Friday, July 25, 2008

COMPUTER AWARENESS questions

NOTE : The questions are of multiple choice format in the paper
1. What is the number of functions of a three variable boolean function?

2. Which is the most commonly used replacement algorithm?
Ans. LRU

3. Which memory management technique involves dividing the memory into fixed sized blocks?
Ans. Paging

4. What is video resolution ?

5. The processing speed of a microprocessor depends on _____?
Ans. data bus width

1. given ip address detemine the class
2. terminal emulation (OSI LAYER) - application layer
3. int a;
scanf("%f",&a);
is there any error or warning ?
ans. no compile time error but run time error
5. analytical ques. on rectangular table 8 persons sitting and some conditions (solved eg. in barron)
6. analytical ques. based on table method given in barron
(author names,publisher,book name)
7. marine animals,terrestial animals,amphibians - express it using venn diagram
8. some equations- solved by knowing 1st stmt,2nd stmt,both or none
9. difference between windows 3.1 and windows 95
10. some ques. on unix
11. concurrency is NOT a feature of c++
12. ada is a stongly typed language

1. A 2MB PCM(pulse code modulation) has

a) 32 channels
b) 30 voice channels & 1 signalling channel.
c) 31 voice channels & 1 signalling channel.
d) 32 channels out of which 30 voice channels, 1 signalling channel, & 1 Synchronizatio channel.
Ans: (c)
2. Time taken for 1 satellite hop in voice communication is

a) 1/2 second
b) 1 seconds
c) 4 seconds
d) 2 seconds
Ans: (a)
3. Max number of satellite hops allowed in voice communication is :

a) only one
b) more han one
c) two hops
d) four hops
Ans: (c)
4. What is the max. decimal number that can be accomodated in a byte.

a) 128
b) 256
c) 255
d) 512
Ans: (c)
5. Conditional results after execution of an instruction in a micro processor is stored in

a) register
b) accumulator
c) flag register
d) flag register part of PSW(Program Status Word)
Ans: (d)
6. Frequency at which VOICE is sampled is

a) 4 Khz
b) 8 Khz
c) 16 Khz
d) 64 Khz
Ans: (a)
7. Line of Sight is

a) Straight Line
b) Parabolic
c) Tx & Rx should be visible to each other
d) none
Ans: (c)
8. Purpose of PC(Program Counter) in a MicroProcessor is

a) To store address of TOS(Top Of Stack)
b) To store address of next instruction to be executed.
c) count the number of instructions.
d) to store base address of the stack.
Ans: (b)
9. What action is taken when the processor under execution is interrupted by a non-maskable interrupt?

a) Processor serves the interrupt request after completing the execution of the current instruction.
b) Processor serves the interupt request after completing the current task.
c) Processor serves the interupt request immediately.
d) Processor serving the interrupt request depends upon the priority of the current task under execution.
Ans: (a)
10. The status of the Kernel is

a) task
b) process
c) not defined.
d) none of the above.
Ans: (b)
11 What is the nominal voltage required in subscriber loop connected to local exchange?

a) +48 volts
b) -48 volts
c) 230 volts
d) 110 volts
12. To send a data packet using datagram , connection will be established

a) before data transmission.
b) connection is not established before data transmission.
c) no connection is required.
d) none of the above.
Ans: (c)

13. Word allignment is

a) alligning the address to the next word boundary of the machine.
b) alligning to even boundary.
c) alligning to word boundary.
d) none of the above.
Ans: (a)
14 When a 'C' function call is made, the order in which parameters passed to the function are pushed into the stack is

a) left to right
b) right to left
c) bigger variables are moved first than the smaller variales.
d) smaller variables are moved first than the bigger ones.
e) none of the above.
Ans: (b)
15 What is the type of signalling used between two exchanges?

a) inband
b) common channel signaling
c) any of the above
d) none of the above.
Ans: (a)
16. Buffering is

a) the process of temporarily storing the data to allow for small variation in device speeds
b) a method to reduce cross talks
c) storage of data within transmitting medium until the receiver is ready to receive.
d) a method to reduce routing overhead.
Ans: (a)
17. A protocol is a set of rules governing a time sequence of events that must take place between

a) peers
b) non-peers
c) allocated on stack
d) assigned to registers.

18. Memory allocation of variables declared in a program is

a) allocated in RAM.
b) allocated in ROM.
c) allocated on stack.
d) assigned to registers.
Ans: (c)

19. A software that allows a personal computer to pretend as a computer terminal is

a) terminal adapter
b) bulletin board
c) modem
d) terminal emulation
Ans: (d)

The following questions (Q20-Q33) are of a slightly different pattern than those above and may also be asked:

20. Find the output of the following program
int *p,*q;
p=(int *)1000;
q=(int *)2000;
printf("%d",(q-p));
Ans: 500

21. What does the statement int(*x[])() indicate?

22. Which addressing mode is used in the following statements:
(a) MVI B,55
(b) MOV B,A
(c) MOV M,A
Ans. (a) Immediate addressing mode.
(b) Register Addressing Mode
(c) Direct addressing mode

23. RS-232C standard is used in _____________.
Ans. Serial I/O
24. How are parameters passed to the main function?

25. What does the file stdio.h contain?

a) functin definition
b) function decleration
c) both func. defn & func. decleration.

26. sscanf is used for ?

