Others

71
units 2)(energy * time * time )/(mass * dist) = distance 3)(momentum * velocity)/(force * time) = velocity 5)find the physical quantity represented by momentum *velocity] / [length * acceleration]? (1)Full form of URL ? a) universal resource locator b) uniform resource locator c)none of these d) unidentified random locator. (2)CDROM access is a) RANDOM b) SEMI RANDOM c) SEQUENTIAL (3)Total time spent by process...waiting in queue, execution etc (4)response time..of process. (5)What is the function of shell? a)Interpreter b) command interpreter c) interface (6)Which is a command interpreter ? a) Shell b) Kernel c)??? d)None of these (7)main() { printf("%c","abcdef"[4]); } what is the output ? a) abcdef b) d c) e d) ERROR. (8)main() { char dummy[20]; scanf("%[^a]",dummy); printf("%s", dummy); } what will it do? a) ERROR b) take characters till ctrl z is pressed c) take upto 19 characters d) None of These (9)How are objects in cpp passed ? a) By value b) By reference

Transcript of Others

Page 1: Others

units

2)(energy * time * time )/(mass * dist) = distance3)(momentum * velocity)/(force * time) = velocity5)find the physical quantity represented by momentum *velocity] / [length * acceleration]?

(1)Full form of URL ? a) universal resource locator b) uniform resource locator c)none of these d) unidentified random locator.

(2)CDROM access is a) RANDOM b) SEMI RANDOM c) SEQUENTIAL

(3)Total time spent by process...waiting in queue, execution etc(4)response time..of process.(5)What is the function of shell?  a)Interpreter b) command interpreter c) interface (6)Which is a command interpreter ?

a) Shell b) Kernel c)??? d)None of these

(7)main(){printf("%c","abcdef"[4]);}

what is the output ? a) abcdef b) d c) e d) ERROR.

(8)main(){ char dummy[20]; scanf("%[^a]",dummy);printf("%s", dummy); }

what will it do?a) ERROR b) take characters till ctrl z is pressed c) take upto 19 characters d) None of These

(9)How are objects in cpp passed ?a) By value b) By reference

  Technical Interview: (1)Difference between structure and class.(2)How to resolve ambiguity in multiple inheritance ?(3)What is static and dynamic binding in C ?(4)What is the difference between structure and array?(5)Difference between calloc and malloc & realloc?(6)What is static class and static member function?(7)What is pointer to a pointer? How it is declared and how is it accessed?(8)What is the difference between function overriding and overloading ?(9)What is the scope of a variable ?

Page 2: Others

(10)What is the difference between C & C++ ?(11)Some questions on templates and exceptions. (12)What is stream ? How is it opened and describe file handling in CPP?(13)Some questions related to Hard Disc :What is a hdd? How is a file accessed from the hdd? Why isn’t it used in place of a RAM ? What is RAID describe its basic structure ?. Where is the file information stored on the hard disk ? What is FAT ? How are files physically arranged on the hard disc?(14)What is JVM, what is BYTE CODE ? What is multithreading ? How can it be implemented using C, write a program to describe it? What is the complexity of radix sort and how is it determined? A sequence of 15 numbers was to be sorted using heap sort. (He stopped me after the 3rd iteration)(16)What is fork system call? How is a child process called and what happens to the parent ? In C what is spawnv () function, describe its execution. How can you use C for writing assembly language programs ?Q29. An atomic particle exists and has a particlular decay rate . It is in a train . When the train moves, a person observes for whether the decay rate

(a) increases(b) decreases(c) depend on the directions of movement of train

Q32. The best tool for editing a graphic image is ?Q33. Network scheme defines a)one to one b) many to many c) one to, many ?Q34. A person wants to measures the length of a rod.First he measures with standing ideally then he maeasures by moving parrel to the rod(a)the length will decrease in second case(b)length will be same(c) length will increse in the second case.Q36. What is the resulting solution when benzene and toluene are mixed ?1) Can .asp & .aspx pages work if placed in same virtual directory?2) Does different versions on .NET framework & different versions of assemblies work side by side (Clue: Side by side execution)3) Can you typecast one Object type to another Object type or One object type to another data type (Clue: Boxing & Unboxing)4) A question about GAC(Global Assembly cache) and the files it contains?5) A question about Application Domain and does it interfere with OS Process.6) A question on session timeout on an asp.net page and whether the session time out duration depend on the duration set in code or does it depend on IIS(Internet Information Services) setting and if both are specified which setting overrides which? Also whether it will take smaller time or greater time in to consideration.7) How can assemblies be created in .NET ? (clue: Using visual studio.net (or) using al.exe (or) using reflection.emit)8) What is a satellite assembly and what does it contain?9) Also 4 to 5 questions were on assembly. I recommend to have a dissected look of the assembly.10) What will an Erase command do? Erases the contents of array or Erases the whole array structure & frees memory.11) How is anchoring different from docking? (clue: its related to windows/web controls)12) What is serialization in .NET? What are different types of serialization and advantages and disadvantages?13) Are RCW(Runtime Callable Wrapper) and P/Invoke different and how?

Page 3: Others

14) What is Strong Naming? What details does it contain? how can it be created (Clue: Using SN.exe)15) What information does Culture identity contain?16) What is a Diffgram? (Clue: Related to XML)17) What is UDDI(Universal Discovery Description and Integration) ?18) Also a program on Exception handling was given and asked which part will exectute and which throw an error?19) What is Managed and Unmanaged code in .NET?20) Can we use redim on array already declared in VB.NET? if yes, can we redim with in a class? within a module? or with in a program?For technical there were 20 multiple choice questions: Out of which about 6 was electronics and 14 was from  computer related areas 

1. Full form of TTL and CMOS 2. Which is a good conductor (Extrinsic or Intrinsic) 3. What are the different types of capacitors (Electrolytic, dielectric...etc) 4. Select a passive component from the following (four choices were there) 6. To convert 1's complement to 2's complement and  vice versa 8. Out of four choice we have to identify which is a macro. 9. There was one pointer expression related question. 10. To find post fix expression. 12. Defnition of turing machine. 13. Where we use DFD(Data flow design) 

a)structural languages b)object oriented languages c)UML d)all of the above 

14. Name the error which occurs when we write on a page a) segment fault b)permission fault c) page fault 

15. A question based on the representation of an array in C An array whose elements are fn pointers which inturn returns a character

Directions for question 3-5 : Answer the questions based on the passage above themLiz, Jenni, Jolie and Rick have an English final on Friday and they all would like to study together at least once before the test. Liz can study only on Monday, Tuesday and Wednesday nights and Thursday afternoon and night.Jenni can study only on Monday, Wednesday and Thursday nights and Tuesday afternoon and night. Jolie can study only on Wednesday and Thursday nights, Tuesday afternoon and Monday afternoon and night. Rick can study the afternoons and nights of Tuesday, Wednesday and Thursday, and on Monday afternoon.

23. If the group is to study twice, then the days could be(a) Monday and Wednesday(b) Tuesday and Thursday(c) Wednesday and Thursday(d) Monday and Friday(e) Tuesday and Wednesday

24. If three of them tried to study together when all four couldn't(a) this would be possible twice(b) it would have to be on Wednesday night

Page 4: Others

(c) Rick could not attend the three person groups(d) This could be accomplised on Monday and Tuesday only(e) This would not be possible

25. If Liz decided to study every night,(a) she would never be able to study with Rick(b) she would never be able to study with Jolie(c) she would have at least two study partners each night(d) she would have to study alone on Monday night(e) she would study with only Jenni on Thursday night

Page 5: Others

SECTION 2-COMPUTER AWARENESS (15 questions)

1. What is the number of functions of a three variable boolean function?

4. What is video resolution ?

1. Abt Ur project.(u will be grilled by them)2. Be confidence.(They will check ur temper by asking some questions)3. Abt software development life cycle4. Abt ur interest area in computer field5. Abt memory management in Operating System.6. Abt Unix basic commands7. Abt doubly linked list8. Fibonacci series and palindrome program in C9. Abt Gates(Be prepare on Digital Circuit Logic Design)10. Abt complier design(phases)11. bt TCP&IP and OSI Model.12. Abt OOPS concepts

ANALYTICAL   Technical  Interview12. What is the need of normalisation in data base.13. 1-5 all normalise forms( from many they directly asked 4th and 5th normanilise..(mostly from m.c.a.’s)14. What is semafore in o.s.15. What is paging and demand paging.16. How memeory works in a computer system.17. How recursion works in c18. Which data structure used in recursion.19. deference between structure n union.20. What is erp…..(accenture having work in erp…as we m.c.a’s having erp in 3rd sem so…the person highlighted or wrote sth in resume ,they asked abt erp from them only).21. What is reengineering in erp22. If u have too much cash in ur hand, then what u will do in behalf of the company

VIRTUSA

->In how many different ways, a rectangle can be cut into 4 identical parts.

-> using the numbers 1, 2, 3, 25, 50, 75, 100 Exactly one time, give an expression which will give the answer as 383.

-> using the numbers 1, 2, 25, 50, 75, 100 Exactly one time, give an expression which will give the answer as 383.

-> volume of sphere is (PI)*(Theta) Cubic-meters and Surface area is (PI)*(Epslon) Square-meters And both are 4 digit integer numbers. What is the value of radius?

Page 6: Others

-> Inthe figure given below, Replace '?' mark by any operator (+, -, *, /, =) and if we leave as it is, numbers are considered together and forms either 2 or 3 digit numer. Generate an expression using some symbols. ------------------------

| ? | 2 | ? | 3 | ------------------------ | 2 | | ? | ------- ------ | ? | | 1 | ------------------------ | 6 | ? | 1 | ? | ------------------------

-> Analise the Programe main(){ int x=1,y=1; while( (x > 0) && (y > 0) ){ printf("%16d%16d",x,y); x += y; y += x; } }

-> Start from a random number, generate a sequence such that if number is odd multiply it 3 and add 1. If number is even, divide the number by 2. This Sequence will always cyclic with 4, 2, 1. In this sequesce, find the maximum power of 2 generaged in the sequence and print only the power, not the sequence.

-> Start with a random 2 digit number, The series is generated by multiplying the number by 2 and placing the last 2 digits as the next number. Series continues until one of the element repeats.

-> write a function maxsubstring(str,alpha,theta) str is the source string and have to return maximum sub string which starts with alpha and ends with theta.

Page 7: Others

INTERVIEW---------

-> what will this line will do? if it is legal? B -= (B < 0) * 2 * B;

-> what does this function do?? int f(int p) { int i = 0, t = 1, s = 1; while( s <= p) { i++; t += 2; s += s; } return i; }

-> explain What is divide and conuer method? Travelling salse man problem What is greedy method

-> How Neural Networks and A.I are related.1) x1 peach + y1 plum = z1 applex2 peach + y2 plum = z2 apple(x1,y1 .... z2 are integer values)How many peaches make one apple?

