Anda di halaman 1dari 57

units

2)(energy * time * time )/(mass * dist) = distance


3)(momentum * velocity)/(force * time) = velocity
5)find the physical quantity represented by momentum *velocity] / [length * acceleration]?

(1)Full form of URL ?


a) universal resource locator b) uniform resource locator
c)none of these d) unidentified random locator.

(2)CDROM access is
a) RANDOM b) SEMI RANDOM c) SEQUENTIAL

(3)Total time spent by process...waiting in queue, execution etc


(4)response time..of process.
(5)What is the function of shell?
a)Interpreter b) command interpreter c) interface
(6)Which is a command interpreter ?
a) Shell b) Kernel c)??? d)None of these

(7)main()
{
printf("%c","abcdef"[4]);
}
what is the output ?
a) abcdef b) d c) e d) ERROR.

(8)main()
{
char dummy[20]; scanf("%[^a]",dummy);
printf("%s", dummy); }
what will it do?
a) ERROR b) take characters till ctrl z is pressed
c) take upto 19 characters d) None of These

(9)How are objects in cpp passed ?


a) By value b) By reference

Technical Interview:
(1)Difference between structure and class.
(2)How to resolve ambiguity in multiple inheritance ?
(3)What is static and dynamic binding in C ?
(4)What is the difference between structure and array?
(5)Difference between calloc and malloc & realloc?
(6)What is static class and static member function?
(7)What is pointer to a pointer? How it is declared and how is it accessed?
(8)What is the difference between function overriding and overloading ?
(9)What is the scope of a variable ?
(10)What is the difference between C & C++ ?
(11)Some questions on templates and exceptions.
(12)What is stream ? How is it opened and describe file handling in CPP?
(13)Some questions related to Hard Disc :What is a hdd? How is a file accessed from
the hdd? Why isn’t it used in place of a RAM ? What is RAID describe its basic
structure ?. Where is the file information stored on the hard disk ? What is FAT ? How
are files physically arranged on the hard disc?
(14)What is JVM, what is BYTE CODE ? What is multithreading ? How can it be
implemented using C, write a program to describe it? What is the complexity of radix
sort and how is it determined? A sequence of 15 numbers was to be sorted using heap
sort. (He stopped me after the 3rd iteration)
(16)What is fork system call? How is a child process called and what happens to the
parent ? In C what is spawnv () function, describe its execution. How can you use C for
writing assembly language programs ?
Q29. An atomic particle exists and has a particlular decay rate . It is in a train . When
the train moves, a person observes for whether the decay rate
(a) increases
(b) decreases
(c) depend on the directions of movement of train
Q32. The best tool for editing a graphic image is ?
Q33. Network scheme defines
a)one to one b) many to many c) one to, many ?
Q34. A person wants to measures the length of a rod.First he measures with standing
ideally then he maeasures by moving parrel to the rod
(a)the length will decrease in second case
(b)length will be same
(c) length will increse in the second case.
Q36. What is the resulting solution when benzene and toluene are mixed ?
1) Can .asp & .aspx pages work if placed in same virtual directory?
2) Does different versions on .NET framework & different versions of assemblies work
side by side (Clue: Side by side execution)
3) Can you typecast one Object type to another Object type or One object type to
another data type (Clue: Boxing & Unboxing)
4) A question about GAC(Global Assembly cache) and the files it contains?
5) A question about Application Domain and does it interfere with OS Process.
6) A question on session timeout on an asp.net page and whether the session time out
duration depend on the duration set in code or does it depend on IIS(Internet
Information Services) setting and if both are specified which setting overrides which?
Also whether it will take smaller time or greater time in to consideration.
7) How can assemblies be created in .NET ? (clue: Using visual studio.net (or) using
al.exe (or) using reflection.emit)
8) What is a satellite assembly and what does it contain?
9) Also 4 to 5 questions were on assembly. I recommend to have a dissected look of the
assembly.
10) What will an Erase command do? Erases the contents of array or Erases the whole
array structure & frees memory.
11) How is anchoring different from docking? (clue: its related to windows/web controls)
12) What is serialization in .NET? What are different types of serialization and
advantages and disadvantages?
13) Are RCW(Runtime Callable Wrapper) and P/Invoke different and how?
14) What is Strong Naming? What details does it contain? how can it be created (Clue:
Using SN.exe)
15) What information does Culture identity contain?
16) What is a Diffgram? (Clue: Related to XML)
17) What is UDDI(Universal Discovery Description and Integration) ?
18) Also a program on Exception handling was given and asked which part will exectute
and which throw an error?
19) What is Managed and Unmanaged code in .NET?
20) Can we use redim on array already declared in VB.NET? if yes, can we redim with in
a class? within a module? or with in a program?
For technical there were 20 multiple choice questions:
Out of which about 6 was electronics and 14 was from computer related areas

1. Full form of TTL and CMOS


2. Which is a good conductor (Extrinsic or Intrinsic)
3. What are the different types of capacitors (Electrolytic, dielectric...etc)
4. Select a passive component from the following (four choices were there)
6. To convert 1's complement to 2's complement and vice versa
8. Out of four choice we have to identify which is a macro.
9. There was one pointer expression related question.
10. To find post fix expression.
12. Defnition of turing machine.
13. Where we use DFD(Data flow design)
a)structural languages b)object oriented languages
c)UML d)all of the above
14. Name the error which occurs when we write on a page
a) segment fault b)permission fault c) page fault
15. A question based on the representation of an array in C
An array whose elements are fn pointers which inturn returns a character

Directions for question 3-5 : Answer the questions based on the passage above
them
Liz, Jenni, Jolie and Rick have an English final on Friday and they all would like to study
together at least once before the test. Liz can study only on Monday, Tuesday and
Wednesday nights and Thursday afternoon and night.Jenni can study only on Monday,
Wednesday and Thursday nights and Tuesday afternoon and night. Jolie can study only
on Wednesday and Thursday nights, Tuesday afternoon and Monday afternoon and
night. Rick can study the afternoons and nights of Tuesday, Wednesday and Thursday,
and on Monday afternoon.

23. If the group is to study twice, then the days could be


(a) Monday and Wednesday
(b) Tuesday and Thursday
(c) Wednesday and Thursday
(d) Monday and Friday
(e) Tuesday and Wednesday

24. If three of them tried to study together when all four couldn't
(a) this would be possible twice
(b) it would have to be on Wednesday night
(c) Rick could not attend the three person groups
(d) This could be accomplised on Monday and Tuesday only
(e) This would not be possible

25. If Liz decided to study every night,


(a) she would never be able to study with Rick
(b) she would never be able to study with Jolie
(c) she would have at least two study partners each night
(d) she would have to study alone on Monday night
(e) she would study with only Jenni on Thursday night
SECTION 2-COMPUTER AWARENESS (15 questions)

1. What is the number of functions of a three variable boolean function?

4. What is video resolution ?

1. Abt Ur project.(u will be grilled by them)


2. Be confidence.(They will check ur temper by asking some questions)
3. Abt software development life cycle
4. Abt ur interest area in computer field
5. Abt memory management in Operating System.
6. Abt Unix basic commands
7. Abt doubly linked list
8. Fibonacci series and palindrome program in C
9. Abt Gates(Be prepare on Digital Circuit Logic Design)
10. Abt complier design(phases)
11. bt TCP&IP and OSI Model.
12. Abt OOPS concepts

ANALYTICAL
Technical Interview
12. What is the need of normalisation in data base.
13. 1-5 all normalise forms( from many they directly asked 4th and 5th normanilise..
(mostly from m.c.a.’s)
14. What is semafore in o.s.
15. What is paging and demand paging.
16. How memeory works in a computer system.
17. How recursion works in c
18. Which data structure used in recursion.
19. deference between structure n union.
20. What is erp…..(accenture having work in erp…as we m.c.a’s having erp in
3rd sem so…the person highlighted or wrote sth in resume ,they asked abt erp
from them only).
21. What is reengineering in erp
22. If u have too much cash in ur hand, then what u will do in behalf of the company

VIRTUSA

->In how many different ways, a rectangle can be cut into 4 identical parts.

-> using the numbers 1, 2, 3, 25, 50, 75, 100 Exactly one time, give an expression
which will give the answer as 383.

-> using the numbers 1, 2, 25, 50, 75, 100 Exactly one time, give an expression which
will give the answer as 383.

-> volume of sphere is (PI)*(Theta) Cubic-meters and Surface area is (PI)*(Epslon)


Square-meters And both are 4 digit integer numbers. What is the value of radius?
-> Inthe figure given below, Replace '?' mark by any operator (+, -, *, /, =) and if we
leave as it is, numbers are considered together and forms either 2 or 3 digit numer.
Generate an expression using some symbols.
------------------------

| ? | 2 | ? |3 |
------------------------
| 2 | |? |
------- ------
| ? | |1 |
------------------------
| 6 | ? | 1 |? |
------------------------

-> Analise the Programe


main(){
int x=1,y=1;
while( (x > 0) && (y > 0) ){
printf("%16d%16d",x,y);
x += y;
y += x;
}}

-> Start from a random number, generate a sequence such that if number is odd
multiply it 3 and add 1. If number is even, divide the number by 2. This Sequence will
always cyclic with 4, 2, 1. In this sequesce, find the maximum power of 2 generaged in
the sequence and print only the power, not the sequence.

-> Start with a random 2 digit number, The series is generated by multiplying the
number by 2 and placing the last 2 digits as the next number. Series continues until one
of the element repeats.

-> write a function maxsubstring(str,alpha,theta) str is the source string and have to
return maximum sub string which starts with alpha and ends with theta.
INTERVIEW
---------

-> what will this line will do? if it is legal?


B -= (B < 0) * 2 * B;

-> what does this function do??


int f(int p)
{
int i = 0, t = 1, s = 1;
while( s <= p)
{
i++;
t += 2;
s += s;
}
return i;
}

-> explain What is divide and conuer method?


Travelling salse man problem
What is greedy method

-> How Neural Networks and A.I are related.


1) x1 peach + y1 plum = z1 apple
x2 peach + y2 plum = z2 apple
(x1,y1 .... z2 are integer values)
How many peaches make one apple?

Product of all Bradman's first class scores or Sum of all test scores of Sachin.

4) U r provided with 500ml and 300ml jar(it has no markings).


a) u have to measure exactly 100ml.
b) u have to measure exactly 200ml.

5) Using four 4's u have to make 1 ... 10.


(for eg. 1 = (4/4)*(4/4)
2=?
.
.
10 = ? )

6) student,canopy,thirst,... are the words given.


u have to group the words using the following words
1)Master
2)Teacher
3)Deft
etc..(i don't remember some of words)
7) U have to cut a Pizza using 7 st. lines(wit out rearranging) and u have to obtain
maximum number of
pieces.
( Give generalised solution..)

8) U have to cut a Cylindrical cake of diameter 32 cm and height 20 cm in to 12 equal


pieces.

9) In a village there r 2 groups.


