Professional Documents
Culture Documents
1.
Delete from table tempv where rowid in (select rowid from tempv where
rowid in (((select min(rowid) from tempv where ... count(*) > 1))) union(select
rowid from tempv where rowid in (((select min(rowid) from tempv where ...
count(*) > 1)));
2.
3.
4.
provided the code for that describing the scenario of movie_tickets_sold and
asked the programmer to insert a block of code...., where that code block to be
inserted? In Package body? or in Package Specification?
5.
a. =
b. !=
c. AND
d. OR
6.
a. Early Binding
b. Late binding
c. No Binding
d. Deferred Binging
7.
delete_row ON DELETE
not remember the complete question.
8.
If table contains 100 rows and it is truncated, how many rows get updated
a. 0
b. 1
c. 100
d. No rows updated
9.
10.
11.
12.
NLS_DATE_FORMAT: 1 question
13.
14.
Main()
{
char str[7]=strings;
printf(%s,str);
}
16.
main()
{
file *fp;
fp=fopen(xyz,r);
}
What does fp point to?
17.
line in C.
18.
When the variables are pushed into the stack, which method is used to
20.
A programs reads The man and the boy\r\n from a file using fgets() and
After this written exam, we had another written for the short-listed
The first one was the conversion of a given expression into its postfix
1.
4) ?????????/
3.
4.
5.
main()
{
printf("%c","abcdef"[4]);
}
what is the output ? a) abcdef b) d c) e d) ERROR.
8.
main()
a) By value b) By reference
10.
12.
None of these
14.
15.
implemented :
a) insert front, delete front b) insert front , delete rear c) insert rear, delete front d)
None of these
16.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
accessed from the hdd? Why isnt it used in place of a RAM ? What is RAID
describe its basic structure ? . Where is the file information stored on the hard disk
? What is FAT ? How are files physically arranged on the hard disc?
31.
.NET A query on natural join in SQL, what is the need of normalization ? What is
data inconsistency and redundancy? What is the basic difference between file
systems and database systems? What are triggers and assertions in SQL? How can
you use C to connect with Oracle SQL database? (Using Oracle 8i PRO C/C++
precompiler )A complicated query on a trigger. (which I couldnt ans).
33.
What is fork system call? How is a child process called and what happens
to the parent ? In C what is spawnv () function, describe its execution. How can
you use C for writing assembly language programs ?
34. If you have done any project then try to bring the discussion towards it. I was
interviewed on the project for about 20 min and I kept on explaining till he took
up the HR form and signed it!!!! The interviewer was very impressed with my
technical knowledge and gave his feedback to the HR interviewer as Very
Confident & sound technical skills. (I had overlooked the remark when he was
writing it !!!)
binary equalent of 455 ?
35. whats the o/p of the following code ?
int main ()
{
int i = 0 ;
switch ( printf ("k") , printf ("ku"))
{
case 1 : printf (" %d" , i ) ;
break ;
case 2 : printf (" %d " , ++i ) ;
break ;
}
}
ans : a) k ku 1 also ans d) ( both are same )
36. Whats used to connect the computer with terminals ?
ans : a) Data Terminal equipment
37. A question about unix & linux
ans : b) [ unix from Bell labs ]
38. which is used to convert the assmbly code into binary
ans : assembler
39. whats the o/p of the following code ?
int main ()
{
int i = -1 ; j = 1 , k = 0 , m ;
m = i++ || j++ && k++ ;
printf ("\n\n%d %d %d " , i , j , k , m ) ;
}
40. Expansion of CDMA code divison multiple access .
41. A question from Microprocessor ( which segment is not used by Microprocessor ?
)
a. ) Data segment b) extended segment c) information segment d) none of these
42. Which of the following layer is not in Tcp/ip ?
a) transport b) application layer c) Network layer d) none of the above
43. If A= 10000011 and B=1010111 and c= 11000011 then whats the string represent
100001100011 .. (some thing like that )
44. A question regarding PCM
45. The best case comparison of Quick sort ?
46. The usage of static function ?
ans : to access static members
54. main()
{
int a[]={0 1 2 3};
int *b;
printf("%d",b[-1]);
}
ans 1(check)
note: the elements of array may vary
Technical Interview
55. What are the layers in OSI stack & Explain them ?
56. What u know about trees ? & tell the types of tree ?
57. Give the syntax of binary tree ?
58. Write the program of factorial using recursion ?
59. Write a Sql Query for ......
60. Some questions from stack & Queue .
61. Write program for Single, doubly linked lists ?
62. ------stores a log of changes made to db,which are then written to _,which are then
written to _,which is used if db recovery is necc.
