(2)CDROM access is
a) RANDOM b) SEMI RANDOM c) SEQUENTIAL
(7)main()
{
printf("%c","abcdef"[4]);
}
what is the output ?
a) abcdef b) d c) e d) ERROR.
(8)main()
{
char dummy[20]; scanf("%[^a]",dummy);
printf("%s", dummy); }
what will it do?
a) ERROR b) take characters till ctrl z is pressed
c) take upto 19 characters d) None of These
Technical Interview:
(1)Difference between structure and class.
(2)How to resolve ambiguity in multiple inheritance ?
(3)What is static and dynamic binding in C ?
(4)What is the difference between structure and array?
(5)Difference between calloc and malloc & realloc?
(6)What is static class and static member function?
(7)What is pointer to a pointer? How it is declared and how is it accessed?
(8)What is the difference between function overriding and overloading ?
(9)What is the scope of a variable ?
(10)What is the difference between C & C++ ?
(11)Some questions on templates and exceptions.
(12)What is stream ? How is it opened and describe file handling in CPP?
(13)Some questions related to Hard Disc :What is a hdd? How is a file accessed from
the hdd? Why isn’t it used in place of a RAM ? What is RAID describe its basic
structure ?. Where is the file information stored on the hard disk ? What is FAT ? How
are files physically arranged on the hard disc?
(14)What is JVM, what is BYTE CODE ? What is multithreading ? How can it be
implemented using C, write a program to describe it? What is the complexity of radix
sort and how is it determined? A sequence of 15 numbers was to be sorted using heap
sort. (He stopped me after the 3rd iteration)
(16)What is fork system call? How is a child process called and what happens to the
parent ? In C what is spawnv () function, describe its execution. How can you use C for
writing assembly language programs ?
Q29. An atomic particle exists and has a particlular decay rate . It is in a train . When
the train moves, a person observes for whether the decay rate
(a) increases
(b) decreases
(c) depend on the directions of movement of train
Q32. The best tool for editing a graphic image is ?
Q33. Network scheme defines
a)one to one b) many to many c) one to, many ?
Q34. A person wants to measures the length of a rod.First he measures with standing
ideally then he maeasures by moving parrel to the rod
(a)the length will decrease in second case
(b)length will be same
(c) length will increse in the second case.
Q36. What is the resulting solution when benzene and toluene are mixed ?
1) Can .asp & .aspx pages work if placed in same virtual directory?
2) Does different versions on .NET framework & different versions of assemblies work
side by side (Clue: Side by side execution)
3) Can you typecast one Object type to another Object type or One object type to
another data type (Clue: Boxing & Unboxing)
4) A question about GAC(Global Assembly cache) and the files it contains?
5) A question about Application Domain and does it interfere with OS Process.
6) A question on session timeout on an asp.net page and whether the session time out
duration depend on the duration set in code or does it depend on IIS(Internet
Information Services) setting and if both are specified which setting overrides which?
Also whether it will take smaller time or greater time in to consideration.
7) How can assemblies be created in .NET ? (clue: Using visual studio.net (or) using
al.exe (or) using reflection.emit)
8) What is a satellite assembly and what does it contain?
9) Also 4 to 5 questions were on assembly. I recommend to have a dissected look of the
assembly.
10) What will an Erase command do? Erases the contents of array or Erases the whole
array structure & frees memory.
11) How is anchoring different from docking? (clue: its related to windows/web controls)
12) What is serialization in .NET? What are different types of serialization and
advantages and disadvantages?
13) Are RCW(Runtime Callable Wrapper) and P/Invoke different and how?
14) What is Strong Naming? What details does it contain? how can it be created (Clue:
Using SN.exe)
15) What information does Culture identity contain?
16) What is a Diffgram? (Clue: Related to XML)
17) What is UDDI(Universal Discovery Description and Integration) ?
18) Also a program on Exception handling was given and asked which part will exectute
and which throw an error?
19) What is Managed and Unmanaged code in .NET?
20) Can we use redim on array already declared in VB.NET? if yes, can we redim with in
a class? within a module? or with in a program?
For technical there were 20 multiple choice questions:
Out of which about 6 was electronics and 14 was from computer related areas
Directions for question 3-5 : Answer the questions based on the passage above
them
Liz, Jenni, Jolie and Rick have an English final on Friday and they all would like to study
together at least once before the test. Liz can study only on Monday, Tuesday and
Wednesday nights and Thursday afternoon and night.Jenni can study only on Monday,
Wednesday and Thursday nights and Tuesday afternoon and night. Jolie can study only
on Wednesday and Thursday nights, Tuesday afternoon and Monday afternoon and
night. Rick can study the afternoons and nights of Tuesday, Wednesday and Thursday,
and on Monday afternoon.
24. If three of them tried to study together when all four couldn't
(a) this would be possible twice
(b) it would have to be on Wednesday night
(c) Rick could not attend the three person groups
(d) This could be accomplised on Monday and Tuesday only
(e) This would not be possible
ANALYTICAL
Technical Interview
12. What is the need of normalisation in data base.
13. 1-5 all normalise forms( from many they directly asked 4th and 5th normanilise..
(mostly from m.c.a.’s)
14. What is semafore in o.s.
15. What is paging and demand paging.
16. How memeory works in a computer system.
17. How recursion works in c
18. Which data structure used in recursion.
19. deference between structure n union.