27. Memory. Management in Operating Systems is done by

a) Memory Management Unit
b) Memory management software of the Operating System
c) Kernel
Ans: (b)

28. What does the statement strcat(S2,S1) do?

29. TCP(Transmission Control Protocol) is Connection Oriented and used in ______________ layer?

30. IP(Internet Protocol) is connectionless and used in _________________ layer?

31. For LAN Netwrok layer is not required. Why?

32. What is done for a Push opertion?
Ans: SP is decremented and then the value is stored.

33. Describe the following structures as LIFO/FILO/FIFO/LILO
(a) Stack
(b) Queue
TECHNICAL :

1. Binary equivalent of 52

Ans. 110100


2. Hexadecimal equivalent of 3452

Ans. 72A


3. Explain Just In Time Concept ?

Ans. Elimination of waste by purchasing manufacturing exactly when needed


4. A good way of unit testing s/w program is

Ans. User test


5. A lowest level of security by most RDBMS is


6. OOT uses

Ans. Encapsulated of detect methods


7.EDI useful in

Ans. Electronic Transmission


8. MRPII different from MRP

Ans. Modular version of man redundant initials


9. Hard disk time for R/W head to move to correct sector

Ans. Latency Time


10. The percentage of times a page number bound in associate register is called

Ans. Bit ratio


11. Expand MODEM

Ans. Modulator and Demodulator


12. RDBMS file system can be defined as

Ans. Interrelated


13. Super Key is

Ans. Primary key and Attribute


14. Windows 95 supports

(a) Multiuser
(b) n tasks
(c) Both
(d) None

Ans. (a)


15.The difference between printf and fprintf is ?


16. To change permission r&w to owner group to no permission to others

(a) chmod 614
(b) chmod 604
(c) chmod 640
(d) chmod 310



Other important topics
Pipeline Architecture
LAPB protocol

.In the command scanf, h is used for

Ans. Short int


2.A process is defined as

Ans. Program in execution


3.A thread is

Ans. Detachable unit of executable code)


4.What is the advantage of Win NT over Win 95

Ans. Robust and secure


5.How is memory management done in Win95

Ans. Through paging and segmentation


6.What is meant by polymorphism

Ans. Redfinition of a base class method in a derived class


7.What is the essential feature of inheritance

Ans. All properties of existing class are derived


8.What does the protocol FTP do

Ans. Transfer a file b/w stations with user authentification


9.In the transport layer ,TCP is what type of protocol

Ans. Connection oriented

10.Why is a gateway used

Ans. To connect incompatible networks


11.How is linked list implemented

Ans. By referential structures


12.What method is used in Win95 in multitasking

Ans. Non preemptive check


13.What is meant by functional dependency


14.What is a semaphore

Ans. A method synchronization of multiple processes


15.What is the precedence order from high to low ,of the symbols ( ) ++ /

Ans.( ) , ++, /


16.Preorder of A*(B+C)/D-G

Ans.*+ABC/-DG

18. B-tree (failure nodes at same level)


19. Dense index (index record appers for every search -key in file)


20.What is the efficiency of merge sort

Ans. O(n log n)


21.A program on swaping ( 10,5 )was given (candidate cannot recollect)


22.In which layer are routers used

Ans.In network layer


23.In which layer are packets formed ( in network layer )

24.heap ( priority queue )


25.copy constructor ( constant reference )


26.Which of the following sorting algorithem has average sorting behavior --
Bubble sort,merge sort,heap sort,exchange sort

Ans. Heap sort


27.In binary search tree which traversal is used for getting ascending order values--Inorder ,post order,preorder

Ans.Inorder


28.What are device drivers used for

Ans.To provide software for enabling the hardware


29. Irrevalent to unix command ( getty)


30.What is fork command in unix

Ans. System call used to create process


31.What is make command in unix

Ans. Used forcreation of more than one file


32.In unix .profile contains

Ans. Start up program


33.In unix echo is used for ( answer C)


34.In unix 'ls 'stores contents in

Ans.inode block


Only three unix questions were there


1) socket() is a

answer: a) system call

2) two types of pipeline in unix one is formatted and other one is

highlevel
middle level
lowlevel
none ( i don't answer for this question pls check it out)

RDBMS

1 CAN foreign key have null values??
answer: YES

2 IN RDbms SORTING IS PERFORMED IN
ANSWER: TEMP

3. SIMILIAR TYPE QUESTION EXACTLY I DON'T REMEMBER BUT IT GOES LIKE THIS

MINIMUM REQUIREMENT FOR RDBMS

ANSWER IS SYSTEM

1.In the command scanf, h is used for

Ans. Short int


2.A process is defined as

Ans. Program in execution


3.A thread is

Ans. Detachable unit of executable code)


4.What is the advantage of Win NT over Win 95

Ans. Robust and secure


5.How is memory management done in Win95

Ans. Through paging and segmentation


6.What is meant by polymorphism

Ans. Redfinition of a base class method in a derived class


7.What is the essential feature of inheritance

Ans. All properties of existing class are derived


8.What does the protocol FTP do

Ans. Transfer a file b/w stations with user authentification


9.In the transport layer ,TCP is what type of protocol

Ans. Connection oriented


10.Why is a gateway used

Ans. To connect incompatible networks


11.How is linked list implemented

Ans. By referential structures


12.What method is used in Win95 in multitasking

Ans. Non preemptive check


13.What is meant by functional dependency


14.What is a semaphore

Ans. A method synchronization of multiple processes


15.What is the precedence order from high to low ,of the symbols ( ) ++ /

Ans.( ) , ++, /


16.Preorder of A*(B+C)/D-G

Ans.*+ABC/-DG

18. B-tree (failure nodes at same level)


19. Dense index (index record appers for every search -key in file)


20.What is the efficiency of merge sort

Ans. O(n log n)