a) db buffer share pool
b) program global area,shared pool
c) system global area,large pool
d) redo log buffer,online redo log
63. ----means allowing objects of difference types to be considered as examples of a
higher level set :
ans: Generalization
64. The primary characteristic of key field is that it must be unique
65. Manager-------------- --emp managed by ans:one of many recursive relationship
66. If a member initialiser is not provided for a member object of a class .The object is called
a) static fn
b) non static fn
c) default constructor
d) none
67. class constest
{
private:
const int i;
public:
constest():i(10)
}
68. Inheritance
b) abstract base class
c) specifies a way to to define a const member data
d) none
69. Iimplement polymorphism when by object belonging to different class can
respond to the same message in diff ways.
a) late binding
b)dynamic binding
c) dynamically created object
d) virtual fun
70. Member function---------- and ----------- set and reset the format state of flags.
a) set,reset
b) set,get
c) set, unset
d) set ,unsetf
71. #include<iostream.h>
struct abc
{
int i;
abc(int j)
{ i=j;}
public:
void display()
{ cout<<i;}
}
void main()
{
abc ob(10);
ob.disp();
}
a)10
b) error : constructor is not accessible
c) abc: i not accessible
d)none
72. # include<iostream.h>
class sample
{
public :
sample(int **pp)
{
p=pp;}
int **p;
int **sample:: *ptr=&sample ::p;
73. In a file A...Z characters are written.if we open the file using fopen and
lseek(fp,-10,2);
c=getc(fp);
printf("%c",c);
what will be the output.?
Ans . Y.(please verify Here last parameter is the integer value to seel_end
74. Same question with
lseek(fp,10,0);
c=getc(fp);
printf("%c",c);
ans. 11th character will be printed "K" verify.
75. Theory question about far pointers.
Hint: Far pointers are 4 bytes in size and local pointers are 2 bytes in
size. important: i saw in a previous question paper of accenture which is in the
chetana database, some lady wrote that size of an integer in C is 2 bytes and for
C++ it is 4 bytes. This is absurd.The size of types is entirely dependent on the
compiler used.for DOS Turbo C sizeof int is 2 and float is 4 bytes for windows
borland C,C++ size of int is 4 bytes for linux gcc, size of int is 2 bytes. All these
depends on the Operating system.Please keep this in mind.
76.
77. #include<stdio.h>
main()
{
char str[]={"hell"};
int i;
for(i=0;i<5;i++)
printf("%c%c%c%c\n",str[i],i[str],*(str+i),*(i+str));
getch();
}
ans.
hhhh
eeee
llll
llll
note that str[i] and i[str] are the same.in the question paper, the original word is
"hello".
78. Which of the following is not defined in string.h strtod,memchr,strspn,strchr
ans . strtod.(defined in STDLIB.H) it is used to convert a string to double.
79. Questions on macros with arguments .same pattern given in TEST UR C SKILLS
eg.#define SQUARE(x) x*x
main()
{
.......
y=SQUARE(2+3);
printf("%d",y);
}
ans. when the macro expands we get 2+3*2+3 = 2+6+3 =11.11 is the correct
answer not 25.
80. Remember an inline function does type checking and so it is better than a macro a
question on this.
81. Some memory is allocated using memalloc and then realloc is called. and now to
write the size of the variable.better learn memalloc and realloc. what it does and
syntax.
HR Interview.
TCS : C Paper
1.
2.
correct ?
a.its type must be declared before using the variable
b.they are local
c.they are not initialised to zero
d.they are global.
6.
x=sqr(a);
return(x);
Choose from one of the alternatives
a. return(sqr(a));
b. printf("sqr(a)");
c. return(a*a*a);
d. printf("%d",sqr(a));
7.
x=7; y=0;
if(x=6)
y=7;
else
y=1;
a.7
b.0
c.1
d.6
9.
conv(int t)
{
int u;
u=5/9 * (t-32);
return(u0;
}
What
a.15
b.0
c.16.1
d.29
10.
10 and 50 or y is zero
a.x>=10 && x<=50 || y==0;
b.
c.
d.
11.
a.while(1){
....
}
b.for(;;){
...
}
c .x=0;
do{
/*x unaltered within theloop*/
...
}while(x==0);
d .# define TRUE 0
...
while(TRUE){
....
