http://www.indiabix.com/placement-papers/csc/ http://placement.freshersworld.com/placement-papers/company/CSC%20/224 http://www.m4maths.com/placement-puzzles.php?SOURCE=csc http://www.vyoms.com/placement-papers/companies/details/csc-india-pvt-ltd-1249.asp Company Profile WE ARE LOCATED WHERE OUR CLIENTS NEED US In addition to our headquarters in Falls Church, Virginia, USA, and three other major offices in Australia, Asia and Europe, our 98,000 professionals serve clients in more than 90 countries. WHAT WE DO For more than 50 years, we at CSC have developed smart, technology-enabled solutions to solve our clients' toughest challenges, demonstrating a commitment to excellence and a passion for exceeding expectations. Over the past five decades, technology has radically changed the world we live in. We have remained at the forefront of our business because we have understood how to use technology change and innovation to deliver value to our clients. WE DO AMAZING THINGS We are often asked, "What is it that you do?" We tell them, humbly and yet truthfully: we do amazing things. We help solve big challenges. Technically complex, mission-critical challenges. Watch our video, which brings to life a few of those challenges through four short case studies. Or, read from a list of hundreds of our client success stories. FIFTY+ YEARS OF SUCCESS It started with two men who had a dream. From the moment CSC was born on April 16, 1959, ingenuity has been a driving force behind our success. Explore our rich history. COMPANY PROFILE Read a concise description of our services, financial data, strategic programs and representative client engagements (PDF, 320 KB). Or download our Company Profile Infographic (PDF). OUR MANAGEMENT TEAM Our senior management team has an average of 25 years of domestic and international IT experience and a strong history of business, academic and technological accomplishments. FINANCIAL PERFORMANCE CSC (NYSE: CSC) reported trailing 12 months revenue of $15.9 billion for the third quarter ending March 30, 2012. Our Mission and Values CSC'S Mission The mission of CSC is to be a global leader in providing technology-enabled business solutions and services. Our Values are Clear CLIENT FOCUSED Our success derives from a deep understanding of our clients, to whom all of CSC is committed to deliver exceptional service and value. LEADERSHIP We lead from the front, displaying our integrity and using facts to support our straight talk. We create an environment for positive change built on collaboration and trust. EXECUTION EXCELLENCE We insist on excellence in all we do for clients and ourselves, striving always for recognition among the leaders in our industry. ASPIRATION We aspire individually and collectively to be more tomorrow than we are today. RESULTS We accept individual responsibility for our commitments and expect to be accountable for results. Diversity Statement We value the diversity of our employees and the unique perspectives they bring to CSC. Diversity at CSC not only includes age, race, sex, sexual orientation/gender identity, genetic information, disabilities, and ethnicity, but also jobs and functional roles within the company, the markets and clients we serve, our geographic locations, educational background and whether one joined CSC independently or through an acquisition or outsourcing arrangement. By valuing these differences, we demonstrate our commitment to treating everyone with fairness and respect. CSC Company Profile CSC (Computer Sciences Corporation) is a leading information technology (IT) services company. CSC’s mission is to be a global leader in providing technology-enabled business solutions and services.The company is one of the leading outsourcing solutions providers in the world. It has a strong position in providing IT services to government customers. CSC also provides business process outsourcing, managing key functions for clients, such as procurement and supply chain, call centers and customer relationship management, credit services, claims processing and logistics. I/T and professional services include systems integration, consulting and other professional services. Systems integration encompasses designing, developing, implementing and integrating complete information systems. Consulting and professional services includes advising clients on the strategic acquisition and utilization of I/T and on business strategy, security, modeling, simulation, engineering, operations, change management and business process reengineering. With approximately 90,000 employees, CSC provides innovative solutions for customers around the world by applying leading technologies and CSC’s own advanced capabilities. These include systems design and integration; IT and business process outsourcing; applications software development; Web and application hosting; and management consulting. Headquartered in Falls Church, Va., CSC reported revenue of $16.5 billion for the 12 months ended March 28, 2008. Specialties Consulting, IT, Systems Integration, Outsourcing Headquarters Washington D.C. Metro Area Industry Information Technology and Services Type Public Company Status Operating Company Size 90,000 employees 2008 Revenue $16,500 Founded 1959 Contact 3170 Fairview Park Drive Falls Church, VA 22042 United States CSC India CSC started its operations in India in 1991. With centers in Noida, Indore, Hyderabad, Chennai, Mumbai, Bangalore and Vadodara, and approximately 19,000 employees, CSC is one of the fastest growing IT services firms in India. CSC’s strong local presence enables the company to offer high-value technology solutions and a rich portfolio of services to customers across industry segments, including applications development and product support, infrastructure and BPO services, to clients worldwide. CSC in India is consistently recognized in “best employer” award categories and houses the company’s first Office of Innovation outside the U.S. For the parent company that has a presence in 92 countries, India is the third largest delivery location in the world. CSC India serves most of the parent company's clients based in North America and Europe. The company is present in domains like insurance, banking, healthcare, retail, defense manufacturing, retail and others. Nearly 33 per cent of the parent company's revenue is derived from the American government, 19 per cent from defense, 17 per cent from financial services and the balance from other segments. CSC’s mission is to help clients achieve strategic goals and profit from the use of Information Technology. CSC India offers applications services, product development and support services, infrastructure services, IT outsourcing and BPO services to clients worldwide. With a winning combination of strong functional knowledge, in-depth technological expertise, uncompromised process rigour and world class industry standards and compliance in place, CSC India has consistently built upon its experience to deliver business results in the global information technology marketplace, thus earning the trust of some of the world’s biggest organisations. The company is hiring freshers as well as experienced hands. "Nearly 10-15 per cent of the recruitments are freshers. Our attrition rate is 14 per cent." They have centres at Hyderabad, Chennai, Bangalore, Mumbai, Noida, Indore, Vadora etc Contact Building #7, Mind Space IT Park, Survey #64, Part APIIC Software Layout Madhapur, Hitech City, Hyderabad (AP) - 500 081 Technical round 1.------- is associated with webservices. a) WSDL b) WML c) web sphere d) web logic 2.Any large single block of data stored in a database, such as a picture or sound file, which does not include record fields, and cannot be directly searched by the database’s search engine. a) TABLE b) BLOB c) VIEW d) SCHEME 3.Areserved area of the immediate access memeory used to increase the running speed of the computer program. a) session memory b) bubble memory c) cache memory d) shared memory 4.A small subnet that sit between atrusted internal network and an untruster external network, such as the public internet. a) LAN b) MAN c) WAN d) DMZ 5.Technologies that use radio waves to automatically identify people or objects,which is very similar to the barcode identification systems,seen in retail stores everyday. a)BLUETOOTH b) RADAR c)RSA SECURE ID d)RFID 6.main(){ float fl = 10.5; double dbl = 10.5 if(fl ==dbl) printf(“UNITED WE STAND”); else printf(“DIVIDE AND RULE”) } what is the output? a)compilation error b)UNITED WE STAND c)DIVIDE AND RULE d)linkage error. 7.main(){ static int ivar = 5; printf(“%d”,ivar--); if(ivar) main(); } what is the output? a)1 2 3 4 5 b) 5 4 3 2 1 c)5 d)compiler error:main cannot be recursive function. 8.main() { extern int iExtern; iExtern = 20; printf(“%d”,iExtern); } what is the output? a)2 b) 20 c)compile error d)linker error 9..#define clrscr() 100 main(){ clrscr(); printf(“%d\n\t”, clrscr()); } what is the output? a)100 b)10 c)compiler error d)linkage error 10.main() { void vpointer; char cHar = ‘g’, *cHarpointer = “GOOGLE”; int j = 40; vpointer = &cHar; printf(“%c”,*(char*)vpointer); vpointer = &j; printf(“%d”,*(int *)vpointer); vpointer = cHarpointer; printf(“%s”,(char*)vpointer +3); } what is the output? a)g40GLE b)g40GOOGLE c)g0GLE d)g4GOO 11.#define FALSE -1 #define TRUE 1 #define NULL 0 main() { if(NULL) puts(“NULL”); else if(FALSE) puts(“TRUE”); else puts(“FALSE”); } what is the output? a)NULL b)TRUE c)FALSE d)0 12.main() { int i =5,j= 6, z; printf(“%d”,i+++j); } what is the output? a)13 b)12 c)11 d)compiler error 13.main() { int i ; i = accumulator(); printf(“%d”,i); } accumulator(){ _AX =1000; } what is output? a)1 b)10 c)100 d)1000 14.main() { int i =0; while(+(+i--)!= 0) i- = i++; printf(“%d”,i); } what is the output? a)-1 b)0 c)1 d)will go in an infinite loop 15.main(){ int i =3; for(; i++=0;) printf((“%d”,i); } what is the output? a)1 b)2 c)1 2 3 d)compiler error:L value required. 16.main(){ int i = 10, j =20; j = i ,j?(i,j)?i :j:j; printf(“%d%d”,i,j); }what is the output? a)20 b)20 c)10 d)10 17.main(){ extern i; printf(“%d\t”,i);{ int i =20; printf(“%d\t”,i); } } what is output? a) “Extern valueof i “ 20 b)Externvalue of i” c)20d)linker Error:unresolved external symbol i 18.int DIMension(int array[]){ return sizeof(array/sizeof(int);} main(){ int arr[10]; printf(“Array dimension is %d”,DIMension(arr)); } what is output? a)array dimension is 10 b)array dimension is 1 c) array dimension is 2 d)array dimension is 5 19.main(){ void swap(); int x = 45, y = 15; swap(&x,&y); printf(“x = %d y=%d”x,y); } void swap(int *a, int *b){ *a^=*b, *b^=*a, *a^ = *b; what is the output? a) x = 15, y =45 b)x =15, y =15 c)x =45 ,y =15 d)x =45 y = 45 20.main(){ int i =257; int *iptr =&i; printf(“%d%d”,*((char*)iptr),*((char *)iptr+1)); } what is output? a)1, 257 b)257 1 c)0 0 d)1 1 21.main(){ int i =300; char *ptr = &i; *++ptr=2; printf(“%d”,i); } what is output? a)556 b)300 c)2 d)302 22.