Anda di halaman 1dari 42

Why CSC?

Home Careers - India Why CSC?

The Brand CSC The legendary CSC story only grows richer with age. Great Work Culture CSCs supportive work culture brings out the best in you. Excellent People Practices When you join CSC, you become part of a caring family. Dynamic Growth and Learning Youll find opportunities to grow and learn all around you at CSC. Embracing Diversity CSC has a strong commitment to supporting diversity of all kinds. Social Responsibility Our Corporate Social Responsibility Committee undertakes many important community activities. Our Reputation Experience the joy of working for one of the best companies in the industry.

The Brand CSC: Still Going Strong, After More Than 45 Years! CSC started with $100 and a dream. Today it is the worlds oldest IT services company, one of the Big Six and one of the Fortune 200. With approximately 91,000 employees in 92 countries worldwide, CSC offers our clients a wealth of experience and an unparalleled scope of services across 12 industries. Read CSCs legendary story.

Top Great Work Culture: Bringing Out the Best in You

Flexible, responsive, collaborative, eager to incorporate customer ideas, decentralised, hands-off management approach Dataquest

When you join CSC, you find much more than a dynamic career you become part of a caring family. Innovation is one of our core values, so youll always enjoy yourself and learn as you grow here. Our Office of Innovation programme ensures that we work on cutting-edge technologies and stay one step ahead of the curve. We walk that extra mile to make things possible, and that brings out the best in us.

Top

Excellent People Practices: We Care for You CSCs employee policies are some of the best in the industry. This is the reason we have been rated, year-on-year, as Indias Employer of Choice. Our third-party awards and ratings testify to our commitment to employees and clients:
Leaders in Human Capital Development: Global Services 100 List (2008) Top 25 Best Employers in India: Hewitt Associates The Economic Times Survey (2007) Top 20 Best IT Employers in India: Dataquest IDC Best Employers Survey (2007, 2006, 2005, 2003) Top 20 Great Places to Work: Great Place to Work Institute Inc. Businessworld & Grow Talent Survey (2006, 2005, 2004) Best Company to Work For: Business Today Mercer Survey (2007, 2006, 2005) Best Women-Friendly Company: Madras Management Association (2005) 5th Fastest Growing Company in India: Dataquest IDC Top 50 Fastest Growing Companies, 2005 2006

Learn more about our recent and past awards

Top Continuous Learning and Development: Never Stop Learning

Did you know that 95% of the people in the companies we acquire choose to stay with CSC because they like the richness of learning experiences that we offer? One of our software developers affirmed that he learned more at CSC in 3 months than he had in 3 years at his previous company. Youll find opportunities to grow and learn all around you at CSC. Job enrichment, job rotation and lateral and vertical growth plans are some of the pathways we offer for your continuous career growth. We have an array of global e-learning programs, mandatory 90 hours of training for all employees, and initiatives like Innovation@Work for employees to work on the latest software and learn cutting-edge technologies. CSCs vibrant, open culture including employee participation in policy making and democratic, self-managed, employee-run committees for our Corporate Social Responsibility and recreational activities initiatives makes our people well-rounded individuals, professionals and managers.

Top Embracing Diversity: Equal Opportunities for Everyone CSC is deeply committed to being an Equal Opportunity Employer and supports diversity of all types. At CSC, no person is discriminated against on the basis of race, religion, colour, sex or age. CSC respects these differences, recognising the unique contributions that individuals from different sections of society can make and creating a work environment that maximises the potential of all our employees.

Top

Social Responsibility: The Joy of Giving Back At CSC India, social contribution is not a mere corporate responsibility but a collective effort of our employees charged with their emotional energy and enthusiasm to create a better, uplifted society. In a largely wealth-driven work life, the selfless joy of giving back to the communities in which they live gives our employees immense satisfaction, and a contentment

that clearly enhances their productivity at work. Corporate Social Responsibility (CSR) at CSC India involves employee participation at all levels. Each employee gets an opportunity to become a part of our CSR activity. CSR at CSC India is approached with a single-minded focus on bringing about social emancipation for the marginalised and weaker sections of our society. Since its inception, CSC India has played a conscious and active role in ensuring that the work done under CSR is effective and critical. Whether it is adopting a village in Indore or organising a relief program for tsunami victims, all our social causes share something in common they are acts of self-realisation from an organisation committed to a greater cause.

Top

Our Reputation: Work for the Best Client-Focused: CSC makes a special point of understanding its clients needs, and delivers solutions that best meet these unique needs. Top-of-the-Line Talent: Only the best can make it to CSC. Trusted: CSCs reputation for performance, flexibility, and for doing the right thing for our clients is widely recognised by independent analysts and the IT industry. Globally Integrated: CSC India plays a pivotal role in the success of the global CSC. We are among the few Indian firms delivering end-to-end solutions to clients worldwide from India using standardised, proven global processes. Deep Industry Expertise: CSC Indias deep understanding of industry and domain ensures IT solutions that deliver strong, measurable business results to our clients. Focus on Innovation: CSCs dedicated Centers of Excellence and programs such as our Office of Innovation and the Leading Edge Forum ensure we stay at the cutting edge of technology.

