CSC Pattern

28
CSC Test Paper: 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | >> PlacementWeek Papers Home >> Placementweek >> CSC >> Test Paper :3 This CSC Paper is viewed by 1803 times Company List Test Paper :3 Paper Type : Whole Testpaper Test Date : 11 June 2010 Test Location : KONGU ENGG COLL, ERODE Posted By : KAARTHIK KUMAR CSC PREPARATION GUIDE Hi Friends, This s Kaarthik kumar from Hindusthan College of Engineering & Technology, Coimbatore. This CSC preparation guide is more than enough to get into CSC. If not possible to go thru d entire page, ATLEAST GO THRU D TECHNICAL WRITTTEN SECTION! CSC has got 5 rounds to go through Aptitude written Technical Written & Essay GD/JAM Technical HR Personal HR CSC ROUND1: APTITUDE R.s AGGARWAL Book is more than enough to clear this round. So keep practicing mainly on following areas Averages &Percentages Profit & loss Ratios & Ages Time & Distance Probability n combinations Analogies Sudoku type

Transcript of CSC Pattern

Page 1: CSC Pattern

CSC Test Paper: 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | >>

PlacementWeek PapersHome >> Placementweek >> CSC >> Test Paper :3

This CSC Paper is viewed by 1803 times Company List

Test Paper :3

Paper Type : Whole TestpaperTest Date : 11 June 2010

Test Location : KONGU ENGG COLL, ERODEPosted By : KAARTHIK KUMAR

CSC PREPARATION GUIDEHi Friends,This s Kaarthik kumar from Hindusthan College of Engineering & Technology,Coimbatore. This CSC preparation guide is more than enough to get into CSC. If notpossible to go thru d entire page, ATLEAST GO THRU D TECHNICAL WRITTTENSECTION!CSC has got 5 rounds to go through

Aptitude written Technical Written & Essay GD/JAM Technical HR Personal HR

CSC ROUND1: APTITUDER.s AGGARWAL Book is more than enough to clear this round. So keep practicingmainly on following areas Averages &Percentages Profit & loss Ratios & Ages Time & Distance Probability n combinations Analogies Sudoku type

Page 2: CSC Pattern

TEST-11)There are 3 piles of books on the table you need to arrange them in the self such that 1st bookof each pile gets placed on the self,what is the possible no of arrangements:a)12! b)12C3 * 9C4 c)12^12 d)none

2)Price of a book increases 15% successively (2times) what is the new price of the book morecompared to that of the old price:a)32.25% b)23.34% c)36% d)39%

3)There are 3 mixtures when mixed in the ratio of 3:4:5 price was 240.When mixed with 6:4:9price was 340.what's the price when mixed in 5:6:8 ration price is_________

4)One question based on Venn Diagram.75 total no of students.25 don't know typing,50 knowshorthand.then question were based on find no of students dont knwing both etc.

5)One person has 2 child.At least one of them was a girl.Then the Probability that 2 of the aregirl is_____a)1/2 b)1/4 c)0.36 d)1

6)Swati when get married to jayanta her age was 3/4 th of her husband's age.After 12 years herage became 5/6 th of her husband's age.Then what's the age of swati when she got married??

7)y=MAX((3x+y),(11x-y))then what's the value of y???

8)some passages were there based on illegal drugs smuggling and based on this some questions.

9)Some Analogy Questions: some i do remeber like SYCOPHANTIC: FLATTER SILENT:QUIET others i dont remember.

10)Some questions based onif f(x,0)=x+1f(o,y)=yf(x,y)=f(f(x,0),f(2*x-1))

then find f(1,1),f(2,3),f(3,0) etc and some relations based on this very easy11)One question based on the average speed12)one question based on Sudoku type very easy,u can do it in one attempt

TEST-2

Page 3: CSC Pattern

1. Sudoku. you need to fill-up the table using the hint(addition of row, column, diagonal =15) and availablecell values. its easy. if you figure it out, you can answer(very easy)five questions correctly.2.If y=MAX((3x+y),(11x-y)) then what's the value of y?3.1 Que. on book arrangement. if u find out the series you can ans five ques. correctly.4.2 Ques. on Probability, ages5. Ages6. Venn diagram --> Out of 100 students, 45 do not know typing, 60 know shorthand. 25 know both 6 do notknow anything then find out haw many know both?7. if f(y,0)=y+1, f(o,x)=x; f(y,x)=f(f(y,0),f(2*y-1)) then find f(1,1),f(2,3),f(3,0); 3 question based on this. Itsvery very simple...8. 1 Ques on Percentage : Price of a book increases 15% successively (2times) what is the new price of thebook more compared to that of the old price:a)32.25% b)23.34% c)36% d)39%9. 2 Questions based on Time and speed.10. Passage and questions...11.question on synonyms and antonymsTEST-3