Product of all Bradman's first class scores or Sum of all test scores of Sachin.

4) U r provided with 500ml and 300ml jar(it has no markings).a) u have to measure exactly 100ml.b) u have to measure exactly 200ml.

5) Using four 4's u have to make 1 ... 10. (for eg. 1 = (4/4)*(4/4)2 = ?..10 = ? )

6) student,canopy,thirst,... are the words given.u have to group the words using the following words 1)Master 2)Teacher 3)Deft etc..(i don't remember some of words)

Page 8: Others

7) U have to cut a Pizza using 7 st. lines(wit out rearranging) and u have to obtain maximum number ofpieces. ( Give generalised solution..) 8) U have to cut a Cylindrical cake of diameter 32 cm and height 20 cm in to 12 equal pieces.

9) In a village there r 2 groups. 1) Knight -> always tell true 2) Knave -> always tell false Mr.X met a man of that village(u don't which grp he belongs) and questioned "Tell me whether u r knight or knave ?" Reply: "i cannot tell u and left that place"Find which grp that man belongs to?

10) obtain 277 from 3,25,50,65,100.use 4 arithmetic operations only.

11) 1#2=x ,2#3=y, 4#4=z 4@14=a, 5@15=b, d@e=f( i don't remember values for x,y,z,a,b,c,d,e,f) find (2#4)@5= ?

->CODE is encoded as DGBFREAD is encoded as JHNVFins "KOVAI"

2. Essay(General).==================(Topic given: India should spend money on Atom bomb and Rocket OR for the welfare of poor.)

3. Problem solving.===================(Problem statement: How will u determine number of Petrol bunks in Madras.)

Page 9: Others

4. Programming.(4 Qns)===============( we can use any Programming Language for coding)a) They had given one function ,we have to find it what it does and also problem in the fn. and how toovercome it. double what( double z, int y){

double answer; while( y > 0 ) { if( y%2 == 1) answer = answer * z; y=y/2; z=z*z; } return answer;} b) They had given one Pseudocode.We have to find bugin the pseudocode.c) write a program to print all Armstrong numbers,(abc=a^3+b^3+c^3)(for eg. 153=1^3+5^3+3^3)d) write a function witj the following conditions, 1)It should have one integer parameter. 2)If the value passed is -ve, return -1. 3)If the value passed is a perfect square, return root of that number. 4)If the value passed is a not a perfect square, return that number itself.

11.Write the set operators that are used for select.

12.Write a single command to find and delete all the files that are older than 1 day (modification time)http://www.ChetanaS.org13.A is a 3*4 matrix and B is 4*5 matrix. What is the number of additions and multiplications performed to obtain the resultant matrix

14.What is the output#!/bin/perlkill -0 pid

15.#!/bin/perl    echo $_

16. #!/bin/perl     kill $$     echo "hello world"

Page 10: Others

17.List different schema/database objects

18.Randomization is good for which algorithm(quick sort, heap sort, selection sort, hashed table, ...)

19.Descride the language in the following regular expression (a*a) b+b

20.In an I-node what is not there (file type, file name, size, owner)

22.Given Id, author, creation time, size, links, web page, description            Bring it in 2nd normal form

23.Consider a heap containing numbers 10, 20, 30, 40, 80, 60, 70 such that numbers are in ascending order from the leaf to the root. If 25 is to be inserted what is the position.(A[1], A[2], A[3], A[4])

24. #!/bin/perlvar=///aaaaecho ‘$var’

Page 11: Others

26.In database sort the student id and the course id for each student. Which is the best possible solution.- Sort the student id using a stable algorithm and then sort the course id using unstable algorithm- Sort the student id using a unstable algorithm and then sort the course id using stable algorithm- Sort the course id using a stable algorithm and then sort the student id using unstable algorithm- Sort the course id using a unstable algorithm and then sort the student id using unstable algorithm

14) One circular array is given(means memory allocation tales place in circular fashion) diamension(9X7) and sarting add. is 3000, What is the address of (2,3)........Sol) it's a 9x7 int array so it reqiure a 126 bytes for storing.b'ze integer value need 2 byes of memory allocation. and starting add is 3000so starting add of 2x3 will be 3012.

15) In a two-dimensional array, X (9, 7), with each element occupying 4 bytes of memory, with the address of the first element X (1, 1) is 3000, find the address of X (8, 5).Sol) initial x (1,1) = 3000 u hav to find from x(8,1)so u have x(1,1),x(1,2) ... x(7,7) = so u have totally 7 * 7 = 49 elementsu need to find for x(8,5) ? here we have 5 elements each element have 4 bytes : (49 + 5 -1) * 4 = 212 -----( -1 is to deduct the 1 element ) 3000 + 212 = 3212

17) The size of a program is N. And the memory occupied by the program is given by M = square root of 100N. If the size of the program is increased by 1% then how much memory now occupied ?Sol) M=sqrt(100N)N is increased by 1%therefore new value of N=N + (N/100)=101N/100M=sqrt(100 * (101N/100) )Hence, we get M=sqrt(101 *  N)18) 1)SCOOTER --------- AUTOMOBILE--- A. PART OF2.OXYGEN----------- WATER ------- B. A Type of3.SHOP STAFF------- FITTERS------ C. NOT A TYPE OF4. BUG -------------REPTILE------ D. A SUPERSET OF1)B    2)A       3)D     4)C

25. find units: (Momentum*Velocity)/(Acceleration * distance ) 26. Which of the following set of numbers has the highest Standard deviation? 1,0,1,0,1,0 -1,-1,-1,-1,-1,-1 1,1,1,1,1,1 1,1,0,-1,0,-1

Page 12: Others

27. What curve best suits the following data: X Y 0.99 0.00001 10.04 1.02 99.98 1.997 1000 3.0 9990 4.004 (a) y = logn x (b) y = log10 x (c) y = ex (d) y = -log10 x (e) y = - ex28. Of the four straight lines A, B, C, D find out which pair forms an orthogonal set A: 5x+4y-7 = 0, B: y = -x , C: y = 7x+3, D: 4x = 5y+5 (a)AD (b) AC (c) BC (d) BD (e)AB

1. Ok, what do your friends call u??? 2. how many friends do u have??? 3. Do u talk with girls??? 4. How many girl friends do u have??? 5. whatz the difference of a girlfriend from a girl who is a friend??? 6. what do u do on sundays??? 7. Do u like hyderabad??? 8. whatz so special about it??? 9. what places have u got to visit in hyd...??? 10. how many of them have u gone to???

 (1) APTITUDE TEST There were four sections::-(a) General English & verbal test,(b) Quantitative aptitude (c) Logical reasoning (d) Technical(mainly on C,dbms).[concentrate on R.S.Agarwal for quanti & the logical part.]  (2) TECHNICAL QUESTIONS 1. What are the types of OS, with examples?2. Difference between Linux & Windows.3. During multitasking, whether the jobs are executed parallely? Whether the  WINDOWS OS is pre-emptive?4. Is multitasking & multithreading are same or not?5. Various versions of WINDOWS.6. Latest Version of WINDOWS(Windows vista).7. What do you know about Vista ?8. What is SDLC & its steps.9. How will you decide which language (whether c,java,etc…) is suitable for the development of a particular software?10. Why java is platform independent?11. Are the JVM for C & JVM for JAVA are different?12. What are byte code & object code?13. Difference between C & Java.14. What is polymorphism & its types?15. How overriding is done?16. What is inheritance?17. How error handling is done in Java?18. Types of classes in Java.19. Storage classes in C.

Page 13: Others

20. Types of function calls?21. Call by reference & call by value.Which is better?22. What are the types linklist?23. Write a program to search a certain node in a linear linklist?24. Write a program to find the length of a string in C?(3)HR QUESTIONS 25. Why Zensar? Your plans for the next 4 years with Zensar.26. What are your achievements?27. Which part of the powerpoint presentation did you like the most?28. How many presentations have you seen before?29. Why have you failed in the interviews which you had earlier?30. How will you rate yourself out of 5 in the technical interview?31. What do you think, your weakest part in technical interview?32. Will you have any problem,if you are relocated out of kokata?33. Do you have any questions for us?33)What is the storage required for the name "George"? A) Six bits of storage    B) Six Bytes of Storage   C) Six Pixels of Storage  D) One Kilo Byte of Storage   34)What is the part of compiler that keeps track of names and their attributes? A) Compile Table   B)Symbol Table   C)Table   D) Logical Table   36) Which constructor is invalid for class cat? A) void cat :: cat() { feet=4;}       B)cat::cat(int f){feet=f;} C) cat::cat(void){feet=8;}            D) cat::cat(int f){this->feet=f;}   37) Typical user defined signal handler functions perform actions such as A) abort process immediately without further ado B) Perform minor house keeping prior to  resumption C) Roll back process state to last checkpoint D) Tidy up to process abortion A) 1&2    B) 2 & 4     C)  3     D) 4 38) What is the name given to the process initizlizing a microcomputer with its OS? A) Cold Booting   B) Booting  C) Warm Booting  D) None of these 39) Desirable attributes for memory management include A) Protection- such memory should be protected against being written on by other processes B) Encryption- ability to encrypt data with a randomly selected key that is discarded after use without being disclosed so that data can never read again. C)Uniform access rates-ability to retard faster data fetch rates so that all data fetches are uniformly performed at the least fast data fetch rate                     D)none of these 40)Major expressions used with find command to select file is it has been accessed in more than 375 days,is A)-a time +365 B) -m time +365 C)-a time -365 D) -m time -365 41)Which of the following is not a basic computer network topology? A)Train topology B)Bus topology C)star topology D)ring topology 42) which file contains  all permanent information and is updated during processing by transactions of data? A) Master File   B) Local File   C) Parent File  D) Primary File

Page 14: Others

43) Which set option is used with vi editor to display line numbers on screen? A) nm   B) nu  C)ic   D)li 44) Assuming you have the environment variable ENV=.kshrc set, what is the entry in ur. kshrc or .profile that will save up to ur last 200 commands in a history list? A) HISTSIZE=200    B) set history 200    C) HISTORY=200   D) setenv history 200 45) You have 1MB of memory left on the HDD and when booting the system crashes. What is the reason? A) Not enough synchronous buffer B) Not enough contiguous memory in virtual memory C) Not enough space on the hard drive for the swap file. D) Not enough space on the hard drive for working memory. 46) How do I remove a file with the name '-something' ? A) use the "--" flag to rm    B) Use "##" flag to rm  C) Use the "-" flag to rm       D) Use the "!" flag to rm.   47) The customer is an internet search engine with hits from global customers exceeding 10 million per day. You identify Knowledge Management as the driving business issue. Which feature is most imp to this customer solution? A) Single system image          B) Speed and performance C) Very large memory, very large database  D) H/W Partitioning 48) Unlike function templates, when instantiating a class template, you must explicitly instantiate the class by giving? A) The parameters for the class templates      B) The arguments for the class templates  C) The variables for the class templates  D) None 49) In private inheritance derived class members can access base class members that are          1) Public   2) Private    3) Protected A) 1 & 2          B) 1 & 3      C) 2 & 3       D) 1,2 & 3 50) The output of an OR Gate is LOW when       A) All inputs are LOW  B) Any Input is LOW C)Any input is high  D) All inputs are HIGH

26. 1.java 2.smalltalk 3.lisp 4.eiffel

27. 1.sap 2.arp 3.wap 4.tcp ip16. Select the odd one out

a. Oracle  b. Linux c. Ingress  d. DB2 17. Select the odd one outa. SMTP   b. WAPc. SAP d. ARP18. Select the odd man out.a. Java  b. Lisp c. Smalltalk   d. Eiffel 19. Which of the following are orthogonal pairs?a. 3i+2j b. i+j c. 2i-3j d. -7i+j

1. fllow is directly proportional to?2.what is  newton's first law?3. what is pascal's law?4.strain gauge workes on which priciple?6.which is 3rd layer of OSI MODEL?10.PID stands for?11. PID is used for?

