one of the - VIT Placement Cell

advertisement
http://www.indiabix.com/placement-papers/csc/
http://placement.freshersworld.com/placement-papers/company/CSC%20/224
http://www.m4maths.com/placement-puzzles.php?SOURCE=csc
http://www.vyoms.com/placement-papers/companies/details/csc-india-pvt-ltd-1249.asp
Company Profile
WE ARE LOCATED WHERE OUR CLIENTS NEED US
In addition to our headquarters in Falls Church, Virginia, USA, and three other major offices in
Australia, Asia and Europe, our 98,000 professionals serve clients in more than 90 countries.
WHAT WE DO
For more than 50 years, we at CSC have developed smart, technology-enabled solutions to solve our
clients' toughest challenges, demonstrating a commitment to excellence and a passion for exceeding
expectations.
Over the past five decades, technology has radically changed the world we live in. We have remained at
the forefront of our business because we have understood how to use technology change and innovation to
deliver value to our clients.
WE DO AMAZING THINGS
We are often asked, "What is it that you do?" We tell them, humbly and yet truthfully: we do amazing
things. We help solve big challenges. Technically complex, mission-critical challenges. Watch our video,
which brings to life a few of those challenges through four short case studies. Or, read from a list of
hundreds of our client success stories.
FIFTY+ YEARS OF SUCCESS
It started with two men who had a dream. From the moment CSC was born on April 16, 1959, ingenuity has
been a driving force behind our success. Explore our rich history.
COMPANY PROFILE
Read a concise description of our services, financial data, strategic programs and representative client
engagements (PDF, 320 KB). Or download our Company Profile Infographic (PDF).
OUR MANAGEMENT TEAM
Our senior management team has an average of 25 years of domestic and international IT experience and
a strong history of business, academic and technological accomplishments.
FINANCIAL PERFORMANCE
CSC (NYSE: CSC) reported trailing 12 months revenue of $15.9 billion for the third quarter ending March
30, 2012.
Our Mission and Values
CSC'S Mission
The mission of CSC is to be a global leader in providing technology-enabled business solutions and
services.
Our Values are Clear
CLIENT FOCUSED
Our success derives from a deep understanding of our clients, to whom all of CSC is committed to deliver
exceptional service and value.
LEADERSHIP
We lead from the front, displaying our integrity and using facts to support our straight talk. We create an
environment for positive change built on collaboration and trust.
EXECUTION EXCELLENCE
We insist on excellence in all we do for clients and ourselves, striving always for recognition among the
leaders in our industry.
ASPIRATION
We aspire individually and collectively to be more tomorrow than we are today.
RESULTS
We accept individual responsibility for our commitments and expect to be accountable for results.
Diversity Statement
We value the diversity of our employees and the unique perspectives they bring to CSC. Diversity at CSC
not only includes age, race, sex, sexual orientation/gender identity, genetic information, disabilities, and
ethnicity, but also jobs and functional roles within the company, the markets and clients we serve, our
geographic locations, educational background and whether one joined CSC independently or through an
acquisition or outsourcing arrangement. By valuing these differences, we demonstrate our commitment to
treating everyone with fairness and respect.
CSC Company Profile
CSC (Computer Sciences Corporation) is a leading information technology (IT) services company. CSC’s
mission is to be a global leader in providing technology-enabled business solutions and services.The
company is one of the leading outsourcing solutions providers in the world. It has a strong position in
providing IT services to government customers.
CSC also provides business process outsourcing, managing key functions for clients, such as procurement
and supply chain, call centers and customer relationship management, credit services, claims processing
and logistics. I/T and professional services include systems integration, consulting and other professional
services. Systems integration encompasses designing, developing, implementing and integrating complete
information systems. Consulting and professional services includes advising clients on the strategic
acquisition and utilization of I/T and on business strategy, security, modeling, simulation, engineering,
operations, change management and business process reengineering.
With approximately 90,000 employees, CSC provides innovative solutions for customers around the world
by applying leading technologies and CSC’s own advanced capabilities. These include systems design and
integration; IT and business process outsourcing; applications software development; Web and application
hosting; and management consulting. Headquartered in Falls Church, Va., CSC reported revenue of $16.5
billion for the 12 months ended March 28, 2008.
Specialties
Consulting, IT, Systems Integration, Outsourcing
Headquarters Washington D.C. Metro Area
Industry Information Technology and Services
Type Public Company
Status Operating
Company Size 90,000 employees
2008 Revenue $16,500
Founded 1959
Contact
3170 Fairview Park Drive
Falls Church, VA 22042
United States
CSC India
CSC started its operations in India in 1991. With centers in Noida, Indore, Hyderabad, Chennai, Mumbai,
Bangalore and Vadodara, and approximately 19,000 employees, CSC is one of the fastest growing IT
services firms in India. CSC’s strong local presence enables the company to offer high-value technology
solutions and a rich portfolio of services to customers across industry segments, including applications
development and product support, infrastructure and BPO services, to clients worldwide. CSC in India is
consistently recognized in “best employer” award categories and houses the company’s first Office of
Innovation outside the U.S.
For the parent company that has a presence in 92 countries, India is the third largest delivery location in the
world. CSC India serves most of the parent company's clients based in North America and Europe. The
company is present in domains like insurance, banking, healthcare, retail, defense manufacturing, retail
and others. Nearly 33 per cent of the parent company's revenue is derived from the American government,
19 per cent from defense, 17 per cent from financial services and the balance from other segments.
CSC’s mission is to help clients achieve strategic goals and profit from the use of Information Technology.
CSC India offers applications services, product development and support services, infrastructure services,
IT outsourcing and BPO services to clients worldwide. With a winning combination of strong functional
knowledge, in-depth technological expertise, uncompromised process rigour and world class industry
standards and compliance in place, CSC India has consistently built upon its experience to deliver business
results in the global information technology marketplace, thus earning the trust of some of the world’s
biggest organisations.
The company is hiring freshers as well as experienced hands. "Nearly 10-15 per cent of the recruitments
are freshers. Our attrition rate is 14 per cent."
They have centres at Hyderabad, Chennai, Bangalore, Mumbai, Noida, Indore, Vadora etc
Contact
Building #7, Mind Space IT Park,
Survey #64, Part APIIC Software Layout
Madhapur, Hitech City,
Hyderabad (AP) - 500 081
Technical round
1.------- is associated with webservices.
a) WSDL
b) WML
c) web sphere
d) web logic
2.Any large single block of data stored in a database, such as a picture or sound file, which does not
include record fields, and cannot be directly searched by the database’s search engine.
a) TABLE
b) BLOB
c) VIEW
d) SCHEME
3.Areserved area of the immediate access memeory used to increase the running speed of the computer
program.
a) session memory
b) bubble memory
c) cache memory
d) shared memory
4.A small subnet that sit between atrusted internal network and an untruster external network, such as the
public internet.
a) LAN
b) MAN
c) WAN
d) DMZ
5.Technologies that use radio waves to automatically identify people or objects,which is very similar to the
barcode identification systems,seen in retail stores everyday.
a)BLUETOOTH
b) RADAR
c)RSA SECURE ID
d)RFID
6.main(){
float fl = 10.5;
double dbl = 10.5
if(fl ==dbl)
printf(“UNITED WE STAND”);
else
printf(“DIVIDE AND RULE”)
}
what is the output?
a)compilation error b)UNITED WE STAND c)DIVIDE AND RULE d)linkage error.
7.main(){
static int ivar = 5;
printf(“%d”,ivar--);
if(ivar)
main();
}
what is the output?
a)1 2 3 4 5
b) 5 4 3 2 1
c)5
d)compiler error:main cannot be recursive function.
8.main()
{
extern int iExtern;
iExtern = 20;
printf(“%d”,iExtern);
}
what is the output?
a)2
b) 20
c)compile error
d)linker error
9..#define clrscr() 100
main(){
clrscr();
printf(“%d\n\t”, clrscr());
}
what is the output?
a)100
b)10
c)compiler error
d)linkage error
10.main()
{
void vpointer;
char cHar = ‘g’, *cHarpointer = “GOOGLE”;
int j = 40;
vpointer = &cHar;
printf(“%c”,*(char*)vpointer);
vpointer = &j;
printf(“%d”,*(int *)vpointer);
vpointer = cHarpointer;
printf(“%s”,(char*)vpointer +3);
}
what is the output?
a)g40GLE b)g40GOOGLE c)g0GLE d)g4GOO
11.#define FALSE -1
#define TRUE 1
#define NULL 0
main() {
if(NULL)
puts(“NULL”);
else if(FALSE)
puts(“TRUE”);
else
puts(“FALSE”);
}
what is the output?
a)NULL
b)TRUE
c)FALSE
d)0
12.main() {
int i =5,j= 6, z;
printf(“%d”,i+++j);
}
what is the output?
a)13 b)12 c)11 d)compiler error
13.main() {
int i ;
i = accumulator();
printf(“%d”,i);
}
accumulator(){
_AX =1000;
}
what is output?
a)1
b)10
c)100
d)1000
14.main() {
int i =0;
while(+(+i--)!= 0)
i- = i++;
printf(“%d”,i);
}
what is the output?
a)-1 b)0 c)1 d)will go in an infinite loop
15.main(){
int i =3;
for(; i++=0;)
printf((“%d”,i);
}
what is the output?
a)1
b)2
c)1 2 3
d)compiler error:L value required.
16.main(){
int i = 10, j =20;
j = i ,j?(i,j)?i :j:j;
printf(“%d%d”,i,j);
}what is the output?
a)20
b)20
c)10
d)10
17.main(){
extern i;
printf(“%d\t”,i);{
int i =20;
printf(“%d\t”,i);
}
}
what is output?
a) “Extern valueof i “ 20
b)Externvalue of i”
c)20d)linker Error:unresolved external symbol i
18.int DIMension(int array[]){
return sizeof(array/sizeof(int);}
main(){
int arr[10];
printf(“Array dimension is %d”,DIMension(arr));
}
what is output?
a)array dimension is 10
b)array dimension is 1
c) array dimension is 2
d)array dimension is 5
19.main(){
void swap();
int x = 45, y = 15;
swap(&x,&y);
printf(“x = %d y=%d”x,y);
}
void swap(int *a, int *b){
*a^=*b, *b^=*a, *a^ = *b;
what is the output?
a) x = 15, y =45
b)x =15, y =15
c)x =45 ,y =15
d)x =45 y = 45
20.main(){
int i =257;
int *iptr =&i;
printf(“%d%d”,*((char*)iptr),*((char *)iptr+1));
}
what is output?
a)1, 257
b)257 1
c)0 0
d)1 1
21.main(){
int i =300;
char *ptr = &i;
*++ptr=2;
printf(“%d”,i);
}
what is output?
a)556
b)300
c)2
d)302
22.#include
main(){
char *str =”yahoo”;
char *ptr =str;
char least =127;
while(*ptr++)
least = (*ptr
printf(“%d”,least);
}
what is the output?
a)0
b)127
c)yahoo
d)y
23.Declare an array of M pointers to functions returing pointers to functions returing pointers to characters.
a)(*ptr[M]()(char*(*)());
b)(char*(*)())(*ptr[M])()
c)(char*(*)(*ptr[M]())(*ptr[M]()
d)(char*(*)(char*()))(*ptr[M])();
24.void main(){
int I =10, j=2;
int *ip = &I ,*jp =&j;
int k = *ip/*jp;
printf(“%d”,k);
}
what is the output?
a)2
b)5
c)10
d)compile error:unexpected end of file in comment started in line 4
25.main(){
char a[4] =”GOOGLE”;
printf(“%s”,a);
}
what is the output?
a)2
b) GOOGLE
c) compile error: yoo mant initializers
d) linkage error.