20. What is erp…..(accenture having work in erp…as we m.c.a’s having erp in
3rd sem so…the person highlighted or wrote sth in resume ,they asked abt erp
from them only).
21. What is reengineering in erp
22. If u have too much cash in ur hand, then what u will do in behalf of the company
VIRTUSA
->In how many different ways, a rectangle can be cut into 4 identical parts.
-> using the numbers 1, 2, 3, 25, 50, 75, 100 Exactly one time, give an expression
which will give the answer as 383.
-> using the numbers 1, 2, 25, 50, 75, 100 Exactly one time, give an expression which
will give the answer as 383.
| ? | 2 | ? |3 |
------------------------
| 2 | |? |
------- ------
| ? | |1 |
------------------------
| 6 | ? | 1 |? |
------------------------
-> Start from a random number, generate a sequence such that if number is odd
multiply it 3 and add 1. If number is even, divide the number by 2. This Sequence will
always cyclic with 4, 2, 1. In this sequesce, find the maximum power of 2 generaged in
the sequence and print only the power, not the sequence.
-> Start with a random 2 digit number, The series is generated by multiplying the
number by 2 and placing the last 2 digits as the next number. Series continues until one
of the element repeats.
-> write a function maxsubstring(str,alpha,theta) str is the source string and have to
return maximum sub string which starts with alpha and ends with theta.
INTERVIEW
---------
Product of all Bradman's first class scores or Sum of all test scores of Sachin.
Mr.X met a man of that village(u don't which grp he belongs) and questioned "Tell me
whether u r knight or knave ?"
Reply: "i cannot tell u and left that place"
Find which grp that man belongs to?
2. Essay(General).
==================
(Topic given: India should spend money on Atom bomb and Rocket OR for the welfare
of poor.)
3. Problem solving.
===================
(Problem statement: How will u determine number of Petrol bunks in Madras.)
4. Programming.(4 Qns)
===============
( we can use any Programming Language for coding)
a) They had given one function ,we have to find it what it does and also problem in the
fn. and how to
overcome it.
double what( double z, int y)
{
double answer;
while( y > 0 )
{
if( y%2 == 1)
answer = answer * z;
y=y/2;
z=z*z;
}
return answer;
}
12.Write a single command to find and delete all the files that are older than 1 day
(modification time)
http://www.ChetanaS.org
13.A is a 3*4 matrix and B is 4*5 matrix. What is the number of additions and
multiplications performed to obtain the resultant matrix
15.#!/bin/perl
echo $_
16. #!/bin/perl
kill $$
echo "hello world"
18.Randomization is good for which algorithm(quick sort, heap sort, selection sort,
hashed table, ...)
20.In an I-node what is not there (file type, file name, size, owner)
22.Given Id, author, creation time, size, links, web page, description
Bring it in 2nd normal form
23.Consider a heap containing numbers 10, 20, 30, 40, 80, 60, 70 such that numbers
are in ascending order from the leaf to the root. If 25 is to be inserted what is the
position.(A[1], A[2], A[3], A[4])
24. #!/bin/perl
var=///
aaaa
echo ‘$var’
26.In database sort the student id and the course id for each student. Which is the best
possible solution.
- Sort the student id using a stable algorithm and then sort the course id using unstable
algorithm
- Sort the student id using a unstable algorithm and then sort the course id using stable
algorithm
- Sort the course id using a stable algorithm and then sort the student id using unstable
algorithm
- Sort the course id using a unstable algorithm and then sort the student id using
unstable algorithm
14) One circular array is given(means memory allocation tales place in circular fashion)
diamension(9X7) and sarting add. is 3000, What is the address of (2,3)........
Sol) it's a 9x7 int array so it reqiure a 126 bytes for storing.b'ze integer value need 2 byes
of memory allocation. and starting add is 3000
so starting add of 2x3 will be 3012.
15) In a two-dimensional array, X (9, 7), with each element occupying 4 bytes of memory,
with the address of the first element X (1, 1) is 3000, find the address of X (8, 5).
Sol) initial x (1,1) = 3000 u hav to find from x(8,1)so u have x(1,1),x(1,2) ... x(7,7) = so
u have totally 7 * 7 = 49 elementsu need to find for x(8,5) ? here we have 5 elements
each element have 4 bytes : (49 + 5 -1) * 4 = 212 -----( -1 is to deduct the 1 element )
3000 + 212 = 3212
17) The size of a program is N. And the memory occupied by the program is given by M =
square root of 100N. If the size of the program is increased by 1% then how much
memory now occupied ?
Sol) M=sqrt(100N)
N is increased by 1%
therefore new value of N=N + (N/100)
=101N/100
M=sqrt(100 * (101N/100) )
Hence, we get M=sqrt(101 * N)
18) 1)SCOOTER --------- AUTOMOBILE--- A. PART OF
2.OXYGEN----------- WATER ------- B. A Type of
3.SHOP STAFF------- FITTERS------ C. NOT A TYPE OF
4. BUG -------------REPTILE------ D. A SUPERSET OF
1)B 2)A 3)D 4)C
34)What is the part of compiler that keeps track of names and their attributes?
