HP
1. Find the probability of getting a number with 7 between 100 and 999 (both inclusive).
2. There are 10 items in a box, out of which 3 are defective. 2 balls are taken one after the other. What is the probability that both of them are defective?
3. Context free grammar is accepted by
a) finite automatab) push down automatac) two way bounded automatad) both b and c
4. Which is not a memory management scheme?
a) buddy systemb) swappingc) monitorsd) paging
Ans : c
5. Simplify the Karnaugh map given below and derive its expression in SOP form
- 1 1 - 1 - - 1 1 - - 1 - 1 1 -
6. Question on NAND gates implementation.
7. Definition of Context Sensitive Grammar
8. An identifier can start with a letter followed by any number of letter or digits .
9. With the following configuration: 8MB total memory, 256kb cache , 4kb is block size. Using direct mapping, how many different physical memory blocks can be mapped on to the cache.
(a) 64 (b) 256 (c) 128
10. CSMA/CD is used in
a) token ringb) FDDIc) ethernet
11. In TCP/IP header, checksum contains
a) sum of all the wordsb) ones complement of the datac) ones complement of the sum of all the wordsd) ones complement of the sum in ones complement
12. What is the maximum number of acknowledgements for a 4 bit sequence number in a sliding window protocol.
13. Which is a good way of representing varaibles in recursion
a) local variablesb) static varaiblesc) global variables
14. Given the following c program
func() {static int i = 10;printf("%d",i);i++;}
What is the value of i if the function is called twice ?
15. Given the following c program
func(int *i, int*j){*i=*i * *i; *j=*j* *j;}
main(){ int i = 5, j = 2; func(&i,&j); printf("%d %d", i, j);}
What is the output?
16. Given page table, page size and offset find the corresponding physical address ?
17. In a memory chip 4k size and 16bit words are to be stored. No of address and data lines required is:
18. Identify in which pass of the 2 pass compiler are the following compiled
1) literals2) address resolution3) listing
19. Object code does not require
a) relocation bitsb) external names and place where they are locatedc) absolute adressd) all the object codes
20. ARP is in reference to
a) MAC to IPb) IP to MAC
21. Question on Balanced tree - A balanced tree is given and a node is addded at the leaf. Find the no of unbalanced nodes?
22. What is the order of Hashing time:
a) 0(1)b) 0(n2)
23. Given that: s -> s + s ; s -> s * s ; s -> a Find the no of parse trees for a+a*a+a
a) 4b) 5c) 6d) 7
24. Order of deleting a node from a linked list. (pointer is to an arbitrary node)
a)0(1)b)0(n)
25. A choclate of size nXn is given and is to be made into pices of size 1x1. At a time both horizontal and a vertical cut is done. Find the order of complexity
a) O(n2)b) O(nlogn)c) O(logn)
26. A directed graph is represented by adjacency list. To find the complexity of indegree of the node. e - edge n- vertices
27) No of leaf nodes given. find the no of nodes with degree 2.
28) AX = B. A is mXn and B is mX1
a) there is a unique solution if rank of A is same as rank of augumented matrix [A b]b) there are multiple solutions
29. LXI sp,2099h LXI b, 2012h PUSH b
30. A and B are sets. A's cardinality is m and B's is n where m <> runningb) blocked: ready -> running
36. For converting infix expression to postfix what do we require
a) operand stackb) operator stack
37. 0 is reprented as both and negative and positive in
a) ones complementb) twos complementc) two's complement has extra negative number
38. What is the difference between c and c++?
a)In c++ we can define variables in the middleb)dynamic scoping
39. Which of the following is correct
a) Synchronous tranmission needs more badwidth than Asychronous.b) Inasychronous transmission , the time is associated with data itself.....
SECTION A
1. Which of the folowing is not correct a. (x+y)'=x'.y' b. (x'+y')'=x.y c. (x'.y')'=x+y d. (x'+y')'=x'.y' [d]
2. Question on logic ckt. U have to find the output ans. AB'+CD'+EF'
3. Output of MUX _________ c----- c'---- -------Y c'---- ans. A xor B xor C c----- --------- A B (select lines)
4.If X and Y are two sets. X and Y are corresponding coordinates and exact no.of functions from X to Y is 97 then a. X=97 Y=1 b. X=1 Y=97 c. X=97 Y=97 d. .....
5. If two dies are thrown simultaneously what is the prob. of one of the dice getting face 6 ? a. 11/36 b. 1/3 c. 12/35 d. 1/36 [a]
6. The relation ,<,on reals is a. a partial order because of symmetric and reflexive b. ... antisymmetric and .... c. not ...... .. asymmetric and non reflexive d. ... .... not anti-symm and non reflexive 7. In C language the parameters are passsed by a. values b. name c.referrence d.... 8. Advantage of SRAM over DRAM ans. faster 9. Diasy chaining related question (refer Z80) a. uniform interrupt priority b.non .... .... c.interfacing slower peripherals d..... 10. RAM chips arranged in 4X6 array and of 8kX4bit capacity each. How many address lines reqd. to access each byte a. 12 b. 16 c.15 d. 17 11.Question related to AVL trees regarding how many no.of nodes to be changed to become balanced after addition of a leaf node to a particular node. ans . 3 12.When following sequence is insertedin the binary search tree no.of nodes in left and right subtrees 52 86 64 20 3 25 14 9 85 13.Method used for Disk searching.. a.linked list b.AVL c.B-tree d. binary tree 14. Which of the following is correct statement. a. 1's complement can have two zero re[resentations b.2's ... ... represent an extra neg. number c.2's & 1's have no difference in representing 16-bit no. d....... 15. AX=B where A is mXn ,b&X are column matrices of order m a. if m O(log n) .. likewise
1. There was a circuit given using three nand gates with two inputs and one output. Find the output.
a) ORb) ANDc) XORd) NOT
Ans. (a)
2. Suggest a sorting algorithm which is efficient (in worst case) to 10 values
a) Binary treeb) Selectionc) Bubbled) Any of the above
3. What is the number of comparisons in the worst case to merge two sorted lists containing n elements each.
a) 2nb) 2n-1c) 2n+1d) 2n-2
4.Iintegrated check value(ICV) are used as:
Ans. The client computes the ICV and then compares it with the senders value.
5. Question on client-server system using asychronous request from the client
6. If a binary tree is constructed using nodes with two pointers each, how many null pointers does a tree with N nodes have
a) n-1b) nc) n+1d) Depends on the number of edges
7. Which of following statements about heap is wrong
a) An n element heap has height log n(base of log is 2)b) Smallest element of heap is always a leafc) A array in reverse sorted order is a heapd) A heap can't contain any element more than once
8. When applets are downloaded from web sites , a byte verifier performs _________?
Ans. Status check.
9. For the following C program
void insert(key,r)typekey key,data array r;{extern int n;if(n>=max) /*error table if full */else r[n++].k=key;}
This on executing, enables a
a) Basic sequential searchb) Binary searchc) Interpolation searchd) None
10. Find the outpur of the following C program
void f(char *p){p=(char *) malloc(6);strcpy(p,"hello");}
void main( ){char *P="bye";f(p);printf("%s',p);}
11. Time taken to access cache is 100ns and to access memory is 1000ns. Hit ratio given. Find the average access time
12. Path testing is
a) Black box testing strategyb) White box testing strategy c) An installation .........d) An enviornment
13. X:verification' asks are we building the right product Y:validation' asks are we building the product right
14. Which one of the following can't be used to find an internet address given the domain name
a) /etc/hostb) NIS yellow pagesc) DNSd) ARP
15. Flow control is necessary for the transport protocol layer due to the following reasons
a) Unreliable link b) Congestion at receiver c) Packets out of sequenced) None of these
16. In public key encryption, if A wants to send a message to B so that no one else can read the message then A encrypts the message using
a) A's public keyb) A's private keyc) B's public keyd) B's private key
17. Which of the following is not condition having a deadlock resource previous granted can be forcebly taken away from a process
a) Resources need to be used in mutually exclusion fashionb) Process can request new resources, as they continue to hold on to old onesc) Here is a cycle in the resource allocation graph
16. An IP/IPX packet received by a computer using... having IP/IPX both how the packet is handled.
Ans. Read the, field in the packet header with to send IP or IPX protocol.
17. The range of the 32 bit number in two's complement form is _______
18. Cyclomatic complexity
{if((x=0) or (y=0))p=0;else {p=x;i=1;while(i!=y) {p=p+x;i=i+1; }}}
19. Activation record will contain the
a) Storage for simple namesb) Information about attributes for local names c) Return addressd) All of the above
20. Global static variable within a file is intended to
a) Localize swapb) Retain value persistentlyc) Define constantd) Fixed address in memory
21. Why is thread switch faster than a process switch
22. What is the binary equivalent of 41.6875
23. Checkpoint value will be calculated in
24. DHCP is used for
a) IP address allocation b)dynamic host configuration protocol
25. For the following C program
int x(char *a){a=(char *) malloc(10*sizeof(char));*a="hello";}
main(){char *a="new";x(a);printf("%s",a);}
The output is
a) Hellob) Newc) Hello newd) Run time error
1.CSMA/Cd protocol used inAns : Ethernet2.Checksum in IP packet isAns :Sum of the bits and 9's complement of sum3.Inselective repeat Max Seq is given find windowsizei.e. Ans : (15+1)/2 = 84.Main memory cache direct mappingAns : 645.Address lines and data lines for 4K x 16Ans : Addr 12, Data 166.Infix to postsize commession usesAns : operator stack7.Printing ofstatic variableAns : 118.Ans : 1,2,3,4 ( Program is givenarray[0] = 1;array[1] = 2;array[2] = 3array[3] = 4ptr = array[0]*(arr+3) = *(++array ) + *(array-1)++))There may me some mistique in writingthe program. Check it out.Answer is correct9.One Question on SchedulingPreemptive10.Which of the following is not memory model(1) buddy system (2) monitor (3) virtual ... etc.11.Hight balancing AVC timeAns : 312.Virtual to physical address mappingpage table given13.regular expression of identifierL(LUD)*14.Simplification in boolean AlgebraAns : xz15.Logical gate is given we have to find what is thatAns : NOR16.Solution for Diriving philofphingAns : d17.The feature C++ have and c donot haveAns : Variables can be declared inside also.18.Number of nodes with degree two in a binary tree of n leavesAns : n-119.Difference between syachronous and asynchronous transmission
20.The question on RS232(Use of sfart bit in Rs 232 protocal)21.Floating point representationAns : 2's complement1 more negitive numberTwo simple probability questions are also there
Section A : 30Section B : 20
Total 50 questions in 1 hoursP.S. Paper may change. Delhi question paper is not given here.
HUGES ----- > > (A)Aptitude :25 Qns, 20 Minutes> > > > 1. 2 x 4 analytical GRE type qns> > 2. 2-3 Reasoning qns (GRE type)> > 3. Probability of getting a sum of 7 when two dices are thrown together> > 4. Rest quantitative questions> > > > (B) Technical: 50 Qns, 45 Minutes> > > > 1. 3 qns on operating systems. I qn on dijkestra algorithm> > > > 2. Using which pin it's possible to address 16 bit addresses even though there> > are only 8 address bits in 8085? Ans: ALE> > 3. Voltage gain for an amplifier is 100 while it is operating at 10 volts.> > What is the O/P voltage wen i/p is 1 volt> > 4. Quality factor indicates a0 Quality of inductor b) quality of capacitor> > c) both> > 5. Qns related to bridges, routers and generators, which OSI layer they > > corresspond to. (Refer to stevens 4th chapter)> > 6.OPAmp's I/P ciurrent, O/p current and CMRR is given, what is the voltage > > gain> > 7. 2-3 qns on scope of static variables in C. Qn to view o/p odf a C static > > var> > 8. Qn to print a value of a pointer> > 9.resistance increases with temperature in a) Metal b) semiconductor> > 10. A qn to find the physical address from a given virtual address, virtual> > to physical address table was provided> > 11. 16 bit mantissa and 8 bit exponent can present what maximum value?> > 12. 4 bit window size in sliding window protocol, how many acknowledements can be held?> > 13. Security functionality is provided by which layer of OSI> > 14. Frequency spectrums for AM, FM and PM (figure given, u'veto tell which> > Kind of modulation it belongs to)> > 15. Among AM and FM which is better and why?> > 16.LASt stage of TTL NAND gate is called: Ans: Totem Pole Amplifier> > 17. SR to JK flip flop conversion. Ans: S=JQ', R=KQ> > 18. LSB of a shift register is connected to its MSB, what is formed: Ans:> > RING Counter> > 19. 2-3 Qns based on Demorgan's laws (identiies: (A+b)' = A'b', etc)> > 20. 2 qns on Logic gates (O/p of logic gates)> > 21. Diff in IRET and RET statements of 8086> > 22. How many address bytes are required to address an array of memory chips> > (4 * 6), each chip having 4 memory bits and 8k registers.> > 23. Diff. in memory mapped and I/P O/P mapped Input/Output (Refer a book on Microprocessor)> > 24. Qn on pipeline architecture> > 25 QN on LAPB protocol
1. given a digital ckt with nand gates. what is o/p Ans. nor gate2. given an logical expr. x,y,z. simplify ans. xz3. It is recommended to use which type of variables in a recursive module.Ans. static variables.4. which one of following is not memory management model?
given buddy system, monitors, paging, swapping Ans. monitors5. what m/c is used to recognize context free grammar ? Ans. pushdown automata6. Which type of grammar can be recognized by finite state m/c Ans. right linear grammar.
7. proc() {
static i=10;printf("%d",i);}
If this proc() is called second time, what is the o/p Ans. 11
8. int arr[] = {1,2,3,4} int *ptr=arr;
*(arr+3) = *++ptr + *ptr++;
Final contents of arr[] Ans. {1,2,3,4}
9. TCP/IP hdr checksum : what method is used ?Ans. one's complement of sum of one's complement.
10. CSMA/Cd is used in which lan Ans. ethernet
11. 8085 pgm : LXI sp, 2021,LXI b, 1234 (??)
push b
contents of stack after pushing ?
12. One question on synchronous transmission :
ans. Timing info is embedded in data itself13. What for start bit is used in RS232 transmission.
14. One solution for deadlock prevention for dining philosopher's problem
Ans. Allow one person to take first left stick and then right stickand remaining persons in reverse order.
15. 4bit seq no in sliding window protocol with selective repeat.what is the max no. of acks that can be held at transmitter ans. 816. given a height balanced tree. If we add one more node , how many nodes gets unbalanced ? Ans. 3
17. Given a arbitrary pointer to an element in a singly linked list? what is the time complexity for its deletion . Ans. O(n)18. what is the diff b/n c and c++
a. dynamic scopingb. nested switchingc. declaration of variables in any code blockd. separation of compilation and linking
Ans. c (??)19. which one is false ?
a. 0S+S; s->s*s; s->a
how many parse trees possible : a+a*a+a Ans. 521. 4-1 demultiplexer is to be implemented using a memory chip. how many address lines and word length required Ans. 4, 1
22. Vector intr mechanism. in 8085.
Ans. fixed locations in memory when an intr comes.23. ARP is used for : Ans. IP to MAC addr conversion.24. given 100 to 999 nos. Probability of picking a no. with out digit 7. Ans. 18/25.25. Ten film rolls. 3 defective, prob. of picking up 2 defective rolls with out replacement Ans. 6/9026. The purpose of hashing is :Ans. O(1) complexity
27. Given adjacency matrix for a directed graph with n vertices and e edges. How much time will it take to find out indegree of a vertex Ans. O(n)28. No. of nodes of degree 2 in a binary tree with n leaf nodes. Ans. n-1
1. Find the probability of getting a number with 7 between 100 and 999 (both inclusive).
2. There are 10 items in a box, out of which 3 are defective. 2 balls are taken one after the other. What is the probability that both of them are defective?
3. Context free grammar is accepted by
a) finite automatab) push down automatac) two way bounded automatad) both b and c
4. Which is not a memory management scheme?
a) buddy systemb) swappingc) monitorsd) paging
Ans : c
5. Simplify the Karnaugh map given below and derive its expression in SOP form
- 1 1 - 1 - - 1 1 - - 1 - 1 1 -
6. Question on NAND gates implementation.
7. Definition of Context Sensitive Grammar
8. An identifier can start with a letter followed by any number of letter or digits .
9. With the following configuration: 8MB total memory, 256kb cache , 4kb is block size. Using direct mapping, how many different physical memory blocks can be mapped on to the cache.
(a) 64 (b) 256 (c) 128
10. CSMA/CD is used in
a) token ringb) FDDIc) ethernet
11. In TCP/IP header, checksum contains
a) sum of all the wordsb) ones complement of the datac) ones complement of the sum of all the wordsd) ones complement of the sum in ones complement
12. What is the maximum number of acknowledgements for a 4 bit sequence number in a sliding window protocol.
13. Which is a good way of representing varaibles in recursion
a) local variablesb) static varaiblesc) global variables
14. Given the following c program
func() {static int i = 10;printf("%d",i);i++;}
What is the value of i if the function is called twice ?
15. Given the following c program
func(int *i, int*j){*i=*i * *i; *j=*j* *j;}
main(){ int i = 5, j = 2; func(&i,&j); printf("%d %d", i, j);}
What is the output?
16. Given page table, page size and offset find the corresponding physical address ?
17. In a memory chip 4k size and 16bit words are to be stored. No of address and data lines required is:
18. Identify in which pass of the 2 pass compiler are the following compiled
1) literals2) address resolution3) listing
19. Object code does not require
a) relocation bitsb) external names and place where they are locatedc) absolute adressd) all the object codes
20. ARP is in reference to
a) MAC to IPb) IP to MAC
21. Question on Balanced tree - A balanced tree is given and a node is addded at the leaf. Find the no of unbalanced nodes?
22. What is the order of Hashing time:
a) 0(1)b) 0(n2)
23. Given that: s -> s + s ; s -> s * s ; s -> a Find the no of parse trees for a+a*a+a
a) 4b) 5c) 6d) 7
24. Order of deleting a node from a linked list. (pointer is to an arbitrary node)
a)0(1)b)0(n)
25. A choclate of size nXn is given and is to be made into pices of size 1x1. At a time both horizontal and a vertical cut is done. Find the order of complexity
a) O(n2)b) O(nlogn)c) O(logn)
26. A directed graph is represented by adjacency list. To find the complexity of indegree of the node. e - edge n- vertices
27) No of leaf nodes given. find the no of nodes with degree 2.
28) AX = B. A is mXn and B is mX1
a) there is a unique solution if rank of A is same as rank of augumented matrix [A b]b) there are multiple solutions
29. LXI sp,2099h LXI b, 2012h PUSH b
30. A and B are sets. A's cardinality is m and B's is n where m <> runningb) blocked: ready -> running
36. For converting infix expression to postfix what do we require
a) operand stackb) operator stack
37. 0 is reprented as both and negative and positive in
a) ones complementb) twos complementc) two's complement has extra negative number
38. What is the difference between c and c++?
a)In c++ we can define variables in the middleb)dynamic scoping
39. Which of the following is correct
a) Synchronous tranmission needs more badwidth than Asychronous.b) Inasychronous transmission , the time is associated with data itself.....
1.
f(char *p){ p[0]? f(++p):1;printf("%c",*p);}if call that fuction with f(Aabcd) what is the output??ans:dcbaA (Just reversing the string
2 f(char *p) { p=(char *)malloc(sizeof(6));strcpy(p,"HELLO");}main(){ char *p="BYE"; f(p)printf("%s",p);}what is the o/p???ans:HELLO3
To sorting array of 10 elements which sorting is besta)slectionb)bubblec)tree sortd)....ans:a
4
To saving space paoint of view which sort is besta)selectionb)insertionc)both a & bd)...check it once.U Can easy Aanswer this question(UCA)
5Which statement is wrong on heapa)Any two childs should not sameb)..c)..d)...ans:a6) one more question on heap
UCA
7read about cyclometric complexity..8
how many null pointer are there in N number binary treeans:N+1
9Two sorted list of size n what are the maximum comparison in mergeANs:2n-110converting 41.685 to binary11
pc is incremented while executing ---------- instructionans:fetch instruction
12
this is gates (NAND)problemIt means some gate figure has given with all NAND gate we have writeequavalent gateans:OR gate
13x:validating :Are we producing product righty:verification:Are we producing right righta)X is wrong statementb)y is "c)x and Y "d)x & y is right statement
14
NFS some queston in NSF. see distibuted operation System book by tenaun bamab15.IP & IPX is implemented in trasport layer.......mama all our friends can answer this question .Here i am unable to recallthat question.If u a have any doubts on Ip & IPX contact HARI because hedid his project is B.Tech in that protocals
UCA16
comparison between hashtable and binary treeans:aUCA
17client server is working in asyn mode then how communication will take placebt client and server.