#include main(){ char *str =”yahoo”; char *ptr =str; char least =127; while(*ptr++) least = (*ptr printf(“%d”,least); } what is the output? a)0 b)127 c)yahoo d)y 23.Declare an array of M pointers to functions returing pointers to functions returing pointers to characters. a)(*ptr[M]()(char*(*)()); b)(char*(*)())(*ptr[M])() c)(char*(*)(*ptr[M]())(*ptr[M]() d)(char*(*)(char*()))(*ptr[M])(); 24.void main(){ int I =10, j=2; int *ip = &I ,*jp =&j; int k = *ip/*jp; printf(“%d”,k); } what is the output? a)2 b)5 c)10 d)compile error:unexpected end of file in comment started in line 4 25.main(){ char a[4] =”GOOGLE”; printf(“%s”,a); } what is the output? a)2 b) GOOGLE c) compile error: yoo mant initializers d) linkage error. 26.For 1MB memory, the number of address lines required a)12 b)16 c)20 d)32 27.There is a circuit using 3 nand gates with 2 inputes and 1 output,f ind the output. a) AND b) OR c) XOR d) NAND 28.what is done for push operation a) SP is incremented and then the value is stored. b) PC is incremented and then the value is stored. c) PC is decremented and then the value is stored. d) SP is decremented and then the value is stored. 29.Memory allocation of variables declared in a program is -----a) Allocated in RAM b) Allocated in ROM c) Allocated in stack d) Assigned in registers. 30.What action is taken when the processer under execution is interrupted by TRAP in 8085MPU? a) Processor serves the interrupt request after completing the execution of the current instruction. b) processer serves the interrupt request after completing the current task. c) processor serves the interrupt immediately. d) processor serving the interrupt request depent deprnds upon the priority of the current task under execution. 31.purpose of PC (program counter)in a microprocessor is ---a) To store address of TOS(top of stack) b) To store address of next instructions to be executed c) count the number of instructions d) to store the base address of the stack. 32.conditional results after execution of an instruction in a microprocess is stored in a) register b) accumulator c) flag register d) flag register part of PSW (program status word) 33.The OR gate can be converted to the NAND function by adding----gate(s)to the input of the OR gate. a) NOT b) AND c) NOR d) XOR 34.In 8051microcontroller ,------has a dual function. a) port 3 b) port 2 c) port 1 d) port 0 35.An 8085 based microprocessor with 2MHz clock frequency,will execute the following chunk of code with how much delay? MVI B,38H HAPPY: MVI C, FFH SADDY: DCR C JNZ SADDY DCR B JNC HAPPY a) 102.3 b)114.5 c)100.5 d)120 36.In 8085 MPU what will be the status of the flag after the execution of the following chunk of code. MVI B,FFH MOV A,B CMA HLT a)S = 1, Z = 0, CY = 1 b)S = 0, Z = 1, CY = 0 c) S = 1, Z = 0, CY = 0 d)S = 1, Z = 1 ,CY = 1 37.A positive going pulse which is always generated when 8085 MPU begins the machine cycle. a) RD b) ALE c) WR d) HOLD 38.when a ----- instruction of 8085 MPU is fetched , its second and third bytes are placed in the W and Z registers. a) JMP b) STA c) CALL d) XCHG 39.what is defined as one subdivision of the operation performed in one clock period. a) T- State b) Instruction Cycle c) Machine Cycle d) All of the above 40.At the end of the following code, what is the status of the flags. LXI B, AEC4H MOV A,C ADD B HLT a) S = 1, CY = 0, P = 0 , AC = 1 b) S =0 , CY = 1, P = 0,AC = 1 c) S = 0, CY = 1, P = 0 , AC = 1 d) S = 0, CY = 1, P = 1 , AC = 1 41. In 8051 micro controller what is the HEX number in the accumulator after the execution of the following code. MOV A,#0A5H CLR C RRC A RRC A RL A RL A SWAP A a)A6 b)6A c)95 d)A5. 42. The Pentium processor requires ------------ volts. a)9 b)12 c)5 d)24. 43. The data bus on the Celeron processor is-------bits wide. a)64 b)32 c)16 d)128. 44. K6 processor a) Hitachi b) toshiba c) zilog d) AMD. 45. What is the control word for 8255 PPI,in BSR mode to set bit PC3. a)0EH b)0FH c)07H d)06H. 46. The repeated execution of a loop of code while waiting for an event to occur is called ---------.The cpu is not engaged in any real productive activity during this period,and the process doesn’t progress towards completion. a) dead lock b) busy waiting c) trap door d) none. 47. Transparent DBMS is defined as a) A DBMS in which there are no program or user access languages. b) A DBMS which has no cross file capabilities but is user friendly and provides user interface management. c) A DBMS which keeps its physical structure hidden from user d) none. 48. Either all actions are carried out or none are.users should not have to worry about the effect of incomplete transctions.DBMS ensures this by undoing the actions of incomplete transctions.this property is known as a) Aggregation b) atomicity c) association d) data integrity. 49..------ algorithms determines where in available to load a program. common methods are first fit,next fit,best fit.--------- algorithm are used when memory is full , and one process (or part of a process) needs to be swaped out to accommodate a new program.The ------------- algorithm determines which are the partions to be swaped out. a) placement, placement, replacement b) replacement, placement, placement c) replacement, placement, replacement d) placement, replacement, replacement 50. Trap door is a secret undocumented entry point into a program used to grant access without normal methods of access authentication.A trap is a software interrupt,usually the result of an error condition. a)true b)false. 51. Given a binary search tree,print out the nodes of the tree according t5o post order traversal. 4 /\ 25 /\ 13 a)3,2,1,5,4. b)1,2,3,4,5. c)1,3,2,5,4. d)5,3,1,2,4. 52. Which one of the following is the recursive travel technique. a)depth first search b)preorder c)breadth first search d)none. 53. which of the following needs the requirement to be a binary search tree. a) 5 /\ 27 / 1 b) 5 /\ 67 c) 5 /\ 27 /\ 16 d) none. 54. In recursive implementations which of the following is true for saving the state of the steps a)as full state on the stack b) as reversible action on the stack c)both a and b d)none 55. which of the following involves context switch a)previliged instruction b)floating point exception c)system calls d)all e)none 56. piggy backing is a technique for a)acknowledge b)sequence c)flow control d)retransmission 57. a functional dependency XY is ___________dependency if removal of any attribute A from X means that the dependency does not hold any more a)full functional b) multi valued c)single valued d)none 58. a relation schema R is in BCNF if it is in ___________and satisfies an additional constraints that for every functional dependency XY,X must be a candidate key a)1 NF b)2 NF c)3 NF d)5 NF 59. a _________sub query can be easily identified if it contains any references to the parent sub query columns in the _________ clause A) correlated ,WHERE b) nested ,SELECT c) correlated,SELECT d) none 60. hybrid devise that combines the features of both bridge and router is known as a)router b)bridge c)hub d)brouter 61. Which of the following is the most crucial phase of SDLC a)testing b)code generation c) analysys and design d)implementation 62. To send a data packet using datagram ,connection will be established a)no connection is required b) connection is not established before data transmission c)before data transmission d)none 63. A software that allows a personal computer to pretend as as computer terminal is a) terminal adapter b)terminal emulation c)modem d)none 64. super key is a) same as primary key b) primary key and attribute c) same as foreign key d) foreign key and attribute 65. In binary search tree which traversal is used for ascending order values a) Inorder b)preorder c)post order d)none 66. You are creating an index on ROLLNO colume in the STUDENT table.which statement will you use? a) CREATE INDEX roll_idx ON student, rollno; b) CREATE INDEX roll_idx FOR student, rollno; c) CREATE INDEX roll_idx ON student( rollno); d) CREATE INDEX roll_idx INDEX ON student (rollno); 67. A________class is a class that represents a data structure that stores a number of data objects a. container b.component c.base d.derived 68. Which one of the following phases belongs to the compiler Back-end. a. Lexical Analysis b.Syntax Analysis c. Optimization d.Intermediate Representation. 69. Every context _sensitive language is context_free a. true b.false 70. Input:A is non-empty list of numbers L Xß-infinity For each item in the list L,do If the item>x,then Xßthe item Return X X represents:a)largest number b)smallest number c)smallest negative number d) none 71. Let A and B be nodes of a heap,such that B is a child of A. the heap must then satisfy the following conditions a)key(A)>=key(B) b)key(A) c)key(A)=key(B) d)none 72. String ,List,Stack,queue are examples of___________ a)primitive data type b)simple data type c)Abstract data type d)none 73. which of the following is not true for LinkedLists? a)The simplest kind of linked list is a single linked list ,which has one link per node .this link points to the next node in the list,or to a null value or emptylist if it is the last node. b)a more sophisticated kind of linked list is a double linkedlist or two way linkedlist .Each node has two links ,one to the previous node and one to the next node. c) in a circleLinkedList ,the first and last nodes are linked together.this can be done only for double linked list. d) to traverse a circular linkedlist ,u begin at any node and follow the list in either direction until u return to the original node. 74. sentinel node at the beginning and /or at the end of the linkedlist is not used to store the data a) true b) false Logged 1. Most important advantage of an IC is its A. Easy replacement in case of circuit failure B. Extremely high reliability C. Reduced cost D. Low power consumption E. None of the above Ans-B 2. Which programming language is much in vogue among users of microcomputers A. ALGOL B. APL C. LOGO D. FORTH E. None of the above Ans-D 3. Multiplication of 1112 by 1012 is A. 1100112 B. 1000112 C. 1111002 D. 0001012 E. None of the above Ans-B 4. A computer-controlled device for training exercises that duplicates the work environment is a: A. simulator B. duplicator C. trainer D. COM device E. None of the above Ans-A 5. The latest PC keyboards use a circuit that senses the movement by the change in its capacitance. What are these keyboards called? A. Capacitance keyboards B. Mechanical keyboards C. Qwerty keyboards D. Dvorak keyboards E. None of the above Ans-A 6. Find the output of the program char *foo() { char result[100]); strcpy(result,"anything is good"); return(result); } void main() { char *j; j=foo() printf("%s",j); } 7. Find the output of the program void main() { char *s[]={ "dharma","hewlett-packard","siemens","ibm"}; char **p; p=s; printf("%s",++*p); printf("%s",*p++); printf("%s",++*p); } 8. write 7*a in terms of +,-,<< 9. What is Creon and what is the difference between 'at' command. 