CSC Model Papers
CSC Model Papers
com/placement-papers/csc/
http://placement.freshersworld.com/placement-papers/company/CSC%20/224
http://www.m4maths.com/placement-puzzles.php?SOURCE=csc
http://www.vyoms.com/placement-papers/companies/details/csc-india-pvt-ltd-1249.asp
Company Profile
WE ARE LOCATED WHERE OUR CLIENTS NEED US
In addition to our headquarters in Falls Church, Virginia, USA, and three other major offices in
Australia, Asia and Europe, our 98,000 professionals serve clients in more than 90 countries.
WHAT WE DO
For more than 50 years, we at CSC have developed smart, technology-enabled solutions to solve our
clients' toughest challenges, demonstrating a commitment to excellence and a passion for exceeding
expectations.
Over the past five decades, technology has radically changed the world we live in. We have remained at
the forefront of our business because we have understood how to use technology change and innovation to
deliver value to our clients.
WE DO AMAZING THINGS
We are often asked, "What is it that you do?" We tell them, humbly and yet truthfully: we do amazing things.
We help solve big challenges. Technically complex, mission-critical challenges. Watch our video, which
brings to life a few of those challenges through four short case studies. Or, read from a list of hundreds of
our client success stories.
FIFTY+ YEARS OF SUCCESS
It started with two men who had a dream. From the moment CSC was born on April 16, 1959, ingenuity has
been a driving force behind our success. Explore our rich history.
COMPANY PROFILE
Read a concise description of our services, financial data, strategic programs and representative client
engagements (PDF, 320 KB). Or download our Company Profile Infographic (PDF).
OUR MANAGEMENT TEAM
Our senior management team has an average of 25 years of domestic and international IT experience and
a strong history of business, academic and technological accomplishments.
FINANCIAL PERFORMANCE
CSC (NYSE: CSC) reported trailing 12 months revenue of $15.9 billion for the third quarter ending March
30, 2012.
Our Mission and Values
CSC'S Mission
The mission of CSC is to be a global leader in providing technology-enabled business solutions and
services.
Our Values are Clear
CLIENT FOCUSED
Our success derives from a deep understanding of our clients, to whom all of CSC is committed to deliver
exceptional service and value.
LEADERSHIP
We lead from the front, displaying our integrity and using facts to support our straight talk. We create an
environment for positive change built on collaboration and trust.
EXECUTION EXCELLENCE
We insist on excellence in all we do for clients and ourselves, striving always for recognition among the
leaders in our industry.
ASPIRATION
We aspire individually and collectively to be more tomorrow than we are today.
RESULTS
We accept individual responsibility for our commitments and expect to be accountable for results.
Diversity Statement
We value the diversity of our employees and the unique perspectives they bring to CSC. Diversity at CSC
not only includes age, race, sex, sexual orientation/gender identity, genetic information, disabilities, and
ethnicity, but also jobs and functional roles within the company, the markets and clients we serve, our
geographic locations, educational background and whether one joined CSC independently or through an
acquisition or outsourcing arrangement. By valuing these differences, we demonstrate our commitment to
treating everyone with fairness and respect.
CSC Company Profile
CSC (Computer Sciences Corporation) is a leading information technology (IT) services company. CSCs
mission is to be a global leader in providing technology-enabled business solutions and services.The
company is one of the leading outsourcing solutions providers in the world. It has a strong position in
providing IT services to government customers.
CSC also provides business process outsourcing, managing key functions for clients, such as procurement
and supply chain, call centers and customer relationship management, credit services, claims processing
and logistics. I/T and professional services include systems integration, consulting and other professional
services. Systems integration encompasses designing, developing, implementing and integrating complete
information systems. Consulting and professional services includes advising clients on the strategic
acquisition and utilization of I/T and on business strategy, security, modeling, simulation, engineering,
operations, change management and business process reengineering.