1) Knight -> always tell true
2) Knave -> always tell false

Mr.X met a man of that village(u don't which grp he belongs) and questioned "Tell me
whether u r knight or knave ?"
Reply: "i cannot tell u and left that place"
Find which grp that man belongs to?

10) obtain 277 from 3,25,50,65,100.use 4 arithmetic operations only.

11) 1#2=x ,2#3=y, 4#4=z


4@14=a, 5@15=b, d@e=f
( i don't remember values for x,y,z,a,b,c,d,e,f)
find (2#4)@5= ?

->CODE is encoded as DGBF


READ is encoded as JHNV
Fins "KOVAI"

2. Essay(General).
==================
(Topic given: India should spend money on Atom bomb and Rocket OR for the welfare
of poor.)

3. Problem solving.
===================
(Problem statement: How will u determine number of Petrol bunks in Madras.)
4. Programming.(4 Qns)
===============
( we can use any Programming Language for coding)
a) They had given one function ,we have to find it what it does and also problem in the
fn. and how to
overcome it.
double what( double z, int y)
{
double answer;
while( y > 0 )
{
if( y%2 == 1)
answer = answer * z;
y=y/2;
z=z*z;
}
return answer;
}

b) They had given one Pseudocode.We have to find bug


in the pseudocode.
c) write a program to print all Armstrong numbers,
(abc=a^3+b^3+c^3)
(for eg. 153=1^3+5^3+3^3)
d) write a function witj the following conditions,
1)It should have one integer parameter.
2)If the value passed is -ve, return -1.
3)If the value passed is a perfect square, return root of that number.
4)If the value passed is a not a perfect square, return that number itself.

11.Write the set operators that are used for select.

12.Write a single command to find and delete all the files that are older than 1 day
(modification time)
http://www.ChetanaS.org
13.A is a 3*4 matrix and B is 4*5 matrix. What is the number of additions and
multiplications performed to obtain the resultant matrix

14.What is the output


#!/bin/perl
kill -0 pid

15.#!/bin/perl
echo $_

16. #!/bin/perl
kill $$
echo "hello world"

17.List different schema/database objects

18.Randomization is good for which algorithm(quick sort, heap sort, selection sort,
hashed table, ...)

19.Descride the language in the following regular expression (a*a) b+b

20.In an I-node what is not there (file type, file name, size, owner)

22.Given Id, author, creation time, size, links, web page, description
Bring it in 2nd normal form

23.Consider a heap containing numbers 10, 20, 30, 40, 80, 60, 70 such that numbers
are in ascending order from the leaf to the root. If 25 is to be inserted what is the
position.(A[1], A[2], A[3], A[4])

24. #!/bin/perl
var=///
aaaa
echo ‘$var’
26.In database sort the student id and the course id for each student. Which is the best
possible solution.
- Sort the student id using a stable algorithm and then sort the course id using unstable
algorithm
- Sort the student id using a unstable algorithm and then sort the course id using stable
algorithm
- Sort the course id using a stable algorithm and then sort the student id using unstable
algorithm
- Sort the course id using a unstable algorithm and then sort the student id using
unstable algorithm

14) One circular array is given(means memory allocation tales place in circular fashion)
diamension(9X7) and sarting add. is 3000, What is the address of (2,3)........
Sol) it's a 9x7 int array so it reqiure a 126 bytes for storing.b'ze integer value need 2 byes
of memory allocation. and starting add is 3000
so starting add of 2x3 will be 3012.

15) In a two-dimensional array, X (9, 7), with each element occupying 4 bytes of memory,
with the address of the first element X (1, 1) is 3000, find the address of X (8, 5).
Sol) initial x (1,1) = 3000 u hav to find from x(8,1)so u have x(1,1),x(1,2) ... x(7,7) = so
u have totally 7 * 7 = 49 elementsu need to find for x(8,5) ? here we have 5 elements
each element have 4 bytes : (49 + 5 -1) * 4 = 212 -----( -1 is to deduct the 1 element )
3000 + 212 = 3212

17) The size of a program is N. And the memory occupied by the program is given by M =
square root of 100N. If the size of the program is increased by 1% then how much
memory now occupied ?
Sol) M=sqrt(100N)
N is increased by 1%
therefore new value of N=N + (N/100)
=101N/100
M=sqrt(100 * (101N/100) )
Hence, we get M=sqrt(101 * N)
18) 1)SCOOTER --------- AUTOMOBILE--- A. PART OF
2.OXYGEN----------- WATER ------- B. A Type of
3.SHOP STAFF------- FITTERS------ C. NOT A TYPE OF
4. BUG -------------REPTILE------ D. A SUPERSET OF
1)B 2)A 3)D 4)C

25. find units: (Momentum*Velocity)/(Acceleration * distance )


26. Which of the following set of numbers has the highest Standard deviation?
1,0,1,0,1,0
-1,-1,-1,-1,-1,-1
1,1,1,1,1,1
1,1,0,-1,0,-1
27. What curve best suits the following data:
X Y
0.99 0.00001
10.04 1.02
99.98 1.997
1000 3.0
9990 4.004
(a) y = logn x (b) y = log10 x (c) y = ex (d) y = -log10 x (e) y = - ex
28. Of the four straight lines A, B, C, D find out which pair forms an orthogonal set
A: 5x+4y-7 = 0, B: y = -x , C: y = 7x+3, D: 4x = 5y+5
(a)AD (b) AC (c) BC (d) BD (e)AB

1. Ok, what do your friends call u???


2. how many friends do u have???
3. Do u talk with girls???
4. How many girl friends do u have???
5. whatz the difference of a girlfriend from a girl who is a friend???
6. what do u do on sundays???
7. Do u like hyderabad???
8. whatz so special about it???
9. what places have u got to visit in hyd...???
10. how many of them have u gone to???

(1) APTITUDE TEST


There were four sections::-(a) General English & verbal test,
(b) Quantitative aptitude (c) Logical reasoning (d) Technical(mainly on C,dbms).
[concentrate on R.S.Agarwal for quanti & the logical part.]

(2) TECHNICAL QUESTIONS


1. What are the types of OS, with examples?
2. Difference between Linux & Windows.
3. During multitasking, whether the jobs are executed parallely? Whether the
WINDOWS OS is pre-emptive?
4. Is multitasking & multithreading are same or not?
5. Various versions of WINDOWS.
6. Latest Version of WINDOWS(Windows vista).
7. What do you know about Vista ?
8. What is SDLC & its steps.
9. How will you decide which language (whether c,java,etc…) is suitable for the
development of a particular software?
10. Why java is platform independent?
11. Are the JVM for C & JVM for JAVA are different?
12. What are byte code & object code?
13. Difference between C & Java.
14. What is polymorphism & its types?
15. How overriding is done?
16. What is inheritance?
17. How error handling is done in Java?
18. Types of classes in Java.
19. Storage classes in C.
20. Types of function calls?
21. Call by reference & call by value.Which is better?
22. What are the types linklist?
23. Write a program to search a certain node in a linear linklist?
24. Write a program to find the length of a string in C?
(3)HR QUESTIONS
25. Why Zensar? Your plans for the next 4 years with Zensar.
26. What are your achievements?
27. Which part of the powerpoint presentation did you like the most?
28. How many presentations have you seen before?
29. Why have you failed in the interviews which you had earlier?
30. How will you rate yourself out of 5 in the technical interview?
31. What do you think, your weakest part in technical interview?
32. Will you have any problem,if you are relocated out of kokata?
33. Do you have any questions for us?
33)What is the storage required for the name "George"?
A) Six bits of storage B) Six Bytes of Storage
C) Six Pixels of Storage D) One Kilo Byte of Storage

34)What is the part of compiler that keeps track of names and their attributes?
A) Compile Table B)Symbol Table C)Table D) Logical Table

36) Which constructor is invalid for class cat?


A) void cat :: cat() { feet=4;} B)cat::cat(int f){feet=f;}
C) cat::cat(void){feet=8;} D) cat::cat(int f){this->feet=f;}

37) Typical user defined signal handler functions perform actions such as
A) abort process immediately without further ado
B) Perform minor house keeping prior to resumption
C) Roll back process state to last checkpoint
D) Tidy up to process abortion
A) 1&2 B) 2 & 4 C) 3 D) 4
38) What is the name given to the process initizlizing a microcomputer with its OS?
A) Cold Booting B) Booting C) Warm Booting D) None of these
39) Desirable attributes for memory management include
A) Protection- such memory should be protected against being written on by other
processes
B) Encryption- ability to encrypt data with a randomly selected key that is discarded
after use without being disclosed so that data can never read again.
C)Uniform access rates-ability to retard faster data fetch rates so that all data fetches
are uniformly performed at the least fast data fetch rate
D)none of these
40)Major expressions used with find command to select file is it has been accessed in
more than 375 days,is
A)-a time +365 B) -m time +365 C)-a time -365 D) -m time -365
41)Which of the following is not a basic computer network topology?
A)Train topology B)Bus topology C)star topology D)ring topology
42) which file contains all permanent information and is updated during processing by
transactions of data?
A) Master File B) Local File C) Parent File D) Primary File
43) Which set option is used with vi editor to display line numbers on screen?
A) nm B) nu C)ic D)li
44) Assuming you have the environment variable ENV=.kshrc set, what is the entry in
ur. kshrc or .profile that will save up to ur last 200 commands in a history list?
A) HISTSIZE=200 B) set history 200 C) HISTORY=200 D) setenv history 200
45) You have 1MB of memory left on the HDD and when booting the system crashes.
What is the reason?
A) Not enough synchronous buffer
B) Not enough contiguous memory in virtual memory
C) Not enough space on the hard drive for the swap file.
D) Not enough space on the hard drive for working memory.
46) How do I remove a file with the name '-something' ?
A) use the "--" flag to rm B) Use "##" flag to rm
C) Use the "-" flag to rm D) Use the "!" flag to rm.
47) The customer is an internet search engine with hits from global customers exceeding
10 million per day. You identify Knowledge Management as the driving business issue.
Which feature is most imp to this customer solution?
A) Single system image B) Speed and performance
C) Very large memory, very large database D) H/W Partitioning
48) Unlike function templates, when instantiating a class template, you must explicitly
instantiate the class by giving?
A) The parameters for the class templates
B) The arguments for the class templates
C) The variables for the class templates D) None
49) In private inheritance derived class members can access base class members that
are 1) Public 2) Private 3) Protected
A) 1 & 2 B) 1 & 3 C) 2 & 3 D) 1,2 & 3
50)The output of an OR Gate is LOW when
A) All inputs are LOW B) Any Input is LOW
C)Any input is high D) All inputs are HIGH

26. 1.java 2.smalltalk 3.lisp 4.eiffel

27. 1.sap 2.arp 3.wap 4.tcp ip


16. Select the odd one out
a. Oracle b. Linux c. Ingress d. DB2
17. Select the odd one out
a. SMTP b. WAP c. SAP d. ARP
18. Select the odd man out.
a. Java b. Lisp c. Smalltalk d. Eiffel
19. Which of the following are orthogonal pairs?
a. 3i+2j b. i+j c. 2i-3jd. -7i+j
1. fllow is directly proportional to?
2.what is newton's first law?
3. what is pascal's law?
4.strain gauge workes on which priciple?
6.which is 3rd layer of OSI MODEL?
10.PID stands for?
11. PID is used for?
12.which is used for measurement of temp upto 1200 degree ?
13. 200degree celsius is equivalent to how many kelvin?

