placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur...

90
http://www.indiabix.com/placement-papers/csc/ http://placement.freshersworld.com/placement-papers/company/CSC%20/224 http://www.m4maths.com/placement-puzzles.php?SOURCE=csc http://www.vyoms.com/placement-papers/companies/details/csc-india-pvt-ltd-1249.asp Company Profile WE ARE LOCATED WHERE OUR CLIENTS NEED US In addition to our headquarters in Falls Church, Virginia, USA, and three other major offices in Australia, Asia and Europe, our 98,000 professionals serve clients in more than 90 countries. WHAT WE DO For more than 50 years, we at CSC have developed smart, technology-enabled solutions to solve our clients' toughest challenges, demonstrating a commitment to excellence and a passion for exceeding expectations. Over the past five decades, technology has radically changed the world we live in. We have remained at the forefront of our business because we have understood how to use technology change and innovation to deliver value to our clients. WE DO AMAZING THINGS We are often asked, "What is it that you do?" We tell them, humbly and yet truthfully: we do amazing things. We help solve big challenges. Technically complex, mission-critical challenges. Watch our video, which brings to life a few of those challenges through four short case studies. Or, read from a list of hundreds of our client success stories. FIFTY+ YEARS OF SUCCESS It started with two men who had a dream. From the moment CSC was born on April 16, 1959, ingenuity has been a driving force behind our success. Explore our rich history. COMPANY PROFILE Read a concise description of our services, financial data,

Transcript of placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur...

Page 1: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

http://www.indiabix.com/placement-papers/csc/

http://placement.freshersworld.com/placement-papers/company/CSC%20/224

http://www.m4maths.com/placement-puzzles.php?SOURCE=csc

http://www.vyoms.com/placement-papers/companies/details/csc-india-pvt-ltd-1249.asp

Company ProfileWE ARE LOCATED WHERE OUR CLIENTS NEED USIn addition to our headquarters in Falls Church, Virginia, USA, and three other major offices in Australia, Asia and Europe, our 98,000 professionals serve clients in more than 90 countries.

WHAT WE DOFor more than 50 years, we at CSC have developed smart, technology-enabled solutions to solve our clients' toughest challenges, demonstrating a commitment to excellence and a passion for exceeding expectations.Over the past five decades, technology has radically changed the world we live in. We have remained at the forefront of our business because we have understood how to use technology change and innovation to deliver value to our clients.

WE DO AMAZING THINGSWe are often asked, "What is it that you do?" We tell them, humbly and yet truthfully: we do amazing things. We help solve big challenges. Technically complex, mission-critical challenges. Watch our video, which brings to life a few of those challenges through four short case studies. Or, read from a list of hundreds of our client success stories.

FIFTY+ YEARS OF SUCCESSIt started with two men who had a dream. From the moment CSC was born on April 16, 1959, ingenuity has been a driving force behind our success. Explore our rich history.

COMPANY PROFILERead a concise description of our services, financial data, strategic programs and representative client engagements (PDF, 320 KB). Or download our Company Profile Infographic (PDF).

OUR MANAGEMENT TEAMOur senior management team has an average of 25 years of domestic and international IT experience and a strong history of business, academic and technological accomplishments.

FINANCIAL PERFORMANCECSC (NYSE: CSC) reported trailing 12 months revenue of $15.9 billion for the third quarter ending March 30, 2012.

Our Mission and Values

CSC'S MissionThe mission of CSC is to be a global leader in providing technology-enabled business solutions and

Page 2: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

services.Our Values are Clear

CLIENT FOCUSEDOur success derives from a deep understanding of our clients, to whom all of CSC is committed to deliver exceptional service and value.

LEADERSHIPWe lead from the front, displaying our integrity and using facts to support our straight talk. We create an environment for positive change built on collaboration and trust.

EXECUTION EXCELLENCEWe insist on excellence in all we do for clients and ourselves, striving always for recognition among the leaders in our industry.

ASPIRATIONWe aspire individually and collectively to be more tomorrow than we are today.

RESULTSWe accept individual responsibility for our commitments and expect to be accountable for results.

Diversity Statement

We value the diversity of our employees and the unique perspectives they bring to CSC. Diversity at CSC not only includes age, race, sex, sexual orientation/gender identity, genetic information, disabilities, and ethnicity, but also jobs and functional roles within the company, the markets and clients we serve, our geographic locations, educational background and whether one joined CSC independently or through an acquisition or outsourcing arrangement. By valuing these differences, we demonstrate our commitment to treating everyone with fairness and respect.

CSC Company Profile

CSC (Computer Sciences Corporation) is a leading information technology (IT) services company. CSC’s mission is to be a global leader in providing technology-enabled business solutions and services.The company is one of the leading outsourcing solutions providers in the world. It has a strong position in providing IT services to government customers.

CSC also provides business process outsourcing, managing key functions for clients, such as procurement and supply chain, call centers and customer relationship management, credit services, claims processing and logistics. I/T and professional services include systems integration, consulting and other professional services. Systems integration encompasses designing, developing, implementing and integrating complete information systems. Consulting and professional services includes advising clients on the strategic acquisition and utilization of I/T and on business strategy, security, modeling, simulation, engineering, operations, change management and business process reengineering.

With approximately 90,000 employees, CSC provides innovative solutions for customers around the world by applying leading technologies and CSC’s own advanced capabilities. These include systems design and integration; IT and business process outsourcing; applications software development; Web and application hosting; and management consulting. Headquartered in Falls Church, Va., CSC reported revenue of $16.5 billion for the 12 months ended March 28, 2008.

Specialties

Page 3: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

Consulting, IT, Systems Integration, OutsourcingHeadquarters Washington D.C. Metro AreaIndustry Information Technology and ServicesType Public CompanyStatus OperatingCompany Size 90,000 employees2008 Revenue $16,500Founded 1959Contact3170 Fairview Park DriveFalls Church, VA 22042United States

CSC IndiaCSC started its operations in India in 1991. With centers in Noida, Indore, Hyderabad, Chennai, Mumbai, Bangalore and Vadodara, and approximately 19,000 employees, CSC is one of the fastest growing IT services firms in India. CSC’s strong local presence enables the company to offer high-value technology solutions and a rich portfolio of services to customers across industry segments, including applications development and product support, infrastructure and BPO services, to clients worldwide. CSC in India is consistently recognized in “best employer” award categories and houses the company’s first Office of Innovation outside the U.S.

For the parent company that has a presence in 92 countries, India is the third largest delivery location in the world. CSC India serves most of the parent company's clients based in North America and Europe. The company is present in domains like insurance, banking, healthcare, retail, defense manufacturing, retail and others. Nearly 33 per cent of the parent company's revenue is derived from the American government, 19 per cent from defense, 17 per cent from financial services and the balance from other segments.

CSC’s mission is to help clients achieve strategic goals and profit from the use of Information Technology. CSC India offers applications services, product development and support services, infrastructure services, IT outsourcing and BPO services to clients worldwide. With a winning combination of strong functional knowledge, in-depth technological expertise, uncompromised process rigour and world class industry standards and compliance in place, CSC India has consistently built upon its experience to deliver business results in the global information technology marketplace, thus earning the trust of some of the world’s biggest organisations.

The company is hiring freshers as well as experienced hands. "Nearly 10-15 per cent of the recruitments are freshers. Our attrition rate is 14 per cent."

They have centres at Hyderabad, Chennai, Bangalore, Mumbai, Noida, Indore, Vadora etc

ContactBuilding #7, Mind Space IT Park,Survey #64, Part APIIC Software LayoutMadhapur, Hitech City,Hyderabad (AP) - 500 081

Technical round

1.------- is associated with webservices.

a) WSDL

Page 4: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

b) WML c) web sphere d) web logic

2.Any large single block of data stored in a database, such as a picture or sound file, which does not include record fields, and cannot be directly searched by the database’s search engine.

a) TABLE b) BLOB c) VIEW d) SCHEME

3.Areserved area of the immediate access memeory used to increase the running speed of the computer program.

a) session memory b) bubble memory c) cache memory d) shared memory

4.A small subnet that sit between atrusted internal network and an untruster external network, such as the public internet.

a) LAN b) MAN c) WAN d) DMZ

5.Technologies that use radio waves to automatically identify people or objects,which is very similar to the barcode identification systems,seen in retail stores everyday.

a)BLUETOOTH b) RADAR c)RSA SECURE ID d)RFID

6.main(){float fl = 10.5;double dbl = 10.5if(fl ==dbl)printf(“UNITED WE STAND”);elseprintf(“DIVIDE AND RULE”)}what is the output?

a)compilation error b)UNITED WE STAND c)DIVIDE AND RULE d)linkage error.

7.main(){static int ivar = 5;printf(“%d”,ivar--);if(ivar)main();}

Page 5: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

what is the output?

a)1 2 3 4 5 b) 5 4 3 2 1 c)5 d)compiler error:main cannot be recursive function.

8.main(){extern int iExtern;iExtern = 20;printf(“%d”,iExtern);}what is the output?

a)2 b) 20 c)compile error d)linker error

9..#define clrscr() 100main(){clrscr();printf(“%d\n\t”, clrscr());}what is the output?

a)100 b)10 c)compiler errord)linkage error

10.main(){void vpointer;char cHar = ‘g’, *cHarpointer = “GOOGLE”;int j = 40;vpointer = &cHar;printf(“%c”,*(char*)vpointer);vpointer = &j;printf(“%d”,*(int *)vpointer);vpointer = cHarpointer;printf(“%s”,(char*)vpointer +3);}what is the output?

a)g40GLE b)g40GOOGLE c)g0GLE d)g4GOO

11.#define FALSE -1#define TRUE 1#define NULL 0main() {if(NULL)

Page 6: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

puts(“NULL”);else if(FALSE)puts(“TRUE”);elseputs(“FALSE”);}what is the output?

a)NULL b)TRUE c)FALSE d)0

12.main() {int i =5,j= 6, z;printf(“%d”,i+++j);}what is the output?a)13 b)12 c)11 d)compiler error

13.main() {int i ;i = accumulator();printf(“%d”,i);}accumulator(){_AX =1000;}what is output?

a)1 b)10 c)100 d)1000

14.main() {int i =0;while(+(+i--)!= 0)i- = i++;printf(“%d”,i);}what is the output?a)-1 b)0 c)1 d)will go in an infinite loop

15.main(){int i =3;for(; i++=0;)printf((“%d”,i);}what is the output?

a)1b)2c)1 2 3

Page 7: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

d)compiler error:L value required.