26.For 1MB memory, the number of address lines required
a)12
b)16
c)20
d)32
27.There is a circuit using 3 nand gates with 2 inputes and 1 output,f ind the output.
a) AND
b) OR
c) XOR
d) NAND
28.what is done for push operation
a) SP is incremented and then the value is stored.
b) PC is incremented and then the value is stored.
c) PC is decremented and then the value is stored.
d) SP is decremented and then the value is stored.
29.Memory allocation of variables declared in a program is -----a) Allocated in RAM
b) Allocated in ROM
c) Allocated in stack
d) Assigned in registers.
30.What action is taken when the processer under execution is interrupted by TRAP in 8085MPU?
a) Processor serves the interrupt request after completing the execution of the current instruction.
b) processer serves the interrupt request after completing the current task.
c) processor serves the interrupt immediately.
d) processor serving the interrupt request depent deprnds upon the priority of the current task under
execution.
31.purpose of PC (program counter)in a microprocessor is ---a) To store address of TOS(top of stack)
b) To store address of next instructions to be executed
c) count the number of instructions
d) to store the base address of the stack.
32.conditional results after execution of an instruction in a microprocess is stored in
a) register
b) accumulator
c) flag register
d) flag register part of PSW (program status word)
33.The OR gate can be converted to the NAND function by adding----gate(s)to the input of the OR gate.
a) NOT
b) AND
c) NOR
d) XOR
34.In 8051microcontroller ,------has a dual function.
a) port 3
b) port 2
c) port 1
d) port 0
35.An 8085 based microprocessor with 2MHz clock frequency,will execute the following chunk of code with
how much delay?
MVI B,38H
HAPPY: MVI C, FFH
SADDY: DCR C
JNZ SADDY
DCR B
JNC HAPPY
a) 102.3
b)114.5
c)100.5
d)120
36.In 8085 MPU what will be the status of the flag after the execution of the following chunk of code.
MVI B,FFH
MOV A,B
CMA
HLT
a)S = 1, Z = 0, CY = 1
b)S = 0, Z = 1, CY = 0
c) S = 1, Z = 0, CY = 0
d)S = 1, Z = 1 ,CY = 1
37.A positive going pulse which is always generated when 8085 MPU begins the machine cycle.
a) RD
b) ALE
c) WR
d) HOLD
38.when a ----- instruction of 8085 MPU is fetched , its second and third bytes are placed in the W and Z
registers.
a) JMP
b) STA
c) CALL
d) XCHG
39.what is defined as one subdivision of the operation performed in one clock period.
a) T- State
b) Instruction Cycle
c) Machine Cycle
d) All of the above
40.At the end of the following code, what is the status of the flags.
LXI B, AEC4H
MOV A,C
ADD B
HLT
a) S = 1, CY = 0, P = 0 , AC = 1
b) S =0 , CY = 1, P = 0,AC = 1
c) S = 0, CY = 1, P = 0 , AC = 1
d) S = 0, CY = 1, P = 1 , AC = 1
41. In 8051 micro controller what is the HEX number in the accumulator after the execution of the following
code.
MOV A,#0A5H
CLR C
RRC A
RRC A
RL A
RL A
SWAP A
a)A6
b)6A
c)95
d)A5.
42. The Pentium processor requires ------------ volts.
a)9
b)12
c)5
d)24.
43. The data bus on the Celeron processor is-------bits wide.
a)64
b)32
c)16
d)128.
44. K6 processor
a) Hitachi
b) toshiba
c) zilog
d) AMD.
45. What is the control word for 8255 PPI,in BSR mode to set bit PC3.
a)0EH
b)0FH
c)07H
d)06H.
46. The repeated execution of a loop of code while waiting for an event to occur is called ---------.The cpu is
not engaged in any real productive activity during this period,and the process doesn’t progress towards
completion.
a) dead lock
b) busy waiting
c) trap door
d) none.
47. Transparent DBMS is defined as
a) A DBMS in which there are no program or user access languages.
b) A DBMS which has no cross file capabilities but is user friendly and provides user interface
management.
c) A DBMS which keeps its physical structure hidden from user
d) none.
48. Either all actions are carried out or none are.users should not have to worry about the effect of
incomplete transctions.DBMS ensures this by undoing the actions of incomplete transctions.this property is
known as
a) Aggregation
b) atomicity
c) association
d) data integrity.
49..------ algorithms determines where in available to load a program. common methods are first fit,next
fit,best fit.--------- algorithm are used when memory is full , and one process (or part of a process) needs to
be swaped out to accommodate a new program.The ------------- algorithm determines which are the partions
to be swaped out.
a) placement, placement, replacement
b) replacement, placement, placement
c) replacement, placement, replacement
d) placement, replacement, replacement
50. Trap door is a secret undocumented entry point into a program used to grant access without normal
methods of access authentication.A trap is a software interrupt,usually the result of an error condition.
a)true
b)false.
51. Given a binary search tree,print out the nodes of the tree according t5o post order traversal.
4
/\
25
/\
13
a)3,2,1,5,4.
b)1,2,3,4,5.
c)1,3,2,5,4.
d)5,3,1,2,4.
52. Which one of the following is the recursive travel technique.
a)depth first search
b)preorder
c)breadth first search
d)none.
53. which of the following needs the requirement to be a binary search tree.
a) 5
/\
27
/
1
b) 5
/\
67
c) 5
/\
27
/\
16
d) none.
54. In recursive implementations which of the following is true for saving the state of the steps
a)as full state on the stack
b) as reversible action on the stack
c)both a and b
d)none
55. which of the following involves context switch
a)previliged instruction
b)floating point exception
c)system calls
d)all
e)none
56. piggy backing is a technique for
a)acknowledge
b)sequence
c)flow control
d)retransmission
57. a functional dependency XY is ___________dependency if removal of any attribute A from X means
that the dependency does not hold any more
a)full functional
b) multi valued
c)single valued
d)none
58. a relation schema R is in BCNF if it is in ___________and satisfies an additional constraints that for
every functional dependency XY,X must be a candidate key
a)1 NF
b)2 NF
c)3 NF
d)5 NF
59. a _________sub query can be easily identified if it contains any references to the parent sub query
columns in the _________ clause
A) correlated ,WHERE
b) nested ,SELECT
c) correlated,SELECT
d) none
60. hybrid devise that combines the features of both bridge and router is known as
a)router
b)bridge
c)hub
d)brouter
61. Which of the following is the most crucial phase of SDLC
a)testing
b)code generation
c) analysys and design
d)implementation
62. To send a data packet using datagram ,connection will be established
a)no connection is required
b) connection is not established before data transmission
c)before data transmission
d)none
63. A software that allows a personal computer to pretend as as computer terminal is
a) terminal adapter
b)terminal emulation
c)modem
d)none
64. super key is
a) same as primary key
b) primary key and attribute
c) same as foreign key
d) foreign key and attribute
65. In binary search tree which traversal is used for ascending order values
a) Inorder
b)preorder
c)post order
d)none
66. You are creating an index on ROLLNO colume in the STUDENT table.which statement will you use?
a) CREATE INDEX roll_idx ON student, rollno;
b) CREATE INDEX roll_idx FOR student, rollno;
c) CREATE INDEX roll_idx ON student( rollno);
d) CREATE INDEX roll_idx INDEX ON student (rollno);
67. A________class is a class that represents a data structure that stores a number of data objects
a. container
b.component
c.base
d.derived
68. Which one of the following phases belongs to the compiler Back-end.
a. Lexical Analysis
b.Syntax Analysis
c. Optimization
d.Intermediate Representation.
69. Every context _sensitive language is context_free
a. true b.false
70. Input:A is non-empty list of numbers L
Xß-infinity
For each item in the list L,do
If the item>x,then
Xßthe item
Return X
X represents:a)largest number
b)smallest number
c)smallest negative number
d) none
71. Let A and B be nodes of a heap,such that B is a child of A. the heap must then satisfy the following
conditions
a)key(A)>=key(B)
b)key(A)
c)key(A)=key(B)
d)none
72. String ,List,Stack,queue are examples of___________
a)primitive data type
b)simple data type
c)Abstract data type
d)none
73. which of the following is not true for LinkedLists?
a)The simplest kind of linked list is a single linked list ,which has one link per node .this link points to the
next node in the list,or to a null value or emptylist if it is the last node.
b)a more sophisticated kind of linked list is a double linkedlist or two way linkedlist .Each node has two links
,one to the previous node and one to the next node.
c) in a circleLinkedList ,the first and last nodes are linked together.this can be done only for double linked
list.
d) to traverse a circular linkedlist ,u begin at any node and follow the list in either direction until u return to
the original node.
74. sentinel node at the beginning and /or at the end of the linkedlist is not used to store the data
a) true
b) false
Logged
1.
Most important advantage of an IC is its
A.
Easy replacement in case of circuit failure
B.
Extremely high reliability
C.
Reduced cost
D.
Low power consumption
E.
None of the above
Ans-B
2.
Which programming language is much in vogue among users of microcomputers
A.
ALGOL
B.
APL
C.
LOGO
D.
FORTH
E.
None of the above
Ans-D
3.
Multiplication of 1112 by 1012 is
A.
1100112
B.
1000112
C.
1111002
D.
0001012
E.
None of the above
Ans-B
4.
A computer-controlled device for training exercises that duplicates the work environment is a:
A.
simulator
B.
duplicator
C.
trainer
D.
COM device
E.
None of the above
Ans-A
5.
The latest PC keyboards use a circuit that senses the movement by the change in its capacitance. What are
these keyboards called?
A.
Capacitance keyboards
B.
Mechanical keyboards
C.
Qwerty keyboards
D.
Dvorak keyboards
E.
None of the above
Ans-A
6.
Find the output of the program
char *foo()
{
char result[100]);
strcpy(result,"anything is good");
return(result);
}
void main()
{
char *j;
j=foo()
printf("%s",j);
}
7.
Find the output of the program
void main()
{
char *s[]={ "dharma","hewlett-packard","siemens","ibm"};
char **p;
p=s;
printf("%s",++*p);
printf("%s",*p++);
printf("%s",++*p);
}
8.
write 7*a in terms of +,-,<<
9.
What is Creon and what is the difference between 'at' command.
10.
Find the output of the program
main(){
char *s1 = "hello",*s2 ="abce";
strcpy(s1,"");
s2[0] = s1[0];
printf("%d%d",strlen(s1),strlen(s2));
}
11.
What was originally called the "imitation game" by its creator?
A.
The Turing Test
B.
LISP
C.
The Logic Theorist
D.
Cybernetics
E.
None of the above
Ans-A
12.
Find the output of the program
void main()
{
unsigned i=1; /* unsigned char k= -1 => k=255; */
signed j=-1; /* char k= -1 => k=65535 */
/* unsigned or signed int k= -1 =>k=65535 */
if(i<j)
printf("less");
else
if(i>j)
printf("greater");
else
if(i==j)
printf("equal");
}
Ans-less
13.
A number that is used to control the form of another number is known as
A.
Map
B.
Mask
C.
Mamtossa
D.
Marker
E.
None of the above
Ans-B
14.
ASCII stands for
A.
American standard code for information interchange
B.
All purpose scientific code for information interchange
C.
American security code for information interchange
D.
American Scientific code for information interchange
E.
None of the above
Ans-A
15.
The list of coded instructions is called
A.
Computer program
B.
Algorithm
C.
Flowchart
D.
Utility programs
E.