UCA18once context swithing occures then ------------will take placea)saving registerb)saving stackc)....d).....UCA
19If precondition is failed what u say about postcondition?Note:Read about preconditon and postcondition20whiling download java applete then web broswer do the follinga)checking the class structure..b)...c)....d).....Read about this21Strings in Javaa)Mutableb)variable length stringc)...d)....ans:b22in Internet Transprot layer which is not a protocola)/etc/hostb)TCPc)UDPd)...UCA23
Which is not specified in CODD's rulesa)....b)....c)...d).....
It is from DBMS questionRefer NAVATHI BOOK chapter -9 appendx topic is CODDE's rules24
what is the use of Normalizationa)....b)....c)...d)...Any one can answer25
Futional dependecy x->y is shows thata)if x1=x2 then y1=y2b)...c)...d)...ans:a26
one question on IP addsress 243.65.77.8 some thinga)...b)..c)..d)...every one can answer27
If A sends a message to B with encryption then key isa)A public keyb)B public keyc)A private keyd)B private keyans:b (Check it once)28
In a class only declaration of the function is there but defintion is notthere then what is that functionans:virtual function
29what is not necessary condition in dead lockans:a30One question from multible inheritance...a)..b)..c)...d)......31)ICV protocali don't know about this mama .Till now i didn't heard that protocolmama..just know what is that then u can answer this question
32
one question from catches like write-through protocal etc33catche access time is 100ns ,memory access time is 1000ns and hit ratiois 0.9 then what is average memery access timea)100nsb)200nsc)400nsd)500nsans:b
SECTION C:1.an lead compensator zero is at Z=Zc, pole is at P=Pcthen the following is correcta.Pc >Zc,pc<0,zc<0b.c.2. p="(char" p="hello" p="bye" x="0y="0)" y="1;" y="0;">y in a relation R, x1 and x2 are in x, y1 and y2 are in y(question not cleared), about functional dependancya.x1=x2 and y1=y2b.c.43. in a down loading from website ,which one is correct?ans: check the byte code and indicate the error, if any.44. about UDPone Address is given but that is not the state tablewhat will it do the packeta. packet is discardedb. packet is sent to ethernet serverc. packet is sent to other addressd.
45. in associated memory for fast accessingwhich one is useda. single linked listb. double "c. hash tabled.
questions.==> 1. a processor has two level cache.Their access time (level1 and level2) is 100ns and 300ns respect.Memeory access time is 1000ns$==> ans is 140 (b)==> 2.diskless server uses==> a rarp==> b arp==> c ftp==> d.telnet==> ans rarp==> 3.which one of them is not a client server==> e-mail==> telephone==> webserver==> and one more==> ans is e-mail or telephone.==> 4.Which one is used to represent operations==> infix==> postfix==> binarytree==> and one more==> ans binary tree ==> 5.one qustion was on private key and public key.The quest. was if a wants to send a message to b that no one other that b should $==> A private key==> A public key==> B private key==> B public key==> 6.compliers maintain==> ans is symbol table ==>
/++++++++++++++++++++>From Diwakar.../+++++++++++++++++++++++
1) what a java interface not have ? ans - instance variables 2) what is done with java code on a web-page ans - downloaded and executed on ur pc 3) what is the order of deleting a node from a linked list given a ptr to it ans O(n) ( since u have to traverse the list to reach the prev.node) 3) what is RSA 4) how can A send a messageto B so that B knows its from A ans A uses his private key so that B can use A's public key 5) what is the best sort in worst case ans heap sort 6) what is the given sorting ans selection ( check it ) 7) what can access protected memebers of a class ans other classes of that program 8) what protocol is used by a machine to map an ip to hardware address ans arp 9) what is the size of ipv6 ans 128 bits 10) what protocol has ping ans icmp 11) how many keys are needed in symmetric and asymmetric crptography? ans - i dont know 12) one on a right threaded tree 13) very easy k-map ans i think its b) 14) very easy ckt ans choice which has option : a&c are equivalent 15) what in unix doesnt have a fd ans process ( this was the first ques ).
Regarding Hughespaper they conducted two tests. Both were technical(no aptitude test). First one was compulsory for everybody. In second one could opt forelectronics or computers. In all i suppose there were 50 questions.I sent a request to my classmates to send me questions whatevery theycould recall. Till now only one person has responded. I am sending thosequestions to you.
And just before interview you were supposed to fill up a performa whichthey call Behavioural Test. This was to check you interpersonal skills andsocialising capabilities. Questions like - would you like to be electedleaders of organising committees, do you like peoply express their agoniesto you, do you wish people be close to you type questions were repeated inone and the other form.
Interview was technical as well as personal. CGPA did count - it seems.They selected 8 people from here. BTW what's your current CGPA and what'sthe strength of your class. Do they come for B.Tech and M.Tech separatelas the case here is or it's all at once.
Questions : 1.If a precondition of a sub routine fails then a. post condition fails as well b. Post condition may fail c. post condition is declared but now defined.
2. whatz the o/p of the following program char * a= "AabbCc"; void x(char *a) { a[0] == 0 ? x(a+1):1; printf("%c",*a); return 1; } x(a);
a. AaBbCcb. cCbBaA
3. What is DHCP used for?
4. There are 2protocols IP and IPX are running on top of Ethernet. Supposea packet addressed to that ethernt card arrives, to which protocol theethernet sends the packet?1. It checks the payload of the frame and finds out the protocol type anddespatches it to the right protocol2. It fins out the protocol type that is mentioned in the ethernet frame.3. despatches to both the protocol
5. What is the use of global static variable in C?
6. In which stage of the compilation the Macro in C are converted intoIline code? (this is not the exact Qn a slight variation of it)
7 In the IP/Ethernet network, a packet with destination address192.32.65.70 arrives and there is no entry for this address in the routingtable of the m/c? what does the m/c do about the packea. discards the packet.b. Brodacasts into the ethernet.c. sends to default router
8. in Public key Encryption , if A wants to send a encrypted msg to B thenA encrypts the message with a. A's public key2. A Pvt keyc. B's public keyd. B's Pvt key
9. consider the SQL statement "Create table New as select * from oldtable"a. the sql stament is a correct oneb. New is reservd word there is an errorc. you can't select anything while creating a table10. By Codd's defn for RDBMS whih one is not right? options , I don't remeber
11. If X and Y are two attriubutes of a relation and 1 and 2 be any twotuples in that relationY is fuctionally dpndant on X iff (X->Y)
a. if (x1 == x2) then y1==y2b. if (x1==y1) then x2 == y2someother combinations
12.The normalization process 1.reduces the data redundancy2.It reduces the inconsistency that arises due to the data redundancy
13. ((A nand A) nand (B Nand B)) = ?a. A+B
The question was not exactly in this form. gates represented pictorilly
14. whtz the purpose of flow control?1. to control errors. to control congession the receiving end3. to sequnce the out of sequence packets
15. Whic is false about Java strings1. The are Null terminated2. Set of Chars3. The Condition checking == and = on a sme pair of strings givesdifferent results.
16. When a java Applet is downloaded what does it do?Don't remeber the optionsit's went something like this:1. checks the magic nubmer
17. Whatz is the Cyclometic complexity of the following codedon't remember the code exactly
Some more questions...======================
1:a machine A wants to set it's time same as a a machine Bso it sends a packet to B and b sends reply.but the time on packet is over by the timete packet reached A.A has toa1:set the time on packetb2:increment its time slowly so as to reduce deifferencec:send packets repeatedly till it gets a packet with time less tan the current timed:....
2.which of the following protocols does not find mac address given internet addressa>arpb.rarpc....d...
3.when an java applet get's downloaded what happensa.the byte verifier checks the magic numberb...c...d...
4.when A wants to send a mesg to B using Public key cryptography he usesa.A's public keyb.A's private keyc.B's publicd.B's private
5.how does a string in java differ from that of c/c++a1.java strings are mutableb.java strings does not have a \0c.d.
6.given str="AaBbCc"and a small c programsomething like
a:b:( )
the program actually reverses the string recursively
7.some protocol SHDC
8.NFS server is similar toa.provides similar sevices as unixb.a file trans fer.....c.just gets the file for reading..d.
9.an address 202.15.46.45 is to be located.the machine does not have info about 202.0.0.0 or 202.15.0.0 0r 202.15.46.0so the DNS server willl now
a.discard the packetb.send the mesg to a default server if availablec.send mesg to a DNS server if availabled......
10.verification:"are u building the right product" validation:"are we building the product right"
a.both are wrong(ans)b.both are correctc.first wrong second correctd.first correct second wrong
11.A:"cohesion is a desirable property" B:"cohesion means the property that the entire unit is one......"
a.both are correct b.both are wrongc.first wrong second correctd.first correct second wrong
12:definition of functional dependency.
13:which of the following does not use extra memorya.....b.insertion sortc.shell sortd.both b and c.
14:which of the following is better for ten elements
a.bubble sortb.selection sortc.quick sortd......
15.the memory reference time for cache is 100 ms and for memory is 1000ms.the probalility of a hot is .9.the average memory access time isa:100b:200(ans)c:500d:1000
16.a question on socket numbers
17there is an ordered binary tree and an index structurea.we can use ordbintree without orderingb.orb are used with ordering whe
All ques. had four options.
1- What is max. no. of hops in hypercube n/w with n (=2 ^ p) to go from one node to another ?a. pb. log pc. n ^ 22- What is Kerberos ?ans. Authentication Protocol.3-In completely connected multiprocessor system with n processors , links will be of the order ofa. O(n ^ 2)b. O(2 ^ n)c. O(n/2)4-When quick sort gives worst performance ?ans. When elements are in order.5- o/p of each sorting step of 8 elements was given and had to recognise which sorting algo.?Ans. Bubble sort (Not Sure , Check it out )6-In worst case ,which sort is best out of following sorts?a.heapb.selectionc.quick (ans.)d. insertion7-Three very simple gate circuits each having inputs A,B,C,D were given and had to tell ,which two give same result ? (DeMorgan's Law was used in solving )Ans was (a) &(c) (o/p of a & c was coming to be AB +CD)8-K-map given,had to tell simplified functionAns was perhaps AB+AD +AC+BCD
K-Map was CD` AB 0 0 0 0 0 0 1 0 1 1 1 1 0 1 1 1
9-What is Function Point ?Ans. S/W estimation technique10-p points to an integer. We don't want p to change value. In C, what declarations will we use?A const int *pb.int *pc.int const *pe. int* const p (perhaps ans.)11-Diff between 2NF &3NF ?Ans. D (last option)12.Which does not use client server model ?a. Emailb. Web accessc. C. Telephone calld. N/w file system13-In a pipeline having 3 stages, each having reliability of 0.9 ,what is overall reliability of pipeline?a. 0.9b. 0.729c. 0.8114-2level cacheis there first level cache's access time is 100ns,second level cache's access time is 33ns & memory access time is 1000 ns . Wh at is total memory access time ?ans. 140 ns15-In public key cryptography,Awillsend message to Bans. Using B's public key16-What does projection of a relation give?Ans.gives vertical partition of relation corresponding to specified columns.17-For disk or direct access storage, which is best ?a. AVLb. B-treec. Red tape ...18-There is a tree with inorder threading Node B is inserted as left child of nade A. Node A already has right child . Where will the null ptr of B point ?ans. Parent of A (perhaps)19-There is a diskless workstation. Which will be the first protocol it will use ?a FTPb. ARPc. HTTPd. RARP20-Compiler keeps which of following ?
ans. Symbol table21- 'ping' command uses which protocol ?ans. ICMP22-Merge sort uses which technique?Ans. Divide and Conquer23-Program counter is incremented ina. fetch (ans)b. decodec. execute24-what does the following program do ? f(int n) { int c; while(n) { n&=n-1; c++; } print c; }ans. Program prints the no. of set bits in no.25-What is this called (char *) (*(*(*A[X]) ( ) )) ( )ans. Array of X pointers to a function returning pointer to functions that are returning pointer tochar (not sure )26- For synchronisation in distributed computing, what should not be there ?a. all machines are synchronised by a global clockb. all systems should have their own clock (perhaps ans)27-Java applet of a moving /waving file is running on one machine then it meansa.Java's executable code is downloaded and running on the m/cb.A virtual X server is running on that m/c while the actual program is running on the web server.28-What is in RSA algo. ?a. First the session key is encrypted & then whole message is encrypted using RSA Algo.b. Message is encrypted using RsA algo.c. First Rsa algo is used &then encrypted with the session key.29-What is dirty read?a. Transaction reexecutes and gives diff. Results from the original executionb. Read is done when the transaction is not yet committed
30-What is coupling ?a. It tells the strength of interconnection between two program units.b. It tells the strength of interconnection between twtrength of interconnection between two program units.b. It tells the strength of interconnection between twwwtrength of interconnection between two program units.b. It tells the strength of interconnection between twwwo program units and one program unit31-Any n/w on the computer can have onlya. one domain &one IPb. more than one domain & more than one Ipc. one domain and more than one IPd. more than one domain & one IP32-Which one does not have file descriptor ?a. processb. keyboardc. piped. socket33-What does CONNECT BY meansa.connect to a different databaser for retreivalb.arrange in tree ordered structure34-In two phase commit protocol, why log is used during transmission &reception ?a. To retrieve the status in case of crash35-In which algo. Waiting time is minimun?Ans, SJF36-How many address bits are there in Ipv6ans. 128 bits37-During run time heap is managed bya. a user process in kernel modeb. A system process manages heap for all the processesc. A system process for each processd. A user process in user mode38-In which of following search is efficient?a. height balanced treeb. Weight balanced treec. Binary tree39.A ques. on resource relocation, sharing ( I don't remember more than this regarding this ques.)40-some ques. options were sth likea. transparency controlb. Migration controlc. Concurrency control41-X:In DFD, input is converted into output by passing through various functional unitsY:DFD cannot be used in object oriented designa. both X& y are correctb. both X & Y are incorrectc. X correct, Y incorrectd. Xincorrect, Y correct42-Where regression testing is used ?a. Dynamic analysersb. Loaders43-For Java interfaces , what is true ?a. Functions declarations are not given'b. Variables are not declaredc. Instance variables are not used44-In a linked list, we can delete a node in order ofa. 1b. nc. n ^ 245-If there are N people and we have to do symmetric & asymmetric cryptography, how many keys wouldbe used in these cases respectively?a. N & N ^ 2 (probably ans)b. N ^ 2 & Nc. N & Nd. N ^ 2 & N ^246-The protected element of a class can't be accessed bya. member functions of the same classb. member functions of the derived classc. member functions of any other class in the same program (Ans.)47-NFS uses same file structure as unix48-To solve an expression which of following trees will you use ?a. postfixb. infix
> Here are some questions of Hughes software system computer part:-> > Q. 1 void x(char* a)> {> (a[0])?x(a+1):1;> printf("%c",*(a+0));> return 1;> .........;> }> Input string 'a' is assigned as AaBbCc , what is the output?> Ans.-cCbBaA> > Q2 a question on digital gates ANS is OR gate.> > Q3 what is the binary representation of 41.6785> > Q4 if the precondition for a subroutine does not hold then > 1.postcondition does not hold > 2.postcondition may or may not hold> 3. ?> 4. ?> Q5. In java > 1. java strings are mutable. And some other options on java strings> > > Q6. Void f(char *p)> {> p = (char*)malloc(6);> strcpy(p,"hello");> }> void main( )> {> char *p = "BYE";> f(p);> printf("%s",p);> }> ANS BYE> Q7. A question on write through and write back algo.> Q8. What is concerned with transport layer.> Ans PORT.> Q9. A server can work with ip and ipx protocol.how the server will> determine to which protocol the incoming packet coresponds .> Q10. For which purpose dhcp is used ANS ip address> Q11 global vaariable defined as ststic will serve the purpose of ---> Q12 Question on NFS ANS It uses the same semantics as unix for> file system> Q13. Program counter is incremented typically in which uses ANS fetch> Q14 NO of NULL pointers in a tree with n leaf nodes ANS N+1> Q15.thread take less time than process context Why? Ans. Address space is> same.> Q.16 Which algo is best for sorting 10 elements?> Ans. 1> binary tree 2> selection 3> bubble 4> none> Q.17 a question on ICV(networking)> a) When A sends an ICV and message, B computes ICV , checks It with given> ICV,and decodes Message> b) Similar other> Q.18 When server A sends a time request to server B, (time> synchronization), and response becomes past, What does A do?> a) resets its own clock> b) resends time request again> > Q.19 in public key encryption what does A do such that It is not visible> to others?> a) A uses public key part of A> b) A uses private key part of A> c) A uses public key part of B> d) A uses private key part of B> Q.20 function dependency can be described as:> Q.21 q. on findind cyclometric complexity of the given program> 1> 7 2>5 3> 4 4> 0> Q.22 Codd's rule related to database > Q.23 path testing comes under> A) white box > B) black box> Q.24 when an ip address is not in the computer adresss resolution file> what does It do with that packet> a)Ignores It> c) sends It to default gateway> d) sends It to ethernet server> Q.25 execution divided in different stages then this is called ANS.> Pipelining> Q.26 in C the macros are> ANS. converted in to inline code during preprocessing > Q.27 X: verification means doing the right things> Y: validation means doing things right> a) both true> b) both false> c) one true one correct> Q.28 void insert (key, r)> Keytype key, data> {> if (n>=max)> ERROR> Else> R[n++].key=k;> Which is best?> 1> sequential search> Q.29 which is best for associative list searching?> 1) single linked list> 2) doubly linked list> 3) hash table> Q.30 A question based on SQL ?> Q.31 which is not necessary condition for deadlock?> 1> mutual exclusion> 2> no preemption> 3> is ANS.> 4> Circular wait
There were two papers one was aptitude ( 36 questions) and other was technical(20 questions)
1: given an expression tree and asked us to write the in fix of that expression
four choices
2: global variables in different files are
a:at compiletimeb) loading timec) linking timed)execution time
3)size of(int)a) always 2 bytesb) depends on compiler that is being usedc) always 32 bitsd) can't tell
4)which one will over flow given two programs2prog 1: prog2:
main() main(){ {int fact; int fact=0long int x; for(i=1;i<=n;i++)fact=factoral(x); fact=fact*i; } } int factorial(long int x){ if(x>1) return(x*factorial(x-1);}
a) program 1;b) program 2;c) both 1 &2d) none
}
5) variables of fuction call are allocated ina) registers and stackb) registers and heapc) stack and heapd)
6)
avg and worst case time of sorted binary tree
7) data structure used for proority queue a) linked list b) double linkedd list c)array d) tree
8)
main(){char str[5]="hello";if(str==NULL) printf("string null");else printf("string not null");}what is out put of the program?a) string is null b) string is not null c) error in program d) it executes but print nothing
9)there are 0ne 5 pipe line and another 12 pipe line sates are there and flushed time taken to execute five instructions
a) 10,17b) 9,16c)25,144d)
10)
for hashing which is best on terms of bucketsa)100 b)50 c)21 d)32 ans 32
11)
void f(int value){for (i=0;i<16;i++){if(value>>1) printf("1")else printf("0");}}what is printed?a) bineray value of argument b)bcd value c) hex value d) octal value
12)
void f(int *p){static val=100;val=&p;}main(){int a=10;printf("%d ",a);f(&a);printf("%d ",a);}what will be out put?a)10,10
13)
struck a{int x;float y;char c[10];}union b{int x;float y;char c[10];}which is true?a) size of(a)!=sizeof(b);b)c)d)
14)
# define f(a,b) a+b#defiune g(c,d) c*d
find valueof f(4,g(5,6))a)26 b)51 c) d)
15)
find avg access time of cachea)tc*h+(1-h)*tm b)tcH+tmH
c) d) tc is time to access cache tm is time to access when miss occure
16)
main(){char a[10]="hello";strcpy(a,'\0');printf("%s",a);}out put of the program?a) string is null b) string is not null c) program error d)
17)
simplyfy k map
1 x x 01 x 0 1
18)
int f(int a){a=+b;
//some stuff
}
main(){x=fn(a);y=&fn;what are x & y typesa) x is int y is pointer to afunction which takes integer value
19) char a[5][15];int b[5][15];address of a 0x1000 and b is 0x2000 find address of a[3][4] and b[3][4]assume char is 8 bits and int is 32 bits
a) b) c) d)
there are 20 questions all in techinical paper and 36 questions in appititude test
in appititude thay have given all diagrams and asked to find what comes next
thay are quite easy and i hope if u practice r.s aggraval u can do it easily
for tecnical thay have given 1 hr for 20 questions and for not technical thay have given only 40 minand 36 questions
this is the paper i have right now
1. main() { fork();fork();fork();printf("\n hello");}
How many times print command is executed?