Page 15: Others

12.which is used for measurement of temp upto 1200 degree ?13. 200degree celsius is equivalent to how many kelvin?

1. Which of following software is not used for FEM. 3.One question from iron- carbon diagram. 4.which is used vfor hardening of brass.(hardenig methods). 5.which is most suitsble theory of failure for ductile materials. 6.One from solidification time of casting. 7. one from rack angle sticking friction. 8. one from chip cut thickness. 9. one from life of bearings. 10.one from heat transfer through multislabs and one from fins. 11.one question from linkage mechanism. 12.one question from ISO 9000. 13. One question from condensation temp in refrigation cycle. 14. Two questions from moulding techniques.

1. Convert 16 into binary form …….. 2. In which gate o/p is 1 when all i/p are 1 3. What is  moving coil ammeter reading, if supply is (10+15 sin 314 wt), 4. If voltmeter reads 100V,if we want to measure 150 what we have to do 5. Y-delta starter  used in induction motor for……….. 6. In a balanced Y connection if VAN=400at 60,what is VBN …………….. 7.  for unity  TMS 10 sec, what about 0.5 TMS ………………ans: 10(chck it). 8. 400V,15 kW,4%slip,50 Hz,  4 pole what is the torque, 9.  what r the factors influencing  change in torque &speed10. buccholtz relay is used for 11. lightening arrester is used for 12. what is the power dissipated in i=10+5 sin 314wt for 2ohm resistor 14. what should be the impedance value for 3-4j,for max power transfer 15. if current required for triggering thyristor at -30 degrees(temp) is 80 mA, what is  the current required at 60 degrees. 16. Question regarding  thevenins resistance 17. Fourier series expansion like periodic signal …….. 18. Question regarding reactive power compensation ……… 19. Question regarding positive sequence currents …some L-L-G fault occur on 3 – ph network Ia current……like 20.400v,50ohm resistor , inductive reactance 100ohm , circuit to be resonance, find the voltage across capacitor  21. what is the ideal power loss for 1.1mH & 11.86 nF, length is negligible voltage 22. sync motor is used for 24. regarding p.u. values 25. regarding voltage bus parameters (3 ph networks) 26. charging of capacitor 27. reactive power compensation 28.  Poles location 29.I controller is used for ……………..steady state error reduction…

6. For a circle, radius is inc. by some % , find net change in area?

Page 16: Others

7. How is impedance matching done and why do we need it (basically can talk about ideal power supply needing a low internal resistance and high load to function properly. so one stage of transistor amplifier has to have low o/p resistance and high i/p resistance for next stage- do look up all basic electronics) ( also about sinking high currents without damage)8. what is a smith chart used for 9. Name all flipflops u know and working esp. master slave.10. progaming - program to find how many 1's are present in an integer variable using bitwise operators. something about dynamic allocation, static functions, macros11. c++ virtual functions12. what is an inode in unix?13. small program in pascal to add a node to a linked list. (You have to tell what the program does)14. C strcmp program (You have to tell what the program does)15. Set of dos commands testing basic familiarity with dir, ren *.t?t, cd etc.16. What is the order of binary search?17. what is the order of strassens matrix multiplication?                  18. you have to maintain the sorted order of integers and insert ntegers . which data structure would you use? (tree, list, queue,array?)19. There are two lists of integers to be merged. Which method would you not use?20. n an online database system when is data written to disk? (onpressing enter, when commit or update is encountered, at end of data,all of the above)21.  Small prolog function which prints 2345true. You need to tell output. 22. Lisp program given. what does it do? (GCD, LCM, Multiplies mxn?)23. What is paging?24. what is segmentation?

1)int i;if i=0 then i:=1;if i=1 then i:=0;

2)int i;if i=0 then i:=1;if i=1 then i:=0;(given that i can take only two values (1,0))

3)int i;if i=0 then i:=1;else if i=1 then i:=0;(given that i can take only two values (1,0))

4)int m,j,i,n;for i:=1 to n dom:=m+j*n

Page 17: Others

5) Expand the followinga) ISDNb) CASEc) CSMA/CDd) OOPSe) MIMD

6) In the following questions, answer A,B,C,D depending on when the errors are detected?A if no error is detectedB if semantic and syntactic checkingC if during Code genration & Symbol allocationD run time

a) Array overboundb) Undeclared identifierc) stack underflowd) Accessing an illegal memory location

7) How many page faults will occur for below sequence of pages when LRUpage replacement algorithm is used ( The memory can only have 3pages):

1,2,3,4,2,1,5,2,4 (something like that) 

8) If a CPU has 20 address lines but MMU does'nt use two of them.OS occupies 20K. No virtual memory is supported. What is the maximum memory available for a user program?

9) For a binary tree with n nodes, How many nodes are there whichhas got both a parent and a child?

10) Understand the funda of incrementing a variable using val++ and ++val . Some programs are given for error correction.

11) Learn datagram . (Computer networks)

14) A question on call by value,call by name,call by reference.

f(x,y,z){y := y+1;z := z+x;}main(){int a,b;

Page 18: Others

a := 2b := 2;f(a+b,a,a);print a;}

what is the value of a printed for three different calls in main.

15) Using the following instructions and two registers , A&B. find out A XOR B and put the result in APUSH <reg>POP <reg>NOR These instructions operates with A & B and puts the result in AND A

(question basically to get XOR in terms of NOR and AND)

16) True/False questions:1) The page size should be the power of 2.2) 

Page 19: Others

17) int i=0;int j=0;

loop: if(i = 0)i++;i++;j++;if(j<= 25)goto loopxxx:  question1 : how many times is the loop entered 

A few questions of that sort. some count fundaes. Easy one )

19) For which of following is it not possible to write an algorithm.

a) To find out 1026th prime numberb) To write program for NP-complete problemc) To write program which generates true Random numbers. etc...

20) what is the essential requirement for an real-time systems

a) pre-emptionb) virtual memoryc) paging etc...

In a certain code, the symbol for 0 (zero) is. * and that for 1 is $. The numb.:rs greater than 1 are to be written only by using the two symbols given above. The value of the symbol for 1 doubles itself every time it shifts one place to the left.(For example, 4 is written as $**; and; 3 is written as $$)18) 260 can be represented as:

A) $****$** B) $$*$$$$$ C) $$*$$$$** D) $*****$**19) 60 / 17 can also be represented as:

A) $$$*$*** / $$**$$ B) $$$***** / $$**$$C) $*$$*$** / $$**$$ D) $$*$*$** / $$**$$

20) $***$ can be represented as:A) $$$ / $* B) $*$**- $$ C) $*$*$- $$ D) $$$***$ - $$

21) binary 3 - 011 & 4 - 100 & 5 - 001 so convert it into binary n solve it. 

Page 20: Others

Your answer for each question below would be:A., if ALL THREE items given in the question are exactly ALIKE.B, if only the FIRST and SECOND items are exactly ALIKE.C, if only the FIRST and THIRD items are exactly ALIKE.D, if only the SECOND and THIRD items are exactly ALIKE.E, if ALL THREE items are DIFFERENT.22 - 45 que just matching of pattern22)LLMLLLKLMPUU, LLMLLLKLMPUU, LLMLLLKLMPUU

A) A B)B C)C D)D E)E23) 0452-9858762, 0452-9858762, 0452-9858762

A) A B)B C)C D)D E)E24. If* stands for /, / stands for -,+ stands for * and -stands for +, then 9/15*9+2-9=?A) 14.7B) 15.3C) 14.1D) 16.225. If * stands for -,/ stands for +, + stands for / and -stands for *, then which of the following is TRUE?A) 16/8*6+90-12 =23.2B) 8*12/6+90-12 =7.2C) 16*6/8+16-12 =-4.1D) 12*16/6+90-12 =826. See the options given below which one is correctA) 6 S 7 A 2 M 3 W 0 D 7B) 6 A 7 S 2 M 3 W 0 A 7C) 6 S 7 M 2 S 3 W 0 M 7D) 6 M 7 S 2 A 3 X 0 D 7Although he os a CSE student, I was questioned mostly on Electronics subjects. So do take care about brushing up Electronics and Physics also.01. NAND Gate02. Ways to connect a computer in India and another in Switzerland (only 1 or 2 won’t do, they wanted wayS)03. Modulation-Demodulation04. Working of a modem05. Program for logic gates06. Difference between MS Access and Oracle07. RDBMS product in market08. Why make queries and use SQL when u have MS Excel09. Reflection, Refraction, Total Internal Reflection10. Optical Fibre11. Bit, byte, kilobyte, memory, etc in c, c++ and Java12. MicrowaveNON-TECHNICAL01. Tell me something about yourself02. Why should we hire u?03. What r ur weaknesses?04. What is special about today? (Ans.: 3rd March is celebrated as TaTa Day (Mr. Jamshed Tata’s B’day))05. What would u do if u are walking on a highway all alone with no means of communication and you witness an accident in which a motor cyclist is badly injured?

