The selection process contains 3 Sections.
1.Aptitude Test(General Aptitude, C & OS Objective)
2.C Programming test & English Test (Grammar & Comprehension)
3.Technical & HR Interviews
1. main()
{ int i;
i=(2,3);
printf("%d",i);
}
a)2 b)3 c)Compiler error d)Syntax error.
ans : 3
2. main(){
char str[]="GESL";
printf("%d %d",sizeof(str),strlen(str));
}
a)5,5 b)4,4 c)5,4 d)4,5
ans: 5, 4
3. main(){ for(i=0;i++;i<100) printf("hello world\n"); }
a)100 times b)0 times c)Infinite loop d)None of the above.
ans: 0 times.
4. main(){ for(i=1;i++;i<100) printf("hello world\n"); }
a)100 times b)0 times c)Infinite loop d)None of the above.
ans: infinite loop
5. main(){ char c; scanf("%s",c); }
a)Compiler dependent b)unpredictable c)Compiler error d) scans the i/p.
ans: Compiler dependent.
6. main(){
int k=5;
for(++k<5 && k++/5 || ++k<8);
printf("%d\n",k);
}
a)5 b)6 c)7 d)8
ans: 7
7. main(){
int *ptr1,*ptr2;
ptr1=(int *)malloc(sizeof(int));
ptr2=func(20,10,ptr1);
printf("%d %d\n",*ptr1,*ptr2);
}
int *func(int a, int b, int *c)
{
int x=a+b;
*c=a-b;
return(&x);
}
a)Bug in the code. b)No Bugs prints correctly c)Error d) None of the above.
Ans: Bug in the code.
8). int main() {
int i = 10, j ;
if ( ( j = ~i ) < i )
printf ( "True" ) ;
else
printf ( "False" ) ;
}
a) True b) False c) Compiler Dependent d) None of the above.
ans : True
9. How many bytes are required to create a 3*3 matrix using double pointer
ans: 12
10. take int=4,float=8,char=1
main() {
FILE *fp;
printf("%d\n",sizeof(fp) );
}
a)2 b)4 c)Compiler dependent d)Error
Ans:4
11. main()
{
int a=10,20;
a^=b^=a^=b;
printf("%d\n %d\n",a,b);
a)a=20,b=10 b)a=10,b=20 c)Syntax error d)Unpredictable
Ans : a=20 b=10
12. main() {
int i=10;
switch(i) {
case 10: printf("Hello "); {
case 1 : printf("World ");
}
case 5: printf("Hello World ");
}
}
a) Hello b) Hello c) Hello World Hello World d) Syntax Error.
Ans : Hello World Hello World
13. main() {
char str1[]="Hello";
char str2[]="Hello";
if ( str1==str2 )
printf("True\n");
else
printf("False\n");
}
Ans: False.
a)True b)False c)Error d) Unpredictable.
14. main()
{
# include <stdio.h>
int i = 10 ;
printf("%d\n", i/2 );
}
a)10 b)5 c)error d) warning.
ans : 5
15. #include <stdio.h>
# pragma pack(2)
struct SIZE {
int i;
char ch ;
double db ;
} ;
main () {
printf ( "%d\n",sizeof(struct SIZE) );
}
a)12 b)14 c)16 d)8
1. What is the output of the following code ?
int main( )
{
for( ; ;);
printf("Hello\n");
return 0;
}
a. give compilation error
b. prints Hello infinite times
c. Runs in an infinite loop without printing anything.
d. prints Hello once.
Ans: c
2. Output of the code?
FUNC (int *p)
{
p = (int *)malloc(100);
printf("p:%x",p);
}
int main( )
{
int *ptr;
FUNC(ptr);
printf("Ptr:%x",ptr);
return 0;
}
a. Both printf statements prints same values.
b. Both print different values.
c. Gives compile time error.
d. Gives run time error.