2.main(){ int i,*j; i=5;j=&i;printf("\ni= %d",i); f(j);
printf("\n i= %d",i);}
void f(int*j){int k=10; j= &k;}
output isa 5 10b 10 5c 5 5d none
3. some question on pipeline like you have to findout the total time by which execution is completed for a pipeline of 5 stages.
4.
main(){ int *s = "\0";
if(strcmp(s,NULL)== 0) printf("\n s is null")p else printf("\n s is not null");}
5. some syntax which returns a pointer to function
6. size of integer is a. 2 bytes b 4 bytes c. machine dependant d compiler dependent.
7.max and avg. height of sorted binary tree
a. logn nb n logn
8. some question. like the number was shifted everytime by one and bitwise and with 10000000. one was supposed to find what the code was doing. I feel the answer was most probably finding decimal value.
9. int a[5][4] int is 2 bytes base address for array is 4000(Hexa) what will be addr for a[3][4]? int is 4 bytes same question.
10. implementation of priority queue a. tree b linked list c doubly linked list.
1.Flush of a bathroom is equivalent to which electronics circiut(a) Capacitor (b)Integrate and dump circiut(c)Diode (d)ans: (a)
2.There were two questions on Unix programming.I don't remember the programmeexactly.But the question were asked to find the o/p of the programe and the error of the programme.
3.In Internet Transprot layer which is not a protocola)/etc/hostb)TCPc)UDPd)...
4.How many address bits are there in Ipv6?
5.There are 2protocols IP and IPX are running on top of Ethernet. Supposea packet addressed to that ethernt card arrives, to which protocol theethernet sends the packet?1. It checks the payload of the frame and finds out the protocol type anddespatches it to the right protocol2. It fins out the protocol type that is mentioned in the ethernet frame.3. despatches to both the protocol
6.path testinga. black boxb. white box(ans)
7.There were questions on ICV. I don't remember the questions actually
8.Normalisation
9.One question was from Avalanche diode
10.CSMA/CD is used ina) token ringb) FDDId) ethernetAns : d
11. if even parity is used for parity generation, what is thehamming distanceans:2
12.the code set is {00000,00111,11100,11011}what is the error detecting and correcting capability?ans:2,1
13. IEEE 802.5 isans: TOKEN RING
14. about deadlock condition
Section B:(Apttitude and reasoning most of them were mathematics based)-------------------------------------1.There were four guys and three girls in a park along with their dogs.Sangeeta is unmarriedThere are two couples.Rahul is Jaya's husband.Neelam is Gourav's sister.Others were Ravi and Shakti.Sangeeta doesn't like sitting beside rahul.Jaya doesn't like the dog so their dog was hold by her hubby.Ravi was not holdind any dog since his wife was holding it.Determine the sitting arrangement in the park.
2.A man spends 1/6th of his total life in child hoos, 1/7th as youth, 1/12th as bachelor, five years after marriage a son was born. the son died four years before his father, at an age of half of his father's final age.ans: 84 days
3.Five persons A,B,C,D and E were traveling in a car. They were two ladies in the group. Of them who knew the car driving one was a lady. A is brother of D. B wife of D, drive at the beginning. E drive at the end.
1) Which of the following is a pair of brothers. (Ans.: A, D)2) Who was the other lady in the group. (ans: C) 3) In the case of which the following pairs, no relationship can be established with one else in the group (ans: C, E) 4) How was E related to A.
4.1,4,9,_,_,_,49,64.
5.One question was on the polynomials and their degree.I don't actuallyremember the expression.
6.There were 4 more questions on the numbers series.Practice them from a good book.
7.Find the hypotaneous of a right angle isoceles tringle whose area is50. Ans. 10*(root 2)
8.(root 200) - (root 50) =?
9. Factorize y**2 + 8y - 48 =0
10.21, 463, 687, 238, 1134, ----
11.0, 6, 24, 120, 210, ---, ----
12.There were two sums on probability.13.
14.Cost of article x,first discount is y% of cost, seconddiscount is z%of cost . The price of x isx(1-y/100)(1-z/100)(ans)
The interview pattern will be as:
1. Tell abt your self.2. They will ask for the subjects in which we are strong( Here they will consider the ranking that we written during written examination & marks we got in written exam)3. Mostly the interview time will be 45 minutes around (for only people there is about 1.5 hr)4. HR questions may include here5. Good thing is They r friendly and cooperative so confidence place role.
If u don't know the answer better not to answer than to tell some bad stuff.For me 2 people interviewd. As I told them that I am strong in Cthey told me to write some programs like double linked list, singly linked list(adding node at last), macros, const *,char *,pointer arrays.
The main question that they asked was how can u compile or execute 'c' program without editor. (Using TCC utility)
coming 2 cpp only 1 question i.e what is polymorphism.
Java they asked me about protocol used in JSP, which layer does it belongs to, main differences between Javascript ,java and JSP.
During personal introduction try to excell your capabilities by giving examples like as fast learner, hard worker like..!
If u have any achievements & awards try 2 put them all during personal INtroduction.
The interviewers are very co-operative and highly friendly (so confidence plays vital role)
WISHING U ALL THE BEST FOR YOUR SUCCESS
Make a note that Technical round is the main one.I think there wont be any elimination at HR level unless luck unfavours us.
Added Experience is Definite Added Advantage.
here are the HP interview questions asked .....but it depends on who takes ur interview1] tell @ urself2]ur fav. prog. language3]write string compare program in C (optimize it)4]what is DML in oracle.5]what is RDBMS? howz it different from DBMS?4]What is abstraction? is it only in OOP or in C too? can we say printf func. in stdio.h is an abstraction?5]how will u write a prog to perpare a report based on sorting files on date. i.e u have say 10 files and u have to sort them n make a report of them date of creation/ size - wize.6]a question of java prog. where class was subclass of String and few output functions were there.7]few questions on output in C related to pointers (easy)8]Normalization? functional dependency vs. transitive dependency?9]Unix - some easy ones.----------------------------------------------------------------2nd round u know what is a test plan? is testing important? how will u estimate time taken for testing in product dev. life cycle? given an estimation problem?kinds of testing? what testing a developer has to do ...order of different kind of testing....which is imp testing or development from risk point of view and from personal point of view. what id more imp. work or money?----------------------------------------------------------------
3rd round
tell something about urself....what do u know @ HP? why looking for a change?
if u have done some cerification/course then why? which are the good companies acc. to u and why?
why join HP? ........ and then
u will be offered the job.
Bon Voyage!!!!!!!!!!111
he test consists of 4 sectionsTotal 48 questions12Q - general computer knowledge12Q - computer science(dbms,networks,os) concepts like questions on paging, ...12Q - c/c++ questions12Q - java questions
The question paper had 48 questions to be answered in 1hr. Time will be quite sufficient. They have different sets(3) of question papers. I had got the paper with serial number ending with ***- 02-2003. I would like to request everyone who have attended the HP test to contribute the questions that they remember. Some questions that i remember are...................
1>General section : computer science general knowledge
2> Computer science general: simple questions
1) HP acquired this company in 2002. Which is the company
a)Compaq b)Dell c)option 3 d) Option4
Ans: a
2) what does 3G denote
a) 3rd generation mobile communication b) 3rd generation computer languages c) option 3 d) option4
Ans: a
3)an application program that is used by the users to get the inofrmation from the backend of some application like databases:
a) application server b)proxy server c)database server d)option 4
Ans: database server
4) which of the following is not true about the e-mail
a) it can be accessed by a client program using POP
b) it can be accessed by a client program using imap protocol
c) option 3
d) option 4
Ans: I don't remember the answer but first 2 are true.
5) Some quesion regarding the company and who developed it ( the thing to remember is that Apple produce Macintosh computers).
5) What is X.25?
a)option 1 b)option 2 c)option 3 d)option 4
Ans: find out??:-)
>>> napster app is used for : downloading music
3> c/c++ section: questions on c/c++, programs o/p etc.
1) main( )
{
unsigned int i=3;
while( i >=0)
printf( "%d", i--);
}
how many times will the printf stmt be executed?
a)0 b)3 c)4 d)infinite
Ans: I think the answer is infinite, b'cos 'i' is an unsigned integer and it will not decrement below '0' and hence end up in an infinite loop.(yes, i checked and it is getting stuck in an infinite loop)
2) main( )
{
int x,y, z;
x=2;
y=5;
z= x+++y;
printf("%d %d %d", x, y z);
}
a)3 5 7 b)option 2 c)option 3 d)option 4
Ans: a
3) # define swap(a,b) temp=a; a=b; b=temp;
main( )
{
int i, j, temp;
i=5;
j=10;
temp=0;
if( i > j)
swap( i, j );
printf( "%d %d %d", i, j, temp);
}
Ans: On compiling i got ans 10, 0, 0. I did not understand the concept. Please expalin this to me.
4>Java section: questions on java related stuff.
1) Java was initially code named as:
a)Oak b)green c)miller d)option4
Ans: Oak
2) what is not true about the following statements about java.
a) it is compiled using javac compiler
b) the compiled files have .class extension.
c) such files cannot be transfered from one comp to another.
d) they use the java interpreter
Ans: c
3) Why is the synchronize used?
a) to initialize multiple objects b)to lock an object c)option3 d)option 4
Ans: b (probably)
some java qns1.
package java.lang; // Ans: <------------! Runtime gives error ( test it)class HPTest2{ public static void main(String args[]) { String x="sdfsd"; System.out.println("Hello"); } } 2class HPTest{ static HPTest x; public static void main(String args[]) { // below line not given //x=new HPTest(); if not this line Null pointer exeception x.foo(); } void foo() { System.out.println("Hello"); } } 3:class A{ A(int x) { System.out.println(" x=" + x ); } A(int x,int y) { System.out.println(" x=" + x + " y =" + y); }}class HPTest4{ public static void main(String args[]) { A a=new A(1); A b=new A(2,3); A c=new A(); }} Second Round: interview In the 2nd round,Hp employees( 2 or 3) will be interviewing us.The Q asked will vary form person to person. They asked abt my latest projects first.They concentrated less on my academic proj.So plz prepare well abt the latest proj u did. And then they asked fully in C,C++ like what is the diff b/w const char * and char const *.What is friend fns,virtual destructors,virtual constructors,How will the compiler intrepret when a virtual class is declared and other basic stuff like calloc,malloc. In java what is the default exception,Is there any priority for the exceptions,finally,heap concepts etc. They havent asked any Q in N/wing and OS. This is the stuff which i faced in my interview.Iam agian telling u...This varies from person to person. But any way all the best for all u guys who got selected for the next round.Its very easy.Dont be in a hurry.Take ur own time.Another advice,If u don't know the answer for any Q they asked,be frank.Dont try to bluff it becoz the next Q will depend upon the Q u answer previously. The interview pattern will be as: 1. Tell abt your self.2. They will ask for the subjects in which we are strong( Here they will consider the ranking that we written during written examination & marks we got in written exam)3. Mostly the interview time will be 45 minutes around (for only people there is about 1.5 hr)4. HR questions may include here5. Good thing is They r friendly and cooperative so confidence place role. If u don't know the answer better not to answer than to tell some bad stuff.For me 2 people interviewd. As I told them that I am strong in Cthey told me to write some programs like double linked list, singly linked list(adding node at last), macros, const *,char *,pointer arrays. The main question that they asked was how can u compile or execute 'c' program without editor. (Using TCC utility) coming 2 cpp only 1 question i.e what is polymorphism. Java they asked me about protocol used in JSP, which layer does it belongs to, main differences between _Javascript ,java and JSP. During personal introduction try to excell your capabilities by giving examples like as fast learner, hard worker like..! If u have any achievements & awards try 2 put them all during personal INtroduction. The interviewers are very co-operative and highly friendly (so confidence plays vital role) WISHING U ALL THE BEST FOR YOUR SUCCESS Make a note that Technical round is the main one.I think there wont be any elimination at HR level unless luck unfavours us. Added Experience is Definite Added Advantage. In general section they r asking questions like Who is CEO ,founder of HP,Microsoft,Oracle.. some questions u will get from following list IT Gurus 1) Tim Berners Lee -- Founder of the World Wide Web 2) Bjarne Stroustrup, C++ Stroustrup called his new language 'C with Classesand then 'new C'.Because of which the original C began to be called 'old C'which wasconsidered insulting to the C community. At this time Rick Mascittisuggested the name C++ as a successor to C. 3) Michael Dell of Dell Computers 4) Larry Ellison of Oracle Larry Ellison and Bob Oats were working on aconsulting project for the CIA (Central Intelligence Agency). The code namefor the project was called Oracle (the CIA saw this as the system to giveanswers to all questions or something such). The project was designed tohelp use the newly written SQL code by IBM. The project eventually wasterminated but Larry and Bob decided to finish what they started and bringit to the world. They kept the name Oracle and created the RDBMS engine.Later they kept the same name for the company. 5) James Gosling,and his project is now known as Java Originally called Oakby creator James Gosling, from the tree that stood outside his window, theprogramming team had to look for a substitute as there was no other languagewith the same name. Java was selected from a list of suggestions. It camefrom the name of the coffee that the programmers drank. 6) Bill Hewlett(L) and Dave Packard(R) of HP. Behind them in the picture isthe famous HP Garage. Bill Hewlett and Dave Packard tossed a coin to decidewhether the company they founded would be called Hewlett-Packard orPackard-Hewlett. 7) Ken Thompson (L)and Dennis Ritchie(R) ,creators of UNIX, B and C DennisRitchie improved on the B programming language and called it 'New B'.Helater called it C. B was created by Ken Thompson as a revision of the Bonprogramming language (named after his wife Bonnie) 8) Larry Page(L) and Sergey Brin(R), founders of Google. Google wasoriginally named 'Googol'. After founders (Stanford graduates) Sergey Brinand Larry Page presented their project to an angel investor, they received acheque made out to 'Google' ! 9) Gordon Moore(L) and Bob Noyce(R) ,founders of Intel Bob Noyce and GordonMoore wanted to name their new company 'Moore Noyce' but that was alreadytrademarked by a hotel chain, so they had to settle for an acronym ofINTegrated ELectronics. 10) Andreas Bechtolsheim , Bill Joy, Scott Mc Nealy and Vinod Khosla ofSUN(StanfordUniversity Network) MicroSystems Founded by fourStanfordUniversity buddies, SUN is the acronym for Stanford UniversityNetwork. Andreas Bechtolsheim built a microcomputer; Vinod Khosla recruitedhim and Scott McNealy to manufacture computers based on it, and Bill Joy todevelop a UNIX-based OS for the computer. 11) Linus Torvalds of Linux Operating System Linus Torvalds originally usedthe Minix OS on his system which he replaced by his OS. Hence the workingname was Linux (Linus' Minix). He thought the name to be too egotistical andplanned to name it Freax (free + freak + x). His friend Ari Lemmk encouragedLinus to upload it to a network so it could be easily downloaded. Ari gaveLinus a directory called linux on his FTP server, as he did not like thename Freax. (Linus' parents named him after two-time Nobel Prize winnerLinus Pauling) 12) Steve Woznaik(sitting) and Steve Jobs of APPLE Computers Favorite fruitof founder Steve Jobs. He was three months late in filing a name for thebusiness, and he threatened to call his company Apple Computers if the othercolleagues didn't suggest a better name by 5 o'clock. the questions aresection 11.Intel's first processor is1)------2)4004 3) 80804)8086 2) Founder of Microsoft corporation1) Bill Gates 2) Billgates and --------3)Bill gates and Paul Allen4) Billgates and ------- 3)Oddman out1)Internet Explorer 2) Alt Vista3) Netscape Navigator 4)Opera 4)Which of the following is not a database1)PLSQL2)MSSQL 3)MySQL4)Informix 5)Laura C--- (I don't remember exact spelling ) is CEO of1)Oracle 2)DELL 3) Hp4)IntelAns) She is CEO of HP 6)'SUN' Microsystems SUN stands for1)Simple Unified Network2)Solaris Unified Network3)-------------4) None of the above. section 2 1) IRC stands for ans) Internet Relay chat 2)ICQ stands for ans)-------------------- 3)The protocol used to translate Internet address to Network addressis1)IP2)TCP3)ARP4)RARP 4)In some OS the option that the system provides to communicate with other process is1)IPC(Inter Process Communication)2)----3)-----4)----- 5)VPN stands for ans) Virtual private network. 6)The time taken to transfer data from one place to other place or process within specified time is1)Throughput2)Latency time 3)Response time 4)---------- 7)The time complexity for which of the following is O(n log n)1) Radix sort 2)Quick sort3)Shell sort 4) Bubblesort. 8)Which of the following is used pass the packets between networks1)--------2)Bridges3)Router4)Gateways section 31)Which of the following can be used to print % to the screen1) printf("\%");2)printf("file://%/"); 3)----- 4)------
2)how many times the loop is executed main() { int i=3; while(i>=0) printf("%d",i--); return(0); } 1) 3 2)Infinite 3)0 4)23) what is the outputint 1=10;printf("%d %d %d ",i,++i,i++);
1) 10 11 11 2)11 11 10 3) 10 11 10 4) None of the above4)x=2;y=5;z=x+++y;printf("%d %d %d",x,y,z);1)----------- 2)------- 3)--------- 4)---------
5)In c++,1)------------------2)------------------3)you cannot Overload new operator for a class4)----------------------
6) Void xyz(char a[10]) {int i;i=sizeof(a);printf("%d",i); }1)10 2)can't say 3) 2 4)same as size of pointer.
7) Local Variables is stored in which part of the memory 1) register or heap 2)heap 3)register or stack 4)-----8) which of the following can be shared by progams1)Text Code2)Data segment3)heap memory4)--------
1. Who is associated with C language?2. CEO of MIcrosoft3.Company producing Routers,Bridges4.From 70s 80s Company producingmouse,GUIs............a)Dell b)IBM c) Xerox d) HP5.Inventor of Pascal6.Abt SUN micro systems7.first digital comp machine a)von neumann b) Dijkstra8.Which of these is not search engine a)hotbotb)parametric c)Altavista d) google9.In 2002 IBM acquired which company a) Rational b)oracle c) netscape10.founder of apple computer(2 persons)
Computer Concepts
1.Complexity nlogn a.quick sort b. bubble sort c.shell sort2.Abt Protocols3.Abt SSL4.Abt MBR5.Cross compiler6.synonymus to main memory7.Semaphores8.Database quesns Stored procedures Trigger strategy9.Bandwidth measured in ?10.Term assoc with Context Transaction
Java
1.extending the class means2.how many values does char of java has3.Java pgm can be executed on any m/c how?4.utility used for dynamically changing the tablesa.vector b. hash table c. enumeration d. structures5.synchronise means6.if X & Y r objects X = Y means7.which action Java platform restricts on applets a. Image viewing b. Accept user i/p c. write to system files d. initialise date in browser8.quesns on JDBC9.Two quesns on simple java pgms.10. Java was initially code named as:a)Oak b)green c)miller 11.) what is not true about the following statementsabout java.a) it is compiled using javac compilerb) the compiled files have .class extension.c) such files cannot be transfered from one comp toanother.d) they use the java interpreter
1>General section : computer science general knowledge
2> Computer science general: simple questions
1) HP acquired this company in 2002. Which is the company
a)Compaq b)Dell c)option 3 d) Option4
Ans: a
2) what does 3G denote
a) 3rd generation mobile communication b) 3rd generation computer languages c) option 3 d) option4
Ans: a
3)an application program that is used by the users to get the inofrmation from the backend of some application like databases:
a) application server b)proxy server c)database server d)option 4
Ans: database server
4) which of the following is not true about the e-mail
a) it can be accessed by a client program using POP
b) it can be accessed by a client program using imap protocol
c) option 3
d) option 4
Ans: I don't remember the answer but first 2 are true.
5) Some quesion regarding the company and who developed it ( the thing to remember is that Apple produce Macintosh computers).
5) What is X.25?
a)option 1 b)option 2 c)option 3 d)option 4
Ans: find out??:-)
3> c/c++ section: questions on c/c++, programs o/p etc.