10. Find the output of the program main(){ char *s1 = "hello",*s2 ="abce"; strcpy(s1,""); s2[0] = s1[0]; printf("%d%d",strlen(s1),strlen(s2)); } 11. What was originally called the "imitation game" by its creator? A. The Turing Test B. LISP C. The Logic Theorist D. Cybernetics E. None of the above Ans-A 12. Find the output of the program void main() { unsigned i=1; /* unsigned char k= -1 => k=255; */ signed j=-1; /* char k= -1 => k=65535 */ /* unsigned or signed int k= -1 =>k=65535 */ if(i<j) printf("less"); else if(i>j) printf("greater"); else if(i==j) printf("equal"); } Ans-less 13. A number that is used to control the form of another number is known as A. Map B. Mask C. Mamtossa D. Marker E. None of the above Ans-B 14. ASCII stands for A. American standard code for information interchange B. All purpose scientific code for information interchange C. American security code for information interchange D. American Scientific code for information interchange E. None of the above Ans-A 15. The list of coded instructions is called A. Computer program B. Algorithm C. Flowchart D. Utility programs E. None of the above Ans-A 16. In LISP, the atom that stands for "true" is A. t B. ml C. y D. time E. None of the above Ans-A 17. Which two files are used during operation of the DBMS? A. query language and utilities B. data manipulation language and query language C. data dictionary and transaction log D. data dictionary and query language E. None of the above Ans_C 18. A network schema A. restricts the structure to a one-to-many relationship B. permits many-to-many relation¬ships C. stores data in tables D. All of the above E. None of the above Ans_B 19. self-relocating program is one which A. cannot be made to execute in any area of storage other than the one designated for it at the time of its coding or translation B. consists of a program and relevant information for its relocation C. can itself perform the relocation of its address-sensitive portions D. All of the above Ans-C 20. Write a program to exchange the values of two variables using pointers. 21. Write program to open one file input some numbers and find smallest, largest, avg. and store them in another file 22. Write a program to reverse a string co-ordinate geometry. 23. Find the output of the program #include main() { int x=20, t; &t=x; x=50; cout<<x<<" "<<t; } 24. What hardware architectures are not supported by Ret Hat? A. SPARC B. IBM-compatible C. Alpha D. Macintosh E. None of the above Ans-D 25. What command do you use to create Linux file systems? A. fdisk B. mkfs C. fsck D. mount E. None of the above Ans-D 26. Find the output of the program #include<stdio.h> main() { char *p1; char *p2; p1=(char *) malloc(25); p2=(char *) malloc(25); strcpy(p1,"Ramco"); strcpy(p2,"Systems"); strcat(p1,p2); printf("%s",p1); } 27. What command is used to count just the number of lines contained in a file?(Linux) A. wc - r B. wc - w C. wc - c D. wc - l E. None of the above Ans-D 28. The probability that a single bit will be in error on a typical public telephone line using 4800 bps modem is 10 to the power -3. If no error detection mechanism is used, the residual error rate for a communication line using 9-bit frames is approximately equal to A. 0.003 C. 0.991 B. 0.009 D. 0.999 Ans-B 29. which of the following condition is used to transmit two packets over a medium at the same time? A. Contention B. Collision C. Synchronous D. Asynchronous E. None of the above Ans-B Questions 30 -34 are reference to the following pseudo code { input m,n,z TEST:if ((m+n)/3&gt;5)z=z+1 else z =z-1 printf m,n,z { (m-m+1;n=n-3) if (m+n+2)>14 then goto test print m,n,z end } 30. How many times the TEST exacted if the input is 1,18,2? Ans- four times 31. What are the values taken by Z when input being 8,24,1? a) only 5 b) only 6 c) neither 5 or 6 d) both 5 and 6 ans-D. 32. what is the final output if the input is 1,18,2? (m,n,z) ans- 5,6,2 33. what is the final output of the if the input is 2,14,12 (m,n,z) a)1,8,4 b)1,4,8 c)4,8,1 d )8,4,2 ans=C. 34. How many times is TEST execute ed if the input is 2,14,1? ans) twice 35. What will be thethe remainder when 9FA (hexa) is divided by 8 is added to the 12(to base ten) to get x.then x has the binary operation 36. Find the odd man out a) Intel b)motorola c)nec ans =nec 37. Find the output of the program main() { int i=3 printf (&quot;%d %d %d &quot;,++i,i-,i+=5); } 38. Find the output of the program main() { int times =5; int i=3; int j=4; int k=34; i=j+k; while(times --) { i=times j=times k=times } d)Ibm printf(&quot;%d %d %d &quot; ,i,j,k) } 39. Find the output main() { int number =25; char name ='A' printf("The addition of the name and the number is %o "name +_number) } Ans-Compiler error 40. computer viruses can spread from one system to anther by means of a) Infected disks b )links to a network c) downloaded program from a bulletin board d )all of the program ans)D 41. what do you mean by exception handling? 42. What are "pure virtual" functions? 43. What is the difference between member functions and static member functions? 44. What is the4 difference between delete[] and delete? 45. Difference between function overloading and function overriding. 46. How to invoke a C function using a C++ program? 47. Convert 0.9375 to binary a) 0.0111 b) 0.1011 c) 0.1111 d) none Ans. (c) 48. In C, "X ? Y : Z " is equal to a) if (X==0) Y ;else Z b) if (X!=0) Y ;else Z c) if (X==0) Y ; Z Ans. (b) 49. The following function gives some error. What changes have to be made void ( int a,int b) { int t; t=a; a=b; b=t; } a) define void as int and write return t b) change everywhere a to *a and b to *b 50. Which of the following is incorrect a) if a and b are defined as int arrays then (a==b) can never be true b) parameters are passed to functions only by values c) defining functions in nested loops 51. #include<stdio.h> void swap(int*,int*); main() { int arr[8]={36,8,97,0,161,164,3,9} for (int i=0; i<7; i++) { for (int j=i+1; j<8;j++) if(arr[i]<arr[j]) swap(&arr[i],&arr[j]); } } void swap(int*x,int*y) { int temp; static int cnt=0; temp= *x; *x=*y; *y=temp; cnt++; } What is cnt equal to 52. int main() { FILE *fp; fp=fopen("test.dat","w"); fprintf(fp,'hello\n"); fclose(fp); fp=fopen ("test.dat","w"); fprintf (fp, "world"); fclose(fp); return 0; } If text.dat file is already present after compiling and execution how many bytes does the file occupy ? a) 0 bytes b) 5 bytes c) 11 bytes d) data is insufficient 53. Find the output of the program f1(int*x,intflag) int *y; *y=*x+3; switch(flag) { case 0: *x=*y+1; break; case 1: *x=*y; break; case 2: *x=*y-1; break; } return(*y) main() { *x=5; i=f1(x,0); j=f1(x,1); printf("%d %d %d ",i,j,*x); } 54. What does the following program print? #include <stio.h> int sum,count; void main(void) {< BR> for(count=5;sum+=--count;) printf("%d",sum); } 55. What is the output of the following program? #include <stdio.h> void main(void) { int i;< BR> for(i=2;i<=7;i++) printf("%5d",fno()); } fno() { staticintf1=1,f2=1,f3; return(f3=f1+f2,f1=f2,f2=f3); } 56. What is the output of the following program? #include <stdio.h> #include <string.h> int foo(char *); void main (void) { char arr[100] = {"Welcome to CSC"}; foo (arr); } foo (char *x) { printf ("%d\t",strlen (x)); printf ("%d\t",sizeof(x)); return0; } 57. What is the output of the following program? #include <stdio.h> #define sum (a,b,c) a+b+c #define avg (a,b,c) sum(a,b,c)/3 #define geq (a,b,c) avg(a,b,c) >= 60 #define lee (a,b,c) avg(a,b,c) <= 60 #define des (a,b,c,d) (d==1?geq(a,b,c):lee(a,b,c)) void main (void) { int num = 70; char ch = '0'; float f = 2.0; if des(num,ch,f,0) puts ("lee.."); else puts("geq..."); } 58. What does the following program print? #include <stdio.h> char *rev(int val); void main(void) { extern char dec[]; printf ("%c", *rev); } char *rev (int val) { char dec[]="abcde"; return dec; } 59. What does the following program print? #include<stdio.h> void main(void) { enum sub { chemistry, maths, physics }; struct result { char name[30]; enum sub sc; }; struct result my_res; strcpy (my_res.name,"Patrick"); my_res.sc=physics; printf("name: %s\n",my_res.name); printf("pass in subject: %d\n",my_res.sc); } 60. What is the output of the following program? #include <stdio.h> void swap (int x, int y, int t) { t = x; x = y; y = t; printf ("x inside swap: %d\t y inside swap : %d\n",x,y); } void main(void) { int x; int y; int t; x = 99; y = 100; swap (x,y,t); printf ("x inside main:%d\t y inside main: %d",x,y); } a. x inside swap : 100 y inside swap : 99 x inside main : 100 y inside main : 99 b. x inside swap : 100 y inside swap : 99 x inside main : 99 y inside main : 100 c. x inside swap : 99 y inside swap : 100 x inside main : 99 y inside main : 100 d. x inside swap : 99 y inside swap : 100 x inside main : 100 y inside main : 99 e. Not sure 61. What does the following program print? #include <stdio.h> struct my_struct { int p:1; int q:1; int r:6; int s:2; }; struct my_struct bigstruct; struct my_struct1 { char m:1; }; struct my_struct1 small struct; void main (void) { printf ("%d %d\n",sizeof (bigstruct),sizeof (smallstruct)); } 62. What is the output of the following program? #include <stdio.h> void main (void) { short x = 0x3333; short y = 0x4321; long z = x; z = z << 16; z = z | y; printf("%1x\t",z); z = y; z = z >> 16; z = z | x; printf("%1x\t",z); z = x; y = x && y; z = y; printf("%1x\t",z); } 63. What is the output of the following program? #include <stdio.h> void main (void) { char *p = "Bangalore"; #if 0 printf ("%s", p); #endif } 64. What is the return type of calloc function? a. int * b. void * c. no return type: return type is void d. int e. Not sure 65. If x is declared as an integer, y is declared as float, consider the following expression: y = *(float *)&x; Which one of the following statments is true? a. the program containing the expression produces compilation errors; b. the program containing the expression produces runtime errors; c. the program containing the expression compiles and runs without any errors; d. none of the above e. Not sure 66. Which of the following refers to the associative memory? A. the address of the data is generated by the CPU B. the address of the data is supplied by the users C. there is no need for an address i.e. the data is used as an address D. the data are accessed sequentially E. None of the above Ans-C 67. is To avoid the race condition, the number of processes that may be simultaneously inside their critical section A. 8 B. 1 C. 16 D. 0 E. None of the above Ans-B 68. Which one of the following kinds of materials has the lowest permeability? A. A diamagnetic material B. A paramagnetic material C. A feiTomagnetic material D. All of the above E. None of the above Ans-A 69. he total impedance of a parallel RLC circuit: A. always increases as the applied frequency increases B. is equal to the sum of the values of resistance, inductive reactance and capacitive reactance C. always decreases as the applied frequency increases D. is maximum at the resonant frequency E. None of the above Ans-D 70. he rise time of a pulse waveform is the time required for the voltage to rise: A. from zero to its rms value B. from zero to its peak value C. from 10% of the peak value to 70.7% of the peak value D. from 10% of the peak value to 90% of the peak value E. None of the above Ans-D 71. Which of the following is(are) true of the EDP auditors? A. they should have computer expertise B. they will be replaced by traditional auditors in the near future C. two of the above D. currently, there is a very high demand for them, particularly from firms that use personal computers E. None of the above Ans-A 72. A lockbox service is used for A. depositing cash when