3 ques on time speed distance....there are 2 stataions A nd B....the distance between themis 150 km....slow train covers dat distance in 2.5 hrs nd fast train in 1.5 hrs....now slow train leavesstation A half an hourbefor fast train....after wat time wud dey meet....nd at wat distance from(language wasdifferent)dere was 1 ques on profit....calculate d CP of 1 hen nd den SP of 1 hen after dat profit on 1hen....den anamount of profit was given u hd 2 calculate d no. of hens dat give dat amount of profit2 ques on jumbled up sentences u hd to form a meaningful paragraph out of dem3 ques on a paragraph...dere r 4 ppl, 1 is a dancer 1 is a painter 1 is a writer nd 1 is asinger....u hd 2indentify which is a dancer which a singer.....

Page 4: CSC Pattern

2 ques on...dere r 3 frens nd dey hv sum marbles wid dem...now x gives to y nd z amountof marbleswhich dey already hv...nd den z gives 2 x nd y amount of marbles which dey alreadyhv...now deyhv equal no. of marbles...also total no. of marbles was given...u hv 2 make equations ndsolve dis ques

TEST-4

1. A 3*3 blck is given and should be filled frm 1...9 they gave 3 numbers nd whencoundted horizontally,vertically and diagnally they should sum 15. they gave nearly 7questions on this blk really easy if u practice sudoku.2. If x,y are 2 positive integers and they are derived as follows:f(0,y)=y+1.f(x,0)=xf(x,y)=f(x-1,f(0,y-1))f(0,0)=1then wats the value of f(3,0),f(1,2) etc nd hw f(1,2) can be derived in termsf(0,0),f(0,2),f(3,0)there 5 questions relating to this.3. 1question on ages i dont properly remember the questions4.7 questions on anlogy,fill in the blanks5.deriving conclusions 10 questionsTEST-5apti/quant/logicalit was a very tough test i hav given test of 6-7 companies but csc test was toughestther vr linear equations questions wich vr not at all easyquestions on sets-permutaion combination-arrangement logical ques

Page 5: CSC Pattern

- distance speed ques- time question-ques like 90% of 1 litree milk and 60% of 40 litre water result in 67% mixture so wht iscompostion of milk in litres?-ques like f has pririty over h and g has priortiy over i so now 4-5 ques based on this-length is increased by 5 and breadth is decreased ny 10 thn total is 200m and whn lengthdecreasd by 5 and breadth increasd by 15 thn total is 75 m, fing length-a>b>c so wich is truab>ac or a/b>b/c or som more options-6 girls and 6 boys, all boys and all girls will sit together so no of possible ways- cow is tied with rope from two sides 40 40 cm and forming an angle 24degree size ofrope is 15cm so how much area in wich cow can graze-7 orange and 5 apples cost 16.90 rs and 5 oranges and 7 apples cost 2.60 so no of oranges-ther is a place wher ppl r either no or yes. if ram sain 2and 2 makes four thn he is yes andsimilarly if mohan said 2 -1 is 2 thn he is no. so now ques based on this- paragraph given and u hav to conlude or find contradicting lineand rest all questions vr very tough so i dont remember thm at allCSC ROUND2: TECHNICAL WRITTENFor this round these patterns are more than enough only same or similar questionswill come. So prepare this thoroughly.TEST-11.------- is associated with webservices.a) WSDL b) WML c) web sphere d) web logicans:a2.any large single block of data stored in a database, such as a picture or sound file, whichdoes not include record fields, and cannot be directly searched by the database’s searchengine.