16.main(){int i = 10, j =20;j = i ,j?(i,j)?i :j:j;printf(“%d%d”,i,j);}what is the output?a)20 b)20 c)10 d)10

17.main(){extern i;printf(“%d\t”,i);{int i =20;printf(“%d\t”,i);}}what is output?

a) “Extern valueof i “ 20 b)Externvalue of i”c)20d)linker Error:unresolved external symbol i

18.int DIMension(int array[]){return sizeof(array/sizeof(int);}main(){int arr[10];printf(“Array dimension is %d”,DIMension(arr));}what is output?

a)array dimension is 10 b)array dimension is 1c) array dimension is 2 d)array dimension is 5

19.main(){void swap();int x = 45, y = 15;swap(&x,&y);printf(“x = %d y=%d”x,y);}void swap(int *a, int *b){*a^=*b, *b^=*a, *a^ = *b;what is the output?

a) x = 15, y =45 b)x =15, y =15 c)x =45 ,y =15 d)x =45 y = 45

20.main(){

Page 8: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

int i =257;int *iptr =&i;printf(“%d%d”,*((char*)iptr),*((char *)iptr+1));}what is output?a)1, 257 b)257 1c)0 0d)1 1

21.main(){int i =300;char *ptr = &i;*++ptr=2;printf(“%d”,i);}what is output?

a)556 b)300 c)2 d)302

22.#includemain(){char *str =”yahoo”;char *ptr =str;char least =127;while(*ptr++)least = (*ptrprintf(“%d”,least);}what is the output?

a)0 b)127 c)yahoo d)y

23.Declare an array of M pointers to functions returing pointers to functions returing pointers to characters.a)(*ptr[M]()(char*(*)()); b)(char*(*)())(*ptr[M])()c)(char*(*)(*ptr[M]())(*ptr[M]() d)(char*(*)(char*()))(*ptr[M])();

24.void main(){int I =10, j=2;int *ip = &I ,*jp =&j;int k = *ip/*jp;printf(“%d”,k);}what is the output?

a)2

Page 9: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

b)5 c)10 d)compile error:unexpected end of file in comment started in line 4

25.main(){char a[4] =”GOOGLE”;printf(“%s”,a);}what is the output?

a)2 b) GOOGLE c) compile error: yoo mant initializers d) linkage error.

26.For 1MB memory, the number of address lines required

a)12 b)16 c)20 d)32

27.There is a circuit using 3 nand gates with 2 inputes and 1 output,f ind the output.

a) AND b) OR c) XOR d) NAND

28.what is done for push operation

a) SP is incremented and then the value is stored.b) PC is incremented and then the value is stored.c) PC is decremented and then the value is stored.d) SP is decremented and then the value is stored.

29.Memory allocation of variables declared in a program is ------

a) Allocated in RAMb) Allocated in ROMc) Allocated in stackd) Assigned in registers.

30.What action is taken when the processer under execution is interrupted by TRAP in 8085MPU?

a) Processor serves the interrupt request after completing the execution of the current instruction.b) processer serves the interrupt request after completing the current task.c) processor serves the interrupt immediately.d) processor serving the interrupt request depent deprnds upon the priority of the current task under execution.

31.purpose of PC (program counter)in a microprocessor is ----

a) To store address of TOS(top of stack)

Page 10: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

b) To store address of next instructions to be executedc) count the number of instructionsd) to store the base address of the stack.

32.conditional results after execution of an instruction in a microprocess is stored in

a) register b) accumulator c) flag register d) flag register part of PSW (program status word)

33.The OR gate can be converted to the NAND function by adding----gate(s)to the input of the OR gate.

a) NOT b) AND c) NOR d) XOR

34.In 8051microcontroller ,------has a dual function.

a) port 3 b) port 2 c) port 1 d) port 0

35.An 8085 based microprocessor with 2MHz clock frequency,will execute the following chunk of code with how much delay?MVI B,38HHAPPY: MVI C, FFHSADDY: DCR CJNZ SADDYDCR BJNC HAPPY

a) 102.3 b)114.5 c)100.5 d)120

36.In 8085 MPU what will be the status of the flag after the execution of the following chunk of code.

MVI B,FFHMOV A,BCMAHLT

a)S = 1, Z = 0, CY = 1 b)S = 0, Z = 1, CY = 0c) S = 1, Z = 0, CY = 0 d)S = 1, Z = 1 ,CY = 1

37.A positive going pulse which is always generated when 8085 MPU begins the machine cycle.

a) RD

Page 11: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

b) ALE c) WR d) HOLD

38.when a ----- instruction of 8085 MPU is fetched , its second and third bytes are placed in the W and Z registers.

a) JMP b) STA c) CALL d) XCHG

39.what is defined as one subdivision of the operation performed in one clock period.

a) T- State b) Instruction Cycle c) Machine Cycle d) All of the above

40.At the end of the following code, what is the status of the flags.LXI B, AEC4HMOV A,CADD BHLT

a) S = 1, CY = 0, P = 0 , AC = 1 b) S =0 , CY = 1, P = 0,AC = 1c) S = 0, CY = 1, P = 0 , AC = 1 d) S = 0, CY = 1, P = 1 , AC = 1

41. In 8051 micro controller what is the HEX number in the accumulator after the execution of the following code.MOV A,#0A5HCLR CRRC ARRC ARL ARL ASWAP A

a)A6 b)6A c)95 d)A5.

42. The Pentium processor requires ------------ volts.

a)9 b)12 c)5 d)24.

43. The data bus on the Celeron processor is-------bits wide.

Page 12: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

a)64 b)32 c)16 d)128.

44. K6 processor

a) Hitachi b) toshiba c) zilog d) AMD.

45. What is the control word for 8255 PPI,in BSR mode to set bit PC3.

a)0EH b)0FH c)07H d)06H.

46. The repeated execution of a loop of code while waiting for an event to occur is called ---------.The cpu is not engaged in any real productive activity during this period,and the process doesn’t progress towards completion.

a) dead lock b) busy waiting c) trap door d) none.

47. Transparent DBMS is defined as

a) A DBMS in which there are no program or user access languages. b) A DBMS which has no cross file capabilities but is user friendly and provides user interface management. c) A DBMS which keeps its physical structure hidden from user d) none.

48. Either all actions are carried out or none are.users should not have to worry about the effect of incomplete transctions.DBMS ensures this by undoing the actions of incomplete transctions.this property is known as

a) Aggregation b) atomicity c) association d) data integrity.

49..------ algorithms determines where in available to load a program. common methods are first fit,next fit,best fit.--------- algorithm are used when memory is full , and one process (or part of a process) needs to be swaped out to accommodate a new program.The ------------- algorithm determines which are the partions to be swaped out.

a) placement, placement, replacementb) replacement, placement, placementc) replacement, placement, replacement

Page 13: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

d) placement, replacement, replacement

50. Trap door is a secret undocumented entry point into a program used to grant access without normal methods of access authentication.A trap is a software interrupt,usually the result of an error condition.

a)true b)false.

51. Given a binary search tree,print out the nodes of the tree according t5o post order traversal.

4/ \2 5/ \1 3

a)3,2,1,5,4. b)1,2,3,4,5. c)1,3,2,5,4. d)5,3,1,2,4.

52. Which one of the following is the recursive travel technique.

a)depth first search b)preorder c)breadth first search d)none.

53. which of the following needs the requirement to be a binary search tree.

a) 5/ \2 7/1

b) 5/ \6 7

c) 5/ \2 7/\1 6

d) none.

54. In recursive implementations which of the following is true for saving the state of the steps

a)as full state on the stackb) as reversible action on the stackc)both a and bd)none

Page 14: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

55. which of the following involves context switch

a)previliged instructionb)floating point exceptionc)system callsd)alle)none

56. piggy backing is a technique for

a)acknowledgeb)sequencec)flow controld)retransmission

57. a functional dependency XY is ___________dependency if removal of any attribute A from X means that the dependency does not hold any more

a)full functionalb) multi valuedc)single valuedd)none

58. a relation schema R is in BCNF if it is in ___________and satisfies an additional constraints that for every functional dependency XY,X must be a candidate key

a)1 NFb)2 NFc)3 NFd)5 NF

59. a _________sub query can be easily identified if it contains any references to the parent sub query columns in the _________ clause

A) correlated ,WHEREb) nested ,SELECTc) correlated,SELECTd) none

60. hybrid devise that combines the features of both bridge and router is known as

a)router b)bridge c)hub d)brouter

61. Which of the following is the most crucial phase of SDLC

a)testing b)code generation c) analysys and design d)implementation

Page 15: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

62. To send a data packet using datagram ,connection will be established

a)no connection is requiredb) connection is not established before data transmissionc)before data transmissiond)none

63. A software that allows a personal computer to pretend as as computer terminal is

a) terminal adapterb)terminal emulationc)modemd)none

64. super key is

a) same as primary keyb) primary key and attributec) same as foreign keyd) foreign key and attribute

65. In binary search tree which traversal is used for ascending order values

a) Inorder b)preorder c)post order d)none

66. You are creating an index on ROLLNO colume in the STUDENT table.which statement will you use?

a) CREATE INDEX roll_idx ON student, rollno;b) CREATE INDEX roll_idx FOR student, rollno;c) CREATE INDEX roll_idx ON student( rollno);d) CREATE INDEX roll_idx INDEX ON student (rollno);

67. A________class is a class that represents a data structure that stores a number of data objects

a. container b.component c.base d.derived

68. Which one of the following phases belongs to the compiler Back-end.

a. Lexical Analysis b.Syntax Analysis c. Optimization d.Intermediate Representation.

69. Every context _sensitive language is context_free

a. true b.false

Page 16: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

70. Input:A is non-empty list of numbers L

Xß-infinityFor each item in the list L,doIf the item>x,thenXßthe itemReturn XX represents:-

a)largest numberb)smallest numberc)smallest negative numberd) none

71. Let A and B be nodes of a heap,such that B is a child of A. the heap must then satisfy the following conditions

a)key(A)>=key(B)b)key(A)c)key(A)=key(B)d)none

72. String ,List,Stack,queue are examples of___________

a)primitive data typeb)simple data typec)Abstract data typed)none

73. which of the following is not true for LinkedLists?

a)The simplest kind of linked list is a single linked list ,which has one link per node .this link points to the next node in the list,or to a null value or emptylist if it is the last node.b)a more sophisticated kind of linked list is a double linkedlist or two way linkedlist .Each node has two links ,one to the previous node and one to the next node.c) in a circleLinkedList ,the first and last nodes are linked together.this can be done only for double linked list.d) to traverse a circular linkedlist ,u begin at any node and follow the list in either direction until u return to the original node.

74. sentinel node at the beginning and /or at the end of the linkedlist is not used to store the data

a) trueb) falseLogged

 1.         Most important advantage of an IC is its            A.        Easy replacement in case of circuit failure            B.        Extremely high reliability            C.        Reduced cost            D.        Low power consumption

Page 17: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

            E.         None of the above            Ans-B 2.         Which programming language is much in vogue among users of microcomputers            A.        ALGOL            B.        APL            C.        LOGO            D.        FORTH            E.         None of the above            Ans-D 3.         Multiplication of 1112 by 1012 is            A.        1100112            B.        1000112            C.        1111002            D.        0001012            E.         None of the above            Ans-B 4.         A computer-controlled device for training exercises that duplicates the work environment is a:            A.        simulator            B.        duplicator            C.        trainer            D.        COM device            E.         None of the above            Ans-A 5.         The latest PC keyboards use a circuit that senses the movement by the change in its capacitance. What are these keyboards called?            A.        Capacitance keyboards            B.        Mechanical keyboards            C.        Qwerty keyboards            D.        Dvorak keyboards            E.         None of the above            Ans-A 6.         Find the output of the programchar *foo(){  char result[100]);  strcpy(result,"anything is good");                                         return(result);}

Page 18: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

void main(){  char *j;  j=foo()  printf("%s",j);} 7.         Find the output of the programvoid main(){  char *s[]={ "dharma","hewlett-packard","siemens","ibm"};  char **p;  p=s;  printf("%s",++*p);  printf("%s",*p++);  printf("%s",++*p);} 8.         write 7*a in terms  of +,-,<<   9.         What is Creon and what is the difference between 'at' command. 10.       Find the output of the programmain(){char *s1 = "hello",*s2 ="abce";strcpy(s1,"");             s2[0] = s1[0];  printf("%d%d",strlen(s1),strlen(s2)); } 11.       What was originally called the "imitation game" by its creator?            A.        The Turing Test            B.        LISP            C.        The Logic Theorist            D.        Cybernetics            E.         None of the above            Ans-A 12.       Find the output of the programvoid main(){  unsigned i=1; /* unsigned char k= -1 => k=255; */