bank is closed B. paying bank customer bills automatically C. storing papers in a bank vault D. depositing payments to bank customers E. None of the above Ans-D 73. Which of the following symbol modes are used to input of graphics to General CAD system? A. Live and Rectangle mode B. Arc and Circle mode C. Dimension and Alphanumeric mode D. All of the above E. None of the above Ans-D 74. What will be the output of the program? public class Test { public static int y; public static void foo(int x) { System.out.print("foo "); y = x; } public static int bar(int z) { System.out.print("bar "); return y = z; } public static void main(String [] args ) { int t = 0; assert t > 0 : bar(7); assert t > 1 : foo(8); /* Line 18 */ System.out.println("done "); } } Ans-foo done 75. Which of the following would compile without error? A. int a = Math.abs(-5); B. int b = Math.abs(5.0); C. int c = Math.abs(5.5F); D. int d = Math.abs(5L); Ans-A Aptitude 1. One year ago, the ratio of Roonie’s and Ronaldo’s age was 6: 7 respectively. Four years hence, this ratio would become 7: 8. How old is Ronaldo ? Ans-36 years 2. In what ratio must rice at Rs. 9.30 per kg be mixed with rice at Rs. 10.80 per kg so that the mixture be worth Rs. 10 per kg ? Ans-8:7 3. The milk and water in two vessels A and B are in the ratio 4 : 3 and 2: 3 respectively. In what ratio, the liquids in both the vessels be mixed to obtain a new mixture in vessel C containing half milk and half water? Ans-7:5 4. One side of a rectangular field is 15 m and one of its diagonals is 17 m. Find the area of the field. Ans-120m2 5. A rectangular grassy plot 110 m. by 65 m has a gravel path 2.5 m wide all round it on the inside. Find the cost of gravelling the path at 80 paise per sq. metre Ans- Rs 680 6. There are two sections A and B of a class consisting of 36 and 44 students respectively. If the average weight of section A is 40kg and that of section B is 35kg, find the average weight of the whole class? Ans-37.25 kg 7. Of the three numbers, second is twice the first and is also thrice the third.If the average of the three numbers is 44.Find the largest number. Ans-72 8. Find the odd man out. 3, 5, 11, 14, 17, 21 Ans-14 9. Find out the wrong number in the given sequence of numbers. 1, 8, 27, 64, 124, 216, 343 Ans-124 10. Insert the missing number. 8, 7, 11, 12, 14, 17, 17, 22, (....) Ans-B 11. Two cards are drawn at random from a pack of 52 cards.what is the probability that either both are black or both are queen? Ans-55/221 12. A bag contains 6 white and 4 black balls .2 balls are drawn at random. find the probability that they are of same colour. Ans-7/15 13. . In a km race, A beats B by 28 metres or 7 seconds. Find A's time over the course. Ans-4 min 3 sec 14. A, Band C are three contestants in a km race. If A can give B a start of 40 m and A can give C a start of 64m how many metre's start can B give C ? 15. If a : b = 5 : 9 and b : c = 4: 7, find a : b : c. Ans-20:36:63 16. A bag contains 50 p, 25 P and 10 p coins in the ratio 5: 9: 4, amounting to Rs. 206. Find the number of coins of each type Ans- Number of 50 p coins = 360; Number of 10 p coins = 160 17. What was the day of the week on 17th June, 1998? A. Monday B. Tuesday C. Wednesday D. Thursday Ans-C 18. The calendar for the year 2007 will be the same for the year: A. 2014 B. 2016 C. 2017 D. 2018 Ans-D 19. Find the angle between the hour hand and the minute hand of a clock when 3.25. 20. At what time between 4 and 5 o'clock will the hands of a clock be at right angle? Ans-40/11 min. past 4. 21. Find at what time between 8 and 9 o'clock will the hands of a clock being the same straight line but not together Ans-120/11 min 22. Find compound interest on Rs. 7500 at 4% per annum for 2 years, compounded annually. Ans-RS612 23. Find the compound interest on Rs. 10,000 in 2 years at 4% per annum, the interest being compounded halfyearly. Ans-Rs 824.32 24. In what time will Rs. 1000 become Rs. 1331 at 10% per annum compounded annually? Ans-3 years 25. The difference between the compound interest and simple interest on a certain sum at 10% per annum for 2 years is Rs. 631. Find the sum. Ans- Rs631,00 26. The sum of a rational number and its reciprocal is 13/6. Find the number Ans-2/3 ot 3/2 27. If the sum of two numbers is 42 and their product is 437, then find the absolute difference between the numbers Ans-4 28. The average of four consecutive even numbers is 27. Find the largest of these numbers. Ans-30 29. Of two numbers, 4 times the smaller one is less then 3 times the 1arger one by 5. If the sum of the numbers is larger than 6 times their difference by 6, find the two numbers. Ans-59 & 43 30. If three numbers are added in pairs, the sums equal 10, 19 and 21. Find the numbers Ans-6, 4 & 15 31. Simplify : (i) 8888 + 888 + 88 + 8 (ii) 11992 - 7823 - 456 32. What could be the maximum value of Q in the following equation? 5P9 + 3R7 + 2Q8 = 1114 Ans-9 33. An electric pump can fill a tank in 3 hours. Because of a leak in ,the tank it took 3(1/2) hours to fill the tank. If the tank is full, how much time will the leak take to empty it Ans-21 hrs 34. Two pipes A and B can fill a tank in 36 min. and 45 min. respectively. A water pipe C can empty the tank in 30 min. First A and B are opened. after 7 min,C is also opened. In how much time, the tank is full? Ans-39 min 35. Simplify :(log 75/16-2 log 5/9+log 32/243) 36. Find the value of x which satisfies the relation Log10 3+log10 (4x+1)=log10 (x+1)+1 Ans-7/2 37. If log10 2=0.30103,find the value of log10 50 Ans-1.69897 38. Peter can cover a certain distance in 1 hr. 24 min. by covering two-third of the distance at 4 kmph and the rest at 5 kmph. Find the total distance. Ans-6 km 39. Arrange the fractions 5/8, 7/12, 13/16, 16/29 and 3/4 in ascending order of magnitude. Ans-16/29 < 7/12 < 5/8 < 3/4 < 13/16 40. Complete the sudoku Point out the error in the following program main() { const char *fun(); *fun()='A'; } const char *fun() { return "Hello"; } Ans. fun() returns to a "const char" pointer which cannot be modified 2. What would be the output of the following program? main() { const int x=5; int *ptrx; ptrx=&x; *ptrx=10; printf("%d",x); } a) 5 b) 10 c) Error d) Garbage value 3. A switch statement cannot include a) constants as arguments b) constant expression as arguments c) string as an argument d) None of the above 4. How long the following program will run? main() { printf("\nSonata Software"); main(); } a) infinite loop b) until the stack overflows c) All of the above d) None of the above 5. On combining the following statements, you will get char*p; p=malloc(100); a) char *p= malloc(100) b) p= (char*)malloc(100) c) All of the above d) None of the above 6.Point out the error in the following program main() { int a=10; void f(); a=f(); printf("\n%d",a); } void f() { printf("\nHi"); } Ans. The program is trying to collect the value of a "void" function into an integer variable. 7. In the following program how would you print 50 using p? main() { int a[]={10, 20, 30, 40, 50}; char *p; p= (char*) a; } Ans. printf("\n%d",*((int*)p+4)); 8. Would the following program compile? main() { int a=10,*j; void *k; j=k=&a; j++; k++; printf("\n%u%u",j,k); } a) Yes b) No, the format is incorrect c) No, the arithmetic operation is not permitted on void pointers d) No, the arithmetic operation is not permitted on pointers 9. According to ANSI specifications which is the correct way of declaring main() when it receives command line arguments? a) main(int argc, char *argv[]) b) main(argc,argv) int argc; char *argv[]; c) main() {int argc; char *argv[]; } d) None of the above 10. What error would the following function give on compilation? f(int a, int b) { int a; a=20; return a; } a) missing parenthesis in the return statement b) The function should be declared as int f(int a, int b) c) redeclaration of a d) None of the above 11. If the program (myprog) is run from the command line as myprog 1 2 3 , What would be the output? main(int argc, char *argv[]) { int i; for(i=0;i<argc;i++) printf("%s",argv[i]); } a) 1 2 3 b) C:\MYPROG.EXE 1 2 3 c) MYP d) None of the above 12. If the following program (myprog) is run from the command line as myprog 1 2 3, What would be the output? main(int argc, char *argv[]) { int i,j=0; for(i=0;i<argc;i++) j=j+ atoi(argv[i]); printf("%d",j); } a) 1 2 3 b) 6 c) error d) "123" 13. If the following program (myprog) is run from the command line as myprog monday tuesday wednesday thursday? What would be the output? main(int argc, char *argv[]) { while(--argc >0) printf("%s",*++argv); } a) myprog monday tuesday wednesday thursday b) monday tuesday wednesday thursday c) myprog tuesday thursday d) None of the above 14. In the following code, is p2 an integer or an integer pointer? typedef int* ptr ptr p1,p2; Ans. Integer pointer 15. If the following program (myprog) is run from the command line as myprog friday tuesday sunday, What would be the output? main(int argc, char *argv[]) { while(sizeofargv) printf("%s",argv[--sizeofargv]); } a) myprog friday tuesday sunday b) myprog friday tuesday c) sunday tuesday friday myprog d) sunday tuesday friday 16. What would be the output of the following program? main() { int i=4; switch(i) { default: printf("\n A mouse is an elephant built by the Japanese"); case 1: printf(" Breeding rabbits is a hair raising experience"); break; case 2: printf("\n Friction is a drag"); break; case 3: printf("\n If practice make perfect, then nobody's perfect"); } } a) A mouse is an elephant built by the Japanese b) Breeding rabbits is a hare raising experience c) All of the above d) None of the above 17. What is the output of the following program? #define SQR(x) (x*x) main() { int a,b=3; a= SQR(b+2); printf("%d",a); } a) 25 b) 11 c) error d) garbage value 18. In which line of the following, an error would be reported? 1. #define CIRCUM(R) (3.14*R*R); 2. main() 3. { 4. float r=1.0,c; 5. c= CIRCUM(r); 6. printf("\n%f",c); 7. if(CIRCUM(r))==6.28) 8. printf("\nGobbledygook"); 9. } a) line 1 b) line 5 c) line 6 d) line 7 19. What is the type of the variable b in the following declaration? #define FLOATPTR float* FLOATPTR a,b; a) float b) float pointer c) int d) int pointer 20. In the following code; #include<stdio.h> main() { FILE *fp; fp= fopen("trial","r"); } fp points to: a) The first character in the file. b) A structure which contains a "char" pointer which points to the first character in the file. c) The name of the file. d) None of the above. 