Page 21: Others

There is no other vehicle to seek help from.06. Why should we hire you?07. Tell us about E-Major and E-Minor chords in guitar (my hobby)08. Speak for 2 minutes on “Americas war on Iraq”09. Difference between a Joint and Nuclear family10. Where do u see urself 5yrs dowm the line11. What would u like to do 24 hrs in a day12. Why T.C.S.?13. If Microsoft or some other company pays u more than us, u’ll leave us?14. What would ur reaction be if u do not find ur name on the selection list and wat would u do?15. What r the 2 changes u would want to make in the TCS recruitment procedure?16. What 2 improvements would u like to make in urself?17. Founder of TCS?Numerical9. In 80 coins one coin is counterfeit what is minimum number of weightings to find out counterfeit coin9. What are ur future plans?10. So u think u r hard working?11. If u r asked to carry buckets of water, which requires hard working people, will u do the job?12. What will u do if IT industry collapses suddenly? Any alternate future plans?13. R u interested in politics?14. Can u answer questions from Economics?15. R u not interested in India's Economy?16. Can u exchange Franc with Euro?17. Pound is the currency of which country?18. Mark is the currency of which country?19. Who is the captain of Brazil Football Team?20. Who is the captain of England Cricket Team?21. U dont watch Cricket?22. What do u do at home? Only studies?23. What type of information u search in Internet?26. If the vertex (5,7) is placed in the memory. First vertex (1,1) ‘s address is 1245 and then address of (5,7) is ----------27. Which of the following are orthogonal pairs? a. 3i+2j b. i+j c. 2i-3j d. -7i+j41. A 2D array is declared as A[9,7] and each element requires 2 byte. If A[ 1,1 ] is stored in 3000. Find the memory of A[8,5] ?16. Select the odd one outa. Oracle b.Linux c. Ingress d. DB2 17. Select the odd one outa. SMTP b. WAPc. SAP d. ARP18. Select the odd man out.a. Java b.Lisp c. Smalltalk d. Eiffel

Page 22: Others

2. Match the following:1. Male - Boy ---> a. A type of2. Square - Polygon ---> b.A part of3. Roof - Building ---> c. Not a type of3. Match the following.1. brother – sister ---> a. Part of2. Alsatian – dog ---> b. Sibling3. sentence – paragraph ---> c.6) a program was given on FOR loop and asked to find out the final value of the variable used, after the execution of the program.

7) Decimal equivalent of a number (ex:110.l11)

8) Question on data structures (with diagram) and asked what the diagram implies.

9) Which of the following are phases of 2-phase locking protocol?    1) Intent to request locks    2) Release the present locks and never asking for transmission    3) Both (1) and (2)    4) None of these

10) When an array of pointers is passed through a function, what actually is passed?    1) address of the starting element    2) last element    3) first element    4) number of elements

-Questions on Database Management Systems- Name some databases- Keys in DBMS- Difference between UNIQUE key and PRIMARY key.- CREATE : to create objects in the database - ALTER : alters the structure of the database - DROP : delete objects from the database - TRUNCATE : remove all records from a table, including all spaces allocated for the records are removed - COMMENT : add comments to the data dictionary - RENAME : rename an object DML (Data Manipulation Language) statements are used for managing data within schema objects. Some examples:- SELECT : retrieve data from the a database - INSERT : insert data into a table - UPDATE : updates existing data within a table

Page 23: Others

- DELETE : deletes all records from a table, the space for the records remain - MERGE : UPSERT operation (insert or update) - CALL : call a PL/SQL or Java subprogram - EXPLAIN PLAN : explain access path to data - LOCK TABLE : control concurrency - Normalization forms? Explain them.- All the commands in dbms like create, insert, count, drop, select.......- Leaky bucket algorithm. http://www.ChetanaS.org- Is there any compiler in oracle- Diff between DBMS & RDBMS?? What r Codd  rules???- How many types of relationship??? Eg. Of many-to-many relationship???- What is join??

Questions on JAVA- Difference between Java and C++- Oops concepts and features- What is a constructor?- What is a class?- What is an object?- What is polymorphism?- What is Inheritance?- What is overriding?- What is an Interface?- What are abstract data types?- What do u mean by access specifier?- What is overloading?- What is Encapsulation?- What is garbage collection?- How do u allocate memory in java?1) There is no need to fill the resume with too many languages and os..Questions will b asked basing on whatever u state in resume. So have an idea on all the languages and operating systems u keep in it.

2) When u r asked to tell about your favorite area in C it would always b better to tell arrays. If u tell like functions and pointers and functions,..then little complicated questions will b asked.

 3) Also when u asked to rate yourself in C, then better give 5/10.if u give ratings like 6/10 or 7/10 then questions from pointers r asked. So b careful while rating yourself.

4) While rating 5/10 if he asks y so less then say him confidently that u r still trying to improve your knowledge in C.

5) B confident in whatever u say even though it is wrong.

6) If u have done any project then b prepared with your role in the project work.7) Unless asked never say your hobbies and weakness. Que like how do u overcome your weakness is asked.8)Your weakness should b their strength..9) Never say condractictory qualities.

Page 24: Others

Eg :  Hardwork is your strength and    Weakness is your laziness10) If u committed a mistake while speaking in English, don't bother about that.. Instead continue your answer.. That's important..We were given only 10 minutes after the results of the written test were announced.I was the 3rd to my pannel and was the first to be selected by him.he: give me ur resumeme: gave him the resumehe: tell me abt ur selfme: I was prepared for it.i gave the answer promptly. I couldnt maintain eye contact initialy but i could manage it.

he: wat do u kno in Cme: basicshe: C++?me: no. and told him the reason y i didnt learn them outside.   its always better to substantiate such things with a reason.

he: wat is a datatypeme: gave the answerhe: asked something on linked list.me: I couldnt hear him. so i told him i donnohe: wats the difference bet ms office xp and 2003me: (i wrote tat in my computer skills) i told him we use only the basic features of ms office. may be there r some internet related features in 2003 which r not there in xp.

the real difference is dat office xp runs in win 98, 2000, and win xp. but 2003 runs only on win xp and win 2000 with servicepack.

he: narrated a big passage. the gist was that whether a file created in office 2003 be opened in office xp.me: yes sir it can be without a problemhe: r u sure Chet anaSme: yes sir. i tol him our college has xp and i have 2003 and we often transfer documents.

he: any questions?me: asked him two questions related to technical only. dat was a plus point for me.he: then told me to wait outside and told that he will let me knome: thank u sir.he forwarded his hand and i did the same and gave a firm shake hand.

within few min I was given a form for hr interview. It was very lengthy and almost took 20 min to fill. Within next 10 min after filling the form I was called for HR interview.

Interviewer was a lady.she: tell me abt ur ur selfme: tol her same thin letter to letter as i tol in tech.

Page 25: Others

this time eye contact was not at all a problem

she: (i told her something on my introspection in my intro) she asked gimme an incident as an example.

me:i didnt expect her to ask it.but suddenly an incident flashed into my mind. it really happened in my first year.i told her dat.

she: tell me abt ur familyme : told hershe: y didnt u get placed in CTS and TCS?me: (cts and tcs came to our college on 3rd of aug) I told her i didnt clear their written.

she: wat did u learn from datme: I was not expecting dat but my mind was alert as I was not at all tensed. I told her tat donot fall for temptation from CTS and do not prepare more than ur caliber from TCS.

she: why wipro?me: I was perpared for this question. i tol her three points abt wipro in which i gave her a hint tat i prefer working in south india.

she: wat if i place u in gurgoan (wipro is there in gurgoan) http://www.ChetanaSinterview.comme: no problem i will work there for a couple of years and take a transfer and come back to south.

she: wat do u think abt ur college: me: told her all the good things which i knew abt our college (our college is really popular for its placements, thanks to ur placement officer). first i told her tat our college has good placements and good companies r coming and i also told tat Wipro is one such company

its always good to boost abt ur college though u dont like somethings in ur college describe those points in which ur college is different from other colleges.

then she told me "ok u can leave"

i told thank u and left.1) Which of these is an invalid dataname? a) wd-count b) wd_count c) w4count d) wdcountabcd

Page 26: Others

Q5) If the mean failure hour is 10,000 and 20 is the mean repair hour. If the printer is used by 100 customer, then find the availability.

1)80% 2)90% 3)98% 4)99.8% 5)100%

Q6)One question on probability...

Q7)In a singly linked list if there is a pointer S on the first element and pointer L is on the last element. Then which operation will take more time based on the lenght of the list.

1)Adding element at the first.

2)adding element at the end of the list.

3)To exchange the fisrt 2 element.

4)Deleting the element from the end of the list.

3 more question to fine the output of the program.

and rest of the question was based on data structure,

some condition where given and we have to conlude either y or n

The second section was coding...

1)Write a function to multiply 2 N*N matrix

Write test cases for your code.

2)S contains the set of positive integer. Find the largest number c such that c=a+b where a,b,c are distict number of the set.

Q2)This question is based on the complexity ... Q3)s->ABA->aB->bbAWhich one is false for above grammar.. Q3)Some Tree were given & the question is to fine reorder traversal. Q4)One c++ program,to find output of the program.. Q5)If the mean failure hour is 10,000 and 20 is the mean repair hour.If the printer is used by 100 customer,then find the availability.1)80% 2)90% 3)98% 4)99.8% 5)100% Q6)One question on probability...

1. Solve this cryptic equation, realizing of course that values for M and E could be interchanged. No leading zeros are allowed.WWWDOT - GOOGLE = DOTCOMThis can be solved through systematic application of logic. For example, cannot be equal

Page 27: Others

to 0, since . That would make , but , which is not possible.Here is a slow brute-force method of solution that takes a few minutes on a relatively fast machine:This gives the two solutions777589 - 188106 == 589483777589 - 188103 == 589486Here is another solution using Mathematica's Reduce command:A faster (but slightly more obscure) piece of code is the following:Faster still using the same approach (and requiring ~300 MB of memory):Even faster using the same approach (that does not exclude leading zeros in the solution, but that can easily be weeded out at the end):Here is an independent solution method that uses branch-and-prune techniques:And the winner for overall fastest:2. Write a haiku describing possible methods for predicting search traffic seasonality.math world's search engineseemed slowed this May. Undergradsprepping for finals.3. 11 12 11 2 1 11 1 1 2 2 1What's the next line?312211. This is the "look and say" sequence in which each term after the first describes the previous term: one 1 (11); two 1s (21); one 2 and one 1 (1211); one 1, one 2, and two 1's (111221); and so on. See the look and say sequence entry on math world for a complete write-up and the algebraic form of a fascinating related quantity known as Conway's constant.4. You are in a maze of twisty little passages, all alike. There is a dusty laptop here with a weak wireless connection. There are dull, lifeless gnomes strolling around. What dost thou do?A) Wander aimlessly, bumping into obstacles until you are eaten by a grue.B) Use the laptop as a digging device to tunnel to the next level.C) Play MPoRPG until the battery dies along with your hopes.D) Use the computer to map the nodes of the maze and discover an exit path.E) Email your resume to Google, tell the lead gnome you quit and find yourself in whole different world [sic].In general, make a state diagram . However, this method would not work in certain pathological cases such as, say, a fractal maze. For an example of this and commentary, see Ed Pegg's column about state diagrams and mazes .5. What's broken with Unix?Their reproductive capabilities.How would you fix it?[This exercise is left to the reader.]6. On your first day at Google, you discover that your cubicle mate wrote the textbook you used as a primary resource in your first year of graduate school. Do you:A) Fawn obsequiously and ask if you can have an autograph.B) Sit perfectly still and use only soft keystrokes to avoid disturbing her concentrationC) Leave her daily offerings of granola and English toffee from the food bins.D) Quote your favorite formula from the textbook and explain how it's now your mantra.

