing array elements, the function argument is always ________Correct Answer PointerYour Answer PointerMultiple Choice Multiple AnswerQuestion What will be the output of the following main(){ int i = 1; char c='A'; printf("%d",i * c); printf("%f",i * (c+2));}Correct Answer floating point error , 65Your Answer 65 , 67.000000True/FalseQuestion The use case may begin with no precondition or with some preconditions.Correct Answer TrueYour Answer FalseTrue/FalseQuestion If the value of a formal argument is changed in the called funciton, the corresponding changes take place in the calling funciton.Correct Answer FalseYour Answer FalseMultiple Choice Multiple AnswerQuestion Which of the following operators have 1st priority in operations?Correct Answer * , / , %Your Answer * , / , %True/FalseQuestion Real falls under secondary constantCorrect Answer FalseYour Answer FalseSelect The BlankQuestion The address of a structure ________ be passed to a function.Correct Answer canYour Answer canSelect The BlankQuestion After goto, ________ has to be mentioned to pass the control.Correct Answer label nameYour Answer label name

Sunday, September 21, 2008

How to use System Restore to log on to Windows Vista when you lose access to an account

INTRODUCTION
This article describes how to use the System Restore feature to log on to Windows Vista when you lose access to an account.

To do this, there must be a System Restore point at which the logon was successful.
1.
Insert the Windows Vista DVD, and then restart the computer.
2.
When you receive the following message, press any key:
Press any key to boot from CD or DVD.
3.
Set the following preferences, and then click Next:

Language to install

Time and currency format

Keyboard or input method
4.
Click Repair your computer, select the operating system that you want to repair, and then click Next.
5.
Click System Restore, and then click Next.
6.
Click the restore point that you want to use, and then click Next.Note Click a restore point that will return the computer to a state where the logon is successful. After you use the System Restore feature, reinstall any programs or updates that may be removed. You will not lose any personal documents. However, you may have to reinstall programs. You may also have to reset some personal settings.
7.
Confirm the disks that you want to restore, and then click Next.
8.
Click Finish, and then click Yes when you are prompted.
9.
When the System Restore process is complete, click Restart to restart the computer.
10.
After the computer restarts, click Close to confirm that the System Restore process has finished successfully.
11.
Use an appropriate method to log on. For example, log on by using an older password, or log on by using another computer account.After you log on, you must follow additional steps, depending on the scenario that you experience.

Wednesday, September 17, 2008

The Hibernate option is not available in Windows Vista

Cause:
The Disk Cleanup Utility and has been used to delete the Hibernation File Cleaner,hibernation feature is disabled.
Symptoms:
Solution:
use the PowerCfg command-line tool to enable the hibernation feature
Details:
To resolve this issue, use the PowerCfg command-line tool to enable the hibernation feature. To do this, follow these steps.
1. Click Start, type command in the Start Search box, right-click Command Prompt in the Programs list, and then click Run as administrator If you are prompted for an administrator password or confirmation, type your password or click Continue.
2. At the command prompt, type powercfg /hibernate on.

How to manually remove XP Antivirus 2008

SUMMARY
Antivirus 2008 is counterfeit anti-virus software. Antivirus 2008 usually installed itself onto your PC without your permission, through Trojan and virus. Antivirus 2008 will display fake system alerts or fake security alerts to trick user to buy the Paid Version of Antivirus 2008 (You could get Antivirus 2008 by opening an infected message in myspace or installing infected or fake video codec from video sharing websites.)
Step 1:- Stop unwanted process running in background.
Click Start then Run and type taskmgr.exe.
Click on Process tab in Task Manager and locate the following Image name(s).
rhccu2j0ejd.exe
lphc9u2j0ejde.exe
Antvrs.exe
AntvrsInstall.exe
AntvrsInstall[1].exe
Win Antivirus 2008.exe
av2008xp.exe
Highlight the Image name and Click End Process to stop.
Close the Task Manager.
Step 2:- Delete the suspicious file(s) or folder(s) from the computer
Click on Start and Run, type system, press Enter.
Locate the following file(s) and Delete.
lphc9u2j0ejde.exe
blphc9u2j0ejde.scr
Click on Start and Run, type C:\Program Files, press Enter.
Locate the following folder and Delete.
rhc75dj0e1an
Close the Window.
Step 3:- Uninstall the Suspicious program from the computer.
Click on Start and Run, type appwiz.cpl, press Enter.
Locate Antivirus XP 2008 in Add and Remove Program.
Click on Remove (Uninstall) button.
Close Add or Remove program.
Restart the computer.
Step 4:- Manual Removal of suspicious entries from Registry.CAUTION: Changing the Registry incorrectly could cause your comuter to stop working. Please make sure to create backup of registry or create system point before proceeding.
Click Start, Click run and type regedit.
Create a registry backup.Note: Some of these Registry keys and values may be random.
Locate the following registry keys, right click and Delete. HKEY_LOCAL_MACHINE\SOFTWARE\rhcnkrj0etfg HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\rhcnkrj0etfgHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion 'rhcnkrj0etfg'HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform 'AntivirXP08'HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 'SMrhcnkrj0etfg'
Restart the computer.