1) main( )
{
unsigned int i=3;
while( i >=0)
printf( "%d", i--);
}
how many times will the printf stmt be executed?
a)0 b)3 c)4 d)infinite
Ans: I think the answer is infinite, b'cos 'i' is an unsigned integer and it will not decrement below '0' and hence end up in an infinite loop.(yes, i checked and it is getting stuck in an infinite loop)
2) main( )
{
int x,y, z;
x=2;
y=5;
z= x+++y;
printf("%d %d %d", x, y z);
}
a)3 5 7 b)option 2 c)option 3 d)option 4
Ans: a
3) # define swap(a,b) temp=a; a=b; b=temp;
main( )
{
int i, j, temp;
i=5;
j=10;
temp=0;
if( i > j)
swap( i, j );
printf( "%d %d %d", i, j, temp);
}
Ans: On compiling i got ans 10, 0, 0. I did not understand the concept. Please expalin this to me.
4>Java section: questions on java related stuff.
1) Java was initially code named as:
a)Oak b)green c)miller d)option4
Ans: Oak
2) what is not true about the following statements about java.
a) it is compiled using javac compiler
b) the compiled files have .class extension.
c) such files cannot be transfered from one comp to another.
d) they use the java interpreter
Ans: c
3) Why is the synchronize used?
a) to initialize multiple objects b)to lock an object c)option3 d)option 4
Ans: b (probably)
Q : What is not a part of OS ? O : swapper,compiler,device driver,file system. A : compiler.
Q : what is the condition called when the CPU is busy swapping in and out pages of memory without doing any useful work ? O : Dining philosopher's problem,thrashing,racearound,option d A: thrashing.
Q : How are the pages got into main memory from secondary memory? DMA, Interrupts,option3, option 4 A : as far as i know its Interrupts --by raising a page fault exception.
Q : What is the use of Indexing ?O : fast linear access, fast random access, sorting of records , option 4A : find out....
Q : in terms of both space and time which sorting is effecient.(The question is rephrased .)O : merge sort, bubble sort, quick sort, option 4A : find out
which case statement will be executed in the following code ?
main(){ int i =1; switch(i) { i++; case 1 : printf (""); break;
case 2 : printf(""); break; default : printf(""); break; }}
Answer : Case1 will only be executed.
Q : In the given structure how do you initialize the day feild? struct time { char * day ; int * mon ; int * year ; } * times;
Options : *(times).day, *(times->day), *times->*day.
Answer : *(times->day) -- after the execution of this statement compiler generates error.i didn't understand why.can anybody explain.
Q: The char has 1 byte boundary , short has 2 byte boundary, int has 4 byte boundary. what is the total no: of bytes consumed by the following structure:
struct st { char a ; char b; short c ; int z[2] ; char d ; short f; int q ;}
Options are given.Answer : its very easy 20 and not 19 .
1. Which of the foll is not a protocol.
HTTP PIM PSI
A> PSI (check)
2> Which of the foll does not help security.
Good Password Update AntivirusVLAN
A> VLAN
3> What was the prob with Intel Processor
Cache FPU NONEA> FIND OUT AND LET ME KNOW
4> What does MIME stand for
A> Multipurpose Mail Exchange Protocol
5> What does XP stand for in WIN-XpA> Experience
6> Who is associated with CA> Dennis Ritchie
7> Which of the foll is not a IM client
AOLMSNJABBERXINGCA> XINGC
8> What does ERP stand 4
A> Enterprise resource planning.
9> Who is associated with HOTMAIL
SABEER Bhatia and Jack SmithSABEER Bhatia and Bill Gates
A>SABEER Bhatia and Jack Smith
10> What does UNIX stand 4???Find out
11> Which of the foll is not a app serverBLUESTONEWEBSPHERETOMCATJBOSS
A> BLUESTONE
GENERAL CSE Q's
12> What do u call software embbedded in ROM
BIOSFIRMWARESHAREWAREFREEWAREA> BIOS (Verify and plz let me know)
13> What is semaphore used 4????
14> Integral Constraint helps in???
A> Solving Inconsitent Data prob.
15> PING uses
A> ICMP
16> IP ADDRESS occupies 4 bytes8 bytes16 bytes6 bytes
A> I wrote 8. correct ans 4
17> Which DataStructure helps SearchingSTACKLINKED LISTHASHA> HASH
18> Q on Binary tree Depth?2^n2^n - 1log n
19> Database shud havA> ACID properties.
20> VPN stands 4A> virtual private n/w
21> what does fork() return 2 parentchild pid0A> 0
22> What do u call the relationship b/e a table andits columnzA> Schema
12Q on c & c++
23> What is true about c++A> IT can hav virtual constuctors
24> result of i=6; printf("%d",i++*i++)3654cant sayA> Can't say (compiler dependent)
25> output ofchar str[20] = "SANJAY"
printf("%d%d",sizeof(str),strlen(str))
ANS> 20,6
26> Which of the foll cannot b used accross filesexternvolatilestaticconstA> static. (i wrote volatile)
27> union u{ int i; char c;}; sizeof(u);A> 4 (I got damm irritated when i read this q. Imarked 4 and wrote UNDER UNIX next 2 the answer. Howcan such a dumb q which gives diff values under DOSand UNIX b asked???????????? lemme know)
28> Idenitify err5[[a]5["abc"]A> 5["abc"]
12Q on JAVA
29> Java alloctaes mem inSTACK HEAPA> HEAP
30> Can u call Garbage collector explicitly
A> S . Find out the syntax. It was asked
31> What does this mean X = Y
A> Object X refers to the contents of Y.
32> Q on Null pointer Exception
33> Synchronize is used 4???
1.Intel's first processor is1)------2)4004 3) 80804)8086
2) Founder of Microsoft corporation1) Bill Gates 2) Billgates and --------3)Bill gates and Paul Allen4) Billgates and -------
3)Oddman out1)Internet Explorer 2) Alt Vista3) Netscape Navigator 4)Opera
4)Which of the following is not a database1)PLSQL2)MSSQL 3)MySQL4)Informix
5)Laura C--- (I don't remember exact spelling ) is CEO of1)Oracle 2)DELL 3) Hp4)IntelAns) She is CEO of HP
6)'SUN' Microsystems SUN stands for1)Simple Unified Network2)Solaris Unified Network3)-------------4) None of the above.
section 2
1) IRC stands for ans) Internet Relay chat
2)ICQ stands for ans)--------------------
3)The protocol used to translate Internet address to Network addressis1)IP2)TCP3)ARP4)RARP
4)In some OS the option that the system provides to communicate with other process is1)IPC(Inter Process Communication)2)----3)-----4)-----
5)VPN stands for ans) Virtual private network.
6)The time taken to transfer data from one place to other place or process within specified time is1)Throughput2)Latency time 3)Response time 4)----------
7)The time complexity for which of the following is O(n log n)1) Radix sort 2)Quick sort3)Shell sort 4) Bubblesort.
8)Which of the following is used pass the packets between networks1)--------2)Bridges3)Router4)Gateways
section 31)Which of the following can be used to print % to the screen1) printf("\%");2)printf("file://%/"); 3)----- 4)------
2)how many times the loop is executed main() { int i=3; while(i>=0) printf("%d",i--); return(0); } 1) 3 2)Infinite 3)0 4)23) what is the outputint 1=10;printf("%d %d %d ",i,++i,i++);
1) 10 11 11 2)11 11 10 3) 10 11 10 4) None of the above4)x=2;y=5;z=x+++y;printf("%d %d %d",x,y,z);1)----------- 2)------- 3)--------- 4)---------
5)In c++,1)------------------2)------------------3)you cannot Overload new operator for a class4)----------------------
6) Void xyz(char a[10]) {int i;i=sizeof(a);printf("%d",i); }1)10 2)can't say 3) 2 4)same as size of pointer.
7) Local Variables is stored in which part of the memory 1) register or heap 2)heap 3)register or stack 4)-----8) which of the following can be shared by progams1)Text Code2)Data segment3)heap memory4)--------section 4Sorry I don't remember the Java Questions
Iam giving the quesns on 3 sections.c/c++ was veryeasyFor any further informn mail me.
4 sections48 quesnsno negative markingall objective quesns.
IT INformation
1. Who is associated with C language?2. CEO of MIcrosoft3.Company producing Routers,Bridges4.From 70s 80s Company producingmouse,GUIs............a)Dell b)IBM c) Xerox d) HP5.Inventor of Pascal6.Abt SUN micro systems7.first digital comp machine a)von neumann b) Dijkstra8.Which of these is not search engine a)hotbotb)parametric c)Altavista d) google9.In 2002 IBM acquired which company a) Rational b)oracle c) netscape10.founder of apple computer(2 persons)
Computer Concepts
1.Complexity nlogn a.quick sort b. bubble sort c.shell sort2.Abt Protocols3.Abt SSL4.Abt MBR5.Cross compiler6.synonymus to main memory7.Semaphores8.Database quesns Stored procedures Trigger strategy9.Bandwidth measured in ?10.Term assoc with Context Transaction
Java
1.extending the class means2.how many values does char of java has3.Java pgm can be executed on any m/c how?4.utility used for dynamically changing the tablesa.vector b. hash table c. enumeration d. structures5.synchronise means6.if X & Y r objects X = Y means7.which action Java platform restricts on applets a. Image viewing b. Accept user i/p c. write to system files d. initialise date in browser8.quesns on JDBC9.Two quesns on simple java pgms.10. Java was initially code named as:a)Oak b)green c)miller 11.) what is not true about the following statementsabout java.a) it is compiled using javac compilerb) the compiled files have .class extension.c) such files cannot be transfered from one comp toanother.d) they use the java interpreter
1) HP acquired this company in 2002. Which is the companya)Compaq b)Dell c)option 3 d) Option4Ans: a2) what does 3G denote a) 3rd generation mobile communication b) 3rd generation computer languages c) option 3 d) option4Ans: a3)an application program that is used by the users to get the inofrmation from the backend of some application like databases:a) application server b)proxy server c)database server d)option 4Ans: database server freshersworld.com 4) which of the following is not true about the e-maila) it can be accessed by a client program using POP b) it can be accessed by a client program using imap protocolc) option 3 d) option 4Ans: I don't remember the answer but first 2 are true.5) Some quesion regarding the company and who developed it ( the thing to remember is that Apple produce Macintosh computers).5) What is X.25?a)option 1 b)option 2 c)option 3 d)option 4Ans: find out??:-)3> c/c++ section: questions on c/c++, programs o/p etc.1) main( ) { unsigned int i=3; freshersworld.com while( i >=0) printf( "%d", i--); }how many times will the printf stmt be executed?a)0 b)3 c)4 d)infiniteAns: I think the answer is infinite, b'cos 'i' is an unsigned integer and it will not decrement below '0' and hence end up in an infinite loop.(yes, i checked and it is getting stuck in an infinite loop)2) main( ) { int x,y, z; x=2; y=5; z= x+++y; printf("%d %d %d", x, y z); }a)3 5 7 b)option 2 c)option 3 d)option 4Ans: a3) # define swap(a,b) temp=a; a=b; b=temp; main( ){ freshersworld.com int i, j, temp;i=5;j=10;temp=0;if( i > j)swap( i, j );printf( "%d %d %d", i, j, temp);}Ans: On compiling i got ans 10, 0, 0. I did not understand the concept. Please expalin this to me.4>Java section: questions on java related stuff.1) Java was initially code named as:a)Oak b)green c)miller d)option4Ans: Oak2) what is not true about the following statements about java.a) it is compiled using javac compilerb) the compiled files have .class extension.c) such files cannot be transfered from one comp to another.d) they use the java interpreter freshersworld.com Ans: c3) Why is the synchronize used?a) to initialize multiple objects b)to lock an object c)option3 d)option 4Ans: b (probably)..................
.From 70s 80s Company producingmouse,GUIs............a)Dell b)IBM c) Xerox d) HP
3)an application program that is used by the users to get the inofrmation from the backend of some application like databases:a) application server b)proxy server c)database server d)option 4Ans: database server
8.Database quesns Stored procedures Trigger strategy9.Bandwidth measured in ?10.Term assoc with Context Transaction
2)ICQ stands for ans)--------------------
class A{ A(int x) { System.out.println(" x=" + x ); } A(int x,int y) { System.out.println(" x=" + x + " y =" + y); }}class HPTest4{ public static void main(String args[]) { A a=new A(1); A b=new A(2,3); A c=new A(); }}
1. Which of the foll is not a protocol.
HTTP PIM PSI
A> PSI (check)
2> Which of the foll does not help security.
Good Password Update AntivirusVLAN
A> VLAN
3> What was the prob with Intel Processor
Cache FPU NONEA> FIND OUT AND LET ME KNOW
4> What does MIME stand for
A> Multipurpose Mail Exchange Protocol
5> What does XP stand for in WIN-XpA> Experience
6> Who is associated with CA> Dennis Ritchie
7> Which of the foll is not a IM client
AOLMSNJABBERXINGCA> XINGC
8> What does ERP stand 4
A> Enterprise resource planning.
9> Who is associated with HOTMAIL
SABEER Bhatia and Jack SmithSABEER Bhatia and Bill Gates
A>SABEER Bhatia and Jack Smith
10> What does UNIX stand 4???Find out
11> Which of the foll is not a app serverBLUESTONEWEBSPHERETOMCATJBOSS
A> BLUESTONE
GENERAL CSE Q's
12> What do u call software embbedded in ROM
BIOSFIRMWARESHAREWAREFREEWAREA> BIOS (Verify and plz let me know)
13> What is semaphore used 4????
14> Integral Constraint helps in???
A> Solving Inconsitent Data prob.
15> PING uses
A> ICMP
16> IP ADDRESS occupies 4 bytes8 bytes16 bytes6 bytes
A> I wrote 8. correct ans 4
17> Which DataStructure helps SearchingSTACKLINKED LISTHASHA> HASH
18> Q on Binary tree Depth?2^n2^n - 1log n
19> Database shud havA> ACID properties.
20> VPN stands 4A> virtual private n/w
21> what does fork() return 2 parentchild pid0A> 0
22> What do u call the relationship b/e a table and its columnzA> Schema
12Q on c & c++
23> What is true about c++A> IT can hav virtual constuctors
24> result of i=6; printf("%d",i++*i++)3654cant sayA> Can't say (compiler dependent)
25> output ofchar str[20] = "SANJAY"
printf("%d%d",sizeof(str),strlen(str))
ANS> 20,6
26> Which of the foll cannot b used accross filesexternvolatilestaticconstA> static. (i wrote volatile)
27> union u{ int i; char c;}; sizeof(u);A> 4 (I got damm irritated when i read this q. I marked 4 and wrote UNDER UNIX next 2 the answer. How can such a dumb q which gives diff values under DOS and UNIX b asked????????????)
28> Idenitify err5[[a]5["abc"]A> 5["abc"]
12Q on JAVA
29> Java alloctaes mem inSTACK HEAPA> HEAP
30> Can u call Garbage collector explicitly
A> S . Find out the syntax. It was asked
31> What does this mean X = Y
A> Object X refers to the contents of Y.
32> Q on Null pointer Exception
33> Synchronize is used 4???
Analytical:
1) barron’s GRE: page No. 396 Q:1-4, 12th edition.
An office with 6 staffs. Brown, Black,White,Parker etc.
2) Q:37-39. page No.401, 12th edition
pitcher,thrower, side arm bowling etc. But here
names were changed to charan, hari Etc.
QUANTITAIVE:
1) A B C
C
-----------
G F E D 9
-----------
QUESTION NOT CLEAR
ANS: ARRANGE FROM 1 TO 9 ( A=1,B=2,C=3)
2) SOME DISCOUNT PROBLEM
ANS:Rs.168.00
Paper 2
1. CBA+CCA=ACD given D=0, find B,C
2. Two cars(A & B)started to from two stations at the same time. Distance b/w the stations is 230 km. After 3 hours distance b/w them is 20 km. The speed of B increases by 10 km for every one hour. What is the ratio of their speeds?
3. There are 100 people.
4. I) Sonali's father knows that her mother's birthday falls after 25th of JAN and before 25th of FEB
II) Sonali's brother knows that his mother's birthday falls after 23rd FEB and before 28th FEB
To find Sonali's Mother's birthday
a) only I is sufficiant
b) only II
c) both I and II are necessary
d) insufficiant data
There was one more question of the same type.
THE FOLLOWING PAPER WAS GIVEN IN IIT-99
Paper Model:
Section I: computer awareness(i.e general things about computer)Q.15
-ve marks -1/4
Section II: Simple C- language Q. 15 & -ve marks: -1/4
Section III: On pointers & structures
and C++,JAVA( only 1 on this) Q.10 each quetion ->2 marks -ve marks: -1
Section IV: Analytical Q.20 each quetion -> 2 marks.
-ve marks: -1/4
SECTION-I
1). Piggy backing is a technique for
a) Flow control b) sequence c) Acknowledgement d) retransmition
ans: c piggy backing
2). The layer in the OST model handles terminal emulation
a) session b) application c) presentation d) transport
ans: b application
3) ans: a odd numbers of errors
4)Q. In signed magnitude notation what is the minimum value that
can be represented with 8 bits
a) -128 b) -255 c) -127 d) 0
5) c 20
6) a 120
7) b synchronise the access
8) a system call
9) b the operating system
10) a 177333
11) d used as a network layer protocall in network and
windows system
12) b has to be unique in the sub network
13)Q. there is an employer table with key feilds as employer no.data in every n'th row are needed for a simple following queries will get required results.
a) select A employe no. from employe A , where exists from employe B where A employe no. >= B employe having (count(*) mod n)=0
b) select employe no. from employe A, employe B where
A employe no.>=B employ no.grouply employe no.having(count(*) mod n=0 )
c) both a& b
d)none of the above
14)Q. type duplicates of a row in a table customer with non uniform key field customer no. you can see
a) delete from customer where customer no. exists
( select distinct customer no. from customer having count )
b) delete customer a where customer no. in
b rowid
c) delete customer a where customer no. in
( select customer no. from customer a, customer b )
d) none of the above
15) c Volatile modifier
---------- Section I over with 15 quetions -----------
SECTION-II
Section II is not covered completly But it is very very easy
. You can do it very easely.
1) ans: recursion
2) long int size
a) 4 bytes b) 2 bytes c) compiler dependent d) 8 bytes
ans: compiler dependent
note: order of a,b,c,d are doubt but answer is correct.
3) x=2,y=6,z=6
x=y==z; ans:x=1
printf(%d",x) ?
4) if(x>2)?3:4
5)
6)
7) ans: c 6 ( quetion on enum )
8) ----
14) c : class A,B and C can have member functions with same name.
15) ans: d none of the above
SECTION-III
1) ans: b It does not work when rp is the last element in the linked list
2) ans: a always
3) ans: b 13
4) ans: b 16
5) ans: d 55,55
6) ans: c 5,10,10,3
7) ---
8) ans:d 4
9) ans: c 5
10)ans: c semicolon missing
SECTION-IV
following are not in order:
2. M > D > Y ans: (a)
6. 10 in 4 seconds,
? in 6 minutes = 10x6x60/4 = 900 ans: (a)
7. a=2, b=4, c=5
(a+b)/c - c/(a+b) = 11/30 (ans).
8. 100(100000000+100000000)/10000 = 2x1000000 (ans).
9. what does the hexanumber E78 in radix 7.
(a) 12455 (b) 14153 (c) 14256 (d) 13541 (e) 131112 ans: (d)
10. Q is not equal to zero and k = (Q x n - s)/2 find n?
(a) (2 x k + s)/Q (b) (2 x s x k)/Q (c) (2 x k - s)/Q
(d) (2 x k + s x Q)/Q (e) (k + s)/Q
(from GRE book page no:411)
data:
A causes B or C, but not both
F occurs only if B occurs
D occurs if B or C occurs
E occurs only if C occurs
J occurs only if E or F occurs
D causes G,H or both
H occurs if E occurs
G occurs if F occurs
NOTE: check following answers.
11. If A occurs which of the following must occurs
I. F & G
II. E and H
III. D
(a) I only (b) II only (c) III only (d) I,II, & III
(e) I & II (or) II & III but not both ans: (e)
12. If B occurs which must occur
(a) D (b) D and G (c) G and H (d) F and G (e) J ans: (a)
13. If J occurs which must have occured
a) E (b) either B or C (c) both E & F (d) B (e) both B & C ans: (b)
14. which may occurs as a result of cause not mentioned
(1) D (2) A (3) F
(a) 1 only (b) 2 only (c) 1 & 2 (d) 2 & 3 (e) 1,2,3 ans: (c)
15. E occurs which one cannot occurs
(a) A (b) F (c) D (d) C (e) J ans: (b)
11 to 15:- ----------- e , a , b , c , b ---------------
Below are in order:
16. to 20. answers:
e
a
c
a
2. There are 10 items in a box, out of which 3 are defective. 2 balls are taken one after the other. What is the probability that both of them are defective?
