Tuesday, April 30, 2019

Most frequently asked questions series 6

1) C++: Which of the following keywords allows the method resolution at run time?
a. abstract
b. override
c. virtual
d. None of the above.

2) OS: If the disk head is located initially at 32, find the number of disk moves required with FCFS if the disk queue of I/O blocks requests are 98, 37, 14, 124, 65, 70.
a. 320
b. 321
c. 324
d. None of the above

3) OS: Which scheduler performs the "swapping out" or "swapping in"?
a. Long-term scheduling
b. Medium-term scheduling
c. Short-term scheduling
d. None of the above.

4) Evaluate the postfix expression 3574-2^*+
a. 41
b. 45
c. 48
d. None of the above.

5) Which OSI layer is responsible for delivery of data packets from source to destination?
a. Transport layer.
b. Network layer.
c. Data layer.
d. None of the above.

Answers:
1) d
2) c
3) b
4) c
5) b

Friday, April 26, 2019

Most frequently asked questions series 5

1) The C language is.
a. A context sensitive language
b. A regular language
c. A context free language
d. None of the above.

2) If a binary tree has height 10 then what is the maximum number of nodes in that tree?
a. 1000
b. 1023
c. 1024
d. 1002

3) The search time in hashing is
a. O(n)
b. O(logn)
c. O(nlogn)
d. O(1)

4) From the given below options, which has the unit as bits/second
a. Propagation speed
b. Propagation time
c. Throughput
d. None of the above.

5)  If the maximum amplitude of a sine wave is 4 units, then minimum amplitude is.
a. 4
b. 2
c. 3
d. -4

6) Which of the following is/are channelization protocol?
a. FDMA (Frequency-Division Multiple Access)
b. TDMA (Time-Division Multiple Access)
c. CDMA (Code-Division Multiple Access)
d. All of the above

Answers

1) c
2) b
3) d
4) c
5) d
6) d

Thursday, April 25, 2019

Most frequently asked questions series 4

1) From the following which of the statement is true
a. Any procedure cannot raise an error and return a system message and error number
b. Error numbers ranging from 20000 to 20999 are system defined error messages
c. Oracle checks uniqueness of user defined messages
d. The Raise_Application_Error is used for raising user defined error messages

2)Which tag can be used to insert a horizontal line on a web page?
a. < hr>
b. < br>
c. < line>
d. < line direction = “horizontal”>

3) Trace the output.
void main()
{
printf("%d",-5%3);
}
a. 1
b. 2
c. -2
d. 2.5

4) Which of the following operation can be applied to pointer variable?
a. Multiplication
b. Division.
c. Addition.
d. All of the above.

5) Interrupts which are initiated by an instruction are
a. Internal
b. External
c. Hardware
d. Software

6) Where does a computer add and compare data?
a. Hard disk
b. Floppy disk
c. CPU chip
d. Memory chip

7) The number of possible binary trees with 5 nodes is.
a. 40
b. 41
c. 42
d. 32

8) Bandwidth can be described as:
a. The range of frequencies in a composite signal.
b. The range of frequencies that a channel can pass.
c. The number of bits per second that a channel can transmit.
d. All of the above.

Answers

1) d
2) a
3) c
4) c
5) d
6) c
7) c
8) d

Wednesday, April 24, 2019

Most Frequently asked questions Series 3

1) If you want to align text to the right side of an block element in a cascading style sheet (CSS) then which of the following property would you use?

a. Right align
b. Justify
c. Left align
d. Text align


2) See the following C declaration
struct v

     int n;
     float a;
}
struct v * x[10];
        
Define x as

a. An array which has the same name as a program name
b. A structure with 10 elments in it
c. An array, where each element is a pointer to a structure of type node
d. A structure of 3 fields and an array of 10 elements


3) Which is the major data structure used in RDBMS?
a. Trees
b. Stacks
c. Graph 
d. Array


4)  Which is the final form of testing used in the COTS software?
a. Beta testing
b. Module testing
c. Integration testing
d. Unit testing


5) From the following ________ is a type of abstraction?
a. Data
b. Design
c. Testing
d. All of the above


6) Which of the following is of importance in a software development life cycle?
a. Planning
b. Designing
c. Testing
d. Requirement gathering


7) From the following statements which one is not a valid deadlock prevention scheme?
a. Number the resources uniquely and never request a lower numbered resource than the last one
b. Release all the resources before requesting for a new resource
c. Request all the resources before execution
d. Never request a resource after releasing any resources


8) What is page cannibalizing?
a. Page swapping or Page replacements
b. Adding timestamps to the page
c. Avoiding page replacements
d. All the above


9)  In which package do we have the gc() method?
a. java.lang package
b. java.util package
c. java.awt package
d. java.io package


10) For using JDBC applications which of the following driver is preferable and efficient?
a. Type 1 driver
b. Type 2 driver
c. Type 3 driver
d. Type 4 driver



Answers
1)    d
2)    c
3)    d
4)    a
5)    a
6)    a
7)    d
8)    a
9)    a
10)  d

Tuesday, April 23, 2019

Most Frequently asked questions series 2

1) Which of the following transport protocols uses UDP?

a. SMTP
b. Telnet
c. HTTP
d. DNS


2) Why are B+ trees preferred over binary trees in databases?

a. Disk capacities are greater than memory capacities
b. Disk access is much slower than memory access
c. Disk data transfer rates are much less than memory data transfer rates
d. Disks are more reliable than memory


3) Which system call results in the sending of the SYN Packets?

a. Socket
b. Connect
c. Bind
d. Listen


4) Which of the following objects can be used in expression and scriplets in JSP without explicitly declaring them?

a. Request and response only
b. Response and session only 
c. Session and request only
d. Session,request and response


5) From the following sorting algorithms which has the lowest worst case complexity?
a. Bubble sort
b. Quick sort
c. Merge sort
d. Selection sort

6) From the following sorting algorithms which algorithm needs the minimum number of swaps
a. Bubble sort
b. Quick sort
c. Merge sort
d. Selection sort

7)  Out of 4 distinct keys how many distinct primary keys can be created?
a. 5
b. 20
c. 45
d. 14

Answers

1) d
2) d
3) a
4) c
5) c
6) d
7) d