Company Profile
WE ARE LOCATED WHERE OUR CLIENTS NEED US In addition to our headquarters in Falls Church, Virginia, USA, and three other major offices in Australia, Asia and Europe, our 93,000 professionals serve clients in more than 90 countries. WHAT WE DO For more than 50 years, we at CSC have developed smart, technology-enabled solutions to solve our clients' toughest challenges, demonstrating a commitment to excellence and a passion for exceeding expectations. Over the past five decades, technology has radically changed the world we live in. We have remained at the forefront of our business because we have understood how to use technology change and innovation to deliver value to our clients. WE DO AMAZING THINGS We are often asked, "What is it that you do?" We tell them, humbly and yet truthfully: we do amazing things. We help solve big challenges. Technically complex, mission-critical challenges. Watch our video, which brings to life a few of those challenges through four short case studies. Or, read from a list of hundreds of our client success stories. FIFTY YEARS OF SUCCESS It started with two men who had a dream. From the moment CSC was born on April 16, 1959, ingenuity has been a driving force behind our success. Explore our rich history. COMPANY PROFILE Read a concise description of our services, financial data, strategic programs and representative client engagements (PDF, 280 KB). OUR MANAGEMENT TEAM Our senior management team has an average of 25 years of domestic and international IT experience and a strong history of business, academic and technological accomplishments. FINANCIAL PERFORMANCE CSC (NYSE: CSC) reported trailing 12 months revenue of $16.2 billion for the third quarter ending December 31, 2010.
2011 VMware system integrator of the year Today at VMware Partner Exchange 2011, VMware, Inc. (NYSE: VMW), the global leader in virtualization

and cloud infrastructure, acknowledged its global ecosystem partners for outstanding achievements and performances during 2010.

Hi Friend's I appeared in the placement procedure of the company and faced all the rounds namely.

Aptitude Test (Written) Technical Test (Written Essay Writing (Written) Communication Round Technical Interview HR Interview

Now all the rounds in details: Aptitude:

Simplification Time and distance (average speed logic) Sudoku(3 by 3) Probability Permutation and combination English (Passage small one; fill in the blanks easy)

Technical Written:

DBMS C Language Microprocessors Basics Micro-controllers Basics Operating Systems Basics DCS Basics Number Conversions (Decimal, Binary, Octal, Hexadecimal)

Essay Writing:You have to write an essay on one of the topics and nearly 5-6 topics are provided. Just to check whether you can write efficiently in English. Communication Round:Question: Tell Me Something About Yourself. Just to check whether you can speak fluently in English or not (simple one). Technical Interview:

DBMS (Keys, Views, Normalized forms Communication Systems (AM, FM, PM Modulation and their combinations) C Language (Basics)

HR Round: If you clear the Technical Interview you have done 99% job. In HR they just ask about your family background, any issue for shift changing Relocation. That's an easy one. Best of Luck Exam/Interview Date : 10-Feb-2011 No of Rounds : Aptitude Test, Technical Round, GD, Location: Delhi Contributor Name : Parag Goswami Company Name : CSC (Computer Science Corporation) Type : Fresher, Job Interview Held on: June 2010 Hi friends, I am Dhivyaa. K.S from Ganadipathy Tulsis Engineering College, Vellore. Recently I had appeared for off-campus interview conducted by ANNA UNIVERSITY PLACEMENT PROGRAMME on 17th & 18th June 2010 at Sai Ram Engineering College, Chennai and am very glad to say that I got selected. Here I would like to share my interview experience with you.

Aptitude Technical Group Discussion Technical HR Personal Interview

WRITTEN TEST (MAJOR ELIMINATION TAKES PLACE, SO, CONCENTRATE MUCH ON THIS) I. APTITUDE

In this round, they asked 40 questions in 40 minutes which includes Two from Venn diagram, (easy) One from probability, 3*3 Sudoku like below, (very easy) 82 9 You have to fill the numbers from 1-9 in the boxes, such that it should have 15 from top to bottom and across the diagonal, then you would have the box as like the one below: 825 147 693 From this you might have questions like, summing up the numbers which are right and left to the number 2. For us, three questions were asked from this:

Some four questions were asked from the four different passages. One problem based on age. (easy) Three questions based on Speed and Distance. One from permutation Percentage ( easy ) Few questions based on functions. (very easy one)

II. TECHNICAL It consists of 75 questions and duration is 40 minutes. We had the questions from previous year papers. 1. ------- is associated with web services. a) WSDL b) WML c) web sphere d) web logic Ans: a 2.any large single block of data stored in a database, such as a picture or sound file, which does not include record fields, and cannot be directly searched by the databases search engine. a) TABLE b) BLOB c) VIEW d) SCHEME Ans: b 3.A reserved area of the immediate access memory used to increase the running speed of the computer program. a) session memory b) bubble memory c) cache memory d) shared memory

Ans: c 4.a small subnet that sit between a trusted internal network and an untruster external network, such as the public internet. a) LAN b) MAN c) WAN d) DMZ Ans: d 5.technologies that use radio waves to automatically identify people or objects,which is very similar to the barcode identification systems,seen in retail stores everyday. a) BLUETOOTH b) RADAR c) RSA SECURE ID d) RFID Ans: d 6.main(){ float fl = 10.5; double dbl = 10.5 if(fl ==dbl) printf(UNITED WE STAND); else printf(DIVIDE AND RULE) } What is the output? a) compilation error b) UNITED WE STAND c) DIVIDE AND RULE d) Linkage error. Ans: c 7.main(){ static int ivar = 5; printf(%d,ivar--); if(ivar) main(); } What is the output? a)1 2 3 4 5 b) 5 4 3 2 1 c)5

d) Compiler error:main cannot be recursive function. Ans: b 8.main() { extern int iExtern; iExtern = 20; printf(%d,iExtern); } What is the output? a)2 b) 20 c) compile error d) linker error Ans: d 9..#define clrscr() 100 main(){ clrscr(); printf(%d\n\t, clrscr()); } What is the output? a)100 b)10 c)compiler errord)linkage error Ans: a 10.main() { void vpointer; char cHar = g, *cHarpointer = GOOGLE; int j = 40; vpointer = &cHar; printf(%c,*(char*)vpointer); vpointer = &j; printf(%d,*(int *)vpointer); vpointer = cHarpointer; printf(%s,(char*)vpointer +3); } What is the output? a) g40GLE b) g40GOOGLE c) g0GLE d) g4GOO Ans: a

11.#define FALSE -1 #define TRUE 1 #define NULL 0 main() { if(NULL) puts(NULL); else if(FALSE) puts(TRUE); else puts(FALSE); } What is the output? a) NULL b) TRUE c) FALSE d)0 Ans: b 12.main() { int i =5,j= 6, z; printf(%d,i+++j); } What is the output? a)13 b)12 c)11 d) Compiler error Ans: c 13.main() { int i ; i = accumulator(); printf(%d,i); } accumulator(){ _AX =1000 } What is output? a)1 b)10 c)100 d)1000 Ans: d