1. Which of following software is not used for FEM.


3.One question from iron- carbon diagram.
4.which is used vfor hardening of brass.(hardenig methods).
5.which is most suitsble theory of failure for ductile materials.
6.One from solidification time of casting.
7. one from rack angle sticking friction.
8. one from chip cut thickness.
9. one from life of bearings.
10.one from heat transfer through multislabs and one from fins.
11.one question from linkage mechanism.
12.one question from ISO 9000.
13. One question from condensation temp in refrigation cycle.
14. Two questions from moulding techniques.

1. Convert 16 into binary form ……..


2. In which gate o/p is 1 when all i/p are 1
3. What is moving coil ammeter reading, if supply is (10+15 sin 314 wt),
4. If voltmeter reads 100V,if we want to measure 150 what we have to do
5. Y-delta starter used in induction motor for………..
6. In a balanced Y connection if VAN=400at 60,what is VBN ……………..
7. for unity TMS 10 sec, what about 0.5 TMS ………………ans: 10(chck it).
8. 400V,15 kW,4%slip,50 Hz, 4 pole what is the torque,
9. what r the factors influencing change in torque &speed
10. buccholtz relay is used for
11. lightening arrester is used for
12. what is the power dissipated in i=10+5 sin 314wt for 2ohm resistor
14. what should be the impedance value for 3-4j,for max power transfer
15. if current required for triggering thyristor at -30 degrees(temp) is 80 mA, what is
the current required at 60 degrees.
16. Question regarding thevenins resistance
17. Fourier series expansion like periodic signal ……..
18. Question regarding reactive power compensation ………
19. Question regarding positive sequence currents …some L-L-G fault occur on 3 – ph
network Ia current……like
20.400v,50ohm resistor , inductive reactance 100ohm , circuit to be resonance, find the
voltage across capacitor
21. what is the ideal power loss for 1.1mH & 11.86 nF, length is negligible
voltage
22. sync motor is used for
24. regarding p.u. values
25. regarding voltage bus parameters (3 ph networks)
26. charging of capacitor
27. reactive power compensation
28. Poles location
29.I controller is used for ……………..steady state error reduction…

6. For a circle, radius is inc. by some % , find net change in area?


7. How is impedance matching done and why do we need it (basically can talk about
ideal power supply needing a low internal resistance and high load to function
properly. so one stage of transistor amplifier has to have low o/p resistance and
high i/p resistance for next stage- do look up all basic electronics) ( also about
sinking high currents without damage)
8. what is a smith chart used for
9. Name all flipflops u know and working esp. master slave.
10. progaming - program to find how many 1's are present in an integer variable
using bitwise operators. something about dynamic allocation, static functions,
macros
11. c++ virtual functions
12. what is an inode in unix?
13. small program in pascal to add a node to a linked list. (You have to tell what the
program does)
14. C strcmp program (You have to tell what the program does)
15. Set of dos commands testing basic familiarity with dir, ren *.t?t, cd etc.
16. What is the order of binary search?
17. what is the order of strassens matrix multiplication?
18. you have to maintain the sorted order of integers and insert ntegers . which data
structure would you use? (tree, list, queue,array?)
19. There are two lists of integers to be merged. Which method would you not use?
20. n an online database system when is data written to disk? (onpressing enter,
when commit or update is encountered, at end of data,all of the above)
21. Small prolog function which prints 2345true. You need to tell output.
22. Lisp program given. what does it do? (GCD, LCM, Multiplies mxn?)
23. What is paging?
24. what is segmentation?

1)
int i;
if i=0 then i:=1;
if i=1 then i:=0;

2)
int i;
if i=0 then i:=1;
if i=1 then i:=0;
(given that i can take only two values (1,0))
3)
int i;
if i=0 then i:=1;
else if i=1 then i:=0;
(given that i can take only two values (1,0))

4)
int m,j,i,n;
for i:=1 to n do
m:=m+j*n

5) Expand the following


a) ISDN
b) CASE
c) CSMA/CD
d) OOPS
e) MIMD

6) In the following questions, answer A,B,C,D depending on when


the errors are detected?
A if no error is detected
B if semantic and syntactic checking
C if during Code genration & Symbol allocation
D run time

a) Array overbound
b) Undeclared identifier
c) stack underflow
d) Accessing an illegal memory location

7) How many page faults will occur for below sequence of pages when LRU
page replacement algorithm is used ( The memory can only have 3pages):

1,2,3,4,2,1,5,2,4 (something like that)

8) If a CPU has 20 address lines but MMU does'nt use two of them.
OS occupies 20K. No virtual memory is supported. What is the
maximum memory available for a user program?

9) For a binary tree with n nodes, How many nodes are there which
has got both a parent and a child?

10) Understand the funda of incrementing a variable using


val++ and ++val . Some programs are given for error correction.

11) Learn datagram . (Computer networks)


14) A question on call by value,
call by name,
call by reference.

f(x,y,z)
{
y := y+1;
z := z+x;
}
main()
{
int a,b;
a := 2
b := 2;
f(a+b,a,a);
print a;
}

what is the value of a printed for three different calls in main.

15) Using the following instructions and two registers , A&B. find out A XOR B and put
the result in A
PUSH <reg>
POP <reg>
NOR These instructions operates with A & B and puts the result in AND A

(question basically to get XOR in terms of NOR and AND)

16) True/False questions:


1) The page size should be the power of 2.
2)
17)
int i=0;
int j=0;

loop:
if(i = 0)
i++;
i++;
j++;
if(j<= 25)
goto loop
xxx:
question1 : how many times is the loop entered

A few questions of that sort. some count fundaes. Easy one )

19) For which of following is it not possible to write an algorithm.

a) To find out 1026th prime number


b) To write program for NP-complete problem
c) To write program which generates true Random numbers. etc...

20) what is the essential requirement for an real-time systems

a) pre-emption
b) virtual memory
c) paging etc...

In a certain code, the symbol for 0 (zero) is. * and that for 1 is $. The numb.:rs greater
than 1 are to be written only by using the two symbols given above. The value of the
symbol for 1 doubles itself every time it shifts one place to the left.
(For example, 4 is written as $**; and; 3 is written as $$)
18) 260 can be represented as:
A) $****$** B) $$*$$$$$ C) $$*$$$$** D) $*****$**
19) 60 / 17 can also be represented as:
A) $$$*$*** / $$**$$ B) $$$***** / $$**$$
C) $*$$*$** / $$**$$ D) $$*$*$** / $$**$$
20) $***$ can be represented as:
A) $$$ / $* B) $*$**- $$ C) $*$*$- $$ D) $$$***$ - $$
21) binary 3 - 011 & 4 - 100 & 5 - 001 so convert it into binary n solve it.
Your answer for each question below would be:
A., if ALL THREE items given in the question are exactly ALIKE.
B, if only the FIRST and SECOND items are exactly ALIKE.
C, if only the FIRST and THIRD items are exactly ALIKE.
D, if only the SECOND and THIRD items are exactly ALIKE.
E, if ALL THREE items are DIFFERENT.
22 - 45 que just matching of pattern
22)LLMLLLKLMPUU, LLMLLLKLMPUU, LLMLLLKLMPUU
A) A B)B C)C D)D E)E
23) 0452-9858762, 0452-9858762, 0452-9858762
A) A B)B C)C D)D E)E
24. If* stands for /, / stands for -,+ stands for * and -stands for +, then 9/15*9+2-9=?
A) 14.7
B) 15.3
C) 14.1
D) 16.2
25. If * stands for -,/ stands for +, + stands for / and -stands for *, then which of the
following is TRUE?
A) 16/8*6+90-12 =23.2
B) 8*12/6+90-12 =7.2
C) 16*6/8+16-12 =-4.1
D) 12*16/6+90-12 =8
26. See the options given below which one is correct
A) 6 S 7 A 2 M 3 W 0 D 7
B) 6 A 7 S 2 M 3 W 0 A 7
C) 6 S 7 M 2 S 3 W 0 M 7
D) 6 M 7 S 2 A 3 X 0 D 7
Although he os a CSE student, I was questioned mostly on Electronics subjects. So do
take care about brushing up Electronics and Physics also.
01. NAND Gate
02. Ways to connect a computer in India and another in Switzerland (only 1 or 2 won’t
do, they wanted wayS)
03. Modulation-Demodulation
04. Working of a modem
05. Program for logic gates
06. Difference between MS Access and Oracle
07. RDBMS product in market
08. Why make queries and use SQL when u have MS Excel
09. Reflection, Refraction, Total Internal Reflection
10. Optical Fibre
11. Bit, byte, kilobyte, memory, etc in c, c++ and Java
12. Microwave
NON-TECHNICAL
01. Tell me something about yourself
02. Why should we hire u?
03. What r ur weaknesses?
04. What is special about today? (Ans.: 3rd March is celebrated as TaTa Day (Mr.
Jamshed Tata’s B’day))
05. What would u do if u are walking on a highway all alone with no means of
communication and you witness an accident in which a motor cyclist is badly injured?
There is no other vehicle to seek help from.
06. Why should we hire you?
07. Tell us about E-Major and E-Minor chords in guitar (my hobby)
08. Speak for 2 minutes on “Americas war on Iraq”
09. Difference between a Joint and Nuclear family
10. Where do u see urself 5yrs dowm the line
11. What would u like to do 24 hrs in a day
12. Why T.C.S.?
13. If Microsoft or some other company pays u more than us, u’ll leave us?
14. What would ur reaction be if u do not find ur name on the selection list and wat
would u do?
15. What r the 2 changes u would want to make in the TCS recruitment procedure?
16. What 2 improvements would u like to make in urself?
17. Founder of TCS?
Numerical
9. In 80 coins one coin is counterfeit what is minimum number of weightings to find out
counterfeit coin
9. What are ur future plans?
10. So u think u r hard working?
11. If u r asked to carry buckets of water, which requires hard working people, will u do
the job?
12. What will u do if IT industry collapses suddenly? Any alternate future plans?
13. R u interested in politics?
14. Can u answer questions from Economics?
15. R u not interested in India's Economy?
16. Can u exchange Franc with Euro?
17. Pound is the currency of which country?
18. Mark is the currency of which country?
19. Who is the captain of Brazil Football Team?
20. Who is the captain of England Cricket Team?
21. U dont watch Cricket?
22. What do u do at home? Only studies?
23. What type of information u search in Internet?
26. If the vertex (5,7) is placed in the memory. First vertex (1,1) ‘s address is 1245 and
then address of (5,7) is ----------
27. Which of the following are orthogonal pairs? a. 3i+2j b. i+j c. 2i-3j d. -7i+j
41. A 2D array is declared as A[9,7] and each element requires 2 byte. If A[ 1,1 ] is
stored in 3000. Find the memory of A[8,5] ?
16. Select the odd one out
a. Oracle b.
Linux c. Ingress
d. DB2
17. Select the odd one out
a. SMTP b. WAP
c. SAP
d. ARP
18. Select the odd man out.
a. Java b.
Lisp c. Smalltalk
d. Eiffel

2. Match the following:


1. Male - Boy --->
a. A type of
2. Square - Polygon ---> b.
A part of
3. Roof - Building --->
c. Not a type of
3. Match the following.
1. brother – sister --->
a. Part of
2. Alsatian – dog --->
b. Sibling
3. sentence – paragraph ---> c.
6) a program was given on FOR loop and asked to find out the final value of the variable
used, after the execution of the program.