3. Context free grammar is accepted by
a) finite automatab) push down automatac) two way bounded automatad) both b and c
4. Which is not a memory management scheme?
a) buddy systemb) swappingc) monitorsd) paging
Ans : c
5. Simplify the Karnaugh map given below and derive its expression in SOP form
- 1 1 - 1 - - 1 1 - - 1 - 1 1 -
6. Question on NAND gates implementation.
7. Definition of Context Sensitive Grammar
8. An identifier can start with a letter followed by any number of letter or digits .
9. With the following configuration: 8MB total memory, 256kb cache , 4kb is block size. Using direct mapping, how many different physical memory blocks can be mapped on to the cache.
(a) 64 (b) 256 (c) 128
10. CSMA/CD is used in
a) token ringb) FDDIc) ethernet
11. In TCP/IP header, checksum contains
a) sum of all the wordsb) ones complement of the datac) ones complement of the sum of all the wordsd) ones complement of the sum in ones complement
12. What is the maximum number of acknowledgements for a 4 bit sequence number in a sliding window protocol.
13. Which is a good way of representing varaibles in recursion
a) local variablesb) static varaiblesc) global variables
14. Given the following c program
func() {static int i = 10;printf("%d",i);i++;}
What is the value of i if the function is called twice ?
15. Given the following c program
func(int *i, int*j){*i=*i * *i; *j=*j* *j;}
main(){ int i = 5, j = 2; func(&i,&j); printf("%d %d", i, j);}
What is the output?
16. Given page table, page size and offset find the corresponding physical address ?
17. In a memory chip 4k size and 16bit words are to be stored. No of address and data lines required is:
18. Identify in which pass of the 2 pass compiler are the following compiled
1) literals2) address resolution3) listing
19. Object code does not require
a) relocation bitsb) external names and place where they are locatedc) absolute adressd) all the object codes
20. ARP is in reference to
a) MAC to IPb) IP to MAC
21. Question on Balanced tree - A balanced tree is given and a node is addded at the leaf. Find the no of unbalanced nodes?
22. What is the order of Hashing time:
a) 0(1)b) 0(n2)
23. Given that: s -> s + s ; s -> s * s ; s -> a Find the no of parse trees for a+a*a+a
a) 4b) 5c) 6d) 7
24. Order of deleting a node from a linked list. (pointer is to an arbitrary node)
a)0(1)b)0(n)
25. A choclate of size nXn is given and is to be made into pices of size 1x1. At a time both horizontal and a vertical cut is done. Find the order of complexity
a) O(n2)b) O(nlogn)c) O(logn)
26. A directed graph is represented by adjacency list. To find the complexity of indegree of the node. e - edge n- vertices
27) No of leaf nodes given. find the no of nodes with degree 2.
28) AX = B. A is mXn and B is mX1
a) there is a unique solution if rank of A is same as rank of augumented matrix [A b]b) there are multiple solutions
29. LXI sp,2099h LXI b, 2012h PUSH b
30. A and B are sets. A's cardinality is m and B's is n where m <> runningb) blocked: ready -> running
36. For converting infix expression to postfix what do we require
a) operand stackb) operator stack
37. 0 is reprented as both and negative and positive in
a) ones complementb) twos complementc) two's complement has extra negative number
38. What is the difference between c and c++?
a)In c++ we can define variables in the middleb)dynamic scoping
39. Which of the following is correct
a) Synchronous tranmission needs more badwidth than Asychronous.b) Inasychronous transmission , the time is associated with data itself.....
SECTION A
1. Which of the folowing is not correct a. (x+y)'=x'.y' b. (x'+y')'=x.y c. (x'.y')'=x+y d. (x'+y')'=x'.y' [d]
2. Question on logic ckt. U have to find the output ans. AB'+CD'+EF'
3. Output of MUX _________ c----- c'---- -------Y c'---- ans. A xor B xor C c----- --------- A B (select lines)
4.If X and Y are two sets. X and Y are corresponding coordinates and exact no.of functions from X to Y is 97 then a. X=97 Y=1 b. X=1 Y=97 c. X=97 Y=97 d. .....
5. If two dies are thrown simultaneously what is the prob. of one of the dice getting face 6 ? a. 11/36 b. 1/3 c. 12/35 d. 1/36 [a]
6. The relation ,<,on reals is a. a partial order because of symmetric and reflexive b. ... antisymmetric and .... c. not ...... .. asymmetric and non reflexive d. ... .... not anti-symm and non reflexive 7. In C language the parameters are passsed by a. values b. name c.referrence d.... 8. Advantage of SRAM over DRAM ans. faster 9. Diasy chaining related question (refer Z80) a. uniform interrupt priority b.non .... .... c.interfacing slower peripherals d..... 10. RAM chips arranged in 4X6 array and of 8kX4bit capacity each. How many address lines reqd. to access each byte a. 12 b. 16 c.15 d. 17 11.Question related to AVL trees regarding how many no.of nodes to be changed to become balanced after addition of a leaf node to a particular node. ans . 3 12.When following sequence is insertedin the binary search tree no.of nodes in left and right subtrees 52 86 64 20 3 25 14 9 85 13.Method used for Disk searching.. a.linked list b.AVL c.B-tree d. binary tree 14. Which of the following is correct statement. a. 1's complement can have two zero re[resentations b.2's ... ... represent an extra neg. number c.2's & 1's have no difference in representing 16-bit no. d....... 15. AX=B where A is mXn ,b&X are column matrices of order m a. if m
1. There was a circuit given using three nand gates with two inputs and one output. Find the output.
a) ORb) ANDc) XORd) NOT
Ans. (a)
2. Suggest a sorting algorithm which is efficient (in worst case) to 10 values
a) Binary treeb) Selectionc) Bubbled) Any of the above
3. What is the number of comparisons in the worst case to merge two sorted lists containing n elements each.
a) 2nb) 2n-1c) 2n+1d) 2n-2
4.Iintegrated check value(ICV) are used as:
Ans. The client computes the ICV and then compares it with the senders value.
5. Question on client-server system using asychronous request from the client
6. If a binary tree is constructed using nodes with two pointers each, how many null pointers does a tree with N nodes have
a) n-1b) nc) n+1d) Depends on the number of edges
7. Which of following statements about heap is wrong
a) An n element heap has height log n(base of log is 2)b) Smallest element of heap is always a leafc) A array in reverse sorted order is a heapd) A heap can't contain any element more than once
8. When applets are downloaded from web sites , a byte verifier performs _________?
Ans. Status check.
9. For the following C program
void insert(key,r)typekey key,data array r;{extern int n;if(n>=max) /*error table if full */else r[n++].k=key;}
This on executing, enables a
a) Basic sequential searchb) Binary searchc) Interpolation searchd) None
10. Find the outpur of the following C program
void f(char *p){p=(char *) malloc(6);strcpy(p,"hello");}
void main( ){char *P="bye";f(p);printf("%s',p);}
11. Time taken to access cache is 100ns and to access memory is 1000ns. Hit ratio given. Find the average access time
12. Path testing is
a) Black box testing strategyb) White box testing strategy c) An installation .........d) An enviornment
13. X:verification' asks are we building the right product Y:validation' asks are we building the product right
14. Which one of the following can't be used to find an internet address given the domain name
a) /etc/hostb) NIS yellow pagesc) DNSd) ARP
15. Flow control is necessary for the transport protocol layer due to the following reasons
a) Unreliable link b) Congestion at receiver c) Packets out of sequenced) None of these
16. In public key encryption, if A wants to send a message to B so that no one else can read the message then A encrypts the message using
a) A's public keyb) A's private keyc) B's public keyd) B's private key
17. Which of the following is not condition having a deadlock resource previous granted can be forcebly taken away from a process
a) Resources need to be used in mutually exclusion fashionb) Process can request new resources, as they continue to hold on to old onesc) Here is a cycle in the resource allocation graph
16. An IP/IPX packet received by a computer using... having IP/IPX both how the packet is handled.
Ans. Read the, field in the packet header with to send IP or IPX protocol.
17. The range of the 32 bit number in two's complement form is _______
18. Cyclomatic complexity
{if((x=0) or (y=0))p=0;else {p=x;i=1;while(i!=y) {p=p+x;i=i+1; }}}
19. Activation record will contain the
a) Storage for simple namesb) Information about attributes for local names c) Return addressd) All of the above
20. Global static variable within a file is intended to
a) Localize swapb) Retain value persistentlyc) Define constantd) Fixed address in memory
21. Why is thread switch faster than a process switch
22. What is the binary equivalent of 41.6875
23. Checkpoint value will be calculated in
24. DHCP is used for
a) IP address allocation b)dynamic host configuration protocol
25. For the following C program
int x(char *a){a=(char *) malloc(10*sizeof(char));*a="hello";}
main(){char *a="new";x(a);printf("%s",a);}
The output is
a) Hellob) Newc) Hello newd) Run time error
1.CSMA/Cd protocol used inAns : Ethernet2.Checksum in IP packet isAns :Sum of the bits and 9's complement of sum3.Inselective repeat Max Seq is given find windowsizei.e. Ans : (15+1)/2 = 84.Main memory cache direct mappingAns : 645.Address lines and data lines for 4K x 16Ans : Addr 12, Data 166.Infix to postsize commession usesAns : operator stack7.Printing ofstatic variableAns : 118.Ans : 1,2,3,4 ( Program is givenarray[0] = 1;array[1] = 2;array[2] = 3array[3] = 4ptr = array[0]*(arr+3) = *(++array ) + *(array-1)++))There may me some mistique in writingthe program. Check it out.Answer is correct9.One Question on SchedulingPreemptive10.Which of the following is not memory model(1) buddy system (2) monitor (3) virtual ... etc.11.Hight balancing AVC timeAns : 312.Virtual to physical address mappingpage table given13.regular expression of identifierL(LUD)*14.Simplification in boolean AlgebraAns : xz15.Logical gate is given we have to find what is thatAns : NOR16.Solution for Diriving philofphingAns : d17.The feature C++ have and c donot haveAns : Variables can be declared inside also.18.Number of nodes with degree two in a binary tree of n leavesAns : n-119.Difference between syachronous and asynchronous transmission
20.The question on RS232(Use of sfart bit in Rs 232 protocal)21.Floating point representationAns : 2's complement1 more negitive numberTwo simple probability questions are also there
Section A : 30Section B : 20
Total 50 questions in 1 hoursP.S. Paper may change. Delhi question paper is not given here.
HUGES ----- > > (A)Aptitude :25 Qns, 20 Minutes> > > > 1. 2 x 4 analytical GRE type qns> > 2. 2-3 Reasoning qns (GRE type)> > 3. Probability of getting a sum of 7 when two dices are thrown together> > 4. Rest quantitative questions> > > > (B) Technical: 50 Qns, 45 Minutes> > > > 1. 3 qns on operating systems. I qn on dijkestra algorithm> > > > 2. Using which pin it's possible to address 16 bit addresses even though there> > are only 8 address bits in 8085? Ans: ALE> > 3. Voltage gain for an amplifier is 100 while it is operating at 10 volts.> > What is the O/P voltage wen i/p is 1 volt> > 4. Quality factor indicates a0 Quality of inductor b) quality of capacitor> > c) both> > 5. Qns related to bridges, routers and generators, which OSI layer they > > corresspond to. (Refer to stevens 4th chapter)> > 6.OPAmp's I/P ciurrent, O/p current and CMRR is given, what is the voltage > > gain> > 7. 2-3 qns on scope of static variables in C. Qn to view o/p odf a C static > > var> > 8. Qn to print a value of a pointer> > 9.resistance increases with temperature in a) Metal b) semiconductor> > 10. A qn to find the physical address from a given virtual address, virtual> > to physical address table was provided> > 11. 16 bit mantissa and 8 bit exponent can present what maximum value?> > 12. 4 bit window size in sliding window protocol, how many acknowledements can be held?> > 13. Security functionality is provided by which layer of OSI> > 14. Frequency spectrums for AM, FM and PM (figure given, u'veto tell which> > Kind of modulation it belongs to)> > 15. Among AM and FM which is better and why?> > 16.LASt stage of TTL NAND gate is called: Ans: Totem Pole Amplifier> > 17. SR to JK flip flop conversion. Ans: S=JQ', R=KQ> > 18. LSB of a shift register is connected to its MSB, what is formed: Ans:> > RING Counter> > 19. 2-3 Qns based on Demorgan's laws (identiies: (A+b)' = A'b', etc)> > 20. 2 qns on Logic gates (O/p of logic gates)> > 21. Diff in IRET and RET statements of 8086> > 22. How many address bytes are required to address an array of memory chips> > (4 * 6), each chip having 4 memory bits and 8k registers.> > 23. Diff. in memory mapped and I/P O/P mapped Input/Output (Refer a book on Microprocessor)> > 24. Qn on pipeline architecture> > 25 QN on LAPB protocol
1. given a digital ckt with nand gates. what is o/p Ans. nor gate2. given an logical expr. x,y,z. simplify ans. xz3. It is recommended to use which type of variables in a recursive module.Ans. static variables.4. which one of following is not memory management model?
given buddy system, monitors, paging, swapping Ans. monitors5. what m/c is used to recognize context free grammar ? Ans. pushdown automata6. Which type of grammar can be recognized by finite state m/c Ans. right linear grammar.
7. proc() {
static i=10;printf("%d",i);}
If this proc() is called second time, what is the o/p Ans. 11
8. int arr[] = {1,2,3,4} int *ptr=arr;
*(arr+3) = *++ptr + *ptr++;
Final contents of arr[] Ans. {1,2,3,4}
9. TCP/IP hdr checksum : what method is used ?Ans. one's complement of sum of one's complement.
10. CSMA/Cd is used in which lan Ans. ethernet
11. 8085 pgm : LXI sp, 2021,LXI b, 1234 (??)
push b
contents of stack after pushing ?
12. One question on synchronous transmission :
ans. Timing info is embedded in data itself13. What for start bit is used in RS232 transmission.
14. One solution for deadlock prevention for dining philosopher's problem
Ans. Allow one person to take first left stick and then right stickand remaining persons in reverse order.
15. 4bit seq no in sliding window protocol with selective repeat.what is the max no. of acks that can be held at transmitter ans. 816. given a height balanced tree. If we add one more node , how many nodes gets unbalanced ? Ans. 3
17. Given a arbitrary pointer to an element in a singly linked list? what is the time complexity for its deletion . Ans. O(n)18. what is the diff b/n c and c++
a. dynamic scopingb. nested switchingc. declaration of variables in any code blockd. separation of compilation and linking
Ans. c (??)19. which one is false ?
a. 0
how many parse trees possible : a+a*a+a Ans. 521. 4-1 demultiplexer is to be implemented using a memory chip. how many address lines and word length required Ans. 4, 1
22. Vector intr mechanism. in 8085.
Ans. fixed locations in memory when an intr comes.23. ARP is used for : Ans. IP to MAC addr conversion.24. given 100 to 999 nos. Probability of picking a no. with out digit 7. Ans. 18/25.25. Ten film rolls. 3 defective, prob. of picking up 2 defective rolls with out replacement Ans. 6/9026. The purpose of hashing is :Ans. O(1) complexity
27. Given adjacency matrix for a directed graph with n vertices and e edges. How much time will it take to find out indegree of a vertex Ans. O(n)28. No. of nodes of degree 2 in a binary tree with n leaf nodes. Ans. n-1
1. Find the probability of getting a number with 7 between 100 and 999 (both inclusive).
2. There are 10 items in a box, out of which 3 are defective. 2 balls are taken one after the other. What is the probability that both of them are defective?
3. Context free grammar is accepted by
a) finite automatab) push down automatac) two way bounded automatad) both b and c
4. Which is not a memory management scheme?
a) buddy systemb) swappingc) monitorsd) paging
Ans : c
5. Simplify the Karnaugh map given below and derive its expression in SOP form
- 1 1 - 1 - - 1 1 - - 1 - 1 1 -
6. Question on NAND gates implementation.
7. Definition of Context Sensitive Grammar
8. An identifier can start with a letter followed by any number of letter or digits .
9. With the following configuration: 8MB total memory, 256kb cache , 4kb is block size. Using direct mapping, how many different physical memory blocks can be mapped on to the cache.
(a) 64 (b) 256 (c) 128
10. CSMA/CD is used in
a) token ringb) FDDIc) ethernet
11. In TCP/IP header, checksum contains
a) sum of all the wordsb) ones complement of the datac) ones complement of the sum of all the wordsd) ones complement of the sum in ones complement
12. What is the maximum number of acknowledgements for a 4 bit sequence number in a sliding window protocol.
13. Which is a good way of representing varaibles in recursion
a) local variablesb) static varaiblesc) global variables
14. Given the following c program
func() {static int i = 10;printf("%d",i);i++;}
What is the value of i if the function is called twice ?
15. Given the following c program
func(int *i, int*j){*i=*i * *i; *j=*j* *j;}
main(){ int i = 5, j = 2; func(&i,&j); printf("%d %d", i, j);}
What is the output?
16. Given page table, page size and offset find the corresponding physical address ?
17. In a memory chip 4k size and 16bit words are to be stored. No of address and data lines required is:
18. Identify in which pass of the 2 pass compiler are the following compiled
1) literals2) address resolution3) listing
19. Object code does not require
a) relocation bitsb) external names and place where they are locatedc) absolute adressd) all the object codes
20. ARP is in reference to
a) MAC to IPb) IP to MAC
21. Question on Balanced tree - A balanced tree is given and a node is addded at the leaf. Find the no of unbalanced nodes?
22. What is the order of Hashing time:
a) 0(1)b) 0(n2)
23. Given that: s -> s + s ; s -> s * s ; s -> a Find the no of parse trees for a+a*a+a
a) 4b) 5c) 6d) 7
24. Order of deleting a node from a linked list. (pointer is to an arbitrary node)
a)0(1)b)0(n)
25. A choclate of size nXn is given and is to be made into pices of size 1x1. At a time both horizontal and a vertical cut is done. Find the order of complexity
a) O(n2)b) O(nlogn)c) O(logn)
26. A directed graph is represented by adjacency list. To find the complexity of indegree of the node. e - edge n- vertices
27) No of leaf nodes given. find the no of nodes with degree 2.
28) AX = B. A is mXn and B is mX1
a) there is a unique solution if rank of A is same as rank of augumented matrix [A b]b) there are multiple solutions
29. LXI sp,2099h LXI b, 2012h PUSH b
30. A and B are sets. A's cardinality is m and B's is n where m <> runningb) blocked: ready -> running
36. For converting infix expression to postfix what do we require
a) operand stackb) operator stack
37. 0 is reprented as both and negative and positive in
a) ones complementb) twos complementc) two's complement has extra negative number
38. What is the difference between c and c++?
a)In c++ we can define variables in the middleb)dynamic scoping
39. Which of the following is correct
a) Synchronous tranmission needs more badwidth than Asychronous.b) Inasychronous transmission , the time is associated with data itself.....
1.
f(char *p){ p[0]? f(++p):1;printf("%c",*p);}if call that fuction with f(Aabcd) what is the output??ans:dcbaA (Just reversing the string
2 f(char *p) { p=(char *)malloc(sizeof(6));strcpy(p,"HELLO");}main(){ char *p="BYE"; f(p)printf("%s",p);}what is the o/p???ans:HELLO3
To sorting array of 10 elements which sorting is besta)slectionb)bubblec)tree sortd)....ans:a
4
To saving space paoint of view which sort is besta)selectionb)insertionc)both a & bd)...check it once.U Can easy Aanswer this question(UCA)
5Which statement is wrong on heapa)Any two childs should not sameb)..c)..d)...ans:a6) one more question on heap
UCA
7read about cyclometric complexity..8
how many null pointer are there in N number binary treeans:N+1
9Two sorted list of size n what are the maximum comparison in mergeANs:2n-110converting 41.685 to binary11
pc is incremented while executing ---------- instructionans:fetch instruction
12
this is gates (NAND)problemIt means some gate figure has given with all NAND gate we have writeequavalent gateans:OR gate
13x:validating :Are we producing product righty:verification:Are we producing right righta)X is wrong statementb)y is "c)x and Y "d)x & y is right statement
14
NFS some queston in NSF. see distibuted operation System book by tenaun bamab15.IP & IPX is implemented in trasport layer.......mama all our friends can answer this question .Here i am unable to recallthat question.If u a have any doubts on Ip & IPX contact HARI because hedid his project is B.Tech in that protocals
UCA16
comparison between hashtable and binary treeans:aUCA
17client server is working in asyn mode then how communication will take placebt client and server.