21.A program on swaping ( 10,5 )was given (candidate cannot recollect)


22.In which layer are routers used

Ans.In network layer


23.In which layer are packets formed ( in network layer )

24.heap ( priority queue )


25.copy constructor ( constant reference )


26.Which of the following sorting algorithem has average sorting behavior --
Bubble sort,merge sort,heap sort,exchange sort

Ans. Heap sort


27.In binary search tree which traversal is used for getting ascending order values--Inorder ,post order,preorder

Ans.Inorder


28.What are device drivers used for

Ans.To provide software for enabling the hardware


29. Irrevalent to unix command ( getty)


30.What is fork command in unix

Ans. System call used to create process


31.What is make command in unix

Ans. Used forcreation of more than one file


32.In unix .profile contains

Ans. Start up program


33.In unix echo is used for ( answer C)


34.In unix 'ls 'stores contents in

Ans.inode block


1. Convert 251 in base 10 to octal(base 8)?

2. How much information can be stored in 1 byte of a IBM pc compatible?

3.What is the language used for Artificial Intelligence
Ans: lisp

4. Swap two variables without using temporary variable
Ans: a= a+b; b= a-b; a= a-b:
5.Which is not the operating system ?
Ans: BIOS

6. What is the optimum number of operations for 2x3 + 3x2 + 5x + 5?

7. In the fortran language which of the following is true.
(i) fortran uses call by value
(ii) fortran is object oriented
(iii) fortran allows use of function overloading

Ans. (i)
8. When a program is compiled what does it produce?
Ans: Source code is converted to object code

9. What is the difference between function overloading and function overriding?

10. What is the character set used in JAVA 2.0 ?
Ans: Unicode
1. Which of the following involves context switch,
(a) system call
(b) priviliged instruction
(c) floating poitnt exception
(d) all the above
(e) none of the above
Ans: (a)

2. In OST, terminal emulation is done in
(a) sessions layer
(b) application layer
(c) presentation layer
(d) transport layer
Ans: (b)

3. For a 25MHz processor , what is the time taken by the instruction which needs 3 clock cycles,
(a)120 nano secs
(b)120 micro secs
(c)75 nano secs
(d)75 micro secs

4. For 1 MB memory, the number of address lines required,
(a)11
(b)16
(c)22
(d) 24
Ans. (b)

5. Semaphore is used for
(a) synchronization
(b) dead-lock avoidence
(c) box
(d) none
Ans. (a)

6. Which holds true for the following statement
class c: public A, public B
a) 2 member in class A, B should not have same name
b) 2 member in class A, C should not have same name
c) both
d) none
Ans. (a)

7. Question related to java

8. OLE is used in
a) inter connection in unix
b) interconnection in WINDOWS
c) interconnection in WINDOWS NT

9. Convert a given HEX number to OCTAL

10. Macros and function are related in what aspect?
(a)recursion
(b)varying no of arguments
(c)hypochecking
(d)type declaration

11.Preproconia.. does not do which one of the following
(a) macro
(b) conditional compliclation
(c) in type checking
(d) including load file
Ans. (c)

12. Piggy backing is a technique for
a) Flow control
b) Sequence
c) Acknowledgement
d) retransmition
Ans. (c)

13. In signed magnitude notation what is the minimum value that can be represented with 8 bits
(a) -128
(b) -255
(c) -127
(d) 0

14. There is an employer table with key fields as employer number data
in every n'th row are needed for a simple following queries will get required results.
(a) select A employee number from employee A , where exists from employee B where A employee no. >= B
employee having (count(*) mod n)=0
(b) select employee number from employe A, employe B where A employe number>=B employ number
group by employee number having(count(*) mod n=0 )
(c) both (a) &a

1. Find the probability of getting a number with 7 between 100 and 999 (both inclusive).

2. There are 10 items in a box, out of which 3 are defective.
2 balls are taken one after the other.
What is the probability that both of them are defective?

3. Context free grammar is accepted by
a) finite automata
b) push down automata
c) two way bounded automata
d) both b and c

4. Which is not a memory management scheme?
a) buddy system
b) swapping
c) monitors
d) paging
Ans : c

5. Simplify the Karnaugh map given below and derive its expression in SOP form
- 1 1 -
1 - - 1
1 - - 1
- 1 1 -

6. Question on NAND gates implementation.

7. Definition of Context Sensitive Grammar

8. An identifier can start with a letter followed by any number of letter or digits .

9. With the following configuration:
8MB total memory, 256kb cache , 4kb is block size.
Using direct mapping, how many different physical memory blocks can be mapped on to the cache.
(a) 64 (b) 256 (c) 128

10. CSMA/CD is used in
a) token ring
b) FDDI
c) ethernet

11. In TCP/IP header, checksum contains
a) sum of all the words
b) ones complement of the data
c) ones complement of the sum of all the words
d) ones complement of the sum in ones complement

12. What is the maximum number of acknowledgements for a 4 bit sequence number in a sliding window protocol.

13. Which is a good way of representing varaibles in recursion
a) local variables
b) static varaibles
c) global variables

14. Given the following c program
func()
{
static int i = 10;
printf("%d",i);
i++;
}
What is the value of i if the function is called twice ?