7) Decimal equivalent of a number (ex:110.l11)

8) Question on data structures (with diagram) and asked what the diagram implies.

9) Which of the following are phases of 2-phase locking protocol?


1) Intent to request locks
2) Release the present locks and never asking for transmission
3) Both (1) and (2)
4) None of these

10) When an array of pointers is passed through a function, what actually is passed?
1) address of the starting element
2) last element
3) first element
4) number of elements

-Questions on Database Management Systems


- Name some databases
- Keys in DBMS
- Difference between UNIQUE key and PRIMARY key.
- CREATE : to create objects in the database
- ALTER : alters the structure of the database
- DROP : delete objects from the database
- TRUNCATE : remove all records from a table, including all spaces allocated for the
records are removed
- COMMENT : add comments to the data dictionary
- RENAME : rename an object
DML (Data Manipulation Language) statements are used for managing data within
schema objects. Some examples:
- SELECT : retrieve data from the a database
- INSERT : insert data into a table
- UPDATE : updates existing data within a table
- DELETE : deletes all records from a table, the space for the records remain
- MERGE : UPSERT operation (insert or update)
- CALL : call a PL/SQL or Java subprogram
- EXPLAIN PLAN : explain access path to data
- LOCK TABLE : control concurrency
- Normalization forms? Explain them.
- All the commands in dbms like create, insert, count, drop, select.......
- Leaky bucket algorithm. http://www.ChetanaS.org
- Is there any compiler in oracle
- Diff between DBMS & RDBMS?? What r Codd rules???
- How many types of relationship??? Eg. Of many-to-many relationship???
- What is join??

Questions on JAVA
- Difference between Java and C++
- Oops concepts and features
- What is a constructor?
- What is a class?
- What is an object?
- What is polymorphism?
- What is Inheritance?
- What is overriding?
- What is an Interface?
- What are abstract data types?
- What do u mean by access specifier?
- What is overloading?
- What is Encapsulation?
- What is garbage collection?
- How do u allocate memory in java?
1) There is no need to fill the resume with too many languages and os..
Questions will b asked basing on whatever u state in resume. So have an idea on all the
languages and operating systems u keep in it.

2) When u r asked to tell about your favorite area in C it would always b better to tell
arrays. If u tell like functions and pointers and functions,..
then little complicated questions will b asked.

3) Also when u asked to rate yourself in C, then better give 5/10.if u give ratings like
6/10 or 7/10 then questions from pointers r asked. So b careful while rating yourself.

4) While rating 5/10 if he asks y so less then say him confidently that u r still trying to
improve your knowledge in C.
5) B confident in whatever u say even though it is wrong.

6) If u have done any project then b prepared with your role in the project work.
7) Unless asked never say your hobbies and weakness. Que like how do u overcome
your weakness is asked.
8)Your weakness should b their strength..
9) Never say condractictory qualities.
Eg : Hardwork is your strength and
Weakness is your laziness
10) If u committed a mistake while speaking in English, don't bother about that.. Instead
continue your answer.. That's important..
We were given only 10 minutes after the results of the written test were announced.
I was the 3rd to my pannel and was the first to be selected by him.
he: give me ur resume
me: gave him the resume
he: tell me abt ur self
me: I was prepared for it.i gave the answer promptly. I couldnt maintain eye contact
initialy but i could manage it.

he: wat do u kno in C


me: basics
he: C++?
me: no. and told him the reason y i didnt learn them outside.
its always better to substantiate such things with a reason.

he: wat is a datatype


me: gave the answer
he: asked something on linked list.
me: I couldnt hear him. so i told him i donno
he: wats the difference bet ms office xp and 2003
me: (i wrote tat in my computer skills) i told him we use only the basic features of ms
office. may be there r some internet related features in 2003 which r not there in xp.

the real difference is dat office xp runs in win 98, 2000, and win xp. but 2003 runs only
on win xp and win 2000 with servicepack.

he: narrated a big passage. the gist was that whether a file created in office 2003 be
opened in office xp.
me: yes sir it can be without a problem
he: r u sure Chet anaS
me: yes sir. i tol him our college has xp and i have 2003 and we often transfer
documents.

he: any questions?


me: asked him two questions related to technical only. dat was a plus point for me.
he: then told me to wait outside and told that he will let me kno
me: thank u sir.he forwarded his hand and i did the same and gave a firm shake hand.
within few min I was given a form for hr interview. It was very lengthy and almost took
20 min to fill. Within next 10 min after filling the form I was called for HR interview.

Interviewer was a lady.


she: tell me abt ur ur self
me: tol her same thin letter to letter as i tol in tech.

this time eye contact was not at all a problem

she: (i told her something on my introspection in my intro) she asked gimme an incident
as an example.

me:i didnt expect her to ask it.but suddenly an incident flashed into my mind. it really
happened in my first year.i told her dat.

she: tell me abt ur family


me : told her
she: y didnt u get placed in CTS and TCS?
me: (cts and tcs came to our college on 3rd of aug) I told her i didnt clear their written.

she: wat did u learn from dat


me: I was not expecting dat but my mind was alert as I was not at all tensed. I told her tat
donot fall for temptation from CTS and do not prepare more than ur caliber from TCS.

she: why wipro?


me: I was perpared for this question. i tol her three points abt wipro in which i gave her a
hint tat i prefer working in south india.

she: wat if i place u in gurgoan (wipro is there in gurgoan)


http://www.ChetanaSinterview.com
me: no problem i will work there for a couple of years and take a transfer and come back
to south.

she: wat do u think abt ur college:


me: told her all the good things which i knew abt our college (our college is really popular
for its placements, thanks to ur placement officer). first i told her tat our college has good
placements and good companies r coming and i also told tat Wipro is one such company

its always good to boost abt ur college though u dont like somethings in ur college describe
those points in which ur college is different from other colleges.

then she told me "ok u can leave"

i told thank u and left.


1) Which of these is an invalid dataname?
a) wd-count b) wd_count
c) w4count d) wdcountabcd
Q5) If the mean failure hour is 10,000 and 20 is the mean repair hour. If the printer is
used by 100 customer, then find the availability.

1)80% 2)90% 3)98% 4)99.8% 5)100%

Q6)One question on probability...

Q7)In a singly linked list if there is a pointer S on the first element and pointer L is on
the last element. Then which operation will take more time based on the lenght of the
list.

1)Adding element at the first.

2)adding element at the end of the list.

3)To exchange the fisrt 2 element.

4)Deleting the element from the end of the list.

3 more question to fine the output of the program.

and rest of the question was based on data structure,

some condition where given and we have to conlude either y or n

The second section was coding...

1)Write a function to multiply 2 N*N matrix

Write test cases for your code.

2)S contains the set of positive integer. Find the largest number c such that c=a+b
where a,b,c are distict number of the set.

Q2)This question is based on the complexity ...


Q3)
s->AB
A->a
B->bbA
Which one is false for above grammar..
Q3)Some Tree were given & the question is to fine reorder traversal.
Q4)One c++ program,to find output of the program..
Q5)If the mean failure hour is 10,000 and 20 is the mean repair hour.If the printer is
used by 100 customer,then find the availability.
1)80% 2)90% 3)98% 4)99.8% 5)100%
Q6)One question on probability...
1. Solve this cryptic equation, realizing of course that values for M and E could be
interchanged. No leading zeros are allowed.
WWWDOT - GOOGLE = DOTCOM
This can be solved through systematic application of logic. For example, cannot be equal
to 0, since . That would make , but , which is not possible.
Here is a slow brute-force method of solution that takes a few minutes on a relatively
fast machine:
This gives the two solutions
777589 - 188106 == 589483
777589 - 188103 == 589486
Here is another solution using Mathematica's Reduce command:
A faster (but slightly more obscure) piece of code is the following:
Faster still using the same approach (and requiring ~300 MB of memory):
Even faster using the same approach (that does not exclude leading zeros in the
solution, but that can easily be weeded out at the end):
Here is an independent solution method that uses branch-and-prune techniques:
And the winner for overall fastest:
2. Write a haiku describing possible methods for predicting search traffic seasonality.
math world's search engine
seemed slowed this May. Undergrads
prepping for finals.
3. 1
11
21
1211
111221
What's the next line?
312211. This is the "look and say" sequence in which each term after the first describes
the previous term: one 1 (11); two 1s (21); one 2 and one 1 (1211); one 1, one 2, and
two 1's (111221); and so on. See the look and say sequence entry on math world for a
complete write-up and the algebraic form of a fascinating related quantity known as
Conway's constant.
4. You are in a maze of twisty little passages, all alike. There is a dusty laptop here with
a weak wireless connection. There are dull, lifeless gnomes strolling around. What dost
thou do?
A) Wander aimlessly, bumping into obstacles until you are eaten by a grue.
B) Use the laptop as a digging device to tunnel to the next level.
C) Play MPoRPG until the battery dies along with your hopes.
D) Use the computer to map the nodes of the maze and discover an exit path.
E) Email your resume to Google, tell the lead gnome you quit and find yourself in whole
different world [sic].
In general, make a state diagram . However, this method would not work in certain
pathological cases such as, say, a fractal maze. For an example of this and commentary,
see Ed Pegg's column about state diagrams and mazes .
5. What's broken with Unix?
Their reproductive capabilities.
How would you fix it?
[This exercise is left to the reader.]
6. On your first day at Google, you discover that your cubicle mate wrote the textbook
you used as a primary resource in your first year of graduate school. Do you:
A) Fawn obsequiously and ask if you can have an autograph.
B) Sit perfectly still and use only soft keystrokes to avoid disturbing her concentration
C) Leave her daily offerings of granola and English toffee from the food bins.
D) Quote your favorite formula from the textbook and explain how it's now your mantra.
E) Show her how example 17b could have been solved with 34 fewer lines of code.
[This exercise is left to the reader.]
7. Which of the following expresses Google's over-arching philosophy?
A) "I'm feeling lucky"
B) "Don't be evil"
C) "Oh, I already fixed that"
D) "You should never be more than 50 feet from food"
E) All of the above
[This exercise is left to the reader.]
8. How many different ways can you color an icosahedron with one of three colors on
each face?
For an asymmetric 20-sided solid, there are possible 3-colorings . For a symmetric 20-
sided object, the Polya enumeration theorem can be used to obtain the number of
distinct colorings. Here is a concise Mathematica implementation:
What colors would you choose?
[This exercise is left to the reader.]
9. This space left intentionally blank. Please fill it with something that improves upon
emptiness.
For nearly 10,000 images of mathematical functions, see The Wolfram Functions Site
visualization gallery .
10. On an infinite, two-dimensional, rectangular lattice of 1-ohm resistors, what is the
resistance between two nodes that are a knight's move away?
This problem is discussed in J. Cserti's 1999 arXiv preprint . It is also discussed in The
Mathematica guidebook for Symbolics, the forthcoming fourth volume in Michael Trout's
guidebook series, the first two of which were published just last week by Springer-
Verlag. The contents for all four guidebooks, including the two not yet published, are
available on the DVD distributed with the first two guidebooks.
11. It's 2PM on a sunny Sunday afternoon in the Bay Area. You're minutes from the
Pacific Ocean, redwood forest hiking trails and world class cultural attractions. What do
you do?
[This exercise is left to the reader.]
12. In your opinion, what is the most beautiful math equation ever derived?
There are obviously many candidates. The following list gives ten of the authors'
favorites:
1. Archimedes' recurrence formula : , , ,
2. Euler formula :
3. Euler-Mascheroni constant :
4. Riemann hypothesis: and implies
5. Gaussian integral :
6. Ramanujan's prime product formula:
7. Zeta-regularized product :
8. Mandelbrot set recursion:
9. BBP formula :
10. Cauchy integral formula:
An excellent paper discussing the most beautiful equations in physics is Daniel Z.
Freedman's " Some beautiful equations of mathematical physics ." Note that the physics
view on beauty in equations is less uniform than the mathematical one. To quote the
not-necessarily-standard view of theoretical physicist P.A.M. Dirac, "It is more important
to have beauty in one's equations than to have them fit experiment."