}
12.
func(int i)
{
if(i%2)return 0;
eale return 1;
}
main()
{
int =3;
i=func(i);
i=func(i);
printf("%d",i);}
a.3
b.1
c.0
d.2
13.
p=p+x;
q=q+y;
a. p=p+x;
q=q+y
b. p=p+xq=q+y
c. p=p+xq;
q=q+y
d. p=p+x/q=q+y
14.
int a[50];
int *pa;
pa=a;
to access the 6th element of the array which of the following is incorrect?
a. *(a+5)
b. a[5]
c. pa[5]
d. *(*pa + 5)
17.
a. a=b=3=4;
b. a=b=c=d=0;
float a=int b=3.5;
d. int a;
float b;
a=b=3.5;
19.
20.
the following?
a .if cond 1
exp 1;
else if cond 2
exp 2;
else if cond 3
exp 3;
else
exp 4;
b. if cond 1
if cond 2
if cond 3
exp 1;
else
exp 2;
else
exp 3;
else
exp 4;
c.if cond 1 && cond 2 && cond 3
exp 1 |exp 2|exp 3|exp 4;
d.if cond 3
exp 1;
else if cond 2
exp 2;
else if cond 3
exp 3;
else
exp 4;
21.
a. **
b .^
c. %
d. not available
22.
a. a+=b
b. a*=b
c. a>>=b
d. a**=b
23.
y=5;
if (x==10)
else if(x==9)
elae y=8;
a. 9
b. 8
c. 6
d. 7
24.
a=0;
while(a<5)
printf("%d\n",a++);
how many times does the loop occurs?
a. infinite
b. 5
c. 4
d. 6
26.
for (i=0;i=10;i+=2)
printf("Hi\n");
a.10
b.2
c.5
d....
27.
a. calls itself
b. is equivalent to a loop
c. has a termination cond
d. does not have a return value at all
28.
29.
main()
{
unsigned int i=10;
while(i>=0){
printf("%u",i)
i--;
}
}
how many times the loop wxecuted
a.10
b.9
c.11
d.infinite
30.
a. malloc()
b. calloc()
c. free()
d. realloc()
31.
main()
{
int a[5]={1,3,6,7,0};
int *b;
b=&a[2];
}
the value of b[-1] is
a. 1
b .3
c. -6
d. none
32.
int n,sum=1;
switch(n)
{
case 2:sum=sum+2;
case 3:sum*=2;
break;
default:sum=0;
}
If n=2, what is the value of sum
a.0
b.6
c.3
d.none
33.
1. if(c=1)
2. if(c!=3)
3. if(a<b)then
4. if(c==1)
a. 1 only
b. 1&3
c. 3 only
d. all
34.
a. %d
b. %o
c. %x
d. %u
35.
main()
{
int x=5, *p;
p=&x;
printf("%d",++*p);
}
a.5
b.6
c.0
d.none
36.
main()
{
int i=3,x;
while(i>0)
{
x=func(i);
i--;
}
int func(int n)
{
static sum=0;
sum=sum+n;
return(sum);
}
The final value of x is
a.6
b.8
c.1
d.3
37.
a. array of pointers
b. pointer to an array
c. pointerto a pointer
d......
38.
12/2005 - Which of the below HTML tags is correct for inserting an image?
1. <a img="">
2. <img src="">
3. <image source="">
4. <image="">
The correct answer for this month's quiz is number two. The img src tag is the correct
tag to insert images into an HTML document. Additional information about HTML
and HTML tags can be found on our HTML help page.
11/2005 - What is the maximum transfer speed of the wireless 802.11a standard?
1. 100 Mbps
2. 54 Mbps
3. 24 Mbps
4. 10 Mbps
The correct answer for this month's quiz is number two. 54 Mbps is the maximum
transfer speed of this standard. See our 802.11 standard pages for a listing of each of
the standards and their capabilities.
10/2005 - Which of the below people is credited for developing the World Wide
Web?
1. Alan Kay
2. Tim Berners-Lee
3. Jack Kilby
4. Robert Noyce
The correct answer for this month's quiz is number two. Tim Berners-Lee is credited
for developing the Internet.
9/2005 - Which of the below is not a type of printer?
1. Bubble Jet printer
2. LED printer
3. Thermal printer
4. Microwave printer
The correct answer for this month's quiz is number four. See Bubble Jet printer definition,
LED printer definition, Thermal printer definition, or Microwave printer definition for
additional information about the other printers listed in this month's poll.