Page 6: CSC Pattern

a) TABLE b) BLOB c) VIEW d) SCHEMEans:b3.A reserved area of the immediate access memory used to increase the running speed ofthe computer program.a) session memory b) bubble memory c) cache memory d) shared memoryans: c4.a small subnet that sit between a trusted internal network and an un trusted externalnetwork, such as the public internet.a) LAN b) MAN c) WAN d) DMZans: c5.technologies that use radio waves to automatically identify people or objects,which isvery similar to the barcode identification systems,seen in retail stores everyday.a)BLUETOOTH b) RADAR c)RSA SECURE ID d)RFIDans: d6.main(){float fl = 10.5;double dbl = 10.5if(fl ==dbl)printf(“UNITED WE STAND”);elseprintf(“DIVIDE AND RULE”)}what is the output?a)compilation error b)UNITED WE STAND c)DIVIDE AND RULE d)linkage error.ans: b7.main(){static int ivar = 5;printf(“%d”,ivar--);if(ivar)main();}what is the output?a)1 2 3 4 5 b) 5 4 3 2 1 c)5 d)compiler error:main cannot be recursive function.ans b8.main(){extern int iExtern;iExtern = 20;printf(“%d”,iExtern);

Page 7: CSC Pattern

}what is the output?a)2 b) 20 c)compile error d)linker errorans d9..#define clrscr() 100main(){clrscr();printf(“%d\n\t”, clrscr());}what is the output?a)100 b)10 c)compiler errord)linkage errorans: a10.main(){void vpointer;char cHar = ‘g’, *cHarpointer = “GOOGLE”;int j = 40;vpointer = &cHar;printf(“%c”,*(char*)vpointer);vpointer = &j;printf(“%d”,*(int *)vpointer);vpointer = cHarpointer;printf(“%s”,(char*)vpointer +3);}what is the output?a)g40GLE b)g40GOOGLE c)g0GLE d)g4GOOans: a11.#define FALSE -1#define TRUE 1#define NULL 0main() {if(NULL)puts(“NULL”);else if(FALSE)puts(“TRUE”);elseputs(“FALSE”);}what is the output?a)NULL b)TRUE c)FALSE d)0ans: b12.main() {

Page 8: CSC Pattern

int i =5,j= 6, z;printf(“%d”, i+++j);}what is the output?a)13 b)12 c)11 d)compiler errorans: cIf there is 5+++++ symbol then it will show error as Lvalue required13.main() {int i ;i = accumulator();printf(“%d”,i);}accumulator(){_AX =1000}what is output?a)1 b)10 c)100 d)1000ans: d14.main() {int i =0;while(+(+i--)!= 0)i- = i++;printf(“%d”,i);}what is the output?a)-1 b)0 c)1 d)will go in an infinite loopans: a15.main(){int i =3;for(; i++=0;)printf((“%d”,i);}what is the output?a)1b)2c)1 2 3d)compiler error:L value required.ans: d16.main(){int i = 10, j =20;j = i ,j?(i,j)?i :j:j;printf(“%d%d”,i,j);}what is the output?a)20 20 b)20 10 c)10 20 d)10 10

Page 9: CSC Pattern

ans: 10 1017.main(){extern i;printf(“%d\t”,i);{int i =20;printf(“%d\t”,i);}}what is output?a) “Extern valueof i “ 20 b)Externvalue of i”c)20d)linker Error:unresolved externalsymbol ians: d18.int DIMension(int array[]){return sizeof(array/sizeof(int);}main(){int arr[10];printf(“Array dimension is %d”,DIMension(arr));}what is output?a)array dimension is 10 b)array dimension is 1 c) array dimension is 2 d)array dimensionis 5ans: a19.main(){void swap();int x = 45, y = 15;swap(&x,&y);printf(“x = %d y=%d”x,y);}void swap(int *a, int *b){*a^=*b, *b^=*a, *a^ = *b;what is the output?a) x = 15, y =45 b)x =15, y =15 c)x =45 ,y =15 d)x =45 y = 45ans: a20.main(){int i =257;int *iptr =&i;printf(“%d%d”,*((char*)iptr),*((char *)iptr+1));}what is output?a)1, 257 b)257 1c)0 0d)1 1asn: d21.main(){

Page 10: CSC Pattern

int i =300;char *ptr = &i;*++ptr=2;printf(“%d”,i);}what is output?a)556 b)300 c)2 d)302ans: a22.#includemain(){char *str =”yahoo”;char *ptr =str;char least =127;while(*ptr++)least = (*ptrprintf(“%d”,least);}what is the output?a)0 b)127 c)yahoo d)yAns-023.Declare an array of M pointers to functions returing pointers to functions returingpointers to characters.a)(*ptr[M]()(char*(*)()); b)(char*(*)())(*ptr[M])() c)(char*(*)(*ptr[M]())(*ptr[M]()d)(char*(*)(char*()))(*ptr[M])();24.void main(){int I =10, j=2;int *ip = &I ,*jp =&j;int k = *ip/*jp;printf(“%d”,k);}what is the output?a)2 b)5 c)10 d)compile error: unexpected end of file in comment started in line 4ans: b25.main(){char a[4] =”GOOGLE”;printf(“%s”,a);}what is the output?a)2 b) GOOGLE c) compile error: too many initializers d) linkage error.ans: c26.For 1MB memory, the number of address lines required

