CSC Placement Paper
1.------- is associated with webservices.
a) WSDL b) WML c) web sphere d) web logic
2.any large single block of data stored in a database, such as a picture or sound file, which does not include record fields, and cannot be directly searched by the database’s search engine.
a) TABLE b) BLOB c) VIEW d) SCHEME
3.Areserved area of the immediate access memory used to increase the running speed of the computer program.
a) session memory b) bubble memory c) cache memory d) shared memory
4.a small subnet that sit between atrusted internal network and an untruster external network, such as the public internet.
a) LAN b) MAN c) WAN d) DMZ
5.technologies that use radio waves to automa cally iden fy people or objects,which is very similar to the barcode iden fica on systems,seen in retail stores everyday.
a)BLUETOOTH b) RADAR c)RSA SECURE ID d)RFID
6.main(){
float fl = 10.5;
double dbl = 10.5
if(fl ==dbl)
prin (“UNITED WE STAND”);
else
prin (“DIVIDE AND RULE”)
}
what is the output?
a)compila on error b)UNITED WE STAND c)DIVIDE AND RULE d)linkage error.
7.main(){
sta c int ivar = 5;
prin (“%d”,ivar--);
if(ivar)
main();
}
what is the output?
a)1 2 3 4 5 b) 5 4 3 2 1 c)5 d)compiler error:main cannot be recursive func on.
8.main()
{
extern int iExtern;
iExtern = 20;
prin (“%d”,iExtern);
}
what is the output?
a)2 b) 20 c)compile error d)linker error
9..#define clrscr() 100
main(){
clrscr();
prin (“%d\n\t”, clrscr());
}
what is the output?
a)100 b)10 c)compiler errord)linkage error
10.main()
{
void vpointer;
char cHar = ‘g’, *cHarpointer = “GOOGLE”;
int j = 40;
vpointer = &cHar;
prin (“%c”,*(char*)vpointer);
vpointer = &j;
prin (“%d”,*(int *)vpointer);
vpointer = cHarpointer;
prin (“%s”,(char*)vpointer +3);
}
what is the output?
a)g40GLE b)g40GOOGLE c)g0GLE d)g4GOO
11.#define FALSE -1
#define TRUE 1
#define NULL 0
main() {
if(NULL)
puts(“NULL”);
else if(FALSE)
puts(“TRUE”);
else
puts(“FALSE”);
}
what is the output?
a)NULL b)TRUE c)FALSE d)0
12.main() {
int i =5,j= 6, z;
prin (“%d”,i+++j);
}
what is the output?
a)13 b)12 c)11 d)compiler error
13.main() {
int i ;
i = accumulator();
prin (“%d”,i);
}
accumulator(){
_AX =1000
}
what is output?
a)1 b)10 c)100 d)1000
14.main() {
int i =0;
while(+(+i--)!= 0)
i- = i++;
prin (“%d”,i);
}
what is the output?
a)-1 b)0 c)1 d)will go in an infinite loop
15.main(){
int i =3;
for(; i++=0;)
prin ((“%d”,i);
}
what is the output?
a)1b)2c)1 2 3d)compiler error:L value required.
16.main(){
int i = 10, j =20;
j = i ,j?(i,j)?i :j:j;
prin (“%d%d”,i,j);
}what is the output?
a)20 20 b)20 10 c)10 20 d)10 10
17.main(){
extern i;
prin (“%d\t”,i);{
int i =20;
prin (“%d\t”,i);
}
}
what is output?
a) “Extern valueof i “ 20 b)Externvalue of i”c)20d)linker Error:unresolved external symbol i
18.int DIMension(int array[]){
return sizeof(array/sizeof(int);}
main(){
int arr[10];
prin (“Array dimension is %d”,DIMension(arr));
}
what is output?
a)array dimension is 10 b)array dimension is 1 c) array dimension is 2 d)array dimension is 5
19.main(){
void swap();
int x = 45, y = 15;
swap(&x,&y);
prin (“x = %d y=%d”x,y);
}
void swap(int *a, int *b){
*a^=*b, *b^=*a, *a^ = *b;
what is the output?