14.main() { int i =0; while(+(+i--)!= 0) i- = i++; printf(%d,i); } What is the output? a) -1 b) 0 c) 1 d) Will go in an infinite loop Ans: a 15.main(){ int i =3; for(; i++=0;) printf((%d,i); } What is the output? a) 1 b) 2 c) 1 2 3 d) Compiler error : L value required. Ans: d 16. main(){ int i = 10, j =20; j = i ,j?(i,j)?i :j:j; printf(%d%d,i,j); } What is the output? a) 20 20 b) 20 10 c) 10 20 d) 10 10 Ans: d 17.main(){ extern i; printf(%d\t,i);{ int i =20; printf(%d\t,i);

} } What is the output? a) Extern valueof i 20 b) Externvalue of i c) 20 d) linker Error: unresolved external symbol i Ans: d 18.int DIMension(int array[]){ return sizeof(array/sizeof(int);} main(){ int arr[10]; printf(Array dimension is %d,DIMension(arr)); } What is output? a) array dimension is 10 b) array dimension is 1 c) array dimension is 2 d) array dimension is 5 Ans: b 19. main(){ void swap(); int x = 45, y = 15; swap(&x,&y); printf(x = %d y=%dx,y); } void swap(int *a, int *b){ *a^=*b, *b^=*a, *a^ = *b; What is the output? a) x = 15, y =45 b) x =15, y =15 c) x =45 ,y =15 d) x =45 y = 45 Ans: a 20.main(){ int i =257; int *iptr =&i; printf(%d%d,*((char*)iptr),*((char *)iptr+1)); }

What is output? a)1, 257 b)257 1c)0 0d)1 1 Ans: d 21.main(){ int i =300; char *ptr = &i; *++ptr=2; printf(%d,i); } What is output? a) 556 b) 300 c) 2 d) 302 Ans: a 22.#include main(){ char *str =yahoo; char *ptr =str; char least =127; while(*ptr++) least = (*ptr printf(%d,least); } What is the output? a) 0 b)127 c) yahoo d) y Ans: a 23.Declare an array of M pointers to functions returing pointers to functions returing pointers to characters. a) (*ptr[M]()(char*(*)()); b) (char*(*)())(*ptr[M])() c) (char*(*)(*ptr[M]())(*ptr[M]() d) (char*(*)(char*()))(*ptr[M])(); 24.void main(){ int I =10, j=2; int *ip = &I ,*jp =&j;

int k = *ip/*jp; printf(%d,k); } What is the output? a) 2 b) 5 c) 10 d) compile error:unexpected end of file in comment started in line 4 Ans: d 25.main(){ char a[4] =GOOGLE; printf(%s,a); } What is the output? a) 2 b) GOOGLE c) compile error: yoo mant initializers d) linkage error. Ans: c 26.For 1MB memory, the number of address lines required a) 12 b) 16 c) 20 d) 32 Ans: 16 27.There is a circuit using 3 nand gates with 2 inputes and 1 output,f ind the output. a) AND b) OR c) XOR d) NAND Ans: b (not sure) 28. What is done for push operation a) SP is incremented and then the value is stored. b) PC is incremented and then the value is stored. c) PC is decremented and then the value is stored. d) SP is decremented and then the value is stored. Ans: d 29.Memory allocation of variables declared in a program is: a) Allocated in RAM

b) Allocated in ROM c) Allocated in stack d) Assigned in registers. Ans: c 30.What action is taken when the processer under execution is interrupted by TRAP in 8085MPU? a) Processor serves the interrupt request after completing the execution of the current instruction. b) processer serves the interrupt request after completing the current task. c) processor serves the interrupt immediately. d) processor serving the interrupt request depent deprnds upon the priority of the current task under execution. Ans: a 31.purpose of PC (program counter)in a microprocessor is: a) To store address of TOS(top of stack) b) To store address of next instructions to be executed c) count the number of instructions d) to store the base address of the stack. Ans: b 32.conditional results after execution of an instruction in a microprocess is stored in a) register b) accumulator c) flag register d) flag register part of PSW (program status word) Ans: c 33.The OR gate can be converted to the NAND function by adding----gate(s)to the input of the OR gate. a) NOT b) AND c) NOR d) XOR Ans: a 34. In 8051 microcontroller , has a dual function. a) port 3 b) port 2 c) port 1 d) port 0 Ans: b 35.An 8085 based microprocessor with 2MHz clock frequency,will execute the following chunk of code with how much delay? MVI B,38H

HAPPY: MVI C, FFH SADDY: DCR C JNZ SADDY DCR B JNC HAPPY a) 102.3 b)114.5 c)100.5 d)120 36.In 8085 MPU what will be the status of the flag after the execution of the following chunk of code. MVI B,FFH MOV A,B CMA HLT a) S = 1, Z = 0, CY = 1 b) S = 0, Z = 1, CY = 0 c) S = 1, Z = 0, CY = 0 d) S = 1, Z = 1 ,CY = 1 37.A positive going pulse which is always generated when 8085 MPU begins the machine cycle. a) RD b) ALE address latch enable c) WR d) HOLD Ans: b 38.when a ----- instruction of 8085 MPU is fetched , its second and third bytes are placed in the W and Z registers. a) JMP b) STA c) CALL d) XCHG Ans: c 39.what is defined as one subdivision of the operation performed in one clock period. a) T- State b) Instruction Cycle c) Machine Cycle d) All of the above Ans: a 40.At the end of the following code, what is the status of the flags. LXI B, AEC4H

MOV A,C ADD HLT a) S = 1, CY = 0, P = 0 , AC = 1 b) S =0 , CY = 1, P = 0,AC = 1 c) S = 0, CY = 1, P = 0 , AC = 1 d) S = 0, CY = 1, P = 1 , AC = 1 41.In 8051 micro controller what is the HEX number in the accumulator after the execution of the following code. MOV A,#0A5H CLR C RRC A RRC A RL A RL A SWAP A a)A6 b)6A c)95 d)A5. Ans: a