Page 11: CSC Pattern

a)12 b)16 c)20 d)32ans: 2027.There is a circuit using 3 nand gates with 2 inputes and 1 output,f ind the output.a) AND b) OR c) XOR d) NANDans:b28.what is done for push operationa) SP is incremented and then the value is stored.b) PC is incremented and then the value is stored.c) PC is decremented and then the value is stored.d) SP is decremented and then the value is stored.ans: a29.Memory allocation of variables declared in a program is ------a) Allocated in RAMb) Allocated in ROMc) Allocated in stackd) Assigned in registers.ans: c30.What action is taken when the processer under execution is interrupted by TRAP in8085MPU?a) Processor serves the interrupt request after completing the execution of the currentinstruction.b) processer serves the interrupt request after completing the current task.c) processor serves the interrupt immediately.d) processor serving the interrupt request depent deprnds upon the priority of thecurrent task under execution.ans: a31.purpose of PC (program counter)in a microprocessor is ----a) To store address of TOS(top of stack)b) To store address of next instructions to be executedc) count the number of instructionsd) to store the base address of the stack.ans: b32. conditional results after execution of an instruction in a microprocess is stored ina) register b) accumulator c) flag register d) flag register part of PSW (program statusword)ans: c33.The OR gate can be converted to the NAND function by adding----gate(s)to the input ofthe OR gate.a) NOT b) AND c) NOR d) XORans: a

Page 12: CSC Pattern

34.In 8051microcontroller ,------has a dual function.a) port 3 b) port 2 c) port 1 d) port 0ans; b35.An 8085 based microprocessor with 2MHz clock frequency,will execute the followingchunk of code with how much delay?MVI B,38HHAPPY: MVI C, FFHSADDY: DCR CJNZ SADDYDCR BJNC HAPPYa) 102.3 b)114.5 c)100.5 d)12036. In 8085 MPU what will be the status of the flag after the execution of the followingchunk of code.MVI B,FFHMOV A,BCMAHLTa)S = 1, Z = 0, CY = 1 b)S = 0, Z = 1, CY = 0 c) S = 1, Z = 0, CY = 0 d)S = 1, Z = 1 ,CY = 137.A positive going pulse which is always generated when 8085 MPU begins the machinecycle.a) RD b) ALE c) WR d) HOLDans: b38.when a ----- instruction of 8085 MPU is fetched , its second and third bytes are placedin the W and Z registers.a) JMP b) STA c) CALL d) XCHGans: d(not sure)39.what is defined as one subdivision of the operation performed in one clock period.a) T- State b) Instruction Cycle c) Machine Cycle d) All of the aboveans: a40.At the end of the following code, what is the status of the flags.LXI B, AEC4HMOV A,CADD HLTa) S = 1, CY = 0, P = 0 , AC = 1 b) S =0 , CY = 1, P = 0,AC = 1 c) S = 0, CY = 1, P = 0 , AC = 1 d)S = 0, CY = 1, P = 1 , AC = 141.In 8051 micro controller what is the HEX number in the accumulator after theexecution of the following code.MOV A,#0A5HCLR CRRC A

Page 13: CSC Pattern

RRC ARL ARL ASWAP Aa)A6 b)6A c)95 d)A5.ans: a42.The Pentium processor requires ------------ volts.a)9 b)12 c)5 d)24ans; b43. The data bus on the Celeron processor is-------bits wide.a)64 b)32 c)16 d)128.ans: a44.K6 processora) Hitachi b) toshiba c) zilog d) AMD. ans: d45. What is the control word for 8255 PPI,in BSR mode to set bit PC3.a)0EH b)0FH c)07H d)06H. ans:c46.The repeated execution of a loop of code while waiting for an event to occur is called ---------.The cpu is not engaged in any real productive activity during this period,and theprocess doesn’t progress towards completion.a) dead lock b) busy waiting c) trap door d) none.ans: b47. Transparent DBMS is defined asa) A DBMS in which there are no program or user access languages. b) A DBMS which hasno cross file capabilities but is user friendly and provides user interface management. c)A DBMS which keeps its physical structure hidden from user d) none.ans: c48.Either all actions are carried out or none are.users should not have to worry about theeffect of incomplete transctions.DBMS ensures this by undoing the actions of incompletetransctions.this property is known asa) Aggregation b) atomicity c) association d) data integrity.Ans-b49.------ algorithms determines where in available to load a program. common methodsare first fit,next fit,best fit.--------- algorithm are used when memory is full , and oneprocess (or part of a process) needs to be swaped out to accommodate a newprogram.The ------------- algorithm determines which are the partions to be swaped out.a) placement, placement, replacementb) replacement, placement, placementc) replacement, placement, replacement