Page 19: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

  signed j=-1; /* char k= -1 => k=65535 *//* unsigned or signed int k= -1 =>k=65535 */                                 if(i<j)  printf("less");elseif(i>j)  printf("greater");elseif(i==j)  printf("equal");}Ans-less 13.       A number that is used to control the form of another number is known as            A.        Map            B.        Mask            C.        Mamtossa            D.        Marker            E.         None of the above            Ans-B 14.       ASCII stands for            A.        American standard code for information interchange            B.        All purpose scientific code for information interchange            C.        American security code for information interchange            D.        American Scientific code for information interchange            E.         None of the above            Ans-A 15.       The list of coded instructions is called            A.        Computer program            B.        Algorithm            C.        Flowchart            D.        Utility programs            E.         None of the above            Ans-A 16.       In LISP, the atom that stands for "true" is            A.        t            B.        ml            C.        y            D.        time

Page 20: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

            E.         None of the above            Ans-A 17.       Which two files are used during operation of the DBMS?            A.        query language and utilities            B.        data manipulation language and query language            C.        data dictionary and transaction log            D.        data dictionary and query language            E.         None of the above            Ans_C 18.       A network schema            A.        restricts the structure to a one-to-many relationship            B.        permits many-to-many relation¬ships            C.        stores data in tables            D.        All of the above            E.         None of the above            Ans_B 19.       self-relocating program is one which            A.        cannot be made to execute in any area of storage other than the one            designated for it at the time of its coding or translation            B.        consists of a program and relevant information for its relocation            C.        can itself perform the relocation of its address-sensitive portions            D.        All of the above            Ans-C 20.       Write a program to exchange the values of two variables using pointers. 21.       Write program to open one file input some numbers and find smallest, largest, avg. and store them in another file 22.       Write a program to reverse a string co-ordinate geometry. 23.       Find the output of the program#includemain(){int x=20, t;&t=x;x=50;cout<<x<<" "<<t;}

Page 21: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

  24.       What hardware architectures are not supported by Ret Hat?            A.        SPARC            B.        IBM-compatible            C.        Alpha            D.        Macintosh            E.         None of the above            Ans-D 25.       What command do you use to create Linux file systems?            A.        fdisk            B.        mkfs            C.        fsck            D.        mount            E.         None of the above            Ans-D 26.       Find the output of the program#include<stdio.h>main(){char *p1;char *p2;p1=(char *) malloc(25);p2=(char *) malloc(25);strcpy(p1,"Ramco");strcpy(p2,"Systems");strcat(p1,p2);printf("%s",p1);} 27.       What command is used to count just the number of lines contained in a file?(Linux)            A.        wc - r            B.        wc - w            C.        wc - c            D.        wc - l            E.         None of the above            Ans-D 28.       The probability that a single bit will be in error on a typical public telephone line using 4800 bps modem is 10 to the power -3. If no error detection mechanism is used, the residual error rate for a communication line using 9-bit frames is approximately equal to

Page 22: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

            A.  0.003                     C.  0.991            B.  0.009                     D.  0.999            Ans-B 29.       which of the following condition is used to transmit two packets over a medium at the same time?            A.        Contention            B.        Collision            C.        Synchronous            D.        Asynchronous            E.         None of the above            Ans-B Questions 30 -34 are reference to the following pseudo code{input m,n,zTEST:if ((m+n)/3&gt;5)z=z+1 else z =z-1printf m,n,z{(m-m+1;n=n-3)if (m+n+2)>14 then goto testprint m,n,zend} 30.       How many times the TEST exacted if the input is 1,18,2?Ans- four times 31.       What are the values taken by Z when input being 8,24,1?a) only 5          b) only 6          c) neither 5 or 6           d) both 5 and 6ans-D. 32.       what is the final output if the input is 1,18,2? (m,n,z)ans-  5,6,2 33.       what is the final output of the if the input is 2,14,12 (m,n,z)a)1,8,4                         b)1,4,8                         c)4,8,1 d                      )8,4,2ans=C. 34.       How many times is TEST execute ed if the input is 2,14,1?ans) twice 

Page 23: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

35.       What will be thethe remainder when 9FA (hexa) is divided by 8 is added to the  12(to base ten) to get x.then x has the binary operation 36.       Find the odd man outa) Intel                         b)motorola       c)nec                d)Ibmans =nec 37.       Find the output of the programmain(){int i=3printf (&quot;%d %d %d &quot;,++i,i-,i+=5);} 38.       Find the output of the programmain(){int times =5;int i=3;int j=4;int k=34;i=j+k;while(times --){i=timesj=timesk=times}printf(&quot;%d %d %d &quot; ,i,j,k)} 39.       Find the outputmain(){int number =25;char name ='A'printf("The addition of the name and the number is %o "name +_number)}Ans-Compiler error 40.       computer viruses can spread from one system to anther by means of            a)         Infected disks            b          )links to a network

Page 24: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

            c)         downloaded program from a bulletin board            d          )all of the program            ans)D 41.       what do you mean by exception handling? 42.       What are "pure virtual" functions? 43.       What is the difference between member functions and static member functions? 44.       What is the4 difference between delete[] and delete? 45.       Difference between function overloading and function overriding. 46.       How to invoke a C function using a C++ program? 47.       Convert 0.9375 to binary   a) 0.0111   b) 0.1011    c) 0.1111    d) none    Ans. (c) 48.       In C,  "X ? Y : Z "  is equal to    a) if (X==0) Y ;else Z    b) if (X!=0) Y ;else Z    c) if (X==0) Y ; Z    Ans. (b) 49.       The  following function gives some error. What changes have to be made            void ( int a,int b)                {                    int t; t=a; a=b; b=t;                }    a) define void as int and write return t    b) change everywhere a to *a and b to *b 50.       Which of the following is incorrect        a) if a and b are defined as int arrays then (a==b) can never be true        b) parameters are passed to functions only by values        c) defining functions in nested loops 

Page 25: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

51.       #include<stdio.h>        void swap(int*,int*);        main()            {                int arr[8]={36,8,97,0,161,164,3,9}                for (int i=0; i<7; i++)                    {                for (int j=i+1; j<8;j++)                if(arr[i]<arr[j]) swap(&arr[i],&arr[j]);                    }            }               void swap(int*x,int*y)            {                int temp; static int cnt=0;                temp= *x;                *x=*y;                *y=temp;                cnt++;            }    What is cnt equal to 52.       int main()                {                    FILE *fp;                    fp=fopen("test.dat","w");                    fprintf(fp,'hello\n");                    fclose(fp);                    fp=fopen ("test.dat","w");                    fprintf (fp, "world");                    fclose(fp);                    return 0;                }If text.dat file is already present after compiling and execution how many bytes does the file occupy ?            a) 0 bytes            b) 5 bytes            c) 11 bytes            d) data is insufficient 53.       Find the output of the programf1(int*x,intflag)            int *y;            *y=*x+3;

Page 26: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

            switch(flag)                {                    case 0:                    *x=*y+1;                    break;                    case 1:                    *x=*y;                    break;                    case 2:                     *x=*y-1;                      break;                }        return(*y)                   main()            {                *x=5;                i=f1(x,0); j=f1(x,1);                printf("%d %d %d ",i,j,*x);            } 54.       What does the following program print?#include <stio.h>int sum,count;void main(void){< BR> for(count=5;sum+=--count;)printf("%d",sum);} 55.       What is the output of the following program?#include <stdio.h>void main(void){int i;< BR> for(i=2;i<=7;i++)printf("%5d",fno());}fno(){staticintf1=1,f2=1,f3;return(f3=f1+f2,f1=f2,f2=f3);} 

Page 27: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

56.       What is the output of the following program?#include <stdio.h>#include <string.h>int foo(char *);void main (void){char arr[100] = {"Welcome to CSC"};foo (arr);}foo (char *x){printf ("%d\t",strlen (x));printf ("%d\t",sizeof(x));return0;} 57.       What is the output of the following program?#include <stdio.h>#define sum (a,b,c) a+b+c#define avg (a,b,c) sum(a,b,c)/3#define geq (a,b,c) avg(a,b,c) >= 60#define lee (a,b,c) avg(a,b,c) <= 60#define des (a,b,c,d) (d==1?geq(a,b,c):lee(a,b,c))void main (void){int num = 70;char ch = '0';float f = 2.0;if des(num,ch,f,0) puts ("lee..");else puts("geq...");} 58.       What does the following program print?#include <stdio.h>char *rev(int val);void main(void){extern char dec[];printf ("%c", *rev);}char *rev (int val){

Page 28: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

char dec[]="abcde";return dec;} 59.       What does the following program print?#include<stdio.h>void main(void){enum sub{chemistry, maths, physics};struct result{char name[30];enum sub sc;};struct result my_res;strcpy (my_res.name,"Patrick");my_res.sc=physics;printf("name: %s\n",my_res.name);printf("pass in subject: %d\n",my_res.sc);} 60.       What is the output of the following program?#include <stdio.h>void swap (int x, int y, int t){t = x;x = y;y = t;printf ("x inside swap: %d\t y inside swap : %d\n",x,y);}void main(void){int x;int y;int t;x = 99;y = 100;swap (x,y,t);printf ("x inside main:%d\t y inside main: %d",x,y);

Page 29: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

}a. x inside swap : 100 y inside swap : 99 x inside main : 100 y inside main : 99b. x inside swap : 100 y inside swap : 99 x inside main : 99 y inside main : 100c. x inside swap : 99 y inside swap : 100 x inside main : 99 y inside main : 100d. x inside swap : 99 y inside swap : 100 x inside main : 100 y inside main : 99e. Not sure 61.       What does the following program print?#include <stdio.h>struct my_struct{int p:1;int q:1;int r:6;int s:2;};struct my_struct bigstruct;struct my_struct1{char m:1;};struct my_struct1 small struct;void main (void){printf ("%d %d\n",sizeof (bigstruct),sizeof (smallstruct));} 62.       What is the output of the following program?#include <stdio.h>void main (void){short x = 0x3333;short y = 0x4321;long z = x;z = z << 16;z = z | y;printf("%1x\t",z);z = y;z = z >> 16;z = z | x;printf("%1x\t",z);z = x;

Page 30: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

y = x && y;z = y;printf("%1x\t",z);} 63.       What is the output of the following program?#include <stdio.h>void main (void){char *p = "Bangalore";#if 0printf ("%s", p);#endif} 64.       What is the return type of calloc function?            a. int *            b. void *            c. no return type: return type is void            d. int e. Not sure 65.       If x is declared as an integer, y is declared as float, consider the following expression:y = *(float *)&x; Which one of the following statments is true?            a. the program containing the expression produces compilation errors;            b. the program containing the expression produces runtime errors;            c. the program containing the expression compiles and runs without any errors;            d. none of the above e. Not sure 66.       Which of the following refers to the associative memory?            A.        the address of the data is generated by the CPU            B.        the address of the data is supplied by the users            C.        there is no need for an address i.e. the data is used as an address            D.        the data are accessed sequentially            E.         None of the above            Ans-C 67.       To avoid the race condition, the number of processes that may be simultaneously inside their critical section is            A.        8            B.        1            C.        16