42.The Pentium processor requires ------------ volts. a)9 b)12 c)5 d)24 ans; c 43. The data bus on the Celeron processor is-------bits wide. a)64 b)32 c)16 d)128. Ans: a 44.K6 processor a) Hitachi b) toshiba c) zilog d) AMD. Ans: d 45. What is the control word for 8255 PPI,in BSR mode to set bit PC3. a)0EH b)0FH c)07H d)06H. ans:c 46.The repeated execution of a loop of code while waiting for an event to occur is called --------.The cpu is not engaged in any real productive activity during this period,and the process doesnt progress towards completion. a) dead lock b) busy waiting c) trap door d) none. Ans: b 47. Transparent DBMS is defined as a) A DBMS in which there are no program or user access languages. b) A DBMS which has no cross file capabilities but is user friendly and provides user interface management. c) A DBMS which keeps its physical structure hidden from user d) none.

Ans: c 48.Either all actions are carried out or none are. users should not have to worry about the effect of incomplete transctions.DBMS ensures this by undoing the actions of incomplete transctions.this property is known as a) Aggregation b) atomicity c) association d) data integrity. ans : B 49.------ algorithms determines where in available to load a program. common methods are first fit,next fit,best fit.--------- algorithm are used when memory is full , and one process (or part of a process) needs to be swaped out to accommodate a new program.The ------------- algorithm determines which are the partions to be swaped out. a) placement, placement, replacement b) replacement, placement, placement c) replacement, placement, replacement d) placement, replacement, replacement Ans: D 50.Trap door is a secret undocumented entry point into a program used to grant access without normal methods of access authentication. A trap is a software interrupt,usually the result of an error condition. a)true b)false. Ans: A 51. Given a binary search tree,print out the nodes of the tree according t5o post order traversal. 4 /\ 25 /\ 13 a)3,2,1,5,4. b)1,2,3,4,5. c)1,3,2,5,4. d)5,3,1,2,4. Ans: C 52.which one of the following is the recursive travel technique. a)depth first search b)preorder c)breadth first search d)none. 53.which of the following needs the requirement to be a binary search tree. a) 5 /\ 27 / 1 b) 5 /\ 67 c) 5

/\ 27 /\ 16 d) none. 54.in recursive implementations which of the following is true for saving the state of the steps a) as full state on the stack b) as reversible action on the stack c) both a and b d) none 55.which of the following involves context switch a)previliged instruction b)floating point exception c)system calls d)all e)none ans : c

56.piggy backing is a technique for a)acknowledge b)sequence c)flow control d)retransmission ans:A 57. a functional dependency XY is ___________dependency if removal of any attribute A from X means that the dependency does not hold any more a)full functional b) multi valued c)single valued d)none ans : a 58)a relation schema R is in BCNF if it is in ___________and satisfies an additional constraints that for every functional dependency XY,X must be a candidate key a)1 NF b)2 NF c)3 NF d)5 NF 59) a _________sub query can be easily identified if it contains any references to the parent sub query columns in the _________ clause

A) correlated ,WHERE b) nested ,SELECT c) correlated,SELECT d) none 60) hybrid devise that combines the features of both bridge and router is known as a)router b)bridge c)hub d)brouter 61) which of the following is the most crucial phase of SDLC a)testing b)code generation c) analysys and design d)implementation Ans: c 62)to send a data packet using datagram ,connection will be established a)no connection is required b) connection is not established before data transmission c)before data transmission d)none Ans: c 63)a software that allows a personal computer to pretend as as computer terminal is a) terminal adapter b)terminal emulation c)modem d)none Ans: b 64) super key is a) same as primary key b) primary key and attribute c) same as foreign key d) foreign key and attribute Ans: b 65.In binary search tree which traversal is used for ascending order values a) Inorder b)preorder c)post order d)none Ans: a 66.You are creating an index on ROLLNO colume in the STUDENT table.which statement will you use? a) CREATE INDEX roll_idx ON student, rollno; b) CREATE INDEX roll_idx FOR student, rollno; c) CREATE INDEX roll_idx ON student( rollno); d) CREATE INDEX roll_idx INDEX ON student (rollno); Ans: c 67.A________class is a class that represents a data structure that stores a number of data objects

a. container b.component c.base d.derived Ans: a 68.Which one of the following phases belongs to the compiler Back-end. a. Lexical Analysis b.Syntax Analysis c. Optimization d.Intermediate Representation. Ans: c 69.Every context _sensitive language is context_free a. true b.false Ans: b 70.Input:A is non-empty list of numbers L X-infinity For each item in the list L,do If the item>x,then X the item Return X X represents:a)largest number b)smallest number c)smallest negative number d) none 71.Let A and B be nodes of a heap,such that B is a child of A. the heap must then satisfy the following conditions a)key(A)>=key(B) b)key(A) c)key(A)=key(B) d)none 72.String ,List,Stack,queue are examples of___________ a)primitive data type b)simple data type c)Abstract data type d)none Ans: c 73.which of the following is not true for LinkedLists? a)The simplest kind of linked list is a single linked list ,which has one link per node .this link points to the next node in the list,or to a null value or emptylist if it is the last node. b)a more sophisticated kind of linked list is a double linkedlist or two way linkedlist .Each node has two links ,one to the previous node and one to the next node. c) in a circleLinkedList ,the first and last nodes are linked together.this can be done only for double linked list. d) to traverse a circular linkedlist ,u begin at any node and follow the list in either direction until u return to the original node.