None of the above
Ans-A
16.
In LISP, the atom that stands for "true" is
A.
t
B.
ml
C.
y
D.
time
E.
None of the above
Ans-A
17.
Which two files are used during operation of the DBMS?
A.
query language and utilities
B.
data manipulation language and query language
C.
data dictionary and transaction log
D.
data dictionary and query language
E.
None of the above
Ans_C
18.
A network schema
A.
restricts the structure to a one-to-many relationship
B.
permits many-to-many relation¬ships
C.
stores data in tables
D.
All of the above
E.
None of the above
Ans_B
19.
self-relocating program is one which
A.
cannot be made to execute in any area of storage other than the one
designated for it at the time of its coding or translation
B.
consists of a program and relevant information for its relocation
C.
can itself perform the relocation of its address-sensitive portions
D.
All of the above
Ans-C
20.
Write a program to exchange the values of two variables using pointers.
21.
Write program to open one file input some numbers and find smallest, largest, avg. and store them in
another file
22.
Write a program to reverse a string co-ordinate geometry.
23.
Find the output of the program
#include
main()
{
int x=20, t;
&t=x;
x=50;
cout<<x<<" "<<t;
}
24.
What hardware architectures are not supported by Ret Hat?
A.
SPARC
B.
IBM-compatible
C.
Alpha
D.
Macintosh
E.
None of the above
Ans-D
25.
What command do you use to create Linux file systems?
A.
fdisk
B.
mkfs
C.
fsck
D.
mount
E.
None of the above
Ans-D
26.
Find the output of the program
#include<stdio.h>
main()
{
char *p1;
char *p2;
p1=(char *) malloc(25);
p2=(char *) malloc(25);
strcpy(p1,"Ramco");
strcpy(p2,"Systems");
strcat(p1,p2);
printf("%s",p1);
}
27.
What command is used to count just the number of lines contained in a file?(Linux)
A.
wc - r
B.
wc - w
C.
wc - c
D.
wc - l
E.
None of the above
Ans-D
28.
The probability that a single bit will be in error on a typical public telephone line using 4800 bps modem is 10
to the power -3. If no error detection mechanism is used, the residual error rate for a communication line using 9-bit
frames is approximately equal to
A. 0.003
C. 0.991
B. 0.009
D. 0.999
Ans-B
29.
which of the following condition is used to transmit two packets over a medium at the same time?
A.
Contention
B.
Collision
C.
Synchronous
D.
Asynchronous
E.
None of the above
Ans-B
Questions 30 -34 are reference to the following pseudo code
{
input m,n,z
TEST:if ((m+n)/3>5)z=z+1 else z =z-1
printf m,n,z
{
(m-m+1;n=n-3)
if (m+n+2)>14 then goto test
print m,n,z
end
}
30.
How many times the TEST exacted if the input is 1,18,2?
Ans- four times
31.
What are the values taken by Z when input being 8,24,1?
a) only 5
b) only 6
c) neither 5 or 6
d) both 5 and 6
ans-D.
32.
what is the final output if the input is 1,18,2? (m,n,z)
ans- 5,6,2
33.
what is the final output of the if the input is 2,14,12 (m,n,z)
a)1,8,4
b)1,4,8
c)4,8,1 d
)8,4,2
ans=C.
34.
How many times is TEST execute ed if the input is 2,14,1?
ans) twice
35.
What will be thethe remainder when 9FA (hexa) is divided by 8 is added to the 12(to base ten) to get x.then
x has the binary operation
36.
Find the odd man out
a) Intel
b)motorola
c)nec
ans =nec
37.
Find the output of the program
main()
{
int i=3
printf ("%d %d %d ",++i,i-,i+=5);
}
38.
Find the output of the program
main()
{
int times =5;
int i=3;
int j=4;
int k=34;
i=j+k;
while(times --)
{
i=times
j=times
k=times
}
d)Ibm
printf("%d %d %d " ,i,j,k)
}
39.
Find the output
main()
{
int number =25;
char name ='A'
printf("The addition of the name and the number is %o "name +_number)
}
Ans-Compiler error
40.
computer viruses can spread from one system to anther by means of
a)
Infected disks
b
)links to a network
c)
downloaded program from a bulletin board
d
)all of the program
ans)D
41.
what do you mean by exception handling?
42.
What are "pure virtual" functions?
43.
What is the difference between member functions and static member functions?
44.
What is the4 difference between delete[] and delete?
45.
Difference between function overloading and function overriding.
46.
How to invoke a C function using a C++ program?
47.
Convert 0.9375 to binary
a) 0.0111
b) 0.1011
c) 0.1111
d) none
Ans. (c)
48.
In C, "X ? Y : Z " is equal to
a) if (X==0) Y ;else Z
b) if (X!=0) Y ;else Z
c) if (X==0) Y ; Z
Ans. (b)
49.
The following function gives some error. What changes have to be made
void ( int a,int b)
{
int t; t=a; a=b; b=t;
}
a) define void as int and write return t
b) change everywhere a to *a and b to *b
50.
Which of the following is incorrect
a) if a and b are defined as int arrays then (a==b) can never be true
b) parameters are passed to functions only by values
c) defining functions in nested loops
51.
#include<stdio.h>
void swap(int*,int*);
main()
{
int arr[8]={36,8,97,0,161,164,3,9}
for (int i=0; i<7; i++)
{
for (int j=i+1; j<8;j++)
if(arr[i]<arr[j]) swap(&arr[i],&arr[j]);
}
}
void swap(int*x,int*y)
{
int temp; static int cnt=0;
temp= *x;
*x=*y;
*y=temp;
cnt++;
}
What is cnt equal to
52.
int main()
{
FILE *fp;
fp=fopen("test.dat","w");
fprintf(fp,'hello\n");
fclose(fp);
fp=fopen ("test.dat","w");
fprintf (fp, "world");
fclose(fp);
return 0;
}
If text.dat file is already present after compiling and execution how many bytes does the file occupy ?
a) 0 bytes
b) 5 bytes
c) 11 bytes
d) data is insufficient
53.
Find the output of the program
f1(int*x,intflag)
int *y;
*y=*x+3;
switch(flag)
{
case 0:
*x=*y+1;
break;
case 1:
*x=*y;
break;
case 2:
*x=*y-1;
break;
}
return(*y)
main()
{
*x=5;
i=f1(x,0); j=f1(x,1);
printf("%d %d %d ",i,j,*x);
}
54.
What does the following program print?
#include <stio.h>
int sum,count;
void main(void)
{< BR> for(count=5;sum+=--count;)
printf("%d",sum);
}
55.
What is the output of the following program?
#include <stdio.h>
void main(void)
{
int i;< BR> for(i=2;i<=7;i++)
printf("%5d",fno());
}
fno()
{
staticintf1=1,f2=1,f3;
return(f3=f1+f2,f1=f2,f2=f3);
}
56.
What is the output of the following program?
#include <stdio.h>
#include <string.h>
int foo(char *);
void main (void)
{
char arr[100] = {"Welcome to CSC"};
foo (arr);
}
foo (char *x)
{
printf ("%d\t",strlen (x));
printf ("%d\t",sizeof(x));
return0;
}
57.
What is the output of the following program?
#include <stdio.h>
#define sum (a,b,c) a+b+c
#define avg (a,b,c) sum(a,b,c)/3
#define geq (a,b,c) avg(a,b,c) >= 60
#define lee (a,b,c) avg(a,b,c) <= 60
#define des (a,b,c,d) (d==1?geq(a,b,c):lee(a,b,c))
void main (void)
{
int num = 70;
char ch = '0';
float f = 2.0;
if des(num,ch,f,0) puts ("lee..");
else puts("geq...");
}
58.
What does the following program print?
#include <stdio.h>
char *rev(int val);
void main(void)
{
extern char dec[];
printf ("%c", *rev);
}
char *rev (int val)
{
char dec[]="abcde";
return dec;
}
59.
What does the following program print?
#include<stdio.h>
void main(void)
{
enum sub
{
chemistry, maths, physics
};
struct result
{
char name[30];
enum sub sc;
};
struct result my_res;
strcpy (my_res.name,"Patrick");
my_res.sc=physics;
printf("name: %s\n",my_res.name);
printf("pass in subject: %d\n",my_res.sc);
}
60.
What is the output of the following program?
#include <stdio.h>
void swap (int x, int y, int t)
{
t = x;
x = y;
y = t;
printf ("x inside swap: %d\t y inside swap : %d\n",x,y);
}
void main(void)
{
int x;
int y;
int t;
x = 99;
y = 100;
swap (x,y,t);
printf ("x inside main:%d\t y inside main: %d",x,y);
}
a. x inside swap : 100 y inside swap : 99 x inside main : 100 y inside main : 99
b. x inside swap : 100 y inside swap : 99 x inside main : 99 y inside main : 100
c. x inside swap : 99 y inside swap : 100 x inside main : 99 y inside main : 100
d. x inside swap : 99 y inside swap : 100 x inside main : 100 y inside main : 99
e. Not sure
61.
What does the following program print?
#include <stdio.h>
struct my_struct
{
int p:1;
int q:1;
int r:6;
int s:2;
};
struct my_struct bigstruct;
struct my_struct1
{
char m:1;
};
struct my_struct1 small struct;
void main (void)
{
printf ("%d %d\n",sizeof (bigstruct),sizeof (smallstruct));
}
62.
What is the output of the following program?
#include <stdio.h>
void main (void)
{
short x = 0x3333;
short y = 0x4321;
long z = x;
z = z << 16;
z = z | y;
printf("%1x\t",z);
z = y;
z = z >> 16;
z = z | x;
printf("%1x\t",z);
z = x;
y = x && y;
z = y;
printf("%1x\t",z);
}
63.
What is the output of the following program?
#include <stdio.h>
void main (void)
{
char *p = "Bangalore";
#if 0
printf ("%s", p);
#endif
}
64.
What is the return type of calloc function?
a. int *
b. void *
c. no return type: return type is void
d. int e. Not sure
65.
If x is declared as an integer, y is declared as float, consider the following expression:
y = *(float *)&x;
Which one of the following statments is true?
a. the program containing the expression produces compilation errors;
b. the program containing the expression produces runtime errors;
c. the program containing the expression compiles and runs without any errors;
d. none of the above e. Not sure
66.
Which of the following refers to the associative memory?
A.
the address of the data is generated by the CPU
B.
the address of the data is supplied by the users
C.
there is no need for an address i.e. the data is used as an address
D.
the data are accessed sequentially
E.
None of the above
Ans-C
67.
is
To avoid the race condition, the number of processes that may be simultaneously inside their critical section
A.
8
B.
1
C.
16
D.
0
E.
None of the above
Ans-B
68.
Which one of the following kinds of materials has the lowest permeability?
A.
A diamagnetic material
B.
A paramagnetic material
C.
A feiTomagnetic material
D.
All of the above
E.
None of the above
Ans-A
69.
he total impedance of a parallel RLC circuit:
A.
always increases as the applied frequency increases
B.
is equal to the sum of the values of resistance, inductive reactance and
capacitive reactance
C.
always decreases as the applied frequency increases
D.
is maximum at the resonant frequency
E.
None of the above
Ans-D
70.
he rise time of a pulse waveform is the time required for the voltage to rise:
A.
from zero to its rms value
B.
from zero to its peak value
C.
from 10% of the peak value to 70.7% of the peak value
D.
from 10% of the peak value to 90% of the peak value
E.
None of the above
Ans-D
71.
Which of the following is(are) true of the EDP auditors?