Page 31: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

            D.        0            E.         None of the above            Ans-B 68.       Which one of the following kinds of materials has the lowest permeability?A.        A diamagnetic materialB.        A paramagnetic materialC.        A feiTomagnetic materialD.        All of the aboveE.         None of the aboveAns-A 69.       he total impedance of a parallel RLC circuit:            A.        always increases as the applied frequency increases            B.        is equal to the sum of the values of resistance, inductive reactance and capacitive  reactance            C.        always decreases as the applied frequency increases            D.        is maximum at the resonant frequency            E.         None of the above            Ans-D 70.       he rise time of a pulse waveform is the time required for the voltage to rise:            A.        from zero to its rms value            B.        from zero to its peak value            C.        from 10% of the peak value to 70.7% of the peak value            D.        from 10% of the peak value to 90% of the peak value            E.         None of the above            Ans-D 71.       Which of the following is(are) true of the EDP auditors?            A.        they should have computer expertise            B.        they will be replaced by traditional auditors in the near future            C.        two of the above            D.        currently, there is a very high demand for them, particularly from firms that use personal computers            E.         None of the above            Ans-A 72.       A lockbox service is used for            A.        depositing cash when bank is closed            B.        paying bank customer bills automatically            C.        storing papers in a bank vault            D.        depositing payments to bank customers

Page 32: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

            E.         None of the above            Ans-D 73.       Which of the following symbol modes are used to input of graphics to General CAD system?            A.        Live and Rectangle mode            B.        Arc and Circle mode            C.        Dimension and Alphanumeric mode            D.        All of the above            E.         None of the above            Ans-D 74.       What will be the output of the program?public class Test{    public static int y;    public static void foo(int x)    {        System.out.print("foo ");        y = x;    }    public static int bar(int z)    {        System.out.print("bar ");        return y = z;    }    public static void main(String [] args )    {        int t = 0;        assert t > 0 : bar(7);        assert t > 1 : foo(8); /* Line 18 */        System.out.println("done ");    }}            Ans-foo done 75.       Which of the following would compile without error?            A.        int a = Math.abs(-5);            B.        int b = Math.abs(5.0);            C.        int c = Math.abs(5.5F);            D.        int d = Math.abs(5L);            Ans-A 

Page 33: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

 Aptitude 1.         One year ago, the ratio of Roonie’s and Ronaldo’s age was 6: 7 respectively. Four years hence, this ratio would become 7: 8. How old is Ronaldo ?            Ans-36 years 2.         In what ratio must rice at Rs. 9.30 per kg be mixed with rice at Rs. 10.80 per kg so that the mixture be worth Rs. 10 per kg ?Ans-8:7 3.         The milk and water in two vessels A and B are in the ratio 4 : 3 and 2: 3 respectively. In what ratio, the liquids in both the vessels be mixed to obtain a new mixture in vessel C containing half milk and half water?Ans-7:5 4.         One side of a rectangular field is 15 m and one of its diagonals is 17 m. Find the area of the field.Ans-120m2 5.         A rectangular grassy plot 110 m. by 65 m has a gravel path 2.5 m wide all round it on the inside. Find the cost of gravelling the path at 80 paise per sq. metreAns- Rs 680 6.         There are two sections A and B of a class consisting of 36 and 44 students respectively. If the average weight of section A is 40kg and that of section B is 35kg, find the average weight of the whole class?Ans-37.25 kg 7.         Of the three numbers, second is twice the first and is also thrice the third.If the average of the three numbers is 44.Find the largest number.Ans-72 8.         Find the odd man out. 3, 5, 11, 14, 17, 21Ans-14 9.         Find out the wrong number in the given sequence of numbers.           1, 8, 27, 64, 124, 216, 343Ans-124   

Page 34: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

10.       Insert the missing number.           8, 7, 11, 12, 14, 17, 17, 22, (....)Ans-B 11.       Two cards are drawn at random from a pack of 52 cards.what is the probability that either both  are black or both are queen?Ans-55/221 12.       A bag contains 6 white and 4 black balls .2 balls are drawn at random. find the probability that they are of same colour.Ans-7/15 13.       . In a km race, A beats B by 28 metres or 7 seconds. Find A's time over the course.Ans-4 min 3 sec 14.       A, Band C  are three contestants in a km race. If A can give B a start of 40 m   and A can give C  a start of 64m  how many metre's  start can B give C ?15.       If a : b = 5 : 9 and b : c = 4: 7, find a : b : c.Ans-20:36:63 16.       A bag contains 50 p, 25 P and 10 p coins in the ratio 5: 9: 4, amounting to Rs. 206. Find the number of coins of each typeAns- Number of 50 p coins = 360;         Number of 10 p coins = 160 17.       What was the day of the week on 17th June, 1998?            A.        Monday                      B.        Tuesday            C.        Wednesday                D.        Thursday            Ans-C 18.       The calendar for the year 2007 will be the same for the year:            A.        2014               B.        2016            C.        2017               D.        2018            Ans-D 19.       Find the angle between the hour hand and the minute hand of a clock when 3.25. 20.       At what time between 4 and 5 o'clock will the hands of a clock be at right angle?Ans-40/11 min. past 4.

Page 35: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

 21.       Find at what time between 8 and 9 o'clock will the hands of a clock being  the same straight line but not togetherAns-120/11 min 22.       Find compound interest on Rs. 7500 at 4% per annum for 2 years, compounded annually.Ans-RS612 23.       Find the compound interest on Rs. 10,000 in 2 years at 4% per annum, the  interest being compounded half-yearly.Ans-Rs 824.32 24.       In what time will Rs. 1000 become Rs. 1331 at 10% per annum compounded annually?Ans-3 years 25.       The difference between the compound interest and simple interest on a certain sum at 10% per annum for 2 years is Rs. 631. Find the sum.Ans- Rs631,00 26.       The sum of a rational number and its reciprocal is 13/6. Find the numberAns-2/3 ot 3/2 27.       If the sum of two numbers is 42 and their product is 437, then find the absolute  difference between the numbersAns-4 28.       The average  of  four consecutive even numbers is 27. Find the largest of these numbers.Ans-30 29.       Of two numbers, 4 times the smaller one is less then 3 times the 1arger one by 5. If the sum of  the numbers is larger than 6 times their difference by 6, find the two numbers.Ans-59 & 43 30.       If three numbers are added in pairs, the sums equal 10, 19 and 21. Find the numbers Ans-6, 4 & 15 31.       Simplify :        (i) 8888 + 888 + 88 + 8                               (ii) 11992 - 7823 - 456  32.       What could be the maximum value of Q in the following equation?          5P9 + 3R7 + 2Q8 = 1114Ans-9 33.       An electric pump can fill a tank in 3 hours. Because of a leak in ,the tank it took 3(1/2) hours to fill the tank. If the tank is full, how much time will the leak take  to empty it

Page 36: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

Ans-21 hrs 34.       Two pipes A and B can fill a tank in 36 min. and 45 min. respectively. A water  pipe C can empty the tank in 30 min. First A and B are opened. after 7 min,C is also opened. In how much time, the tank is full?Ans-39 min 35.       Simplify :(log 75/16-2 log 5/9+log 32/243) 36.       Find the value of x which satisfies the relationLog10 3+log10 (4x+1)=log10 (x+1)+1Ans-7/2 37.       If log10 2=0.30103,find the value of log10 50Ans-1.69897 38.       Peter can cover a certain distance in 1 hr. 24 min. by covering two-third of the distance at 4 kmph and the rest at 5 kmph. Find the total distance.Ans-6 km 39.       Arrange the fractions 5/8, 7/12, 13/16, 16/29 and 3/4 in ascending order of magnitude.Ans-16/29 < 7/12 < 5/8 < 3/4 < 13/16 40.       Complete the sudoku          

Point out the error in the following program

main(){const char *fun();*fun()='A';

Page 37: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

}const char *fun(){return "Hello";}Ans. fun() returns to a "const char" pointer which cannot be modified2. What would be the output of the following program?

main(){const int x=5;int *ptrx;ptrx=&x;*ptrx=10;printf("%d",x);}a) 5 b) 10 c) Error d) Garbage value3. A switch statement cannot include

a) constants as arguments b) constant expression as argumentsc) string as an argument d) None of the above

4. How long the following program will run?

main(){printf("\nSonata Software");main();}a) infinite loop b) until the stack overflowsc) All of the above d) None of the above

5. On combining the following statements, you will get char*p; p=malloc(100);

a) char *p= malloc(100) b) p= (char*)malloc(100)c) All of the above d) None of the above

6.Point out the error in the following program

main(){int a=10;void f();a=f();printf("\n%d",a);}void f(){printf("\nHi");}Ans. The program is trying to collect the value of a "void" function into an integer variable.

7. In the following program how would you print 50 using p?

main(){int a[]={10, 20, 30, 40, 50};char *p;p= (char*) a;}Ans. printf("\n%d",*((int*)p+4));

8. Would the following program compile?

main()

Page 38: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

{int a=10,*j;void *k;j=k=&a;j++;k++;printf("\n%u%u",j,k);}a) Yes b) No, the format is incorrectc) No, the arithmetic operation is not permitted on void pointersd) No, the arithmetic operation is not permitted on pointers

9. According to ANSI specifications which is the correct way of declaring main() when it receives command line arguments?

a) main(int argc, char *argv[]) b) main(argc,argv) int argc; char *argv[];c) main() {int argc; char *argv[]; } d) None of the above

10. What error would the following function give on compilation?

f(int a, int b){int a;a=20;return a;}a) missing parenthesis in the return statement b) The function should be declared as int f(int a, int b)c) redeclaration of a d) None of the above

11.  If the program (myprog) is run from the command line as myprog 1 2 3 , What would be the output?

main(int argc, char *argv[]){int i;for(i=0;i<argc;i++)printf("%s",argv[i]);}a) 1 2 3 b) C:\MYPROG.EXE 1 2 3c) MYP d) None of the above

12. If the following program (myprog) is run from the command line as myprog 1 2 3, What would be the output?

main(int argc, char *argv[]){int i,j=0;for(i=0;i<argc;i++)j=j+ atoi(argv[i]);printf("%d",j);}a) 1 2 3 b) 6 c) error d) "123"

13. If the following program (myprog) is run from the command line as myprog monday tuesday wednesday thursday? What would be the output?

main(int argc, char *argv[]){while(--argc >0)printf("%s",*++argv);}a) myprog monday tuesday wednesday thursday b) monday tuesday wednesday thursdayc) myprog tuesday thursday d) None of the above

14. In the following code, is p2 an integer or an integer pointer?

Page 39: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

typedef int* ptrptr p1,p2;Ans. Integer pointer

15. If the following program (myprog) is run from the command line as myprog friday tuesday sunday, What would be the output?

main(int argc, char *argv[]){while(sizeofargv)printf("%s",argv[--sizeofargv]);}a) myprog friday tuesday sunday b) myprog friday tuesdayc) sunday tuesday friday myprog d) sunday tuesday friday

16. What would be the output of the following program?

main(){int i=4;switch(i){default:printf("\n A mouse is an elephant built by the Japanese");case 1:printf(" Breeding rabbits is a hair raising experience");break;case 2:printf("\n Friction is a drag");break;case 3:printf("\n If practice make perfect, then nobody's perfect");}}a) A mouse is an elephant built by the Japanese b) Breeding rabbits is a hare raising experiencec) All of the above d) None of the above

17. What is the output of the following program?

#define SQR(x) (x*x)main(){int a,b=3;a= SQR(b+2);printf("%d",a);}a) 25 b) 11 c) error d) garbage value

18. In which line of the following, an error would be reported?1. #define CIRCUM(R) (3.14*R*R);2. main()3. {4. float r=1.0,c;5. c= CIRCUM(r);6. printf("\n%f",c);7. if(CIRCUM(r))==6.28)8. printf("\nGobbledygook");9. }a) line 1 b) line 5 c) line 6 d) line 7

19. What is the type of the variable b in the following declaration?

#define FLOATPTR float*FLOATPTR a,b;a) float b) float pointer c) int d) int pointer

Page 40: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

20. In the following code;#include<stdio.h>main(){FILE *fp;fp= fopen("trial","r");}fp points to:a) The first character in the file.b) A structure which contains a "char" pointer which points to the first character in the file.c) The name of the file. d) None of the above.21. Input:A is non-empty list of numbers L

Xß-infinityFor each item in the list L,doIf the item>x,thenXßthe itemReturn XX represents:-

a)largest numberb)smallest numberc)smallest negative numberd) none

22. Let A and B be nodes of a heap,such that B is a child of A. the heap must then satisfy the following conditions

a)key(A)>=key(B)b)key(A)c)key(A)=key(B)d)none

23. String ,List,Stack,queue are examples of___________

a)primitive data typeb)simple data typec)Abstract data typed)none

24. which of the following is not true for LinkedLists?

a)The simplest kind of linked list is a single linked list ,which has one link per node .this link points to the next node in the list,or to a null value or emptylist if it is the last node.b)a more sophisticated kind of linked list is a double linkedlist or two way linkedlist .Each node has two links ,one to the previous node and one to the next node.c) in a circleLinkedList ,the first and last nodes are linked together.this can be done only for double linked list.d) to traverse a circular linkedlist ,u begin at any node and follow the list in either direction until u return to the original node.