Page 14: CSC Pattern

d) placement, replacement, replacement50.Trap door is a secret undocumented entry point into a program used to grant accesswithout normal methods of access authentication. A trap is a software interrupt,usuallythe result of an error condition.a)true b)false.ans: b51. Given a binary search tree,print out the nodes of the tree according to post ordertraversal.4/ \2 5/ \1 3a)3,2,1,5,4. b)1,2,3,4,5. c)1,3,2,5,4. d)5,3,1,2,4.52.which one of the following is the recursive travel technique.a)depth first search b)preorder c)breadth first search d)none. Ans-a53.which of the following needs the requirement to be a binary search tree.a) 5/ \2 7/1b)5/ \6 7c) 5/ \2 7/\1 6d) none.54.in recursive implementations which of the following is true for saving the state of thestepsa) as full state on the stackb) as reversible action on the stackc) both a and bd) none

Page 15: CSC Pattern

Ans-c55.which of the following involves context switcha)previliged instructionb)floating point exceptionc)system callsd)alle)noneAns-c56.piggy backing is a technique fora)acknowledgeb)sequencec)flow controld)retransmissionans: c57. a functional dependency XY is ___________dependency if removal of any attribute Afrom X means that the dependency does not hold any morea)full functionalb) multi valuedc)single valuedd)noneAns-a58)a relation schema R is in BCNF if it is in ___________and satisfies an additionalconstraints that for every functional dependency XY,X must be a candidate keya)1 NFb)2 NFc)3 NFd)5 NFAns-c59) a _________sub query can be easily identified if it contains any references to the parentsub query columns in the _________ clauseA) correlated ,WHEREb) nested ,SELECTc) correlated,SELECTd) noneAns-a60) hybrid devise that combines the features of both bridge and router is known as

Page 16: CSC Pattern

a)router b)bridge c)hub d)brouterAns-brouter61) which of the following is the most crucial phase of SDLCa)testing b)code generation c) analysis and design d)implementationans: c62)to send a data packet using datagram ,connection will be establisheda)no connection is requiredb) connection is not established before data transmissionc)before data transmissiond)noneans: a63)a software that allows a personal computer to pretend as as computer terminal isa) terminal adapterb)terminal emulationc)modemd)noneans: b64) super key isa) same as primary keyb) primary key and attributec) same as foreign keyd) foreign key and attributeans: b65.In binary search tree which traversal is used for ascending order valuesa) Inorder b)preorder c)post order d)noneAns-a66.You are creating an index on ROLLNO colume in the STUDENT table.which statementwill you use?a) CREATE INDEX roll_idx ON student, rollno;b) CREATE INDEX roll_idx FOR student, rollno;c) CREATE INDEX roll_idx ON student( rollno);d) CREATE INDEX roll_idx INDEX ON student (rollno);67.A________class is a class that represents a data structure that stores a number of dataobjectsa. container b.component c.base d.derivedAns-c68.Which one of the following phases belongs to the compiler Back-end.

Page 17: CSC Pattern

a. Lexical Analysis b.Syntax Analysis c. Optimization d.Intermediate Representation.ans: c69.Every context _sensitive language is context_freea. true b.falseans: a70.Input:A is non-empty list of numbers LXß-infinityFor each item in the list L,doIf the item>x,thenXß the itemReturn XX represents:-a)largest numberb)smallest numberc)smallest negative numberd) none71.Let A and B be nodes of a heap,such that B is a child of A. the heap must then satisfythe following conditionsa)key(A)>=key(B)b)key(A)c)key(A)=key(B)d)noneAns-a72.String ,List,Stack,queue are examples of___________a)primitive data typeb)simple data typec)Abstract data typed)none ans: a73.which of the following is not true for LinkedLists?a)The simplest kind of linked list is a single linked list ,which has one link per node .thislink points to the next node in the list,or to a null value or emptylist if it is the last node.b)a more sophisticated kind of linked list is a double linkedlist or two way linkedlist .Eachnode has two links ,one to the previous node and one to the next node.c) in a circleLinkedList ,the first and last nodes are linked together.this can be done onlyfor double linked list.d) to traverse a circular linkedlist ,u begin at any node and follow the list in eitherdirection until u return to the original node.74.sentinel node at the beginning and /or at the end of the linkedlist is not used to storethe dataa) true