A) Compile Table B)Symbol Table C)Table D) Logical Table
37) Typical user defined signal handler functions perform actions such as
A) abort process immediately without further ado
B) Perform minor house keeping prior to resumption
C) Roll back process state to last checkpoint
D) Tidy up to process abortion
A) 1&2 B) 2 & 4 C) 3 D) 4
38) What is the name given to the process initizlizing a microcomputer with its OS?
A) Cold Booting B) Booting C) Warm Booting D) None of these
39) Desirable attributes for memory management include
A) Protection- such memory should be protected against being written on by other
processes
B) Encryption- ability to encrypt data with a randomly selected key that is discarded
after use without being disclosed so that data can never read again.
C)Uniform access rates-ability to retard faster data fetch rates so that all data fetches
are uniformly performed at the least fast data fetch rate
D)none of these
40)Major expressions used with find command to select file is it has been accessed in
more than 375 days,is
A)-a time +365 B) -m time +365 C)-a time -365 D) -m time -365
41)Which of the following is not a basic computer network topology?
A)Train topology B)Bus topology C)star topology D)ring topology
42) which file contains all permanent information and is updated during processing by
transactions of data?
A) Master File B) Local File C) Parent File D) Primary File
43) Which set option is used with vi editor to display line numbers on screen?
A) nm B) nu C)ic D)li
44) Assuming you have the environment variable ENV=.kshrc set, what is the entry in
ur. kshrc or .profile that will save up to ur last 200 commands in a history list?
A) HISTSIZE=200 B) set history 200 C) HISTORY=200 D) setenv history 200
45) You have 1MB of memory left on the HDD and when booting the system crashes.
What is the reason?
A) Not enough synchronous buffer
B) Not enough contiguous memory in virtual memory
C) Not enough space on the hard drive for the swap file.
D) Not enough space on the hard drive for working memory.
46) How do I remove a file with the name '-something' ?
A) use the "--" flag to rm B) Use "##" flag to rm
C) Use the "-" flag to rm D) Use the "!" flag to rm.
47) The customer is an internet search engine with hits from global customers exceeding
10 million per day. You identify Knowledge Management as the driving business issue.
Which feature is most imp to this customer solution?
A) Single system image B) Speed and performance
C) Very large memory, very large database D) H/W Partitioning
48) Unlike function templates, when instantiating a class template, you must explicitly
instantiate the class by giving?
A) The parameters for the class templates
B) The arguments for the class templates
C) The variables for the class templates D) None
49) In private inheritance derived class members can access base class members that
are 1) Public 2) Private 3) Protected
A) 1 & 2 B) 1 & 3 C) 2 & 3 D) 1,2 & 3
50)The output of an OR Gate is LOW when
A) All inputs are LOW B) Any Input is LOW
C)Any input is high D) All inputs are HIGH
1)
int i;
if i=0 then i:=1;
if i=1 then i:=0;
2)
int i;
if i=0 then i:=1;
if i=1 then i:=0;
(given that i can take only two values (1,0))
3)
int i;
if i=0 then i:=1;
else if i=1 then i:=0;
(given that i can take only two values (1,0))
4)
int m,j,i,n;
for i:=1 to n do
m:=m+j*n
a) Array overbound
b) Undeclared identifier
c) stack underflow
d) Accessing an illegal memory location
7) How many page faults will occur for below sequence of pages when LRU
page replacement algorithm is used ( The memory can only have 3pages):
8) If a CPU has 20 address lines but MMU does'nt use two of them.
OS occupies 20K. No virtual memory is supported. What is the
maximum memory available for a user program?
9) For a binary tree with n nodes, How many nodes are there which
has got both a parent and a child?
f(x,y,z)
{
y := y+1;
z := z+x;
}
main()
{
int a,b;
a := 2
b := 2;
f(a+b,a,a);
print a;
}
15) Using the following instructions and two registers , A&B. find out A XOR B and put
the result in A
PUSH <reg>
POP <reg>
NOR These instructions operates with A & B and puts the result in AND A
loop:
if(i = 0)
i++;
i++;
j++;
if(j<= 25)
goto loop
xxx:
question1 : how many times is the loop entered
a) pre-emption
b) virtual memory
c) paging etc...
In a certain code, the symbol for 0 (zero) is. * and that for 1 is $. The numb.:rs greater
than 1 are to be written only by using the two symbols given above. The value of the
symbol for 1 doubles itself every time it shifts one place to the left.
(For example, 4 is written as $**; and; 3 is written as $$)
18) 260 can be represented as:
A) $****$** B) $$*$$$$$ C) $$*$$$$** D) $*****$**
19) 60 / 17 can also be represented as:
A) $$$*$*** / $$**$$ B) $$$***** / $$**$$
C) $*$$*$** / $$**$$ D) $$*$*$** / $$**$$
20) $***$ can be represented as:
A) $$$ / $* B) $*$**- $$ C) $*$*$- $$ D) $$$***$ - $$
21) binary 3 - 011 & 4 - 100 & 5 - 001 so convert it into binary n solve it.
Your answer for each question below would be:
A., if ALL THREE items given in the question are exactly ALIKE.
B, if only the FIRST and SECOND items are exactly ALIKE.
C, if only the FIRST and THIRD items are exactly ALIKE.
D, if only the SECOND and THIRD items are exactly ALIKE.
E, if ALL THREE items are DIFFERENT.