Ans: b
3. Output of the code?
int main()
{
char a[] = "world";
printf("%d %d\n",strlen(a),sizeof(a));
return 0;
}
a. 5,5
b. 6,5
c. 5,6
d. 6,6
Ans: c
4. What is the output generated?
main()
{
char *s = "Hello";
printf("%s",1(s));
}
a. Hello
b. ello
c. e
d. none of these.
Ans: b
5. Interpret the given declaration
char ( * ( f ( ) ) [ ] )( )
a. f is a pointer to function returning char
b. f is a pointer to an array of function returning a char
c. Invalid declaration
d. f is a function returning pointer to array[] of pointer to function returning char.
Ans : d
Data Structure:
1. A binary tree of height h, h > 0 has
a. at least h and atmost 2*h-1 elements in it.
b. at least 2^h and atmost (2^h)+1 elementz in it.
c. at least 2^h -1 and atmost h^2 elements in it.
d. at least h and atmost (2^h) - 1 elements in it.
Ans: d
2. Thrashing is
a. flooding of pages in the memory.
b. increase in removal of pages from memory.
c. increase in page faults leading to decrease in CPU utilization.
d. removal of unused pages from memory making space for new ones.
Ans: c
3. Recursive Descent parser is a type of
a. Bottom up parser.
b. Top Down parser.
c. None of these.
d. Bottom down parser.
Ans: b
4. alloca() allocates memory from
a. Heap.
b. Reserved memory.
c. Data segment.
d. Stack.
Ans: d
5. What is the octal equivalent of decimal (5468).
a. 12360.
b. 12560.
c. None of these.
d. 12650.
Ans : c
1) The different stages of compilation are
a. preprocessor, compiler, assembler, loader, linker
b. preprocessor, compiler, assembler, linker, loader (ans)
c. preprocessor, assembler, compiler, linker, loader
d. preprocessor, compiler, linker, assembler, loader
2) Round Robin algorithm is used in
a. memory management
b. cpu scheduling (ans)
c. deadlock detection
d. none of the above
3) Multiprogramming is used
a. to maximize cpu utilization (ans)
b. to increase process execution time
c. to save memory
d. none of the above
4) Drawback in paging is
a. internal fragmentation (ans)
b. external fragmentation
c. both (a) and (b)
d. none of the above
5) Belady's Anomaly occurs in which page replacement algorithm?
a. fifo (ans)
b. lru
c. lfu
d. none
6) a relocatable code is
a) portable code
b) code generated for virtual address
c) ready to run anywhere in memory
d) both b & c (ans)
7) Memory management unit(MMU)
a) is software
b) hardware
c) both a & b (ans)
d) none
8) C is a
a) low level language
b) high level language
c) middle level language (ans)
d) portable language
9) symbol table used for
a)preprocessing
b)generating machine code
c)resolving external references
d)both b & c (ans)
e) none
10)dispatcher is used in
a)memory management
b)deadlock
c)scheduling (ans)
d)none
11) use of virtual memory
a) to support executables larger than memory size (ans)
b) to increase speed of execution
c) both
d) none
Computer Concepts
1 spooling is the acronym for
(a) simultaneous processors operation online
(b) simultaneous peripheral operation online
(c) simultaneous peripheral operation over line
(d) simultaneous processor online operation
Ans : (b)
2 Telnet is
(a) Application layer protocol
(b) Network Layer protocol
(c) used by Link Layer for sending frames
(d) None of the above
ans : (a)
3. socket in network programming is
(a) an electrical device
(b) IPC
(c) synchronization tool
(d) Network layer protocol
ans : (b)
4. DMA stands for
(a) Direct Memory Access
(b) Directional Momentary Acess
(c) Directional Major device Access
(d) Direct Minor device Access
ans : (a)
5. Linux
(a) has hierarchical file system
(b) has FAT
(c) treats peripheral devices as files
(d) both (a) & (c)
Ans : (d)
6. in case memory maped i/o which one is not true
a. there a is seperate address space for i/o operation
b. special instruction are used for i/o data transfer
c. memory address may overlap
d. none of the above.
Ans. a
7. DMA requires
a.most of the cpu time
b.cash
c.CPU instantiation.
d.main memory.