Page 18: CSC Pattern

b) false ans:a

TEST-21.C# is a native language of:A.Java B. .Net C.Visual Basic2.What is IMP in Objective CA.Implementation pointer B.Important Pointer C.Intended Pointer3.The width in bits of double primitive type in Java is --. Select the one correct answer.1. The width of double is platform dependent 2. 64 3. 128 4. 8 5. 44.What would happen when the following is compiled and executed. Select the one correctanswer.1.2. class example {3. int x;4. int y;5. String name;6. public static void main(String args[]) {7. example pnt = new example();8. System.out.println("pnt is " + pnt.name +9. " " + pnt.x + " " + pnt.y);10. }11. }12. 1. The program does not compile because x, y and name are not initialized.2. The program throws a runtime exception as x, y, and name are used beforeinitialization.3. The program prints pnt is 0 0.4. The program prints pnt is null 0 0.5. The program prints pnt is NULL false5.Which of these lines will compile? Select all correct answers.1. short s = 20;2. byte b = 128;3. char c = 32;4. double d = 1.4;;5. float f = 1.4;

Page 19: CSC Pattern

6. byte e = 0;6.What is contained in the directory /proc?:a. System information b. Administrative procedures c. Boot procedures d.Documentation on your sytem8. Transactions per rollback segment is derived from[DBA]a. Db_Block_Buffer b. Processes, c. Shared_Pool_Size,d. None of the above9. These following parameters are optional in init.ora parameter file DB_BLOCK_SIZE,PROCESSESa True, b False Ans : False10.What is the purpose of different record methods 1) Record 2) Pass up 3) As Object 4)Ignore.11.While running DOS on a PC, which command would be used to duplicate the entirediskette:TEST-3

1. main(){float fl = 10.5;double dbl = 10.5if(fl ==dbl)printf(“UNITED WE STAND”);elseprintf(“DIVIDE AND RULE”)}what is the output?a)compilation error b)UNITED WE STAND c)DIVIDE AND RULE d)linkage error. Ans : c

Page 20: CSC Pattern

2. main(){void vpointer;char cHar = ‘g’, *cHarpointer = “GOOGLE”;int j = 40;vpointer = &cHar;printf(“%c”,*(char*)vpointer);vpointer = &j;printf(“%d”,*(int *)vpointer);vpointer = cHarpointer;printf(“%s”,(char*)vpointer +3);}what is the output?a)g40GLE b)g40GOOGLE c)g0GLE d)g4GOO Ans: a3. .#define FALSE -1#define TRUE 1#define NULL 0main() {if(NULL)puts(“NULL”);else if(FALSE)puts(“TRUE”);elseputs(“FALSE”);}

Page 21: CSC Pattern

what is the output?a)NULL b)TRUE c)FALSE d)0 Ans: b4.what is done for push operation?? Ans: Stack Pointer in incremented and value is stored5.The OR gate can be converted to the NAND function by adding----gate(s)to the input ofthe OR gate. ans. Not gate6.combination of LOGIC GATEs7.voltage requirment for pentium preocessor ??8.K6 processor is from which company???? ans AMD9.more questions on microprocessors, Data structures, Prepored, postorder,Networks(piggypagging), SQL, Superkey..etc i could not remember...TEST-4- wht is piggybanking used for (acknowledgement)- wht combines router and bridge(hub/brouter)- tcp/ip is wht conection oriented or conectionless- X.25 protcol is at wich layer- wht is superkey (primarykey+attribute)- wich join will u use to hav null values (outer)- query was given find join typeselect customer.is and order.is and name from customer, orderwhere cutomer.id= order.id (natural join)- wich follow binary tree property- som code of java given find no of dangling pointers- linked list a->b and b pt to itself so wht type of linked list (infinite)- which line is wrong abt linked list