13. Which of the following is NOT an actual interest group formed by Google employees?
A. Women's basketball
B. Buffy fans
C. Cricketers
D. Nobel winners
E. Wine club
[This exercise is left to the reader.]
14. What will be the next great improvement in search technology?
Semantic searching of mathematical formulas. See
http://functions.wolfram.com/About/ourvision.html for work currently underway at
Wolfram Research that will be made available in the near future.
15. What is the optimal size of a project team, above which additional members do not
contribute productivity equivalent to the percentage increase in the staff size?
A) 1
B) 3
C) 5
D) 11
E) 24
[This exercise is left to the reader.]
16. Given a triangle ABC, how would you use only a compass and straight edge to find a
point P such that triangles ABP, ACP and BCP have equal perimeters? (Assume that ABC
is constructed so that a solution does exist.)
This is the isoperimetrical point , which is at the center of the larger Soddy circle. It is
related to Apollonius' problem . The three tangent circles are easy to construct: The
circle around has diameter , which gives the other two circles. A summary of compass
and straightedge constructions for the outer Soddy circle can be found in " Apollonius'
Problem: A Study of Solutions and Their Connections" by David Gish and Jason M.
Ribando.
17. Consider a function which, for a given whole number n, returns the number of ones
required when writing out all numbers between 0 and n. For example, f(13)=6. Notice
that f(1)=1. What is the next largest n such that f(n)=n?
The following Mathematica code computes the difference between [the cumulative
number of 1s in the positive integers up to n] and [the value of n itself] as n ranges from
1 to 500,000:
The solution to the problem is then the first position greater than the first at which data
equals 0:
which are the first few terms of sequence A014778 in the On-Line Encyclopedia of
Integer Sequences.
Checking by hand confirms that the numbers from 1 to 199981 contain a total of 199981
1s:
18. What is the coolest hack you've ever written?
While there is no "correct" answer, a nice hack for solving the first problem in the SIAM
hundred-dollar, hundred-digit challenge can be achieved by converting the limit into the
strongly divergent series:
and then using Mathematica's numerical function sequence limit to trivially get the
correct answer (to six digits),
You must tweak parameters a bit or write your own sequence limit to get all 10 digits.
[Other hacks are left to the reader.]
19. 'Tis known in refined company, that choosing K things out of N can be done in ways
as many as choosing N minus K from N: I pick K, you the remaining.
This simply states the binomial coefficient identity .
Find though a cooler bijection, where you show a knack uncanny, of making your choices
contain all K of mine. Oh, for pedantry: let K be no more than half N.
'Tis more problematic to disentangle semantic meaning precise from the this paragraph
of verbiage peculiar.
20. What number comes next in the sequence: 10, 9, 60, 90, 70, 66, ?
A) 96
B) 1000000000000000000000000000000000\
0000000000000000000000000000000000\
000000000000000000000000000000000
C) Either of the above
D) None of the above
This can be looked up and found to be sequence A052196 in the On-Line Encyclopedia of
Integer Sequences, which gives the largest positive integer whose English name has n
letters. For example, the first few terms are ten, nine, sixty, ninety, seventy, sixty-six,
ninety-six, …. A more correct sequence might be ten, nine, sixty, googol, seventy, sixty-
six, ninety-six, googolplex. And also note, incidentally, that the correct spelling of the
mathematical term " googol" differs from the name of the company that made up this
aptitude test.
The first few can be computed using the number name function in Eric Weinstein's
MathWorld packages:
A mathematical solution could also be found by fitting a Lagrange interpolating
polynomial to the six known terms and extrapolating:
21. In 29 words or fewer, describe what you would strive to accomplish if you worked at
Google Labs

1.const char *
char * const
What is the differnce between the above tow?.
2.In Unix inter process communication take place using?.
3.What are the files in /etc directory?.
4.About i-node numbers
5.Max relaxable permisssion value with out giving write permission to others?.
6.About ln(linking)
7. A question on until
until (who |grep mary)
do
sleep(60)
done

8.Linking across directories?.


9.process id for kernell process
10.very first process created by kernell
11.function to repaint a window immediately?.
12.Function entry for DLL in win3.1
13.win 3.1 is a
14.win 3.1 supports which type of multi tasking?.
15.Message displayed when a window is destroyed
6.About fork()?
17.About send message and post message
18.Message to limit the size of window
9.System call executable binary file intoa process
20.About GDI object?.
21.API used to hide window

1. Number of null pointers in any binary tree = n+1

2. max(t1,t2,...tn) = pipelining

3. 50% -DBETXXXXXX - density

4. print (Head(T))
Traverse(left(T))
print (Head(T))
Traverse(right(T)) - ans: none of the above

5. CPU scheduling based questions

11. if even x/2


else p(p(3x+1))
2^k + 1: 3 . 2^(k-1) clarify this with sans

6. Compiler - related Qn.

7. LAN frames - ? related Qn.

8. sliding window protocol

9. kernel mode - deallocate resource

10. Combinatorics related

11. priority scheduling

14. any addr


K^+ v(a) + 2I - 2a
clarify with SANS.

15.Least no. when divide by [7 gives remainder 6,6gives 5,5 gives 4 and
soon ans;419

17.Artficial language is provided which of the language (Lisp) check

18. 241 change its equivalent octal ?

19. for cube and sphere 3 views are similarly draw one such figure?

20. Write a program to exchange two variaables without temp

21. Fortran cannot have value by reference


12) PATH = /bin : /usr : /yourhome The file /bin/calender has the following line in it cal
10 1997 The file /yourhome/calender has the following line in it cal 5 1997 If the current
directory is /yourhome and calender is executed

a) The calendar for May 1997 will be printed on screen


b) The calendar for Oct 1997 will be printed on screen
c) The calendar for the current month( whatever it is) will be printed
d) Nothing will get printed on screen
e) An error massage will be printed

15) which of the following function is used to repaint a window immediately

a) Sendmessage(hWnd,WM_PAINt,......) b) InvalidateRect(.......)
c) MoveWindow d) WM_COPY e) None

33)how can u append the ls and who to certain existing file (like that)(i.e.listing & output
of who is to be directed to a file
(a)ls;who>filename (b)ls;who>>filename
(c)(ls;who)>>filename (d)who;ls(e)...

34)suppose u have a network .users complain of slow ....u suspect a problem in network
adapter once u find that the data is continuous and erroneous. what device do u use?
(a)volt-ohmmeter (b)SNMP
(c)protocol... checking (d)all of the above

37) in a student form what is the relationship b/w student and course
(a)one to one (b)many to one (c)one to many (d)many to many

38)ROM is
(a)volatile
(b)permanent & fast
(c)device containig boot up program & is not accessible
(d)...
12. If the follwoing statements are given
@(a,b)= (a+b)/2
/(a,b)= a/b
*(a,b)= ab
If a=1, b=2 then find

i) /(a,(@(a,b),*(a,b))) ii) */(a,@(*(a,b)))

13. If the follwoing statements are given

(x#y) = x + y- xy
(x*y) = (x + y)/2
i) Find the values of x, y will satisfy this equation (x#y)#(x*y) < (x#y)
ii) Find the values of x, y will satisfy this equation (a*b)#(b*c)< (a#b)*(b*c)

14. Export PS1 results in(PS1 pwd)

a) primary prompt being your current directory


b) primary prompt and secondary prompts being the current directory
c) primary prompt prompt being your home directory
d) primary prompt and secondary prompts being the home directory
e) None of the above.

15. If you type in the command nohup sort employees > list 2 > error out & and log off,
the next time you log in, the output will be

a) in a file called list and the error will de typed in a file error out
b) there will be no file called list or error out
c) error will be logged in a file called list and o/p will be in error out
d) you will not be allowed to log in
e) none of the above

18. enum number { a=-1, b= 4,c,d,e}


What is the value of e ?