15. Given the following c program
func(int *i, int*j)
{*i=*i * *i;
*j=*j* *j;
}
main()
{ int i = 5, j = 2;
func(&i,&j);
printf("%d %d", i, j);}
What is the output?

16. Given page table, page size and offset find the corresponding physical address ?

17. In a memory chip 4k size and 16bit words are to be stored.
No of address and data lines required is:

18. Identify in which pass of the 2 pass compiler are the following compiled
1) literals
2) address resolution
3) listing

19. Object code does not require
a) relocation bits
b) external names and place where they are located
c) absolute adress
d) all the object codes

20. ARP is in reference to
a) MAC to IP
b) IP to MAC

21. Question on Balanced tree -
A balanced tree is given and a node is addded at the leaf.
Find the no of unbalanced nodes?

22. What is the order of Hashing time:
a) 0(1)
b) 0(n2)

23. Given that:
s -> s + s ; s -> s * s ; s -> a
Find the no of parse trees for a+a*a+a
a) 4
b) 5
c) 6
d) 7

24. Order of deleting a node from a linked list.
(pointer is to an arbitrary node)
a)0(1)
b)0(n)

25. A choclate of size nXn is given and is to be made into pices of size 1x1.
At a time both horizontal and a vertical cut is done.
Find the order of complexity
a) O(n2)
b) O(nlogn)
c) O(logn)

26. A directed graph is represented by adjacency list.
To find the complexity of indegree of the node. e - edge n- vertices

27) No of leaf nodes given. find the no of nodes with degree 2.

28) AX = B.
A is mXn and B is mX1
a) there is a unique solution if rank of A is same as rank of augumented matrix [A b]
b) there are multiple solutions

29. LXI sp,2099h
LXI b, 2012h
PUSH b

30. A and B are sets.
A's cardinality is m and B's is n where m < n
How many one to one mappings can be obtained.
a) n ^ m
b) npm
c) mpn
d) mcn

31. In scheduling algorithnms which are logically executed but suspended
a) preemptive
b) SJF
c)non preemptive
d) all the above

32. I/O redirection is
a) copying programs files through a pipe
b) input files are created
c) input file taken from existing ones
d) none

33. Symmetric multiprocessing can be done in
a) snoopy protocols
b) cache coherence

34. In the dining philosophers problems to avoid dead lock
a) 1 person will take left one and all other will take right one
b) adjacent persons should not eat concurrently

35. In the process state cycle, which is the correct order
a) timeout: ready -> running
b) blocked: ready -> running

36. For converting infix expression to postfix what do we require
a) operand stack
b) operator stack

37. 0 is reprented as both and negative and positive in
a) ones complement
b) twos complement
c) two's complement has extra negative number

38. What is the difference between c and c++?
a)In c++ we can define variables in the middle
b)dynamic scoping

39. Which of the following is correct
a) Synchronous tranmission needs more badwidth than Asychronous.
b) Inasychronous transmission , the time is associated with data itself.....
1. There was a circuit given using three nand gates with two inputs and one output.
Find the output.
a) OR
b) AND
c) XOR
d) NOT
Ans. (a)

2. Suggest a sorting algorithm which is efficient (in worst case) to 10 values
a) Binary tree
b) Selection
c) Bubble
d) Any of the above

3. What is the number of comparisons in the worst case to merge two sorted lists containing n elements each.
a) 2n
b) 2n-1
c) 2n+1
d) 2n-2

4.Iintegrated check value(ICV) are used as:
Ans. The client computes the ICV and then compares it with the senders value.

5. Question on client-server system using asychronous request from the client
6. If a binary tree is constructed using nodes with two pointers each,
how many null pointers does a tree with N nodes have
a) n-1
b) n
c) n+1
d) Depends on the number of edges

7. Which of following statements about heap is wrong
a) An n element heap has height log n(base of log is 2)
b) Smallest element of heap is always a leaf
c) A array in reverse sorted order is a heap
d) A heap can't contain any element more than once

8. When applets are downloaded from web sites , a byte verifier performs _________?
Ans. Status check.

9. For the following C program
void insert(key,r)
typekey key,data array r;
{extern int n;
if(n>=max) /*error table if full */
else r[n++].k=key;
}
This on executing, enables a
a) Basic sequential search
b) Binary search
c) Interpolation search
d) None

10. Find the outpur of the following C program
void f(char *p)
{p=(char *) malloc(6);
strcpy(p,"hello");
}
void main( )
{char *P="bye";
f(p);
printf("%s',p);
}

11. Time taken to access cache is 100ns and to access memory is 1000ns.
Hit ratio given. Find the average access time

12. Path testing is
a) Black box testing strategy
b) White box testing strategy
c) An installation .........
d) An enviornment

13. X:verification' asks are we building the right product
Y:validation' asks are we building the product right

14. Which one of the following can't be used to find an internet address given the domain name
a) /etc/host
b) NIS yellow pages
c) DNS
d) ARP
15. Flow control is necessary for the transport protocol layer due to the following reasons
a) Unreliable link
b) Congestion at receiver
c) Packets out of sequence
d) None of these

16. In public key encryption, if A wants to send a message to B so that no one else can read the message
then A encrypts the message using
a) A's public key
b) A's private key
c) B's public key
d) B's private key

17. Which of the following is not condition having a deadlock resource previous granted
can be forcebly taken away from a process
a) Resources need to be used in mutually exclusion fashion
b) Process can request new resources, as they continue to hold on to old ones
c) Here is a cycle in the resource allocation graph

16. An IP/IPX packet received by a computer using... having IP/IPX both how the packet is handled.
Ans. Read the, field in the packet header with to send IP or IPX protocol.