Ans: c 74.sentinel node at the beginning and /or at the end of the linkedlist is not used to store the data a) true b) false Ans:a 2. GROUP DISCUSSION CSC is mainly looking in your communication and how well you are confident at. These guys are giving chance to everyone in putting their own points. i.e., they are conducting it in orderly fashion. She gave us: Should sex education be included in academic of school children. I was the first to start the GD, so, I went with the topic and No time was given to prepare. Results were immediately announced. In my batch, only one got eliminated. So guys, be confident while putting your points. 3. TECHNICAL HR Initially the HR was started with my project, I explained my project entirely. And he raised few questions from that. I answered for all those. So, you must have thorough knowledge of your project you had done. Besides, he raised questions like difference between array and Linked list then Stack, Queue from Data Structures, DBMS, and Operator Overloading, paging concept from Operating System, few concepts from Mobile Computing and some more. It took some 25-30 minutes for me. Depending on the panel, you will get questions. You brush up all the concepts from Data Structure, DBMS, Operating System and Programming Languages. If you are belonging to ECE, concentrate much on Microprocessor. (This info was given by my friend). You just give your answers if you are sure, otherwise, you say, sorry mam/sir, at present, I could not recollect. Do not try to give related or fake answers. 4. PERSONAL INTERVIEW Once you get into this round, you can stay relaxed. He asked me the general questions like, Tell me about yourself: I said my name, college, and aggregate, achievements (Paper presentation, Organized Womens day, Basket ball). He was really impressed and asked me how did u celebrate womens day? Then I explained that too. Why should I hire you? I said, I think I do have all the qualities to perform a job in a better way. He asked what the qualities are. Then I replied with sincerity, dedication, and commitment towards the work. What do you know about CSC?

I was busy preparing for technical and I could not go through the website, but, before that interview my friend said few points about it. While I saying so, he asked me how do you get this information? (I dont know whether my friend said the same thing before.) But, I do not like to lie, so I said him, I gathered from my friends. Once you get info about recruiting process, you please go through that company website. Then he asked whether you are comfort when you are relocated to different locations and night shifts, I confidently said, Yes sir. At last he asked me to wait till 4 p.m by the next day. My interview started on 17th June nearly at 9.30 a.m and I had completed my HR at 9.30 p.m. I was waiting the whole day on 18th June for results and my name was announced at 9.30 p.m. It was the most wonderful experience. Guys be honest, confident and success will be yours. GOOD LUCK!!!!!!!!! SEE YOU AT CSC!!!!!!! Exam/Interview Date : 17-Jun-2010 No of Rounds : Aptitude Test, Technical Round-1, Technical Round-2, Group Discussion - GD, Client/Manager Interview Location : Chennai Contributor Name : Dhivyaa K S

Company Name : CSC (Computer Sciences Corporation) Type : Fresher, Job Interview, Question Paper. Hi Friends I am Balaji from siddharth Institute of Engineering and Technology. I attended for CSC held at VIT , as we registered for VIT. CSC came on 28-01-2011. The placement started at 10am and they gave brief introduction about their company and benefits provided by them. At 11am they started the written exam. The procedure of CSC is as follows Aptitude: (40 questions 40min)in half hour they will announce the short listed candidates for Technical written Technical: (75 questions 40min) along with that we should write essay (10min) Aptitude paper is damn easy to attempt because they will give basic questions anybody can

attempt but some of the questions will very tough to attmept You people start the paper from 26-40 you can complete it in 10-15min In 1-25 questions max 10 questions can be easy and find the easy questions and attempt it first and then you may have 4-5 minutes left see the questions and make a guess on it you can easily score 30 marks... questions may be 1.3*3 Sudoku (5 questions damn easy) 2.if A(0,y)=y+1 A(x,0)=x A (x,y)=A(0,A(0,y)) A(0,0)=1 they find A(0,3), A(1,2) you will have 5 questions which can attended damn easy 3.One geometry question they will one diagram and distance covered from A to B like that questions will be given and find the distance like questions you will get 2 questions some what tuff to find 4. total 75 students will be der, 25 know typing and 45 know short hand and 10 know neither typing and shorthand. find how many know both typing and shorthand 5. synonym-1, 6. 4 options will be given and will be ask to arrange the sentence. 7. one fill up with suitable word 8. 1 question from probability and 1 question from permutation there will be two Childs for a mother. select randomly and find probability that both are girls....not sure...some what change will be der In permutation they will be 11 men and 3 women.. a committee of should be formed such that there will be 2 men and 2 women.... 9. 1.6(10pow9) divide by 4.8(10pow3) Ans:30(10pow5) These are the questions in remember first 8 questions may be some what tough but can be answered start from the last you can easily answered the questions coming to Technical written As you already come to know that previous questions will be given....it is truth...definitely you will be given the same questions without changing the question number and options Refer the previous questions posted in the Fresher world and check the answer once searching in the goggle. you can attempt more than 65 questions. there ends the exam they will announce the short listed candidates for the next round with in half or one hour Nearly 500 students attended among them 288 cleared the aptitude among 288 members 190 cleared the technical written These numbers will rise your anxiety that how many people had selected finally let me explain it

and the next day we prepared well and went to the VIT campus and the panel members came and announced the batches per batch 10 members will be der mine was 5th batch for each batch, they will give you a topic and should be talked for 1 min just like Jam session The HR people will be cool There will be two persons one men and one women while the jam starts one will listen to your words and the other will correct your essay we are all in the seminar hall and the panel people came and announced the names of 9 we thought that they are promoted to the next round we all shock that she told them that you can leave for day every body stranded and can't understand what is going on finally we came to know that they need only few people in the replacements talk they had given a number that, they will recruit in the 1:30 ratio that mean for 30 people only one will be selected all the people attended the jam section they disqualified entire batches...and they selected few members. Here ends my journey I also disqualified from my college 2 members are short listed for the Technical Interview.I am happy to tell that, he is my batch mate in the project. I came to know that from him....they will check our confidence level.asked him to write the program for prime number while he is writing he asked him to come...just they will test our confidence. then he said you are promoted to the next round take the break and come again and for the interview. If you complete the communication round( JAM) 75% you are selected... Mainly you should be aware of the project if any done. HR round will be the cake walk, just it is for the formality. Now total number of students attend is 500(approx)