25. sentinel node at the beginning and /or at the end of the linkedlist is not used to store the data

a) trueb) falseLogged

26.  which of the following is the most crucial phase of SDLC

a)testing b)code generation c) analysys and design d)implementation

27. to send a data packet using datagram ,connection will be established

a)no connection is required

Page 41: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

b) connection is not established before data transmissionc)before data transmissiond)none

28. a software that allows a personal computer to pretend as as computer terminal is

a) terminal adapterb)terminal emulationc)modemd)none

29. super key is

a) same as primary keyb) primary key and attributec) same as foreign keyd) foreign key and attribute

30. In binary search tree which traversal is used for ascending order values

a) Inorder b)preorder c)post order d)none

31. You are creating an index on ROLLNO colume in the STUDENT table.which statement will you use?

a) CREATE INDEX roll_idx ON student, rollno;b) CREATE INDEX roll_idx FOR student, rollno;c) CREATE INDEX roll_idx ON student( rollno);d) CREATE INDEX roll_idx INDEX ON student (rollno);

32. A________class is a class that represents a data structure that stores a number of data objects

a. container b.component c.base d.derived

13. Which one of the following phases belongs to the compiler Back-end.

a. Lexical Analysis b.Syntax Analysis c. Optimization d.Intermediate Representation.

14. Every context _sensitive language is context_free

a. true b.false

15. The repeated execution of a loop of code while waiting for an event to occur is called ---------.The cpu is not engaged in any real productive activity during this period,and the process doesn’t progress towards completion.

a) dead lock b) busy waiting c) trap door d) none.

16. Transparent DBMS is defined as

a) A DBMS in which there are no program or user access languages. b) A DBMS which has no cross file capabilities but is user friendly and provides user interface management. c) A DBMS which keeps its physical structure hidden from user d) none.

17. Either all actions are carried out or none are.users should not have to worry about the effect of incomplete transctions.DBMS ensures this by undoing the actions of incomplete transctions.this property is known as

a) Aggregation b) atomicity c) association d) data integrity.

18..------ algorithms determines where in available to load a program. common methods are first fit,next fit,best fit.--------- algorithm are used when memory is full , and one process (or part of a process) needs to be swaped out to accommodate a new program.The ------------- algorithm determines which are the partions to be swaped out.

a) placement, placement, replacementb) replacement, placement, placement

Page 42: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

c) replacement, placement, replacementd) placement, replacement, replacement

19. Trap door is a secret undocumented entry point into a program used to grant access without normal methods of access authentication.A trap is a software interrupt,usually the result of an error condition.

a)true b)false.

20. Given a binary search tree,print out the nodes of the tree according t5o post order traversal.

4/ \2 5/ \1 3

a)3,2,1,5,4. b)1,2,3,4,5. c)1,3,2,5,4. d)5,3,1,2,4.

21. which one of the following is the recursive travel technique.

a)depth first search b)preorder c)breadth first search d)none.

22. which of the following needs the requirement to be a binary search tree.

a) 5/ \2 7/1

b) 5/ \6 7

c) 5/ \2 7/\1 6

d) none.

23. in recursive implementations which of the following is true for saving the state of the steps

a)as full state on the stackb) as reversible action on the stackc)both a and bd)none

24. which of the following involves context switch

a)previliged instructionb)floating point exceptionc)system callsd)alle)none

25. piggy backing is a technique for

a)acknowledgeb)sequencec)flow controld)retransmission

26. a functional dependency XY is ___________dependency if removal of any attribute A from X means

Page 43: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

that the dependency does not hold any more

a)full functionalb) multi valuedc)single valuedd)none

27. a relation schema R is in BCNF if it is in ___________and satisfies an additional constraints that for every functional dependency XY,X must be a candidate key

a)1 NFb)2 NFc)3 NFd)5 NF

28. a _________sub query can be easily identified if it contains any references to the parent sub query columns in the _________ clause

A) correlated ,WHEREb) nested ,SELECTc) correlated,SELECTd) none

29. hybrid devise that combines the features of both bridge and router is known as

a)router b)bridge c)hub d)brouter

30. In 8051 micro controller what is the HEX number in the accumulator after the execution of the following code.MOV A,#0A5HCLR CRRC ARRC ARL ARL ASWAP A

a)A6 b)6A c)95 d)A5.

31. The Pentium processor requires ------------ volts.

a)9 b)12 c)5 d)24.

32. The data bus on the Celeron processor is-------bits wide.

a)64 b)32 c)16 d)128.

33. K6 processor

a) Hitachi b) toshiba c) zilog d) AMD.

34. What is the control word for 8255 PPI,in BSR mode to set bit PC3.

a)0EH b)0FH c)07H d)06H.What is the value of i if the function is called twice ? 35. Given the following c program func(int *i, int*j){*i=*i * *i;*j=*j* *j;}

main(){ int i = 5, j = 2;func(&i,&j);

Page 44: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

printf("%d %d", i, j);}

36. Find the outpur of the following C program void f(char *p){p=(char *) malloc(6);strcpy(p,"hello");}

void main( ){char *P="bye";f(p);printf("%s ,p);}

37. For the following C program int x(char *a){a=(char *) malloc(10*sizeof(char));*a="hello";}

main(){char *a="new";x(a);printf("%s",a);}

 The output is a) Hellob) Newc) Hello newd) Run time error

38. Find the error if any -{struct *sPtr, *nPtrfor(;*nPtr;nPtr=nPtr->next)free(nPtr);}

39. Find the output -main(){ void f(int, int);int i, j;i=10;j=10;f(++i,j++);}void f(int i, int j){if(i>50)return;elsei+=j;f(i,j);printf("%d",i);}Ans 413121

40. kernel executes the first process when system starts

ans :- init();

41.

      main()

Page 45: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

      { int i=1;      fork();      fork();      fork();      printf("%d",i);      }      how many times i will be printed

      ans:8

42In a sequential search, what is the average number of comparisons it takes to search through n elements ?

Ans: (n+1)/2.

43What is the size of the array declared as double * X[5] ?

Ans. 5 * sizeof ( double * )44. Find the output for the following C program

main{int x,j,k;j=k=6;x=2;x=j*k;printf(”%d”, x);

CSC Technical Questions with Answer1)#includemain(){int a=6,y=3,z;float t=4.55;z=a/y+t+a/y-t+a-2*t;printf("%d",z);}a. 3  b. 3.00000  c. 3.55    d.none   Ans: D 2).#include#define int printf("#int(intv)");main(){int x;float g;g=int xprintf("-------------");} 

Page 46: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

Ans: COMPIER ERROR 3) Main (){Static char a[3][4]={"abcd","mnop" ,"fghi"}Putchar(**a);}a)will not compile successfully  b)prints a c)prints m  d)prints garbageAns: b 4)main(){Int i=100;Int M();Printf("%d",(*M)(i));}      Int M(x)Int x;{Printf("%d",++x);}a)prints 100   b)prints 101 c)prints error d)prints 1013        5) main(){Int i=7If(0==fork())I+=10;Else{Wait(0);Printf("%d",i);}}a)i+=10 is executed by child onlyb)i+=10 is executed by parent onlyc)The child can start executing only after the termination of the parent process.d)none of the above 6) 27   |    8a) 27    b)8     c)2     d)none of the above

Page 47: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

 7) command in unix for removing all filesa)rm           b)rm*             c)rm *.* 8) which is used for storing pictures or graphicsa) mbr  b)mar  c)frame buffer  d)sdram 9) Pick the  odd man out.a)GPRS   b)GSM c)SIM   d)IDM Ans.D 10) if A=10000001 B=10000010  C=10000011 then what does the word  100000111000000110000010 mean.  Ans. CAB 11.#define FALSE -1#define TRUE 1 #define NULL 0main() {if(NULL)puts(“NULL”);else if(FALSE)puts(“TRUE”);elseputs(“FALSE”);}what is the output? a)NULL b)TRUE c)FALSE d)0  12.main() {int i =5,j= 6, z;printf(“%d”,i+++j);}what is the output?a)13 b)12 c)11 d)compiler error13.main() {int  i ;i = accumulator();printf(“%d”,i);

Page 48: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

}accumulator(){_AX =1000}what is output? a)1 b)10 c)100 d)1000 14.main() {int i  =0;while(+(+i--)!= 0)i- = i++;printf(“%d”,i);}what is the output? a)-1 b)0 c)1 d)will go in an infinite loop 15.main(){int i =3;for(; i++=0;)printf((“%d”,i);}what is the output? a)1b)2c)1 2 3d)compiler error:L value required.16.main(){int i = 10, j =20;j = i ,j?(i,j)?i :j:j;printf(“%d%d”,i,j);}what is the output? a)20 20 b)20 10 c)10 20 d)10 10 17.main(){extern i;printf(“%d\t”,i);{int i =20;printf(“%d\t”,i);}}what is output?

Page 49: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

 a)    “Extern valueof i “ 20 b)Externvalue of i”c)20d)linker Error:unresolved external symbol I 18.int DIMension(int array[]){return sizeof(array/sizeof(int);}main(){int arr[10];printf(“Array dimension is %d”,DIMension(arr));}what is output? a)array dimension is 10 b)array dimension is 1  c) array dimension is 2 d)array dimension is 5 19.main(){void swap();int x = 45, y = 15;swap(&x,&y);printf(“x = %d y=%d”x,y);}void swap(int *a, int *b){*a^=*b, *b^=*a, *a^ = *b;what is the output? a)    x = 15, y =45 b)x =15, y =15 c)x =45 ,y =15 d)x =45 y = 45 20.main(){int i =257;int *iptr =&i;printf(“%d%d”,*((char*)iptr),*((char *)iptr+1));}what is output? a)1, 257 b)257 1c)0 0d)1  1 21.main(){int i =300;char *ptr = &i;*++ptr=2;printf(“%d”,i);}what is output? 

