Thursday, April 7, 2016

Interview Questions 13

There are TWO PARTS in this paper. PART ONE contains THREE questions and PART TWO contains SIX questions. PART ONE is to be answered in the SPECIAL ANSWER SHEET only, attached to the ANSWER BOOK, as per the instructions contained therein.

TOTAL MARKS: 100 (PART ONE - 30, PART TWO - 70) PART 1 (Answer all the questions) 1 Each question below gives multiple choices of answers. Choose the most appropriate one and enter in the "SPECIAL ANSWER SHEET" attached to the ANSWER BOOK, following instructions therein. (1 X 10) 1.1 A list of items, in which additions and deletions may be made at either end is known as a jy Queue. B. Push-down stack C. Deque D. None of the above 1.2 Reentrant code provides for A. Execution of object program instruction segments by more than one process at the same time. J1. Improved console operations. C. Multiprocessing D. Contiguous areas of memory for storage of program, variables, data, reference, and dynamic process history. Which is not a debugging technique A. Core dumps Traces B. Print Statements D. Regression Testing

1.3

-e:

1.4

The A. B. C.

.p.

process of transforming a model into source code is Reverse Engineering Forward Engineering Re-engineering Re-structuring

1.5 The process by which existing processes and methods are replaced by new processes and techniques is A. Reverse Engineering B. Business Process Re-engineering C. Software Process Management Forward Engineering

».

1.6

init and cron are: ft.. linux processes B. DOS processes C. Windows processes D. None of the above. The differences between constructors and destructor in C++ are A. constructors can take arguments but destructor can't B. constructors can be overloaded but destructor can't be overloaded .AJ. both A & B D. none of these Use A. ..E. C. D. Case is a: case in case/switch statement in a programming language . a part of use case diagram, a modeling element. special case in legal cases in computer industry. None of the above.

1.7

1.8

1.9

PATH A. is a system variable naming the list of directories required to be searched for finding the commands to be executed. vi3. is a path to be followed in finding Critical Path Method in Pert/CPM techniques C. is a system variable naming the list of directories required to be searched for finding a class. D. None of the above.

1.10 When a language has the capability to prod\lce new datatype, it is called ~ Extensible B. Overloaded C. Encapsulated D. Reprehensible

2

Each statement below is either TRUE or FALSE. Choose the most appropriate one and ENTER in the "SPECIAL ANSWER SHEET" attached to the ANSWER BOOK, following instructions therein. JavaScript is an old version of Java Language.

2.1 2.2 2.3 2.4

'I (j)

Maintenance stage in SDLS precedes Implementation . ../' Symbian is an operating system. X-

(j)

Hotswappable hard disks requires systems to be closed and cooled before they can be removed. ~ PHP and Perl are examples of spreadsheet packages .

2.5

.:x! (!)

2.7

The fields in a C++ program are by default private.

vi'

(j)

2.9

A return code of 0 from a function is interpreted that there are errors during its execution. 'I When a variable is passed by reference to a procedure, the changes made to the variable are passed back to the calling procedure. ;/'

2.10

3

Each statement below has a blank space to be filled. Enter your choice in the "SPECIAL ANSWER SHEET" attached to the ANSWER BOOK, following instructions therein. (1 X 10) interface.

3.2 3.3

The time required by a sector to reach below the read/write head What will be the output of the following code snippet
c

I~

7'
I"

r /. Ie ~ J)v

try { int x = 0; int y = SO/x; System.out.println("Division by Zero is an error"); } catch(ArithmeticException e) { System.out.print1n("catch block"); } In a select statement clause restricts the grouped rows that appear in 1f\1' the result.

/ul

11;

3.5 3.6 3.7

The process of mapping/initialising a disk is called A popular open source DBMS

/,"zl,£

'1

J'&l

J2 2=)!~;4""

An image scanner with tit YCbtvf software can translate a scanned text into text that can be edited.

3.8

A BIOS routine called , that run~ whenever the system determine the functioning of various parts of the computer system.

l~

started to

PART 2 (Answer any five questions) 4 Write short note on 4. De-fragmentation, compression and encryption .-b. Open Source, Commercial Software and Freeware c. Paging and Segmentation d. SDLC and its stages

fl

What do you understand by Complexity of Sorting Algorithms? Explain in the context of various sorting techniques. b. Write Quick Sort Algorithm using pseudocode and verify your code by tracing an example.

~. Explain final, finally, finalise, this and super in Java Context b. Consider the following stack, where stack is allocated N = 6 memory cells STACK: AAA, DDD, EEE, FFF, GGG, _ Describe the stack as the following operations take place: (i) PUSH(ST ACK,KKK), (ii) POP(ST ACK,ITEM), (iii) PUSH(STACK,LLL), (iv) PUSH(STACK,SSS), (v) POP(ST ACK,ITEM), (vi) PUSH(STACK,TTT) c. What does chmod, vi and grep do in linux system?

a. What is Object Oriented Programming? Why is Java called portable or platform independent language b.Write a program(in Java or C++) to produce fibonacci numbers FO, Fl given below. Should one use recursion or iteration for the above program and why? n=O, n=l, n>=2

Fn = {~ Fn-l + Fn-2

a. Let a and b denote positive integers. Suppose a function Q is defined recursively as follows Q(a,b) = { 0 Q(a-b,b) + I ifa
(i) Find the value ofQ(2,3) and Q(l4,3) (ii) What does this function do? Find Q(5861,7). c-b. Describe Method Overloading and Method Overriding. c. Let LIST be a linked list in memory. v\7ritea procedure which finds the number NUM of times a given ITEM occurs in LIST

,<

a. Based on type of organization of data what are different types of DBMS? Oive examples of commercially available DBMS's today. b. An organization conducts training programmes (courses) for its own employees. '" These employees are recognized in the organization by an ~mployee code and are placed in different specialized groups called Divisions headed by HODs (who are also employees). Design a fully normalized database, clearly indicating primary key and foreign key constraints, to store following information: Employee Name, Employee Code, Designation, Division Name, HOD Name, Course Title (Training Programme Title), Course Start Date, Course Duration etc Write SQL statementto generate (i)Division wise (List of all employees in a division) with the HOD Name (ii)List of courses attended by a particular employee (iii)List of employees who have attended a particular training programme c. Describe ACID in the context of DBMS.

No comments:

Followers

Link