Technical Questions
1. Word alignment is
a) alligning the address to the next word boundary of the machine
b) alligning to even boundary
c) alligning to word boundary
d) none of the above
Answer : Alligning the address to the next word boundary of the
machine
2. To send a packet data using datagram, connection will be established..
a) before data transmission
b) connection is not establshed before data transmission
c) no connection required
d) none of the above
Answer : No connection required
3. A 2 mb PCM (Pulse Code Modulation) has
a) 32 voice channels
b) 30 voice channels and 1 signalling channel
c) 31 voice chanels and 1 signalling channel
d) 32 channels out of which 30 voice channels, 1 signalling channel and
1 syncronization channel.
Answer : 31 voice chanels and 1 signalling channel
4. The status of the kernel is?
a) task
b) process
c) not defined
d) none of the above
Answer : Process
5 . Explain the use of the WHERE clause.
Answer : It directs SQL to extract data from rows where the value of the
column is the same as the current value of the WHERE clause variable.
6. Full Form of DML
Answer: Data Manipulation Language
7. What are the reasons for adding an index to a table ?
Answer : To increase lookup performance. For a unique key to guarantee
the uniqueness of the values for a column on a table.
8. What is PL/SQL ?
Answer : A programming language available in Oracle. It is a way of
wrapping SQL with 3GL constructs such as IF..THEN..ELSE, WHILE etc.
9. What technique is used to retrieve data from more than one table in a
single SQL statement?
Answer : The Join statement combines data from more that two tables
10. What is a foreign key?
Answer : It identifies a related row in another table and establishes a
logical relationship between rows in two tables.
11. What happens if a tablespace clause is left off of a primary key
constraint clause?
Answer : This results in the index that is automatically generated being
placed in the users default tablespace. Since this will usually be the
same tablespace as the table is being created in, this can cause serious
performance problems.
12. What is locking and what is it used for ?
Answer : Locking is a mechanism to restrict access to data. It prevents
one user updating data whilst another user is looking at it.
13. What types of locking are available with Oracle?
Answer : Row locking and table locking.
14. Full Form of DDL
Answer: Data Definition Language
15. In 8085 microprocessor READY signal does. which of the following is
incorrect statements
a) It is input to the microprocessor
b) It sequences the instructions
c) It sequences the output of the microprocessor
d) None
Answer : It sequences the instructions
16. int zap(int n)
{
if(n<=1)then zap=1;
else zap=zap(n-3)+zap(n-1);
}
then the call zap(6) gives the values of zap
a) 8
b) 9
c) 6
d) 12
Answer : 9
17. Virtual memory size depends on
a) address lines
b) data bus
c) disc space
d) a & c
Answer : Address lines
18. A 12 address lines maps to the memory of
a) 1k bytes
b) 0.5k bytes
d) 2k bytes
d) none
Answer : 0.5k bytes
19. In a processor these are 120 instructions . Bits needed to impliment
this instructions
a) 6
b) 7
c) 10
d) none
Answer : 7
20. In a compiler there is 36 bit for a word and to store a character 8bits
are needed. IN this to store a character two words are appended .Then
for storing a K characters string, How many words are needed.
a) 2k/9
b) (2k+8)/9
c) (k+8)/9
d) 2*(k+8)/9
Answer : 2k/9
21. n=7623
{
temp=n/10;
result=temp*10+ result;
n=n/10
}
a) 3467
b) 3657
c) 3267
d) 3980
Answer : 3267
22. A device can operate without Application layer in a network. State
True or False.
a) False
b) True
Answer : True. Routing devices like bridges need not necessarily have
application layer.
23. OSI stands for
a) Open Systems Interconnection
b) Open Systems Integration
c) Open Servers Interconnection
d) None
Answer : Open Systems Interconnection
24. Find the odd man out
HTTP, FTP, MPEG, SNMP
a) HTTP
b) FTP
c) MPEG
d) SNMP
Answer : MPEG – This is a file format and not a Protocol like other
options.