21. Input:A is non-empty list of numbers L Xß-infinity For each item in the list L,do If the item>x,then Xßthe item Return X X represents:- a)largest number b)smallest number c)smallest negative number d) none 22. Let A and B be nodes of a heap,such that B is a child of A. the heap must then satisfy the following conditions a)key(A)>=key(B) b)key(A) c)key(A)=key(B) d)none 23. String ,List,Stack,queue are examples of___________ a)primitive data type b)simple data type c)Abstract data type d)none 24. which of the following is not true for LinkedLists? a)The simplest kind of linked list is a single linked list ,which has one link per node .this link points to the next node in the list,or to a null value or emptylist if it is the last node. b)a more sophisticated kind of linked list is a double linkedlist or two way linkedlist .Each node has two links ,one to the previous node and one to the next node. c) in a circleLinkedList ,the first and last nodes are linked together.this can be done only for double linked list. d) to traverse a circular linkedlist ,u begin at any node and follow the list in either direction until u return to the original node. 25. sentinel node at the beginning and /or at the end of the linkedlist is not used to store the data a) true b) false Logged 26. which of the following is the most crucial phase of SDLC a)testing b)code generation c) analysys and design d)implementation 27. to send a data packet using datagram ,connection will be established a)no connection is required b) connection is not established before data transmission c)before data transmission d)none 28. a software that allows a personal computer to pretend as as computer terminal is a) terminal adapter b)terminal emulation c)modem d)none 29. super key is a) same as primary key b) primary key and attribute c) same as foreign key d) foreign key and attribute 30. In binary search tree which traversal is used for ascending order values a) Inorder b)preorder c)post order d)none 31. You are creating an index on ROLLNO colume in the STUDENT table.which statement will you use? a) CREATE INDEX roll_idx ON student, rollno; b) CREATE INDEX roll_idx FOR student, rollno; c) CREATE INDEX roll_idx ON student( rollno); d) CREATE INDEX roll_idx INDEX ON student (rollno); 32. A________class is a class that represents a data structure that stores a number of data objects a. container b.component c.base d.derived 13. Which one of the following phases belongs to the compiler Back-end. a. Lexical Analysis b.Syntax Analysis c. Optimization d.Intermediate Representation. 14. Every context _sensitive language is context_free a. true b.false 15. The repeated execution of a loop of code while waiting for an event to occur is called ---------.The cpu is not engaged in any real productive activity during this period,and the process doesn’t progress towards completion. a) dead lock b) busy waiting c) trap door d) none. 16. Transparent DBMS is defined as a) A DBMS in which there are no program or user access languages. b) A DBMS which has no cross file capabilities but is user friendly and provides user interface management. c) A DBMS which keeps its physical structure hidden from user d) none. 17. Either all actions are carried out or none are.users should not have to worry about the effect of incomplete transctions.DBMS ensures this by undoing the actions of incomplete transctions.this property is known as a) Aggregation b) atomicity c) association d) data integrity. 18..------ algorithms determines where in available to load a program. common methods are first fit,next fit,best fit.-------- algorithm are used when memory is full , and one process (or part of a process) needs to be swaped out to accommodate a new program.The ------------- algorithm determines which are the partions to be swaped out. a) placement, placement, replacement b) replacement, placement, placement c) replacement, placement, replacement d) placement, replacement, replacement 19. Trap door is a secret undocumented entry point into a program used to grant access without normal methods of access authentication.A trap is a software interrupt,usually the result of an error condition. a)true b)false. 20. Given a binary search tree,print out the nodes of the tree according t5o post order traversal. 4 /\ 25 /\ 13 a)3,2,1,5,4. b)1,2,3,4,5. c)1,3,2,5,4. d)5,3,1,2,4. 21. which one of the following is the recursive travel technique. a)depth first search b)preorder c)breadth first search d)none. 22. which of the following needs the requirement to be a binary search tree. a) 5 /\ 27 / 1 b) 5 /\ 67 c) 5 /\ 27 /\ 16 d) none. 23. in recursive implementations which of the following is true for saving the state of the steps a)as full state on the stack b) as reversible action on the stack c)both a and b d)none 24. which of the following involves context switch a)previliged instruction b)floating point exception c)system calls d)all e)none 25. piggy backing is a technique for a)acknowledge b)sequence c)flow control d)retransmission 26. a functional dependency XY is ___________dependency if removal of any attribute A from X means that the dependency does not hold any more a)full functional b) multi valued c)single valued d)none 27. a relation schema R is in BCNF if it is in ___________and satisfies an additional constraints that for every functional dependency XY,X must be a candidate key a)1 NF b)2 NF c)3 NF d)5 NF 28. a _________sub query can be easily identified if it contains any references to the parent sub query columns in the _________ clause A) correlated ,WHERE b) nested ,SELECT c) correlated,SELECT d) none 29. hybrid devise that combines the features of both bridge and router is known as a)router b)bridge c)hub d)brouter 30. In 8051 micro controller what is the HEX number in the accumulator after the execution of the following code. MOV A,#0A5H CLR C RRC A RRC A RL A RL A SWAP A a)A6 b)6A c)95 d)A5. 31. The Pentium processor requires ------------ volts. a)9 b)12 c)5 d)24. 32. The data bus on the Celeron processor is-------bits wide. a)64 b)32 c)16 d)128. 33. K6 processor a) Hitachi b) toshiba c) zilog d) AMD. 34. What is the control word for 8255 PPI,in BSR mode to set bit PC3. a)0EH b)0FH c)07H d)06H. What is the value of i if the function is called twice ? 35. Given the following c program func(int *i, int*j) {*i=*i * *i; *j=*j* *j; } main() { int i = 5, j = 2; func(&i,&j); printf("%d %d", i, j);} 36. Find the outpur of the following C program void f(char *p) {p=(char *) malloc(6); strcpy(p,"hello"); } void main( ) {char *P="bye"; f(p); printf("%s ,p); } 37. For the following C program int x(char *a) {a=(char *) malloc(10*sizeof(char)); *a="hello"; } main() {char *a="new"; x(a); printf("%s",a); } The output is a) Hello b) New c) Hello new d) Run time error 38. Find the error if any { struct *sPtr, *nPtr for(;*nPtr;nPtr=nPtr->next) free(nPtr); } 39. Find the output main() { void f(int, int); int i, j; i=10; j=10; f(++i,j++); } void f(int i, int j) {if(i>50)return; else i+=j; f(i,j); printf("%d",i); } Ans 413121 40. kernel executes the first process when system starts ans :- init(); 41. main() { int i=1; fork(); fork(); fork(); printf("%d",i); } how many times i will be printed ans:8 42In a sequential search, what is the average number of comparisons it takes to search through n elements ? Ans: (n+1)/2. 43What is the size of the array declared as double * X[5] ? Ans. 5 * sizeof ( double * ) 44. Find the output for the following C program main {int x,j,k; j=k=6;x=2; x=j*k; printf(”%d”, x); CSC Technical Questions with Answer 1)#include main() { int a=6,y=3,z; float t=4.55; z=a/y+t+a/y-t+a-2*t; printf("%d",z); } a. 3 b. 3.00000 c. 3.55 d.none Ans: D 2).#include #define int printf("#int(intv)"); main() { int x; float g; g=int x printf("-------------"); } Ans: COMPIER ERROR 3) Main () { Static char a[3][4]={"abcd","mnop" ,"fghi"} Putchar(**a); } a)will not compile successfully b)prints a c)prints m d)prints garbage Ans: b 4)main() { Int i=100; Int M(); Printf("%d",(*M)(i)); } Int M(x) Int x; { Printf("%d",++x); } a)prints 100 b)prints 101 c)prints error d)prints 1013 5) main() { Int i=7 If(0==fork()) I+=10; Else { Wait(0); Printf("%d",i); } } a)i+=10 is executed by child only b)i+=10 is executed by parent only c)The child can start executing only after the termination of the parent process. d)none of the above 6) 27 | a) 27 8 b)8 c)2 d)none of the above 7) command in unix for removing all files a)rm b)rm* c)rm *.* 8) which is used for storing pictures or graphics a) mbr b)mar c)frame buffer d)sdram 9) Pick the odd man out. a)GPRS b)GSM c)SIM d)IDM Ans.D 10) if A=10000001 B=10000010 C=10000011 then what does the word 100000111000000110000010 mean. Ans. CAB 11.#define FALSE -1 #define TRUE 1 #define NULL 0 main() { if(NULL) puts(“NULL”); else if(FALSE) puts(“TRUE”); else puts(“FALSE”); } what is the output? a)NULL b)TRUE c)FALSE d)0 12.main() { int i =5,j= 6, z; printf(“%d”,i+++j); } what is the output? a)13 b)12 c)11 d)compiler error 13.main() { int i ; i = accumulator(); printf(“%d”,i); } accumulator(){ _AX =1000 } what is output? a)1 b)10 c)100 d)1000 14.main() { int i =0; while(+(+i--)!= 0) i- = i++; printf(“%d”,i); } what is the output? a)-1 b)0 c)1 d)will go in an infinite loop 15.main(){ int i =3; for(; i++=0;) printf((“%d”,i); } what is the output? a)1b)2c)1 2 3d)compiler error:L value required. 16.main(){ int i = 10, j =20; j = i ,j?(i,j)?i :j:j; printf(“%d%d”,i,j); }what is the output? a)20 20 b)20 10 c)10 20 d)10 10 17.main(){ extern i; printf(“%d\t”,i);{ int i =20; printf(“%d\t”,i); } } what is output? a) “Extern valueof i “ 20 b)Externvalue of i”c)20d)linker Error:unresolved external symbol I 18.int DIMension(int array[]){ return sizeof(array/sizeof(int);} main(){ int arr[10]; printf(“Array dimension is %d”,DIMension(arr)); } what is output? a)array dimension is 10 b)array dimension is 1 c) array dimension is 2 d)array dimension is 5 19.main(){ void swap(); int x = 45, y = 15; swap(&x,&y); printf(“x = %d y=%d”x,y); } void swap(int *a, int *b){ *a^=*b, *b^=*a, *a^ = *b; what is the output? a) x = 15, y =45 b)x =15, y =15 c)x =45 ,y =15 d)x =45 y = 45 20.main(){ int i =257; int *iptr =&i; printf(“%d%d”,*((char*)iptr),*((char *)iptr+1)); } what is output? a)1, 257 b)257 1c)0 0d)1 1 21.main(){ int i =300; char *ptr = &i; *++ptr=2; printf(“%d”,i); } what is output? a)556 b)300 c)2 d)302 22.#include main(){ char *str =”yahoo”; char *ptr =str; char least =127; while(*ptr++) least = (*ptr printf(“%d”,least); } what is the output? a)0 b)127 c)yahoo d)y 23.Declare an array of M pointers to functions returing pointers to functions returing pointers to characters. a)(*ptr[M]()(char*(*)()); d)(char*(*)(char*()))(*ptr[M])(); b)(char*(*)())(*ptr[M])() c)(char*(*)(*ptr[M]())(*ptr[M]() 24.void main(){ int I =10, j=2; int *ip = &I ,*jp =&j; int k = *ip/*jp; printf(“%d”,k); } what is the output? a)2 b)5 c)10 d)compile error:unexpected end of file in comment started in line 4 25.main(){ char a[4] =”GOOGLE”; printf(“%s”,a); } what is the output? a)2 b) GOOGLE c) compile error: yoo mant initializers d) linkage error. 26.For 1MB memory, the number of address lines required a)12 b)16 c)20 d)32 27.There is a circuit using 3 nand gates with 2 inputes and 1 output,f ind the output. a) AND b) OR c) XOR d) NAND 28.what is done for push operation a) SP is incremented and then the value is stored. b) PC is incremented and then the value is stored. c) PC is decremented and then the value is stored. d) SP is decremented and then the value is stored. 29.Memory allocation of variables declared in a program is ------ a) Allocated in RAM b) Allocated in ROM c) Allocated in stack d) Assigned in registers. 30.What action is taken when the processer under execution is interrupted by TRAP in 8085MPU? a) Processor serves the interrupt request after completing the execution of the current instruction. b) processer serves the interrupt request after completing the current task. c) processor serves the interrupt immediately. d) processor serving the interrupt request depent deprnds upon the priority of the current task under execution. 