(a) 7 (b) 4 (c) 5 (d) 15 (e) 3

26. PATH = /bin : /usr : /yourhome


The file /bin/calender has the following line in it

cal 10 1997

The file /yourhome/calender has the following line in it

cal 5 1997

If the current directory is /yourhome and calender is executed


a) The calendar for May 1997 will be printed on screen
b) The calendar for Oct 1997 will be printed on screen
c) The calendar for the current month( whatever it is) will be printed
d) Nothing will get printed on screen
e) An error massage will be printed

28. What will be result of the following program?

void myalloc(char *x, int n)


{x= (char *)malloc(n*sizeof(char));
memset(x,\0,n*sizeof(char));
}

main()
{char *g="String";
myalloc(g,20);
strcpy(g,"Oldstring");
printf("The string is %s",g);
}

a) The string is : String b) Run time error/Core dump


c) The string is : Oldstring d) Syntax error during compilation
e) None of these

29. Which of the following function is used to repaint a window immediately

a) Sendmessage(hWnd,WM_PAINt,......) b) InvalidateRect(.......)
c) MoveWindow d) WM_COPY e) None

33. Which of the choices is true for the mentioned declaration ?

const char *p;


and
char * const p;

a) You can't change the character in both


b) First : You can't change the characterr & Second : You can;t change the pointer
c) You can't change the pointer in both
d) First : You can't change the pointer & Second : You can't chanage the character
e) None

3. For a 25MHz processor , what is the time taken by the instruction which needs 3
clock cycles,
(a)120 nano secs (b)120 micro secs (c)75 nano secs (d)75 micro secs
7. Question related to java
8. OLE is used in
a) inter connection in unix
b) interconnection in WINDOWS
c) interconnection in WINDOWS NT
9. Convert a given HEX number to OCTAL
10. Macros and function are related in what aspect?
(a)recursion (b)varying no of arguments
(c)hypochecking (d)type declaration
13. In signed magnitude notation what is the minimum value that can be represented
with 8 bits
(a) -128 (b) -255 (c) -127 (d) 0
14. There is an employer table with key fields as employer number data in every n'th
row are needed for a simple following queries will get required results.
(a) select A employee number from employee A , where exists from employee B where A
employee no. >= B
employee having (count(*) mod n)=0
(b) select employee number from employe A, employe B where A employe number>=B
employ number
group by employee number having(count(*) mod n=0 )
(c) both (a) & (b)
(d) none of the above
15. Type duplicates of a row in a table customer with non uniform key field customer
number you can see
a) delete from customer where customer number exists( select distinct customer number
from customer having count )
b) delete customer a where customer number in b rowed
c) delete customer a where customer number in( select customer number from customer
a, customer b )
d) none of the above
1. Given the following statement
enum day = { jan = 1 ,feb=4, april, may}
What is the value of may?
(a) 4 (b) 5 (c) 6 (d) 11
(e) None of the above
STRUCT DOUBLELIST
{
DOUBLE CLINKED
INT DET; LIST VOID
STRUCT PREVIOUS; (BE GIVEN AND A PROCEDURE TO DELETE)
STRUCT NEW; (AN ELEMENT WILL BE GIVEN)
}
DELETE(STRUCT NODE)
{NODE-PREV-NEXT NODE-NEXT;
NODE-NEXT-PREV NODE-PREV;
IF(NODE==HEAD)
NODE
}
Q. In what case the prev was
(a) All cases
(b) It does not work for the last element
(c) It does not for the first element
(d) None of these
It went on for about 30 minutes

SECOND TECHNICAL INTERVIEW:

1. Tell me about urself


2. About my family back ground
3. What is a linked list
4. What are the conditions that u put while traversing through a linked list
5. What is a computer, and what is internet. image that u are explaining this to
A person who dint even see or knew what a computer really is
and some other questions............

It went on for about 20 minutes


HR INTERVIEW:
Hr interview was very cool. this round was just a formality and the questions
Asked were

1. Tell me abt urself


2. Ur eamcet rank(it is competitive exam) and y so big rank
3. Ur family details
4. Y ADP?
5. Will u sign a bond of 3 yrs
6. Are u interested in further education and what are ur plans regarding that
7. What companies did u attend and y u lost in those and what r the companies
U r planning to attend
12. A FILE IS TRANSFERRED FROM A PLACE TO ADESTINATION CAPABLE OF 10 KB .
THEY GIVEN SOME RATE
OF TRANSFER. U HAVE FIND A EQUATION THAT BEST SUIT
THIS.

25. 900 M WIDE 3000 M WIDTH


SOMETHING I CAN'T REMEMBER SOME VALUES ARE GIVEN
BY AIR PER M Rs. 4 BY GROUND PER M Rs. 5
THEN WHERE U WILL CUT ADD MAN OUT

26. 1.JAVA 2.SMALLTALK 3.LISP 4.EIFFEL

27. 1.SAP 2.ARP 3.WAP 4.TCP IP

1. ------stores a log of changes made to db,which are then written to _,which are
then written to _,which is used if db recovery is necc.
a) db buffer share pool
b) program global area,shared pool
c) system global area,large pool
d) redo log buffer,online redo log
2. The primary characteristic of key field is that it must be unique

3. If a member initialiser is not provided for a member object of a class .The object -
is called
a) static fn
b) non static fn
c) default constructor
d) none
4. class constest
{
private:
const int i;
public:
constest():i(10)
}
5. Inheritance
b) abstract base class
c) specifies a way to to define a const member data
d) none
6. Iimplement polymorphism when by object belonging to different class can
respond to the same message in diff ways.
a) late binding
b) dynamic binding
c) dynamically created object
d) virtual fun
7. Member function---------- and ----------- set and reset the format state of flags.
a) set,reset
b) set,get
c) set, unset
d) set, unsetf
8. Now some questions about extern variables.

9. Remember an inline function does type checking and so it is better than a macro
a question on this.
Some memory is allocated using memalloc and then realloc is called. and now to
write the size of the variable.better learn memalloc and realloc. what it does and
syntax.

1. Who is the father of computers


2. Expand HTML,DMA,FAT,LAN,WAN,FDDetc
3. Which was intel's first microprocessor
4. Convert 1024 (in decimal) to octa and hexadecimal form
5. First microprocessor was
(a) 8085
(b) 8088
(c) 8086
(d) 80487
6. Give the name of a processor produced by mortorola?
7. What is the full form of WindowsNT ?
8. What is the difference between 8087 and 8086
7.P(S1)
a++;
P(S2)
v++;
V(S2)
V(S1)
P-wait, V-signal, S1 and S2 are semaphores. Consider two threads running. Is there a
deadlock .If yes in which situation does the deadlock occur.
8.How do you find the port number of the remote host?
9. (Date; who)>logfile
Date; who>logfile
What is the difference between the two statements.
10.How do you find the machine MAC address
11.Write the set operators that are used for select.
12.Write a single command to find and delete all the files that are older than 1
day(modification time)
13.A is a 3*4 matrix and B is 4*5 matrix. What is the number of additions and
multiplications performed to obtain the resultant matrix
14.What is the output
#!/bin/perl
kill –0 pid
15.#!/bin/perl
echo $_
16. #!/bin/perl
kill $$
echo “hello world”
17.List different schema/database objects
18.Randomization is good for which algorithm(quick sort, heap sort, selection sort,
hashed table, ….)
19.Descride the language in the following regular expression (a*a) b+b
20.In an I-node what is not there (file type, file name, size, owner)

22.Given Id, author, creation time, size, links, web page, description
Bring it in 2nd normal form
23.Consider a heap containing numbers 10, 20, 30, 40, 80, 60, 70 such that numbers
are in ascending order from the leaf to the root. If 25 is to be inserted what is the
position.(A[1], A[2], A[3], A[4])
24. #!/bin/perl
var=///
aaaa
echo ‘$var’

26.In database sort the student id and the course id for each student. Which is the best
possible solution.
-Sort the student id using a stable algorithm and then sort the course id using unstable
algorithm
-Sort the student id using a unstable algorithm and then sort the course id using stable
algorithm
- Sort the course id using a stable algorithm and then sort the student id using unstable
algorithm
- Sort the course id using a unstable algorithm and then sort the student id using
unstable algorithm
2. 2n+1 numbers in a list except for 1 num all had duplicates, how to
find duplicate in O(n)
5. Which is the DS used in dictionary mode in mobile (t9)
6. Which is DS used for chess program...to predict move each and every time..
7. There are $1070 dollars how to split them into bags such that asked
for any denomination from $1 to $1070 , u must b able to give without
opening bag...

If any one has idea do mail me qrio.qrio at gmail.com (qrio dot qrio
at gmail dot com).. Eagerly waiting...

Another paper:
1. First fit issues...
2. Algorithm to partition set of numbers into two s.t. diff bw their
sum is min and they hav equal num of elements
3. Prog: given Numerator & Denominator.... print 0.3333333333 as .(3)
0.123123 as .(123)

12 c 20(no of address lines in 1MB of memory)


13 A 120(25 hz processor,what is the time taken by the instr which needs 3 clock
cycles)
14 B synchronise the access(semaphores used for)
15 A system call(context switching is used in)
16 B the operating system(mapping of virtual to physical address)
17 A 177333(conversion of HEX "0xFEDB"in octal)
18 D used as a network layer protocall in network and windows(OLE) system
19 B has to be unique in the sub network(internet address)
20. There is an employer table with key feilds as employer no. data in every n'th row
are needed for a simple
following queries will get required results.
a) select A employe no. from employe A , where exists
from employe B where A employe no. >= B employe
having (count(*) mod n)=0
b) select employe no. from employe A, employe B where
A employe no. >= B employ no. grouply employe no.
having (count(*) mod n=0 )
c) both a& b d)none of the above
21 . type duplicates of a row in a table customer with non uniform key feild customer no.
you can see
a) delete from costomer where customer no. exists ( select distinct customer no.
from customer having count )
b) delete customer a where customer no. in (select customer b where custermer no.
equal to b custemor no.)
and a rowid > b rowid c) delete customer a where custermor no. in ( select
customer no. from customer a,
customer b ) d) none of the above
Q is not equal to zero and k = (Q x n - s)/2.What is n?
(a) (2 x k + s)/Q
(b) (2 x s x k)/Q
(c) (2 x k - s)/Q
(d) (2 x k + s x Q)/Q
(e) (k + s)/Q

1.------- is associated with webservices.


a) WSDL b) WML c) web sphere d) web logic
2.any large single block of data stored in a database, such as a picture or sound file,
which does not include record fields, and cannot be directly searched by the database’s
search engine.
a) TABLE b) BLOB c) VIEW d) SCHEME

3.Areserved area of the immediate access memeory used to increase the running speed
of the computer program.
a) session memory b) bubble memory c) cache memory d) shared
memory

4.a small subnet that sit between atrusted internal network and an untruster external
network, such as the public internet.
a) LAN b) MAN c) WAN d) DMZ

5.technologies that use radio waves to automatically identify people or objects,which is


very similar to the barcode identification systems,seen in retail stores everyday.
a)BLUETOOTH b) RADAR c)RSA SECURE ID d)RFID

26.For 1MB memory, the number of address lines required


a)12 b)16 c)20 d)32

27.There is a circuit using 3 nand gates with 2 inputes and 1 output,f ind the output.
a) AND b) OR c) XOR d) NAND

59)a relation schema R is in BCNF if it is in ___________and satisfies an additional


constraints that for every functional dependency XY,X must be a candidate key
a)1 NF b)2 NF c)3 NF d)5 NF

60) a _________sub query can be easily identified if it contains any references to the
parent sub query columns in the _________ clause
A) correlated ,WHERE b) nested ,SELECT
c) correlated,SELECT d) none

61) hybrid devise that combines the features of both bridge and router is known as
a)router b)bridge c)hub d)brouter

62) which of the following is the most crucial phase of SDLC


a)testing b)code generation c) analysys and design d)implementation

63)to send a data packet using datagram ,connection will be established


a)no connection is required
b) connection is not established before data transmission
c)before data transmission
d)none

64)a software that allows a personal computer to pretend as as computer terminal is


a) terminal adapter b)terminal emulation c)modem d)none

65) super key is


a) same as primary key b) primary key and attribute
c) same as foreign key d) foreign key and attribute
66.In binary search tree which traversal is used for ascending order values
a) Inorder b)preorder c)post order d)none
67.You are creating an index on ROLLNO colume in the STUDENT table.which statement
will you use?
a) CREATE INDEX roll_idx ON student, rollno;
b) CREATE INDEX roll_idx FOR student, rollno;
c) CREATE INDEX roll_idx ON student( rollno);
d) CREATE INDEX roll_idx INDEX ON student (rollno);

68.A________class is a class that represents a data structure that stores a number of


data objects
a. container b.component c.base d.derived

69.Which one of the following phases belongs to the compiler Back-end.


a. Lexical Analysis b.Syntax Analysis
c. Optimization d.Intermediate Representation.