Page 22: CSC Pattern

(circular list can be only implemented in doubly linked list)- os question on context switch and sytem call- microporcesor ques like result of 2 input , 1 o/p line and three annd gates is (nand)- which gate need to combine with or gate to make nand gate- transfer RO to local and local to RO and shift RO 3 timed thn local to RO so result is(RO=local)- some instruction were given and u hav to find resultanf values of flags- some instrcution was given find output shift 2 times right to 80008ff- atomicity definiton was given and u hav to tell wich property it is(atomicity)- questions vr given fill in the balnks three places (placemnt,replacemnt,replacment)order was correct- wich normal from shld be saticsy to hav bcnf and one more condition was given- som ques of physics given resistance and volts use so u hav to tell output (low voltage orhigh voltage or??)- wich sort take o(n^2) timequicksort- some prog given outer fro loop from 1 to n and inner frm 1 to k so time isO(nk)-right output of preorder traversal som tree was given- wht r abstract data types- wht r steps of compiler (syntax, semantic,...)TEST-5

2 ques on binary search tree...which of d followin is d BST....nd wen u traverse a BST denwhich traversal

Page 23: CSC Pattern

arranges nodes in ascendin order...which is d recursive traversal technique...breadth first search travesral...depth first searchtraversal...preorder...none of deseQues on Transparent databaseQues on super keyQues on query related to creating an IndexQues on sentinel node in link listContext sensitive lang is always context free..true or falsevolt req. for a Pentium processordata lines in celeron processormost imp. phase in s/w development2 ques on use of extern storage class specifierques on pointers in C2-3 ques on microprocessor 8085

CSC ROUND3: GD (JAM)This is the main round of elimination. Don’t get afraid But be prepared.A group of 10 members will be called and given a topic. On a random order u’ll becalled to speak individually for 2 mins. Don’t worry the moderator wont even lookat u. he’ll keep listening to ur speech thru his ears. They mainly expect how confidentr u expressing from ur mind without fear. So drive out fear completely. The otherfactors a pronunciation n clarity (without stammering).“Wat u speak doesn’t matter But How u speak Matters a lot in GD/JAM”Few Sample Topics:

o My worst vacationo We all make mistakes

Page 24: CSC Pattern

o The most unforgettable Dreamo External outfito What do I fear for?o The first day of my collegeo My seniors in college

CSC ROUND4: TECHNICAL HRBe confident in this round. They mainly check how confident r u in answering. If uget thru this u r almost selected.Prepare to be ready to answer About ur project C & C++ (even they will ask u write programs) Any question from ur area of interest. (DBMS & DS have more advantage than OS/Networks) Basics in all subjects

TEST-1H.R-primary key n foreign key multithreading and multiprogramingme-toldAfter that she had given me some puzzel.there are 3 boxes in 1st contain red ball,in 2nd white,3rd mixture of white n red in howmany attempt u will find out which box have which color of ball.cut a cube in to 27 equal pieces and if all side of cube is painted then how many piece ofcube remain unpainted in 27 pieces of cube.Then asked me about the Logic of Prime no,Bubble sorting,linked list,merge sortetc.(Basics),One logic based on the odd no i don't remember exactly.TEST-2

NETWORKS1) whn u open web browser, thn wht will happen wht do u do first thing?2) wht u write first thing, i said DNS or webaddress concept thtn he asked complete webadress like i toldhttp//:www.orkut.comthn he asked meaning of each word-http,www,com etc3) wht is URL4) tel complete procedure how a site open after opening explorer

Page 25: CSC Pattern

5) other layers understand DNS or not if not thn wht will happen (concept of mapping toip adress comes here) thy asked how mapping takes place and at wich layer6) dns procedure use wht tcp/ip or osi7) how many layers in tcp/ip and wich layers are extra in osi model8) tcp/ip conection oriented or conectionless9) wht is DNs he was trying to ask in detail but as i havnot read so i said tht10) wht is arp11) wht is rarp12) wht is ATM(asynchronous mode transfer)DBMS1) wht is primary key2) if ther is no primary key how will u uniquely identify each tuple (i said composite keyor super key)3) diff between tuple and attribute4) wht r anomalies explain each in detail (like insertion anomaly deletion andmodification anomaly)5) wht is foreign key constraint6) if i want to delete a tuple from a table having reference in so other table thn wht willhappen (concept of cascade comes else error)7) wht r triggers explain8) if i want to hav som tuples havind null value wht to do (outer join)9) wht if i join two tables and no primary key (spurious tuples generate redundant data)10) he asked me wht will u do if need to retrieve this so basically queryand select first four tuplesselect *from employeewhere salarythn apply rownum<=4 to select first four tuples11) diff betweenoracle 9i and oracle 812) diff between dbms, rdbms, ordbmsOS1) wht is os2) wht is a process3) diff between process and thread4) if threads share data section wht will happen(concept of semaphore and crtitcal section comes so )5) wht is semaphore6) wht other thing semaphore do except synchronisation7) wht else happen in threads and process so deadlock concept comes8) deadlocks, and i told abt 4 conditons of deadlocks also9) in os wher do u use stacks and queues