17. The range of the 32 bit number in two's complement form is _______

18. Cyclomatic complexity
{if((x=0) or (y=0))
p=0;
else
{p=x;i=1;
while(i!=y)
{p=p+x;
i=i+1; }
}
}

19. Activation record will contain the
a) Storage for simple names
b) Information about attributes for local names
c) Return address
d) All of the above

20. Global static variable within a file is intended to
a) Localize swap
b) Retain value persistently
c) Define constant
d) Fixed address in memory

21. Why is thread switch faster than a process switch

22. What is the binary equivalent of 41.6875

23. Checkpoint value will be calculated in

24. DHCP is used for
a) IP address allocation
b)dynamic host configuration protocol

25. For the following C program
int x(char *a)
{a=(char *) malloc(10*sizeof(char));
*a="hello";
}
main()
{char *a="new";
x(a);
printf("%s",a);
}
The output is
a) Hello
b) New
c) Hello new
d) Run time error



Technical Section

Q. You are creating a Index on EMPNO column in the EMPLOYEE table. Which statement will you use?
a) CREATE INdEX emp_empno_idx ON employee, empno;
b) CREATE INdEX emp_empno_idx FOR employee, empno;
c) CREATE INdEX emp_empno_idx ON employee(empno);
d) CREATE emp_empno_idx INdEX ON employee(empno);

Ans. c

Q. Which program construct must return a value?
a) Package
b) Function
c) Anonymous block
d) Stored Procedure
e) Application Procedure

Ans. b

Q. Which Statement would you use to remove the EMPLOYEE_Id_PK PRIMARY KEY constraint and all depending constraints fromthe EMPLOYEE table?
a) ALTER TABLE employee dROP PRIMARY KEY CASCAdE;
b) ALTER TABLE employee dELETE PRIMARY KEY CASCAdE;
c) MOdIFY TABLE employee dROP CONSTRAINT employee_id_pk CASCAdE;
d) ALTER TABLE employee dROP PRIMARY KEY employee_id_pk CASCAdE;
e) MOdIFY TABLE employee dELETE PRIMARY KEY employee_id_pk CASCAdE;

Ans. a

Q. Which three commands cause a transaction to end? (Chosse three)
a) ALTER
b) GRANT
c) DELETE
d) INSERT
e) UPdATE
f) ROLLBACK
Ans. a ,b ,f
Q. Under which circumstance should you create an index on a table?
a) The table is small.
b) The table is updated frequently.
c) A columns values are static and contain a narrow range of values
d) Two columns are consistently used in the WHERE clause join condition of SELECT
statements.

Ans.d
Q. What is the common standard naming convention of checkbox control?

a) CHB
b) CHK
c) CHX
d) CBX


Q. Which of the function returns a reference to an object provided by an ActiveX component.

a) createobject
b) getobjectname
c) createobjectx
d) getobject
Q. We have something like Global functions in JAVA, they are called as .....

a) class
b) package
c) file
d) include


Q. Which all OS supports Networking?

a) Windows 95
b) Linux
c) Windows 3.0
d) Unix


Q. Which of the following is not an RdBMS?

a) Ingres
b) Oracle
c) Unify
d) Clipper


Q. Shell function in VB is used for calling

a) Another Function
b) Another Procedure
c) Another Application
d) None


Q. The RdBMS which satisfies the most number of its Principle among the followings

a) MS SqlServer
b) Oracle 7.3
c) Informix
d) Sybase
Q. Normalization is considered to be complete when it is in

a) Second Form
b) Third Form
c) First Form
d) None


Q. Two databases can be connected with

a) Where Clause
b) creating link
c) using dbo.
d) Both B & C


Q. C++ is similar to that of C in following ways

a) C++ has classes
b) Supports Inheritance
c) File Handling
d) None


Q. Which of the following is not system file.

a) .ini
b) .sys
c) .com
d) None


Q. Following command is used to register any dll or ocx in registry of the system

a) regserver32
b) registersvr
c) regsrv32
d) regsvr32


Q. Which keyword is used to unregister any dll or ocx in registry of the system

a) -u
b) -r
c) -d
d) -x


Q. Which is not the most important & widely used form of Normalization ?

a) Boyce-Codd Normal Form
b) Second Form
c) Third Form
d) Royce-Codd Normal Form


Q. How can the word YES be stored in any array.

a)
array[1] = 'Y'
array[2] = 'E'
array[3] = 'S'
array[4] = '\0'
b)
array[0] = "Y"
array[1] = "E"
array[2] = "S"
array[3] = "\0"
c)
array[1] = "Y"
array[2] = "E"
array[3] = "S"
d)
array[0] = 'Y'
array[1] = 'E'
array[2] = 'S'
array[3] = '\0'
Q. Which of the following keyword is used to exit unconditionally from the batch?