22 - 45 que just matching of pattern
22)LLMLLLKLMPUU, LLMLLLKLMPUU, LLMLLLKLMPUU
A) A B)B C)C D)D E)E
23) 0452-9858762, 0452-9858762, 0452-9858762
A) A B)B C)C D)D E)E
24. If* stands for /, / stands for -,+ stands for * and -stands for +, then 9/15*9+2-9=?
A) 14.7
B) 15.3
C) 14.1
D) 16.2
25. If * stands for -,/ stands for +, + stands for / and -stands for *, then which of the
following is TRUE?
A) 16/8*6+90-12 =23.2
B) 8*12/6+90-12 =7.2
C) 16*6/8+16-12 =-4.1
D) 12*16/6+90-12 =8
26. See the options given below which one is correct
A) 6 S 7 A 2 M 3 W 0 D 7
B) 6 A 7 S 2 M 3 W 0 A 7
C) 6 S 7 M 2 S 3 W 0 M 7
D) 6 M 7 S 2 A 3 X 0 D 7
Although he os a CSE student, I was questioned mostly on Electronics subjects. So do
take care about brushing up Electronics and Physics also.
01. NAND Gate
02. Ways to connect a computer in India and another in Switzerland (only 1 or 2 won’t
do, they wanted wayS)
03. Modulation-Demodulation
04. Working of a modem
05. Program for logic gates
06. Difference between MS Access and Oracle
07. RDBMS product in market
08. Why make queries and use SQL when u have MS Excel
09. Reflection, Refraction, Total Internal Reflection
10. Optical Fibre
11. Bit, byte, kilobyte, memory, etc in c, c++ and Java
12. Microwave
NON-TECHNICAL
01. Tell me something about yourself
02. Why should we hire u?
03. What r ur weaknesses?
04. What is special about today? (Ans.: 3rd March is celebrated as TaTa Day (Mr.
Jamshed Tata’s B’day))
05. What would u do if u are walking on a highway all alone with no means of
communication and you witness an accident in which a motor cyclist is badly injured?
There is no other vehicle to seek help from.
06. Why should we hire you?
07. Tell us about E-Major and E-Minor chords in guitar (my hobby)
08. Speak for 2 minutes on “Americas war on Iraq”
09. Difference between a Joint and Nuclear family
10. Where do u see urself 5yrs dowm the line
11. What would u like to do 24 hrs in a day
12. Why T.C.S.?
13. If Microsoft or some other company pays u more than us, u’ll leave us?
14. What would ur reaction be if u do not find ur name on the selection list and wat
would u do?
15. What r the 2 changes u would want to make in the TCS recruitment procedure?
16. What 2 improvements would u like to make in urself?
17. Founder of TCS?
Numerical
9. In 80 coins one coin is counterfeit what is minimum number of weightings to find out
counterfeit coin
9. What are ur future plans?
10. So u think u r hard working?
11. If u r asked to carry buckets of water, which requires hard working people, will u do
the job?
12. What will u do if IT industry collapses suddenly? Any alternate future plans?
13. R u interested in politics?
14. Can u answer questions from Economics?
15. R u not interested in India's Economy?
16. Can u exchange Franc with Euro?
17. Pound is the currency of which country?
18. Mark is the currency of which country?
19. Who is the captain of Brazil Football Team?
20. Who is the captain of England Cricket Team?
21. U dont watch Cricket?
22. What do u do at home? Only studies?
23. What type of information u search in Internet?
26. If the vertex (5,7) is placed in the memory. First vertex (1,1) ‘s address is 1245 and
then address of (5,7) is ----------
27. Which of the following are orthogonal pairs? a. 3i+2j b. i+j c. 2i-3j d. -7i+j
41. A 2D array is declared as A[9,7] and each element requires 2 byte. If A[ 1,1 ] is
stored in 3000. Find the memory of A[8,5] ?
16. Select the odd one out
a. Oracle b.
Linux c. Ingress
d. DB2
17. Select the odd one out
a. SMTP b. WAP
c. SAP
d. ARP
18. Select the odd man out.
a. Java b.
Lisp c. Smalltalk
d. Eiffel
8) Question on data structures (with diagram) and asked what the diagram implies.
10) When an array of pointers is passed through a function, what actually is passed?
1) address of the starting element
2) last element
3) first element
4) number of elements
Questions on JAVA
- Difference between Java and C++
- Oops concepts and features
- What is a constructor?
- What is a class?
- What is an object?
- What is polymorphism?
- What is Inheritance?
- What is overriding?
- What is an Interface?
- What are abstract data types?
- What do u mean by access specifier?
- What is overloading?
- What is Encapsulation?
- What is garbage collection?
- How do u allocate memory in java?
1) There is no need to fill the resume with too many languages and os..
Questions will b asked basing on whatever u state in resume. So have an idea on all the
languages and operating systems u keep in it.
2) When u r asked to tell about your favorite area in C it would always b better to tell
arrays. If u tell like functions and pointers and functions,..
then little complicated questions will b asked.
3) Also when u asked to rate yourself in C, then better give 5/10.if u give ratings like
6/10 or 7/10 then questions from pointers r asked. So b careful while rating yourself.
4) While rating 5/10 if he asks y so less then say him confidently that u r still trying to
improve your knowledge in C.
5) B confident in whatever u say even though it is wrong.
6) If u have done any project then b prepared with your role in the project work.