A.
they should have computer expertise
B.
they will be replaced by traditional auditors in the near future
C.
two of the above
D.
currently, there is a very high demand for them, particularly from firms that use
personal computers
E.
None of the above
Ans-A
72.
A lockbox service is used for
A.
depositing cash when bank is closed
B.
paying bank customer bills automatically
C.
storing papers in a bank vault
D.
depositing payments to bank customers
E.
None of the above
Ans-D
73.
Which of the following symbol modes are used to input of graphics to General CAD system?
A.
Live and Rectangle mode
B.
Arc and Circle mode
C.
Dimension and Alphanumeric mode
D.
All of the above
E.
None of the above
Ans-D
74.
What will be the output of the program?
public class Test
{
public static int y;
public static void foo(int x)
{
System.out.print("foo ");
y = x;
}
public static int bar(int z)
{
System.out.print("bar ");
return y = z;
}
public static void main(String [] args )
{
int t = 0;
assert t > 0 : bar(7);
assert t > 1 : foo(8); /* Line 18 */
System.out.println("done ");
}
}
Ans-foo done
75.
Which of the following would compile without error?
A.
int a = Math.abs(-5);
B.
int b = Math.abs(5.0);
C.
int c = Math.abs(5.5F);
D.
int d = Math.abs(5L);
Ans-A
Aptitude
1.
One year ago, the ratio of Roonie’s and Ronaldo’s age was 6: 7 respectively. Four years hence, this ratio
would become 7: 8. How old is Ronaldo ?
Ans-36 years
2.
In what ratio must rice at Rs. 9.30 per kg be mixed with rice at Rs. 10.80 per kg so that the mixture be
worth Rs. 10 per kg ?
Ans-8:7
3.
The milk and water in two vessels A and B are in the ratio 4 : 3 and 2: 3 respectively. In what ratio, the
liquids in both the vessels be mixed to obtain a new mixture in vessel C containing half milk and half water?
Ans-7:5
4.
One side of a rectangular field is 15 m and one of its diagonals is 17 m. Find the area of the field.
Ans-120m2
5.
A rectangular grassy plot 110 m. by 65 m has a gravel path 2.5 m wide all round it on the inside. Find the
cost of gravelling the path at 80 paise per sq. metre
Ans- Rs 680
6.
There are two sections A and B of a class consisting of 36 and 44 students respectively. If the average
weight of section A is 40kg and that of section B is 35kg, find the average weight of the whole class?
Ans-37.25 kg
7.
Of the three numbers, second is twice the first and is also thrice the third.If the average of the three
numbers is 44.Find the largest number.
Ans-72
8.
Find the odd man out.
3, 5, 11, 14, 17, 21
Ans-14
9.
Find out the wrong number in the given sequence of numbers.
1, 8, 27, 64, 124, 216, 343
Ans-124
10.
Insert the missing number.
8, 7, 11, 12, 14, 17, 17, 22, (....)
Ans-B
11.
Two cards are drawn at random from a pack of 52 cards.what is the probability that either both are black or
both are queen?
Ans-55/221
12.
A bag contains 6 white and 4 black balls .2 balls are drawn at random. find the probability that they are of
same colour.
Ans-7/15
13.
. In a km race, A beats B by 28 metres or 7 seconds. Find A's time over the course.
Ans-4 min 3 sec
14.
A, Band C are three contestants in a km race. If A can give B a start of 40 m and A can give C a start of
64m how many metre's start can B give C ?
15.
If a : b = 5 : 9 and b : c = 4: 7, find a : b : c.
Ans-20:36:63
16.
A bag contains 50 p, 25 P and 10 p coins in the ratio 5: 9: 4, amounting to Rs. 206. Find the number of coins
of each type
Ans- Number of 50 p coins = 360;
Number of 10 p coins = 160
17.
What was the day of the week on 17th June, 1998?
A.
Monday
B.
Tuesday
C.
Wednesday
D.
Thursday
Ans-C
18.
The calendar for the year 2007 will be the same for the year:
A.
2014
B.
2016
C.
2017
D.
2018
Ans-D
19.
Find the angle between the hour hand and the minute hand of a clock when 3.25.
20.
At what time between 4 and 5 o'clock will the hands of a clock be at right angle?
Ans-40/11 min. past 4.
21.
Find at what time between 8 and 9 o'clock will the hands of a clock being the same straight line but not
together
Ans-120/11 min
22.
Find compound interest on Rs. 7500 at 4% per annum for 2 years, compounded annually.
Ans-RS612
23.
Find the compound interest on Rs. 10,000 in 2 years at 4% per annum, the interest being compounded halfyearly.
Ans-Rs 824.32
24.
In what time will Rs. 1000 become Rs. 1331 at 10% per annum compounded annually?
Ans-3 years
25.
The difference between the compound interest and simple interest on a certain sum at 10% per annum for 2
years is Rs. 631. Find the sum.
Ans- Rs631,00
26.
The sum of a rational number and its reciprocal is 13/6. Find the number
Ans-2/3 ot 3/2
27.
If the sum of two numbers is 42 and their product is 437, then find the absolute difference between the
numbers
Ans-4
28.
The average of four consecutive even numbers is 27. Find the largest of these numbers.
Ans-30
29.
Of two numbers, 4 times the smaller one is less then 3 times the 1arger one by 5. If the sum of the
numbers is larger than 6 times their difference by 6, find the two numbers.
Ans-59 & 43
30.
If three numbers are added in pairs, the sums equal 10, 19 and 21. Find the numbers
Ans-6, 4 & 15
31.
Simplify :
(i) 8888 + 888 + 88 + 8
(ii) 11992 - 7823 - 456
32.
What could be the maximum value of Q in the following equation?
5P9 + 3R7 + 2Q8 = 1114
Ans-9
33.
An electric pump can fill a tank in 3 hours. Because of a leak in ,the tank it took 3(1/2) hours to fill the tank.
If the tank is full, how much time will the leak take to empty it
Ans-21 hrs
34.
Two pipes A and B can fill a tank in 36 min. and 45 min. respectively. A water pipe C can empty the tank in
30 min. First A and B are opened. after 7 min,C is also opened. In how much time, the tank is full?
Ans-39 min
35.
Simplify :(log 75/16-2 log 5/9+log 32/243)
36.
Find the value of x which satisfies the relation
Log10 3+log10 (4x+1)=log10 (x+1)+1
Ans-7/2
37.
If log10 2=0.30103,find the value of log10 50
Ans-1.69897
38.
Peter can cover a certain distance in 1 hr. 24 min. by covering two-third of the distance at 4 kmph and the
rest at 5 kmph. Find the total distance.
Ans-6 km
39.
Arrange the fractions 5/8, 7/12, 13/16, 16/29 and 3/4 in ascending order of magnitude.
Ans-16/29 < 7/12 < 5/8 < 3/4 < 13/16
40.
Complete the sudoku
Point out the error in the following program
main()
{
const char *fun();
*fun()='A';
}
const char *fun()
{
return "Hello";
}
Ans. fun() returns to a "const char" pointer which cannot be modified
2. What would be the output of the following program?
main()
{
const int x=5;
int *ptrx;
ptrx=&x;
*ptrx=10;
printf("%d",x);
}
a) 5 b) 10 c) Error d) Garbage value
3. A switch statement cannot include
a) constants as arguments b) constant expression as arguments
c) string as an argument d) None of the above
4. How long the following program will run?
main()
{
printf("\nSonata Software");
main();
}
a) infinite loop b) until the stack overflows
c) All of the above d) None of the above
5. On combining the following statements, you will get char*p; p=malloc(100);
a) char *p= malloc(100) b) p= (char*)malloc(100)
c) All of the above d) None of the above
6.Point out the error in the following program
main()
{
int a=10;
void f();
a=f();
printf("\n%d",a);
}
void f()
{
printf("\nHi");
}
Ans. The program is trying to collect the value of a "void" function into an integer variable.
7. In the following program how would you print 50 using p?
main()
{
int a[]={10, 20, 30, 40, 50};
char *p;
p= (char*) a;
}
Ans. printf("\n%d",*((int*)p+4));
8. Would the following program compile?
main()
{
int a=10,*j;
void *k;
j=k=&a;
j++;
k++;
printf("\n%u%u",j,k);
}
a) Yes b) No, the format is incorrect
c) No, the arithmetic operation is not permitted on void pointers
d) No, the arithmetic operation is not permitted on pointers
9. According to ANSI specifications which is the correct way of declaring main() when it receives command line
arguments?
a) main(int argc, char *argv[]) b) main(argc,argv) int argc; char *argv[];
c) main() {int argc; char *argv[]; } d) None of the above
10. What error would the following function give on compilation?
f(int a, int b)
{
int a;
a=20;
return a;
}
a) missing parenthesis in the return statement b) The function should be declared as int f(int a, int b)
c) redeclaration of a d) None of the above
11. If the program (myprog) is run from the command line as myprog 1 2 3 , What would be the output?
main(int argc, char *argv[])
{
int i;
for(i=0;i<argc;i++)
printf("%s",argv[i]);
}
a) 1 2 3 b) C:\MYPROG.EXE 1 2 3
c) MYP d) None of the above
12. If the following program (myprog) is run from the command line as myprog 1 2 3, What would be the output?
main(int argc, char *argv[])
{
int i,j=0;
for(i=0;i<argc;i++)
j=j+ atoi(argv[i]);
printf("%d",j);
}
a) 1 2 3 b) 6 c) error d) "123"
13. If the following program (myprog) is run from the command line as myprog monday tuesday wednesday
thursday? What would be the output?
main(int argc, char *argv[])
{
while(--argc >0)
printf("%s",*++argv);
}
a) myprog monday tuesday wednesday thursday b) monday tuesday wednesday thursday
c) myprog tuesday thursday d) None of the above
14. In the following code, is p2 an integer or an integer pointer?
typedef int* ptr
ptr p1,p2;
Ans. Integer pointer
15. If the following program (myprog) is run from the command line as myprog friday tuesday sunday, What would
be the output?
main(int argc, char *argv[])
{
while(sizeofargv)
printf("%s",argv[--sizeofargv]);
}
a) myprog friday tuesday sunday b) myprog friday tuesday
c) sunday tuesday friday myprog d) sunday tuesday friday
16. What would be the output of the following program?
main()
{
int i=4;
switch(i)
{
default:
printf("\n A mouse is an elephant built by the Japanese");
case 1:
printf(" Breeding rabbits is a hair raising experience");
break;
case 2:
printf("\n Friction is a drag");
break;
case 3:
printf("\n If practice make perfect, then nobody's perfect");
}
}
a) A mouse is an elephant built by the Japanese b) Breeding rabbits is a hare raising experience
c) All of the above d) None of the above
17. What is the output of the following program?
#define SQR(x) (x*x)
main()
{
int a,b=3;
a= SQR(b+2);
printf("%d",a);
}
a) 25 b) 11 c) error d) garbage value
18. In which line of the following, an error would be reported?
1. #define CIRCUM(R) (3.14*R*R);
2. main()
3. {
4. float r=1.0,c;
5. c= CIRCUM(r);
6. printf("\n%f",c);
7. if(CIRCUM(r))==6.28)
8. printf("\nGobbledygook");
9. }
a) line 1 b) line 5 c) line 6 d) line 7
19. What is the type of the variable b in the following declaration?
#define FLOATPTR float*
FLOATPTR a,b;
a) float b) float pointer c) int d) int pointer
20. In the following code;
#include<stdio.h>
main()
{
FILE *fp;
fp= fopen("trial","r");
}
fp points to:
a) The first character in the file.
b) A structure which contains a "char" pointer which points to the first character in the file.
c) The name of the file. d) None of the above.