25. Amount of work a computer can do in a given period is called
a)Throughput
b)Job
c)Process
d)None of the above
Answer : Throughput
26. Which of the following addresses is always unique and unchanged for
a machine
a) IP Address
b) MAC Address
c) Both of the above
d) none
Answer : MAC Address
27. What is a running program under execution called?
a) Task
b) Job
c) Process
d) Any of the above
Answer : Any of the above
28. CPU Scheduling is a function of OS under
a) Process Management
b) Memory Management
c) I/O Management
d) None of the above
Answer : Process Management
29. Background running processes are typically called
a) Daemons
b) Tasks
c) Processes
d) None of the above
Answer : Daemons
30. The process in which OS saves all data associated with current
process and switches over to the next is called
a) Process Switching
b) Task Switching
c) Context Switching
d) None
Answer : Context Switching
New
Technical Questions
1. The format specifier “-%d” is used for which purpose in C
(a) Left justifying a string
(b) Right justifying a string
(c) Removing a string from the console
(d) Used for the scope specification of a char[] variable
Answer : a
2. A sorting algorithm which can prove to be a best time algorithm in
one case and a worst time algorithm in worst case is
(a) Quick Sort
(b) Heap Sort
(c) Merge Sort
(d) Insert Sort
Answer : a
3. If the time quantum is too large, Round Robin scheduling degenerates
to
(a) Shortest Job First Scheduling
(b) Multilevel Queue Scheduling
(c) FCFS
(d) None of the above
Answer : c
4. Transponders are used for which of the following purposes
(a) Uplinking
(b) Downlinking
(c) Both (a) and (b)
(d) None of the above
Answer : c
5. What details should never be found in the top level of a top-down
design?
(a) Details
(b) Coding
(c) Decisions
(d) None of the above
Answer : c
6. Thrashing can be avoided if
(a) The pages, belonging to the working set of the programs, are in main
memory
(b) The speed of CPU is increased
(c) The speed of I/O processor are increased
(d) All of the above
Answer : a
7. Which of the following communications lines is best suited to
interactive processing applications?
(a) Narrowband channels
(b) Simplex channels
(c) Full-duplex channels
(d) Mixed band channels
Answer : b
8. A feasibility document should contain all of the following except
(a) Project name
(b) Problem descriptions
(c) Feasible alternative
(d) Data flow diagrams
Answer : d
9. In an absolute loading scheme, which loader function is accomplished
by assembler
(a) Reallocation
(b) Allocation
(c) Linking
(d) Both (a) and (b)
Answer : d
10. Banker’s algorithm for resource allocation deals with
(a) Deadlock prevention
(b) Deadlock avoidance
(c) Deadlock recovery
(d) None of these
Answer : b
11. A shift register can be used for
(a) Parallel to serial conversion
(b) Serial to parallel conversion
(c) Digital delay line
(d) All the above
Answer : d
12. In which of the following page replacement policies, Balady’s
anomaly occurs?
(a) FIFO
(b) LRU
(c) LFU
(d) NRU
Answer : a
13. Subschema can be used to
(a) Create very different, personalised views of the same data
(b) Present information in different formats
(c) Hide sensitive information by omitting fields from the sub-schema’s
description
(d) All of the above
Answer : d
14. A 12 address lines maps to the memory of
(a) 1k bytes
(b) 0.5k bytes
(c) 2k bytes
(d) none
Answer : b
15. What is the main function of a data link content monitor?
(a) To detect problems in protocols
(b) To determine the type of transmission used in a data link
(c) To determine the type of switching used in a data link
(d) To determine the flow of data
Answer : a
16. Which of the following memories has the shortest access time?
(a) Cache memory
(b) Magnetic bubble memory
(c) Magnetic core memory
(d) RAM
Answer : a
17. In a processor these are 120 instructions . Bits needed to implement
this instructions
(a) 6
(b) 7
(c) 10
(d) none
Answer : b
18. Predict the output or error(s) for the following:
main()
{
char string[]=Hello World;
display (string);
}
void display (char *string)
{
printf(%s,string);
}
Answer : Compiler Error: Type mismatch in redeclaration of function
display
19. What are the values printed by the following program?
#define dprint(expr) printf(#expr =%d\n,expr)
main()
{
int x=7;
int y=3;
dprintf(x/y);
}
(a) #2 = 2
(b) expr=2
(c) x/y=2
(d) none
Answer : c
20. Parameterization generally involves
(a) Data table
(b) Random number
(c) Environment
(d) Both A & B
(e) Both A, B & C
Answer : e
21. The file which is used for recovering from the run time errors known
as
(a) QRS
(b) TSR
(c) PNG
(d) DAT
Answer : A
22. Among the following recording modes, which method uses both the
objects and mouse coordinates
(a) Normal
(b) Low level
(c) Analog
(d) All of the above
Answer : b
23. Where do you set the action iterations for a specified action?
(a) Action Settings
(b) Action Properties
(c) Action Run Properties
(d) Action Call Properties
Answer : d
24. Where do you mark an action as reusable?
(a) Action Settings
(b) Action Properties
(c) Action Run Properties
(d) Action Call Properties
Answer : b
25. After running a test that contains both input and output parameters,
where can the results of an output parameter be found?
(a) Local Data Sheet
(b) Global Data Sheet
(c) Run-time Data Table
(d) Design-time Data Table
Answer : c
26. If you have a Virtual Object Collection stored on your machine, and
you dont want to use it what
you must do?