a) go
b) return
c) Begin & End
d) Commit Tran


Q. != is a ---------- operator.

a) relational
b) logical
c) String
d) arithmetic


Q. What was the first name given to Java Programming Language.

a) Oak - Java
b) Small Talk
c) Oak
d) None

Ans.a


Q. The syntax of Java is similar to that of

a) C
b) Small Talk
c) FORTRAN
d) C++


Q. Which of the following statement is true

Table in a database can have
a) One Non-Clustered Index and Many Clustered Indexes.
b) One Clustered Index and Many Non-Clustered Indexes.
c) One Index each of Clustered and Non-Clustered Index.
d) None


Q. Check the error in the following statement

Country[7] = 'CANADA'

a) A string terminator is not added to the string, when declared.
b) Country array should be of six
c) Canada should be specified in double quotes.
d) Country array should have the keyword char to ensure array type.


Q. An application updates table "A",which causes trigger T1 to fire. T1 updates table "B", which in turns fires trigger T2. T2 updates table "A", which causes trigger T1 to fire again. This is an example of

a) Indirect Recursive Trigger
b) direct Recursive Trigger
c) Multiple Trigger
d) Non Recursive Trigger


Q. Linda wants to obtain the nearest integer of a numeric expression for some calculation purpose. Which mathematical function will she use:

a) Round
b) ABS
c) About
d) None


Q. Alphanumeric constants are

a) used for arithmetic calculations
b) Used with double quotas
c) Of integer type or float type
d) Not used for arithmetic calculations


Q. Pseudocode is a

a) set of Instructions to perform a particular task
b) is a formalized graphic representation of program logic.
c) is a algorithm expressed in a simple language
d) Both A & C


Q. A company has closed down its advertisement dept and is now getting all advertisement done by an Ad-Agency. All 20 people working in the dept has quit the job. The dept to which an employee belonged was stored in the "cdept" attribute of "emp" table. Which of the following statement would be used to do the changes in the "emp" table

a) Alter Table
b) Drop Table
c) Delete Table
d) Truncate Table


Q. John wants to retrieve all records from students table who live in any city beginning with WAS . Which of the following statement is to be executed by him

a) Select * from students where city = 'WAS'
b) Select * from students where city = 'WAS%'
c) Select * from students where city in 'WAS'
d) Select * from students where city like 'WAS%'


Q. Why is a Modulo operator used?

a) It is used to determined the remainder, when an integer is divided by another.
b) It is used to calculate the percentage
c) It is used to determine the factorial of a number.
d) It is used as a relational operator.


Q. Consider the following program:

character cName[5] = 'great'
Numeric nNum1,nNum2 =0

For (nNum1 = 0;nNum1=>5;nNum1++)
{
if(cName[nNum1] == 'a'| cName[nNum1] != 'e'| cName[nNum1] == 'i'| cName[nNum1] != 'o'| cName[nNum1] == 'u'|)
{
nNum2 ++
}
}
display nNum2

What does nNum2 display.

a) 2
b) 1
c) 5
d) 3


1.1 Where can I find the latest version of the FAQ ?

It's posted once a month to comp.lang.objective-c, comp.answers and
news.answers. It is archived at
ftp://rtfm.mit.edu/pub/faqs/computer-lang/Objective-C/faq.

2. Objective-C Compiler Commands

2.1 What's the file suffix for Objective-C source ?

It's .m for implementation files, and .h for header files. Objective-C
compilers usually also accept .c as a suffix, but compile those files
in plain C mode.

2.2 How do I compile .m files with the Stepstone compiler ?

objcc -c class.m
objcc -o class class.o

See http://www.stepstn.com for more information.

2.3 How do I compile .m files with the Apple compiler ?

cc -c class.m
cc -o class class.o

See http://www.apple.com/ for more information.

2.4 How do I compile .m files with the GNU C compiler ?

gcc -c class.m
gcc -o class class.o -lobjc -lpthread

See http://www.gnu.org/ for more information.

2.5 How do I compile .m files with the POC ?

objc -c class.m
objc -o class class.o

See http://metalab.unc.edu/pub/Linux/devel/lang/objc/ for more
information.

3. Objective-C preprocessor issues

3.1 What's the syntax for comments ?

The Objective-C preprocessor usually supports two styles of comments :

// this is a BCPL-style comment (extends to end of line)

and

/* this is a C-style comment */

3.2 How do I include the root class ?

On Stepstone and the POC, the header file to include is :



On GNU cc and Apple cc, it's :



The root class is located in a directory called runtime for the
Stepstone compiler, and in a directory called objcrt for the POC, but
because of implicit -I options passed on to the preprocessor, these
locations are automatically searched.

3.3 What is #import ?

It's a C preprocessor construct to avoid multiple inclusions of the
same file.

#import

is an alternative to

#include

where the .h file is protected itself against multiple inclusions :

#ifndef _OBJECT_H_
...
#define _OBJECT_H_
#endif

3.4 Why am I lectured about using #import ?

The GNU Objective-C compiler emits a warning when you use #import
because some people find using #import poor style. You can turn off
the warning by using the -Wno-import option, you could modify the
compiler source code and set the variable warn_import (in the file
cccp.c) or you could convert your code to use pairs of #ifndef and
#endif, as shown above, which makes your code work with all compilers.