a) x = 15, y =45 b)x =15, y =15 c)x =45 ,y =15 d)x =45 y = 45
20.main(){
int i =257;
int *iptr =&i;
prin (“%d%d”,*((char*)iptr),*((char *)iptr+1));
}
what is output?
a)1, 257 b)257 1c)0 0d)1 1
21.main(){
int i =300;
char *ptr = &i;
*++ptr=2;
prin (“%d”,i);
}
what is output?
a)556 b)300 c)2 d)302
22.#include
main(){
char *str =”yahoo”;
char *ptr =str;
char least =127;
while(*ptr++)
least = (*ptr
prin (“%d”,least);
}
what is the output?
a)0 b)127 c)yahoo d)y
23.Declare an array of M pointers to func ons returing pointers to func ons returing pointers to characters.
a)(*ptr[M]()(char*(*)()); b)(char*(*)())(*ptr[M])() c)(char*(*)(*ptr[M]())(*ptr[M]() d)(char*(*)(char*()))(*ptr[M])();
24.void main(){
int I =10, j=2;
int *ip = &I ,*jp =&j;
int k = *ip/*jp;
prin (“%d”,k);
}
what is the output?
a)2 b)5 c)10 d)compile error:unexpected end of file in comment started in line 4
25.main(){
char a[4] =”GOOGLE”;
prin (“%s”,a);
}
what is the output?
a)2 b) GOOGLE c) compile error: yoo mant ini alizers d) linkage error.
26.For 1MB memory, the number of address lines required
a)12 b)16 c)20 d)32
27.There is a circuit using 3 nand gates with 2 inputes and 1 output,f ind the output.
a) AND b) OR c) XOR d) NAND
28.what is done for push opera on
a) SP is incremented and then the value is stored.
b) PC is incremented and then the value is stored.
c) PC is decremented and then the value is stored.
d) SP is decremented and then the value is stored.
29.Memory alloca on of variables declared in a program is ------
a) Allocated in RAM
b) Allocated in ROM
c) Allocated in stack
d) Assigned in registers.
30.What ac on is taken when the processer under execu on is interrupted by TRAP in 8085MPU?
a) Processor serves the interrupt request a er comple ng the execu on of the current instruc on.
b) processer serves the interrupt request a er comple ng the current task.
c) processor serves the interrupt immediately.
d) processor serving the interrupt request depent deprnds upon the priority of the current task under execu on.
31.purpose of PC (program counter)in a microprocessor is ----
a) To store address of TOS(top of stack)
b) To store address of next instruc ons to be executed
c) count the number of instruc ons
d) to store the base address of the stack.
32.condi onal results a er execu on of an instruc on in a microprocess is stored in
a) register b) accumulator c) flag register d) flag register part of PSW (program status word)
33.The OR gate can be converted to the NAND func on by adding----gate(s)to the input of the OR gate.
a) NOT b) AND c) NOR d) XOR
34.In 8051microcontroller ,------has a dual func on.
a) port 3 b) port 2 c) port 1 d) port 0
35.An 8085 based microprocessor with 2MHz clock frequency,will execute the following chunk of code with how much delay?
MVI B,38H
HAPPY:
MVI C, FFH
SADDY:
DCR C
JNZ SADDY
DCR B
JNC HAPPY
a) 102.3 b)114.5 c)100.5 d)120
36.In 8085 MPU what will be the status of the flag a er the execu on of the following chunk of code.
MVI B,FFH
MOV A,B
CMA
HLT
a)S = 1, Z = 0, CY = 1 b)S = 0, Z = 1, CY = 0 c) S = 1, Z = 0, CY = 0 d)S = 1, Z = 1 ,CY = 1
37.A posi ve going pulse which is always generated when 8085 MPU begins the machine cycle.
a) RD b) ALE c) WR d) HOLD
38.when a ----- instruc on of 8085 MPU is fetched , its second and third bytes are placed in theW and Z registers.
a) JMP b) STA c) CALL d) XCHG
39.what is defined as one subdivision of the opera on performed in one clock period.
a) T- State b) Instruc on Cycle c) Machine Cycle d) All of the above
40.At the end of the following code, what is the status of the flags.