Ans c
8. special i/o instruction r required for
a. Memory mapped i/o
b .i/o mapped i/o
c. both of these
d. none of these
Ans a
9. out put of complier is
a.assembly code
b.object code
c.machine code
d.none of the above
Ans b.
10. which one these is onchip mem
a.mainmemory
b.cash
11.which one of the following is wrong
A. 2's complement(10110) = 01010 B. 4's complement(1230)=2110
C. 8's complement(7436)=1451 @ D. 5's complement(4322)=0123
12.(128)base 10 = (1003)base r, what is the value of r?
A. 3 B. 4
C. 5 @ D. 6
13. In design of instruction set
A. RISC uses more no of instructions. B. CISC uses more no.of instructions @
C. Both uses same no. of instruction. D. RISC uses mor than CISC
14. which phase of the compiler checks lexicographic errors
A. Syntax Phase B. Semantic Phase
C. Lexical Analysis @ D.Code Optimization
15. Random accessing is possible in
A. Read Only Memory(ROM) B. Random Access Memory(RAM)
C. Both RAM and ROM @ D. None of the above.
16.Who is called the father of Computers ?
a) Blaise Pascal
b) Herman Hollerith
c) Antony Van
d) Charles Babbage
Ans .(d)
17.How many columns did Punched Card have ?
a) 24
b) 100
c) 80
d) 16
Ans.(c)
18.What does the acronym FTP stand for ?
a)File Transmission Protocol
b)File Transfer Protocol
b)Fifo Termination Pointer
d)File Tracking Pointer
Ans.(b)
19.Which company was involved in the development of Unix?
a)Microsoft
b)IBM
c)AT&T
d)Hewlett Packard
Ans.(c)
20.What does acronym RISC stand for ?
a)Rapid Instruction Set Computers
b)Rapid Integer Signalling Computers
c)Reduced Instruction Set Computers
d)Reliable Instruction Set Computers
Ans.(c)
21.) Who is the originator of MS-DOS
a. Gary Kildall
b. Dennis Ritchie
c. Tim Patterson *
d. Ken Thompson
Additional Questions on OS:
1)Remove the odd ones
a)job scheduler
b)long term scheduler
c)medium term scheduler
d)process term scheduler
Ans : d
2) long term scheduler is also known as
a)cpu scheduler
b)job scheduler
c)middle term scheduler
d)none of these
Ans : b
3)which one is not in the process state
a)ready
b)run
c)terminated
d)none of these
Ans : d
4)Switching the cpu to another process requires saving the state of the old process and loading the saved state is called
a)mode switch
b)process switch
c)context switch
d)none
Ans : c
5)which one is not in the compilation stage
a)lexical analyser
b)parser
c)assembler
d)code generator
Ans : c
Operating System :
1. Round Robin algorithm is used in :
a. deadlock preventiom
b. process management
c . scheduling (1)
d . deadlock detection
2. Type of memory management used in unix os
a. swapping
b. demand paging
c . both a and
b(1) d. none of the above
3. File system supported in Unix
a. ext2
b. ext3
c. a and
b (1)
d . none of the above
4. number of address bits in 8086 processor
a. 16
b. 20(1)
c . 24
d. 12
5. which is the data type , which does'nt depend on the m/c
a. char(1)
b. int
c. float
d.none
6 . the int size depends on ?
a. ALU size(1)
b. OS
c. none
OS Questions
1. Which is the most efficient page replacement algo -
a. LRU ( Correct - not v sure )
b. LFU
c. FIFO
d. LIFO
2. Compaction comes into picture in -
a. Paging
b. Sheduling
c. Segmentation ( Correct )
d. File Management
3.Which systems support both Real Mode / Protected Mode -
a. Intel 386 and higher ( Correct)
b. Intel 286 and higher
c. Pentium series only
d. None of teh above
4. High Paging Activity leads to -
a. Swapping
b. Compaction
c. Thrashing ( Correct)
d. External Fragmentation
5. Which are the necessary conditions for deadlock
a. Mutual Exclusion
b. Non preemption
c. Circular wait
d. Hold and wait
e. All of the above ( Correct)
N/w Questions
1) Gateway is the one which
choice(s) :
(a) Supports Multiple Protocols within same Network
(b) Routes Messages / Packets within same Network , having single protocol
(c) Supports Muliple Protocols of two / more Different Networks
(d) Routes Messages / Packets to differnt Networks,having same protocol b/w them
2) Size of ATM packet , in bytes
choice(s) :
(a)34
(b)53
(c)33
(d)32
3) Where is the Bootstrap Loader present physically ?