4. Object datatype (id)

4.1 What is id ?

It's a generic C type that Objective-C uses for an arbitrary object.
For example, a static function that takes one object as argument and
returns an object, could be declared as :

static id myfunction(id argument) { ... }

4.2 What is the difference between self and super ?

self is a variable that refers to the object that received a message
in a method implementation. super refers to the same variable, but
directs the compiler to use a method implementation from the
superclass.

Using pseudo-code, where copy (from super) is the syntax for the copy
implementation of the superclass, the following are equivalent :

myObject = [super copy];

and,

myObject = [self copy (from super)]; // pseudo-code

4.3 What is @defs() ?

It's a compiler directive to get access to the internal memory layout
of instances of a particular class.

typedef struct { @defs(MyClass) } *TMyClass;

defines a C-type TMyClass with a memory layout that is the same as
that of MyClass instances.

5. Message selectors (SEL)

5.1 What is a SEL ?

It's the C type of a message selector; it's often defined as a
(uniqued) string of characters (the name of the method, including
colons), but not all compilers define the type as such.

5.2 What is perform: doing ?

perform: is a message to send a message, identified by its message
selector (SEL), to an object.

5.3 How do I know the SEL of a given method ?

If the name of the method is known at compile time, use @selector :

[myObject perform:@selector(close)];

At runtime, you can lookup the selector by a runtime function that
takes the name of the message as argument, as in :

SEL mySel = selUid(name); // for Stepstone
SEL mySel = sel_getUid(name); // for Apple
SEL mySel = sel_get_any_uid(name); // for GNU Objective C
SEL mySel = selUid(name); // for POC

6. Implementation pointers (IMP)

6.1 What is an IMP ?

It's the C type of a method implementation pointer, a function pointer
to the function that implements an Objective-C method. It is defined
to return id and takes two hidden arguments, self and _cmd :

typedef id (*IMP)(id self,SEL _cmd,...);

6.2 How do I get an IMP given a SEL ?

This can be done by sending a methodFor: message :

IMP myImp = [myObject methodFor:mySel];

6.3 How do I send a message given an IMP ?

By dereferencing the function pointer. The following are all
equivalent :

[myObject myMessage];

or

IMP myImp = [myObject methodFor:@selector(myMessage)];
myImp(myObject,@selector(myMessage));

or

[myObject perform:@selector(myMessage)];

6.4 How can I use IMP for methods returning double ?

For methods that return a C type such as double instead of id, the IMP
function pointer is casted from pointer to a function returning id to
pointer to a function returning double :

double aDouble = ((double (*) (id,SEL))myImp)(self,_cmd);

6.5 Can I use perform: for a message returning double ?

No. The method perform: is for sending messages returning id without
any other argument. Use perform:with: if the message returns id and
takes one argument. Use methodFor: for the general case of any number
of arguments and any return type.

7. Copying objects

7.1 What's the difference between copy and deepCopy ?

copy is intented to make a bytecopy of the object, sharing pointers
with the original, and can be overridden to copy additional memory.
deepCopy is intented to make a copy that doesn't share pointers with
the original. A deep copy of an object contains copies of its instance
variables, while a plain copy is normally just a copy at the first
level.

8. Objective-C and C++

8.1 How can I link a C++ library into an Objective-C program ?

You have two options : either use the Apple compiler or use the POC.
The former accepts a mix of C++ and Objective-C syntax (called
Objective-C++), the latter compiles Objective-C into C and then
compiles the intermediate code with a C++ compiler. See the compiler
specific questions for more information.

9. Messages

9.1 How do I make a static method ?

Methods are always implemented in Objective-C as static functions. The
only way to obtain the IMP (implementation pointer) of a method is
through the runtime (via methodFor: and friends), because the function
itself is static to the file that implements the method.

9.2 How do I prevent an object from sending a given message ?

You can't. If your object responds to a message, any other class can
send this message. You could add an extra argument sender and check,
as in :

- mymethod:sender
{
if ([sender isKindOf:..]) ...
}

But this still requires cooperation of the sender, to use a correct
argument :

[anObject mymethod:self];

9.3 Do I have to recompile everything if I change the implementation of a
method ?

No, you only have to recompile the implementation of the method
itself. Files that only send that particular messages do not have to
be recompiled because Objective-C has dynamic binding.

10. Instance and Class Variables

10.1 Do I have to recompile everything if I change instance variables of a
class ?

You have to recompile that class, all of its subclasses, and those
files that use @defs() or use direct access to the instance variables
of that class. In short, using @defs() to access instance variables,
or accessing instance variables through subclassing, breaks the
encapsulation that the Objective-C runtime normally provides for all
other files (the files that you do not have to recompile).

11. Objective-C and X-Windows

11.1 How do I include X Intrinsics headers into an Objective-C file ?

To avoid a conflict between Objective-C's Object and the X11/Object,
do the following :

#include
#define Object XtObject
#include
#include
#undef Object

12. Stepstone Specific Questions

12.1 How do I allocate an object on the stack ?

To allocate an instance of 'MyClass' on the stack :

MyClass aClass = [MyClass new];

13. GNU Objective-C Specific Questions

13.1 Why do I get a 'floating point exception' ?

This used to happen on some platforms and is described at
ftp://ftp.ics.ele.tue.nl/pub/users/tiggr/objc/README.387. A solution
was to add -lieee to the command line, so that an invalid floating
point operation in the runtime did not send a signal. DJGPP users can
consult http://www.delorie.com/djgpp/v2faq/. AIX users may want to
consult http://world.std.com/~gsk/oc-rs6000-problems.html. In some
cases, you can fix the problem by upgrading to a more recent version
of the GNU Objective-C runtime and/or compiler.