LXI B, AEC4H
MOV A,C
ADD HLT
a) S = 1, CY = 0, P = 0 , AC = 1 b) S =0 , CY = 1, P = 0,AC = 1 c) S = 0, CY = 1, P = 0 , AC = 1 d) S = 0, CY = 1, P = 1 , AC = 1
41.In 8051 micro controller what is the HEX number in the accumulator a er the execu on of the following code.
MOV A,#0A5H
CLR C
RRC A
RRC A
RL A
RL A
SWAP A
a)A6 b)6A c)95 d)A5.
42.The Pen um processor requires ------------ volts.
a)9 b)12 c)5 d)24
43. The data bus on the Celeron processor is-------bits wide.
a)64 b)32 c)16 d)128.
44.K6 processor
a) Hitachi b) toshiba c) zilog d) AMD. ans: d
45. What is the control word for 8255 PPI,in BSR mode to set bit PC3.
a)0EH b)0FH c)07H d)06H.
46.The repeated execu on of a loop of code while wai ng for an event to occur is called ---------.The cpu is not engaged in any real produc ve ac vity during this period,and the process doesn’t progress
towards comple on.
a) dead lock b) busy wai ng c) trap door d) none.
47. Transparent DBMS is defined as
a) A DBMS in which there are no program or user access languages. b) A DBMS which has no cross file capabili es but is user friendly and provides user interface management. c) A DBMS which keeps its
physical structure hidden from user d) none.
48.Either all ac ons are carried out or none are.users should not have to worry about the effect of incomplete transc ons.DBMS ensures this by undoing the ac ons of incomplete transc ons.this property is known as
a) Aggrega on b) atomicity
c) associa on d) data integrity.
49.------ algorithms determines where in available to load a program. common methods are first fit,next fit,best fit.--------- algorithm are used when memory is full , and one process (or part of a process) needs to be swaped out to accommodate a new program.The ------------- algorithm determines which are the par ons to be swaped out.
a) placement, placement, replacement
b) replacement, placement, placement
c) replacement, placement, replacement
d) placement, replacement, replacement
50.Trap door is a secret undocumented entry point into a program used to grant access without normal methods of access authen ca on. A trap is a so ware interrupt,usually the result of an error condi on.
a)true b)false.
51. Given a binary search tree,print out the nodes of the tree according to post order traversal.
4
/ \
2
5
/ \
1 3
a)3,2,1,5,4. b)1,2,3,4,5. c)1,3,2,5,4. d)5,3,1,2,4.
52.which one of the following is the recursive travel technique.
a)depth first search b)preorder c)breadth first search d)none.
53.which of the following needs the requirement to be a binary search tree.
a) 5
/ \
2
7
/
1
b) 5
/ \
6 7
c) 5
/ \
2 7
/\
1 6
d) none.
54.in recursive implementa ons which of the following is true for saving the state of the steps
a) as full state on the stack
b) as reversible ac on on the stack
c) both a and b
d) none
55.which of the following involves context switch
a)previliged instruc on
b)floa ng point excep on
c)system calls
d)all
e)none
56.piggy backing is a technique for
a)acknowledge
b)sequence
c)flow control
d)retransmission
57. a func onal dependency XY is ___________dependency if removal of any a ribute A from X means that the dependency does not hold any more
a)full func onal
b) mul valued
c)single valued
d)none
58)a rela on schema R is in BCNF if it is in ___________and sa sfies an addi onal constraints that for every func onal dependency XY,X must be a candidate key
a)1 NF
b)2 NF
c)3 NF
d)5 NF
59) a _________sub query can be easily iden fied if it contains any references to the parent sub query columns in the _________ clause
A) correlated ,WHERE
b) nested ,SELECT
c) correlated,SELECT
d) none
60) hybrid devise that combines the features of both bridge and router is known as
a)router b)bridge c)hub d)brouter
61) which of the following is the most crucial phase of SDLC
a)tes ng b)code genera on c) analysys and design d)implementa on
62)to send a data packet using datagram ,connec on will be established
a)no connec on is required
b) connec on is not established before data transmission
c)before data transmission
d)none
63)a so ware that allows a personal computer to pretend as as computer terminal is
a) terminal adapter
b)terminal emula on
c)modem
d)none
64) super key is
a) same as primary key
b) primary key and a ribute
c) same as foreign key
d) foreign key and a ribute
65.In binary search tree which traversal is used for ascending order values
a) Inorder b)preorder c)post order d)none
66.You are crea ng an index on ROLLNO colume in the STUDENT table.which statement will you use?