Page 50: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

a)556 b)300 c)2 d)302 22.#includemain(){char *str =”yahoo”;char *ptr =str;char least =127;while(*ptr++)least = (*ptrprintf(“%d”,least);}what is the output? a)0   b)127   c)yahoo   d)y 23.Declare an array of M pointers to functions returing pointers to functions returing pointers to characters. a)(*ptr[M]()(char*(*)());   b)(char*(*)())(*ptr[M])()   c)(char*(*)(*ptr[M]())(*ptr[M]()    d)(char*(*)(char*()))(*ptr[M])(); 24.void main(){int I =10, j=2;int *ip = &I ,*jp =&j;int k = *ip/*jp;printf(“%d”,k);}what is the output? a)2    b)5    c)10    d)compile error:unexpected end of file in comment started in line 4 25.main(){char a[4] =”GOOGLE”;printf(“%s”,a);}what is the output? a)2 b) GOOGLE c) compile error: yoo mant initializers d) linkage error. 26.For 1MB memory, the number of address lines required a)12 b)16 c)20 d)32 

Page 51: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

27.There is a circuit using 3 nand gates with 2 inputes and 1 output,f ind the output. a) AND b) OR c) XOR d) NAND 28.what is done for push operation a) SP is incremented and then the value is stored.b) PC is incremented and then the  value is stored.c) PC is decremented and then the value is stored.d) SP is decremented and then the value is stored. 29.Memory allocation of variables declared in a program is ------ a) Allocated in RAMb) Allocated in ROMc) Allocated in stackd) Assigned in registers. 30.What action is taken when the processer under execution is interrupted by TRAP in 8085MPU? a) Processor serves the interrupt request after completing the execution of the current instruction.b) processer serves the interrupt request after completing the current task.c) processor serves the interrupt immediately.d) processor serving the interrupt request depent deprnds upon the priority of the current task under execution. 31.purpose of PC (program counter)in a microprocessor is ---- a) To store address of TOS(top of stack)b) To store address of next instructions to be executedc) count the number of instructionsd) to store the base address  of the stack.32.conditional  results after execution of an instruction in a microprocess is stored in a) register b) accumulator c) flag register d) flag register part of PSW (program status word) 33.The OR gate can be converted to the  NAND function by adding----gate(s)to the input of the OR gate. a) NOT b) AND c) NOR d) XOR 34.In 8051microcontroller ,------has a dual function. 

Page 52: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

a) port 3 b) port 2 c) port 1 d) port 0 35.An 8085 based microprocessor with 2MHz clock frequency,will execute the following chunk of code with how much delay?MVI   B,38HHAPPY:           MVI   C, FFHSADDY:           DCR  CJNZ SADDYDCR  BJNC HAPPY    a)    102.3 b)114.5 c)100.5 d)120  36.In 8085 MPU what will be the status of the flag after the execution of the following chunk of code.MVI B,FFHMOV A,BCMAHLT a)S = 1, Z = 0, CY = 1  b)S = 0, Z = 1, CY = 0  c) S  = 1, Z = 0, CY = 0 d)S = 1, Z = 1 ,CY = 1  37.A positive going pulse  which is always generated when 8085 MPU begins the machine cycle. a) RD b) ALE c) WR  d) HOLD 38.when a ----- instruction of 8085 MPU is fetched , its second and third bytes are placed in the W and Z registers. a) JMP b) STA c) CALL d) XCHG39.what is defined as one subdivision of the operation performed in one clock period. a) T- State b) Instruction Cycle c) Machine Cycle d) All of the above  40.At the end of the following code, what is the status of the flags.LXI B, AEC4HMOV A,CADD HLT a) S = 1, CY = 0, P = 0 , AC = 1 b) S =0 , CY = 1, P = 0,AC = 1    c) S = 0, CY = 1, P = 0 , AC = 1 d) S = 0, CY = 1, P = 1 , AC = 1 

Page 53: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

 41.In 8051 micro controller what is the HEX number in the accumulator after the execution of the following code.MOV A,#0A5HCLR CRRC ARRC ARL ARL ASWAP A a)A6       b)6A      c)95      d)A5.  42.The Pentium processor requires ------------ volts. a)9      b)12    c)5     d)24 43. The data bus on the Celeron processor is-------bits wide.]a)64  b)32   c)16    d)128.  44.K6 processor a) Hitachi   b) toshiba   c) zilog   d) AMD. ans: d  45. What is the control word for 8255 PPI,in BSR mode to set bit       PC3. a)0EH    b)0FH     c)07H       d)06H.  46.The repeated execution of a loop of code while waiting for an event to occur is called ---------.The cpu is not engaged in any real productive activity during this period,and the process doesn’t progress towards completion. a) dead lock    b) busy waiting    c) trap door   d) none. 47. Transparent DBMS is defined as a) A DBMS in which there are no program or user access languages. b) A DBMS which has no cross file capabilities but is user friendly and provides user interface management.  c) A DBMS which keeps its physical structure hidden from user   d) none. 

Page 54: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

48.Either all actions are carried out or none are.users should not have to worry about the effect of incomplete transctions.DBMS ensures this by undoing the actions of incomplete transctions.this property is known as a) Aggregation   b) atomicity    c) association   d) data integrity.  49.------ algorithms determines where in available to load a program. common methods are first fit,next fit,best fit.--------- algorithm are used when memory is full , and one process (or part of a process) needs to be swaped out to accommodate a new program.The ------------- algorithm determines which are the partions to be swaped out. a) placement, placement, replacementb) replacement, placement, placementc) replacement, placement, replacementd) placement, replacement, replacement  50.Trap door is a secret undocumented entry point into a program used to grant access without normal methods of access authentication. A trap is a software interrupt,usually the result of an error condition. a)true   b)false.  51. Given a binary search tree,print out the nodes of the tree according to post order traversal.             4           /  \        2       5        / \      1    3 a)3,2,1,5,4.   b)1,2,3,4,5.   c)1,3,2,5,4.   d)5,3,1,2,4.  52.which one of the following is the recursive travel technique. a)depth first search   b)preorder   c)breadth first search    d)none. 53.which of the following needs the requirement to be a binary search tree. a)   5     /  \  2       7  /

Page 55: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

 1b)   5     /  \   6    7 c)    5      /  \   2     7   /\ 1  6d)  none.  54.in recursive implementations which of the following is true for saving the state of the steps a) as  full state on the stackb) as reversible action  on the stackc) both a and bd) none  55.which of the following involves context switch a)previliged instructionb)floating point exceptionc)system callsd)alle)none  56.piggy backing is  a technique for a)acknowledgeb)sequencec)flow controld)retransmission57. a functional dependency XY is  ___________dependency if removal of any attribute A from X means that the dependency does not hold any more a)full functionalb) multi valuedc)single valuedd)none

Page 56: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

  58)a relation schema R  is in BCNF if it is in ___________and satisfies an additional constraints that for every functional dependency XY,X must be a candidate key a)1 NFb)2 NFc)3 NFd)5 NF  59) a _________sub query can be easily identified if it contains any references to the parent sub query columns in the _________ clause A) correlated ,WHEREb) nested ,SELECTc) correlated,SELECTd) none  60) hybrid devise that combines the features of both bridge and router is known as a)router b)bridge c)hub d)brouter  61) which of the following is the most crucial phase of  SDLC a)testing b)code generation  c) analysys and design d)implementation 62)to send a data packet using datagram ,connection will be established a)no connection is requiredb) connection is not established before data transmissionc)before data transmissiond)none  63)a software that allows a personal computer to pretend as as computer terminal is a) terminal adapterb)terminal emulationc)modemd)none

Page 57: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

 64) super key is a) same as primary keyb) primary key and attributec) same as foreign keyd) foreign key and attribute 65.In binary search tree which traversal is used for ascending order values a) Inorder    b)preorder  c)post order  d)none  66.You are creating  an index on ROLLNO colume in the STUDENT table.which statement will you use? a) CREATE INDEX roll_idx ON student, rollno;b) CREATE INDEX roll_idx FOR student, rollno;c) CREATE INDEX roll_idx ON student( rollno);d) CREATE INDEX roll_idx INDEX ON student (rollno);  67.A________class is a class that represents a data structure that stores a number of data objects a. container  b.component c.base  d.derived  68.Which one of the following phases belongs to the compiler Back-end. a. Lexical Analysis  b.Syntax Analysis c. Optimization d.Intermediate Representation.  69.Every context _sensitive language is context_free a. true b.false  70.Input:A is non-empty list of numbers LXß-infinityFor each item in the list L,doIf the item>x,thenXß the itemReturn X

Page 58: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

X represents:- a)largest numberb)smallest numberc)smallest negative numberd) none  71.Let A and B be nodes of a heap,such that B is  a child of A. the heap must then satisfy the following conditions a)key(A)>=key(B)b)key(A)c)key(A)=key(B)d)none  72.String ,List,Stack,queue are examples of___________ a)primitive data typeb)simple data typec)Abstract data typed)none  73.which of the following is not true for LinkedLists? a)The simplest kind of linked list is a single linked list ,which has one link per node .this link points to the next node in the list,or to a null value or emptylist if it is the last node.b)a more sophisticated kind of linked list is a double linkedlist or two way linkedlist .Each node has two links ,one to the previous node  and one to the next node.c) in a circleLinkedList  ,the first and last nodes are linked together.this can be done only for  double linked list.d) to traverse a  circular linkedlist ,u begin at any node and follow the list in either direction until u return to the original node.  74.sentinel node at the beginning and /or at the end of the linkedlist is not used to store the data a) trueb) false 75) Which of following is correct:a)For loops can be nested

Page 59: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

b)For Loops may use the same Indexc)For loops cannot be overllappedAns:a,c CSC Aptitude Questions With Solution 1.         If 15 toys cost Rs, 234, what do 35 toys cost?  Sol. Rs. 546.  2. If 36 men can do a piece of work in 25 hours, in how many hours will 15 mendo it ? Sol 15 men can do it in 60 hours. .3. If the wages of 6 men for 15 days be Rs.2100, then find the wages offor 12 days. Sol. Rs. 2520.  4. If 20 men can build a wall 66 metres long in 6 days, what length of a similar can be built by 86 men in 8 days? Sol. 49 m. 5. If 15 men, working 9 hours a day, can reap a field in 16 days, in how manydays will 18 men reap the field, working 8 hours a day?         Sol 15. 6. If 9 engines consume 24 metric tonnes of coal, when each is working 8 hoursday, bow much coal will be required for 8 engines, each running 13hours a day, it being given that 3 engines of former type consume as much as 4 engines of latter type?           Sol26 metric tonnes. 7. A contract is to be completsd in 46 days sad 117 men were said to work 8 hours a day.   After 33 days, (4/7) of the work is completed. How many additional men may be employed so that the work may be completed in time, each man now working 9 hours a day?  Sol. 81.  