UCA18once context swithing occures then ------------will take placea)saving registerb)saving stackc)....d).....UCA
19If precondition is failed what u say about postcondition?Note:Read about preconditon and postcondition20whiling download java applete then web broswer do the follinga)checking the class structure..b)...c)....d).....Read about this21Strings in Javaa)Mutableb)variable length stringc)...d)....ans:b22in Internet Transprot layer which is not a protocola)/etc/hostb)TCPc)UDPd)...UCA23
Which is not specified in CODD's rulesa)....b)....c)...d).....
It is from DBMS questionRefer NAVATHI BOOK chapter -9 appendx topic is CODDE's rules24
what is the use of Normalizationa)....b)....c)...d)...Any one can answer25
Futional dependecy x->y is shows thata)if x1=x2 then y1=y2b)...c)...d)...ans:a26
one question on IP addsress 243.65.77.8 some thinga)...b)..c)..d)...every one can answer27
If A sends a message to B with encryption then key isa)A public keyb)B public keyc)A private keyd)B private keyans:b (Check it once)28
In a class only declaration of the function is there but defintion is notthere then what is that functionans:virtual function
29what is not necessary condition in dead lockans:a30One question from multible inheritance...a)..b)..c)...d)......31)ICV protocali don't know about this mama .Till now i didn't heard that protocolmama..just know what is that then u can answer this question
32
one question from catches like write-through protocal etc33catche access time is 100ns ,memory access time is 1000ns and hit ratiois 0.9 then what is average memery access timea)100nsb)200nsc)400nsd)500nsans:b
SECTION C:1.an lead compensator zero is at Z=Zc, pole is at P=Pcthen the following is correcta.Pc >Zc,pc<0,zc<0b.c.2. p="(char" p="hello" p="bye" x="0y="0)" y="1;" y="0;">y in a relation R, x1 and x2 are in x, y1 and y2 are in y(question not cleared), about functional dependancya.x1=x2 and y1=y2b.c.43. in a down loading from website ,which one is correct?ans: check the byte code and indicate the error, if any.44. about UDPone Address is given but that is not the state tablewhat will it do the packeta. packet is discardedb. packet is sent to ethernet serverc. packet is sent to other addressd.
45. in associated memory for fast accessingwhich one is useda. single linked listb. double "c. hash tabled.
questions.==> 1. a processor has two level cache.Their access time (level1 and level2) is 100ns and 300ns respect.Memeory access time is 1000ns$==> ans is 140 (b)==> 2.diskless server uses==> a rarp==> b arp==> c ftp==> d.telnet==> ans rarp==> 3.which one of them is not a client server==> e-mail==> telephone==> webserver==> and one more==> ans is e-mail or telephone.==> 4.Which one is used to represent operations==> infix==> postfix==> binarytree==> and one more==> ans binary tree ==> 5.one qustion was on private key and public key.The quest. was if a wants to send a message to b that no one other that b should $==> A private key==> A public key==> B private key==> B public key==> 6.compliers maintain==> ans is symbol table ==>
/++++++++++++++++++++>From Diwakar.../+++++++++++++++++++++++
1) what a java interface not have ? ans - instance variables 2) what is done with java code on a web-page ans - downloaded and executed on ur pc 3) what is the order of deleting a node from a linked list given a ptr to it ans O(n) ( since u have to traverse the list to reach the prev.node) 3) what is RSA 4) how can A send a messageto B so that B knows its from A ans A uses his private key so that B can use A's public key 5) what is the best sort in worst case ans heap sort 6) what is the given sorting ans selection ( check it ) 7) what can access protected memebers of a class ans other classes of that program 8) what protocol is used by a machine to map an ip to hardware address ans arp 9) what is the size of ipv6 ans 128 bits 10) what protocol has ping ans icmp 11) how many keys are needed in symmetric and asymmetric crptography? ans - i dont know 12) one on a right threaded tree 13) very easy k-map ans i think its b) 14) very easy ckt ans choice which has option : a&c are equivalent 15) what in unix doesnt have a fd ans process ( this was the first ques ).
Regarding Hughespaper they conducted two tests. Both were technical(no aptitude test). First one was compulsory for everybody. In second one could opt forelectronics or computers. In all i suppose there were 50 questions.I sent a request to my classmates to send me questions whatevery theycould recall. Till now only one person has responded. I am sending thosequestions to you.
And just before interview you were supposed to fill up a performa whichthey call Behavioural Test. This was to check you interpersonal skills andsocialising capabilities. Questions like - would you like to be electedleaders of organising committees, do you like peoply express their agoniesto you, do you wish people be close to you type questions were repeated inone and the other form.
Interview was technical as well as personal. CGPA did count - it seems.They selected 8 people from here. BTW what's your current CGPA and what'sthe strength of your class. Do they come for B.Tech and M.Tech separatelas the case here is or it's all at once.
Questions : 1.If a precondition of a sub routine fails then a. post condition fails as well b. Post condition may fail c. post condition is declared but now defined.
2. whatz the o/p of the following program char * a= "AabbCc"; void x(char *a) { a[0] == 0 ? x(a+1):1; printf("%c",*a); return 1; } x(a);
a. AaBbCcb. cCbBaA
3. What is DHCP used for?
4. There are 2protocols IP and IPX are running on top of Ethernet. Supposea packet addressed to that ethernt card arrives, to which protocol theethernet sends the packet?1. It checks the payload of the frame and finds out the protocol type anddespatches it to the right protocol2. It fins out the protocol type that is mentioned in the ethernet frame.3. despatches to both the protocol
5. What is the use of global static variable in C?
6. In which stage of the compilation the Macro in C are converted intoIline code? (this is not the exact Qn a slight variation of it)
7 In the IP/Ethernet network, a packet with destination address192.32.65.70 arrives and there is no entry for this address in the routingtable of the m/c? what does the m/c do about the packea. discards the packet.b. Brodacasts into the ethernet.c. sends to default router
8. in Public key Encryption , if A wants to send a encrypted msg to B thenA encrypts the message with a. A's public key2. A Pvt keyc. B's public keyd. B's Pvt key
9. consider the SQL statement "Create table New as select * from oldtable"a. the sql stament is a correct oneb. New is reservd word there is an errorc. you can't select anything while creating a table10. By Codd's defn for RDBMS whih one is not right? options , I don't remeber
11. If X and Y are two attriubutes of a relation and 1 and 2 be any twotuples in that relationY is fuctionally dpndant on X iff (X->Y)
a. if (x1 == x2) then y1==y2b. if (x1==y1) then x2 == y2someother combinations
12.The normalization process 1.reduces the data redundancy2.It reduces the inconsistency that arises due to the data redundancy
13. ((A nand A) nand (B Nand B)) = ?a. A+B
The question was not exactly in this form. gates represented pictorilly
14. whtz the purpose of flow control?1. to control errors. to control congession the receiving end3. to sequnce the out of sequence packets
15. Whic is false about Java strings1. The are Null terminated2. Set of Chars3. The Condition checking == and = on a sme pair of strings givesdifferent results.
16. When a java Applet is downloaded what does it do?Don't remeber the optionsit's went something like this:1. checks the magic nubmer
17. Whatz is the Cyclometic complexity of the following codedon't remember the code exactly
Some more questions...======================
1:a machine A wants to set it's time same as a a machine Bso it sends a packet to B and b sends reply.but the time on packet is over by the timete packet reached A.A has toa1:set the time on packetb2:increment its time slowly so as to reduce deifferencec:send packets repeatedly till it gets a packet with time less tan the current timed:....
2.which of the following protocols does not find mac address given internet addressa>arpb.rarpc....d...
3.when an java applet get's downloaded what happensa.the byte verifier checks the magic numberb...c...d...
4.when A wants to send a mesg to B using Public key cryptography he usesa.A's public keyb.A's private keyc.B's publicd.B's private
5.how does a string in java differ from that of c/c++a1.java strings are mutableb.java strings does not have a \0c.d.
6.given str="AaBbCc"and a small c programsomething like
a:b:( )
the program actually reverses the string recursively
7.some protocol SHDC
8.NFS server is similar toa.provides similar sevices as unixb.a file trans fer.....c.just gets the file for reading..d.
9.an address 202.15.46.45 is to be located.the machine does not have info about 202.0.0.0 or 202.15.0.0 0r 202.15.46.0so the DNS server willl now
a.discard the packetb.send the mesg to a default server if availablec.send mesg to a DNS server if availabled......
10.verification:"are u building the right product" validation:"are we building the product right"
a.both are wrong(ans)b.both are correctc.first wrong second correctd.first correct second wrong
11.A:"cohesion is a desirable property" B:"cohesion means the property that the entire unit is one......"
a.both are correct b.both are wrongc.first wrong second correctd.first correct second wrong
12:definition of functional dependency.
13:which of the following does not use extra memorya.....b.insertion sortc.shell sortd.both b and c.
14:which of the following is better for ten elements
a.bubble sortb.selection sortc.quick sortd......
15.the memory reference time for cache is 100 ms and for memory is 1000ms.the probalility of a hot is .9.the average memory access time isa:100b:200(ans)c:500d:1000
16.a question on socket numbers
17there is an ordered binary tree and an index structurea.we can use ordbintree without orderingb.orb are used with ordering whe
All ques. had four options.
1- What is max. no. of hops in hypercube n/w with n (=2 ^ p) to go from one node to another ?a. pb. log pc. n ^ 22- What is Kerberos ?ans. Authentication Protocol.3-In completely connected multiprocessor system with n processors , links will be of the order ofa. O(n ^ 2)b. O(2 ^ n)c. O(n/2)4-When quick sort gives worst performance ?ans. When elements are in order.5- o/p of each sorting step of 8 elements was given and had to recognise which sorting algo.?Ans. Bubble sort (Not Sure , Check it out )6-In worst case ,which sort is best out of following sorts?a.heapb.selectionc.quick (ans.)d. insertion7-Three very simple gate circuits each having inputs A,B,C,D were given and had to tell ,which two give same result ? (DeMorgan's Law was used in solving )Ans was (a) &(c) (o/p of a & c was coming to be AB +CD)8-K-map given,had to tell simplified functionAns was perhaps AB+AD +AC+BCD
K-Map was CD` AB 0 0 0 0 0 0 1 0 1 1 1 1 0 1 1 1
9-What is Function Point ?Ans. S/W estimation technique10-p points to an integer. We don't want p to change value. In C, what declarations will we use?A const int *pb.int *pc.int const *pe. int* const p (perhaps ans.)11-Diff between 2NF &3NF ?Ans. D (last option)12.Which does not use client server model ?a. Emailb. Web accessc. C. Telephone calld. N/w file system13-In a pipeline having 3 stages, each having reliability of 0.9 ,what is overall reliability of pipeline?a. 0.9b. 0.729c. 0.8114-2level cacheis there first level cache's access time is 100ns,second level cache's access time is 33ns & memory access time is 1000 ns . Wh at is total memory access time ?ans. 140 ns15-In public key cryptography,Awillsend message to Bans. Using B's public key16-What does projection of a relation give?Ans.gives vertical partition of relation corresponding to specified columns.17-For disk or direct access storage, which is best ?a. AVLb. B-treec. Red tape ...18-There is a tree with inorder threading Node B is inserted as left child of nade A. Node A already has right child . Where will the null ptr of B point ?ans. Parent of A (perhaps)19-There is a diskless workstation. Which will be the first protocol it will use ?a FTPb. ARPc. HTTPd. RARP20-Compiler keeps which of following ?
ans. Symbol table21- 'ping' command uses which protocol ?ans. ICMP22-Merge sort uses which technique?Ans. Divide and Conquer23-Program counter is incremented ina. fetch (ans)b. decodec. execute24-what does the following program do ? f(int n) { int c; while(n) { n&=n-1; c++; } print c; }ans. Program prints the no. of set bits in no.25-What is this called (char *) (*(*(*A[X]) ( ) )) ( )ans. Array of X pointers to a function returning pointer to functions that are returning pointer tochar (not sure )26- For synchronisation in distributed computing, what should not be there ?a. all machines are synchronised by a global clockb. all systems should have their own clock (perhaps ans)27-Java applet of a moving /waving file is running on one machine then it meansa.Java's executable code is downloaded and running on the m/cb.A virtual X server is running on that m/c while the actual program is running on the web server.28-What is in RSA algo. ?a. First the session key is encrypted & then whole message is encrypted using RSA Algo.b. Message is encrypted using RsA algo.c. First Rsa algo is used &then encrypted with the session key.29-What is dirty read?a. Transaction reexecutes and gives diff. Results from the original executionb. Read is done when the transaction is not yet committed
30-What is coupling ?a. It tells the strength of interconnection between two program units.b. It tells the strength of interconnection between twtrength of interconnection between two program units.b. It tells the strength of interconnection between twwwtrength of interconnection between two program units.b. It tells the strength of interconnection between twwwo program units and one program unit31-Any n/w on the computer can have onlya. one domain &one IPb. more than one domain & more than one Ipc. one domain and more than one IPd. more than one domain & one IP32-Which one does not have file descriptor ?a. processb. keyboardc. piped. socket33-What does CONNECT BY meansa.connect to a different databaser for retreivalb.arrange in tree ordered structure34-In two phase commit protocol, why log is used during transmission &reception ?a. To retrieve the status in case of crash35-In which algo. Waiting time is minimun?Ans, SJF36-How many address bits are there in Ipv6ans. 128 bits37-During run time heap is managed bya. a user process in kernel modeb. A system process manages heap for all the processesc. A system process for each processd. A user process in user mode38-In which of following search is efficient?a. height balanced treeb. Weight balanced treec. Binary tree39.A ques. on resource relocation, sharing ( I don't remember more than this regarding this ques.)40-some ques. options were sth likea. transparency controlb. Migration controlc. Concurrency control41-X:In DFD, input is converted into output by passing through various functional unitsY:DFD cannot be used in object oriented designa. both X& y are correctb. both X & Y are incorrectc. X correct, Y incorrectd. Xincorrect, Y correct42-Where regression testing is used ?a. Dynamic analysersb. Loaders43-For Java interfaces , what is true ?a. Functions declarations are not given'b. Variables are not declaredc. Instance variables are not used44-In a linked list, we can delete a node in order ofa. 1b. nc. n ^ 245-If there are N people and we have to do symmetric & asymmetric cryptography, how many keys wouldbe used in these cases respectively?a. N & N ^ 2 (probably ans)b. N ^ 2 & Nc. N & Nd. N ^ 2 & N ^246-The protected element of a class can't be accessed bya. member functions of the same classb. member functions of the derived classc. member functions of any other class in the same program (Ans.)47-NFS uses same file structure as unix48-To solve an expression which of following trees will you use ?a. postfixb. infix
> Here are some questions of Hughes software system computer part:-> > Q. 1 void x(char* a)> {> (a[0])?x(a+1):1;> printf("%c",*(a+0));> return 1;> .........;> }> Input string 'a' is assigned as AaBbCc , what is the output?> Ans.-cCbBaA> > Q2 a question on digital gates ANS is OR gate.> > Q3 what is the binary representation of 41.6785> > Q4 if the precondition for a subroutine does not hold then > 1.postcondition does not hold > 2.postcondition may or may not hold> 3. ?> 4. ?> Q5. In java > 1. java strings are mutable. And some other options on java strings> > > Q6. Void f(char *p)> {> p = (char*)malloc(6);> strcpy(p,"hello");> }> void main( )> {> char *p = "BYE";> f(p);> printf("%s",p);> }> ANS BYE> Q7. A question on write through and write back algo.> Q8. What is concerned with transport layer.> Ans PORT.> Q9. A server can work with ip and ipx protocol.how the server will> determine to which protocol the incoming packet coresponds .> Q10. For which purpose dhcp is used ANS ip address> Q11 global vaariable defined as ststic will serve the purpose of ---> Q12 Question on NFS ANS It uses the same semantics as unix for> file system> Q13. Program counter is incremented typically in which uses ANS fetch> Q14 NO of NULL pointers in a tree with n leaf nodes ANS N+1> Q15.thread take less time than process context Why? Ans. Address space is> same.> Q.16 Which algo is best for sorting 10 elements?> Ans. 1> binary tree 2> selection 3> bubble 4> none> Q.17 a question on ICV(networking)> a) When A sends an ICV and message, B computes ICV , checks It with given> ICV,and decodes Message> b) Similar other> Q.18 When server A sends a time request to server B, (time> synchronization), and response becomes past, What does A do?> a) resets its own clock> b) resends time request again> > Q.19 in public key encryption what does A do such that It is not visible> to others?> a) A uses public key part of A> b) A uses private key part of A> c) A uses public key part of B> d) A uses private key part of B> Q.20 function dependency can be described as:> Q.21 q. on findind cyclometric complexity of the given program> 1> 7 2>5 3> 4 4> 0> Q.22 Codd's rule related to database > Q.23 path testing comes under> A) white box > B) black box> Q.24 when an ip address is not in the computer adresss resolution file> what does It do with that packet> a)Ignores It> c) sends It to default gateway> d) sends It to ethernet server> Q.25 execution divided in different stages then this is called ANS.> Pipelining> Q.26 in C the macros are> ANS. converted in to inline code during preprocessing > Q.27 X: verification means doing the right things> Y: validation means doing things right> a) both true> b) both false> c) one true one correct> Q.28 void insert (key, r)> Keytype key, data> {> if (n>=max)> ERROR> Else> R[n++].key=k;> Which is best?> 1> sequential search> Q.29 which is best for associative list searching?> 1) single linked list> 2) doubly linked list> 3) hash table> Q.30 A question based on SQL ?> Q.31 which is not necessary condition for deadlock?> 1> mutual exclusion> 2> no preemption> 3> is ANS.> 4> Circular wait
There were two papers one was aptitude ( 36 questions) and other was technical(20 questions)
1: given an expression tree and asked us to write the in fix of that expression
four choices
2: global variables in different files are
a:at compiletimeb) loading timec) linking timed)execution time
3)size of(int)a) always 2 bytesb) depends on compiler that is being usedc) always 32 bitsd) can't tell
4)which one will over flow given two programs2prog 1: prog2:
main() main(){ {int fact; int fact=0long int x; for(i=1;i<=n;i++)fact=factoral(x); fact=fact*i; } } int factorial(long int x){ if(x>1) return(x*factorial(x-1);}
a) program 1;b) program 2;c) both 1 &2d) none
}
5) variables of fuction call are allocated ina) registers and stackb) registers and heapc) stack and heapd)
6)
avg and worst case time of sorted binary tree
7) data structure used for proority queue a) linked list b) double linkedd list c)array d) tree
8)
main(){char str[5]="hello";if(str==NULL) printf("string null");else printf("string not null");}what is out put of the program?a) string is null b) string is not null c) error in program d) it executes but print nothing
9)there are 0ne 5 pipe line and another 12 pipe line sates are there and flushed time taken to execute five instructions
a) 10,17b) 9,16c)25,144d)
10)
for hashing which is best on terms of bucketsa)100 b)50 c)21 d)32 ans 32
11)
void f(int value){for (i=0;i<16;i++){if(value>>1) printf("1")else printf("0");}}what is printed?a) bineray value of argument b)bcd value c) hex value d) octal value
12)
void f(int *p){static val=100;val=&p;}main(){int a=10;printf("%d ",a);f(&a);printf("%d ",a);}what will be out put?a)10,10
13)
struck a{int x;float y;char c[10];}union b{int x;float y;char c[10];}which is true?a) size of(a)!=sizeof(b);b)c)d)
14)
# define f(a,b) a+b#defiune g(c,d) c*d
find valueof f(4,g(5,6))a)26 b)51 c) d)
15)
find avg access time of cachea)tc*h+(1-h)*tm b)tcH+tmH
c) d) tc is time to access cache tm is time to access when miss occure
16)
main(){char a[10]="hello";strcpy(a,'\0');printf("%s",a);}out put of the program?a) string is null b) string is not null c) program error d)
17)
simplyfy k map
1 x x 01 x 0 1
18)
int f(int a){a=+b;
//some stuff
}
main(){x=fn(a);y=&fn;what are x & y typesa) x is int y is pointer to afunction which takes integer value
19) char a[5][15];int b[5][15];address of a 0x1000 and b is 0x2000 find address of a[3][4] and b[3][4]assume char is 8 bits and int is 32 bits
a) b) c) d)
there are 20 questions all in techinical paper and 36 questions in appititude test
in appititude thay have given all diagrams and asked to find what comes next
thay are quite easy and i hope if u practice r.s aggraval u can do it easily
for tecnical thay have given 1 hr for 20 questions and for not technical thay have given only 40 minand 36 questions
this is the paper i have right now
1. main() { fork();fork();fork();printf("\n hello");}
How many times print command is executed?