With approximately 90,000 employees, CSC provides innovative solutions for customers around the world
by applying leading technologies and CSCs own advanced capabilities. These include systems design and
integration; IT and business process outsourcing; applications software development; Web and application
hosting; and management consulting. Headquartered in Falls Church, Va., CSC reported revenue of $16.5
billion for the 12 months ended March 28, 2008.
Specialties
Consulting, IT, Systems Integration, Outsourcing
Headquarters Washington D.C. Metro Area
Industry Information Technology and Services
Type Public Company
Status Operating
Company Size 90,000 employees
2008 Revenue $16,500
Founded 1959
Contact
3170 Fairview Park Drive
Falls Church, VA 22042
United States
CSC India
CSC started its operations in India in 1991. With centers in Noida, Indore, Hyderabad, Chennai, Mumbai,
Bangalore and Vadodara, and approximately 19,000 employees, CSC is one of the fastest growing IT
services firms in India. CSCs strong local presence enables the company to offer high-value technology
solutions and a rich portfolio of services to customers across industry segments, including applications
development and product support, infrastructure and BPO services, to clients worldwide. CSC in India is
consistently recognized in best employer award categories and houses the companys first Office of
Innovation outside the U.S.
For the parent company that has a presence in 92 countries, India is the third largest delivery location in the
world. CSC India serves most of the parent company's clients based in North America and Europe. The
company is present in domains like insurance, banking, healthcare, retail, defense manufacturing, retail
and others. Nearly 33 per cent of the parent company's revenue is derived from the American government,
19 per cent from defense, 17 per cent from financial services and the balance from other segments.
CSCs mission is to help clients achieve strategic goals and profit from the use of Information Technology.
CSC India offers applications services, product development and support services, infrastructure services,
IT outsourcing and BPO services to clients worldwide. With a winning combination of strong functional
knowledge, in-depth technological expertise, uncompromised process rigour and world class industry
standards and compliance in place, CSC India has consistently built upon its experience to deliver business
results in the global information technology marketplace, thus earning the trust of some of the worlds
biggest organisations.
The company is hiring freshers as well as experienced hands. "Nearly 10-15 per cent of the recruitments
are freshers. Our attrition rate is 14 per cent."
They have centres at Hyderabad, Chennai, Bangalore, Mumbai, Noida, Indore, Vadora etc
Contact
Building #7, Mind Space IT Park,
Survey #64, Part APIIC Software Layout
Madhapur, Hitech City,
Hyderabad (AP) - 500 081
Technical round
a) session memory
b) bubble memory
c) cache memory
d) shared memory
4.A small subnet that sit between atrusted internal network and an untruster external network, such as the
public internet.
a) LAN
b) MAN
c) WAN
d) DMZ
5.Technologies that use radio waves to automatically identify people or objects,which is very similar to the
barcode identification systems,seen in retail stores everyday.
a)BLUETOOTH
b) RADAR
c)RSA SECURE ID
d)RFID
6.main(){
float fl = 10.5;
double dbl = 10.5
if(fl ==dbl)
printf(UNITED WE STAND);
else
printf(DIVIDE AND RULE)
}
what is the output?
a)compilation error b)UNITED WE STAND c)DIVIDE AND RULE d)linkage error.
7.main(){
static int ivar = 5;
printf(%d,ivar--);
if(ivar)
main();
}
what is the output?
a)1 2 3 4 5
b) 5 4 3 2 1
c)5
d)compiler error:main cannot be recursive function.
8.main()
{
extern int iExtern;
iExtern = 20;
printf(%d,iExtern);
}
what is the output?
a)2
b) 20
c)compile error
d)linker error
9..#define clrscr() 100
main(){
clrscr();
printf(%d\n\t, clrscr());
}
what is the output?
a)100
b)10
c)compiler error
d)linkage error
10.main()
{
void vpointer;
char cHar = g, *cHarpointer = GOOGLE;
int j = 40;
vpointer = &cHar;
printf(%c,*(char*)vpointer);
vpointer = &j;
printf(%d,*(int *)vpointer);
vpointer = cHarpointer;
printf(%s,(char*)vpointer +3);
}
what is the output?