Page 28: Others

E) Show her how example 17b could have been solved with 34 fewer lines of code.[This exercise is left to the reader.]7. Which of the following expresses Google's over-arching philosophy?A) "I'm feeling lucky"B) "Don't be evil"C) "Oh, I already fixed that"D) "You should never be more than 50 feet from food"E) All of the above[This exercise is left to the reader.]8. How many different ways can you color an icosahedron with one of three colors on each face?For an asymmetric 20-sided solid, there are possible 3-colorings . For a symmetric 20-sided object, the Polya enumeration theorem can be used to obtain the number of distinct colorings. Here is a concise Mathematica implementation:What colors would you choose?[This exercise is left to the reader.]9. This space left intentionally blank. Please fill it with something that improves upon emptiness.For nearly 10,000 images of mathematical functions, see The Wolfram Functions Site visualization gallery .10. On an infinite, two-dimensional, rectangular lattice of 1-ohm resistors, what is the resistance between two nodes that are a knight's move away?This problem is discussed in J. Cserti's 1999 arXiv preprint . It is also discussed in The Mathematica guidebook for Symbolics, the forthcoming fourth volume in Michael Trout's guidebook series, the first two of which were published just last week by Springer-Verlag. The contents for all four guidebooks, including the two not yet published, are available on the DVD distributed with the first two guidebooks.11. It's 2PM on a sunny Sunday afternoon in the Bay Area. You're minutes from the Pacific Ocean, redwood forest hiking trails and world class cultural attractions. What do you do?[This exercise is left to the reader.]12. In your opinion, what is the most beautiful math equation ever derived?There are obviously many candidates. The following list gives ten of the authors' favorites:1. Archimedes' recurrence formula : , , ,2. Euler formula :3. Euler-Mascheroni constant :4. Riemann hypothesis: and implies5. Gaussian integral :6. Ramanujan's prime product formula:7. Zeta-regularized product :8. Mandelbrot set recursion:9. BBP formula :10. Cauchy integral formula:An excellent paper discussing the most beautiful equations in physics is Daniel Z. Freedman's " Some beautiful equations of mathematical physics ." Note that the physics view on beauty in equations is less uniform than the mathematical one. To quote the not-necessarily-standard view of theoretical physicist P.A.M. Dirac, "It is more important to have beauty in one's equations than to have them fit experiment."

Page 29: Others

13. Which of the following is NOT an actual interest group formed by Google employees?A. Women's basketballB. Buffy fansC. CricketersD. Nobel winnersE. Wine club[This exercise is left to the reader.]14. What will be the next great improvement in search technology?Semantic searching of mathematical formulas. See http://functions.wolfram.com/About/ourvision.html for work currently underway at Wolfram Research that will be made available in the near future.15. What is the optimal size of a project team, above which additional members do not contribute productivity equivalent to the percentage increase in the staff size?A) 1B) 3C) 5D) 11E) 24[This exercise is left to the reader.]16. Given a triangle ABC, how would you use only a compass and straight edge to find a point P such that triangles ABP, ACP and BCP have equal perimeters? (Assume that ABC is constructed so that a solution does exist.)This is the isoperimetrical point , which is at the center of the larger Soddy circle. It is related to Apollonius' problem . The three tangent circles are easy to construct: The circle around has diameter , which gives the other two circles. A summary of compass and straightedge constructions for the outer Soddy circle can be found in " Apollonius' Problem: A Study of Solutions and Their Connections" by David Gish and Jason M. Ribando.17. Consider a function which, for a given whole number n, returns the number of ones required when writing out all numbers between 0 and n. For example, f(13)=6. Notice that f(1)=1. What is the next largest n such that f(n)=n?The following Mathematica code computes the difference between [the cumulative number of 1s in the positive integers up to n] and [the value of n itself] as n ranges from 1 to 500,000:The solution to the problem is then the first position greater than the first at which data equals 0:which are the first few terms of sequence A014778 in the On-Line Encyclopedia of Integer Sequences.Checking by hand confirms that the numbers from 1 to 199981 contain a total of 199981 1s:18. What is the coolest hack you've ever written?While there is no "correct" answer, a nice hack for solving the first problem in the SIAM hundred-dollar, hundred-digit challenge can be achieved by converting the limit into the strongly divergent series:and then using Mathematica's numerical function sequence limit to trivially get the correct answer (to six digits),You must tweak parameters a bit or write your own sequence limit to get all 10 digits.[Other hacks are left to the reader.]19. 'Tis known in refined company, that choosing K things out of N can be done in ways as many as choosing N minus K from N: I pick K, you the remaining.

Page 30: Others

This simply states the binomial coefficient identity .Find though a cooler bijection, where you show a knack uncanny, of making your choices contain all K of mine. Oh, for pedantry: let K be no more than half N.'Tis more problematic to disentangle semantic meaning precise from the this paragraph of verbiage peculiar.20. What number comes next in the sequence: 10, 9, 60, 90, 70, 66, ?A) 96B) 1000000000000000000000000000000000\0000000000000000000000000000000000\000000000000000000000000000000000C) Either of the aboveD) None of the aboveThis can be looked up and found to be sequence A052196 in the On-Line Encyclopedia of Integer Sequences, which gives the largest positive integer whose English name has n letters. For example, the first few terms are ten, nine, sixty, ninety, seventy, sixty-six, ninety-six, …. A more correct sequence might be ten, nine, sixty, googol, seventy, sixty-six, ninety-six, googolplex. And also note, incidentally, that the correct spelling of the mathematical term " googol" differs from the name of the company that made up this aptitude test.The first few can be computed using the number name function in Eric Weinstein's MathWorld packages:A mathematical solution could also be found by fitting a Lagrange interpolating polynomial to the six known terms and extrapolating:21. In 29 words or fewer, describe what you would strive to accomplish if you worked at Google Labs

1.const char * char * constWhat is the differnce between the above tow?.2.In Unix inter process communication take place using?.3.What are the files in /etc directory?.4.About i-node numbers5.Max relaxable permisssion value with out giving write permission to others?.6.About ln(linking) 7. A question on until until (who |grep mary) do sleep(60) done

8.Linking across directories?.9.process id for kernell process10.very first process created by kernell11.function to repaint a window immediately?.12.Function entry for DLL in win3.113.win 3.1 is a 14.win 3.1 supports which type of multi tasking?.15.Message displayed when a window is destroyed6.About fork()?17.About send message and post message

Page 31: Others

18.Message to limit the size of window9.System call executable binary file intoa process20.About GDI object?.21.API used to hide window

1. Number of null pointers in any binary tree = n+1 2. max(t1,t2,...tn) = pipelining 3. 50% -DBETXXXXXX - density 4. print (Head(T))Traverse(left(T))print (Head(T))Traverse(right(T)) - ans: none of the above 5. CPU scheduling based questions  11. if even x/2else p(p(3x+1))2^k + 1: 3 . 2^(k-1) clarify this with sans 6. Compiler - related Qn. 7. LAN frames - ? related Qn. 8. sliding window protocol 9. kernel mode - deallocate resource 10. Combinatorics related 11. priority scheduling 14. any addrK^+ v(a) + 2I - 2aclarify with SANS. 15.Least no. when divide by [7 gives remainder 6,6gives 5,5 gives 4 andsoon ans;419 17.Artficial language is provided which of the language (Lisp) check 18. 241 change its equivalent octal ? 19. for cube and sphere 3 views are similarly draw one such figure? 20. Write a program to exchange two variaables without temp 21. Fortran cannot have value by reference

Page 32: Others

12) PATH = /bin : /usr : /yourhome The file /bin/calender has the following line in it cal 10 1997 The file /yourhome/calender has the following line in it cal 5 1997 If the current directory is /yourhome and calender is executed

a) The calendar for May 1997 will be printed on screenb) The calendar for Oct 1997 will be printed on screenc) The calendar for the current month( whatever it is) will be printedd) Nothing will get printed on screene) An error massage will be printed

15) which of the following function is used to repaint a window immediately

a) Sendmessage(hWnd,WM_PAINt,......) b) InvalidateRect(.......)c) MoveWindow d) WM_COPY e) None

33)how can u append the ls and who to certain existing file (like that)(i.e.listing & output of who is to be directed to a file

(a)ls;who>filename (b)ls;who>>filename(c)(ls;who)>>filename (d)who;ls(e)...

34)suppose u have a network .users complain of slow ....u suspect a problem in network adapter once u find that the data is continuous and erroneous. what device do u use?

(a)volt-ohmmeter (b)SNMP(c)protocol... checking (d)all of the above

37) in a student form what is the relationship b/w student and course(a)one to one (b)many to one (c)one to many (d)many to many

38)ROM is (a)volatile (b)permanent & fast(c)device containig boot up program & is not accessible (d)...

12. If the follwoing statements are given

@(a,b)= (a+b)/2 /(a,b)= a/b *(a,b)= ab If a=1, b=2 then find

i) /(a,(@(a,b),*(a,b))) ii) */(a,@(*(a,b)))

13. If the follwoing statements are given

(x#y) = x + y- xy (x*y) = (x + y)/2 i) Find the values of x, y will satisfy this equation (x#y)#(x*y) < (x#y)ii) Find the values of x, y will satisfy this equation (a*b)#(b*c)< (a#b)*(b*c)

Page 33: Others

14. Export PS1 results in(PS1 pwd)

a) primary prompt being your current directoryb) primary prompt and secondary prompts being the current directoryc) primary prompt prompt being your home directoryd) primary prompt and secondary prompts being the home directorye) None of the above.

15. If you type in the command nohup sort employees > list 2 > error out & and log off, the next time you log in, the output will be

a) in a file called list and the error will de typed in a file error outb) there will be no file called list or error outc) error will be logged in a file called list and o/p will be in error outd) you will not be allowed to log ine) none of the above

18. enum number { a=-1, b= 4,c,d,e}What is the value of e ?

(a) 7 (b) 4 (c) 5 (d) 15 (e) 3

26. PATH = /bin : /usr : /yourhomeThe file /bin/calender has the following line in it

cal 10 1997

The file /yourhome/calender has the following line in it

cal 5 1997

If the current directory is /yourhome and calender is executed

a) The calendar for May 1997 will be printed on screenb) The calendar for Oct 1997 will be printed on screenc) The calendar for the current month( whatever it is) will be printedd) Nothing will get printed on screene) An error massage will be printed

28. What will be result of the following program?

void myalloc(char *x, int n){x= (char *)malloc(n*sizeof(char));memset(x,\0,n*sizeof(char));}

main(){char *g="String";

Page 34: Others

myalloc(g,20);strcpy(g,"Oldstring");printf("The string is %s",g);}

a) The string is : String b) Run time error/Core dumpc) The string is : Oldstring d) Syntax error during compilatione) None of these

29. Which of the following function is used to repaint a window immediately

a) Sendmessage(hWnd,WM_PAINt,......) b) InvalidateRect(.......)c) MoveWindow d) WM_COPY e) None

33. Which of the choices is true for the mentioned declaration ?

const char *p;andchar * const p;

a) You can't change the character in bothb) First : You can't change the characterr & Second : You can;t change the pointerc) You can't change the pointer in both d) First : You can't change the pointer & Second : You can't chanage the charactere) None

3. For a  25MHz processor , what is the time taken by the instruction which needs 3 clock cycles,

(a)120 nano secs (b)120 micro secs (c)75 nano secs (d)75 micro secs7. Question related to java8. OLE is used ina) inter connection in unixb) interconnection in WINDOWSc) interconnection in WINDOWS NT9. Convert a given HEX number to OCTAL10. Macros and function are related in what aspect?