8/2005 - Which year was Microsoft Windows XP released?
1. 2000
2. 2001
3. 2002
4. 2003
The correct answer for this month's quiz is number two. Microsoft Windows XP was
released on October 25, 2001. Additional history on Microsoft Windows can also be
found on our Windows history page.
7/2005 - What is another name for a motherboard?
1. CPU
2. Fatherboard
3. Main system
4. System board
The correct answer for this month's quiz is number four. A system board is another
name for a computer motherboard. See our motherboard dictionary definition for
additional information about this term as well as other common names for it.
6/2005 - Which of the below is not a type of game?
1. FPS
2. RTS
3. RPG
4. ETS
The correct answer for this month's quiz is number four, ETS is not a type of game.
However, FPS, RTS, and RPG are all types of games.
5/2005 - Which of the below is a type of memory that cannot have information
written to it?
1. DRAM
2. RAM
3. ROM
4. SRAM
The correct answer for this month's quiz is number three. ROM, which is short for Read
Only Memory, is a type of memory that cannot have information written to it. See
our DRAM, RAM, ROM, and SRAM dictionary definitions for additional information
about each of these terms.
4/2005 - Which of the below is not a type of network?
1. MAN
2. HAN
3. LPN
4. VPN
The correct answer is number three. An LPN is not a type of network. See our MAN,
HAN, and VPN dictionary definitions for additional information about each of these
terms.
3/2005 - Which below file extension is not a type of compressed file?
1. .bin
2. .rar
3. .tar
4. .z
The correct answer for this month's quiz is number three. The .tar file extension is not a
type of compressed file; it is actually a single file that contains a group of files that is
uncompressed. Additional information about each of the above file extensions as well as
hundreds of other file extensions can be found on our file extension section.
Update - We would like to thank "Marduk" and "Father Nature" for bringing to our
attention that a .tar file is not actually a compressed file. It is actually a catalogued
conglomeration of files without compression. Therefore, if you answered .tar for this
month's quiz, it would have also been correct.
Update - We would like to thank Allan for bringing to our attention that a .bin file can be
a compressed file. The bin file can preserve resource forks in Mac OS files. For
example, a disk image (compressed) file that may have a Mac resource fork can be
preserved by making it a bin file.
Update - Because of the above updates, this month's correct answer as been changed to
number three.
2/2005 - What is UNIX short for?
1. UNIplex Information eXit
2. UNIveral multIcs eXit
3. UNiversal Internet eXperts
4. None of the above
The correct answer for this month's quiz is number four. Unix is actually not acronym for
anything; Unix was first known as UNICS (UNiplexed Information and Computing
Service) and later renamed. Additional information about Unix can be found on our
Unix / Linux page, see our Unix history page for more history on Unix.
1/2005 - Which of the below is not a text editor?
1. Vim
2. Perl
3. Pico
4. Vi
The correct answer for this month's quiz is number two; Perl is a programming
language and not a text editor. See our Vim, Perl, Pico, and Vi dictionary definitions for
additional information.
12/2004 - Which of the below does not have the ability to allow a user to
communicate with another computer?
1. Network Card
2. Serial Port
3. VGA Port
4. Modem
The correct answer for this month's quiz is number three. A network card, serial port, and
Modem all are hardware devices that allow a user to communicate with another
computer. A VGA port, however, only allows the computer to communicate with a
computer monitor.
3. 40-pin
4. 50-pin
The correct answer for this month's quiz is number three. The IDE/EIDE connector is a
forty-pin connector and is is one of the most widely used type of connectors used on IBM
compatible computers.
6/2004 - Which of the below is related to memory?
1. PS
2. DSP
3. Flops
4. Cache
The correct answer for this month's quiz is number four. Cache is related to memory
while all other definitions are not. See the following definitions for additional
information about each of these terms: PS, DSP, Flops, and Cache.
5/2004 - Which of the following is not related to computer video.
1. DirectX
2. AC-3
3. GeForce
4. OpenGL
The correct answer for this month's quiz is number two. AC-3 is related to sound and not
computer video. See any of the following definitions for additional information about
each of these terms: DirectX, AC-3, GeForce, and OpenGL.
4/2004 - How many keys are there on the majority of the standard US keyboard
today?
1. 100
2. 102
3. 104
4. 106
The correct answer for this month's quiz is number three. Although many US computer
keyboards also have 101 keys, with the advent of the 104-key keyboard with the
Microsoft Windows keys, most computers are using a 104-key keyboard. Also see our
101-key keyboard definition and 104-key keyboard definition.