a)g40GLE b)g40GOOGLE c)g0GLE d)g4GOO
11.#define FALSE -1
#define TRUE 1
#define NULL 0
main() {
if(NULL)
puts(NULL);
else if(FALSE)
puts(TRUE);
else
puts(FALSE);
}
what is the output?
a)NULL
b)TRUE
c)FALSE
d)0
12.main() {
int i =5,j= 6, z;
printf(%d,i+++j);
}
what is the output?
a)13 b)12 c)11 d)compiler error
13.main() {
int i ;
i = accumulator();
printf(%d,i);
}
accumulator(){
_AX =1000;
}
what is output?
a)1
b)10
c)100
d)1000
14.main() {
int i =0;
while(+(+i--)!= 0)
i- = i++;
printf(%d,i);
}
what is the output?
a)-1 b)0 c)1 d)will go in an infinite loop
15.main(){
int i =3;
for(; i++=0;)
printf((%d,i);
}
what is the output?
a)1
b)2
c)1 2 3
d)compiler error:L value required.
16.main(){
int i = 10, j =20;
j = i ,j?(i,j)?i :j:j;
printf(%d%d,i,j);
}what is the output?
a)20
b)20
c)10
d)10
17.main(){
extern i;
printf(%d\t,i);{
int i =20;
printf(%d\t,i);
}
}
what is output?
a) Extern valueof i 20
b)Externvalue of i
c)20d)linker Error:unresolved external symbol i
18.int DIMension(int array[]){
return sizeof(array/sizeof(int);}
main(){
int arr[10];
printf(Array dimension is %d,DIMension(arr));
}
what is output?
a)array dimension is 10
b)array dimension is 1
c) array dimension is 2
d)array dimension is 5
19.main(){
void swap();
int x = 45, y = 15;
swap(&x,&y);
printf(x = %d y=%dx,y);
}
void swap(int *a, int *b){
*a^=*b, *b^=*a, *a^ = *b;
what is the output?
a) x = 15, y =45
b)x =15, y =15
c)x =45 ,y =15
d)x =45 y = 45
20.main(){
int i =257;
int *iptr =&i;
printf(%d%d,*((char*)iptr),*((char *)iptr+1));
}
what is output?
a)1, 257
b)257 1
c)0 0
d)1 1
21.main(){
int i =300;
char *ptr = &i;
*++ptr=2;
printf(%d,i);
}
what is output?
a)556
b)300
c)2
d)302
22.#include
main(){
char *str =yahoo;
char *ptr =str;
char least =127;
while(*ptr++)
least = (*ptr
printf(%d,least);
}
what is the output?
a)0
b)127
c)yahoo
d)y
23.Declare an array of M pointers to functions returing pointers to functions returing pointers to characters.
a)(*ptr[M]()(char*(*)());
b)(char*(*)())(*ptr[M])()
c)(char*(*)(*ptr[M]())(*ptr[M]()
d)(char*(*)(char*()))(*ptr[M])();
24.void main(){
int I =10, j=2;
int *ip = &I ,*jp =&j;
int k = *ip/*jp;
printf(%d,k);
}
what is the output?
a)2
b)5
c)10
d)compile error:unexpected end of file in comment started in line 4
25.main(){
char a[4] =GOOGLE;
printf(%s,a);
}
MOV A,B
CMA
HLT
a)S = 1, Z = 0, CY = 1
b)S = 0, Z = 1, CY = 0
c) S = 1, Z = 0, CY = 0
d)S = 1, Z = 1 ,CY = 1
37.A positive going pulse which is always generated when 8085 MPU begins the machine cycle.
a) RD
b) ALE
c) WR
d) HOLD
38.when a ----- instruction of 8085 MPU is fetched , its second and third bytes are placed in the W and Z
registers.
a) JMP
b) STA
c) CALL
d) XCHG
39.what is defined as one subdivision of the operation performed in one clock period.
a) T- State
b) Instruction Cycle
c) Machine Cycle
d) All of the above
40.At the end of the following code, what is the status of the flags.