(a)recursion (b)varying no of arguments(c)hypochecking (d)type declaration

13. In signed magnitude notation what is the minimum value that can be represented with 8 bits

(a) -128 (b) -255 (c) -127 (d) 014. There is an employer table with key fields as employer number data in every n'th row are needed for a simple following queries will get required results.(a) select A employee number from employee A , where exists from employee B where A employee no. >= B      employee having (count(*) mod n)=0(b) select employee number from employe A, employe B where A employe number>=B employ number    group by employee number having(count(*) mod n=0 )

Page 35: Others

(c) both (a) & (b)(d) none of the above15. Type duplicates of a row in a table customer with non uniform key field customer number you can seea) delete from customer where customer number exists( select distinct customer number from customer having count )b) delete customer a where customer number in b rowedc) delete customer a where customer number in( select customer number from customer a, customer b )d) none of the above1. Given the following statement     enum day = { jan = 1 ,feb=4, april, may}     What is the value of may?

(a) 4 (b) 5 (c) 6 (d) 11(e) None of the above

STRUCT DOUBLELIST{ DOUBLE CLINKEDINT DET; LIST VOIDSTRUCT PREVIOUS; (BE GIVEN AND A PROCEDURE TO DELETE)STRUCT NEW; (AN ELEMENT WILL BE GIVEN)} DELETE(STRUCT NODE){NODE-PREV-NEXT NODE-NEXT;NODE-NEXT-PREV NODE-PREV;IF(NODE==HEAD)NODE}Q. In what case the prev was(a) All cases(b) It does not work for the last element(c) It does not for the first element(d) None of these

Page 36: Others

It went on for about 30 minutes

SECOND TECHNICAL INTERVIEW:

1. Tell me about urself2. About my family back ground3. What is a linked list4. What are the conditions that u put while traversing through a linked list5. What is a computer, and what is internet. image that u are explaining this to A person who dint even see or knew what a computer really isand some other questions............

It went on for about 20 minutesHR INTERVIEW:Hr interview was very cool. this round was just a formality and the questionsAsked were

1. Tell me abt urself2. Ur eamcet rank(it is competitive exam) and y so big rank3. Ur family details4. Y ADP?5. Will u sign a bond of 3 yrs6. Are u interested in further education and what are ur plans regarding that7. What companies did u attend and y u lost in those and what r the companiesU r planning to attend12. A FILE IS TRANSFERRED FROM A PLACE TO ADESTINATION CAPABLE OF 10 KB . THEY GIVEN SOME RATEOF TRANSFER. U HAVE FIND A EQUATION THAT BEST SUITTHIS.

25. 900 M WIDE 3000 M WIDTH SOMETHING I CAN'T REMEMBER SOME VALUES ARE GIVEN BY AIR PER M Rs. 4 BY GROUND PER M Rs. 5 THEN WHERE U WILL CUT ADD MAN OUT

26. 1.JAVA 2.SMALLTALK 3.LISP 4.EIFFEL

27. 1.SAP 2.ARP 3.WAP 4.TCP IP

1. ------stores a log of changes made to db,which are then written to _,which are then written to _,which is used if db recovery is necc.a) db buffer share poolb) program global area,shared poolc) system global area,large pool d) redo log buffer,online redo log

2. The primary characteristic of key field is that it must be unique

Page 37: Others

3. If a member initialiser is not provided for a member object of a class .The object - is called a) static fn b) non static fn c) default constructor d) none4. class constest {  private:     const int i;  public:    constest():i(10)}5. Inheritance  b) abstract base class  c) specifies a way to to define a const member data  d) none6. Iimplement polymorphism when by object belonging to different class can respond to the same message in diff ways.  a) late binding  b) dynamic binding  c) dynamically created object  d) virtual fun7. Member function---------- and ----------- set and reset the format state of flags.   a) set,reset   b) set,get   c) set, unset   d) set, unsetf8. Now some questions about extern variables.

9. Remember an inline function does type checking and so it is better than a macro a question on this.

Some memory is allocated using memalloc and then realloc is called. and now to write the size  of the variable.better learn memalloc and realloc. what it does and syntax.

1. Who is the father of computers 2. Expand HTML,DMA,FAT,LAN,WAN,FDDetc 3. Which was intel's first microprocessor4. Convert 1024 (in decimal) to octa and hexadecimal form5. First microprocessor was (a) 8085(b) 8088(c) 8086(d) 804876. Give the name of a processor produced by mortorola?7. What is the full form of WindowsNT ? 8. What is the difference between 8087 and 8086 7.P(S1)   a++;  P(S2)

Page 38: Others

   v++;  V(S2)  V(S1)P-wait, V-signal, S1 and S2 are semaphores. Consider two threads running. Is there a deadlock .If yes in which situation does the deadlock occur.8.How do you find the port number of the remote host?9. (Date; who)>logfile      Date; who>logfileWhat is the difference between the two statements.10.How do you find the machine MAC address11.Write the set operators that are used for select.12.Write a single command to find and delete all the files that are older than 1 day(modification time)13.A is a 3*4 matrix and B is 4*5 matrix. What is the number of additions and multiplications performed to obtain the resultant matrix14.What is the output#!/bin/perl             kill –0 pid15.#!/bin/perl    echo $_16. #!/bin/perl     kill $$     echo “hello world”17.List different schema/database objects18.Randomization is good for which algorithm(quick sort, heap sort, selection sort, hashed table, ….)19.Descride the language in the following regular expression (a*a) b+b20.In an I-node what is not there (file type, file name, size, owner)

22.Given Id, author, creation time, size, links, web page, description            Bring it in 2nd normal form23.Consider a heap containing numbers 10, 20, 30, 40, 80, 60, 70 such that numbers are in ascending order from the leaf to the root. If 25 is to be inserted what is the position.(A[1], A[2], A[3], A[4])24. #!/bin/perlvar=///aaaaecho ‘$var’

26.In database sort the student id and the course id for each student. Which is the best possible solution.-Sort the student id using a stable algorithm and then sort the course id using unstable algorithm-Sort the student id using a unstable algorithm and then sort the course id using stable algorithm- Sort the course id using a stable algorithm and then sort the student id using unstable algorithm- Sort the course id using a unstable algorithm and then sort the student id using unstable algorithm

Page 39: Others

2. 2n+1 numbers in a list except for 1 num all had duplicates, how tofind duplicate in O(n)5. Which is the DS used in dictionary mode in mobile (t9)6. Which is DS used for chess program...to predict move each and every time..7. There are $1070 dollars how to split them into bags such that askedfor any denomination from $1 to $1070 , u must b able to give withoutopening bag...

If any one has idea do mail me qrio.qrio at gmail.com (qrio dot qrioat gmail dot com).. Eagerly waiting...

Another paper:1. First fit issues...2. Algorithm to partition set of numbers into two s.t. diff bw theirsum is min and they hav equal num of elements3. Prog: given Numerator & Denominator.... print 0.3333333333 as .(3)0.123123 as .(123)

12   c 20(no of address lines in 1MB of memory) 13    A 120(25 hz processor,what is the time taken by the instr which needs 3 clock cycles)14    B synchronise the access(semaphores used for)                                           15   A system call(context switching is used in) 16   B the operating system(mapping of virtual to physical address)17   A 177333(conversion of HEX "0xFEDB"in octal)18   D used as a network layer protocall in network and windows(OLE) system19   B has to be unique in the sub network(internet address)20.  There is an employer table with key feilds as employer no. data in every n'th row are needed for a simple       following queries will get required results.    a) select A employe no. from employe A , where exists     from employe B where A employe no. >= B employe         having (count(*) mod n)=0    b) select employe no. from employe A, employe B where     A employe no. >= B employ no. grouply employe no.        having  (count(*)  mod n=0 )    c) both a& b    d)none of the above                                                                    21 . type duplicates of a row in a table customer with non uniform key feild customer no. you can see      a) delete from costomer where customer no. exists ( select distinct customer no. from customer having count )     b) delete customer a where customer no. in (select customer b where custermer no. equal to b custemor no.)        and a rowid > b rowid c) delete customer a where custermor no. in ( select customer no. from customer a,         customer b ) d) none of the aboveQ is not equal to zero and k = (Q x n - s)/2.What is n?  (a) (2 x k + s)/Q  (b) (2 x s x k)/Q  (c) (2 x k - s)/Q

Page 40: Others

  (d) (2 x k + s x Q)/Q  (e) (k + s)/Q

1.------- is associated with webservices. a) WSDL b) WML c) web sphere d) web logic

2.any large single block of data stored in a database, such as a picture or sound file, which does not include record fields, and cannot be directly searched by the database’s search engine.

a) TABLE b) BLOB c) VIEW d) SCHEME   3.Areserved area of the immediate access memeory used to increase the running speed of the computer program.

a) session memory b) bubble memory c) cache memory d) shared memory   4.a small subnet that sit between atrusted internal network and an untruster external network, such as the public internet.

a) LAN b) MAN c) WAN d) DMZ   5.technologies that use radio waves to automatically identify people or objects,which is very similar to the barcode identification systems,seen in retail stores everyday.

a)BLUETOOTHb) RADAR c)RSA SECURE ID d)RFID   26.For 1MB memory, the number of address lines required

a)12 b)16 c)20 d)32   27.There is a circuit using 3 nand gates with 2 inputes and 1 output,f ind the output.

a) AND b) OR c) XOR d) NAND   59)a relation schema R  is in BCNF if it is in ___________and satisfies an additional constraints that for every functional dependency XY,X must be a candidate key

a)1 NF b)2 NF c)3 NF d)5 NF    60) a _________sub query can be easily identified if it contains any references to the parent sub query columns in the _________ clause

A) correlated ,WHERE b) nested ,SELECT c) correlated,SELECT d) none

  61) hybrid devise that combines the features of both bridge and router is known as

a)router b)bridge c)hub d)brouter   62) which of the following is the most crucial phase of  SDLC

a)testing b)code generation  c) analysys and design d)implementation   63)to send a data packet using datagram ,connection will be established

a)no connection is required b) connection is not established before data transmission c)before data transmission d)none

Page 41: Others

       64)a software that allows a personal computer to pretend as as computer terminal is

a) terminal adapter b)terminal emulation c)modem d)none          65) super key is

a) same as primary key b) primary key and attribute c) same as foreign key d) foreign key and attribute

66.In binary search tree which traversal is used for ascending order values a) Inorder    b)preorder  c)post order  d)none

67.You are creating  an index on ROLLNO colume in the STUDENT table.which statement will you use?

a) CREATE INDEX roll_idx ON student, rollno;  b) CREATE INDEX roll_idx FOR student, rollno; c) CREATE INDEX roll_idx ON student( rollno); d) CREATE INDEX roll_idx INDEX ON student (rollno);

  68.A________class is a class that represents a data structure that stores a number of data objects

a. container  b.component c.base  d.derived   69.Which one of the following phases belongs to the compiler Back-end.

a. Lexical Analysis b.Syntax Analysis c. Optimization d.Intermediate Representation.