Page 26: CSC Pattern

(like stacks for saving process satate , on system call context switch etc and queue inscheduling so he asked do we hav only fifo scheduling)10) so types of schedulingData Structure1) u hav fifteen boxes in kitchen and ur mom asked u to make foos for 1 month, wht will udo to make food fast (thn concept of sorting came)i said i will put name tag on boxes and thn sort thm in ascending order or i can put thm inorder of color shade firstly lightest and thn little darker and soon but tht can createconfusion so first is better way2)u hav 1000 names in unorder manner and i asked u to pick any name of my choicerandomly and thn giv me complete info of tht person so wht ds will u usei said firstly i will sort thm thn i will use hashing/btrees as thy r faster in decreasingsearch domain,thy asked wich sort will u usei said radix as good for strings , he asked if one more name increase or decrease i saidradix sort take linear time so doesnot affect much on timehe said if names r vary in length like one is venkateshraman other is raj i said sort from3rd last letter or use padding.3) wht is heapsort, concept . wher u can apply it4) wht all ds u knowi said heaps binomial fiboncaai, liked list stacks queues trees arrays etc5) advantage and disadvantage of linked list and array over each other in temrs ofmemory allocation6) insert and delete a node in a linked list write a code(not from me)basically thy asked asll application based question on data structurejava/c/c++1) write a java code of swapping to name via calling object as parameter and askedwhther result will reflect in main or not(as object passed as a reference so reuslt will be reflected)2) in java we use call by reference or call by value3) wht r interfaces4) diff between interfaces and abstractionTEST-3HR: tell me about ur selfHR: well...r u familiar with C...

Page 27: CSC Pattern

HR: WAP to print a pattern * ** *** ****HR: what is ur area of interest...Hr: write a program to add a node to a link list?Hr: have done any project.....HR: what it LAN?HR: what is MAC?HR: what is Modem?TEST-4Questions onPointers,OOPS concepts,Deff b/w DBMS and RDBMS,Projects you have done (UG&PG),OS (UNIX,WIN), etc..sql,java,data structurequestion from the techincal written round1.how do u rate urself in c & c++. I said in c its 7 and in c++ its 8.2.why there is a difference?i replied that though I know all concepts of c, but rightnow I have not much ideaabt linked list,stack,tree.3.well if I will say u to implement linked list using c++,can u do it? I4.what is early binding & late binding?5.what is virtual?explain with example?6.can u define a class in real life?7.wap to insert & retrieve data into a 3d matrix?There r 9 balls having equal volume,equal color.But one of them is slightly heavier than the rest.now u tellme the shortest way to find out the heavier one?

CSC ROUND5: PERSONAL HRThis round is for formality. But do this well. Be ready to answer stress related queslike “Have u gone thru previous year papers in sites?” or “Why r ur marks inconsistent

Page 28: CSC Pattern

from school to college?”HR Questions

o Tell me something about yourself??o How did u write your written test???o Family Back Ground?o What's your strengths and weakness?o What r ur hobbies?o Who keeps you motivating towards your goal?o Do you hv any other offers with you right now?o why didnt u go to previous companies??o Why CSC?o Have u heard abt CSC before??o Which Platform do u want to work on?o Which environment u would like to work?o Are you flexible about locations in India and outside India?o Do u know the bond and condition that if u leave the company b4 2 yr,u will hav to pay a sum

of 1 lakh?o Do u have any qts ?

All the best! Regards,KAARTHIK KUMAR.T

View Comments Enter Your Comments

Enter your search terms Submit search formSearch

Web freshersworld.com

Career Map | Defence Careers | GATE | GRE | MBA |Higher Studies | Cool Tests | Build Resume |Interview Tips

Contact US|Tell A Friend| Advertise with Us | Feedback| Sign Up | President's Note