21. Input:A is non-empty list of numbers L
Xß-infinity
For each item in the list L,do
If the item>x,then
Xßthe item
Return X
X represents:-
a)largest number
b)smallest number
c)smallest negative number
d) none
22. Let A and B be nodes of a heap,such that B is a child of A. the heap must then satisfy the following conditions
a)key(A)>=key(B)
b)key(A)
c)key(A)=key(B)
d)none
23. String ,List,Stack,queue are examples of___________
a)primitive data type
b)simple data type
c)Abstract data type
d)none
24. which of the following is not true for LinkedLists?
a)The simplest kind of linked list is a single linked list ,which has one link per node .this link points to the next node
in the list,or to a null value or emptylist if it is the last node.
b)a more sophisticated kind of linked list is a double linkedlist or two way linkedlist .Each node has two links ,one to
the previous node and one to the next node.
c) in a circleLinkedList ,the first and last nodes are linked together.this can be done only for double linked list.
d) to traverse a circular linkedlist ,u begin at any node and follow the list in either direction until u return to the
original node.
25. sentinel node at the beginning and /or at the end of the linkedlist is not used to store the data
a) true
b) false
Logged
26. which of the following is the most crucial phase of SDLC
a)testing b)code generation c) analysys and design d)implementation
27. to send a data packet using datagram ,connection will be established
a)no connection is required
b) connection is not established before data transmission
c)before data transmission
d)none
28. a software that allows a personal computer to pretend as as computer terminal is
a) terminal adapter
b)terminal emulation
c)modem
d)none
29. super key is
a) same as primary key
b) primary key and attribute
c) same as foreign key
d) foreign key and attribute
30. In binary search tree which traversal is used for ascending order values
a) Inorder b)preorder c)post order d)none
31. You are creating an index on ROLLNO colume in the STUDENT table.which statement will you use?
a) CREATE INDEX roll_idx ON student, rollno;
b) CREATE INDEX roll_idx FOR student, rollno;
c) CREATE INDEX roll_idx ON student( rollno);
d) CREATE INDEX roll_idx INDEX ON student (rollno);
32. A________class is a class that represents a data structure that stores a number of data objects
a. container b.component c.base d.derived
13. Which one of the following phases belongs to the compiler Back-end.
a. Lexical Analysis b.Syntax Analysis c. Optimization d.Intermediate Representation.
14. Every context _sensitive language is context_free
a. true b.false
15. The repeated execution of a loop of code while waiting for an event to occur is called ---------.The cpu is not
engaged in any real productive activity during this period,and the process doesn’t progress towards completion.
a) dead lock b) busy waiting c) trap door d) none.
16. Transparent DBMS is defined as
a) A DBMS in which there are no program or user access languages. b) A DBMS which has no cross file capabilities
but is user friendly and provides user interface management. c) A DBMS which keeps its physical structure hidden
from user d) none.
17. Either all actions are carried out or none are.users should not have to worry about the effect of incomplete
transctions.DBMS ensures this by undoing the actions of incomplete transctions.this property is known as
a) Aggregation b) atomicity c) association d) data integrity.
18..------ algorithms determines where in available to load a program. common methods are first fit,next fit,best fit.-------- algorithm are used when memory is full , and one process (or part of a process) needs to be swaped out to
accommodate a new program.The ------------- algorithm determines which are the partions to be swaped out.
a) placement, placement, replacement
b) replacement, placement, placement
c) replacement, placement, replacement
d) placement, replacement, replacement
19. Trap door is a secret undocumented entry point into a program used to grant access without normal methods of
access authentication.A trap is a software interrupt,usually the result of an error condition.
a)true b)false.
20. Given a binary search tree,print out the nodes of the tree according t5o post order traversal.
4
/\
25
/\
13
a)3,2,1,5,4. b)1,2,3,4,5. c)1,3,2,5,4. d)5,3,1,2,4.
21. which one of the following is the recursive travel technique.
a)depth first search b)preorder c)breadth first search d)none.
22. which of the following needs the requirement to be a binary search tree.
a) 5
/\
27
/
1
b) 5
/\
67
c) 5
/\
27
/\
16
d) none.
23. in recursive implementations which of the following is true for saving the state of the steps
a)as full state on the stack
b) as reversible action on the stack
c)both a and b
d)none
24. which of the following involves context switch
a)previliged instruction
b)floating point exception
c)system calls
d)all
e)none
25. piggy backing is a technique for
a)acknowledge
b)sequence
c)flow control
d)retransmission
26. a functional dependency XY is ___________dependency if removal of any attribute A from X means that the
dependency does not hold any more
a)full functional
b) multi valued
c)single valued
d)none
27. a relation schema R is in BCNF if it is in ___________and satisfies an additional constraints that for every
functional dependency XY,X must be a candidate key
a)1 NF
b)2 NF
c)3 NF
d)5 NF
28. a _________sub query can be easily identified if it contains any references to the parent sub query columns in
the _________ clause
A) correlated ,WHERE
b) nested ,SELECT
c) correlated,SELECT
d) none
29. hybrid devise that combines the features of both bridge and router is known as
a)router b)bridge c)hub d)brouter
30. In 8051 micro controller what is the HEX number in the accumulator after the execution of the following code.
MOV A,#0A5H
CLR C
RRC A
RRC A
RL A
RL A
SWAP A
a)A6 b)6A c)95 d)A5.
31. The Pentium processor requires ------------ volts.
a)9 b)12 c)5 d)24.
32. The data bus on the Celeron processor is-------bits wide.
a)64 b)32 c)16 d)128.
33. K6 processor
a) Hitachi b) toshiba c) zilog d) AMD.
34. What is the control word for 8255 PPI,in BSR mode to set bit PC3.
a)0EH b)0FH c)07H d)06H.
What is the value of i if the function is called twice ?
35. Given the following c program
func(int *i, int*j)
{*i=*i * *i;
*j=*j* *j;
}
main()
{ int i = 5, j = 2;
func(&i,&j);
printf("%d %d", i, j);}
36. Find the outpur of the following C program
void f(char *p)
{p=(char *) malloc(6);
strcpy(p,"hello");
}
void main( )
{char *P="bye";
f(p);
printf("%s ,p);
}
37. For the following C program
int x(char *a)
{a=(char *) malloc(10*sizeof(char));
*a="hello";
}
main()
{char *a="new";
x(a);
printf("%s",a);
}
The output is
a) Hello
b) New
c) Hello new
d) Run time error
38. Find the error if any {
struct *sPtr, *nPtr
for(;*nPtr;nPtr=nPtr->next)
free(nPtr);
}
39. Find the output main()
{ void f(int, int);
int i, j;
i=10;
j=10;
f(++i,j++);
}
void f(int i, int j)
{if(i>50)return;
else
i+=j;
f(i,j);
printf("%d",i);
}
Ans 413121
40. kernel executes the first process when system starts
ans :- init();
41.
main()
{ int i=1;
fork();
fork();
fork();
printf("%d",i);
}
how many times i will be printed
ans:8
42In a sequential search, what is the average number of comparisons it takes to search through n elements ?
Ans: (n+1)/2.
43What is the size of the array declared as double * X[5] ?
Ans. 5 * sizeof ( double * )
44. Find the output for the following C program
main
{int x,j,k;
j=k=6;x=2;
x=j*k;
printf(”%d”, x);
CSC Technical Questions with Answer
1)#include
main()
{
int a=6,y=3,z;
float t=4.55;
z=a/y+t+a/y-t+a-2*t;
printf("%d",z);
}
a. 3 b. 3.00000 c. 3.55
d.none
Ans: D
2).#include
#define int printf("#int(intv)");
main()
{
int x;
float g;
g=int x
printf("-------------");
}
Ans: COMPIER ERROR
3) Main ()
{
Static char a[3][4]={"abcd","mnop" ,"fghi"}
Putchar(**a);
}
a)will not compile successfully b)prints a c)prints m d)prints garbage
Ans: b
4)main()
{
Int i=100;
Int M();
Printf("%d",(*M)(i));
}
Int M(x)
Int x;
{
Printf("%d",++x);
}
a)prints 100 b)prints 101 c)prints error d)prints 1013
5) main()
{
Int i=7
If(0==fork())
I+=10;
Else
{
Wait(0);
Printf("%d",i);
}
}
a)i+=10 is executed by child only
b)i+=10 is executed by parent only
c)The child can start executing only after the termination of the parent process.
d)none of the above
6) 27 |
a) 27
8
b)8
c)2
d)none of the above
7) command in unix for removing all files
a)rm
b)rm*
c)rm *.*
8) which is used for storing pictures or graphics
a) mbr b)mar c)frame buffer d)sdram
9) Pick the odd man out.
a)GPRS b)GSM c)SIM d)IDM
Ans.D
10) if A=10000001 B=10000010 C=10000011 then what does the word 100000111000000110000010 mean.
Ans. CAB
11.#define FALSE -1
#define TRUE 1
#define NULL 0
main() {
if(NULL)
puts(“NULL”);
else if(FALSE)
puts(“TRUE”);
else
puts(“FALSE”);
}
what is the output?
a)NULL b)TRUE c)FALSE d)0
12.main() {
int i =5,j= 6, z;
printf(“%d”,i+++j);
}
what is the output?
a)13 b)12 c)11 d)compiler error
13.main() {
int i ;
i = accumulator();
printf(“%d”,i);
}
accumulator(){
_AX =1000
}
what is output?
a)1 b)10 c)100 d)1000
14.main() {
int i =0;
while(+(+i--)!= 0)
i- = i++;
printf(“%d”,i);
}
what is the output?
a)-1 b)0 c)1 d)will go in an infinite loop
15.main(){
int i =3;
for(; i++=0;)
printf((“%d”,i);
}
what is the output?
a)1b)2c)1 2 3d)compiler error:L value required.
16.main(){
int i = 10, j =20;
j = i ,j?(i,j)?i :j:j;
printf(“%d%d”,i,j);
}what is the output?
a)20 20 b)20 10 c)10 20 d)10 10
17.main(){
extern i;
printf(“%d\t”,i);{
int i =20;
printf(“%d\t”,i);
}
}
what is output?
a)
“Extern valueof i “ 20 b)Externvalue of i”c)20d)linker Error:unresolved external symbol I
18.int DIMension(int array[]){
return sizeof(array/sizeof(int);}
main(){
int arr[10];
printf(“Array dimension is %d”,DIMension(arr));
}
what is output?
a)array dimension is 10 b)array dimension is 1 c) array dimension is 2 d)array dimension is 5
19.main(){
void swap();
int x = 45, y = 15;
swap(&x,&y);
printf(“x = %d y=%d”x,y);
}
void swap(int *a, int *b){
*a^=*b, *b^=*a, *a^ = *b;
what is the output?
a)
x = 15, y =45 b)x =15, y =15 c)x =45 ,y =15 d)x =45 y = 45
20.main(){
int i =257;
int *iptr =&i;
printf(“%d%d”,*((char*)iptr),*((char *)iptr+1));
}
what is output?
a)1, 257 b)257 1c)0 0d)1 1
21.main(){
int i =300;
char *ptr = &i;
*++ptr=2;
printf(“%d”,i);
}
what is output?
a)556 b)300 c)2 d)302
22.#include
main(){
char *str =”yahoo”;
char *ptr =str;
char least =127;
while(*ptr++)
least = (*ptr
printf(“%d”,least);
}
what is the output?
a)0 b)127 c)yahoo d)y
23.Declare an array of M pointers to functions returing pointers to functions returing pointers to characters.
a)(*ptr[M]()(char*(*)());
d)(char*(*)(char*()))(*ptr[M])();
b)(char*(*)())(*ptr[M])()
c)(char*(*)(*ptr[M]())(*ptr[M]()
24.void main(){
int I =10, j=2;
int *ip = &I ,*jp =&j;
int k = *ip/*jp;
printf(“%d”,k);
}
what is the output?
a)2
b)5
c)10
d)compile error:unexpected end of file in comment started in line 4
25.main(){
char a[4] =”GOOGLE”;
printf(“%s”,a);
}
what is the output?
a)2 b) GOOGLE c) compile error: yoo mant initializers d) linkage error.