a) CREATE INDEX roll_idx ON student, rollno;
b) CREATE INDEX roll_idx FOR student, rollno;
c) CREATE INDEX roll_idx ON student( rollno);
d) CREATE INDEX roll_idx INDEX ON student (rollno);
67.A________class is a class that represents a data structure that stores a number of data objects
a. container b.component c.base d.derived
68.Which one of the following phases belongs to the compiler Back-end.
a. Lexical Analysis b.Syntax Analysis c. Op miza on d.Intermediate Representa on.
69.Every context _sensi ve language is context_free
a. true b.false
70.Input:A is non-empty list of numbers L
Xß-infinity
For each item in the list L,do
If the item>x,then
Xß the item
Return X
X represents:-
a)largest number
b)smallest number
c)smallest nega ve number
d) none
71.Let A and B be nodes of a heap,such that B is a child of A. the heap must then sa sfy the following condi ons
a)key(A)>=key(B)
b)key(A)
c)key(A)=key(B)
d)none
72.String ,List,Stack,queue are examples of___________
a)primi ve data type
b)simple data type
c)Abstract data type
d)none
73.which of the following is not true for LinkedLists?
a)The simplest kind of linked list is a single linked list ,which has one link per node .this link points to the next node in the list,or to a null value or emptylist if it is the last node.
b)a more sophis cated kind of linked list is a double linkedlist or two way linkedlist .Each node has two links ,one to the previous node and one to the next node.
c) in a circleLinkedList ,the first and last nodes are linked together.this can be done only for double linked list.
d) to traverse a circular linkedlist ,u begin at any node and follow the list in either direc on un l u return to the original node.
74.sen nel node at the beginning and /or at the end of the linkedlist is not used to store the data
a) true
b) false
Ap tude:
1)There are 3 piles of books on the table you need to arrange them in the self such that 1st book of each pile gets placed on the self,what is the possible no of arrangements:
a)12! b)12C3 * 9C4 c)12^12 d)none
2)Price of a book increases 15% successively (2 mes) what is the new price of the book more compared to that of the old price:
a)32.25% b)23.34% c)36% d)39%
3)There are 3 mixtures when mixed in the ra o of 3:4:5 price was 240.When mixed with 6:4:9 price was 340.what's the price when mixed in 5:6:8 ra on price is_________
4)One ques on based on Venn Diagram.75 total no of students.25 don't know typing,50 know shorthand.then ques on were based on find no of students dont knwing both etc.
5)One person has 2 child.At least one of them was a girl.Then the Probability that 2 of the are girl is_____
a)1/2 b)1/4 c)0.36 d)1
6)Swa when get married to jayanta her age was 3/4 th of her husband's age.A er 12 years her age became 5/6 th of her husband's age.Then what's the age of swa when she got married??
7)y=MAX((3x+y),(11x-y))
then what's the value of y???
8)some passages based on them some ques ons.