Choice(s) :
(a) HDD
(b) BIOS ROM
(c) First Track Zeroth Cylinder Zeroth Sector
(d) Zeroth Track Zeroth Cylinder First Sector
4) Major Difference b/w Switches & Routers is
Choice(s) :
(a)No Difference between them
(b)Switches work in Data Link Layer & Routers in Network Layer of OSI model
(c)Switches divides the bandwidth across the various Devices connected whereas Routers Preserve Bandwidth.
(d)Routers have more intelligence than switches in routing a packet & able to adjust to the environmental changes Dynamically
5) Difference between a Hub & a Repeater
(a) Hub is used in Network Layer & Repeater at Physical Layer
(b) Hub & Repeater both are same
(c) Hub is a Repeater
(d) Hub divides Bandwith among various Machines whereas Repeater doesnot
Answers :
1) (c) Supports Muliple Protocols of two / more Different Networks
2) (b) 53
3) (b) BIOS ROM
4) (d)Routers have more intelligence than switches in routing a packet & able to adjust to the environmental changes Dynamically
5) (d) Hub divides Bandwith among various Machines whereas Repeater doesnot
2.) Which of the following is responsible for displaying the DOS prompt
a. Resident portion of COMMAND.COM
b. Transient portion of COMMAND.COM *
c. SYSINIT module of IO.SYS
d. AUTOEXEC.BAT
3.) Bootstrap loader program is a program belonging to:
a. ROM extension software
b. ROM startup software *
c. ROM-BIOS software
d. ROM Basic software
4.) Whether a particular operation is successfully carried out by DOS or not is indicated by the value stored in
a.Ordinary register
b.Flags register *
c.Segment register
d.Offset register
5.) In a 80386 microprocessor each CPU register is
a.12 bits long
b.16 bits long *
c. 8 bits long
d. 8 bytes long
6.) Each Address in Interrupt Vector table is
a. 2 bytes long
b. 4 bytes long *
c. 8 bytes long
d. 1 byte long
7.) The Program Counter is also called
a. Stack Pointer
b. Base Pointer
c. Instruction Pointer *
d. None of the above
8.) The 8088 is a
a. 8 bit Microprocessor
b. 16 bit Microprocessor
c. 8/16 bit Microprocessor *
d. a 32 bit Microprocessor
9.) Pick the odd one out
a. VGA
b. EGA
c. XGA
d. BCA *
10.) A ROM-BIOS routine makes use of the segment register ES and DS. To call this routine which function would you use
a. int86()
b. int86x() *
c. intdos()
d. intdosx() *
11.) Conventionally one screenful of characters would require how many bytes:
a. 2000
b. 3000
c. 4000 *
d. 5000
1. IEEE stands for ?
a) Institute of Electrical and Electronic Engineers
b) Information for Electronics and Electrical Engineers
c) International Electronics and Elecrical Engineers.
d) None of the above.
Ans : a
2. Which of the following protocol help us while receiving mail messages over the internet ?
a) SNMP b)
Ans : c
3 .Which of the following tools are used to partition the hard disk ?
a) fdisk
b) Disk Manager ( DM ).
c) Both
d) None of the above.