26.For 1MB memory, the number of address lines required
a)12 b)16 c)20 d)32
27.There is a circuit using 3 nand gates with 2 inputes and 1 output,f ind the output.
a) AND b) OR c) XOR d) NAND
28.what is done for push operation
a) SP is incremented and then the value is stored.
b) PC is incremented and then the value is stored.
c) PC is decremented and then the value is stored.
d) SP is decremented and then the value is stored.
29.Memory allocation of variables declared in a program is ------
a) Allocated in RAM
b) Allocated in ROM
c) Allocated in stack
d) Assigned in registers.
30.What action is taken when the processer under execution is interrupted by TRAP in 8085MPU?
a) Processor serves the interrupt request after completing the execution of the current instruction.
b) processer serves the interrupt request after completing the current task.
c) processor serves the interrupt immediately.
d) processor serving the interrupt request depent deprnds upon the priority of the current task under execution.
31.purpose of PC (program counter)in a microprocessor is ----
a) To store address of TOS(top of stack)
b) To store address of next instructions to be executed
c) count the number of instructions
d) to store the base address of the stack.
32.conditional results after execution of an instruction in a microprocess is stored in
a) register b) accumulator c) flag register d) flag register part of PSW (program status word)
33.The OR gate can be converted to the NAND function by adding----gate(s)to the input of the OR gate.
a) NOT b) AND c) NOR d) XOR
34.In 8051microcontroller ,------has a dual function.
a) port 3 b) port 2 c) port 1 d) port 0
35.An 8085 based microprocessor with 2MHz clock frequency,will execute the following chunk of code with how
much delay?
MVI B,38H
HAPPY:
MVI C, FFH
SADDY:
DCR C
JNZ SADDY
DCR B
JNC HAPPY
a)
102.3 b)114.5 c)100.5 d)120
36.In 8085 MPU what will be the status of the flag after the execution of the following chunk of code.
MVI B,FFH
MOV A,B
CMA
HLT
a)S = 1, Z = 0, CY = 1 b)S = 0, Z = 1, CY = 0 c) S = 1, Z = 0, CY = 0 d)S = 1, Z = 1 ,CY = 1
37.A positive going pulse which is always generated when 8085 MPU begins the machine cycle.
a) RD b) ALE c) WR d) HOLD
38.when a ----- instruction of 8085 MPU is fetched , its second and third bytes are placed in the W and Z registers.
a) JMP b) STA c) CALL d) XCHG
39.what is defined as one subdivision of the operation performed in one clock period.
a) T- State b) Instruction Cycle c) Machine Cycle d) All of the above
40.At the end of the following code, what is the status of the flags.
LXI B, AEC4H
MOV A,C
ADD HLT
a) S = 1, CY = 0, P = 0 , AC = 1 b) S =0 , CY = 1, P = 0,AC = 1 c) S = 0, CY = 1, P = 0 , AC = 1 d) S = 0, CY = 1,
P = 1 , AC = 1
41.In 8051 micro controller what is the HEX number in the accumulator after the execution of the following code.
MOV A,#0A5H
CLR C
RRC A
RRC A
RL A
RL A
SWAP A
a)A6
b)6A
c)95
d)A5.
42.The Pentium processor requires ------------ volts.
a)9
b)12
c)5
d)24
43. The data bus on the Celeron processor is-------bits wide.
]
a)64 b)32 c)16
d)128.
44.K6 processor
a) Hitachi b) toshiba c) zilog d) AMD. ans: d
45. What is the control word for 8255 PPI,in BSR mode to set bit
a)0EH
b)0FH
c)07H
PC3.
d)06H.
46.The repeated execution of a loop of code while waiting for an event to occur is called ---------.The cpu is not
engaged in any real productive activity during this period,and the process doesn’t progress towards completion.
a) dead lock
b) busy waiting
c) trap door d) none.
47. Transparent DBMS is defined as
a) A DBMS in which there are no program or user access languages. b) A DBMS which has no cross file capabilities
but is user friendly and provides user interface management. c) A DBMS which keeps its physical structure hidden
from user d) none.
48.Either all actions are carried out or none are.users should not have to worry about the effect of incomplete
transctions.DBMS ensures this by undoing the actions of incomplete transctions.this property is known as
a) Aggregation b) atomicity
c) association d) data integrity.
49.------ algorithms determines where in available to load a program. common methods are first fit,next fit,best fit.-------- algorithm are used when memory is full , and one process (or part of a process) needs to be swaped out to
accommodate a new program.The ------------- algorithm determines which are the partions to be swaped out.
a) placement, placement, replacement
b) replacement, placement, placement
c) replacement, placement, replacement
d) placement, replacement, replacement
50.Trap door is a secret undocumented entry point into a program used to grant access without normal methods of
access authentication. A trap is a software interrupt,usually the result of an error condition.
a)true b)false.
51. Given a binary search tree,print out the nodes of the tree according to post order traversal.
4
/ \
2
5
/\
1
3
a)3,2,1,5,4. b)1,2,3,4,5. c)1,3,2,5,4. d)5,3,1,2,4.
52.which one of the following is the recursive travel technique.
a)depth first search b)preorder c)breadth first search
d)none.
53.which of the following needs the requirement to be a binary search tree.
a) 5
/ \
2
7
/
1
b) 5
/ \
6
7
c)
5
/ \
2
/\
1 6
7
d) none.
54.in recursive implementations which of the following is true for saving the state of the steps
a) as full state on the stack
b) as reversible action on the stack
c) both a and b
d) none
55.which of the following involves context switch
a)previliged instruction
b)floating point exception
c)system calls
d)all
e)none
56.piggy backing is a technique for
a)acknowledge
b)sequence
c)flow control
d)retransmission
57. a functional dependency XY is ___________dependency if removal of any attribute A from X means that the
dependency does not hold any more
a)full functional
b) multi valued
c)single valued
d)none
58)a relation schema R is in BCNF if it is in ___________and satisfies an additional constraints that for every
functional dependency XY,X must be a candidate key
a)1 NF
b)2 NF
c)3 NF
d)5 NF
59) a _________sub query can be easily identified if it contains any references to the parent sub query columns in
the _________ clause
A) correlated ,WHERE
b) nested ,SELECT
c) correlated,SELECT
d) none
60) hybrid devise that combines the features of both bridge and router is known as
a)router b)bridge c)hub d)brouter
61) which of the following is the most crucial phase of SDLC
a)testing b)code generation c) analysys and design d)implementation
62)to send a data packet using datagram ,connection will be established
a)no connection is required
b) connection is not established before data transmission
c)before data transmission
d)none
63)a software that allows a personal computer to pretend as as computer terminal is
a) terminal adapter
b)terminal emulation
c)modem
d)none
64) super key is
a) same as primary key
b) primary key and attribute
c) same as foreign key
d) foreign key and attribute
65.In binary search tree which traversal is used for ascending order values
a) Inorder
b)preorder c)post order d)none
66.You are creating an index on ROLLNO colume in the STUDENT table.which statement will you use?
a) CREATE INDEX roll_idx ON student, rollno;
b) CREATE INDEX roll_idx FOR student, rollno;
c) CREATE INDEX roll_idx ON student( rollno);
d) CREATE INDEX roll_idx INDEX ON student (rollno);
67.A________class is a class that represents a data structure that stores a number of data objects
a. container b.component c.base d.derived
68.Which one of the following phases belongs to the compiler Back-end.
a. Lexical Analysis b.Syntax Analysis c. Optimization d.Intermediate Representation.
69.Every context _sensitive language is context_free
a. true b.false
70.Input:A is non-empty list of numbers L
Xß-infinity
For each item in the list L,do
If the item>x,then
Xß the item
Return X
X represents:-
a)largest number
b)smallest number
c)smallest negative number
d) none
71.Let A and B be nodes of a heap,such that B is a child of A. the heap must then satisfy the following conditions
a)key(A)>=key(B)
b)key(A)
c)key(A)=key(B)
d)none
72.String ,List,Stack,queue are examples of___________
a)primitive data type
b)simple data type
c)Abstract data type
d)none
73.which of the following is not true for LinkedLists?
a)The simplest kind of linked list is a single linked list ,which has one link per node .this link points to the next node
in the list,or to a null value or emptylist if it is the last node.
b)a more sophisticated kind of linked list is a double linkedlist or two way linkedlist .Each node has two links ,one to
the previous node and one to the next node.
c) in a circleLinkedList ,the first and last nodes are linked together.this can be done only for double linked list.
d) to traverse a circular linkedlist ,u begin at any node and follow the list in either direction until u return to the
original node.
74.sentinel node at the beginning and /or at the end of the linkedlist is not used to store the data
a) true
b) false
75) Which of following is correct:
a)For loops can be nested
b)For Loops may use the same Index
c)For loops cannot be overllapped
Ans:a,c
CSC Aptitude Questions With Solution
1.
If 15 toys cost Rs, 234, what do 35 toys cost?
Sol. Rs. 546.
2. If 36 men can do a piece of work in 25 hours, in how many hours will 15 men
do it ?
Sol 15 men can do it in 60 hours.
.3. If the wages of 6 men for 15 days be Rs.2100, then find the wages of
for 12 days.
Sol. Rs. 2520.
4. If 20 men can build a wall 66 metres long in 6 days, what length of a similar can be built by 86 men in 8 days?
Sol. 49 m.
5. If 15 men, working 9 hours a day, can reap a field in 16 days, in how many
days will 18 men reap the field, working 8 hours a day?
Sol 15.
6. If 9 engines consume 24 metric tonnes of coal, when each is working 8 hours
day, bow much coal will be required for 8 engines, each running 13hours a day, it being given that 3 engines of
former type consume as much as 4 engines of latter type?
Sol26 metric tonnes.
7. A contract is to be completsd in 46 days sad 117 men were said to work 8 hours a day. After 33 days, (4/7) of
the work is completed. How many additional men may be employed so that the work may be completed in time,
each man now working 9 hours a day?
Sol. 81.
8. A garrison of 3300 men had provisions for 32 days, when given at the rate of 860 gns per head. At the end of 7
days, a reinforcement arrives and it was for that the provisions wi1l last 17 days more, when given at the rate of 826
gms per head, What is the strength of the reinforcement?
Sol.1700.
9Rajeev's age after 15 years will be 5 times his age 5 years back. What is the
present age of Rajeev ?
Sol. 10 years.
10. The ages of two persons differ by 16 years. If 6 years ago, the elder one be
3 times as old as the younger one, find their present ages.
Sol. their present ages are 14 years and 30 years.
11. The product of the ages of Ankit and Nikita is 240. If twice the age of Nikita
is more than Ankit's age by 4 years, what is Nikita's age?
Sol. 12 years.
12 . The present age of a father is 3 years more than three times the age of his son. Three years hence, father's age
will be 10 years more than twice the age of the son. Find the present age of the father.
.
Sol. 33 years.
13 . Rohit was 4 times as old as his son 8 years ago. After 8 years, Rohit will be
twice as old as his son. What are their present ages?