Page 60: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

8. A garrison of 3300 men had provisions for 32 days, when given at the rate of 860 gns per head. At the end of 7 days, a reinforcement arrives and it was for that the provisions wi1l last 17 days more, when given at the rate of 826 gms per head, What is the strength of the reinforcement? Sol.1700. 9Rajeev's age after 15 years will be 5 times his age 5 years back. What is thepresent age of Rajeev ?           Sol. 10 years.           10. The ages of two persons differ by 16 years. If 6 years ago, the elder  one be3 times as old as the younger one, find their present ages.                              Sol. their present ages are 14 years and 30 years. 11. The product of the ages of Ankit and Nikita is 240. If twice the age of Nikitais more than Ankit's age by 4 years, what is Nikita's age?               Sol. 12 years.   12 . The present age of a father is 3 years more than three times the age of his son. Three years hence, father's age will be 10 years more than twice the age of the son. Find the present age of the father.      .           Sol. 33 years.           13 . Rohit was 4 times as old as his son 8 years ago. After 8 years, Rohit will betwice as old as his son. What are their present ages? Sol., son's 'present age = (x + 8) = 16 years.Rohit's present age = (4x + 8) = 40 years. 14. One year ago, the ratio of Gaurav’s and Sachin’s age was 6: 7 respectively.Four years hence, this ratio would become 7: 8. How old is Sachin ? Sol: 36 years. 15. Abhay’s age after six years will be three-seventh of his fathers age. Ten years ago the ratio of their ages was 1 : 5. What is Abhay’s father's age at present?           Sol. 50 years. 

Page 61: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

16:Two pipes A and B can fill a tank in 36 bours and 46 bours respectively. If both  the pipes are opened simultaneously, bow mucb time will be taken to fill thetank? Sol: 20 hours. 17: Two pipes can fill a tank in 10hours and 12 hours respectively while a third, pipe empties the full tank in 20 hours. If all the three pipes operate simultaneously, in how much time will the tank be filled? Sol: 7 hrs 30 min. 18: If two pipes function simultaneously, tbe reservoir will be filled in 12 hours. One pipe fills the reservoir 10 hours faster than tbe otber. How many hours does it take the second pipe to fill the reservoir? Sol: 30 hours to fill the reservoir 19: A cistern has two taps which fill it in 12 minutes and 15minutes respectively. There is also a waste pipe in the cistern. When all the 3 are opened , the empty cistern is full in 20 minutes. How long will the waste pipe take to empty the full cistern? Sol: the waste pipe will empty the full cistern in 10min 20: An electric pump can fill a tank in 3 hours. Because of a leak in ,the tank it took 3(1/2) hours to fill the tank. If the tank is full, how much time will the leak taketo empty it ? Sol: 21 hours.  21. Two pipes can fill a cistern in 14 hours and 16 hours respectively. The pipesare opened simultaneously and it is found that due to leakage in the bottom it tooki 32 minutes more to fill the cistern.When the cistern is full, in what time  will the leak empty it?            Sol: 112 hours.  22: Two pipes A and B can fill a tank in 36 min. and 45 min. respectively. A water  pipe C can empty the tank in 30 min. First A and B are opened. after 7 min,C is also opened. In how much time, the tank is full? Sol: 39 minutes. 23: Two pipes A,B can fill a tank in 24 min. and 32 min. respectively. If both the pipes are opened simultaneously, after how much time B should be closed so that the tank is full in 18 min.? Sol: 8 min.

Page 62: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

 24. In a km race, A beats B by 28 metres or 7 seconds. Find A's time over the course. Sol.  4 min. 3 sec. 25. A  runs 1 ¾  times as fast as B. if A gives B a start of 84 m, how far must        winning post be so that A and B might reach it at the same time?           Sol. Winning post must be 196 m away from the starting point.  26. A can run 1 km in 3 min. 10 sec. and B can cover the same distance in  3 min. 20 sec. By what distance can A beat B ? Soln: A beats B by 50 metres.  27 . In a 100 m race, A runs at 8km  per hour. If A gives B a start of 4 m and still him by 15 seconds, what is the speed of B ?           Sol: 5.76 km/hr. 28. A, Band C  are three contestants in a km race. If A can give B a start of 40 m    and A can give C  a start of 64m  how many metre's  start can B give C ?  Sol:   While A covers 1000 m, When B covers 960 m, C covers 936 m. 29. In a game of 80 points; A can give B 5 points  and C 15  points. Then how many points  B can give C  in a game of 60 ? Sol.    B can give C  8 points. 30. Find the present worth of Rs. 930 due 3 years hence at 8% per annum. Also find the discount.Sol. Rs. 180. 31. The true discount on a bill due 9 months hence at 12% per annum is Rs. Find the amount of the bill and its present worth. Sol.    Rs. 6000.  

Page 63: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

32. The true discount on a certain sum of money due 3 years hence is Rb. 250 and the simple interest on the same sum for the same time and at the same rate is Rs. 375. Find the sum and the rate percent. Sol.   16 2/3% 33. The difference between the simple interest and true discount on a certain sumof money for 6 months at 12—% per annum is Rs. 25. Find the sum. Sol. Rs. 6800. 34. A bill falls due in 1 year. The creditor agrees to accept immediate payment of the half and to defer the payment of the other half for 2 years. By this arrangement ins Rb. 40. What is the amount of the bill, if the money be worth 12-z% ?Sol . Rs. 3600. 35. Find the volume and surface area of a cuboid 16 m long, 14 m broad and7 m high. Sol. 868 36. Find the length of the longest pole that can be placed in a room 12 m long8m  broad and 9m high. Sol. 17 m.  37. Tbe volume of a wall, 5 times as high as it is broad and 8 times as long asit is high, is 12.8 cu. metres. Find the breadth of the wall. Sol. 40 cm 38. Find the number of bricks, each measuring 24 cm x 12 cm x 8 cm, required to construct a wall 24 m long, 8m high and 60 cm thick, if 10% of the wall is filled with mortar? Sol. 45000. 39. Water flows into a tank 200 m x 160 m througb a rectangular pipe of1.5m x 1.25 m @ 20 kmph . In what time (in minutes) will the water rise by 2 metres? Sol. 96min 40. Tbe dimensions of an open box are 50 cm, 40 cm and 23 cm. Its thickness is

Page 64: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

2 cm. If 1 cubic cm of metal used in the box weighs 0.5 gms, find the weight of the box. Sol. 8.04 kg.

CSC Technical Written Test Questions:

1.with framework CASE tools IPSE can be achieved .IPSE isa.integrated product software engineering.b.integrated productivity simulation environmentc.inner project software estimationd.inntegreted project support environment

2.data structured system devolepment (DSDD) is also called one of the below which is evolved from work on information domain analysisa.j.d.methodologyb.yourdon methodologyc.warnier-or methodologyd.Kevin-yenn methodology

3.a.COCOMOestimation model is a single valued mode to compute software development effort(and cost)as a function of program size expressed in estimated lines of codes.b..PUTNAM model is single valued model assuming a specific distribution of effort over life of software development project.a.only a)is correctb.only b)is correctc.a ) and b)is correctd.a)and b)is wrong

4.when in data coupling portion of a data structure(rather than simple argument)is passed via a model interface it is called one of the belowa.control couplingb.stamp couplingc.sub-couplingd.reference coupling

5.what is measure of reliability for a computer based system if MTBF=mean time between failure.MTTF=mean time to failure.MTTR=mean time to recover

a.MTBF=MTTF/MTTRB.MTBF=MTTF*MTTRC.MTTR=MTTF*MTBFD.MTBF=MTTF-MTTR(sign is not cleared)

6.in FURPS quality factors by HEWERT PACKARa.functionality is accessed by evaluating o ne feature of program and capability of algorithm onlyb.supportability means breath of premna application and death of standards used

Page 65: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

a.a)and b)both correctb.a)correct b)wrongc.b)correct a)wrongd.a)and b) both wrong question is not cleared

7.ur testing of basis paw message means software devolepme nt quatiative measure of logical complexity program of independent path in search of programa.data cycle complexityb.path complexity metricc.cyclomatic complexityd.none of above (question is not cleared so try to understand it)

8.as a general rulea.MIS performane criteria determine management information needs and these needs determine the objective of the firmb.the objective of the firm determine the management information needs and these needs determine the MIS performance criteriac.management information needs determine the MIS performance criteria and these criteria determine the objective of formd.the objectives of firm determine the MISpwrformance criteria and these criteria detemine the management information needs.

9.a relatively small project is to be developed by a small team with good applocation experience needing to fulfull less than rigid requirements. Using the basis COCOMA model calculate the effort in person-months if the estimated lines of code is 33200a.95 person-months.b.111 perso n-monthsc.102 person-monthsd.87 person-moths

10.CRC modeling provides a way for identifying classes their respomnsibilities and their collaboration .a collabration refers to.a.services provided by a class to other classesb.requests sent by a class to ther classes to fulfill its own responsibility.c.taxonomy of class typesd.characterstics of a class

12.a software was developed using component assembly model.after some time and old componet is to be replaced by a new one without disturbing the overall fuctioning of the softwarwe.following statements is true.a.the new component should be developed in the same language as the old oneb.the new component should have exactly the same attribute as the old one.c.the new component should inplement exactly the same methods as the old one.d.The new component should provide exactly the same interface as the old one.

13.a real time system is to be developed .the choice of database would most appropriately bea.distributed databases because the reduce redundancy of data.b.distributed databases because the facilate parallel data processing through miultitaskingc.centralized databases because of high computing power the server.d.centralized databases because they provide better deadlock handling mechanism.

14.the following statement is equavalence echo~a.echo SHOMEb.SHOMEc.pwdd.ps

15.the equavalent of following statement is echo~bina.echosbinb.echo bin      c.pwd       d.echo pwd

Page 66: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

16.the command that gives the process of ID of last command invokeda.$@b.$#c.$!d.$$

17.the output of the following shell script$set-a planets mecury venus$planets[9]=Pluto$print ${planets[*]}a.planetsb.mercurity venus putoc.Pluto mercury Plutod.gives an error

18."let"command is used fora.command substitutionb.arithmetic calculationc.to create analiasd.not used

19.name the relationship(s)that denotes some semantic dependency among otherwise unrelated classes.a.generilazation or specification.b.part ofc.associationd.all of the above

20.object persistence is best described by the followinga.the ability to retain an object throughout the execution of a methodb.the ability to retain an object throughout the execution of a programc.the ability to save objects from one execution of a program to the text.d.the ability to retain an object throughout time and or space

21.what is socket ? how many required to make connection between two systemsa.a socket is 2-tuple having protocol and port number and requires 4socketsb.a socket is 3-tuple having protocol address and port number and requires 4 socketsc.a socket is 2-tuple having protocol and address and requires 2 socketsd.a socket is 3-tuple having protocol address and port number and requires 2 sockets

22.TCP/IP runs ona.an Ehtenerb.a token ringc.an x.25 netd.all of the above

23.the job og fragmentation and re-assembly of datagrams in TCP/IP protocol suite is done bya.network access layerb.internet layerc.transport layer      d.application layer

24.the sequence number in TCP header is used toa.identify the first byte of the enclosed data int segmentb.identify the computerc.identify the port on which server is runningd.none

Page 67: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

25.what is output of the final echo command$x=hell0$ echo'x=goodbye'>sedtx$sh setx ;x=bye$echo $xa.hellob.goodbyec.byed.none

26. what would be the output of the following echo command in sequence?$x=1$echo'x=2'>setx$sh setx$echo $x$x=3$setx$echo $xa.2,2b.1,2c2,3d.1,3

27.memory reference instruction branch subroutine (BSB) IS given instruction transferming control to subroutineb.first word of the subroutinec.address of next instruction in sequence which is presently held in pc (return addres)d.another BSBinstruction

28.assume memory units has 65536 words of 8bits.the number of bits in program counter.accumalator. memory address register instruction respectively area.16,8,16,8b16,16,8,8c8,16,8,16d8,8,16,16

29.which of the following instruction is used to load 2050h address toHL register pair?a.LOD H,2050HB.LOAD H,2050HC.LXIH,2050HD.LDAH,2050H

30.what will be the value of the accumalator having AAH after executing RLC instruction twice?a.55hb.abhc.bahd.aah

31.the top of the stack contains 5A&next byte down the stack is 14(all address in hexadecimal) the stack pointer (sp) containts 3A56.an instruction call subroutint stored at location 67AE whick is 3 bytes long is located at memory address 013F. What shall be the contents of Program Counter, SP and stack respectively after the call instruction is executed?