LXI B, AEC4H
MOV A,C
ADD B
HLT
a) S = 1, CY = 0, P = 0 , AC = 1
b) S =0 , CY = 1, P = 0,AC = 1
c) S = 0, CY = 1, P = 0 , AC = 1
d) S = 0, CY = 1, P = 1 , AC = 1
41. In 8051 micro controller what is the HEX number in the accumulator after the execution of the following
code.
MOV A,#0A5H
CLR C
RRC A
RRC A
RL A
RL A
SWAP A
a)A6
b)6A
c)95
d)A5.
42. The Pentium processor requires ------------ volts.
a)9
b)12
c)5
d)24.
43. The data bus on the Celeron processor is-------bits wide.
a)64
b)32
c)16
d)128.
44. K6 processor
a) Hitachi
b) toshiba
c) zilog
d) AMD.
45. What is the control word for 8255 PPI,in BSR mode to set bit PC3.
a)0EH
b)0FH
c)07H
d)06H.
46. The repeated execution of a loop of code while waiting for an event to occur is called ---------.The cpu is
not engaged in any real productive activity during this period,and the process doesnt progress towards
completion.
a) dead lock
b) busy waiting
c) trap door
d) none.
47. Transparent DBMS is defined as
a) A DBMS in which there are no program or user access languages.
b) A DBMS which has no cross file capabilities but is user friendly and provides user interface
management.
c) A DBMS which keeps its physical structure hidden from user
d) none.
48. Either all actions are carried out or none are.users should not have to worry about the effect of
incomplete transctions.DBMS ensures this by undoing the actions of incomplete transctions.this property is
known as
a) Aggregation
b) atomicity
c) association
d) data integrity.
49..------ algorithms determines where in available to load a program. common methods are first fit,next
fit,best fit.--------- algorithm are used when memory is full , and one process (or part of a process) needs to
be swaped out to accommodate a new program.The ------------- algorithm determines which are the partions
to be swaped out.
a) placement, placement, replacement
b) replacement, placement, placement
c) replacement, placement, replacement
d) placement, replacement, replacement
50. Trap door is a secret undocumented entry point into a program used to grant access without normal
methods of access authentication.A trap is a software interrupt,usually the result of an error condition.
a)true
b)false.
51. Given a binary search tree,print out the nodes of the tree according t5o post order traversal.
4
/\
25
/\
13
a)3,2,1,5,4.
b)1,2,3,4,5.
c)1,3,2,5,4.
d)5,3,1,2,4.
52. Which one of the following is the recursive travel technique.
a)depth first search
b)preorder
c)breadth first search
d)none.
53. which of the following needs the requirement to be a binary search tree.
a) 5
/\
27
/
1
b) 5
/\
67
c) 5
/\
27
/\
16
d) none.
54. In recursive implementations which of the following is true for saving the state of the steps
a)as full state on the stack
b) as reversible action on the stack
c)both a and b
d)none
55. which of the following involves context switch
a)previliged instruction
b)floating point exception
c)system calls
d)all
e)none
56. piggy backing is a technique for
a)acknowledge
b)sequence
c)flow control
d)retransmission
57. a functional dependency XY is ___________dependency if removal of any attribute A from X means
that the dependency does not hold any more
a)full functional
b) multi valued
c)single valued
d)none
58. a relation schema R is in BCNF if it is in ___________and satisfies an additional constraints that for
every functional dependency XY,X must be a candidate key
a)1 NF
b)2 NF
c)3 NF
d)5 NF
59. a _________sub query can be easily identified if it contains any references to the parent sub query
columns in the _________ clause
A) correlated ,WHERE
b) nested ,SELECT
c) correlated,SELECT
d) none
60. hybrid devise that combines the features of both bridge and router is known as
a)router
b)bridge
c)hub
d)brouter
67. A________class is a class that represents a data structure that stores a number of data objects
a. container
b.component
c.base
d.derived
68. Which one of the following phases belongs to the compiler Back-end.
a. Lexical Analysis
b.Syntax Analysis
c. Optimization
d.Intermediate Representation.