Aptitude-288 Written-190 Finally selected - 10

It will be shock to every body Al The Best. Exam/Interview Date : 28-Jan-2011 No of Rounds : Aptitude Test, Technical Round. Contributor Name: E Balaji Welcome to CSC Placement Paper 2011. Here you will find CSC Placement Paper Pattern and Download questions of CSC Placement Paper 2011 with Answers & Solutions. 2011 CSC Placement Paper:1.------- is associated with webservices. a) WSDL b) WML c) web sphere d) web logic 2.any large single block of data stored in a database, such as a picture or sound file, which does not include record fields, and cannot be directly searched by the databases search engine.

a) TABLE b) BLOB c) VIEW d) SCHEME 3.Areserved area of the immediate access memeory used to increase the running speed of the computer program. a) session memory b) bubble memory c) cache memory d) shared memory 4.a small subnet that sit between atrusted internal network and an untruster external network, such as the public internet. a) LAN b) MAN c) WAN d) DMZ 5.technologies that use radio waves to automatically identify people or objects,which is very similar to the barcode identification systems,seen in retail stores everyday. a)BLUETOOTH b) RADAR c)RSA SECURE ID d)RFID 6.main(){ float fl = 10.5; double dbl = 10.5 if(fl ==dbl) printf(UNITED WE STAND); else printf(DIVIDE AND RULE) } what is the output? a)compilation error b)UNITED WE STAND c)DIVIDE AND RULE d)linkage error. 7.main(){ static int ivar = 5; printf(%d,ivar--); if(ivar) main(); } what is the output? a)1 2 3 4 5 b) 5 4 3 2 1 c)5 d)compiler error:main cannot be recursive function. 8.main() { extern int iExtern; iExtern = 20; printf(%d,iExtern); }

what is the output? a)2 b) 20 c)compile error d)linker error 9..#define clrscr() 100 main(){ clrscr(); printf(%d\n\t, clrscr()); } what is the output? a)100 b)10 c)compiler errord)linkage error 10.main() { void vpointer; char cHar = g, *cHarpointer = GOOGLE; int j = 40; vpointer = &cHar; printf(%c,*(char*)vpointer); vpointer = &j; printf(%d,*(int *)vpointer); vpointer = cHarpointer; printf(%s,(char*)vpointer +3); } what is the output? a)g40GLE b)g40GOOGLE c)g0GLE d)g4GOO 11.#define FALSE -1 #define TRUE 1 #define NULL 0 main() { if(NULL) puts(NULL); else if(FALSE) puts(TRUE); else puts(FALSE); } what is the output? a)NULL b)TRUE c)FALSE d)0 12.main() { int i =5,j= 6, z;

printf(%d,i+++j); } what is the output? a)13 b)12 c)11 d)compiler error 13.main() { int i ; i = accumulator(); printf(%d,i); } accumulator(){ _AX =1000; } what is output? a)1 b)10 c)100 d)1000 14.main() { int i =0; while(+(+i--)!= 0) i- = i++; printf(%d,i); } what is the output? a)-1 b)0 c)1 d)will go in an infinite loop 15.main(){ int i =3; for(; i++=0;) printf((%d,i); } what is the output? a)1b)2c)1 2 3d)compiler error:L value required. 16.main(){ int i = 10, j =20; j = i ,j?(i,j)?i :j:j; printf(%d%d,i,j); }what is the output? a)20 b)20 c)10 d)10 17.main(){ extern i; printf(%d\t,i);{ int i =20;

printf(%d\t,i); } } what is output? a) Extern valueof i 20 b)Externvalue of ic)20d)linker Error:unresolved external symbol i 18.int DIMension(int array[]){ return sizeof(array/sizeof(int);} main(){ int arr[10]; printf(Array dimension is %d,DIMension(arr)); } what is output? a)array dimension is 10 b)array dimension is 1 c) array dimension is 2 d)array dimension is 5 19.main(){ void swap(); int x = 45, y = 15; swap(&x,&y); printf(x = %d y=%dx,y); } void swap(int *a, int *b){ *a^=*b, *b^=*a, *a^ = *b; what is the output? a) x = 15, y =45 b)x =15, y =15 c)x =45 ,y =15 d)x =45 y = 45 20.main(){ int i =257; int *iptr =&i; printf(%d%d,*((char*)iptr),*((char *)iptr+1)); } what is output? a)1, 257 b)257 1c)0 0d)1 1 21.main(){ int i =300; char *ptr = &i; *++ptr=2; printf(%d,i); } what is output?

a)556 b)300 c)2 d)302 22.#include main(){ char *str =yahoo; char *ptr =str; char least =127; while(*ptr++) least = (*ptr printf(%d,least); } what is the output? a)0 b)127 c)yahoo d)y 23.Declare an array of M pointers to functions returing pointers to functions returing pointers to characters. a)(*ptr[M]()(char*(*)()); b)(char*(*)())(*ptr[M])() c)(char*(*)(*ptr[M]())(*ptr[M]() d)(char*(*)(char*()))(*ptr[M])(); 24.void main(){ int I =10, j=2; int *ip = &I ,*jp =&j; int k = *ip/*jp; printf(%d,k); } what is the output? a)2 b)5 c)10 d)compile error:unexpected end of file in comment started in line 4 25.main(){ char a[4] =GOOGLE; printf(%s,a); } what is the output? a)2 b) GOOGLE c) compile error: yoo mant initializers d) linkage error. 26.For 1MB memory, the number of address lines required a)12 b)16 c)20 d)32 27.There is a circuit using 3 nand gates with 2 inputes and 1 output,f ind the output. a) AND b) OR c) XOR d) NAND