9)Some Analogy Ques ons
10)Some ques ons based on
if f(x,0)=x+1
f(o,y)=y
f(x,y)=f(f(x,0),f(2*x-1))
then find f(1,1),f(2,3),f(3,0) etc and some rela ons based on this very easy
11)One ques on based on the average speed
12)one ques on based on Sudoku type, easy to a empt
1.------- is associated with webservices.
a) WSDL b) WML c) web sphere d) web logic
2.any large single block of data stored in a database, such as a picture or sound file, which does not include record fields, and cannot be directly searched by the database’s search engine.
a) TABLE b) BLOB c) VIEW d) SCHEME
3.Areserved area of the immediate access memory used to increase the running speed of the computer program.
a) session memory b) bubble memory c) cache memory d) shared memory
4.a small subnet that sit between atrusted internal network and an untruster external network, such as the public internet.
a) LAN b) MAN c) WAN d) DMZ
5.technologies that use radio waves to automa cally iden fy people or objects,which is very similar to the barcode iden fica on systems,seen in retail stores everyday.
a)BLUETOOTH b) RADAR c)RSA SECURE ID d)RFID
6.main(){
float fl = 10.5;
double dbl = 10.5
if(fl ==dbl)
prin (“UNITED WE STAND”);
else
prin (“DIVIDE AND RULE”)
}
what is the output?
a)compila on error b)UNITED WE STAND c)DIVIDE AND RULE d)linkage error.
7.main(){
sta c int ivar = 5;
prin (“%d”,ivar--);
if(ivar)
main();
}
what is the output?
a)1 2 3 4 5 b) 5 4 3 2 1 c)5 d)compiler error:main cannot be recursive func on.
8.main()
{
extern int iExtern;
iExtern = 20;
prin (“%d”,iExtern);
}
what is the output?
a)2 b) 20 c)compile error d)linker error
9..#define clrscr() 100
main(){
clrscr();
prin (“%d\n\t”, clrscr());
}
what is the output?
a)100 b)10 c)compiler errord)linkage error
10.main()
{
void vpointer;
char cHar = ‘g’, *cHarpointer = “GOOGLE”;
int j = 40;
vpointer = &cHar;
prin (“%c”,*(char*)vpointer);
vpointer = &j;
prin (“%d”,*(int *)vpointer);
vpointer = cHarpointer;
prin (“%s”,(char*)vpointer +3);
}
what is the output?
a)g40GLE b)g40GOOGLE c)g0GLE d)g4GOO
11.#define FALSE -1
#define TRUE 1
#define NULL 0
main() {
if(NULL)
puts(“NULL”);
else if(FALSE)
puts(“TRUE”);
else
puts(“FALSE”);
}
what is the output?
a)NULL b)TRUE c)FALSE d)0
12.main() {
int i =5,j= 6, z;
prin (“%d”,i+++j);
}
what is the output?
a)13 b)12 c)11 d)compiler error
13.main() {
int i ;
i = accumulator();
prin (“%d”,i);
}
accumulator(){
_AX =1000
}
what is output?
a)1 b)10 c)100 d)1000
14.main() {
int i =0;
while(+(+i--)!= 0)
i- = i++;
prin (“%d”,i);
}
what is the output?
a)-1 b)0 c)1 d)will go in an infinite loop
15.main(){
int i =3;
for(; i++=0;)
prin ((“%d”,i);
}
what is the output?
a)1b)2c)1 2 3d)compiler error:L value required.
16.main(){
int i = 10, j =20;
j = i ,j?(i,j)?i :j:j;
prin (“%d%d”,i,j);
}what is the output?
a)20 20 b)20 10 c)10 20 d)10 10
17.main(){
extern i;
prin (“%d\t”,i);{
int i =20;
prin (“%d\t”,i);
}
}
what is output?
a) “Extern valueof i “ 20 b)Externvalue of i”c)20d)linker Error:unresolved external symbol i
18.int DIMension(int array[]){
return sizeof(array/sizeof(int);}
main(){
int arr[10];
prin (“Array dimension is %d”,DIMension(arr));
}
what is output?
a)array dimension is 10 b)array dimension is 1 c) array dimension is 2 d)array dimension is 5
19.main(){
void swap();
int x = 45, y = 15;
swap(&x,&y);
prin (“x = %d y=%d”x,y);
}
void swap(int *a, int *b){
*a^=*b, *b^=*a, *a^ = *b;
what is the output?