69. Every context _sensitive language is context_free
a. true b.false
70. Input:A is non-empty list of numbers L
X-infinity
For each item in the list L,do
If the item>x,then
Xthe item
Return X
X represents:a)largest number
b)smallest number
c)smallest negative number
d) none
71. Let A and B be nodes of a heap,such that B is a child of A. the heap must then satisfy the following
conditions
a)key(A)>=key(B)
b)key(A)
c)key(A)=key(B)
d)none
72. String ,List,Stack,queue are examples of___________
a)primitive data type
b)simple data type
1.
B.
C.
Reduced cost
D.
E.
Ans-B
2.
ALGOL
B.
APL
C.
LOGO
D.
FORTH
E.
Ans-D
3.
1100112
B.
1000112
C.
1111002
D.
0001012
E.
Ans-B
4.
A computer-controlled device for training exercises that duplicates the work environment is a:
A.
simulator
B.
duplicator
C.
trainer
D.
COM device
E.
Ans-A
5.
The latest PC keyboards use a circuit that senses the movement by the change in its
capacitance. What are these keyboards called?
A.
Capacitance keyboards
B.
Mechanical keyboards
C.
Qwerty keyboards
D.
Dvorak keyboards
E.
Ans-A
6.
char *foo()
{
char result[100]);
strcpy(result,"anything is good");
return(result);
}
void main()
{
char *j;
j=foo()
printf("%s",j);
}
7.
void main()
{
char *s[]={ "dharma","hewlett-packard","siemens","ibm"};
char **p;
p=s;
printf("%s",++*p);
printf("%s",*p++);
printf("%s",++*p);
}
8.
9.
10.
main(){
char *s1 = "hello",*s2 ="abce";
strcpy(s1,"");
s2[0] = s1[0];
printf("%d%d",strlen(s1),strlen(s2));
}
11.
B.
LISP
C.
D.
Cybernetics
E.
Ans-A
12.
void main()
{
unsigned i=1; /* unsigned char k= -1 => k=255; */
signed j=-1; /* char k= -1 => k=65535 */
/* unsigned or signed int k= -1 =>k=65535 */
if(i<j)
printf("less");
else
if(i>j)
printf("greater");
else
if(i==j)
printf("equal");
}
Ans-less
13.
Map
B.
Mask
C.
Mamtossa
D.
Marker
E.
Ans-B
14.
B.
C.
D.
E.
Ans-A
15.
Computer program
B.
Algorithm
C.
Flowchart
D.
Utility programs
E.
Ans-A
16.
B.
ml
C.
D.
time
E.
Ans-A
17.
B.
C.
D.
E.
Ans_C
18.
A network schema
A.
B.
C.
D.
E.
Ans_B
19.
cannot be made to execute in any area of storage other than the one
designated for it at the time of its coding or translation
B.
C.
D.
Ans-C
20.
21.
Write program to open one file input some numbers and find smallest, largest, avg. and store
them in another file
22.
23.
#include
main()
{
int x=20, t;
&t=x;
x=50;
cout<<x<<" "<<t;
}
24.
SPARC
B.
IBM-compatible
C.
Alpha
D.
Macintosh
E.
Ans-D
25.
fdisk
B.
mkfs
C.
fsck
D.
mount
E.
Ans-D
26.
#include<stdio.h>
main()
{
char *p1;
char *p2;
p1=(char *) malloc(25);
p2=(char *) malloc(25);
strcpy(p1,"Ramco");
strcpy(p2,"Systems");
strcat(p1,p2);
printf("%s",p1);
}
27.
What command is used to count just the number of lines contained in a file?(Linux)
A.
wc - r
B.
wc - w
C.
wc - c
D.
wc - l
E.
Ans-D
28.
The probability that a single bit will be in error on a typical public telephone line using 4800 bps
modem is 10 to the power -3. If no error detection mechanism is used, the residual error rate for a
communication line using 9-bit frames is approximately equal to
A. 0.003
C. 0.991
B. 0.009
D. 0.999
Ans-B
29.
time?
which of the following condition is used to transmit two packets over a medium at the same
A.