70.Every context _sensitive language is context_free


a. true b.false

71.Input:A is non-empty list of numbers L

Xß-infinity
For each item in the list L,do
If the item>x,then
Xßthe item
Return X
X represents:-
a)largest number b)smallest number c)smallest negative number d) none
72.Let A and B be nodes of a heap,such that B is a child of A. the heap must then
satisfy the following conditions
a)key(A)>=key(B) b)key(A)<KEY(B) c)key(A)=key(B) d)none

73.String ,List,Stack,queue are examples of___________

a)primitive data type b)simple data type


c)Abstract data type d)none

74.which of the following is not true for LinkedLists?


a)The simplest kind of linked list is a single linked list ,which has one link per
node. this link points to the next node in the list,or to a null value or emptylist if it is the
last node.
b)a more sophisticated kind of linked list is a double linkedlist or two way
linkedlist. Each node has two links, one to the previous node and one to the next node.
c) in a circleLinkedList, the first and last nodes are linked together.this can be
done only for double linked list.
d) to traverse a circular linkedlist, u begin at any node and follow the list in
either direction until u return to the original node.

75.sentinel node at the beginning and /or at the end of the linkedlist is not used to store
the data
a) true b) false

1. One Nibble = ?
2. Hexadecimal and Octal representation of 1024 ?
3. What a compiler does ?
4. DOS ? (whether Graphical interface or Character interface and two more
choices are given)
5. CPU - abbrevation
6. Fortran used as ( Ans : Scientific Language)
7. ASCII character set ? (total number)
8. Windows NT- What NT stands for?
9. Which is not an input device ? (keyboard, Disk, Mouse,Lightpen)
10. Which is not a pointing device ?( mouse,Joy stick,lightpen none)
11. Microsoft Chief ?
12. 4GL ? (Fortran,SQL,ADA, ....)
13. Father of Computers?
14. Which of them is Object Oriented Language.?
15. Power PC is the product of ? (Microsoft,IBM,Apple,Motorola,Intel)
(A combination of any correct 3 companies)
16. Latest processor used ? (Pentium, Power PC, Pentium pro,none)
17. MS Word is ?
18. First Super Computer built in India. (Ans : param)
19. Which of the following companies donot manufacture chips?
(Microsoft, Motorola, Intel, HP)
20. LAN - abbrevation
21. WAN - abbrevation
22. Modem is ? (related to electrical hardware.- Like Modulator &demodulator)
23. FDD - abbrevation ( floppy Disc drive)
24. BIT - abbrevation
25. Information is ? (message, data,processed data,none)
26. Which is not networking ?(internet, Ethernet, arcnet,none)
27. One Gigabyte =?( 2 power30 , 2 power 20 ,2 power 10 none)
28. Which of the following is not RDBMS ? (sybase, SQL,Acess,none)_
29. Oracle is ? (Ans : Relationasl Data Base Management System)
30. In Oracle, Table means ( Ans : Collection of records)
31. DMA - abbrevation (Direct Memory Access,Discrete memory Access,
Disk memoryaccess)
32. What is meant byStatic Variable ?
33. What is meant by QUEUE? {refer any data structures text}
34. What is meant by STACK? {refer any data structures text}
35. The processor used in first IBM PC? (8086,8088,zig4,intel)
36. Difference between 80286 and 80287
37. In bubble sort , no. of comparisons required ?(ans : formula : N*(N-1)/2)
38. No. of comparisons of an item in 100 items by binary comparison?
( 10,25,50 100)
39. CRT - (Cathode Ray Tube)
40. No. of entryvalues are there in ideally in a subroutine.
41. Binary tree?
42. Flow in one direction ? (Single linked list,Double linked
list,.......,....)
43. Electron screen size ? (here, 2 lines of algorithm is given.
Name the algoirithm)
44. Which is not storage device.? (printer,CD ROM,Disk,none)
45. A question regarding memory ? ( least used memory,recently unused
memory,..)
46. ISO - (International Standard Organisation)
47. HTML - (Hyper Text Makeup Language)
48. Flow chart for factorial N? (ans :choice a)
49. What is meant by Recursion ?

10. When the circulation of water in a boiler is by a centrifugal pump then the boier is
known as
A. Internaly fired
B. Externally fired
C. Natural circulation Boiler
D. Forced circulation boiler
11. Which boiler is best suited to meet fluctuation demand of steam
A. locomotive
B. Lancashire
C. Cornish
D. Babcock and Wilcox

what is FAT?.
3.whict protocol is used when file through internet is send from one server to another
server.
(1)x.25 (2)SMTP (3)TELNET.
4.which protocol is used for file transfer
(1)ftp (2)tftp

7. accessing of tap in a machin is like


(1)stack (2)queue (3)file
8.the tuple in a table represent the
1)Domain 2)relations

3.which of the following is true?

(1) The algorithm is optional for the problem


(2)There exists algorithm that determine prefix sums in linear time
(3)The following segment determines prefix sums correctly
B[0]=a[0];for(j=1;j<n;j++) b[j]=b[j-1]+a[j];

A.(1) one only B.(2) but not (3) C.(3)but not (2) D.(2)and(3)

16. In selecting the pivot for Quicksort, which is the best choice for optimal partitioning:

a. the first element of the array b. the last element of the array
c. the middle element of the array d. the largest element of the array
e. the median of array

19. What is the basic difference between a join and a union?

20. Can a view be updated/inserted/deleted? If yes-under what condition?

22. Which of the constraints are used to achieve referential integrity?

a. Primary Key b. Unique Key


c. Foreign Key d. Not Null constraint

26. Which of the following is not an aggregate function?

a. distinct b. maxc. sum d. count

13. What is the order of each of the following tasks? (Choose from O(1), O(log2 n),
O(n), O(n log2 n), O(n2), O(2n); each order may appear more than once.)

(a) Pooping an item off a stack containing n items.


(b) Performing a Towers of Hanoi algorithm with n disks.
(c) Using quick sort to sort an array of n integers, in the average case.
(d) Using quick sort to sort an array of n integers, in the worst case.
(e) Inserting a single item into a binary search tree containing n items, in the
average case.
(f) Performing a bubble sort on an array of n integers, in the worst case.
(g) Displaying all n elements in a sorted linked list.
(h) Performing a binary search of a sorted array of n strings, in the worst
case.

16. Write a query to list the maximum salary in such departments which have more
than two employees from table EMP which has columns empno, ename, deptno, salary.

19. Write a query to find the max salary from emp (empno, ename, salary) without
using max function.
21. Consider the following graph
1
2
2
2
3
2

4 2

8
1
3

1
6
0

5
9

1
1

If this graph is searched by depth-first search, starting from vertex 1, and if neighbours
are searched in numerical order, what will be the order in which the nodes are visited?
(Note: If you use an explicit stack for depth-first search, then the nodes are visited when
they come off the stack, so they have to pushed in reverse numerical order to be
searched in numerical order)

Question 1
In C language, which of the following is equivalent to &2[3[a][5]]?

(a) &a[5][3][2] (b) &*(*(a[2]+5)+3)


(c) &5[*(a+3)][2] (d) a[5][2][3] (e) a[2][3][5]
Question 2
Below is a set of characters and their relative frequencies of occurrence. If we build an
optimum Huffman code for this set of characters, how many bits will it take to represent
the character “g”?

Character : f g h m n p q
-------------------------------------
Frequency : 1 1 2 3 3 5 8

(a) 8 (b) 5 (c) 4 (d) 2 (e)

Question 3
Suppose we have a binary tree T on n nodes. It is not extended, and is not required to
be full. If the first node of its postorder traversal is the same as the last node of its
preorder traversal, what can we conclude?

(a) The left subtree of T is empty.


(b) The right subtree of T is empty.
(b) T contains atmost three nodes.
(d) T has height n-1. ( Here height is defined as the maximum distance from a leaf to
the root.)
(e) (a) and (b).

Question 4
The following postfix expression containing single digit operands and arithmetic
operators + and *, is evaluated using a stack. ( consider left to right as bottom to top ).
52*34+52**+
What are the contents of the stack after the evaluation of 5 2 * 3 4 +

(a) 10 7 (b) 6 9(c) 7 10 (d) 9 6(e) 7 7

(a) O(n log(n)) (b) O( log(n)) (c) O( n^2)


(d) O( n^2 * log(n)) (e) O(2 log(n))

Question 9
Which traversal will produce output that takes maximum processing time when fed to a
randomized quick sort algorithm for a binary tree? A randomized quick sort can
randomly select any elements from the current set of elements, as pivot.

(a) Preorder (b) Inorder (c) Postorder (d) All are same

Question 10
An insect sitting at coordinate (0,0) can move either one unit or two units at a time i.e. if
it is at (x,0), it can go either (x+1,0) or (x+2,0). In how many ways it can go from (0,0)
to (n,0).
Question 11
Given an unsorted array of length n, what is the least no. of comparisons needed to find
the minimum and maximum of the array?

(a) n^2 (b) ln(n) (c) 2n-2 (d) 3*floor[n/2]

Question 12
Find the postorder traversal if A,B,C,D,E,F and G are the nodes of a binary tree and the
inorder and preorder traversals of the tree is as given below
Preorder : ABEFCDG
Inorder : EFBCGDA

Question 9
A hash table contains 10 buckets and uses linear probing to resolve collisions. The key
values are integers and the hash function used is key%10. If the values 43, 165, 62,
123, 142 are inserted in the table, in what location would he key value 142 be inserted?

(a) 2 (b) 3 (c) 4 (d) 6 (e) 10

Question 10
If f(A,B) = A’+B, what does f(f(x+y,y),f(x+y,y)) simplify to?

(a) x’+z (b) 1 (c) xy’+z (d) none of the above

Question 11
Your college has been assigned a Class B address of 192.55.0.0. As a network
administrator, you are in charge of sub-netting the IP address space assigned to your
institution, among 48 departments. Assuming the sub-netting is done optimally, what is
the maximum number of hosts that each of the 48 departments can have (Assume that
no host can have an all 0 or all 1 address)?

(a) 2046 (b) 512 (c) 1022 (d) 254 (e) none

Question 12
A host on a network has a Class B address of 192.168.243.5. The subnet mask used is
FF.FF.F0.0 ( in Hex). Which of the following address and sub-net masks identify a host in
the same network?