7) Unless asked never say your hobbies and weakness. Que like how do u overcome
your weakness is asked.
8)Your weakness should b their strength..
9) Never say condractictory qualities.
Eg : Hardwork is your strength and
Weakness is your laziness
10) If u committed a mistake while speaking in English, don't bother about that.. Instead
continue your answer.. That's important..
We were given only 10 minutes after the results of the written test were announced.
I was the 3rd to my pannel and was the first to be selected by him.
he: give me ur resume
me: gave him the resume
he: tell me abt ur self
me: I was prepared for it.i gave the answer promptly. I couldnt maintain eye contact
initialy but i could manage it.
the real difference is dat office xp runs in win 98, 2000, and win xp. but 2003 runs only
on win xp and win 2000 with servicepack.
he: narrated a big passage. the gist was that whether a file created in office 2003 be
opened in office xp.
me: yes sir it can be without a problem
he: r u sure Chet anaS
me: yes sir. i tol him our college has xp and i have 2003 and we often transfer
documents.
she: (i told her something on my introspection in my intro) she asked gimme an incident
as an example.
me:i didnt expect her to ask it.but suddenly an incident flashed into my mind. it really
happened in my first year.i told her dat.
its always good to boost abt ur college though u dont like somethings in ur college describe
those points in which ur college is different from other colleges.
Q7)In a singly linked list if there is a pointer S on the first element and pointer L is on
the last element. Then which operation will take more time based on the lenght of the
list.
2)S contains the set of positive integer. Find the largest number c such that c=a+b
where a,b,c are distict number of the set.
13. Which of the following is NOT an actual interest group formed by Google employees?
A. Women's basketball
B. Buffy fans
C. Cricketers
D. Nobel winners
E. Wine club
[This exercise is left to the reader.]
14. What will be the next great improvement in search technology?
Semantic searching of mathematical formulas. See
http://functions.wolfram.com/About/ourvision.html for work currently underway at
Wolfram Research that will be made available in the near future.
15. What is the optimal size of a project team, above which additional members do not
contribute productivity equivalent to the percentage increase in the staff size?
A) 1
B) 3
C) 5
D) 11
E) 24
[This exercise is left to the reader.]
16. Given a triangle ABC, how would you use only a compass and straight edge to find a
point P such that triangles ABP, ACP and BCP have equal perimeters? (Assume that ABC
is constructed so that a solution does exist.)
This is the isoperimetrical point , which is at the center of the larger Soddy circle. It is
related to Apollonius' problem . The three tangent circles are easy to construct: The
circle around has diameter , which gives the other two circles. A summary of compass
and straightedge constructions for the outer Soddy circle can be found in " Apollonius'
Problem: A Study of Solutions and Their Connections" by David Gish and Jason M.
Ribando.
17. Consider a function which, for a given whole number n, returns the number of ones
required when writing out all numbers between 0 and n. For example, f(13)=6. Notice
that f(1)=1. What is the next largest n such that f(n)=n?
The following Mathematica code computes the difference between [the cumulative
number of 1s in the positive integers up to n] and [the value of n itself] as n ranges from
1 to 500,000:
The solution to the problem is then the first position greater than the first at which data
equals 0:
which are the first few terms of sequence A014778 in the On-Line Encyclopedia of
Integer Sequences.
Checking by hand confirms that the numbers from 1 to 199981 contain a total of 199981
1s:
18. What is the coolest hack you've ever written?
While there is no "correct" answer, a nice hack for solving the first problem in the SIAM
hundred-dollar, hundred-digit challenge can be achieved by converting the limit into the
strongly divergent series:
and then using Mathematica's numerical function sequence limit to trivially get the
correct answer (to six digits),
You must tweak parameters a bit or write your own sequence limit to get all 10 digits.
[Other hacks are left to the reader.]
19. 'Tis known in refined company, that choosing K things out of N can be done in ways
as many as choosing N minus K from N: I pick K, you the remaining.
This simply states the binomial coefficient identity .
Find though a cooler bijection, where you show a knack uncanny, of making your choices
contain all K of mine. Oh, for pedantry: let K be no more than half N.
'Tis more problematic to disentangle semantic meaning precise from the this paragraph
of verbiage peculiar.
20. What number comes next in the sequence: 10, 9, 60, 90, 70, 66, ?
A) 96
B) 1000000000000000000000000000000000\
0000000000000000000000000000000000\
000000000000000000000000000000000
C) Either of the above
D) None of the above
This can be looked up and found to be sequence A052196 in the On-Line Encyclopedia of
Integer Sequences, which gives the largest positive integer whose English name has n
letters. For example, the first few terms are ten, nine, sixty, ninety, seventy, sixty-six,
ninety-six, …. A more correct sequence might be ten, nine, sixty, googol, seventy, sixty-
six, ninety-six, googolplex. And also note, incidentally, that the correct spelling of the
mathematical term " googol" differs from the name of the company that made up this
aptitude test.
The first few can be computed using the number name function in Eric Weinstein's
MathWorld packages:
A mathematical solution could also be found by fitting a Lagrange interpolating
polynomial to the six known terms and extrapolating:
21. In 29 words or fewer, describe what you would strive to accomplish if you worked at
Google Labs
1.const char *
char * const
What is the differnce between the above tow?.
2.In Unix inter process communication take place using?.