3/2004 - Which of the following is not related to chat?
1. IRC
2. IM
3. Op
4. AutoPlay
The correct answer for this month's quiz is number four. See each of the following
definitions for additional information about each of these terms. IRC, IM, Op, and
AutoPlay.
2/2004 - Which of the following is not considered a super user?
1. Admin
2. Agent
3. Op
4. Root
The correct answer for this month's quiz is number two. See each of the following
definitions for additional information about each of these terms. Admin, Agent, Op, and
Root.
1/2004 - Which of the below commands displays the time on most Linux and Unix
computers?
1. time
2. date
3. timex
4. now
The correct answer for this month's quiz is number two. The time command is used to
time a command and not display the time. To display the time and date, users must use
the date command. Users who may come from an MS-DOS environment may have
difficulties with this little difference at first.
1. Which of the following is most likely to make your computer stop working?
a. Trojan
b. Worm
c. Virus
d. Spyware
e. Adware
2. Which of the following is not a stand-alone program?
a. Trojan
b. Worm
c. Virus
d. Spyware
e. Adware
3. Which of the following is most likely to send spam emails from your computer?
a. Trojan
b. Worm
c. Virus
d. Spyware
e. Adware
4. Which of the following is lest likely to be detected with standard antivirus software?
a. Trojan
b. Worm
c. Virus
d. Spyware
e. Adware
5. Which of the following is most likely to come with other malware?
a. Trojan
b. Worm
c. Virus
d. Spyware
e. Adware
6. Which of the following is bundled with the peer-to-peer file-sharing software, Kazaa?
a. Trojan
b. Worm
c. Virus
d. Spyware
e. Adware
7. Which of the following is most likely to install a "backdoor" internet connection?
a. Trojan
b. Worm
c. Virus
d. Spyware
e. Adware
8. Which of the following is most likely to be involved in a denial-of-service attack?
a. Trojan
b. Worm
c. Virus
d. Spyware
e. Adware
9. Which of the following is the only malware publicly documented as having been
employed by the FBI to bring a suspect to trial?
a. Trojan
b. Worm
c. Virus
d. Spyware
e. Adware
1) I can open a file from a floppy disk and save it on a hard drive and vice versa.
unable
adequate
fluent
Check Answer
2) I can cut, copy and paste text both within an application and between multiple open
applications.
unable
adequate
fluent
Check Answer
3) I can create, copy, move, rename and delete file folders.
unable
adequate
fluent
Check Answer
4) I can send, open, forward and reply to email messages.
unable
adequate
fluent
Check Answer
5) I can send, receive and open email attachments.
unable
adequate
fluent
Check Answer
6) I can install software.
unable
adequate
fluent
Check Answer
7) I can use a word processing program (MS Word).
unable
adequate
fluent
Check Answer
8) I know how to reload a page in a web browser.
unable
adequate
fluent
Check Answer
9) I know how to clear the cache or temporary Internet files in a web browser.
unable
adequate
fluent
Check Answer
10) I know how to make a bookmark/favorite in a web browser.
unable
adequate
fluent
1) Saving files from one computer drive to another is an essential computer skill.
Proficiency in this skill allows you to transport your files from one computer to another.
2) Adequate knowledge of the cut, copy, and paste command is essential in web-based
courses. You will often need to copy and paste your work into email, forms or threaded
discussions.
3) Being able to create, copy, move, rename and delete file folders will help you organize
and maintain your data.
Additional Information:
Users who are considering making a change from Windows to Linux or Linux to
Windows commonly want to know the advantages and disadvantages of each of the
Operating Systems. Below is a chart to help illustrate the major advantages and
disadvantages of each of these Operating Systems.
Answer:
Topic
Price
Ease
Linux
Windows
reliability of Linux.
Linux has a large variety of available Because of the large amount of
software programs, utilities, and
Microsoft Windows users, there is a
Software games. However, Windows has a much much larger selection of available
larger selection of available software. software programs, utilities, and
games for Windows.
Many of the available software
programs, utilities, and games
available on Linux are freeware and/or
Software
open source. Even such complex
Cost
programs such as Gimp, OpenOffice,
StarOffice, and wine are available for
free or at a low cost.
Open
Source
Many of the Linux variants and many Microsoft Windows is not open
Linux programs are open source and source and the majority of Windows
enable users to customize or modify
programs are not open source.
the code however they wish to.