31.purpose of PC (program counter)in a microprocessor is ---- a) To store address of TOS(top of stack) b) To store address of next instructions to be executed c) count the number of instructions d) to store the base address of the stack. 32.conditional results after execution of an instruction in a microprocess is stored in a) register b) accumulator c) flag register d) flag register part of PSW (program status word) 33.The OR gate can be converted to the NAND function by adding----gate(s)to the input of the OR gate. a) NOT b) AND c) NOR d) XOR 34.In 8051microcontroller ,------has a dual function. a) port 3 b) port 2 c) port 1 d) port 0 35.An 8085 based microprocessor with 2MHz clock frequency,will execute the following chunk of code with how much delay? MVI B,38H HAPPY: MVI C, FFH SADDY: DCR C JNZ SADDY DCR B JNC HAPPY a) 102.3 b)114.5 c)100.5 d)120 36.In 8085 MPU what will be the status of the flag after the execution of the following chunk of code. MVI B,FFH MOV A,B CMA HLT a)S = 1, Z = 0, CY = 1 b)S = 0, Z = 1, CY = 0 c) S = 1, Z = 0, CY = 0 d)S = 1, Z = 1 ,CY = 1 37.A positive going pulse which is always generated when 8085 MPU begins the machine cycle. a) RD b) ALE c) WR d) HOLD 38.when a ----- instruction of 8085 MPU is fetched , its second and third bytes are placed in the W and Z registers. a) JMP b) STA c) CALL d) XCHG 39.what is defined as one subdivision of the operation performed in one clock period. a) T- State b) Instruction Cycle c) Machine Cycle d) All of the above 40.At the end of the following code, what is the status of the flags. LXI B, AEC4H MOV A,C ADD HLT a) S = 1, CY = 0, P = 0 , AC = 1 b) S =0 , CY = 1, P = 0,AC = 1 c) S = 0, CY = 1, P = 0 , AC = 1 d) S = 0, CY = 1, P = 1 , AC = 1 41.In 8051 micro controller what is the HEX number in the accumulator after the execution of the following code. MOV A,#0A5H CLR C RRC A RRC A RL A RL A SWAP A a)A6 b)6A c)95 d)A5. 42.The Pentium processor requires ------------ volts. a)9 b)12 c)5 d)24 43. The data bus on the Celeron processor is-------bits wide. ] a)64 b)32 c)16 d)128. 44.K6 processor a) Hitachi b) toshiba c) zilog d) AMD. ans: d 45. What is the control word for 8255 PPI,in BSR mode to set bit a)0EH b)0FH c)07H PC3. d)06H. 46.The repeated execution of a loop of code while waiting for an event to occur is called ---------.The cpu is not engaged in any real productive activity during this period,and the process doesn’t progress towards completion. a) dead lock b) busy waiting c) trap door d) none. 47. Transparent DBMS is defined as a) A DBMS in which there are no program or user access languages. b) A DBMS which has no cross file capabilities but is user friendly and provides user interface management. c) A DBMS which keeps its physical structure hidden from user d) none. 48.Either all actions are carried out or none are.users should not have to worry about the effect of incomplete transctions.DBMS ensures this by undoing the actions of incomplete transctions.this property is known as a) Aggregation b) atomicity c) association d) data integrity. 49.------ algorithms determines where in available to load a program. common methods are first fit,next fit,best fit.-------- algorithm are used when memory is full , and one process (or part of a process) needs to be swaped out to accommodate a new program.The ------------- algorithm determines which are the partions to be swaped out. a) placement, placement, replacement b) replacement, placement, placement c) replacement, placement, replacement d) placement, replacement, replacement 50.Trap door is a secret undocumented entry point into a program used to grant access without normal methods of access authentication. A trap is a software interrupt,usually the result of an error condition. a)true b)false. 51. Given a binary search tree,print out the nodes of the tree according to post order traversal. 4 / \ 2 5 /\ 1 3 a)3,2,1,5,4. b)1,2,3,4,5. c)1,3,2,5,4. d)5,3,1,2,4. 52.which one of the following is the recursive travel technique. a)depth first search b)preorder c)breadth first search d)none. 53.which of the following needs the requirement to be a binary search tree. a) 5 / \ 2 7 / 1 b) 5 / \ 6 7 c) 5 / \ 2 /\ 1 6 7 d) none. 54.in recursive implementations which of the following is true for saving the state of the steps a) as full state on the stack b) as reversible action on the stack c) both a and b d) none 55.which of the following involves context switch a)previliged instruction b)floating point exception c)system calls d)all e)none 56.piggy backing is a technique for a)acknowledge b)sequence c)flow control d)retransmission 57. a functional dependency XY is ___________dependency if removal of any attribute A from X means that the dependency does not hold any more a)full functional b) multi valued c)single valued d)none 58)a relation schema R is in BCNF if it is in ___________and satisfies an additional constraints that for every functional dependency XY,X must be a candidate key a)1 NF b)2 NF c)3 NF d)5 NF 59) a _________sub query can be easily identified if it contains any references to the parent sub query columns in the _________ clause A) correlated ,WHERE b) nested ,SELECT c) correlated,SELECT d) none 60) hybrid devise that combines the features of both bridge and router is known as a)router b)bridge c)hub d)brouter 61) which of the following is the most crucial phase of SDLC a)testing b)code generation c) analysys and design d)implementation 62)to send a data packet using datagram ,connection will be established a)no connection is required b) connection is not established before data transmission c)before data transmission d)none 63)a software that allows a personal computer to pretend as as computer terminal is a) terminal adapter b)terminal emulation c)modem d)none 64) super key is a) same as primary key b) primary key and attribute c) same as foreign key d) foreign key and attribute 65.In binary search tree which traversal is used for ascending order values a) Inorder b)preorder c)post order d)none 66.You are creating an index on ROLLNO colume in the STUDENT table.which statement will you use? a) CREATE INDEX roll_idx ON student, rollno; b) CREATE INDEX roll_idx FOR student, rollno; c) CREATE INDEX roll_idx ON student( rollno); d) CREATE INDEX roll_idx INDEX ON student (rollno); 67.A________class is a class that represents a data structure that stores a number of data objects a. container b.component c.base d.derived 68.Which one of the following phases belongs to the compiler Back-end. a. Lexical Analysis b.Syntax Analysis c. Optimization d.Intermediate Representation. 69.Every context _sensitive language is context_free a. true b.false 70.Input:A is non-empty list of numbers L Xß-infinity For each item in the list L,do If the item>x,then Xß the item Return X X represents:- a)largest number b)smallest number c)smallest negative number d) none 71.Let A and B be nodes of a heap,such that B is a child of A. the heap must then satisfy the following conditions a)key(A)>=key(B) b)key(A) c)key(A)=key(B) d)none 72.String ,List,Stack,queue are examples of___________ a)primitive data type b)simple data type c)Abstract data type d)none 73.which of the following is not true for LinkedLists? a)The simplest kind of linked list is a single linked list ,which has one link per node .this link points to the next node in the list,or to a null value or emptylist if it is the last node. b)a more sophisticated kind of linked list is a double linkedlist or two way linkedlist .Each node has two links ,one to the previous node and one to the next node. c) in a circleLinkedList ,the first and last nodes are linked together.this can be done only for double linked list. d) to traverse a circular linkedlist ,u begin at any node and follow the list in either direction until u return to the original node. 74.sentinel node at the beginning and /or at the end of the linkedlist is not used to store the data a) true b) false 75) Which of following is correct: a)For loops can be nested b)For Loops may use the same Index c)For loops cannot be overllapped Ans:a,c CSC Aptitude Questions With Solution 1. If 15 toys cost Rs, 234, what do 35 toys cost? Sol. Rs. 546. 2. If 36 men can do a piece of work in 25 hours, in how many hours will 15 men do it ? Sol 15 men can do it in 60 hours. .3. If the wages of 6 men for 15 days be Rs.2100, then find the wages of for 12 days. Sol. Rs. 2520. 4. If 20 men can build a wall 66 metres long in 6 days, what length of a similar can be built by 86 men in 8 days? Sol. 49 m. 5. If 15 men, working 9 hours a day, can reap a field in 16 days, in how many days will 18 men reap the field, working 8 hours a day? Sol 15. 6. If 9 engines consume 24 metric tonnes of coal, when each is working 8 hours day, bow much coal will be required for 8 engines, each running 13hours a day, it being given that 3 engines of former type consume as much as 4 engines of latter type? Sol26 metric tonnes. 7. A contract is to be completsd in 46 days sad 117 men were said to work 8 hours a day. After 33 days, (4/7) of the work is completed. How many additional men may be employed so that the work may be completed in time, each man now working 9 hours a day? Sol. 81. 8. A garrison of 3300 men had provisions for 32 days, when given at the rate of 860 gns per head. At the end of 7 days, a reinforcement arrives and it was for that the provisions wi1l last 17 days more, when given at the rate of 826 gms per head, What is the strength of the reinforcement? Sol.1700. 9Rajeev's age after 15 years will be 5 times his age 5 years back. What is the present age of Rajeev ? Sol. 10 years. 10. The ages of two persons differ by 16 years. If 6 years ago, the elder one be 3 times as old as the younger one, find their present ages. Sol. their present ages are 14 years and 30 years. 11. The product of the ages of Ankit and Nikita is 240. If twice the age of Nikita is more than Ankit's age by 4 years, what is Nikita's age? Sol. 12 years. 12 . The present age of a father is 3 years more than three times the age of his son. Three years hence, father's age will be 10 years more than twice the age of the son. Find the present age of the father. . Sol. 33 years. 13 . Rohit was 4 times as old as his son 8 years ago. After 8 years, Rohit will be twice as old as his son. What are their present ages? Sol., son's 'present age = (x + 8) = 16 years. Rohit's present age = (4x + 8) = 40 years. 14. One year ago, the ratio of Gaurav’s and Sachin’s age was 6: 7 respectively. Four years hence, this ratio would become 7: 8. How old is Sachin ? Sol: 36 years. 15. Abhay’s age after six years will be three-seventh of his fathers age. Ten years ago the ratio of their ages was 1 : 5. What is Abhay’s father's age at present? Sol. 50 years. 16:Two pipes A and B can fill a tank in 36 bours and 46 bours respectively. If both the pipes are opened simultaneously, bow mucb time will be taken to fill the tank? Sol: 20 hours. 