a) x = 15, y =45 b)x =15, y =15 c)x =45 ,y =15 d)x =45 y = 45
20.main(){
int i =257;
int *iptr =&i;
prin (“%d%d”,*((char*)iptr),*((char *)iptr+1));
}
what is output?
a)1, 257 b)257 1c)0 0d)1 1
21.main(){
int i =300;
char *ptr = &i;
*++ptr=2;
prin (“%d”,i);
}
what is output?
a)556 b)300 c)2 d)302
22.#include
main(){
char *str =”yahoo”;
char *ptr =str;
char least =127;
while(*ptr++)
least = (*ptr
prin (“%d”,least);
}
what is the output?
a)0 b)127 c)yahoo d)y
23.Declare an array of M pointers to func ons returing pointers to func ons returing pointers to characters.
a)(*ptr[M]()(char*(*)()); b)(char*(*)())(*ptr[M])() c)(char*(*)(*ptr[M]())(*ptr[M]() d)(char*(*)(char*()))(*ptr[M])();
24.void main(){
int I =10, j=2;
int *ip = &I ,*jp =&j;
int k = *ip/*jp;
prin (“%d”,k);
}
what is the output?
a)2 b)5 c)10 d)compile error:unexpected end of file in comment started in line 4
25.main(){
char a[4] =”GOOGLE”;
prin (“%s”,a);
}
what is the output?
a)2 b) GOOGLE c) compile error: yoo mant ini alizers d) linkage error.
26.For 1MB memory, the number of address lines required
a)12 b)16 c)20 d)32
27.There is a circuit using 3 nand gates with 2 inputes and 1 output,f ind the output.
a) AND b) OR c) XOR d) NAND
28.what is done for push opera on
a) SP is incremented and then the value is stored.
b) PC is incremented and then the value is stored.
c) PC is decremented and then the value is stored.
d) SP is decremented and then the value is stored.
29.Memory alloca on of variables declared in a program is ------
a) Allocated in RAM
b) Allocated in ROM
c) Allocated in stack
d) Assigned in registers.
30.What ac on is taken when the processer under execu on is interrupted by TRAP in 8085MPU?
a) Processor serves the interrupt request a er comple ng the execu on of the current instruc on.
b) processer serves the interrupt request a er comple ng the current task.
c) processor serves the interrupt immediately.
d) processor serving the interrupt request depent deprnds upon the priority of the current task under execu on.
31.purpose of PC (program counter)in a microprocessor is ----
a) To store address of TOS(top of stack)
b) To store address of next instruc ons to be executed
c) count the number of instruc ons
d) to store the base address of the stack.
32.condi onal results a er execu on of an instruc on in a microprocess is stored in
a) register b) accumulator c) flag register d) flag register part of PSW (program status word)
33.The OR gate can be converted to the NAND func on by adding----gate(s)to the input of the OR gate.
a) NOT b) AND c) NOR d) XOR
34.In 8051microcontroller ,------has a dual func on.
a) port 3 b) port 2 c) port 1 d) port 0
35.An 8085 based microprocessor with 2MHz clock frequency,will execute the following chunk of code with how much delay?
MVI B,38H
HAPPY:
MVI C, FFH
SADDY:
DCR C
JNZ SADDY
DCR B
JNC HAPPY
a) 102.3 b)114.5 c)100.5 d)120
36.In 8085 MPU what will be the status of the flag a er the execu on of the following chunk of code.
MVI B,FFH
MOV A,B
CMA
HLT
a)S = 1, Z = 0, CY = 1 b)S = 0, Z = 1, CY = 0 c) S = 1, Z = 0, CY = 0 d)S = 1, Z = 1 ,CY = 1
37.A posi ve going pulse which is always generated when 8085 MPU begins the machine cycle.
a) RD b) ALE c) WR d) HOLD
38.when a ----- instruc on of 8085 MPU is fetched , its second and third bytes are placed in theW and Z registers.
a) JMP b) STA c) CALL d) XCHG
39.what is defined as one subdivision of the opera on performed in one clock period.
a) T- State b) Instruc on Cycle c) Machine Cycle d) All of the above
40.At the end of the following code, what is the status of the flags.