Ans : c
4.EBCDIC code stands for ?
a) Extended Binary coded decimal interchange code
b) Extended Biased coding Decimal interchange code
c) External Biased coding Decimal interchange code
d) None of the above
Ans : a
5. C++ designed and developed by ?
a) Kerninghan & Ritchie.
b) Thomson.
c) Bary B Brey.
d) Bjarne Stroustrup
Ans : d)
1)Remove the odd ones
a)job scheduler
b)long term scheduler
c)medium term scheduler
d)process term scheduler
Ans : d
2) long term scheduler is also known as
a)cpu scheduler
b)job scheduler
c)middle term scheduler
d)none of these
Ans : b
3)which one is not in the process state
a)ready
b)run
c)terminated
d)none of these
Ans : d
4)Switching the cpu to another process requires saving the state of the old process and loading the saved state is called
a)mode switch
b)process switch
c)context switch
d)none
Ans : c
5)which one is not in the compilation stage
a)lexical analyser
b)parser
c)assembler
d)code generator
Ans : c
Operating System :
1. Round Robin algorithm is used in :
a. deadlock preventiom
b. process management
c . scheduling (1)
d . deadlock detection
2. Type of memory management used in unix os
a. swapping
b. demand paging
c . both a and b(1)
d. none of the above
3. File system supported in Unix
a. ext2
b. ext3
c. a and b (1)
d . none of the above
4. number of address bits in 8086 processor
a. 16
b. 20(1)
c . 24
d. 12
5. which is the data type , which does'nt depend on the m/c
a. char(1) b. int c. float d.none
6. the int size depends on ?
a. ALU size(1)
b. OS
c. none
OS Questions
1. Which is the most efficient page replacement algo -
a. LRU ( Correct - not v sure )
b. LFU
c. FIFO
d. LIFO
2. Compaction comes into picture in -
a. Paging
b. Sheduling
c. Segmentation ( Correct )
d. File Management
3.Which systems support both Real Mode / Protected Mode -
a. Intel 386 and higher ( Correct)
b. Intel 286 and higher
c. Pentium series only
d. None of teh above
4. High Paging Activity leads to -
a. Swapping
b. Compaction
c. Thrashing ( Correct)
d. External Fragmentation
5. Which are the necessary conditions for deadlock
a. Mutual Exclusion
b. Non preemption
c. Circular wait
d. Hold and wait
e. All of the above ( Correct)
N/w Questions
1) Gateway is the one which
choice(s) :
(a) Supports Multiple Protocols within same Network
(b) Routes Messages / Packets within same Network , having single protocol
(c) Supports Muliple Protocols of two / more Different Networks
(d) Routes Messages / Packets to differnt Networks,having same protocol b/w them
2) Size of ATM packet , in bytes
choice(s) :
(a)34
(b)53
(c)33
(d)32
3) Where is the Bootstrap Loader present physically ?
Choice(s) :
(a) HDD
(b) BIOS ROM
(c) First Track Zeroth Cylinder Zeroth Sector
(d) Zeroth Track Zeroth Cylinder First Sector
2 DMA requires
a.most of the cpu time
b.cash
c.CPU instantiation.
d.main memory.
Ans c
3. special i/o instruction r required for
a.Memory mapped i/o
b.i/o mapped i/o
c.both of these
d.none of these
Ans a
4. out put of complier is
a.assembly code
b.object code
c.machine code
d.none of the above
Ans b.
5 which one these is onchip mem
a .main memory
b. cash
1.which one of the following is wrong
A. 2's complement(10110) = 01010
B. 4's complement(1230)=2110
C. 8's complement(7436)=1451 @
D. 5's complement(4322)=0123
2.(128)base 10 = (1003)base r, what is the value of r?