28.what is done for push operation a) SP is incremented and then the value is stored. b) PC is incremented and then the value is stored. c) PC is decremented and then the value is stored. d) SP is decremented and then the value is stored. 29.Memory allocation of variables declared in a program is -----a) Allocated in RAM b) Allocated in ROM c) Allocated in stack d) Assigned in registers. 30.What action is taken when the processer under execution is interrupted by TRAP in 8085MPU? a) Processor serves the interrupt request after completing the execution of the current instruction. b) processer serves the interrupt request after completing the current task. c) processor serves the interrupt immediately. d) processor serving the interrupt request depent deprnds upon the priority of the current task under execution. 31.purpose of PC (program counter)in a microprocessor is ---a) To store address of TOS(top of stack) b) To store address of next instructions to be executed c) count the number of instructions d) to store the base address of the stack. 32.conditional results after execution of an instruction in a microprocess is stored in a) register b) accumulator c) flag register d) flag register part of PSW (program status word) 33.The OR gate can be converted to the NAND function by adding----gate(s)to the input of the OR gate. a) NOT b) AND c) NOR d) XOR 34.In 8051microcontroller ,------has a dual function. a) port 3 b) port 2 c) port 1 d) port 0 35.An 8085 based microprocessor with 2MHz clock frequency,will execute the following chunk of code with how much delay? MVI B,38H

HAPPY: MVI C, FFH SADDY: DCR C JNZ SADDY DCR B JNC HAPPY a) 102.3 b)114.5 c)100.5 d)120 36.In 8085 MPU what will be the status of the flag after the execution of the following chunk of code. MVI B,FFH MOV A,B CMA HLT a)S = 1, Z = 0, CY = 1 b)S = 0, Z = 1, CY = 0 c) S = 1, Z = 0, CY = 0 d)S = 1, Z = 1 ,CY = 1 37.A positive going pulse which is always generated when 8085 MPU begins the machine cycle. a) RD b) ALE c) WR d) HOLD 38.when a ----- instruction of 8085 MPU is fetched , its second and third bytes are placed in the W and Z registers. a) JMP b) STA c) CALL d) XCHG 39.what is defined as one subdivision of the operation performed in one clock period. a) T- State b) Instruction Cycle c) Machine Cycle d) All of the above 40.At the end of the following code, what is the status of the flags. LXI B, AEC4H MOV A,C ADD B HLT a) S = 1, CY = 0, P = 0 , AC = 1 b) S =0 , CY = 1, P = 0,AC = 1 c) S = 0, CY = 1, P = 0 , AC = 1 d) S = 0, CY = 1, P = 1 , AC = 1

Category SubCategory Location

IT Placement Papers Noida - Delhi/NCR

Company About CSC:-

CSC

CSC was established in 1959. CSC developed smart, technology-enabled solutions to solve our clients' toughest challenges, demonstrating a commitment to excellence and a passion for exceeding expectations. CSC senior management team has an average of 25 years of domestic and international IT experience and a strong history of business, academic and technological accomplishments. CSC (NYSE: CSC) reported trailing 12 months revenue of $16.2 billion for the third quarter ending December 31, 2010. Why CSC - Why should i join CSC?:The Brand CSC:- The legendary CSC story only grows richer with age. Great Work Culture:- CSCs supportive work culture brings out the best in you. Excellent People Practices:- When you join CSC, you become part of a caring family. Dynamic Growth and Learning:- Youll find opportunities to grow and learn all around you at CSC. Embracing Diversity:- CSC has a strong commitment to supporting diversity of all kinds. Social Responsibility:- Our Corporate Social Responsibility Committee undertakes many important community activities. Reputation:- Experience the joy of working for one of the best companies in the industry. Contact Details Address of CSC:-

About 2011 CSC Placement Paper - II

Add to ShortList

Welcome to CSC Placement Paper 2011. Here you will find CSC Placement Paper Pattern and Download questions of CSC Placement Paper 2011 with Answers & Solutions. 2011 CSC Placement Paper:1. In 8051 micro controller what is the HEX number in the accumulator after the execution of the following code. MOV A,#0A5H CLR C

RRC A RRC A RL A RL A SWAP A a)A6 b)6A c)95 d)A5. 2. The Pentium processor requires ------------ volts. a)9 b)12 c)5 d)24. 3. The data bus on the Celeron processor is-------bits wide. a)64 b)32 c)16 d)128. 4. K6 processor a) Hitachi b) toshiba c) zilog d) AMD. 5. What is the control word for 8255 PPI,in BSR mode to set bit PC3. a)0EH b)0FH c)07H d)06H. 6. The repeated execution of a loop of code while waiting for an event to occur is called --------.The cpu is not engaged in any real productive activity during this period,and the process doesnt progress towards completion. a) dead lock b) busy waiting c) trap door d) none. 7. Transparent DBMS is defined as a) A DBMS in which there are no program or user access languages. b) A DBMS which has no cross file capabilities but is user friendly and provides user interface management. c) A DBMS which keeps its physical structure hidden from user d) none. 8. Either all actions are carried out or none are.users should not have to worry about the effect of incomplete transctions.DBMS ensures this by undoing the actions of incomplete transctions.this property is known as a) Aggregation b) atomicity c) association d) data integrity. 9..------ algorithms determines where in available to load a program. common methods are first fit,next fit,best fit.--------- algorithm are used when memory is full , and one process (or part of a process) needs to be swaped out to accommodate a new program.The ------------- algorithm determines which are the partions to be swaped out.

a) placement, placement, replacement b) replacement, placement, placement c) replacement, placement, replacement d) placement, replacement, replacement 10. Trap door is a secret undocumented entry point into a program used to grant access without normal methods of access authentication.A trap is a software interrupt,usually the result of an error condition. a)true b)false. 11. Given a binary search tree,print out the nodes of the tree according t5o post order traversal. 4 /\ 25 /\ 13 a)3,2,1,5,4. b)1,2,3,4,5. c)1,3,2,5,4. d)5,3,1,2,4. 12. which one of the following is the recursive travel technique. a)depth first search b)preorder c)breadth first search d)none. 13. which of the following needs the requirement to be a binary search tree. a) 5 /\ 27 / 1 b) 5 /\ 67 c) 5 /\ 27 /\ 16 d) none.