3.What are the files in /etc directory?.
4.About i-node numbers
5.Max relaxable permisssion value with out giving write permission to others?.
6.About ln(linking)
7. A question on until
until (who |grep mary)
do
sleep(60)
done
2. max(t1,t2,...tn) = pipelining
4. print (Head(T))
Traverse(left(T))
print (Head(T))
Traverse(right(T)) - ans: none of the above
15.Least no. when divide by [7 gives remainder 6,6gives 5,5 gives 4 and
soon ans;419
19. for cube and sphere 3 views are similarly draw one such figure?
a) Sendmessage(hWnd,WM_PAINt,......) b) InvalidateRect(.......)
c) MoveWindow d) WM_COPY e) None
33)how can u append the ls and who to certain existing file (like that)(i.e.listing & output
of who is to be directed to a file
(a)ls;who>filename (b)ls;who>>filename
(c)(ls;who)>>filename (d)who;ls(e)...
34)suppose u have a network .users complain of slow ....u suspect a problem in network
adapter once u find that the data is continuous and erroneous. what device do u use?
(a)volt-ohmmeter (b)SNMP
(c)protocol... checking (d)all of the above
37) in a student form what is the relationship b/w student and course
(a)one to one (b)many to one (c)one to many (d)many to many
38)ROM is
(a)volatile
(b)permanent & fast
(c)device containig boot up program & is not accessible
(d)...
12. If the follwoing statements are given
@(a,b)= (a+b)/2
/(a,b)= a/b
*(a,b)= ab
If a=1, b=2 then find
(x#y) = x + y- xy
(x*y) = (x + y)/2
i) Find the values of x, y will satisfy this equation (x#y)#(x*y) < (x#y)
ii) Find the values of x, y will satisfy this equation (a*b)#(b*c)< (a#b)*(b*c)
15. If you type in the command nohup sort employees > list 2 > error out & and log off,
the next time you log in, the output will be
a) in a file called list and the error will de typed in a file error out
b) there will be no file called list or error out
c) error will be logged in a file called list and o/p will be in error out
d) you will not be allowed to log in
e) none of the above
cal 10 1997
cal 5 1997
main()
{char *g="String";
myalloc(g,20);
strcpy(g,"Oldstring");
printf("The string is %s",g);
}
a) Sendmessage(hWnd,WM_PAINt,......) b) InvalidateRect(.......)
c) MoveWindow d) WM_COPY e) None
3. For a 25MHz processor , what is the time taken by the instruction which needs 3
clock cycles,
(a)120 nano secs (b)120 micro secs (c)75 nano secs (d)75 micro secs
7. Question related to java
8. OLE is used in
a) inter connection in unix
b) interconnection in WINDOWS
c) interconnection in WINDOWS NT
9. Convert a given HEX number to OCTAL
10. Macros and function are related in what aspect?
(a)recursion (b)varying no of arguments
(c)hypochecking (d)type declaration
13. In signed magnitude notation what is the minimum value that can be represented
with 8 bits
(a) -128 (b) -255 (c) -127 (d) 0
14. There is an employer table with key fields as employer number data in every n'th
row are needed for a simple following queries will get required results.
(a) select A employee number from employee A , where exists from employee B where A
employee no. >= B
employee having (count(*) mod n)=0
(b) select employee number from employe A, employe B where A employe number>=B
employ number
group by employee number having(count(*) mod n=0 )
(c) both (a) & (b)
(d) none of the above
15. Type duplicates of a row in a table customer with non uniform key field customer
number you can see
a) delete from customer where customer number exists( select distinct customer number
from customer having count )
b) delete customer a where customer number in b rowed
c) delete customer a where customer number in( select customer number from customer
a, customer b )
d) none of the above
1. Given the following statement
enum day = { jan = 1 ,feb=4, april, may}
What is the value of may?
(a) 4 (b) 5 (c) 6 (d) 11
(e) None of the above
STRUCT DOUBLELIST
{
DOUBLE CLINKED
INT DET; LIST VOID
STRUCT PREVIOUS; (BE GIVEN AND A PROCEDURE TO DELETE)
STRUCT NEW; (AN ELEMENT WILL BE GIVEN)
}
DELETE(STRUCT NODE)
{NODE-PREV-NEXT NODE-NEXT;
NODE-NEXT-PREV NODE-PREV;
IF(NODE==HEAD)
NODE
}
Q. In what case the prev was
(a) All cases
(b) It does not work for the last element
(c) It does not for the first element
(d) None of these
It went on for about 30 minutes
1. ------stores a log of changes made to db,which are then written to _,which are
then written to _,which is used if db recovery is necc.
a) db buffer share pool
b) program global area,shared pool
c) system global area,large pool
d) redo log buffer,online redo log
2. The primary characteristic of key field is that it must be unique
3. If a member initialiser is not provided for a member object of a class .The object -
is called
a) static fn
b) non static fn
c) default constructor
d) none
4. class constest
{
private:
const int i;
public:
constest():i(10)
}
5. Inheritance
b) abstract base class
c) specifies a way to to define a const member data
d) none
6. Iimplement polymorphism when by object belonging to different class can
respond to the same message in diff ways.
a) late binding
b) dynamic binding
c) dynamically created object
d) virtual fun
7. Member function---------- and ----------- set and reset the format state of flags.
a) set,reset
b) set,get
c) set, unset
d) set, unsetf
8. Now some questions about extern variables.
9. Remember an inline function does type checking and so it is better than a macro
a question on this.