  70.Every context _sensitive language is context_free

a. true b.false   71.Input:A is non-empty list of numbers L     Xß-infinity    For each item in the list L,do    If the item>x,then Xßthe item   Return X X represents:-

a)largest number b)smallest number c)smallest negative number d) none   72.Let A and B be nodes of a heap,such that B is  a child of A. the heap must then satisfy the following conditions

a)key(A)>=key(B) b)key(A)<KEY(B) c)key(A)=key(B) d)none   73.String ,List,Stack,queue are examples of___________  

a)primitive data type b)simple data type c)Abstract data type d)none

  74.which of the following is not true for LinkedLists?

a)The simplest kind of linked list is a single linked list ,which has one link per node. this link points to the next node in the list,or to a null value or emptylist if it is the last node.

Page 42: Others

b)a more sophisticated kind of linked list is a double linkedlist or two way linkedlist. Each node has two links, one to the previous node  and one to the next node.

c) in a circleLinkedList, the first and last nodes are linked together.this can be done only for  double linked list.

d) to traverse a  circular linkedlist, u begin at any node and follow the list in either direction until u return to the original node.   75.sentinel node at the beginning and /or at the end of the linkedlist is not used to store the data   a) true   b) false

1. One Nibble = ?2. Hexadecimal and Octal representation of 1024 ?3. What a compiler does ?4. DOS ? (whether Graphical interface or Character interface and two morechoices are given)5. CPU - abbrevation6. Fortran used as ( Ans : Scientific Language)7. ASCII character set ? (total number)8. Windows NT- What NT stands for?9. Which is not an input device ? (keyboard, Disk, Mouse,Lightpen)10. Which is not a pointing device ?( mouse,Joy stick,lightpen none)11. Microsoft Chief ?12. 4GL ? (Fortran,SQL,ADA, ....)13. Father of Computers?14. Which of them is Object Oriented Language.?15. Power PC is the product of ? (Microsoft,IBM,Apple,Motorola,Intel)(A combination of any correct 3 companies)16. Latest processor used ? (Pentium, Power PC, Pentium pro,none)17. MS Word is ?18. First Super Computer built in India. (Ans : param)19. Which of the following companies donot manufacture chips?(Microsoft, Motorola, Intel, HP)20. LAN - abbrevation21. WAN - abbrevation22.  Modem is ? (related to electrical hardware.- Like Modulator &demodulator)23. FDD - abbrevation ( floppy Disc drive)24. BIT - abbrevation25. Information is ? (message, data,processed data,none)26. Which is not networking ?(internet, Ethernet, arcnet,none)27. One Gigabyte =?( 2 power30 , 2 power 20 ,2 power 10 none)28. Which of the following is not RDBMS ? (sybase, SQL,Acess,none)_29. Oracle is ? (Ans : Relationasl Data Base Management System)30. In Oracle, Table means ( Ans : Collection of records)31. DMA - abbrevation (Direct Memory Access,Discrete memory Access,Disk memoryaccess)32. What is meant byStatic Variable ?33. What is meant by QUEUE? {refer any data structures text}34. What is meant by STACK? {refer any data structures text}35. The processor used in first IBM PC? (8086,8088,zig4,intel)

Page 43: Others

36. Difference between 80286 and 8028737. In bubble sort , no. of comparisons required ?(ans : formula : N*(N-1)/2)38. No. of comparisons of an item in 100 items by binary comparison?( 10,25,50 100)39. CRT - (Cathode Ray Tube)40. No. of entryvalues are there in ideally in a subroutine.41. Binary tree?42. Flow in one direction ? (Single linked list,Double linkedlist,.......,....)43. Electron screen size ? (here, 2 lines of algorithm is given.Name the algoirithm)44. Which is not storage device.? (printer,CD ROM,Disk,none)45. A question regarding memory ? ( least used memory,recently unusedmemory,..)46. ISO - (International Standard Organisation)47. HTML - (Hyper Text Makeup Language)48. Flow chart for factorial N? (ans :choice a)49. What is meant by Recursion ?

10. When the circulation of water in a boiler is by a centrifugal pump then the boier is known asA. Internaly fired B. Externally fired C. Natural circulation Boiler D. Forced circulation boiler11. Which boiler is best suited to meet fluctuation demand of steamA. locomotive B. Lancashire C. Cornish D. Babcock and Wilcox

what is FAT?.

3.whict protocol is used when file through internet is send from one server to another server.(1)x.25(2)SMTP (3)TELNET. 4.which protocol is used for file transfer(1)ftp (2)tftp

7. accessing of tap in a machin is like(1)stack (2)queue (3)file 8.the tuple in a table represent the1)Domain 2)relations

3.which of the following is true?

(1) The algorithm is optional for the problem (2)There exists algorithm that determine prefix sums in linear time(3)The following segment determines prefix sums correctlyB[0]=a[0];for(j=1;j<n;j++) b[j]=b[j-1]+a[j];

Page 44: Others

A.(1) one only B.(2) but not (3) C.(3)but not (2) D.(2)and(3)

16. In selecting the pivot for Quicksort, which is the best choice for optimal partitioning:

a. the first element of the array b. the last element of the arrayc. the middle element of the array d. the largest element of the arraye. the median of array

19. What is the basic difference between a join and a union?

20. Can a view be updated/inserted/deleted? If yes-under what condition?

22. Which of the constraints are used to achieve referential integrity?

a. Primary Key b. Unique Keyc. Foreign Key d. Not Null constraint

26. Which of the following is not an aggregate function?

a. distinct b. maxc. sum d. count

13. What is the order of each of the following tasks? (Choose from O(1), O(log2 n), O(n), O(n log2 n), O(n2), O(2n); each order may appear more than once.)

(a) Pooping an item off a stack containing n items.(b) Performing a Towers of Hanoi algorithm with n disks.(c) Using quick sort to sort an array of n integers, in the average case.(d) Using quick sort to sort an array of n integers, in the worst case.(e) Inserting a single item into a binary search tree containing n items, in the average case.(f) Performing a bubble sort on an array of n integers, in the worst case.(g) Displaying all n elements in a sorted linked list.(h) Performing a binary search of a sorted array of n strings, in the worst case.

16. Write a query to list the maximum salary in such departments which have more than two employees from table EMP which has columns empno, ename, deptno, salary.

19. Write a query to find the max salary from emp (empno, ename, salary) without using max function.

Page 45: Others

21. Consider the following graph

If this graph is searched by depth-first search, starting from vertex 1, and if neighbours are searched in numerical order, what will be the order in which the nodes are visited? (Note: If you use an explicit stack for depth-first search, then the nodes are visited when they come off the stack, so they have to pushed in reverse numerical order to be searched in numerical order)

Question 1In C language, which of the following is equivalent to &2[3[a][5]]?

(a) &a[5][3][2] (b) &*(*(a[2]+5)+3)(c) &5[*(a+3)][2] (d) a[5][2][3] (e) a[2][3][5]

12222

3

2

7

4

5

10

11

1

13

8

6

9

Page 46: Others

Question 2Below is a set of characters and their relative frequencies of occurrence. If we build an optimum Huffman code for this set of characters, how many bits will it take to represent the character “g”?

Character : f g h m n p q-------------------------------------Frequency : 1 1 2 3 3 5 8

(a) 8 (b) 5 (c) 4 (d) 2 (e)

Question 3Suppose we have a binary tree T on n nodes. It is not extended, and is not required to be full. If the first node of its postorder traversal is the same as the last node of its preorder traversal, what can we conclude?

(a) The left subtree of T is empty.(b) The right subtree of T is empty.

(b) T contains atmost three nodes.(d) T has height n-1. ( Here height is defined as the maximum distance from a leaf to the root.)(e) (a) and (b).

Question 4The following postfix expression containing single digit operands and arithmetic operators + and *, is evaluated using a stack. ( consider left to right as bottom to top ).5 2 * 3 4 + 5 2 * * +What are the contents of the stack after the evaluation of 5 2 * 3 4 +

(a) 10 7 (b) 6 9 (c) 7 10 (d) 9 6 (e) 7 7

(a) O(n log(n)) (b) O( log(n)) (c) O( n^2)(d) O( n^2 * log(n)) (e) O(2 log(n))

Question 9Which traversal will produce output that takes maximum processing time when fed to a randomized quick sort algorithm for a binary tree? A randomized quick sort can randomly select any elements from the current set of elements, as pivot.

(a) Preorder (b) Inorder (c) Postorder (d) All are same

Question 10An insect sitting at coordinate (0,0) can move either one unit or two units at a time i.e. if it is at (x,0), it can go either (x+1,0) or (x+2,0). In how many ways it can go from (0,0) to (n,0).

Question 11

Page 47: Others

Given an unsorted array of length n, what is the least no. of comparisons needed to find the minimum and maximum of the array?

(a) n^2 (b) ln(n) (c) 2n-2 (d) 3*floor[n/2]

Question 12Find the postorder traversal if A,B,C,D,E,F and G are the nodes of a binary tree and the inorder and preorder traversals of the tree is as given belowPreorder : ABEFCDGInorder : EFBCGDA

Question 9A hash table contains 10 buckets and uses linear probing to resolve collisions. The key values are integers and the hash function used is key%10. If the values 43, 165, 62, 123, 142 are inserted in the table, in what location would he key value 142 be inserted?

(a) 2 (b) 3 (c) 4 (d) 6 (e) 10

Question 10If f(A,B) = A’+B, what does f(f(x+y,y),f(x+y,y)) simplify to?

(a) x’+z (b) 1 (c) xy’+z (d) none of the above

Question 11Your college has been assigned a Class B address of 192.55.0.0. As a network administrator, you are in charge of sub-netting the IP address space assigned to your institution, among 48 departments. Assuming the sub-netting is done optimally, what is the maximum number of hosts that each of the 48 departments can have (Assume that no host can have an all 0 or all 1 address)?