PC SP stacka. 67AE 3A58 42,01,5A,14

Page 68: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

b. 0142 3A58 01,42,5A,14c. 67AE 3A56 42,01,5A,14d. 0142 3A56 01,42,5A,14

32. Time oriented metrics is one of the below i.e. times it takes to analyze change request, design an appropriate modification, implement the change, test it and distribute to all users.

a. MTBR b. MTTC c. MTBW d. MTTW

33. which of the following is not a tool for application prototyping?a. Application Generators.b. Third Generation Languagesc. Screen Generatorsd. Report Generators.

34. For Real time process control or embedded software application having high algorithmic complexity programs. Which software process metrics would be most suitable for project measurements?a. size oriented metricsb. Function point metricsc. Feature Point metrics.d.3d functionpoint metrics

35. Regression testing is:a. Testing the System under extreme conditions.b. Testing the System after a new component is integrated into it to make sure that no additional errors are introduced.c. Testing the system with an exhaustive range of data to make sure that all the conditions are tested.d. Testing of a module by its developmer before releasing it for integration with the entire system.

36. For a module to be strongly cohesive:a. it should ideally perform just one function.b. Et should have well defined relationships with other modules in the system.c. It should be compact in size.d. It should not take any data as input parameter.

37. The approach used in Top Down Analysis and design is:a. To identify a top level function by combining many smaller componen into a single entity.b. To identify a top level function and then create a hierarchy of lower level modules and components.c. To prepare flowchart after programming has completed.d. None of the above.

38. Engineers use the CASE tolls to:a. Analyze these requirements and determine their feasibility.b. Design the system's general algorithms.c. Design an actual detailed implementation in terms of target environment.d. All of the above.

39. While constructing a data dictionary, the analyst considers:a. Each data flow in the DFD has one data dictionary entry.b. Definitions must be readily accessible by name.c. There should be no redundancy in data definition.e. All of the above.

40. The procedure for evaluating relative performance of defferent systems is referred to as:

Page 69: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

a. Parallel processing.b. Bench marking.c. Comparative analysis.d. Standard Evaluation.

41. The variable used to change the secondary prom string is:a. PS3b. PS1c. PS2d. Not possible.

42. The command used to send signals to specified job:a. sendb. killc.d. kill

43. When the complesity of a problem domain is modeled in an Object Oriented design, it takes the form of aa. Hierarchy b. Graph c. Tree d. none

44. Which of the following statements is true?a. An object has a state, behaviour and identity.b. An object has only state and behaviour.c. An object has only behaviour and identity.d. An object has state and identity.

45. Object Oriented Analysis is a methoda. In which the system is viewed as a set of autonomous agents that collaborate to perform higher level behaviour.

b. In which programs are organized as co-operative collection of objects, each of which represents an instance of some classes and whose classes are all a members of a hierarchy classes united via inheritance relationships.c. Encompassing the process of object oriented decomposition and a notation for depicting both logical and physical as well as static and dynamic models of a system.d. That examines requirements from the perspective of the classes and objects fount in the vocabulary of the problem domain.

46. Encapsulation constitutes:a. Identifying the essential characteristics of and obhect.b. Separation of contractual interface of an abstraction and its implementation.c. The property of a system that is decomposed into a set of acohesive and loosely coupled modules.d. Ordering of abstractions.

47. The enforcement of the class of anf object is reffered to as:a. Modularity b. Abstraction c. Typing d. Binding

48.The Gateway and the Router are used in the following sense :a. Gateway moves the data between different networks of the same protocol and the Router moves the data between different network of different protocol.b. Gateway moves the data between different networks if different protocols and the Router moves the data berween different network of the same protocol.c. Gateway and the router are used for security.d. None of the above.

49. Which of the following is a Network Mamagement Protocol?a.DNSB.CMIPC.TELLNET

Page 70: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

D.TCPMP

50. ip uses 4bytes addressing.how many butes address IPX uses-a.12b.16c.8d.10

51.IPaddress192.10.100.3is an example of the classa.Ab.Bc.Cd.D

52.in TCP/IP protocol suite the protocol which controls the flow of data is-a.ARPb.ICMPc.RARPd.IP

53.ARPprotocol is used to-a.map IP address to physical addressb.map EthernetAddress to IP addressc.both of aboved.none of above

54.what is the output ofthe two echo commands$export x$x=1$sh -$echo sx$x=2$ctrl-d leave this shell$echo$sx

a.1,1b.1,2c.blank,2d.none oe abovge

55.the command$sleep10;date&a.sleep and date both run simultanously in backgroundb.sleep and date both run simultanously,sleep in foreground and date in backgroundc.after sleep finishes running in foreground than date runs in foregroundd.none

56.following are the contents of a file fileecho $#echo $*echo$0echo $1what would be output of following$ shfiles 1,2,3

Page 71: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

a.31,2,3file1b.1,2,3412c.file 1412d.none

57what will be the outputs of the following commandsexpr 4+3expr14/3expr 4\*3expr 4*3a. 7,2,8,syntax error,12b.7,2,8,12,syntax errorc.7,2,1,12d.7,2,12,syntax error

58which of th statement is not true forsticky bit.a.can be set for a file.b.has no efect if thefile nis a dir.c.tells unix to leave an executable in a memo ry after a program has finished executaiond.none

59.make utility isa.an editor on unixb.to restor the system statusc.a utility for devlopment of programd.none

60.th e following input is absent on a romchip as compared to ram chip-a.read inputb. write inputc. chipselectd. both a & b

61.the digital computer has memory unit with 8 bits per word. the struction set consist of six differentoperation.each struction is stored in one word of memoryand consistof opcud part and address part . how many words can be address in memorya.32b.64c.128d.256

62.output of following will be#includemain()

Page 72: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

{char p="A";int q=65;switch(1){case 1:printf("%dand %c",p.,q);printf("%cand%d",p,q);}}a.A AND 65b.65 AND Ac.A and 6565 and Ad.65 and AA and 65

63.output of following will be# include#includemain(){unsigned short p=pow(2,15)+pow(2,9)+pow(2,6)+poe(2,0); //33345char c;c=p;printf("%c/n",c);}a.33345b.45c.Ad.none

64. p in following statement isint (*p(char *a))[10];a.integerb.arrayc.fuctiond.pointer

65.value of expression *(((p))name +2))) at the end of programm will be#includemain(){struct account{int accno,char *name;float balance;}agent *p=&agent;agent.name=tom smith;a.tom smithb.oc.md.none of this

Page 73: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

66.state which one is corerect SQLa.SELECT STORE ID.SUM(QTY*PRICE)FROM SALES .TITLESWHERE TITLES.TITLE_.ID=SALE.TITLE_IDORDER BY TITLE_IDb.SELECT STORE _ID ,SUM( QTY*PRICE)FROM SALES,SALESWHERE TITLES .TITLES_ID=SALES .TITLE_IDGROUP BY STORE_ID ]c._SELECT STORE _ID ,SUM( QTY*PRICE)FROM SALES,SALESGROUP BY STORE_IDWHERE TITLES .TITLE_ID+SALES.TITLE_IDd.SELECT STORE _ID ,SUM( QTY*PRICE)FROM SALES,SALESORDER BY TITLE_IDWHERE TITLES .TITLE_ID=SALES.TITLE_ID

67which type of join is used in following SQLSELECT STORE_NAME.PUB_IDFROM PUBLISHER .STORESWHERE NOT PUBLISHER.STATE=STORES .STATEa.EQUIJOINB.THETAJOINC.NOTQUIJOIND NONE OF THIS

68.EMPLOYEE DEPARTMENTempid name deptid deptid deptname.1 A 11 11 AAAAA2 B 11 22 BBBBB3 C 22 33 CCCCC4. D 225 E 23SELECT NAME .DEPT_ID.DEPT_NAMEFROM EMPLOYEE EM.DEPARTMENT DPWHERE EMDEPT _ID =DP.DEPT_IDGROUP BY DEPT_IDwhich is the correct result set out of above SQL and table dataa. A 11 AAAAA

B 11 AAAAA

C 22 BBBBB

D 22 BBBBB

D 33 CCCCC

Page 74: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

b;A 11 AAAAAC 22 BBBBBE 33 CCCCCC.B 11 AAAAAD 22 BBBBBE 33 CCCCCD.NONE

69.11.2 'S complement of binary 110110101id

a.001001010b.1101110101c.001001011d.101001010

70.equivalent octal number for binary 10001010111a. 2127b.1227c.2217d.1111

71.while exucuting a programm if the 8085/8080A MPU fetches the machine code located at the memory address 2057H then jthe content of the programm counter isa.2056HB.2057HC.2058HD.2059H

72number of address line required on the chip of 2k memorya.10b.11c.12d16

73.the sequence followed bby the storage and retrieval of data bytes on the stacksa.FIFOB.LIFOC.FILOD.LILO

74.another name for RS flip flopa.a stable multivibratorb.bistable multivibratorc.monostable multivibratord.oscillotor

75.equivelent BCD representation of binary 1100010a.01100010b.10011000

Page 75: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

c.1100010d.11000100

CSC OFF Campus Recruitment Process Latest 2012 -Selection Procedure Questions of CSC Placement Paper|on March 28 and 28,2012

CSC Written Test Pattern|CSC Technical Written Test Pattern|CSC HR and Technical Interview Pattern and QuestionsCSC Latest   Test Pattern and Selection Procedure In CSC Selection there are 5 rounds1.       Written Test-Quantitative aptitude2.       Written Test-Technical3.       Group Discussion4.       Technical Hr5.       Personal HRAfter each section 15 minutes breakCSC Written test consists 2 sectiions1.Written Test-Quantitative aptitudeNo of Questions : 40Time limit : 40(CSC aptitude covered all the topics from verbal, Non verbal. It will be useful if you refer R.S. Aggarwal book but as previous years, the questions were not repeated. It was a totally new set of questions and you cannot rely much on old placement papers of CSC )Topics to concentrate1.       Blood Relation2.       Time and Distance3.       Condition and Assumptions4.       Some logical questionsCSC Technical Written testCSC Technical Written Test2.Written Test-TechnicalNo of questions : 70Time limit: 75 Minutes10 Minutes for essay writing( 4topics will given in the paper and u have to write backside of the paper itself. In this written communication is important)CSC Topics to TechO.S,D.S,DBMS,C language ,MicroprocessorElimintion roundCSC Group Discussion Topics3. Group DiscussionCSC Previous Years GD Topics"Who is your Role Model and why?"."Which is best? love or arranged marrriage?",

Page 76: placementsvit.weebly.complacementsvit.weebly.com/uploads/1/2/6/2/12621799/cs…  · Web viewOur success derives from a deep understanding of our clients, to whom all of CSC is committed

"Is public sector or private sector jobs are best?"Also an elimination round-Given a topicWay of putting points,body language etc.,1 topic-Uses of microprocessor to start and costless2.Single window system (common to all ) CSC Technical andHR interview Questions4.Technical HRQuestions relate to C,C+,DBMS,O.S etc5 Personal HRAbout your collegeDifficult situation how you overcomeFamily background etc.,