A. 3
B. 4
C. 5 @
D. 6
3. In design of instruction set
A. RISC uses more no of instructions.
B. CISC uses more no.of instructions @
C. Both uses same no. of instruction.
D. RISC uses mor than CISC
4. which phase of the compiler checks lexicographic errors
A. Syntax Phase
B. Semantic Phase
C. Lexical Analysis @
D.Code Optimization
5. Random accessing is possible in
A. Read Only Memory(ROM)
B. Random Access Memory(RAM)
C. Both RAM and ROM @
D. None of the above.
Computer Concepts questions
1.Who is called the father of Computers ?
a) Blaise Pascal
b) Herman Hollerith
c) Antony Van
d) Charles Babbage
Ans .(d)
2.How many columns did Punched Card have ?
a) 24
b) 100
c) 80
d) 16
Ans.(c)
3.What does the acronym FTP stand for ?
a)File Transmission Protocol
b)File Transfer Protocol
b)Fifo Termination Pointer
d)File Tracking Pointer
Ans.(b)
4.Which company was involved in the development of Unix?
a)Microsoft
b)IBM
c)AT&T
d)Hewlett Packard
Ans.(c)
5.What does acronym RISC stand for ?
a)Rapid Instruction Set Computers
b)Rapid Integer Signalling Computers
c)Reduced Instruction Set Computers
d)Reliable Instruction Set Computers
Ans.(c)
1.) Who is the originator of MS-DOS
a. Gary Kildall
b. Dennis Ritchie
c. Tim Patterson *
d. Ken Thompson
2.) Which of the following is responsible for displaying the
DOS prompt
a. Resident portion of COMMAND.COM
b. Transient portion of COMMAND.COM *
c. SYSINIT module of IO.SYS
d. AUTOEXEC.BAT
3.) Bootstrap loader program is a program belonging to:
a. ROM extension software
b. ROM startup software *
c. ROM-BIOS software
d. ROM Basic software
4.) Whether a particular operation is successfully carried out by DOS or not is indicated by the value stored in
a.Ordinary register
b.Flags register *
c.Segment register
d.Offset register
5.) In a 80386 microprocessor each CPU register is
a.12 bits long
b.16 bits long *
c. 8 bits long
d. 8 bytes long
6.) Each Address in Interrupt Vector table is
a. 2 bytes long
b. 4 bytes long *
c. 8 bytes long
d. 1 byte long
7.) The Program Counter is also called
a. Stack Pointer
b. Base Pointer
c. Instruction Pointer *
d. None of the above
8.) The 8088 is a
a. 8 bit Microprocessor
b. 16 bit Microprocessor
c. 8/16 bit Microprocessor *
d. a 32 bit Microprocessor
9.) Pick the odd one out
a. VGA
b. EGA
c. XGA
d. BCA *
10.) A ROM-BIOS routine makes use of the segment register ES and DS. To call this routine which function would you use
a. int86()
b. int86x() *
c. intdos()
d. intdosx() *
11.) Conventionally one screenful of characters would require how many bytes:
a. 2000
b. 3000
c. 4000 *
d. 5000
1.IEEE stands for ?
a) Institute of Electrical and Electronic Engineers
b) Information for Electronics and Electrical Engineers
c) International Electronics and Elecrical Engineers.
d) None of the above.
Ans: a
2.Which of the following protocol help us while receiving mail messages
over the internet ?
a) SNMP b)
Ans: c
3.Which of the following tools are used to partition the hard disk ?
a) fdisk
b) Disk Manager ( DM ).
c) Both
d) None of the above.
Ans: c
4.EBCDIC code stands for ?
a) Extended Binary coded decimal interchange code
b) Extended Biased coding Decimal interchange code
c) External Biased coding Decimal interchange code
d) None of the above
Ans: a
5.C++ designed and developed by ?
a) Kerninghan & Ritchie.
b) Thomson.
c) Bary B Brey.
d) Bjarne Stroustrup
Ans: d)
1)what is big-endian.
a) MSB at lower address LSB at higher address
b) LSB at lower address MSB at higher address
c) memory mgmt technique
d) none of the above
Ans : a
2)what is Little-endian.
a) MSB at lower address LSB at higher address
b) LSB at lower address MSB at higher address
c) memory mgmt technique
d) none of the above
Ans : b
3)8086 has
a)16 bit data bus ,16 bit address bus
b)16 bit data bus,32 bit address bus
c)8 bit data bus,16 bit address bus
d)8 bit data bus,8 bit address bus
Ans : a
4) what is the scheduling algorithm used in general operating systems.