2.main(){ int i,*j; i=5;j=&i;printf("\ni= %d",i); f(j);
printf("\n i= %d",i);}
void f(int*j){int k=10; j= &k;}
output isa 5 10b 10 5c 5 5d none
3. some question on pipeline like you have to findout the total time by which execution is completed for a pipeline of 5 stages.
4.
main(){ int *s = "\0";
if(strcmp(s,NULL)== 0) printf("\n s is null")p else printf("\n s is not null");}
5. some syntax which returns a pointer to function
6. size of integer is a. 2 bytes b 4 bytes c. machine dependant d compiler dependent.
7.max and avg. height of sorted binary tree
a. logn nb n logn
8. some question. like the number was shifted everytime by one and bitwise and with 10000000. one was supposed to find what the code was doing. I feel the answer was most probably finding decimal value.
9. int a[5][4] int is 2 bytes base address for array is 4000(Hexa) what will be addr for a[3][4]? int is 4 bytes same question.
10. implementation of priority queue a. tree b linked list c doubly linked list.
1.Flush of a bathroom is equivalent to which electronics circiut(a) Capacitor (b)Integrate and dump circiut(c)Diode (d)ans: (a)
2.There were two questions on Unix programming.I don't remember the programmeexactly.But the question were asked to find the o/p of the programe and the error of the programme.
3.In Internet Transprot layer which is not a protocola)/etc/hostb)TCPc)UDPd)...
4.How many address bits are there in Ipv6?
5.There are 2protocols IP and IPX are running on top of Ethernet. Supposea packet addressed to that ethernt card arrives, to which protocol theethernet sends the packet?1. It checks the payload of the frame and finds out the protocol type anddespatches it to the right protocol2. It fins out the protocol type that is mentioned in the ethernet frame.3. despatches to both the protocol
6.path testinga. black boxb. white box(ans)
7.There were questions on ICV. I don't remember the questions actually
8.Normalisation
9.One question was from Avalanche diode
10.CSMA/CD is used ina) token ringb) FDDId) ethernetAns : d
11. if even parity is used for parity generation, what is thehamming distanceans:2
12.the code set is {00000,00111,11100,11011}what is the error detecting and correcting capability?ans:2,1
13. IEEE 802.5 isans: TOKEN RING
14. about deadlock condition
Section B:(Apttitude and reasoning most of them were mathematics based)-------------------------------------1.There were four guys and three girls in a park along with their dogs.Sangeeta is unmarriedThere are two couples.Rahul is Jaya's husband.Neelam is Gourav's sister.Others were Ravi and Shakti.Sangeeta doesn't like sitting beside rahul.Jaya doesn't like the dog so their dog was hold by her hubby.Ravi was not holdind any dog since his wife was holding it.Determine the sitting arrangement in the park.
2.A man spends 1/6th of his total life in child hoos, 1/7th as youth, 1/12th as bachelor, five years after marriage a son was born. the son died four years before his father, at an age of half of his father's final age.ans: 84 days
3.Five persons A,B,C,D and E were traveling in a car. They were two ladies in the group. Of them who knew the car driving one was a lady. A is brother of D. B wife of D, drive at the beginning. E drive at the end.
1) Which of the following is a pair of brothers. (Ans.: A, D)2) Who was the other lady in the group. (ans: C) 3) In the case of which the following pairs, no relationship can be established with one else in the group (ans: C, E) 4) How was E related to A.
4.1,4,9,_,_,_,49,64.
5.One question was on the polynomials and their degree.I don't actuallyremember the expression.
6.There were 4 more questions on the numbers series.Practice them from a good book.
7.Find the hypotaneous of a right angle isoceles tringle whose area is50. Ans. 10*(root 2)
8.(root 200) - (root 50) =?
9. Factorize y**2 + 8y - 48 =0
10.21, 463, 687, 238, 1134, ----
11.0, 6, 24, 120, 210, ---, ----
12.There were two sums on probability.13.
14.Cost of article x,first discount is y% of cost, seconddiscount is z%of cost . The price of x isx(1-y/100)(1-z/100)(ans)
The interview pattern will be as:
1. Tell abt your self.2. They will ask for the subjects in which we are strong( Here they will consider the ranking that we written during written examination & marks we got in written exam)3. Mostly the interview time will be 45 minutes around (for only people there is about 1.5 hr)4. HR questions may include here5. Good thing is They r friendly and cooperative so confidence place role.
If u don't know the answer better not to answer than to tell some bad stuff.For me 2 people interviewd. As I told them that I am strong in Cthey told me to write some programs like double linked list, singly linked list(adding node at last), macros, const *,char *,pointer arrays.
The main question that they asked was how can u compile or execute 'c' program without editor. (Using TCC utility)
coming 2 cpp only 1 question i.e what is polymorphism.
Java they asked me about protocol used in JSP, which layer does it belongs to, main differences between Javascript ,java and JSP.
During personal introduction try to excell your capabilities by giving examples like as fast learner, hard worker like..!
If u have any achievements & awards try 2 put them all during personal INtroduction.
The interviewers are very co-operative and highly friendly (so confidence plays vital role)
WISHING U ALL THE BEST FOR YOUR SUCCESS
Make a note that Technical round is the main one.I think there wont be any elimination at HR level unless luck unfavours us.
Added Experience is Definite Added Advantage.
here are the HP interview questions asked .....but it depends on who takes ur interview1] tell @ urself2]ur fav. prog. language3]write string compare program in C (optimize it)4]what is DML in oracle.5]what is RDBMS? howz it different from DBMS?4]What is abstraction? is it only in OOP or in C too? can we say printf func. in stdio.h is an abstraction?5]how will u write a prog to perpare a report based on sorting files on date. i.e u have say 10 files and u have to sort them n make a report of them date of creation/ size - wize.6]a question of java prog. where class was subclass of String and few output functions were there.7]few questions on output in C related to pointers (easy)8]Normalization? functional dependency vs. transitive dependency?9]Unix - some easy ones.----------------------------------------------------------------2nd round u know what is a test plan? is testing important? how will u estimate time taken for testing in product dev. life cycle? given an estimation problem?kinds of testing? what testing a developer has to do ...order of different kind of testing....which is imp testing or development from risk point of view and from personal point of view. what id more imp. work or money?----------------------------------------------------------------
3rd round
tell something about urself....what do u know @ HP? why looking for a change?
if u have done some cerification/course then why? which are the good companies acc. to u and why?
why join HP? ........ and then
u will be offered the job.
Bon Voyage!!!!!!!!!!111
he test consists of 4 sectionsTotal 48 questions12Q - general computer knowledge12Q - computer science(dbms,networks,os) concepts like questions on paging, ...12Q - c/c++ questions12Q - java questions
The question paper had 48 questions to be answered in 1hr. Time will be quite sufficient. They have different sets(3) of question papers. I had got the paper with serial number ending with ***- 02-2003. I would like to request everyone who have attended the HP test to contribute the questions that they remember. Some questions that i remember are...................
1>General section : computer science general knowledge
2> Computer science general: simple questions
1) HP acquired this company in 2002. Which is the company
a)Compaq b)Dell c)option 3 d) Option4
Ans: a
2) what does 3G denote
a) 3rd generation mobile communication b) 3rd generation computer languages c) option 3 d) option4
Ans: a
3)an application program that is used by the users to get the inofrmation from the backend of some application like databases:
a) application server b)proxy server c)database server d)option 4
Ans: database server
4) which of the following is not true about the e-mail
a) it can be accessed by a client program using POP
b) it can be accessed by a client program using imap protocol
c) option 3
d) option 4
Ans: I don't remember the answer but first 2 are true.
5) Some quesion regarding the company and who developed it ( the thing to remember is that Apple produce Macintosh computers).
5) What is X.25?
a)option 1 b)option 2 c)option 3 d)option 4
Ans: find out??:-)
>>> napster app is used for : downloading music
3> c/c++ section: questions on c/c++, programs o/p etc.
1) main( )
{
unsigned int i=3;
while( i >=0)
printf( "%d", i--);
}
how many times will the printf stmt be executed?
a)0 b)3 c)4 d)infinite
Ans: I think the answer is infinite, b'cos 'i' is an unsigned integer and it will not decrement below '0' and hence end up in an infinite loop.(yes, i checked and it is getting stuck in an infinite loop)
2) main( )
{
int x,y, z;
x=2;
y=5;
z= x+++y;
printf("%d %d %d", x, y z);
}
a)3 5 7 b)option 2 c)option 3 d)option 4
Ans: a
3) # define swap(a,b) temp=a; a=b; b=temp;
main( )
{
int i, j, temp;
i=5;
j=10;
temp=0;
if( i > j)
swap( i, j );
printf( "%d %d %d", i, j, temp);
}
Ans: On compiling i got ans 10, 0, 0. I did not understand the concept. Please expalin this to me.
4>Java section: questions on java related stuff.
1) Java was initially code named as:
a)Oak b)green c)miller d)option4
Ans: Oak
2) what is not true about the following statements about java.
a) it is compiled using javac compiler
b) the compiled files have .class extension.
c) such files cannot be transfered from one comp to another.
d) they use the java interpreter
Ans: c
3) Why is the synchronize used?
a) to initialize multiple objects b)to lock an object c)option3 d)option 4
Ans: b (probably)
some java qns1.
package java.lang; // Ans: <------------! Runtime gives error ( test it)class HPTest2{ public static void main(String args[]) { String x="sdfsd"; System.out.println("Hello"); } } 2class HPTest{ static HPTest x; public static void main(String args[]) { // below line not given //x=new HPTest(); if not this line Null pointer exeception x.foo(); } void foo() { System.out.println("Hello"); } } 3:class A{ A(int x) { System.out.println(" x=" + x ); } A(int x,int y) { System.out.println(" x=" + x + " y =" + y); }}class HPTest4{ public static void main(String args[]) { A a=new A(1); A b=new A(2,3); A c=new A(); }} Second Round: interview In the 2nd round,Hp employees( 2 or 3) will be interviewing us.The Q asked will vary form person to person. They asked abt my latest projects first.They concentrated less on my academic proj.So plz prepare well abt the latest proj u did. And then they asked fully in C,C++ like what is the diff b/w const char * and char const *.What is friend fns,virtual destructors,virtual constructors,How will the compiler intrepret when a virtual class is declared and other basic stuff like calloc,malloc. In java what is the default exception,Is there any priority for the exceptions,finally,heap concepts etc. They havent asked any Q in N/wing and OS. This is the stuff which i faced in my interview.Iam agian telling u...This varies from person to person. But any way all the best for all u guys who got selected for the next round.Its very easy.Dont be in a hurry.Take ur own time.Another advice,If u don't know the answer for any Q they asked,be frank.Dont try to bluff it becoz the next Q will depend upon the Q u answer previously. The interview pattern will be as: 1. Tell abt your self.2. They will ask for the subjects in which we are strong( Here they will consider the ranking that we written during written examination & marks we got in written exam)3. Mostly the interview time will be 45 minutes around (for only people there is about 1.5 hr)4. HR questions may include here5. Good thing is They r friendly and cooperative so confidence place role. If u don't know the answer better not to answer than to tell some bad stuff.For me 2 people interviewd. As I told them that I am strong in Cthey told me to write some programs like double linked list, singly linked list(adding node at last), macros, const *,char *,pointer arrays. The main question that they asked was how can u compile or execute 'c' program without editor. (Using TCC utility) coming 2 cpp only 1 question i.e what is polymorphism. Java they asked me about protocol used in JSP, which layer does it belongs to, main differences between _Javascript ,java and JSP. During personal introduction try to excell your capabilities by giving examples like as fast learner, hard worker like..! If u have any achievements & awards try 2 put them all during personal INtroduction. The interviewers are very co-operative and highly friendly (so confidence plays vital role) WISHING U ALL THE BEST FOR YOUR SUCCESS Make a note that Technical round is the main one.I think there wont be any elimination at HR level unless luck unfavours us. Added Experience is Definite Added Advantage. In general section they r asking questions like Who is CEO ,founder of HP,Microsoft,Oracle.. some questions u will get from following list IT Gurus 1) Tim Berners Lee -- Founder of the World Wide Web 2) Bjarne Stroustrup, C++ Stroustrup called his new language 'C with Classesand then 'new C'.Because of which the original C began to be called 'old C'which wasconsidered insulting to the C community. At this time Rick Mascittisuggested the name C++ as a successor to C. 3) Michael Dell of Dell Computers 4) Larry Ellison of Oracle Larry Ellison and Bob Oats were working on aconsulting project for the CIA (Central Intelligence Agency). The code namefor the project was called Oracle (the CIA saw this as the system to giveanswers to all questions or something such). The project was designed tohelp use the newly written SQL code by IBM. The project eventually wasterminated but Larry and Bob decided to finish what they started and bringit to the world. They kept the name Oracle and created the RDBMS engine.Later they kept the same name for the company. 5) James Gosling,and his project is now known as Java Originally called Oakby creator James Gosling, from the tree that stood outside his window, theprogramming team had to look for a substitute as there was no other languagewith the same name. Java was selected from a list of suggestions. It camefrom the name of the coffee that the programmers drank. 6) Bill Hewlett(L) and Dave Packard(R) of HP. Behind them in the picture isthe famous HP Garage. Bill Hewlett and Dave Packard tossed a coin to decidewhether the company they founded would be called Hewlett-Packard orPackard-Hewlett. 7) Ken Thompson (L)and Dennis Ritchie(R) ,creators of UNIX, B and C DennisRitchie improved on the B programming language and called it 'New B'.Helater called it C. B was created by Ken Thompson as a revision of the Bonprogramming language (named after his wife Bonnie) 8) Larry Page(L) and Sergey Brin(R), founders of Google. Google wasoriginally named 'Googol'. After founders (Stanford graduates) Sergey Brinand Larry Page presented their project to an angel investor, they received acheque made out to 'Google' ! 9) Gordon Moore(L) and Bob Noyce(R) ,founders of Intel Bob Noyce and GordonMoore wanted to name their new company 'Moore Noyce' but that was alreadytrademarked by a hotel chain, so they had to settle for an acronym ofINTegrated ELectronics. 10) Andreas Bechtolsheim , Bill Joy, Scott Mc Nealy and Vinod Khosla ofSUN(StanfordUniversity Network) MicroSystems Founded by fourStanfordUniversity buddies, SUN is the acronym for Stanford UniversityNetwork. Andreas Bechtolsheim built a microcomputer; Vinod Khosla recruitedhim and Scott McNealy to manufacture computers based on it, and Bill Joy todevelop a UNIX-based OS for the computer. 11) Linus Torvalds of Linux Operating System Linus Torvalds originally usedthe Minix OS on his system which he replaced by his OS. Hence the workingname was Linux (Linus' Minix). He thought the name to be too egotistical andplanned to name it Freax (free + freak + x). His friend Ari Lemmk encouragedLinus to upload it to a network so it could be easily downloaded. Ari gaveLinus a directory called linux on his FTP server, as he did not like thename Freax. (Linus' parents named him after two-time Nobel Prize winnerLinus Pauling) 12) Steve Woznaik(sitting) and Steve Jobs of APPLE Computers Favorite fruitof founder Steve Jobs. He was three months late in filing a name for thebusiness, and he threatened to call his company Apple Computers if the othercolleagues didn't suggest a better name by 5 o'clock. the questions aresection 11.Intel's first processor is1)------2)4004 3) 80804)8086 2) Founder of Microsoft corporation1) Bill Gates 2) Billgates and --------3)Bill gates and Paul Allen4) Billgates and ------- 3)Oddman out1)Internet Explorer 2) Alt Vista3) Netscape Navigator 4)Opera 4)Which of the following is not a database1)PLSQL2)MSSQL 3)MySQL4)Informix 5)Laura C--- (I don't remember exact spelling ) is CEO of1)Oracle 2)DELL 3) Hp4)IntelAns) She is CEO of HP 6)'SUN' Microsystems SUN stands for1)Simple Unified Network2)Solaris Unified Network3)-------------4) None of the above. section 2 1) IRC stands for ans) Internet Relay chat 2)ICQ stands for ans)-------------------- 3)The protocol used to translate Internet address to Network addressis1)IP2)TCP3)ARP4)RARP 4)In some OS the option that the system provides to communicate with other process is1)IPC(Inter Process Communication)2)----3)-----4)----- 5)VPN stands for ans) Virtual private network. 6)The time taken to transfer data from one place to other place or process within specified time is1)Throughput2)Latency time 3)Response time 4)---------- 7)The time complexity for which of the following is O(n log n)1) Radix sort 2)Quick sort3)Shell sort 4) Bubblesort. 8)Which of the following is used pass the packets between networks1)--------2)Bridges3)Router4)Gateways section 31)Which of the following can be used to print % to the screen1) printf("\%");2)printf("file://%/"); 3)----- 4)------
2)how many times the loop is executed main() { int i=3; while(i>=0) printf("%d",i--); return(0); } 1) 3 2)Infinite 3)0 4)23) what is the outputint 1=10;printf("%d %d %d ",i,++i,i++);
1) 10 11 11 2)11 11 10 3) 10 11 10 4) None of the above4)x=2;y=5;z=x+++y;printf("%d %d %d",x,y,z);1)----------- 2)------- 3)--------- 4)---------
5)In c++,1)------------------2)------------------3)you cannot Overload new operator for a class4)----------------------
6) Void xyz(char a[10]) {int i;i=sizeof(a);printf("%d",i); }1)10 2)can't say 3) 2 4)same as size of pointer.
7) Local Variables is stored in which part of the memory 1) register or heap 2)heap 3)register or stack 4)-----8) which of the following can be shared by progams1)Text Code2)Data segment3)heap memory4)--------
1. Who is associated with C language?2. CEO of MIcrosoft3.Company producing Routers,Bridges4.From 70s 80s Company producingmouse,GUIs............a)Dell b)IBM c) Xerox d) HP5.Inventor of Pascal6.Abt SUN micro systems7.first digital comp machine a)von neumann b) Dijkstra8.Which of these is not search engine a)hotbotb)parametric c)Altavista d) google9.In 2002 IBM acquired which company a) Rational b)oracle c) netscape10.founder of apple computer(2 persons)
Computer Concepts
1.Complexity nlogn a.quick sort b. bubble sort c.shell sort2.Abt Protocols3.Abt SSL4.Abt MBR5.Cross compiler6.synonymus to main memory7.Semaphores8.Database quesns Stored procedures Trigger strategy9.Bandwidth measured in ?10.Term assoc with Context Transaction
Java
1.extending the class means2.how many values does char of java has3.Java pgm can be executed on any m/c how?4.utility used for dynamically changing the tablesa.vector b. hash table c. enumeration d. structures5.synchronise means6.if X & Y r objects X = Y means7.which action Java platform restricts on applets a. Image viewing b. Accept user i/p c. write to system files d. initialise date in browser8.quesns on JDBC9.Two quesns on simple java pgms.10. Java was initially code named as:a)Oak b)green c)miller 11.) what is not true about the following statementsabout java.a) it is compiled using javac compilerb) the compiled files have .class extension.c) such files cannot be transfered from one comp toanother.d) they use the java interpreter
1>General section : computer science general knowledge
2> Computer science general: simple questions
1) HP acquired this company in 2002. Which is the company
a)Compaq b)Dell c)option 3 d) Option4
Ans: a
2) what does 3G denote
a) 3rd generation mobile communication b) 3rd generation computer languages c) option 3 d) option4
Ans: a
3)an application program that is used by the users to get the inofrmation from the backend of some application like databases:
a) application server b)proxy server c)database server d)option 4
Ans: database server
4) which of the following is not true about the e-mail
a) it can be accessed by a client program using POP
b) it can be accessed by a client program using imap protocol
c) option 3
d) option 4
Ans: I don't remember the answer but first 2 are true.
5) Some quesion regarding the company and who developed it ( the thing to remember is that Apple produce Macintosh computers).
5) What is X.25?
a)option 1 b)option 2 c)option 3 d)option 4
Ans: find out??:-)
3> c/c++ section: questions on c/c++, programs o/p etc.