17: Two pipes can fill a tank in 10hours and 12 hours respectively while a third, pipe empties the full tank in 20 hours. If all the three pipes operate simultaneously, in how much time will the tank be filled? Sol: 7 hrs 30 min. 18: If two pipes function simultaneously, tbe reservoir will be filled in 12 hours. One pipe fills the reservoir 10 hours faster than tbe otber. How many hours does it take the second pipe to fill the reservoir? Sol: 30 hours to fill the reservoir 19: A cistern has two taps which fill it in 12 minutes and 15minutes respectively. There is also a waste pipe in the cistern. When all the 3 are opened , the empty cistern is full in 20 minutes. How long will the waste pipe take to empty the full cistern? Sol: the waste pipe will empty the full cistern in 10min 20: An electric pump can fill a tank in 3 hours. Because of a leak in ,the tank it took 3(1/2) hours to fill the tank. If the tank is full, how much time will the leak take to empty it ? Sol: 21 hours. 21. Two pipes can fill a cistern in 14 hours and 16 hours respectively. The pipes are opened simultaneously and it is found that due to leakage in the bottom it tooki 32 minutes more to fill the cistern.When the cistern is full, in what time will the leak empty it? Sol: 112 hours. 22: Two pipes A and B can fill a tank in 36 min. and 45 min. respectively. A water pipe C can empty the tank in 30 min. First A and B are opened. after 7 min,C is also opened. In how much time, the tank is full? Sol: 39 minutes. 23: Two pipes A,B can fill a tank in 24 min. and 32 min. respectively. If both the pipes are opened simultaneously, after how much time B should be closed so that the tank is full in 18 min.? Sol: 8 min. 24. In a km race, A beats B by 28 metres or 7 seconds. Find A's time over the course. Sol. 4 min. 3 sec. 25. A runs 1 ¾ times as fast as B. if A gives B a start of 84 m, how far must winning post be so that A and B might reach it at the same time? Sol. Winning post must be 196 m away from the starting point. 26. A can run 1 km in 3 min. 10 sec. and B can cover the same distance in 3 min. 20 sec. By what distance can A beat B ? Soln: A beats B by 50 metres. 27 . In a 100 m race, A runs at 8km per hour. If A gives B a start of 4 m and still him by 15 seconds, what is the speed of B ? Sol: 5.76 km/hr. 28. A, Band C are three contestants in a km race. If A can give B a start of 40 m and A can give C a start of 64m how many metre's start can B give C ? Sol: While A covers 1000 m, When B covers 960 m, C covers 936 m. 29. In a game of 80 points; A can give B 5 points and C 15 points. Then how many points B can give C in a game of 60 ? Sol. B can give C 8 points. 30. Find the present worth of Rs. 930 due 3 years hence at 8% per annum. Also find the discount. Sol. Rs. 180. 31. The true discount on a bill due 9 months hence at 12% per annum is Rs. Find the amount of the bill and its present worth. Sol. Rs. 6000. 32. The true discount on a certain sum of money due 3 years hence is Rb. 250 and the simple interest on the same sum for the same time and at the same rate is Rs. 375. Find the sum and the rate percent. Sol. 16 2/3% 33. The difference between the simple interest and true discount on a certain sum of money for 6 months at 12—% per annum is Rs. 25. Find the sum. Sol. Rs. 6800. 34. A bill falls due in 1 year. The creditor agrees to accept immediate payment of the half and to defer the payment of the other half for 2 years. By this arrangement ins Rb. 40. What is the amount of the bill, if the money be worth 12-z% ? Sol . Rs. 3600. 35. Find the volume and surface area of a cuboid 16 m long, 14 m broad and 7 m high. Sol. 868 36. Find the length of the longest pole that can be placed in a room 12 m long 8m broad and 9m high. Sol. 17 m. 37. Tbe volume of a wall, 5 times as high as it is broad and 8 times as long as it is high, is 12.8 cu. metres. Find the breadth of the wall. Sol. 40 cm 38. Find the number of bricks, each measuring 24 cm x 12 cm x 8 cm, required to construct a wall 24 m long, 8m high and 60 cm thick, if 10% of the wall is filled with mortar? Sol. 45000. 39. Water flows into a tank 200 m x 160 m througb a rectangular pipe of 1.5m x 1.25 m @ 20 kmph . In what time (in minutes) will the water rise by 2 metres? Sol. 96min 40. Tbe dimensions of an open box are 50 cm, 40 cm and 23 cm. Its thickness is 2 cm. If 1 cubic cm of metal used in the box weighs 0.5 gms, find the weight of the box. Sol. 8.04 kg. CSC Technical Written Test Questions: 1.with framework CASE tools IPSE can be achieved .IPSE is a.integrated product software engineering. b.integrated productivity simulation environment c.inner project software estimation d.inntegreted project support environment 2.data structured system devolepment (DSDD) is also called one of the below which is evolved from work on information domain analysis a.j.d.methodology b.yourdon methodology c.warnier-or methodology d.Kevin-yenn methodology 3.a.COCOMOestimation model is a single valued mode to compute software development effort(and cost)as a function of program size expressed in estimated lines of codes. b..PUTNAM model is single valued model assuming a specific distribution of effort over life of software development project. a.only a)is correct b.only b)is correct c.a ) and b)is correct d.a)and b)is wrong 4.when in data coupling portion of a data structure(rather than simple argument)is passed via a model interface it is called one of the below a.control coupling b.stamp coupling c.sub-coupling d.reference coupling 5.what is measure of reliability for a computer based system if MTBF=mean time between failure.MTTF=mean time to failure.MTTR=mean time to recover a.MTBF=MTTF/MTTR B.MTBF=MTTF*MTTR C.MTTR=MTTF*MTBF D.MTBF=MTTF-MTTR(sign is not cleared) 6.in FURPS quality factors by HEWERT PACKAR a.functionality is accessed by evaluating o ne feature of program and capability of algorithm only b.supportability means breath of premna application and death of standards used a.a)and b)both correct b.a)correct b)wrong c.b)correct a)wrong d.a)and b) both wrong question is not cleared 7.ur testing of basis paw message means software devolepme nt quatiative measure of logical complexity program of independent path in search of program a.data cycle complexity b.path complexity metric c.cyclomatic complexity d.none of above (question is not cleared so try to understand it) 8.as a general rule a.MIS performane criteria determine management information needs and these needs determine the objective of the firm b.the objective of the firm determine the management information needs and these needs determine the MIS performance criteria c.management information needs determine the MIS performance criteria and these criteria determine the objective of form d.the objectives of firm determine the MISpwrformance criteria and these criteria detemine the management information needs. 9.a relatively small project is to be developed by a small team with good applocation experience needing to fulfull less than rigid requirements. Using the basis COCOMA model calculate the effort in person-months if the estimated lines of code is 33200 a.95 person-months. b.111 perso n-months c.102 person-months d.87 person-moths 10.CRC modeling provides a way for identifying classes their respomnsibilities and their collaboration .a collabration refers to. a.services provided by a class to other classes b.requests sent by a class to ther classes to fulfill its own responsibility. c.taxonomy of class types d.characterstics of a class 12.a software was developed using component assembly model.after some time and old componet is to be replaced by a new one without disturbing the overall fuctioning of the softwarwe.following statements is true. a.the new component should be developed in the same language as the old one b.the new component should have exactly the same attribute as the old one. c.the new component should inplement exactly the same methods as the old one. d.The new component should provide exactly the same interface as the old one. 13.a real time system is to be developed .the choice of database would most appropriately be a.distributed databases because the reduce redundancy of data. b.distributed databases because the facilate parallel data processing through miultitasking c.centralized databases because of high computing power the server. d.centralized databases because they provide better deadlock handling mechanism. 14.the following statement is equavalence echo~ a.echo SHOME b.SHOME c.pwd d.ps 15.the equavalent of following statement is echo~bin a.echosbin b.echo bin c.pwd d.echo pwd 16.the command that gives the process of ID of last command invoked a.$@ b.$# c.$! d.$$ 17.the output of the following shell script $set-a planets mecury venus $planets[9]=Pluto $print ${planets[*]} a.planets b.mercurity venus puto c.Pluto mercury Pluto d.gives an error 18."let"command is used for a.command substitution b.arithmetic calculation c.to create analias d.not used 19.name the relationship(s)that denotes some semantic dependency among otherwise unrelated classes. a.generilazation or specification. b.part of c.association d.all of the above 20.object persistence is best described by the following a.the ability to retain an object throughout the execution of a method b.the ability to retain an object throughout the execution of a program c.the ability to save objects from one execution of a program to the text. d.the ability to retain an object throughout time and or space 21.what is socket ? how many required to make connection between two systems a.a socket is 2-tuple having protocol and port number and requires 4sockets b.a socket is 3-tuple having protocol address and port number and requires 4 sockets c.a socket is 2-tuple having protocol and address and requires 2 sockets d.a socket is 3-tuple having protocol address and port number and requires 2 sockets 22.TCP/IP runs on a.an Ehtener b.a token ring c.an x.25 net d.all of the above 23.the job og fragmentation and re-assembly of datagrams in TCP/IP protocol suite is done by a.network access layer b.internet layer c.transport layer d.application layer 24.the sequence number in TCP header is used to a.identify the first byte of the enclosed data int segment b.identify the computer c.identify the port on which server is running d.none 25.what is output of the final echo command $x=hell0 $ echo'x=goodbye'>sedtx $sh setx ;x=bye $echo $x a.hello b.goodbye c.bye d.none 26. what would be the output of the following echo command in sequence? $x=1 $echo'x=2'>setx $sh setx $echo $x $x=3 $setx $echo $x a.2,2 b.1,2 c2,3 d.1,3 27.memory reference instruction branch subroutine (BSB) IS given instruction transferming control to subroutine b.first word of the subroutine c.address of next instruction in sequence which is presently held in pc (return addres) d.another BSBinstruction 28.assume memory units has 65536 words of 8bits.the number of bits in program counter.accumalator. memory address register instruction respectively are a.16,8,16,8 b16,16,8,8 c8,16,8,16 d8,8,16,16 29.which of the following instruction is used to load 2050h address toHL register pair? a.LOD H,2050H B.LOAD H,2050H C.LXIH,2050H D.LDAH,2050H 30.what will be the value of the accumalator having AAH after executing RLC instruction twice? a.55h b.abh c.bah d.aah 31.the top of the stack contains 5A&next byte down the stack is 14(all address in hexadecimal) the stack pointer (sp) containts 3A56.an instruction call subroutint stored at location 67AE whick is 3 bytes long is located at memory address 013F. What shall be the contents of Program Counter, SP and stack respectively after the call instruction is executed? PC SP stack a. 67AE 3A58 42,01,5A,14 b. 0142 3A58 01,42,5A,14 c. 67AE 3A56 42,01,5A,14 d. 0142 3A56 01,42,5A,14 32. Time oriented metrics is one of the below i.e. times it takes to analyze change request, design an appropriate modification, implement the change, test it and distribute to all users. a. MTBR b. MTTC c. MTBW d. MTTW 33. which of the following is not a tool for application prototyping? a. Application Generators. b. Third Generation Languages c. Screen Generators d. Report Generators. 