Some memory is allocated using memalloc and then realloc is called. and now to
write the size of the variable.better learn memalloc and realloc. what it does and
syntax.
22.Given Id, author, creation time, size, links, web page, description
Bring it in 2nd normal form
23.Consider a heap containing numbers 10, 20, 30, 40, 80, 60, 70 such that numbers
are in ascending order from the leaf to the root. If 25 is to be inserted what is the
position.(A[1], A[2], A[3], A[4])
24. #!/bin/perl
var=///
aaaa
echo ‘$var’
26.In database sort the student id and the course id for each student. Which is the best
possible solution.
-Sort the student id using a stable algorithm and then sort the course id using unstable
algorithm
-Sort the student id using a unstable algorithm and then sort the course id using stable
algorithm
- Sort the course id using a stable algorithm and then sort the student id using unstable
algorithm
- Sort the course id using a unstable algorithm and then sort the student id using
unstable algorithm
2. 2n+1 numbers in a list except for 1 num all had duplicates, how to
find duplicate in O(n)
5. Which is the DS used in dictionary mode in mobile (t9)
6. Which is DS used for chess program...to predict move each and every time..
7. There are $1070 dollars how to split them into bags such that asked
for any denomination from $1 to $1070 , u must b able to give without
opening bag...
If any one has idea do mail me qrio.qrio at gmail.com (qrio dot qrio
at gmail dot com).. Eagerly waiting...
Another paper:
1. First fit issues...
2. Algorithm to partition set of numbers into two s.t. diff bw their
sum is min and they hav equal num of elements
3. Prog: given Numerator & Denominator.... print 0.3333333333 as .(3)
0.123123 as .(123)
3.Areserved area of the immediate access memeory used to increase the running speed
of the computer program.
a) session memory b) bubble memory c) cache memory d) shared
memory
4.a small subnet that sit between atrusted internal network and an untruster external
network, such as the public internet.
a) LAN b) MAN c) WAN d) DMZ
27.There is a circuit using 3 nand gates with 2 inputes and 1 output,f ind the output.
a) AND b) OR c) XOR d) NAND
60) a _________sub query can be easily identified if it contains any references to the
parent sub query columns in the _________ clause
A) correlated ,WHERE b) nested ,SELECT
c) correlated,SELECT d) none
61) hybrid devise that combines the features of both bridge and router is known as
a)router b)bridge c)hub d)brouter
Xß-infinity
For each item in the list L,do
If the item>x,then
Xßthe item
Return X
X represents:-
a)largest number b)smallest number c)smallest negative number d) none
72.Let A and B be nodes of a heap,such that B is a child of A. the heap must then
satisfy the following conditions
a)key(A)>=key(B) b)key(A)<KEY(B) c)key(A)=key(B) d)none
75.sentinel node at the beginning and /or at the end of the linkedlist is not used to store
the data
a) true b) false
1. One Nibble = ?
2. Hexadecimal and Octal representation of 1024 ?
3. What a compiler does ?
4. DOS ? (whether Graphical interface or Character interface and two more
choices are given)
5. CPU - abbrevation
6. Fortran used as ( Ans : Scientific Language)
7. ASCII character set ? (total number)
8. Windows NT- What NT stands for?
9. Which is not an input device ? (keyboard, Disk, Mouse,Lightpen)
10. Which is not a pointing device ?( mouse,Joy stick,lightpen none)
11. Microsoft Chief ?
12. 4GL ? (Fortran,SQL,ADA, ....)
13. Father of Computers?
14. Which of them is Object Oriented Language.?
15. Power PC is the product of ? (Microsoft,IBM,Apple,Motorola,Intel)
(A combination of any correct 3 companies)
16. Latest processor used ? (Pentium, Power PC, Pentium pro,none)
17. MS Word is ?
18. First Super Computer built in India. (Ans : param)
19. Which of the following companies donot manufacture chips?
(Microsoft, Motorola, Intel, HP)
20. LAN - abbrevation
21. WAN - abbrevation
22. Modem is ? (related to electrical hardware.- Like Modulator &demodulator)
23. FDD - abbrevation ( floppy Disc drive)
24. BIT - abbrevation
25. Information is ? (message, data,processed data,none)
26. Which is not networking ?(internet, Ethernet, arcnet,none)
27. One Gigabyte =?( 2 power30 , 2 power 20 ,2 power 10 none)
28. Which of the following is not RDBMS ? (sybase, SQL,Acess,none)_
29. Oracle is ? (Ans : Relationasl Data Base Management System)
30. In Oracle, Table means ( Ans : Collection of records)
31. DMA - abbrevation (Direct Memory Access,Discrete memory Access,
Disk memoryaccess)
32. What is meant byStatic Variable ?
33. What is meant by QUEUE? {refer any data structures text}
34. What is meant by STACK? {refer any data structures text}
35. The processor used in first IBM PC? (8086,8088,zig4,intel)
36. Difference between 80286 and 80287
37. In bubble sort , no. of comparisons required ?(ans : formula : N*(N-1)/2)
38. No. of comparisons of an item in 100 items by binary comparison?
( 10,25,50 100)
39. CRT - (Cathode Ray Tube)
40. No. of entryvalues are there in ideally in a subroutine.
41. Binary tree?
42. Flow in one direction ? (Single linked list,Double linked
list,.......,....)