Sol., son's 'present age = (x + 8) = 16 years.
Rohit's present age = (4x + 8) = 40 years.
14. One year ago, the ratio of Gaurav’s and Sachin’s age was 6: 7 respectively.
Four years hence, this ratio would become 7: 8. How old is Sachin ?
Sol: 36 years.
15. Abhay’s age after six years will be three-seventh of his fathers age. Ten years ago the ratio of their ages was 1 :
5. What is Abhay’s father's age at present?
Sol. 50 years.
16:Two pipes A and B can fill a tank in 36 bours and 46 bours respectively. If both the pipes are opened
simultaneously, bow mucb time will be taken to fill the
tank?
Sol: 20 hours.
17: Two pipes can fill a tank in 10hours and 12 hours respectively while a third, pipe empties the full tank in 20
hours. If all the three pipes operate simultaneously, in how much time will the tank be filled?
Sol: 7 hrs 30 min.
18: If two pipes function simultaneously, tbe reservoir will be filled in 12 hours. One pipe fills the reservoir 10 hours
faster than tbe otber. How many hours does it take the second pipe to fill the reservoir?
Sol: 30 hours to fill the reservoir
19: A cistern has two taps which fill it in 12 minutes and 15minutes respectively. There is also a waste pipe in the
cistern. When all the 3 are opened , the empty cistern is full in 20 minutes. How long will the waste pipe take to
empty the full cistern?
Sol: the waste pipe will empty the full cistern in 10min
20: An electric pump can fill a tank in 3 hours. Because of a leak in ,the tank it took 3(1/2) hours to fill the tank. If
the tank is full, how much time will the leak take
to empty it ?
Sol: 21 hours.
21. Two pipes can fill a cistern in 14 hours and 16 hours respectively. The pipes
are opened simultaneously and it is found that due to leakage in the bottom it tooki 32 minutes more to fill the
cistern.When the cistern is full, in what time will the leak empty it?
Sol: 112 hours.
22: Two pipes A and B can fill a tank in 36 min. and 45 min. respectively. A water pipe C can empty the tank in 30
min. First A and B are opened. after 7 min,C is also opened. In how much time, the tank is full?
Sol: 39 minutes.
23: Two pipes A,B can fill a tank in 24 min. and 32 min. respectively. If both the pipes are opened simultaneously,
after how much time B should be closed so that the tank is full in 18 min.?
Sol: 8 min.
24. In a km race, A beats B by 28 metres or 7 seconds. Find A's time over the course.
Sol. 4 min. 3 sec.
25. A runs 1 ¾ times as fast as B. if A gives B a start of 84 m, how far must
winning post be so that A and B might reach it at the same time?
Sol. Winning post must be 196 m away from the starting point.
26. A can run 1 km in 3 min. 10 sec. and B can cover the same distance in 3 min. 20 sec. By what distance can A
beat B ?
Soln: A beats B by 50 metres.
27 . In a 100 m race, A runs at 8km per hour. If A gives B a start of 4 m and still him by 15 seconds, what is the
speed of B ?
Sol: 5.76 km/hr.
28. A, Band C are three contestants in a km race. If A can give B a start of 40 m
and A can give C a start of 64m how many metre's start can B give C ?
Sol: While A covers 1000 m,
When B covers 960 m, C covers 936 m.
29. In a game of 80 points; A can give B 5 points and C 15 points. Then how many points B can give C in a game
of 60 ?
Sol.
B can give C 8 points.
30. Find the present worth of Rs. 930 due 3 years hence at 8% per annum. Also find the discount.
Sol. Rs. 180.
31. The true discount on a bill due 9 months hence at 12% per annum is Rs. Find the amount of the bill and its
present worth.
Sol.
Rs. 6000.
32. The true discount on a certain sum of money due 3 years hence is Rb. 250 and the simple interest on the same
sum for the same time and at the same rate is Rs. 375. Find the sum and the rate percent.
Sol. 16 2/3%
33. The difference between the simple interest and true discount on a certain sum
of money for 6 months at 12—% per annum is Rs. 25. Find the sum.
Sol. Rs. 6800.
34. A bill falls due in 1 year. The creditor agrees to accept immediate payment of the half and to defer the payment
of the other half for 2 years. By this arrangement ins Rb. 40. What is the amount of the bill, if the money be worth
12-z% ?
Sol . Rs. 3600.
35. Find the volume and surface area of a cuboid 16 m long, 14 m broad and
7 m high.
Sol. 868
36. Find the length of the longest pole that can be placed in a room 12 m long
8m broad and 9m high.
Sol. 17 m.
37. Tbe volume of a wall, 5 times as high as it is broad and 8 times as long as
it is high, is 12.8 cu. metres. Find the breadth of the wall.
Sol. 40 cm
38. Find the number of bricks, each measuring 24 cm x 12 cm x 8 cm, required to construct a wall 24 m long, 8m
high and 60 cm thick, if 10% of the wall is filled with mortar?
Sol. 45000.
39. Water flows into a tank 200 m x 160 m througb a rectangular pipe of
1.5m x 1.25 m @ 20 kmph . In what time (in minutes) will the water rise by 2
metres?
Sol. 96min
40. Tbe dimensions of an open box are 50 cm, 40 cm and 23 cm. Its thickness is
2 cm. If 1 cubic cm of metal used in the box weighs 0.5 gms, find the weight of the box.
Sol. 8.04 kg.
CSC Technical Written Test Questions:
1.with framework CASE tools IPSE can be achieved .IPSE is
a.integrated product software engineering.
b.integrated productivity simulation environment
c.inner project software estimation
d.inntegreted project support environment
2.data structured system devolepment (DSDD) is also called one of the below which is evolved from work on information
domain analysis
a.j.d.methodology
b.yourdon methodology
c.warnier-or methodology
d.Kevin-yenn methodology
3.a.COCOMOestimation model is a single valued mode to compute software development effort(and cost)as a function of
program size expressed in estimated lines of codes.
b..PUTNAM model is single valued model assuming a specific distribution of effort over life of software development project.
a.only a)is correct
b.only b)is correct
c.a ) and b)is correct
d.a)and b)is wrong
4.when in data coupling portion of a data structure(rather than simple argument)is passed via a model interface it is called one of
the below
a.control coupling
b.stamp coupling
c.sub-coupling
d.reference coupling
5.what is measure of reliability for a computer based system if MTBF=mean time between failure.MTTF=mean time to
failure.MTTR=mean time to recover
a.MTBF=MTTF/MTTR
B.MTBF=MTTF*MTTR
C.MTTR=MTTF*MTBF
D.MTBF=MTTF-MTTR(sign is not cleared)
6.in FURPS quality factors by HEWERT PACKAR
a.functionality is accessed by evaluating o ne feature of program and capability of algorithm only
b.supportability means breath of premna application and death of standards used
a.a)and b)both correct
b.a)correct b)wrong
c.b)correct a)wrong
d.a)and b) both wrong question is not cleared
7.ur testing of basis paw message means software devolepme nt quatiative measure of logical complexity program of independent
path in search of program
a.data cycle complexity
b.path complexity metric
c.cyclomatic complexity
d.none of above (question is not cleared so try to understand it)
8.as a general rule
a.MIS performane criteria determine management information needs and these needs determine the objective of the firm
b.the objective of the firm determine the management information needs and these needs determine the MIS performance criteria
c.management information needs determine the MIS performance criteria and these criteria determine the objective of form
d.the objectives of firm determine the MISpwrformance criteria and these criteria detemine the management information needs.
9.a relatively small project is to be developed by a small team with good applocation experience needing to fulfull less than rigid
requirements. Using the basis COCOMA model calculate the effort in person-months if the estimated lines of code is 33200
a.95 person-months.
b.111 perso n-months
c.102 person-months
d.87 person-moths
10.CRC modeling provides a way for identifying classes their respomnsibilities and their collaboration .a collabration refers to.
a.services provided by a class to other classes
b.requests sent by a class to ther classes to fulfill its own responsibility.
c.taxonomy of class types
d.characterstics of a class
12.a software was developed using component assembly model.after some time and old componet is to be replaced by a new one
without disturbing the overall fuctioning of the softwarwe.following statements is true.
a.the new component should be developed in the same language as the old one
b.the new component should have exactly the same attribute as the old one.
c.the new component should inplement exactly the same methods as the old one.
d.The new component should provide exactly the same interface as the old one.
13.a real time system is to be developed .the choice of database would most appropriately be
a.distributed databases because the reduce redundancy of data.
b.distributed databases because the facilate parallel data processing through miultitasking
c.centralized databases because of high computing power the server.
d.centralized databases because they provide better deadlock handling mechanism.
14.the following statement is equavalence echo~
a.echo SHOME
b.SHOME
c.pwd
d.ps
15.the equavalent of following statement is echo~bin
a.echosbin
b.echo bin
c.pwd
d.echo pwd
16.the command that gives the process of ID of last command invoked
a.$@
b.$#
c.$!
d.$$
17.the output of the following shell script
$set-a planets mecury venus
$planets[9]=Pluto
$print ${planets[*]}
a.planets
b.mercurity venus puto
c.Pluto mercury Pluto
d.gives an error
18."let"command is used for
a.command substitution
b.arithmetic calculation
c.to create analias
d.not used
19.name the relationship(s)that denotes some semantic dependency among otherwise unrelated classes.
a.generilazation or specification.
b.part of
c.association
d.all of the above
20.object persistence is best described by the following
a.the ability to retain an object throughout the execution of a method
b.the ability to retain an object throughout the execution of a program
c.the ability to save objects from one execution of a program to the text.
d.the ability to retain an object throughout time and or space
21.what is socket ? how many required to make connection between two systems
a.a socket is 2-tuple having protocol and port number and requires 4sockets
b.a socket is 3-tuple having protocol address and port number and requires 4 sockets
c.a socket is 2-tuple having protocol and address and requires 2 sockets
d.a socket is 3-tuple having protocol address and port number and requires 2 sockets
22.TCP/IP runs on
a.an Ehtener
b.a token ring
c.an x.25 net
d.all of the above
23.the job og fragmentation and re-assembly of datagrams in TCP/IP protocol suite is done by
a.network access layer
b.internet layer
c.transport layer
d.application layer
24.the sequence number in TCP header is used to
a.identify the first byte of the enclosed data int segment
b.identify the computer
c.identify the port on which server is running
d.none
25.what is output of the final echo command
$x=hell0
$ echo'x=goodbye'>sedtx
$sh setx ;x=bye
$echo $x
a.hello
b.goodbye
c.bye
d.none
26. what would be the output of the following echo command in sequence?
$x=1
$echo'x=2'>setx
$sh setx
$echo $x
$x=3
$setx
$echo $x
a.2,2
b.1,2
c2,3
d.1,3
27.memory reference instruction branch subroutine (BSB) IS given instruction transferming control to subroutine
b.first word of the subroutine
c.address of next instruction in sequence which is presently held in pc (return addres)
d.another BSBinstruction
28.assume memory units has 65536 words of 8bits.the number of bits in program counter.accumalator. memory address register
instruction respectively are
a.16,8,16,8
b16,16,8,8
c8,16,8,16
d8,8,16,16
29.which of the following instruction is used to load 2050h address toHL register pair?
a.LOD H,2050H
B.LOAD H,2050H
C.LXIH,2050H
D.LDAH,2050H
30.what will be the value of the accumalator having AAH after executing RLC instruction twice?
a.55h
b.abh
c.bah
d.aah
31.the top of the stack contains 5A&next byte down the stack is 14(all address in hexadecimal) the stack pointer (sp) containts
3A56.an instruction call subroutint stored at location 67AE whick is 3 bytes long is located at memory address 013F. What shall
be the contents of Program Counter, SP and stack respectively after the call instruction is executed?