a) FCFS algorithm
b) Highest Priority First algorithm
c) Round-Robin algorithm
d) None of the above
Ans : c
5)Router is present at
a)Physical layer
b)Data Link Layer
c)Network Layer
d)None of above
Ans : c
6)Condition for deadlock occurance
a) Mutual Exclusion
b) no premption
c) hold and wait
d) circular wait
e) all of the above
Ans : d
7)PCI stands for
a)Programmable computer Interface
b)Peripheral Computer Interface
c)programmable Control Interface
d)Peripheral Component Interface
Ans : d
8)Toggle state in J-K flip-flop is
a)0 1
b)1 0
c)1 1
d)0 0
Ans : c
9)Interrupt is serviced
a)Immediatly when it occurs
b)After the completion of current instruction.
c)Ignored
d)None of the above.
Ans : b
C:
1.what is the o/p ?
void main()
{
char *mess[]={"Have","a","nice","day","Bye");
printf("%d \t %d",sizeof(mess),sizeof(mess[1]));
}
a. 16 4
b. 5 4
c. 20 4
d. Error
Ans : c
2.what is the o/p of the following programe?
void main()
{
int i,count=0;
char *p1="abcdefghij";
char *p2="alcmenfoip";
for(i=0;i<=strlen(p1);i++) {
if(*p1++ == *p2++)
count+=5;
else
count-=3;
}
printf("count=%d\n",count);
}
a. 15
b. 6
c. 12
d. compiler error
Ans : b ( note : strlen(p1) == i when i=6)
3.what does main return on successful execution?
a. 1
b. 0
c. -1
d.Nonzero
ans:b
4. main(int argc,char *argv[])
{
printf((argc > 1 ? "%c" : "%c",*++argv);
}
If the i/p string is "GESL Bangalore".
a. G
b. E
c. B
d. GESL
ans: c
5. How do u declare a pointer to an array of pointers to int?
a. int *a[5];
b. int **a[5];
c. int *(*a)[5];
d. u con not declare
ans: c
Questions on OS:
1.UDP is a
a. Reliable protocol
b. Unreliable protocol
c. Connectionless protocol
d. Both b & c
Ans: d
2.Real Time OS uses
a. RISC processor
b. CISC processor
c. SISC processor
d. Any of the above
Ans: a
3.Race condition could be overcome using
a. A global variable
b. A local variable
c. Mutex
d. All of the above
4.Repeaters are in
a. Data link layer
b. Physical layer
c. Network layer
d. Transport layer
Ans: b
5.Telecom Networking uses
a. Packet switching
b. Circuit switching
c. Message switching
d. Non of the above
Ans : b ( normally )
1.which one of the following is wrong
A. 2's complement(10110) = 01010
B. 4's complement(1230)=2110
C. 8's complement(7436)=1451 @
D. 5's complement(4322)=0123
2.(128)base 10 = (1003)base r, what is the value of r?
A. 3
B. 4
C. 5 @
D. 6
3. In design of instruction set
A. RISC uses more no of instructions.
B. CISC uses more no.of instructions @
C. Both uses same no. of instruction.
D. RISC uses mor than CISC
4. which phase of the compiler checks lexicographic errors
A. Syntax Phase
B. Semantic Phase
C. Lexical Analysis @
D.Code Optimization
5. Random accessing is possible in
A. Read Only Memory(ROM)
B. Random Access Memory(RAM)
C. Both RAM and ROM @
D. None of the above.
Computer Concepts questions
1.Who is called the father of Computers ?
a) Blaise Pascal
b) Herman Hollerith
c) Antony Van
d) Charles Babbage
Ans : (d)
2.How many columns did Punched Card have ?
a) 24
b) 100
c) 80
d) 16
Ans : (c)
3.What does the acronym FTP stand for ?
a)File Transmission Protocol
b)File Transfer Protocol
b)Fifo Termination Pointer
d)File Tracking Pointer
Ans : (b)
4.Which company was involved in the development of Unix?
a)Microsoft
b)IBM
c)AT&T
d)Hewlett Packard
Ans : (c)