14. Apple Objective-C Specific Questions

14.1 What's the class of a constant string ?

It's an NXConstantString.

NXConstantString *myString = @"my string";

14.2 How can I link a C++ library into an Objective-C program ?

c++ -c file.m
c++ file.o -lcpluslib -o myprogram

15. Portable Object Compiler Objective-C Specific Questions

15.1 What's the syntax for class variables ?

List the class variables after the instance variables, and group them
together in the same way as instance variables, as follows :

@implementation MyClass : Object { id ivar1; int ivar2; } : { id cvar1; }
@end

15.2 How do I forward messages ?

You have to implement doesNotUnderstand: to send a sentTo: message.

- doesNotUnderstand:aMsg
{
return [aMsg sentTo:aProxy];
}

15.3 How can I link a C++ library into an Objective-C program ?

objc -c -cplus file.m
objc -cplus file.o -lcpluslib -o myprogram

16. Books and further reading

16.1 Object-Oriented Programming : An Evolutionary Approach, 2nd Ed.

Brad Cox & Andy Novobilski, ISBN 0201548348.

16.2 An Introduction To Object-Oriented Programming, 2nd Ed.

Timothy Budd, ISBN 0201824191

16.3 Objective-C : Object-Oriented Programming Techniques

Pinson, Lewis J. / Wiener, Richard S., ISBN 0201508281

16.4 Applications of Object-Oriented Programming; C++ SmallTalk Actor
Objective-C Object PASCAL

Pinson, Lewis J. / Wiener, Richard S., ISBN 0201503697
_________________________________________________________________


PAPER 2--GENERAL AWARENESS
1. Who is the father of computers
2. Expand HTML,DMA,FAT,LAN,WAN,FDDetc
3. Which was intel's first microprocessor
4. Convert 1024 (in decimal) to octa and hexadecimal form
5. First microprocessor was
(a) 8085
(b) 8088
(c) 8086
(d) 80487

6. Give the name of a processor produced by mortorola?
7. What is the full form of WindowsNT ?
8. What is the difference between 8087 and 8086
BESIDES THIS QUESTIONS WERE ALSO BASED ON IBM PC CLONES, BASIC QUESTIONS ON GUI
SIMPLE PROGRAMS LIKE FINDING FACTORIALS, LARGEST OF THREE NUMBERS ETC. HAVE ALSO BEEN ASKED IN THE PAST

1. Add 79H and 86H and tell the contents of flags
2. Scr is used for _____ ( ac, dc , both )
3. Push pull amplifier is used to remove which harmonics ( even , odd , both )
4. PAM is demodulated using ___ ( low pass filter , high pass filter )
5. 16k memory is needed. How many chips with 12 address buses and 4 data
buses are needed.
6. AM wave is detected using _________ detector
7. Which flip flop is used for shift registers
8. Program counter does what __ (stores a memory address, address of the present instruction)
9. In a bistable multivibrator communication capacitor is used for ______ ( speed up response , ac coupling)
10. Totem pole is what?
11. Time constant for an integrator and differentiator should be ( small , high etc.)
12.TV waves are __ ( sky waves , space waves etc.)
13.Which configuration has highest i/p imp. ( ce , cb , cc )
14. Parabolic antenna with 2degree angle. What is its directivity.
15. Given 10 mhz pe modulation and we got a 100 mhz band.
How many channels can be there.
16. If o/p power is doubled by how much does the sound increase ( 1db,2db,3db )


24.socket() is a
1.system call ans
2. library function
3.both
4. none
25.in c++ there were conceptual ques on virtual
functions , operator overloading etc.
in section B some ques were as follows
1.in microprocessor over clocking will result in
1.overheating
2.malfunctioning
ans(check)
3.life would be half

26.cache is
1.ROM
2.RAM ans
3.PRAM
4.EPRAM
27.how can pass an array to a fns.
1.desgin(**a)
2.desgin (*a)
3.dasgien(&a[0]);

28.unix has pipelining fromatted &
a.high level
b.low "
c.mid level
d. none "
29. task switching is
1.process switching
4.all of the above ans

30.thread arev ans .light weight
process+(c).......................

31. virual fns are defined as ................

32. which is not bus interface
a.pci
b. ide
c.age
d. none

33. switch statement use only
a.char
b.int
c.both
d.all of the above

10. multiple inheritence can not be used in a
case.......................................?

11. what is difference b/w simple SQDL & Object
oriented SQDL.

12. Virtual Destructor is
used...........................

13. question on two pass assembler
..........................

14. link list uses
a.countiguos memory allocation
b. non coun. " "
c. both
d. none

15. non linear structure
a. q & stack
ans:- b.tree & graph
c. tree & stack
d. tree & linklist

16. encryption is
ans a. change readable code to cipher text
b.none
c.
d.

17. sizeof () operator is used for
a.data type
b. data type & veriable
ans c. both
d.none

18. deadlock condition
ans. no process knows exactly that both are
waiting for each other.

19.static
ans:- it's initial value is one --- not true
20.
new can be overloaded ------ true
21.
virtual function------- ans a and c
means no code and forceful inheritance
22. for(;;)
ans:- infinite loop

0 comments: