Wipro NLTH Technical Questions

Technical Questions
1. Word alignment is
a) alligning the address to the next word boundary of the machine
b) alligning to even boundary
c) alligning to word boundary
d) none of the above
Answer : Alligning the address to the next word boundary of the
machine

2. To send a packet data using datagram, connection will be established..
a) before data transmission
b) connection is not establshed before data transmission
c) no connection required
d) none of the above
Answer : No connection required

3. A 2 mb PCM (Pulse Code Modulation) has
a) 32 voice channels
b) 30 voice channels and 1 signalling channel
c) 31 voice chanels and 1 signalling channel
d) 32 channels out of which 30 voice channels, 1 signalling channel and
1 syncronization channel.
Answer : 31 voice chanels and 1 signalling channel

4. The status of the kernel is?
a) task
b) process
c) not defined
d) none of the above
Answer : Process

5 . Explain the use of the WHERE clause.
Answer : It directs SQL to extract data from rows where the value of the
column is the same as the current value of the WHERE clause variable.

6. Full Form of DML
Answer: Data Manipulation Language

 

7. What are the reasons for adding an index to a table ?
Answer : To increase lookup performance. For a unique key to guarantee
the uniqueness of the values for a column on a table.

8. What is PL/SQL ?
Answer : A programming language available in Oracle. It is a way of
wrapping SQL with 3GL constructs such as IF..THEN..ELSE, WHILE etc.

9. What technique is used to retrieve data from more than one table in a
single SQL statement?
Answer : The Join statement combines data from more that two tables

10. What is a foreign key?

Answer : It identifies a related row in another table and establishes a
logical relationship between rows in two tables.

11. What happens if a tablespace clause is left off of a primary key
constraint clause?
Answer : This results in the index that is automatically generated being
placed in the users default tablespace. Since this will usually be the
same tablespace as the table is being created in, this can cause serious
performance problems.

12. What is locking and what is it used for ?
Answer : Locking is a mechanism to restrict access to data. It prevents
one user updating data whilst another user is looking at it.

13. What types of locking are available with Oracle?
Answer : Row locking and table locking.

14. Full Form of DDL
Answer: Data Definition Language

15. In 8085 microprocessor READY signal does. which of the following is
incorrect statements
a) It is input to the microprocessor
b) It sequences the instructions
c) It sequences the output of the microprocessor
d) None
Answer : It sequences the instructions

16. int zap(int n)
{
if(n<=1)then zap=1;
else zap=zap(n-3)+zap(n-1);
}
then the call zap(6) gives the values of zap
a) 8
b) 9
c) 6
d) 12
Answer : 9

17. Virtual memory size depends on
a) address lines
b) data bus
c) disc space
d) a & c
Answer : Address lines

18. A 12 address lines maps to the memory of
a) 1k bytes
b) 0.5k bytes
d) 2k bytes
d) none
Answer : 0.5k bytes

19. In a processor these are 120 instructions . Bits needed to impliment
this instructions
a) 6
b) 7
c) 10
d) none
Answer : 7

20. In a compiler there is 36 bit for a word and to store a character 8bits
are needed. IN this to store a character two words are appended .Then
for storing a K characters string, How many words are needed.
a) 2k/9
b) (2k+8)/9
c) (k+8)/9
d) 2*(k+8)/9
Answer : 2k/9

21. n=7623
{
temp=n/10;
result=temp*10+ result;
n=n/10
}
a) 3467
b) 3657
c) 3267
d) 3980
Answer : 3267

22. A device can operate without Application layer in a network. State
True or False.
a) False
b) True

Answer : True. Routing devices like bridges need not necessarily have
application layer.

23. OSI stands for
a) Open Systems Interconnection
b) Open Systems Integration
c) Open Servers Interconnection
d) None
Answer : Open Systems Interconnection

24. Find the odd man out
HTTP, FTP, MPEG, SNMP
a) HTTP
b) FTP
c) MPEG
d) SNMP
Answer : MPEG – This is a file format and not a Protocol like other
options.

25. Amount of work a computer can do in a given period is called
a)Throughput
b)Job
c)Process
d)None of the above
Answer : Throughput

26. Which of the following addresses is always unique and unchanged for
a machine
a) IP Address
b) MAC Address
c) Both of the above
d) none
Answer : MAC Address

27. What is a running program under execution called?
a) Task
b) Job
c) Process
d) Any of the above
Answer : Any of the above

28. CPU Scheduling is a function of OS under
a) Process Management
b) Memory Management
c) I/O Management
d) None of the above
Answer : Process Management

29. Background running processes are typically called
a) Daemons
b) Tasks
c) Processes
d) None of the above
Answer : Daemons

30. The process in which OS saves all data associated with current
process and switches over to the next is called
a) Process Switching
b) Task Switching
c) Context Switching
d) None
Answer : Context Switching

New

Technical Questions

1. The format specifier “-%d” is used for which purpose in C

(a) Left justifying a string
(b) Right justifying a string
(c) Removing a string from the console
(d) Used for the scope specification of a char[] variable

Answer : a

2. A sorting algorithm which can prove to be a best time algorithm in
one case and a worst time algorithm in worst case is

(a) Quick Sort
(b) Heap Sort
(c) Merge Sort
(d) Insert Sort

Answer : a

3. If the time quantum is too large, Round Robin scheduling degenerates
to

(a) Shortest Job First Scheduling
(b) Multilevel Queue Scheduling
(c) FCFS
(d) None of the above

 

Answer : c

4. Transponders are used for which of the following purposes

(a) Uplinking
(b) Downlinking
(c) Both (a) and (b)
(d) None of the above

Answer : c

5. What details should never be found in the top level of a top-down
design?

(a) Details
(b) Coding
(c) Decisions
(d) None of the above

Answer : c
6. Thrashing can be avoided if

(a) The pages, belonging to the working set of the programs, are in main
memory
(b) The speed of CPU is increased
(c) The speed of I/O processor are increased
(d) All of the above

Answer : a

7. Which of the following communications lines is best suited to
interactive processing applications?

(a) Narrowband channels
(b) Simplex channels
(c) Full-duplex channels
(d) Mixed band channels

Answer : b

8. A feasibility document should contain all of the following except

(a) Project name
(b) Problem descriptions
(c) Feasible alternative
(d) Data flow diagrams

Answer : d

9. In an absolute loading scheme, which loader function is accomplished
by assembler

(a) Reallocation
(b) Allocation
(c) Linking
(d) Both (a) and (b)

Answer : d

10. Banker’s algorithm for resource allocation deals with

(a) Deadlock prevention
(b) Deadlock avoidance
(c) Deadlock recovery
(d) None of these

Answer : b
11. A shift register can be used for

(a) Parallel to serial conversion
(b) Serial to parallel conversion
(c) Digital delay line
(d) All the above

Answer : d

12. In which of the following page replacement policies, Balady’s
anomaly occurs?

(a) FIFO
(b) LRU
(c) LFU
(d) NRU

Answer : a

13. Subschema can be used to

(a) Create very different, personalised views of the same data
(b) Present information in different formats
(c) Hide sensitive information by omitting fields from the sub-schema’s
description
(d) All of the above

Answer : d

14. A 12 address lines maps to the memory of

(a) 1k bytes
(b) 0.5k bytes
(c) 2k bytes
(d) none

Answer : b

15. What is the main function of a data link content monitor?

(a) To detect problems in protocols
(b) To determine the type of transmission used in a data link
(c) To determine the type of switching used in a data link
(d) To determine the flow of data

Answer : a

16. Which of the following memories has the shortest access time?

(a) Cache memory
(b) Magnetic bubble memory
(c) Magnetic core memory
(d) RAM

Answer : a

17. In a processor these are 120 instructions . Bits needed to implement
this instructions

(a) 6
(b) 7
(c) 10
(d) none

Answer : b

18. Predict the output or error(s) for the following:

main()
{
char string[]=Hello World;
display (string);
}
void display (char *string)
{
printf(%s,string);
}

Answer : Compiler Error: Type mismatch in redeclaration of function
display

19. What are the values printed by the following program?
#define dprint(expr) printf(#expr =%d\n,expr)
main()
{
int x=7;
int y=3;
dprintf(x/y);
}

(a) #2 = 2
(b) expr=2
(c) x/y=2
(d) none

Answer : c

20. Parameterization generally involves

(a) Data table
(b) Random number
(c) Environment
(d) Both A & B
(e) Both A, B & C

Answer : e

21. The file which is used for recovering from the run time errors known
as

(a) QRS
(b) TSR
(c) PNG
(d) DAT

Answer : A

22. Among the following recording modes, which method uses both the
objects and mouse coordinates

(a) Normal
(b) Low level
(c) Analog
(d) All of the above

Answer : b

23. Where do you set the action iterations for a specified action?

(a) Action Settings
(b) Action Properties
(c) Action Run Properties
(d) Action Call Properties

Answer : d

24. Where do you mark an action as reusable?

(a) Action Settings
(b) Action Properties
(c) Action Run Properties
(d) Action Call Properties

Answer : b

25. After running a test that contains both input and output parameters,
where can the results of an output parameter be found?

(a) Local Data Sheet
(b) Global Data Sheet
(c) Run-time Data Table
(d) Design-time Data Table

Answer : c

 

26. If you have a Virtual Object Collection stored on your machine, and
you dont want to use it what
you must do?

(a) Disable Virtual Objects in Test Settings
(b) Remove the Collection from your machine
(c) Disable Virtual Objects in General Options
(d) Remove the Collections from the Resources list

Answer : c

27. For a 25MHz processor, what is the time taken by the instruction
which needs 3 clock cycles,

(a) 120 nano secs
(b) 120 micro secs
(c) 75 nano secs
(d) 75 micro secs

Answer : a

28. For 1 MB memory, the number of address lines required,

(a) 11
(b) 16
(c) 20
(d) 24

Answer : c

29. Semaphore is used for

(a) synchronization
(b) dead-lock avoidance
(c) box
(d) none

Answer : a

30. OLE is used in

(a) Inter connection in UNIX
(b) Interconnection in WINDOWS
(c) Interconnection in WINDOWS NT
(d)None

Answer : c

31. Preprocessor does not do which one of the following

(a) macro
(b) conditional
(c) in type checking
(d) including load file

Answer : c

32. Piggy backing is a technique for

(a) Flow control
(b) Sequence
(c) Acknowledgement
(d) Retransmission

Answer : c

33. In signed magnitude notation what is the minimum value that can be
represented with 8 bits

(a) -128
(b) -255
(c) -127
(d) 0

Answer : a

34. When an array is passed as parameter to a function, which of the
following statement is correct

(a) The function can change values in the original array
(b) In C parameters are passed by value. The function cannot change
the original value in the array
(c) It results in compilation error when the function tries to access the
elements in the array
(d) Results in a run time error when the function tries to access the
elements in the array

Answer : a

35. The type of the controlling statement of a switch statement cannot
be of the type

(a) int
(b) char
(c) short
(d) float
(e) none

Answer : d

36. What is the value of the statement (3^6) + (a^a)?

(a) 3
(b) 5
(c) 6
(d) 18
(e) None

Answer : b

 

Technical Questions :
1. If the time quantum is too large, Round Robin scheduling degenerates to
(a) Shortest Job First Scheduling
(b) Multilevel Queue Scheduling
(c) FCFS
(d) None of the above
Ans. (c)
2. Transponders are used for which of the following purposes
(a) Uplinking
(b) Downlinking
(c) Both (a) and (b)
(d) None of the above
Ans. (c)
3. The format specifier “-%d” is used for which purpose in C
(a) Left justifying a string
(b) Right justifying a string
(c) Removing a string from the console
(d) Used for the scope specification of a char[] variable
Ans. (a)
4. A sorting algorithm which can prove to be a best time algorithm in one case and a worst time algorithm in worst case is
(a) Quick Sort
(b) Heap Sort
(c) Merge Sort
(d) Insert Sort
Ans. (a)
5. What details should never be found in the top level of a top-down design?
(a) Details
(b) Coding
(c) Decisions
(d) None of the above
Ans. (c)
6. In an absolute loading scheme, which loader function is accomplished by assembler
(a) Reallocation
(b) Allocation
(c) Linking
(d) Both (a) and (b)
Ans. (d)
7. Banker’s algorithm for resource allocation deals with
(a) Deadlock prevention
(b) Deadlock avoidance
(c) Deadlock recovery
(d) None of these
Ans. (b)
8. Thrashing can be avoided if
(a) The pages, belonging to the working set of the programs, are in main memory
(b) The speed of CPU is increased
(c) The speed of I/O processor are increased
(d) All of the above
Ans. (a)
9. Which of the following communications lines is best suited to interactive processing applications?
(a) Narrowband channels
(b) Simplex channels
(c) Full-duplex channels
(d) Mixed band channels
Ans. (b)
10. A feasibility document should contain all of the following except
(a) Project name
(b) Problem descriptions
(c) Feasible alternative
(d) Data flow diagrams
Ans. (d)
11. What is the main function of a data link content monitor?
(a) To detect problems in protocols
(b) To determine the type of transmission used in a data link
(c) To determine the type of switching used in a data link
(d) To determine the flow of data
Ans. (a)
12. Which of the following memories has the shortest access time?
(a) Cache memory
(b) Magnetic bubble memory
(c) Magnetic core memory
(d) RAM
Ans. (a)
13. A shift register can be used for
(a) Parallel to serial conversion
(b) Serial to parallel conversion
(c) Digital delay line
(d) All the above
Ans.(d)
14. In which of the following page replacement policies, Balady’s anomaly occurs?
(a) FIFO
(b) LRU
(c) LFU
(d) NRU
Ans. (a)
15. Subschema can be used to
(a) Create very different, personalised views of the same data
(b) Present information in different formats
(c) Hide sensitive information by omitting fields from the sub-schema’s description
(d) All of the above
Ans. (d)
16. A 12 address lines maps to the memory of
a. 1k bytes
b. 0.5k bytes
c. 2k bytes
d. none
Ans: b
17. In a processor these are 120 instructions . Bits needed to implement this instructions
[a] 6
[b] 7
10
[d] none
ans: b
18. In a compiler there is 36 bit for a word and to store a character 8bits are needed. IN this to store a character two words are appended .Then for storing a K characters string, How many words are needed.
[a] 2k/9
[b] (2k+8/9
(k+8/9
[d] 2*(k+8/9 [e] none
Ans: a
19. Virtual memory size depends on
[a] address lines
[b] data bus
disc space
[d] a & c [e] none
Ans : a

Leave a Comment

Your email address will not be published. Required fields are marked *