LXI B, AEC4H
MOV A,C
ADD HLT
a) S = 1, CY = 0, P = 0 , AC = 1 b) S =0 , CY = 1, P = 0,AC = 1 c) S = 0, CY = 1, P = 0 , AC = 1 d) S = 0, CY = 1, P = 1 , AC = 1
41.In 8051 micro controller what is the HEX number in the accumulator a er the execu on of the following code.
MOV A,#0A5H
CLR C
RRC A
RRC A
RL A
RL A
SWAP A
a)A6 b)6A c)95 d)A5.
42.The Pen um processor requires ------------ volts.
a)9 b)12 c)5 d)24
43. The data bus on the Celeron processor is-------bits wide.
a)64 b)32 c)16 d)128.
44.K6 processor
a) Hitachi b) toshiba c) zilog d) AMD. ans: d
45. What is the control word for 8255 PPI,in BSR mode to set bit PC3.
a)0EH b)0FH c)07H d)06H.
46.The repeated execu on of a loop of code while wai ng for an event to occur is called ---------.The cpu is not engaged in any real produc ve ac vity during this period,and the process doesn’t progress
towards comple on.
a) dead lock b) busy wai ng c) trap door d) none.
47. Transparent DBMS is defined as
a) A DBMS in which there are no program or user access languages. b) A DBMS which has no cross file capabili es but is user friendly and provides user interface management. c) A DBMS which keeps its
physical structure hidden from user d) none.
48.Either all ac ons are carried out or none are.users should not have to worry about the effect of incomplete transc ons.DBMS ensures this by undoing the ac ons of incomplete transc ons.this property is known as
a) Aggrega on b) atomicity
c) associa on d) data integrity.
49.------ algorithms determines where in available to load a program. common methods are first fit,next fit,best fit.--------- algorithm are used when memory is full , and one process (or part of a process) needs to be swaped out to accommodate a new program.The ------------- algorithm determines which are the par ons to be swaped out.
a) placement, placement, replacement
b) replacement, placement, placement
c) replacement, placement, replacement
d) placement, replacement, replacement
50.Trap door is a secret undocumented entry point into a program used to grant access without normal methods of access authen ca on. A trap is a so ware interrupt,usually the result of an error condi on.
a)true b)false.
51. Given a binary search tree,print out the nodes of the tree according to post order traversal.
4
/ \
2
5
/ \
1 3
a)3,2,1,5,4. b)1,2,3,4,5. c)1,3,2,5,4. d)5,3,1,2,4.
52.which one of the following is the recursive travel technique.
a)depth first search b)preorder c)breadth first search d)none.
53.which of the following needs the requirement to be a binary search tree.
a) 5
/ \
2
7
/
1
b) 5
/ \
6 7
c) 5
/ \
2 7
/\
1 6
d) none.
54.in recursive implementa ons which of the following is true for saving the state of the steps
a) as full state on the stack
b) as reversible ac on on the stack
c) both a and b
d) none
55.which of the following involves context switch
a)previliged instruc on
b)floa ng point excep on
c)system calls
d)all
e)none
56.piggy backing is a technique for
a)acknowledge
b)sequence
c)flow control
d)retransmission
57. a func onal dependency XY is ___________dependency if removal of any a ribute A from X means that the dependency does not hold any more
a)full func onal
b) mul valued
c)single valued
d)none
58)a rela on schema R is in BCNF if it is in ___________and sa sfies an addi onal constraints that for every func onal dependency XY,X must be a candidate key
a)1 NF
b)2 NF
c)3 NF
d)5 NF
59) a _________sub query can be easily iden fied if it contains any references to the parent sub query columns in the _________ clause
A) correlated ,WHERE
b) nested ,SELECT
c) correlated,SELECT
d) none
60) hybrid devise that combines the features of both bridge and router is known as
a)router b)bridge c)hub d)brouter
61) which of the following is the most crucial phase of SDLC
a)tes ng b)code genera on c) analysys and design d)implementa on
62)to send a data packet using datagram ,connec on will be established
a)no connec on is required
b) connec on is not established before data transmission
c)before data transmission
d)none
63)a so ware that allows a personal computer to pretend as as computer terminal is
a) terminal adapter
b)terminal emula on
c)modem
d)none
64) super key is
a) same as primary key
b) primary key and a ribute
c) same as foreign key
d) foreign key and a ribute
65.In binary search tree which traversal is used for ascending order values
a) Inorder b)preorder c)post order d)none
66.You are crea ng an index on ROLLNO colume in the STUDENT table.which statement will you use?