1) main( )
{
unsigned int i=3;
while( i >=0)
printf( "%d", i--);
}
how many times will the printf stmt be executed?
a)0 b)3 c)4 d)infinite
Ans: I think the answer is infinite, b'cos 'i' is an unsigned integer and it will not decrement below '0' and hence end up in an infinite loop.(yes, i checked and it is getting stuck in an infinite loop)
2) main( )
{
int x,y, z;
x=2;
y=5;
z= x+++y;
printf("%d %d %d", x, y z);
}
a)3 5 7 b)option 2 c)option 3 d)option 4
Ans: a
3) # define swap(a,b) temp=a; a=b; b=temp;
main( )
{
int i, j, temp;
i=5;
j=10;
temp=0;
if( i > j)
swap( i, j );
printf( "%d %d %d", i, j, temp);
}
Ans: On compiling i got ans 10, 0, 0. I did not understand the concept. Please expalin this to me.
4>Java section: questions on java related stuff.
1) Java was initially code named as:
a)Oak b)green c)miller d)option4
Ans: Oak
2) what is not true about the following statements about java.
a) it is compiled using javac compiler
b) the compiled files have .class extension.
c) such files cannot be transfered from one comp to another.
d) they use the java interpreter
Ans: c
3) Why is the synchronize used?
a) to initialize multiple objects b)to lock an object c)option3 d)option 4
Ans: b (probably)
Q : What is not a part of OS ? O : swapper,compiler,device driver,file system. A : compiler.
Q : what is the condition called when the CPU is busy swapping in and out pages of memory without doing any useful work ? O : Dining philosopher's problem,thrashing,racearound,option d A: thrashing.
Q : How are the pages got into main memory from secondary memory? DMA, Interrupts,option3, option 4 A : as far as i know its Interrupts --by raising a page fault exception.
Q : What is the use of Indexing ?O : fast linear access, fast random access, sorting of records , option 4A : find out....
Q : in terms of both space and time which sorting is effecient.(The question is rephrased .)O : merge sort, bubble sort, quick sort, option 4A : find out
which case statement will be executed in the following code ?
main(){ int i =1; switch(i) { i++; case 1 : printf (""); break;
case 2 : printf(""); break; default : printf(""); break; }}
Answer : Case1 will only be executed.
Q : In the given structure how do you initialize the day feild? struct time { char * day ; int * mon ; int * year ; } * times;
Options : *(times).day, *(times->day), *times->*day.
Answer : *(times->day) -- after the execution of this statement compiler generates error.i didn't understand why.can anybody explain.
Q: The char has 1 byte boundary , short has 2 byte boundary, int has 4 byte boundary. what is the total no: of bytes consumed by the following structure:
struct st { char a ; char b; short c ; int z[2] ; char d ; short f; int q ;}
Options are given.Answer : its very easy 20 and not 19 .
1. Which of the foll is not a protocol.
HTTP PIM PSI
A> PSI (check)
2> Which of the foll does not help security.
Good Password Update AntivirusVLAN
A> VLAN
3> What was the prob with Intel Processor
Cache FPU NONEA> FIND OUT AND LET ME KNOW
4> What does MIME stand for
A> Multipurpose Mail Exchange Protocol
5> What does XP stand for in WIN-XpA> Experience
6> Who is associated with CA> Dennis Ritchie
7> Which of the foll is not a IM client
AOLMSNJABBERXINGCA> XINGC
8> What does ERP stand 4
A> Enterprise resource planning.
9> Who is associated with HOTMAIL
SABEER Bhatia and Jack SmithSABEER Bhatia and Bill Gates
A>SABEER Bhatia and Jack Smith
10> What does UNIX stand 4???Find out
11> Which of the foll is not a app serverBLUESTONEWEBSPHERETOMCATJBOSS
A> BLUESTONE
GENERAL CSE Q's
12> What do u call software embbedded in ROM
BIOSFIRMWARESHAREWAREFREEWAREA> BIOS (Verify and plz let me know)
13> What is semaphore used 4????
14> Integral Constraint helps in???
A> Solving Inconsitent Data prob.
15> PING uses
A> ICMP
16> IP ADDRESS occupies 4 bytes8 bytes16 bytes6 bytes
A> I wrote 8. correct ans 4
17> Which DataStructure helps SearchingSTACKLINKED LISTHASHA> HASH
18> Q on Binary tree Depth?2^n2^n - 1log n
19> Database shud havA> ACID properties.
20> VPN stands 4A> virtual private n/w
21> what does fork() return 2 parentchild pid0A> 0
22> What do u call the relationship b/e a table andits columnzA> Schema
12Q on c & c++
23> What is true about c++A> IT can hav virtual constuctors
24> result of i=6; printf("%d",i++*i++)3654cant sayA> Can't say (compiler dependent)
25> output ofchar str[20] = "SANJAY"
printf("%d%d",sizeof(str),strlen(str))
ANS> 20,6
26> Which of the foll cannot b used accross filesexternvolatilestaticconstA> static. (i wrote volatile)
27> union u{ int i; char c;}; sizeof(u);A> 4 (I got damm irritated when i read this q. Imarked 4 and wrote UNDER UNIX next 2 the answer. Howcan such a dumb q which gives diff values under DOSand UNIX b asked???????????? lemme know)
28> Idenitify err5[[a]5["abc"]A> 5["abc"]
12Q on JAVA
29> Java alloctaes mem inSTACK HEAPA> HEAP
30> Can u call Garbage collector explicitly
A> S . Find out the syntax. It was asked
31> What does this mean X = Y
A> Object X refers to the contents of Y.
32> Q on Null pointer Exception
33> Synchronize is used 4???
1.Intel's first processor is1)------2)4004 3) 80804)8086
2) Founder of Microsoft corporation1) Bill Gates 2) Billgates and --------3)Bill gates and Paul Allen4) Billgates and -------
3)Oddman out1)Internet Explorer 2) Alt Vista3) Netscape Navigator 4)Opera
4)Which of the following is not a database1)PLSQL2)MSSQL 3)MySQL4)Informix
5)Laura C--- (I don't remember exact spelling ) is CEO of1)Oracle 2)DELL 3) Hp4)IntelAns) She is CEO of HP
6)'SUN' Microsystems SUN stands for1)Simple Unified Network2)Solaris Unified Network3)-------------4) None of the above.
section 2
1) IRC stands for ans) Internet Relay chat
2)ICQ stands for ans)--------------------
3)The protocol used to translate Internet address to Network addressis1)IP2)TCP3)ARP4)RARP
4)In some OS the option that the system provides to communicate with other process is1)IPC(Inter Process Communication)2)----3)-----4)-----
5)VPN stands for ans) Virtual private network.
6)The time taken to transfer data from one place to other place or process within specified time is1)Throughput2)Latency time 3)Response time 4)----------
7)The time complexity for which of the following is O(n log n)1) Radix sort 2)Quick sort3)Shell sort 4) Bubblesort.
8)Which of the following is used pass the packets between networks1)--------2)Bridges3)Router4)Gateways
section 31)Which of the following can be used to print % to the screen1) printf("\%");2)printf("file://%/"); 3)----- 4)------
2)how many times the loop is executed main() { int i=3; while(i>=0) printf("%d",i--); return(0); } 1) 3 2)Infinite 3)0 4)23) what is the outputint 1=10;printf("%d %d %d ",i,++i,i++);
1) 10 11 11 2)11 11 10 3) 10 11 10 4) None of the above4)x=2;y=5;z=x+++y;printf("%d %d %d",x,y,z);1)----------- 2)------- 3)--------- 4)---------
5)In c++,1)------------------2)------------------3)you cannot Overload new operator for a class4)----------------------
6) Void xyz(char a[10]) {int i;i=sizeof(a);printf("%d",i); }1)10 2)can't say 3) 2 4)same as size of pointer.
7) Local Variables is stored in which part of the memory 1) register or heap 2)heap 3)register or stack 4)-----8) which of the following can be shared by progams1)Text Code2)Data segment3)heap memory4)--------section 4Sorry I don't remember the Java Questions
Iam giving the quesns on 3 sections.c/c++ was veryeasyFor any further informn mail me.
4 sections48 quesnsno negative markingall objective quesns.
IT INformation
1. Who is associated with C language?2. CEO of MIcrosoft3.Company producing Routers,Bridges4.From 70s 80s Company producingmouse,GUIs............a)Dell b)IBM c) Xerox d) HP5.Inventor of Pascal6.Abt SUN micro systems7.first digital comp machine a)von neumann b) Dijkstra8.Which of these is not search engine a)hotbotb)parametric c)Altavista d) google9.In 2002 IBM acquired which company a) Rational b)oracle c) netscape10.founder of apple computer(2 persons)
Computer Concepts
1.Complexity nlogn a.quick sort b. bubble sort c.shell sort2.Abt Protocols3.Abt SSL4.Abt MBR5.Cross compiler6.synonymus to main memory7.Semaphores8.Database quesns Stored procedures Trigger strategy9.Bandwidth measured in ?10.Term assoc with Context Transaction
Java
1.extending the class means2.how many values does char of java has3.Java pgm can be executed on any m/c how?4.utility used for dynamically changing the tablesa.vector b. hash table c. enumeration d. structures5.synchronise means6.if X & Y r objects X = Y means7.which action Java platform restricts on applets a. Image viewing b. Accept user i/p c. write to system files d. initialise date in browser8.quesns on JDBC9.Two quesns on simple java pgms.10. Java was initially code named as:a)Oak b)green c)miller 11.) what is not true about the following statementsabout java.a) it is compiled using javac compilerb) the compiled files have .class extension.c) such files cannot be transfered from one comp toanother.d) they use the java interpreter
1) HP acquired this company in 2002. Which is the companya)Compaq b)Dell c)option 3 d) Option4Ans: a2) what does 3G denote a) 3rd generation mobile communication b) 3rd generation computer languages c) option 3 d) option4Ans: a3)an application program that is used by the users to get the inofrmation from the backend of some application like databases:a) application server b)proxy server c)database server d)option 4Ans: database server freshersworld.com 4) which of the following is not true about the e-maila) it can be accessed by a client program using POP b) it can be accessed by a client program using imap protocolc) option 3 d) option 4Ans: I don't remember the answer but first 2 are true.5) Some quesion regarding the company and who developed it ( the thing to remember is that Apple produce Macintosh computers).5) What is X.25?a)option 1 b)option 2 c)option 3 d)option 4Ans: find out??:-)3> c/c++ section: questions on c/c++, programs o/p etc.1) main( ) { unsigned int i=3; freshersworld.com while( i >=0) printf( "%d", i--); }how many times will the printf stmt be executed?a)0 b)3 c)4 d)infiniteAns: I think the answer is infinite, b'cos 'i' is an unsigned integer and it will not decrement below '0' and hence end up in an infinite loop.(yes, i checked and it is getting stuck in an infinite loop)2) main( ) { int x,y, z; x=2; y=5; z= x+++y; printf("%d %d %d", x, y z); }a)3 5 7 b)option 2 c)option 3 d)option 4Ans: a3) # define swap(a,b) temp=a; a=b; b=temp; main( ){ freshersworld.com int i, j, temp;i=5;j=10;temp=0;if( i > j)swap( i, j );printf( "%d %d %d", i, j, temp);}Ans: On compiling i got ans 10, 0, 0. I did not understand the concept. Please expalin this to me.4>Java section: questions on java related stuff.1) Java was initially code named as:a)Oak b)green c)miller d)option4Ans: Oak2) what is not true about the following statements about java.a) it is compiled using javac compilerb) the compiled files have .class extension.c) such files cannot be transfered from one comp to another.d) they use the java interpreter freshersworld.com Ans: c3) Why is the synchronize used?a) to initialize multiple objects b)to lock an object c)option3 d)option 4Ans: b (probably)..................
.From 70s 80s Company producingmouse,GUIs............a)Dell b)IBM c) Xerox d) HP
3)an application program that is used by the users to get the inofrmation from the backend of some application like databases:a) application server b)proxy server c)database server d)option 4Ans: database server
8.Database quesns Stored procedures Trigger strategy9.Bandwidth measured in ?10.Term assoc with Context Transaction
2)ICQ stands for ans)--------------------
class A{ A(int x) { System.out.println(" x=" + x ); } A(int x,int y) { System.out.println(" x=" + x + " y =" + y); }}class HPTest4{ public static void main(String args[]) { A a=new A(1); A b=new A(2,3); A c=new A(); }}
1. Which of the foll is not a protocol.
HTTP PIM PSI
A> PSI (check)
2> Which of the foll does not help security.
Good Password Update AntivirusVLAN
A> VLAN
3> What was the prob with Intel Processor
Cache FPU NONEA> FIND OUT AND LET ME KNOW
4> What does MIME stand for
A> Multipurpose Mail Exchange Protocol
5> What does XP stand for in WIN-XpA> Experience
6> Who is associated with CA> Dennis Ritchie
7> Which of the foll is not a IM client
AOLMSNJABBERXINGCA> XINGC
8> What does ERP stand 4
A> Enterprise resource planning.
9> Who is associated with HOTMAIL
SABEER Bhatia and Jack SmithSABEER Bhatia and Bill Gates
A>SABEER Bhatia and Jack Smith
10> What does UNIX stand 4???Find out
11> Which of the foll is not a app serverBLUESTONEWEBSPHERETOMCATJBOSS
A> BLUESTONE
GENERAL CSE Q's
12> What do u call software embbedded in ROM
BIOSFIRMWARESHAREWAREFREEWAREA> BIOS (Verify and plz let me know)
13> What is semaphore used 4????
14> Integral Constraint helps in???
A> Solving Inconsitent Data prob.
15> PING uses
A> ICMP
16> IP ADDRESS occupies 4 bytes8 bytes16 bytes6 bytes
A> I wrote 8. correct ans 4
17> Which DataStructure helps SearchingSTACKLINKED LISTHASHA> HASH
18> Q on Binary tree Depth?2^n2^n - 1log n
19> Database shud havA> ACID properties.
20> VPN stands 4A> virtual private n/w
21> what does fork() return 2 parentchild pid0A> 0
22> What do u call the relationship b/e a table and its columnzA> Schema
12Q on c & c++
23> What is true about c++A> IT can hav virtual constuctors
24> result of i=6; printf("%d",i++*i++)3654cant sayA> Can't say (compiler dependent)
25> output ofchar str[20] = "SANJAY"
printf("%d%d",sizeof(str),strlen(str))
ANS> 20,6
26> Which of the foll cannot b used accross filesexternvolatilestaticconstA> static. (i wrote volatile)
27> union u{ int i; char c;}; sizeof(u);A> 4 (I got damm irritated when i read this q. I marked 4 and wrote UNDER UNIX next 2 the answer. How can such a dumb q which gives diff values under DOS and UNIX b asked????????????)
28> Idenitify err5[[a]5["abc"]A> 5["abc"]
12Q on JAVA
29> Java alloctaes mem inSTACK HEAPA> HEAP
30> Can u call Garbage collector explicitly
A> S . Find out the syntax. It was asked
31> What does this mean X = Y
A> Object X refers to the contents of Y.
32> Q on Null pointer Exception
33> Synchronize is used 4???
Analytical:
1) barron’s GRE: page No. 396 Q:1-4, 12th edition.
An office with 6 staffs. Brown, Black,White,Parker etc.
2) Q:37-39. page No.401, 12th edition
pitcher,thrower, side arm bowling etc. But here
names were changed to charan, hari Etc.
QUANTITAIVE:
1) A B C
C
-----------
G F E D 9
-----------
QUESTION NOT CLEAR
ANS: ARRANGE FROM 1 TO 9 ( A=1,B=2,C=3)
2) SOME DISCOUNT PROBLEM
ANS:Rs.168.00
Paper 2
1. CBA+CCA=ACD given D=0, find B,C
2. Two cars(A & B)started to from two stations at the same time. Distance b/w the stations is 230 km. After 3 hours distance b/w them is 20 km. The speed of B increases by 10 km for every one hour. What is the ratio of their speeds?
3. There are 100 people.
4. I) Sonali's father knows that her mother's birthday falls after 25th of JAN and before 25th of FEB
II) Sonali's brother knows that his mother's birthday falls after 23rd FEB and before 28th FEB
To find Sonali's Mother's birthday
a) only I is sufficiant
b) only II
c) both I and II are necessary
d) insufficiant data
There was one more question of the same type.
THE FOLLOWING PAPER WAS GIVEN IN IIT-99
Paper Model:
Section I: computer awareness(i.e general things about computer)Q.15
-ve marks -1/4
Section II: Simple C- language Q. 15 & -ve marks: -1/4
Section III: On pointers & structures
and C++,JAVA( only 1 on this) Q.10 each quetion ->2 marks -ve marks: -1
Section IV: Analytical Q.20 each quetion -> 2 marks.
-ve marks: -1/4
SECTION-I
1). Piggy backing is a technique for
a) Flow control b) sequence c) Acknowledgement d) retransmition
ans: c piggy backing
2). The layer in the OST model handles terminal emulation
a) session b) application c) presentation d) transport
ans: b application
3) ans: a odd numbers of errors
4)Q. In signed magnitude notation what is the minimum value that
can be represented with 8 bits
a) -128 b) -255 c) -127 d) 0
5) c 20
6) a 120
7) b synchronise the access
8) a system call
9) b the operating system
10) a 177333
11) d used as a network layer protocall in network and
windows system
12) b has to be unique in the sub network
13)Q. there is an employer table with key feilds as employer no.data in every n'th row are needed for a simple following queries will get required results.
a) select A employe no. from employe A , where exists from employe B where A employe no. >= B employe having (count(*) mod n)=0
b) select employe no. from employe A, employe B where
A employe no.>=B employ no.grouply employe no.having(count(*) mod n=0 )
c) both a& b
d)none of the above
14)Q. type duplicates of a row in a table customer with non uniform key field customer no. you can see
a) delete from customer where customer no. exists
( select distinct customer no. from customer having count )
b) delete customer a where customer no. in
b rowid
c) delete customer a where customer no. in
( select customer no. from customer a, customer b )
d) none of the above
15) c Volatile modifier
---------- Section I over with 15 quetions -----------
SECTION-II
Section II is not covered completly But it is very very easy
. You can do it very easely.
1) ans: recursion
2) long int size
a) 4 bytes b) 2 bytes c) compiler dependent d) 8 bytes
ans: compiler dependent
note: order of a,b,c,d are doubt but answer is correct.
3) x=2,y=6,z=6
x=y==z; ans:x=1
printf(%d",x) ?
4) if(x>2)?3:4
5)
6)
7) ans: c 6 ( quetion on enum )
8) ----
14) c : class A,B and C can have member functions with same name.
15) ans: d none of the above
SECTION-III
1) ans: b It does not work when rp is the last element in the linked list
2) ans: a always
3) ans: b 13
4) ans: b 16
5) ans: d 55,55
6) ans: c 5,10,10,3
7) ---
8) ans:d 4
9) ans: c 5
10)ans: c semicolon missing
SECTION-IV
following are not in order:
2. M > D > Y ans: (a)
6. 10 in 4 seconds,
? in 6 minutes = 10x6x60/4 = 900 ans: (a)
7. a=2, b=4, c=5
(a+b)/c - c/(a+b) = 11/30 (ans).
8. 100(100000000+100000000)/10000 = 2x1000000 (ans).
9. what does the hexanumber E78 in radix 7.
(a) 12455 (b) 14153 (c) 14256 (d) 13541 (e) 131112 ans: (d)
10. Q is not equal to zero and k = (Q x n - s)/2 find n?
(a) (2 x k + s)/Q (b) (2 x s x k)/Q (c) (2 x k - s)/Q
(d) (2 x k + s x Q)/Q (e) (k + s)/Q
(from GRE book page no:411)
data:
A causes B or C, but not both
F occurs only if B occurs
D occurs if B or C occurs
E occurs only if C occurs
J occurs only if E or F occurs
D causes G,H or both
H occurs if E occurs
G occurs if F occurs
NOTE: check following answers.
11. If A occurs which of the following must occurs
I. F & G
II. E and H
III. D
(a) I only (b) II only (c) III only (d) I,II, & III
(e) I & II (or) II & III but not both ans: (e)
12. If B occurs which must occur
(a) D (b) D and G (c) G and H (d) F and G (e) J ans: (a)
13. If J occurs which must have occured
a) E (b) either B or C (c) both E & F (d) B (e) both B & C ans: (b)
14. which may occurs as a result of cause not mentioned
(1) D (2) A (3) F
(a) 1 only (b) 2 only (c) 1 & 2 (d) 2 & 3 (e) 1,2,3 ans: (c)
15. E occurs which one cannot occurs
(a) A (b) F (c) D (d) C (e) J ans: (b)
11 to 15:- ----------- e , a , b , c , b ---------------
Below are in order:
16. to 20. answers:
e
a
c
a
0 Comments:
Post a Comment
<< Home