34. For Real time process control or embedded software application having high algorithmic complexity programs. Which software process metrics would be most suitable for project measurements? a. size oriented metrics b. Function point metrics c. Feature Point metrics. d.3d functionpoint metrics 35. Regression testing is: a. Testing the System under extreme conditions. b. Testing the System after a new component is integrated into it to make sure that no additional errors are introduced. c. Testing the system with an exhaustive range of data to make sure that all the conditions are tested. d. Testing of a module by its developmer before releasing it for integration with the entire system. 36. For a module to be strongly cohesive: a. it should ideally perform just one function. b. Et should have well defined relationships with other modules in the system. c. It should be compact in size. d. It should not take any data as input parameter. 37. The approach used in Top Down Analysis and design is: a. To identify a top level function by combining many smaller componen into a single entity. b. To identify a top level function and then create a hierarchy of lower level modules and components. c. To prepare flowchart after programming has completed. d. None of the above. 38. Engineers use the CASE tolls to: a. Analyze these requirements and determine their feasibility. b. Design the system's general algorithms. c. Design an actual detailed implementation in terms of target environment. d. All of the above. 39. While constructing a data dictionary, the analyst considers: a. Each data flow in the DFD has one data dictionary entry. b. Definitions must be readily accessible by name. c. There should be no redundancy in data definition. e. All of the above. 40. The procedure for evaluating relative performance of defferent systems is referred to as: a. Parallel processing. b. Bench marking. c. Comparative analysis. d. Standard Evaluation. 41. The variable used to change the secondary prom string is: a. PS3 b. PS1 c. PS2 d. Not possible. 42. The command used to send signals to specified job: a. send b. kill c. d. kill 43. When the complesity of a problem domain is modeled in an Object Oriented design, it takes the form of a a. Hierarchy b. Graph c. Tree d. none 44. Which of the following statements is true? a. An object has a state, behaviour and identity. b. An object has only state and behaviour. c. An object has only behaviour and identity. d. An object has state and identity. 45. Object Oriented Analysis is a method a. In which the system is viewed as a set of autonomous agents that collaborate to perform higher level behaviour. b. In which programs are organized as co-operative collection of objects, each of which represents an instance of some classes and whose classes are all a members of a hierarchy classes united via inheritance relationships. c. Encompassing the process of object oriented decomposition and a notation for depicting both logical and physical as well as static and dynamic models of a system. d. That examines requirements from the perspective of the classes and objects fount in the vocabulary of the problem domain. 46. Encapsulation constitutes: a. Identifying the essential characteristics of and obhect. b. Separation of contractual interface of an abstraction and its implementation. c. The property of a system that is decomposed into a set of acohesive and loosely coupled modules. d. Ordering of abstractions. 47. The enforcement of the class of anf object is reffered to as: a. Modularity b. Abstraction c. Typing d. Binding 48.The Gateway and the Router are used in the following sense : a. Gateway moves the data between different networks of the same protocol and the Router moves the data between different network of different protocol. b. Gateway moves the data between different networks if different protocols and the Router moves the data berween different network of the same protocol. c. Gateway and the router are used for security. d. None of the above. 49. Which of the following is a Network Mamagement Protocol? a.DNS B.CMIP C.TELLNET D.TCPMP 50. ip uses 4bytes addressing.how many butes address IPX usesa.12 b.16 c.8 d.10 51.IPaddress192.10.100.3is an example of the class a.A b.B c.C d.D 52.in TCP/IP protocol suite the protocol which controls the flow of data isa.ARP b.ICMP c.RARP d.IP 53.ARPprotocol is used toa.map IP address to physical address b.map EthernetAddress to IP address c.both of above d.none of above 54.what is the output ofthe two echo commands $export x $x=1 $sh $echo sx $x=2 $ctrl-d leave this shell $echo$sx a.1,1 b.1,2 c.blank,2 d.none oe abovge 55.the command $sleep10;date& a.sleep and date both run simultanously in background b.sleep and date both run simultanously,sleep in foreground and date in background c.after sleep finishes running in foreground than date runs in foreground d.none 56.following are the contents of a file file echo $# echo $* echo$0 echo $1 what would be output of following $ shfiles 1,2,3 a.3 1,2,3 file 1 b.1,2,3 4 1 2 c.file 1 4 1 2 d.none 57what will be the outputs of the following commands expr 4+3 expr14/3 expr 4\*3 expr 4*3 a. 7,2,8,syntax error,12 b.7,2,8,12,syntax error c.7,2,1,12 d.7,2,12,syntax error 58which of th statement is not true forsticky bit. a.can be set for a file. b.has no efect if thefile nis a dir. c.tells unix to leave an executable in a memo ry after a program has finished executaion d.none 59.make utility is a.an editor on unix b.to restor the system status c.a utility for devlopment of program d.none 60.th e following input is absent on a romchip as compared to ram chipa.read input b. write input c. chipselect d. both a & b 61.the digital computer has memory unit with 8 bits per word. the struction set consist of six different operation.each struction is stored in one word of memoryand consistof opcud part and address part . how many words can be address in memory a.32 b.64 c.128 d.256 62.output of following will be #include main() { char p="A"; int q=65; switch(1) { case 1: printf("%dand %c",p.,q); printf("%cand%d",p,q); } } a.A AND 65 b.65 AND A c.A and 65 65 and A d.65 and A A and 65 63.output of following will be # include #include main() { unsigned short p=pow(2,15)+pow(2,9)+pow(2,6)+poe(2,0); //33345 char c; c=p; printf("%c/n",c); } a.33345 b.45 c.A d.none 64. p in following statement is int (*p(char *a))[10]; a.integer b.array c.fuction d.pointer 65.value of expression *(((p))name +2))) at the end of programm will be #include main() { struct account { int accno, char *name; float balance; } agent *p=&agent; agent.name=tom smith; a.tom smith b.o c.m d.none of this 66.state which one is corerect SQL a. SELECT STORE ID.SUM(QTY*PRICE) FROM SALES .TITLES WHERE TITLES.TITLE_.ID=SALE.TITLE_ID ORDER BY TITLE_ID b. SELECT STORE _ID ,SUM( QTY*PRICE) FROM SALES,SALES WHERE TITLES .TITLES_ID=SALES .TITLE_ID GROUP BY STORE_ID ] c. _SELECT STORE _ID ,SUM( QTY*PRICE) FROM SALES,SALES GROUP BY STORE_ID WHERE TITLES .TITLE_ID+SALES.TITLE_ID d. SELECT STORE _ID ,SUM( QTY*PRICE) FROM SALES,SALES ORDER BY TITLE_ID WHERE TITLES .TITLE_ID=SALES.TITLE_ID 67which type of join is used in following SQL SELECT STORE_NAME.PUB_ID FROM PUBLISHER .STORES WHERE NOT PUBLISHER.STATE=STORES .STATE a.EQUIJOIN B.THETAJOIN C.NOTQUIJOIN D NONE OF THIS 68. EMPLOYEE DEPARTMENT empid name deptid deptid deptname .1 A 11 11 AAAAA 2 B 11 22 BBBBB 3 C 22 33 CCCCC 4. D 22 5 E 23 SELECT NAME .DEPT_ID.DEPT_NAME FROM EMPLOYEE EM.DEPARTMENT DP WHERE EMDEPT _ID =DP.DEPT_ID GROUP BY DEPT_ID which is the correct result set out of above SQL and table data a. A 11 AAAAA B 11 AAAAA C 22 BBBBB D 22 BBBBB D 33 CCCCC b; A 11 AAAAA C 22 BBBBB E 33 CCCCC C. B 11 AAAAA D 22 BBBBB E 33 CCCCC D.NONE 69.11.2 'S complement of binary 110110101id a.001001010 b.1101110101 c.001001011 d.101001010 70.equivalent octal number for binary 10001010111 a. 2127 b.1227 c.2217 d.1111 71.while exucuting a programm if the 8085/8080A MPU fetches the machine code located at the memory address 2057H then jthe content of the programm counter is a.2056H B.2057H C.2058H D.2059H 72number of address line required on the chip of 2k memory a.10 b.11 c.12 d16 73.the sequence followed bby the storage and retrieval of data bytes on the stacks a.FIFO B.LIFO C.FILO D.LILO 74.another name for RS flip flop a.a stable multivibrator b.bistable multivibrator c.monostable multivibrator d.oscillotor 75.equivelent BCD representation of binary 1100010 a.01100010 b.10011000 c.1100010 d.11000100 CSC OFF Campus Recruitment Process Latest 2012 -Selection Procedure Questions of CSC Placement Paper|on March 28 and 28,2012 CSC Written Test Pattern|CSC Technical Written Test Pattern|CSC HR and Technical Interview Pattern and Questions CSC Latest Test Pattern and Selection Procedure In CSC Selection there are 5 rounds 1. Written Test-Quantitative aptitude 2. Written Test-Technical 3. Group Discussion 4. Technical Hr 5. Personal HR After each section 15 minutes break CSC Written test consists 2 sectiions 1.Written Test-Quantitative aptitude No of Questions : 40 Time limit : 40 (CSC aptitude covered all the topics from verbal, Non verbal. It will be useful if you refer R.S. Aggarwal book but as previous years, the questions were not repeated. It was a totally new set of questions and you cannot rely much on old placement papers of CSC ) Topics to concentrate 1. Blood Relation 2. Time and Distance 3. Condition and Assumptions 4. Some logical questions CSC Technical Written test CSC Technical Written Test 2.Written Test-Technical No of questions : 70 Time limit: 75 Minutes 10 Minutes for essay writing( 4topics will given in the paper and u have to write backside of the paper itself. In this written communication is important) CSC Topics to Tech O.S,D.S,DBMS,C language ,Microprocessor Elimintion round CSC Group Discussion Topics 3. Group Discussion CSC Previous Years GD Topics "Who is your Role Model and why?". "Which is best? love or arranged marrriage?", "Is public sector or private sector jobs are best?" Also an elimination round-Given a topic Way of putting points,body language etc., 1 topic-Uses of microprocessor to start and costless 2.Single window system (common to all ) CSC Technical andHR interview Questions 4.Technical HR Questions relate to C,C+,DBMS,O.S etc 5 Personal HR About your college Difficult situation how you overcome Family background etc.,