(a) 192.168.1.1/255.255.240.0
(b) 192.168.239.5/255.255.240.0
(c) 192.168.240.192/255.255.240.0
(d) 192.168.224.240/255.255.240.0
(e) none
5. What is the largest prime number that can be stored in an 8-bit memory?

11. In a two-dimensional array, X(9,7), with each element occupying 4 bytes of


memory, with the address of the first element X(1,1) is 3000, find the address of X(8,5).
12. A FILE IS TRANSFERRED FROM A PLACE TO ADESTINATION CAPABLE OF 10 KB .
THEY GIVEN SOME RATE OF TRANSFER. U HAVE FIND A EQUATION THAT BEST SUIT
THIS.

ADD MAN OUT


26. 1.JAVA 2.SMALLTALK 3.LISP 4.EIFFEL
27. 1.SAP 2.ARP 3.WAP 4.TCP IP

16. Select the odd one out


a. Oracle b. Linux c. Ingress d. DB2

17. Select the odd one out


a. SMTP b. WAP c. SAP d. ARP

18. Select the odd man out.


a. Java b. Lisp c. Smalltalk d. Eiffel

28. The size of the bucket is N kb. The bucket fills at the rate of 0.1kb per millisecond. A
programmer sends a program to receiver. There it waits for 10 milliseconds. And
response will be back to programmer in 20 milliseconds. How much time the program
takes to get a response back to the programmer, after it is sent?

29. The size of a program is N. And the memory occupied by the program is given by M
= square root of 100N. If the size of the program is increased by 1% then how much
memory now occupied ?

16.there is a file whose ORGANISATION is INDEXED.you want to read the records


from the file in RANDOM fashion as well as sequentially.then which of the
access mode would you specify?
a.SEQUENTIAL
b.RANDOM
c.DYNAMIC
D.ACCESS MODE has nothing to do with it
17.consider the following PROCEDURE DIVISION entry
OPEN EXTEND IN-FILE
identify the correct statement
a.organization of IN-FILE is sequential and records can be added in the
beginning
b.organization of IN-FILE is sequential and records can be added in the
end
c.organization of IN-FILE is indexed and records can be added in the
beginning
d.organization of IN-FILE is indexed and records can be added in the end
18.what is the size of W-REC in the following
01 W-REC
05 A PIC 9(4)V99
05 B READLINES A
10 C PIC XX
10 D PIC S9(4)
05 E OCCURS 7 PIC ZZ.ZZ
05 F OCCURS 5
10 G PIC ZZ.ZZZ99
10 H OCCURS 3
15 J PIC 9(3)
15 K PIC V99
a.177
b.161
c.180
d.none of yhe above
19.consider the following two IF statements:
IF X AND NOT Y MOVE A TO B
IF Z=1 OR 9 MOVE A TO B
select one of the following data divusion entries which gives identical
results for both the above IF statements
a.01 Z PIC 9
88 X VALUE 1.9
88 Y VALUE 0.2 THRU 8
b.01 Z PIC 9
88 X VALUE 0.2 THRU 8
Y VALUE 1.9
c.01 Z PIC 9
88 X VALUE 1.9
88 NOT-Y VALUE 0.2 THRU 1.9
d.none of yhe above
20.consider the following two statements
MOVE 10 TO N
PERFORM PARA-X N TIMES
STOP RUN
PARA-X
MOVE 5 TO N
how many times PARA-X willbe exicuted?
a.10
b.5
c.infinate
d.execution error
21.given the following:
77 A PIC 9V9 VALUE 9.5
77 B PIC 9 VALUE 9.
77 C PIC V9 VALUE 0.8
77 D PIC 9
77 E PIC 9
77 F PIC 9V999
what are the contenta of D E nad F after teh following statements are
executed:
COMPUTE F ROUNDED=A+C/B
MULTIPLY A BY C GIVING E
ADD B C A GIVING D ROUNDED
a.F=9.589 E=8 D=1
b.F=9.589 E=8 D=9
c.F=9.589 E=7 D=9
d.F=9.589 E=7 D=1
22. Consider the follwoing IF condition:
if a less 1200 if b greater 25 move 47 toc
else move 57 to c
if a greater 249 move 67 to c
else next sentence else if b less 67
move 27 to c
What will be the value of C, when A is 137 and b is 25
(a) 27
(b) 57
(c) 67
(d) none
23. Consider the following:
77 W-NUM PIC 9 VALUE 0
------
MOVE 1 TO W-NUM
PERFORM PARA-X UNTIL W-NUM > 9.
------
PARA-X
ADD 1 TO W-NUM
How many times PARA-X is executed ?
(a) 10 (b) 9 (c) 11 (d) Infinite loop
24. Consider the following code:
77 A PIC 99V99 VALUE 55.35
77 B PIC 99V999 VALUE 32.754
ADD B TO A ON SIZE ERROR DISPLAY "ERROR!!!"
What will be the result ?
(a) A=88.10, B=32.754
(b) A=87.00 B=32.754
(c) A=87.10 B=32.754
(d) ERROR!!! will be DISPLAYed on the screen.
25. Consider the following:
77 A PIC 9(10)
77 B PIC 9(10)
77 C PIC 9(19
MULTIPLY AB BY B GIVING C
Which of the following is true ?
(a) The execution of the above may result in size error.
(b) The execution of the above will result in size error.
(c) The definition of C is invalid resulting in compilation error.
(d) No error will be thee and the program would proceed correctly.
26. A paragraph PARA-X is to be executed when none oof the data names A, B and C
have value of 1. Which of the following will achieve this ?
(a) IF A NOT = 1 OR B NOT = 1 OR C NOT = 1 PERFORM PARA-X
(B) IF NOT A= 1 AND B= 1 AND C = 1 PERFORM PARA-X
(C) IF A NOT =1 IF NOT B = 1 OR C= 1 PERFORM PARA-X
(C) IF A NOT = 1 AND B NOT = 1 AND C NOT = 1 PERFORM PARA-X
27. Study the five expressions and the class to which they belong:
S.N. Expression Class
1 "SPACES" Figurative constant
2. "Depreciation Schedule Non-numeric literal
3. "12%" Non-numeric literal
4. INTEREST-DUE Non-numeric literal
5. ZEROES Figurative constant
Which of the following statement is true?
(a) 1 and 3 are incorrect
(b) 1 and 4 are incorrect
(c) 3 and 4 are incorrect
(d) All are correct
28. Identify the invalid dataname from the following:
(a) SAVINGS-ACCOUNT
(b) ANNUAL-ALLOCATION-FOR-OVERHEAD
(c) SAMOUNT250
(d) 12DEMAND
29. Study the DATA DIVISION entries and the three PROCEDURE DIVISION entries
given below:
01 END-OF-FILE-SWITCH PIC XXX.
88 NO-MORE-RECS VALUE "YES".
88 MORE-RECS VALUE "NO".
(i) READ SAMPLE-FILE AT END MOVE "YES" TO NO-MORE-RECS.
(ii) IF NO-MORE-RECS = "YES" GO TO LAST-PARA.
(iii) IF NO-MORE-RECS GO TO LAST-PARA.
Which are wrong?
(a) (i) and (ii)
(b) (ii) and (iii)
(c) (i) and (iii)
(d) all
30. The following entries appear in the WORKING-STORAGE SECTION:
01 DATE-TODAY.
05 YY PIC XX VALUE "90".
05 MM PIC XX VALUE "12".
05 DD PIC XX VALUE :31".
01 DATE-EDIT PIC XX/XX/XX.
MOVE DATE-TODAY TO DATE-EDIT.
(a) 901231
(b) 90/12/31
(c) 31/12/90
(d) 311290
31. How many bytes will be allocated for the following record description
entries?
01 REC-A.
05 A PIC S9(4).
05 B PIC XXXBXXX.
05 C PIC ____9.99.
05 D PIC S9(5) COMP-3.
05 E PIC 9(3) COMP.
(a) 29
(b) 26
(c) 25
(d) 28
32. What is wrong with the following data declaration?
01 W-DATE PIC X(6).
05 DD PIC 99.
05 MM PIC 99.
05 YY PIC 99.
(a) Nothing is wrong.
(b) Under W-DATE all level 05 items are having a PIC 99 but level
01 has PIC X(6).
(c) PIC can't be specified for a group item.
(d) DD, MM, and YY are invalid datanames.
33. What is the output generated by the following code?
01 GRP-I.
05 SUBFLD1 PIC XX VALUE "AB".
05 FILTER PIC X(6) VALUE SPACES.
01 GRP-2 REDEFINED GRP-1.
05 SUB-FLD2 PIC XX.
05 SUB-FLD3 PIC XX.
05 FILTER PIC X(4).
IF SUB-FLD1 NOT = SPACES
DISPLAY "SUBFLD1"
MOVE "ABBCCD" TO GRP-1
IF SUB-FLD3 = SPACES
DISPLAY "SPACES"
ELSE
DISPLAY "SUBFLD3"
DISPLAY "END"
ELSE
DISPLAY "SPACES"
DISPLAY "END".
(a) SUBFLD1
SUBFLD3
END
(b) SPACES
END
(c) SUBFLD1
END
(d) SUBFLD1
SPACES
34. 88 level entry is used for
(a) data items in WORKING-STORAGE SECTION
(b) items with RENAMES clause
(c) condition-names
(d) None of the above
35. ZEROES and SPACES are _______ constants
(a) Figurative
(b) Numeric
(c) Non-numeric
(d) Alphabete
36. COMPUTE X = A * B - C * D and
COMPUTE X = (A * B) - (C * D)
(a) Are not the same
(b) Are same
(c) Syntactically wrong
(d) Will yield a run time error
37. OCCURS clause is used in the DATA DIVISION on data names at
(a) 01 level (b) 77 level (c) 88 level (d) any level from 02 to 49
38. Consider the following COBOL entries:
05 X PIC 99 VALUE 10.
SUBTRACT 20 FROM X.
The resultant value of X wil be
(a) 10
(b) 00
(c) compile-time error
(d) none of these
39. Consider the following COBOL entries
05 X PIC 99 VALUE 10.
ADD 40 X TO X.
COMPUTE X = 3 * X - 40.
The result in X is
(a) 10
(b) 40
(c) Compile or Run time error
(d) none of these
40. given the following piece of code:
CALL SUB-PGM USING A, B, C.
CALL SUB-PGM USING A, C, C.
(a) Both CALL statements will always produce same result.
(d) Both CALL statements may produce different result.
(c) Compile-time error because SUB-PGM is a dataname.
(d) Compile-time error because A, B, C are used twice.
41. The hierarchy of the execution of logical operators is
(a) NOT AND OR
(b) AND OR NOT
(c) OR AND NOT
(d) OR NOT AND
42. The order of precedence of arithmetic operators in an expression can be
overridden with the use of
(a) []
(b) ()
(c) {}
(d) Any of the above

Anda mungkin juga menyukai