(a) 2046 (b) 512 (c) 1022 (d) 254 (e) none

Question 12A host on a network has a Class B address of 192.168.243.5. The subnet mask used is FF.FF.F0.0 ( in Hex). Which of the following address and sub-net masks identify a host in the same network?

(a) 192.168.1.1/255.255.240.0(b) 192.168.239.5/255.255.240.0(c) 192.168.240.192/255.255.240.0(d) 192.168.224.240/255.255.240.0(e) none

5. What is the largest prime number that can be stored in an 8-bit memory?

11. In a two-dimensional array, X(9,7), with each element occupying 4 bytes of memory, with the address of the first element X(1,1) is 3000, find the address of X(8,5).

12. A FILE IS TRANSFERRED FROM A PLACE TO ADESTINATION CAPABLE OF 10 KB . THEY GIVEN SOME RATE OF TRANSFER. U HAVE FIND A EQUATION THAT BEST SUIT THIS.

Page 48: Others

ADD MAN OUT26. 1.JAVA 2.SMALLTALK 3.LISP 4.EIFFEL27. 1.SAP 2.ARP 3.WAP 4.TCP IP

16. Select the odd one outa. Oracle b. Linux c. Ingress d. DB2

17. Select the odd one outa. SMTP b. WAPc. SAP d. ARP

18. Select the odd man out.a. Java b. Lisp c. Smalltalk d. Eiffel

28. The size of the bucket is N kb. The bucket fills at the rate of 0.1kb per millisecond. A programmer sends a program to receiver. There it waits for 10 milliseconds. And response will be back to programmer in 20 milliseconds. How much time the program takes to get a response back to the programmer, after it is sent? 29. The size of a program is N. And the memory occupied by the program is given by M = square root of 100N. If the size of the program is increased by 1% then how much memory now occupied ?

16.there is a file whose ORGANISATION is INDEXED.you want to read the records from the file in RANDOM fashion as well as sequentially.then which of the access mode would you specify? a.SEQUENTIAL b.RANDOM c.DYNAMIC D.ACCESS MODE has nothing to do with it17.consider the following PROCEDURE DIVISION entry OPEN EXTEND IN-FILE identify the correct statement a.organization of IN-FILE is sequential and records can be added in the beginning b.organization of IN-FILE is sequential and records can be added in the end c.organization of IN-FILE is indexed and records can be added in the beginning d.organization of IN-FILE is indexed and records can be added in the end18.what is the size of W-REC in the following 01 W-REC

05 A PIC 9(4)V9905 B READLINES A 10 C PIC XX 10 D PIC S9(4)05 E OCCURS 7 PIC ZZ.ZZ05 F OCCURS 5 10 G PIC ZZ.ZZZ99 10 H OCCURS 3

15 J PIC 9(3)

Page 49: Others

15 K PIC V99 a.177 b.161 c.180 d.none of yhe above19.consider the following two IF statements:

IF X AND NOT Y MOVE A TO BIF Z=1 OR 9 MOVE A TO B

select one of the following data divusion entries which gives identical results for both the above IF statements a.01 Z PIC 9

88 X VALUE 1.9 88 Y VALUE 0.2 THRU 8

b.01 Z PIC 9 88 X VALUE 0.2 THRU 8 Y VALUE 1.9

c.01 Z PIC 9 88 X VALUE 1.9 88 NOT-Y VALUE 0.2 THRU 1.9

d.none of yhe above20.consider the following two statements

MOVE 10 TO NPERFORM PARA-X N TIMESSTOP RUN

PARA-XMOVE 5 TO N

how many times PARA-X willbe exicuted? a.10 b.5 c.infinate d.execution error21.given the following:

77 A PIC 9V9 VALUE 9.577 B PIC 9 VALUE 9.77 C  PIC V9 VALUE 0.877 D PIC 977 E PIC 977 F PIC 9V999

what are the contenta of D E nad F after teh following statements are executed: COMPUTE F ROUNDED=A+C/B

MULTIPLY A BY C GIVING EADD B C A GIVING D ROUNDED

a.F=9.589 E=8 D=1 b.F=9.589 E=8 D=9 c.F=9.589 E=7 D=9 d.F=9.589 E=7 D=1  22. Consider the follwoing IF condition:if a less 1200 if b greater 25 move 47 toc else move 57 to c

Page 50: Others

if a greater 249 move 67 to c else next sentence else if b less 67 move 27 to c   What will be the value of C, when A is 137 and b is 25 (a) 27 (b) 57 (c) 67 (d) none 23. Consider the following:        77 W-NUM PIC 9 VALUE 0

------ MOVE 1 TO W-NUM PERFORM PARA-X UNTIL W-NUM > 9.------PARA-XADD 1 TO W-NUMHow many times PARA-X is executed ?(a) 10 (b) 9 (c) 11 (d) Infinite loop

24. Consider the following code:          77 A PIC 99V99 VALUE 55.35

77 B PIC 99V999 VALUE 32.754ADD B TO A ON SIZE ERROR DISPLAY "ERROR!!!"What will be the result ?(a) A=88.10, B=32.754(b) A=87.00 B=32.754(c) A=87.10 B=32.754(d) ERROR!!! will be DISPLAYed on the screen.

25. Consider the following:77  A PIC 9(10)77 B PIC 9(10)77 C PIC 9(19MULTIPLY AB BY B GIVING CWhich of the following is true ?(a) The execution of the above may result in size error.(b) The execution of the above will result in size error.(c) The definition of C is invalid resulting in compilation error.(d) No error will be thee and the program would proceed correctly.

26. A paragraph PARA-X is to be executed when none oof the data names A, B and C have value of 1. Which of the following will achieve this ?

(a) IF A NOT = 1 OR B NOT = 1 OR C NOT = 1 PERFORM PARA-X(B) IF NOT A= 1 AND B= 1 AND C = 1 PERFORM PARA-X(C) IF A NOT =1 IF NOT B = 1 OR C= 1 PERFORM PARA-X(C) IF A NOT = 1 AND B NOT = 1 AND C NOT = 1 PERFORM PARA-X

  27. Study the five expressions and the class to which they belong:S.N. Expression Class1 "SPACES" Figurative constant2. "Depreciation Schedule Non-numeric literal3. "12%" Non-numeric literal4. INTEREST-DUE Non-numeric literal5. ZEROES Figurative constant

Page 51: Others

Which of the following statement is true? (a) 1 and 3 are incorrect

(b) 1 and 4 are incorrect(c) 3 and 4 are incorrect(d) All are correct

  28. Identify the invalid dataname from the following: (a) SAVINGS-ACCOUNT

(b) ANNUAL-ALLOCATION-FOR-OVERHEAD(c) SAMOUNT250(d) 12DEMAND

Page 52: Others

  29. Study the DATA DIVISION entries and the three PROCEDURE DIVISION entries given below:

01 END-OF-FILE-SWITCH PIC XXX. 88 NO-MORE-RECS VALUE "YES". 88 MORE-RECS VALUE "NO".(i) READ SAMPLE-FILE AT END MOVE "YES" TO NO-MORE-RECS.(ii) IF NO-MORE-RECS = "YES" GO TO LAST-PARA.(iii) IF NO-MORE-RECS GO TO LAST-PARA.

Which are wrong?(a) (i) and (ii)(b) (ii) and (iii)(c) (i) and (iii)(d) all

  30. The following entries appear in the WORKING-STORAGE SECTION:01 DATE-TODAY. 05 YY PIC XX VALUE "90". 05 MM PIC XX VALUE "12". 05 DD PIC XX VALUE :31".01 DATE-EDIT PIC XX/XX/XX.MOVE DATE-TODAY TO DATE-EDIT.(a) 901231(b) 90/12/31(c) 31/12/90(d) 311290

  31. How many bytes will be allocated for the following record description entries?

01 REC-A. 05 A PIC S9(4). 05 B PIC XXXBXXX. 05 C PIC ____9.99. 05 D PIC S9(5) COMP-3. 05 E PIC 9(3) COMP.(a) 29(b) 26(c) 25(d) 28

  32. What is wrong with the following data declaration? 01 W-DATE PIC X(6).

05 DD PIC 99. 05 MM PIC 99. 05 YY PIC 99.(a) Nothing is wrong.(b) Under W-DATE all level 05 items are having a PIC 99 but level

01 has PIC X(6).(c) PIC can't be specified for a group item.(d) DD, MM, and YY are invalid datanames.

 

33. What is the output generated by the following code?01 GRP-I.

Page 53: Others

05 SUBFLD1 PIC XX VALUE "AB". 05 FILTER PIC X(6) VALUE SPACES.01 GRP-2 REDEFINED GRP-1. 05 SUB-FLD2 PIC XX. 05 SUB-FLD3 PIC XX. 05 FILTER PIC X(4).IF SUB-FLD1 NOT = SPACESDISPLAY "SUBFLD1"MOVE "ABBCCD" TO GRP-1IF SUB-FLD3 = SPACES

DISPLAY "SPACES"ELSE

DISPLAY "SUBFLD3"DISPLAY "END"

ELSE DISPLAY "SPACES"

DISPLAY "END".(a) SUBFLD1 SUBFLD3 END(b) SPACES END(c) SUBFLD1 END(d) SUBFLD1 SPACES

  34. 88 level entry is used for(a) data items in WORKING-STORAGE SECTION(b) items with RENAMES clause(c) condition-names(d) None of the above

  35. ZEROES and SPACES are _______ constants(a) Figurative(b) Numeric(c) Non-numeric(d) Alphabete

  36. COMPUTE X = A * B - C * D and COMPUTE X = (A * B) - (C * D)

(a) Are not the same(b) Are same(c) Syntactically wrong(d) Will yield a run time error

  37. OCCURS clause is used in the DATA DIVISION on data names at(a) 01 level (b) 77 level (c) 88 level (d) any level from 02 to 49

  38. Consider the following COBOL entries:05 X PIC 99 VALUE 10.SUBTRACT 20 FROM X.

The resultant value of X wil be

Page 54: Others

(a) 10(b) 00(c) compile-time error(d) none of these

  39. Consider the following COBOL entries05 X PIC 99 VALUE 10.ADD 40 X TO X.COMPUTE X = 3 * X - 40.

The result in X is(a) 10(b) 40(c) Compile or Run time error(d) none of these

  40. given the following piece of code:CALL SUB-PGM USING A, B, C.CALL SUB-PGM USING A, C, C.(a) Both CALL statements will always produce same result.(d) Both CALL statements may produce different result.(c) Compile-time error because SUB-PGM is a dataname.(d) Compile-time error because A, B, C are used twice.

  41. The hierarchy of the execution of logical operators is(a) NOT AND OR(b) AND OR NOT(c) OR AND NOT(d) OR NOT AND

  42. The order of precedence of arithmetic operators in an expression can be overridden with the use of

(a) [](b) ()(c) {}(d) Any of the above