PC SP stack
a. 67AE 3A58 42,01,5A,14
b. 0142 3A58 01,42,5A,14
c. 67AE 3A56 42,01,5A,14
d. 0142 3A56 01,42,5A,14
32. Time oriented metrics is one of the below i.e. times it takes to analyze change request, design an appropriate modification,
implement the change, test it and distribute to all users.
a. MTBR b. MTTC c. MTBW d. MTTW
33. which of the following is not a tool for application prototyping?
a. Application Generators.
b. Third Generation Languages
c. Screen Generators
d. Report Generators.
34. For Real time process control or embedded software application having high algorithmic complexity programs. Which
software process metrics would be most suitable for project measurements?
a. size oriented metrics
b. Function point metrics
c. Feature Point metrics.
d.3d functionpoint metrics
35. Regression testing is:
a. Testing the System under extreme conditions.
b. Testing the System after a new component is integrated into it to make sure that no additional errors are introduced.
c. Testing the system with an exhaustive range of data to make sure that all the conditions are tested.
d. Testing of a module by its developmer before releasing it for integration with the entire system.
36. For a module to be strongly cohesive:
a. it should ideally perform just one function.
b. Et should have well defined relationships with other modules in the system.
c. It should be compact in size.
d. It should not take any data as input parameter.
37. The approach used in Top Down Analysis and design is:
a. To identify a top level function by combining many smaller componen into a single entity.
b. To identify a top level function and then create a hierarchy of lower level modules and components.
c. To prepare flowchart after programming has completed.
d. None of the above.
38. Engineers use the CASE tolls to:
a. Analyze these requirements and determine their feasibility.
b. Design the system's general algorithms.
c. Design an actual detailed implementation in terms of target environment.
d. All of the above.
39. While constructing a data dictionary, the analyst considers:
a. Each data flow in the DFD has one data dictionary entry.
b. Definitions must be readily accessible by name.
c. There should be no redundancy in data definition.
e. All of the above.
40. The procedure for evaluating relative performance of defferent systems is referred to as:
a. Parallel processing.
b. Bench marking.
c. Comparative analysis.
d. Standard Evaluation.
41. The variable used to change the secondary prom string is:
a. PS3
b. PS1
c. PS2
d. Not possible.
42. The command used to send signals to specified job:
a. send
b. kill
c.
d. kill
43. When the complesity of a problem domain is modeled in an Object Oriented design, it takes the form of a
a. Hierarchy b. Graph c. Tree d. none
44. Which of the following statements is true?
a. An object has a state, behaviour and identity.
b. An object has only state and behaviour.
c. An object has only behaviour and identity.
d. An object has state and identity.
45. Object Oriented Analysis is a method
a. In which the system is viewed as a set of autonomous agents that collaborate to perform higher level behaviour.
b. In which programs are organized as co-operative collection of objects, each of which represents an instance of some classes
and whose classes are all a members of a hierarchy classes united via inheritance relationships.
c. Encompassing the process of object oriented decomposition and a notation for depicting both logical and physical as well as
static and dynamic models of a system.
d. That examines requirements from the perspective of the classes and objects fount in the vocabulary of the problem domain.
46. Encapsulation constitutes:
a. Identifying the essential characteristics of and obhect.
b. Separation of contractual interface of an abstraction and its implementation.
c. The property of a system that is decomposed into a set of acohesive and loosely coupled modules.
d. Ordering of abstractions.
47. The enforcement of the class of anf object is reffered to as:
a. Modularity b. Abstraction c. Typing d. Binding
48.The Gateway and the Router are used in the following sense :
a. Gateway moves the data between different networks of the same protocol and the Router moves the data between different
network of different protocol.
b. Gateway moves the data between different networks if different protocols and the Router moves the data berween different
network of the same protocol.
c. Gateway and the router are used for security.
d. None of the above.
49. Which of the following is a Network Mamagement Protocol?
a.DNS
B.CMIP
C.TELLNET
D.TCPMP
50. ip uses 4bytes addressing.how many butes address IPX usesa.12
b.16
c.8
d.10
51.IPaddress192.10.100.3is an example of the class
a.A
b.B
c.C
d.D
52.in TCP/IP protocol suite the protocol which controls the flow of data isa.ARP
b.ICMP
c.RARP
d.IP
53.ARPprotocol is used toa.map IP address to physical address
b.map EthernetAddress to IP address
c.both of above
d.none of above
54.what is the output ofthe two echo commands
$export x
$x=1
$sh $echo sx
$x=2
$ctrl-d leave this shell
$echo$sx
a.1,1
b.1,2
c.blank,2
d.none oe abovge
55.the command
$sleep10;date&
a.sleep and date both run simultanously in background
b.sleep and date both run simultanously,sleep in foreground and date in background
c.after sleep finishes running in foreground than date runs in foreground
d.none
56.following are the contents of a file file
echo $#
echo $*
echo$0
echo $1
what would be output of following
$ shfiles 1,2,3
a.3
1,2,3
file
1
b.1,2,3
4
1
2
c.file 1
4
1
2
d.none
57what will be the outputs of the following commands
expr 4+3
expr14/3
expr 4\*3
expr 4*3
a. 7,2,8,syntax error,12
b.7,2,8,12,syntax error
c.7,2,1,12
d.7,2,12,syntax error
58which of th statement is not true forsticky bit.
a.can be set for a file.
b.has no efect if thefile nis a dir.
c.tells unix to leave an executable in a memo ry after a program has finished executaion
d.none
59.make utility is
a.an editor on unix
b.to restor the system status
c.a utility for devlopment of program
d.none
60.th e following input is absent on a romchip as compared to ram chipa.read input
b. write input
c. chipselect
d. both a & b
61.the digital computer has memory unit with 8 bits per word. the struction set consist of six different
operation.each struction is stored in one word of memoryand consistof opcud part and address part . how many words can be
address in memory
a.32
b.64
c.128
d.256
62.output of following will be
#include
main()
{
char p="A";
int q=65;
switch(1)
{
case 1:
printf("%dand %c",p.,q);
printf("%cand%d",p,q);
}
}
a.A AND 65
b.65 AND A
c.A and 65
65 and A
d.65 and A
A and 65
63.output of following will be
# include
#include
main()
{
unsigned short p=pow(2,15)+pow(2,9)+pow(2,6)+poe(2,0); //33345
char c;
c=p;
printf("%c/n",c);
}
a.33345
b.45
c.A
d.none
64. p in following statement is
int (*p(char *a))[10];
a.integer
b.array
c.fuction
d.pointer
65.value of expression *(((p))name +2))) at the end of programm will be
#include
main()
{
struct account
{
int accno,
char *name;
float balance;
}
agent *p=&agent;
agent.name=tom smith;
a.tom smith
b.o
c.m
d.none of this
66.state which one is corerect SQL
a.
SELECT STORE ID.SUM(QTY*PRICE)
FROM SALES .TITLES
WHERE TITLES.TITLE_.ID=SALE.TITLE_ID
ORDER BY TITLE_ID
b.
SELECT STORE _ID ,SUM( QTY*PRICE)
FROM SALES,SALES
WHERE TITLES .TITLES_ID=SALES .TITLE_ID
GROUP BY STORE_ID ]
c.
_SELECT STORE _ID ,SUM( QTY*PRICE)
FROM SALES,SALES
GROUP BY STORE_ID
WHERE TITLES .TITLE_ID+SALES.TITLE_ID
d.
SELECT STORE _ID ,SUM( QTY*PRICE)
FROM SALES,SALES
ORDER BY TITLE_ID
WHERE TITLES .TITLE_ID=SALES.TITLE_ID
67which type of join is used in following SQL
SELECT STORE_NAME.PUB_ID
FROM PUBLISHER .STORES
WHERE NOT PUBLISHER.STATE=STORES .STATE
a.EQUIJOIN
B.THETAJOIN
C.NOTQUIJOIN
D NONE OF THIS
68.
EMPLOYEE DEPARTMENT
empid name deptid deptid deptname
.1 A 11 11 AAAAA
2 B 11 22 BBBBB
3 C 22 33 CCCCC
4. D 22
5 E 23
SELECT NAME .DEPT_ID.DEPT_NAME
FROM EMPLOYEE EM.DEPARTMENT DP
WHERE EMDEPT _ID =DP.DEPT_ID
GROUP BY DEPT_ID
which is the correct result set out of above SQL and table data
a. A 11 AAAAA
B 11 AAAAA
C 22 BBBBB
D 22 BBBBB
D 33 CCCCC
b;
A 11 AAAAA
C 22 BBBBB
E 33 CCCCC
C.
B 11 AAAAA
D 22 BBBBB
E 33 CCCCC
D.NONE
69.11.2 'S complement of binary 110110101id
a.001001010
b.1101110101
c.001001011
d.101001010
70.equivalent octal number for binary 10001010111
a. 2127
b.1227
c.2217
d.1111
71.while exucuting a programm if the 8085/8080A MPU fetches the machine code located at the memory address 2057H then
jthe content of the programm counter is
a.2056H
B.2057H
C.2058H
D.2059H
72number of address line required on the chip of 2k memory
a.10
b.11
c.12
d16
73.the sequence followed bby the storage and retrieval of data bytes on the stacks
a.FIFO
B.LIFO
C.FILO
D.LILO
74.another name for RS flip flop
a.a stable multivibrator
b.bistable multivibrator
c.monostable multivibrator
d.oscillotor
75.equivelent BCD representation of binary 1100010
a.01100010
b.10011000
c.1100010
d.11000100
CSC OFF Campus Recruitment Process Latest 2012 -Selection Procedure Questions of CSC Placement
Paper|on March 28 and 28,2012
CSC Written Test Pattern|CSC Technical Written Test Pattern|CSC HR and Technical Interview Pattern
and Questions
CSC Latest Test Pattern and Selection Procedure
In CSC Selection there are 5 rounds
1.
Written Test-Quantitative aptitude
2.
Written Test-Technical
3.
Group Discussion
4.
Technical Hr
5.
Personal HR
After each section 15 minutes break
CSC Written test consists 2 sectiions
1.Written Test-Quantitative aptitude
No of Questions : 40
Time limit : 40
(CSC aptitude covered all the topics from verbal, Non verbal. It will be useful if you refer R.S. Aggarwal
book but as previous years, the questions were not repeated. It was a totally new set of questions and
you cannot rely much on old placement papers of CSC )
Topics to concentrate
1.
Blood Relation
2.
Time and Distance
3.
Condition and Assumptions
4.
Some logical questions
CSC Technical Written test
CSC Technical Written Test
2.Written Test-Technical
No of questions : 70
Time limit: 75 Minutes
10 Minutes for essay writing( 4topics will given in the paper and u have to write backside of the paper itself. In this
written communication is important)
CSC Topics to Tech
O.S,D.S,DBMS,C language ,Microprocessor
Elimintion round
CSC Group Discussion Topics
3. Group Discussion
CSC Previous Years GD Topics
"Who is your Role Model and why?".
"Which is best? love or arranged marrriage?",
"Is public sector or private sector jobs are best?"
Also an elimination round-Given a topic
Way of putting points,body language etc.,
1 topic-Uses of microprocessor to start and costless
2.Single window system (common to all )
CSC Technical andHR interview Questions
4.Technical HR
Questions relate to C,C+,DBMS,O.S etc
5 Personal HR
About your college
Difficult situation how you overcome
Family background etc.,
Download