14. in recursive implementations which of the following is true for saving the state of the steps a)as full state on the stack b) as reversible action on the stack c)both a and b d)none 15. which of the following involves context switch a)previliged instruction b)floating point exception c)system calls d)all e)none 16. piggy backing is a technique for a)acknowledge b)sequence c)flow control d)retransmission 17. a functional dependency XY is ___________dependency if removal of any attribute A from X means that the dependency does not hold any more a)full functional b) multi valued c)single valued d)none 18. a relation schema R is in BCNF if it is in ___________and satisfies an additional constraints that for every functional dependency XY,X must be a candidate key a)1 NF b)2 NF c)3 NF d)5 NF 19. a _________sub query can be easily identified if it contains any references to the parent sub query columns in the _________ clause A) correlated ,WHERE b) nested ,SELECT c) correlated,SELECT d) none

20. hybrid devise that combines the features of both bridge and router is known as a)router b)bridge c)hub d)brouter 21. which of the following is the most crucial phase of SDLC a)testing b)code generation c) analysys and design d)implementation 22. to send a data packet using datagram ,connection will be established a)no connection is required b) connection is not established before data transmission c)before data transmission d)none 23. a software that allows a personal computer to pretend as as computer terminal is a) terminal adapter b)terminal emulation c)modem d)none 24. super key is a) same as primary key b) primary key and attribute c) same as foreign key d) foreign key and attribute 25. In binary search tree which traversal is used for ascending order values a) Inorder b)preorder c)post order d)none 26. You are creating an index on ROLLNO colume in the STUDENT table.which statement will you use? a) CREATE INDEX roll_idx ON student, rollno; b) CREATE INDEX roll_idx FOR student, rollno; c) CREATE INDEX roll_idx ON student( rollno); d) CREATE INDEX roll_idx INDEX ON student (rollno);

27. A________class is a class that represents a data structure that stores a number of data objects a. container b.component c.base d.derived

28. Which one of the following phases belongs to the compiler Back-end. a. Lexical Analysis b.Syntax Analysis c. Optimization d.Intermediate Representation. 29. Every context _sensitive language is context_free a. true b.false 30. Input:A is non-empty list of numbers L X-infinity For each item in the list L,do If the item>x,then Xthe item Return X X represents:a)largest number b)smallest number c)smallest negative number d) none 31. Let A and B be nodes of a heap,such that B is a child of A. the heap must then satisfy the following conditions a)key(A)>=key(B) b)key(A) c)key(A)=key(B) d)none 32. String ,List,Stack,queue are examples of___________ a)primitive data type b)simple data type c)Abstract data type d)none 33. which of the following is not true for LinkedLists? a)The simplest kind of linked list is a single linked list ,which has one link per node .this link points to the next node in the list,or to a null value or emptylist if it is the last node. b)a more sophisticated kind of linked list is a double linkedlist or two way linkedlist .Each node has two links ,one to the previous node and one to the next node. c) in a circleLinkedList ,the first and last nodes are linked together.this can be done only for double linked list. d) to traverse a circular linkedlist ,u begin at any node and follow the list in either direction until

u return to the original node. 34. sentinel node at the beginning and /or at the end of the linkedlist is not used to store the data a) true b) false Logged

Category SubCategory Location Company About CSC:-

IT Placement Papers Noida - Delhi/NCR CSC

CSC was established in 1959. CSC developed smart, technology-enabled solutions to solve our clients' toughest challenges, demonstrating a commitment to excellence and a passion for exceeding expectations. CSC senior management team has an average of 25 years of domestic and international IT experience and a strong history of business, academic and technological accomplishments. CSC (NYSE: CSC) reported trailing 12 months revenue of $16.2 billion for the third quarter ending December 31, 2010. Why CSC - Why should i join CSC?:The Brand CSC:- The legendary CSC story only grows richer with age. Great Work Culture:- CSCs supportive work culture brings out the best in you. Excellent People Practices:- When you join CSC, you become part of a caring family. Dynamic Growth and Learning:- Youll find opportunities to grow and learn all around you at CSC. Embracing Diversity:- CSC has a strong commitment to supporting diversity of all kinds. Social Responsibility:- Our Corporate Social Responsibility Committee undertakes many important community activities. Reputation:- Experience the joy of working for one of the best companies in the industry.

1.C# is a native language of: A.Java B. .Net C.Visual Basic 2.What is IMP in Objective C A.Implementation pointer B.Important Pointer

C.Intended Pointer

3.The width in bits of double primitive type in Java is --. Select the one correct answer. 1. The width of double is platform dependent 2. 64 3. 128 4. 8 5. 4 4.What would happen when the following is compiled and executed. Select the one correct answer. 1. 2. class example { 3. int x; 4. int y; 5. String name; 6. public static void main(String args[]) { 7. example pnt = new example(); 8. System.out.println("pnt is " + pnt.name + 9. " " + pnt.x + " " + pnt.y); 10. } 11. } 12. 1. The program does not compile because x, y and name are not initialized. 2. The program throws a runtime exception as x, y, and name are used before initialization. 3. The program prints pnt is 0 0. 4. The program prints pnt is null 0 0. 5. The program prints pnt is NULL false 5.Which of these lines will compile? Select all correct answers. 1. short s = 20; 2. byte b = 128; 3. char c = 32; 4. double d = 1.4;; 5. float f = 1.4; 6. byte e = 0; 6.What is contained in the directory /proc?: a. System information b. Administrative procedures Documentation on your sytem

c. Boot procedures

d.

8. Transactions per rollback segment is derived from[DBA] a. Db_Block_Buffer b. Processes, c. Shared_Pool_Size, d. None of the above

9. These following parameters are optional in init.ora parameter file DB_BLOCK_SIZE, PROCESSES a True, b False Ans : False 10.What is the purpose of different record methods 1) Record 2) Pass up 3) As Object 4) Ignore. 11.While running DOS on a PC, which command would be used to duplicate the entire diskette:

Anda mungkin juga menyukai