43. Electron screen size ? (here, 2 lines of algorithm is given.
Name the algoirithm)
44. Which is not storage device.? (printer,CD ROM,Disk,none)
45. A question regarding memory ? ( least used memory,recently unused
memory,..)
46. ISO - (International Standard Organisation)
47. HTML - (Hyper Text Makeup Language)
48. Flow chart for factorial N? (ans :choice a)
49. What is meant by Recursion ?
10. When the circulation of water in a boiler is by a centrifugal pump then the boier is
known as
A. Internaly fired
B. Externally fired
C. Natural circulation Boiler
D. Forced circulation boiler
11. Which boiler is best suited to meet fluctuation demand of steam
A. locomotive
B. Lancashire
C. Cornish
D. Babcock and Wilcox
what is FAT?.
3.whict protocol is used when file through internet is send from one server to another
server.
(1)x.25 (2)SMTP (3)TELNET.
4.which protocol is used for file transfer
(1)ftp (2)tftp
A.(1) one only B.(2) but not (3) C.(3)but not (2) D.(2)and(3)
16. In selecting the pivot for Quicksort, which is the best choice for optimal partitioning:
a. the first element of the array b. the last element of the array
c. the middle element of the array d. the largest element of the array
e. the median of array
13. What is the order of each of the following tasks? (Choose from O(1), O(log2 n),
O(n), O(n log2 n), O(n2), O(2n); each order may appear more than once.)
16. Write a query to list the maximum salary in such departments which have more
than two employees from table EMP which has columns empno, ename, deptno, salary.
19. Write a query to find the max salary from emp (empno, ename, salary) without
using max function.
21. Consider the following graph
1
2
2
2
3
2
4 2
8
1
3
1
6
0
5
9
1
1
If this graph is searched by depth-first search, starting from vertex 1, and if neighbours
are searched in numerical order, what will be the order in which the nodes are visited?
(Note: If you use an explicit stack for depth-first search, then the nodes are visited when
they come off the stack, so they have to pushed in reverse numerical order to be
searched in numerical order)
Question 1
In C language, which of the following is equivalent to &2[3[a][5]]?
Character : f g h m n p q
-------------------------------------
Frequency : 1 1 2 3 3 5 8
Question 3
Suppose we have a binary tree T on n nodes. It is not extended, and is not required to
be full. If the first node of its postorder traversal is the same as the last node of its
preorder traversal, what can we conclude?
Question 4
The following postfix expression containing single digit operands and arithmetic
operators + and *, is evaluated using a stack. ( consider left to right as bottom to top ).
52*34+52**+
What are the contents of the stack after the evaluation of 5 2 * 3 4 +
Question 9
Which traversal will produce output that takes maximum processing time when fed to a
randomized quick sort algorithm for a binary tree? A randomized quick sort can
randomly select any elements from the current set of elements, as pivot.
(a) Preorder (b) Inorder (c) Postorder (d) All are same
Question 10
An insect sitting at coordinate (0,0) can move either one unit or two units at a time i.e. if
it is at (x,0), it can go either (x+1,0) or (x+2,0). In how many ways it can go from (0,0)
to (n,0).
Question 11
Given an unsorted array of length n, what is the least no. of comparisons needed to find
the minimum and maximum of the array?
Question 12
Find the postorder traversal if A,B,C,D,E,F and G are the nodes of a binary tree and the
inorder and preorder traversals of the tree is as given below
Preorder : ABEFCDG
Inorder : EFBCGDA
Question 9
A hash table contains 10 buckets and uses linear probing to resolve collisions. The key
values are integers and the hash function used is key%10. If the values 43, 165, 62,
123, 142 are inserted in the table, in what location would he key value 142 be inserted?
Question 10
If f(A,B) = A’+B, what does f(f(x+y,y),f(x+y,y)) simplify to?
Question 11
Your college has been assigned a Class B address of 192.55.0.0. As a network
administrator, you are in charge of sub-netting the IP address space assigned to your
institution, among 48 departments. Assuming the sub-netting is done optimally, what is
the maximum number of hosts that each of the 48 departments can have (Assume that
no host can have an all 0 or all 1 address)?
(a) 2046 (b) 512 (c) 1022 (d) 254 (e) none
Question 12
A host on a network has a Class B address of 192.168.243.5. The subnet mask used is
FF.FF.F0.0 ( in Hex). Which of the following address and sub-net masks identify a host in
the same network?
(a) 192.168.1.1/255.255.240.0
(b) 192.168.239.5/255.255.240.0
(c) 192.168.240.192/255.255.240.0
(d) 192.168.224.240/255.255.240.0
(e) none
5. What is the largest prime number that can be stored in an 8-bit memory?
28. The size of the bucket is N kb. The bucket fills at the rate of 0.1kb per millisecond. A
programmer sends a program to receiver. There it waits for 10 milliseconds. And
response will be back to programmer in 20 milliseconds. How much time the program
takes to get a response back to the programmer, after it is sent?
29. The size of a program is N. And the memory occupied by the program is given by M
= square root of 100N. If the size of the program is increased by 1% then how much
memory now occupied ?