a) CREATE INDEX roll_idx ON student, rollno;
b) CREATE INDEX roll_idx FOR student, rollno;
c) CREATE INDEX roll_idx ON student( rollno);
d) CREATE INDEX roll_idx INDEX ON student (rollno);
67.A________class is a class that represents a data structure that stores a number of data objects
a. container b.component c.base d.derived
68.Which one of the following phases belongs to the compiler Back-end.
a. Lexical Analysis b.Syntax Analysis c. Op miza on d.Intermediate Representa on.
69.Every context _sensi ve language is context_free
a. true b.false
70.Input:A is non-empty list of numbers L
Xß-infinity
For each item in the list L,do
If the item>x,then
Xß the item
Return X
X represents:-
a)largest number
b)smallest number
c)smallest nega ve number
d) none
71.Let A and B be nodes of a heap,such that B is a child of A. the heap must then sa sfy the following condi ons
a)key(A)>=key(B)
b)key(A)
c)key(A)=key(B)
d)none
72.String ,List,Stack,queue are examples of___________
a)primi ve data type
b)simple data type
c)Abstract data type
d)none
73.which of the following is not true for LinkedLists?
a)The simplest kind of linked list is a single linked list ,which has one link per node .this link points to the next node in the list,or to a null value or emptylist if it is the last node.
b)a more sophis cated kind of linked list is a double linkedlist or two way linkedlist .Each node has two links ,one to the previous node and one to the next node.
c) in a circleLinkedList ,the first and last nodes are linked together.this can be done only for double linked list.
d) to traverse a circular linkedlist ,u begin at any node and follow the list in either direc on un l u return to the original node.
74.sen nel node at the beginning and /or at the end of the linkedlist is not used to store the data
a) true
b) false
Ap tude:
1)There are 3 piles of books on the table you need to arrange them in the self such that 1st book of each pile gets placed on the self,what is the possible no of arrangements:
a)12! b)12C3 * 9C4 c)12^12 d)none
2)Price of a book increases 15% successively (2 mes) what is the new price of the book more compared to that of the old price:
a)32.25% b)23.34% c)36% d)39%
3)There are 3 mixtures when mixed in the ra o of 3:4:5 price was 240.When mixed with 6:4:9 price was 340.what's the price when mixed in 5:6:8 ra on price is_________
4)One ques on based on Venn Diagram.75 total no of students.25 don't know typing,50 know shorthand.then ques on were based on find no of students dont knwing both etc.
5)One person has 2 child.At least one of them was a girl.Then the Probability that 2 of the are girl is_____
a)1/2 b)1/4 c)0.36 d)1
6)Swa when get married to jayanta her age was 3/4 th of her husband's age.A er 12 years her age became 5/6 th of her husband's age.Then what's the age of swa when she got married??
7)y=MAX((3x+y),(11x-y))
then what's the value of y???
8)some passages based on them some ques ons.
9)Some Analogy Ques ons
10)Some ques ons based on
if f(x,0)=x+1
f(o,y)=y
f(x,y)=f(f(x,0),f(2*x-1))
then find f(1,1),f(2,3),f(3,0) etc and some rela ons based on this very easy
11)One ques on based on the average speed
12)one ques on based on Sudoku type, easy to a empt
No comments:
Post a Comment