Contention
B.
Collision
C.
Synchronous
D.
Asynchronous
E.
Ans-B
printf m,n,z
{
(m-m+1;n=n-3)
if (m+n+2)>14 then goto test
print m,n,z
end
}
30.
31.
a) only 5
b) only 6
c) neither 5 or 6
d) both 5 and 6
ans-D.
32.
ans- 5,6,2
33.
a)1,8,4
b)1,4,8
c)4,8,1 d
)8,4,2
ans=C.
34.
ans) twice
35.
What will be thethe remainder when 9FA (hexa) is divided by 8 is added to the 12(to base ten)
to get x.then x has the binary operation
36.
a) Intel
b)motorola
c)nec
ans =nec
37.
main()
{
int i=3
printf ("%d %d %d ",++i,i-,i+=5);
}
38.
main()
{
int times =5;
d)Ibm
int i=3;
int j=4;
int k=34;
i=j+k;
while(times --)
{
i=times
j=times
k=times
}
printf("%d %d %d " ,i,j,k)
}
39.
main()
{
int number =25;
char name ='A'
printf("The addition of the name and the number is %o "name +_number)
}
Ans-Compiler error
40.
Infected disks
)links to a network
c)
ans)D
41.
42.
43.
What is the difference between member functions and static member functions?
44.
45.
46.
47.
a) 0.0111
b) 0.1011
c) 0.1111
d) none
Ans. (c)
48.
a) if (X==0) Y ;else Z
b) if (X!=0) Y ;else Z
c) if (X==0) Y ; Z
Ans. (b)
49.
The following function gives some error. What changes have to be made
void ( int a,int b)
{
int t; t=a; a=b; b=t;
}
50.
51.
#include<stdio.h>
void swap(int*,int*);
main()
{
int arr[8]={36,8,97,0,161,164,3,9}
for (int i=0; i<7; i++)
{
for (int j=i+1; j<8;j++)
if(arr[i]<arr[j]) swap(&arr[i],&arr[j]);
}
}
void swap(int*x,int*y)
{
int temp; static int cnt=0;
temp= *x;
*x=*y;
*y=temp;
cnt++;
}
What is cnt equal to
52.
int main()
{
FILE *fp;
fp=fopen("test.dat","w");
fprintf(fp,'hello\n");
fclose(fp);
fp=fopen ("test.dat","w");
fprintf (fp, "world");
fclose(fp);
return 0;
}
If text.dat file is already present after compiling and execution how many bytes does the file occupy ?
a) 0 bytes
b) 5 bytes
c) 11 bytes
d) data is insufficient
53.
f1(int*x,intflag)
int *y;
*y=*x+3;
switch(flag)
{
case 0:
*x=*y+1;
break;
case 1:
*x=*y;
break;
case 2:
*x=*y-1;
break;
}
return(*y)
main()
{
*x=5;
i=f1(x,0); j=f1(x,1);
printf("%d %d %d ",i,j,*x);
}
54.
#include <stio.h>
int sum,count;
void main(void)
{< BR> for(count=5;sum+=--count;)
printf("%d",sum);
}
55.
#include <stdio.h>
void main(void)
{
int i;< BR> for(i=2;i<=7;i++)
printf("%5d",fno());
}
fno()
{
staticintf1=1,f2=1,f3;
return(f3=f1+f2,f1=f2,f2=f3);
}
56.
#include <stdio.h>
#include <string.h>
int foo(char *);
void main (void)
{
char arr[100] = {"Welcome to CSC"};
foo (arr);
}
foo (char *x)
{
printf ("%d\t",strlen (x));
printf ("%d\t",sizeof(x));
return0;
}
57.
#include <stdio.h>
#define sum (a,b,c) a+b+c
#define avg (a,b,c) sum(a,b,c)/3
#define geq (a,b,c) avg(a,b,c) >= 60
#define lee (a,b,c) avg(a,b,c) <= 60
#define des (a,b,c,d) (d==1?geq(a,b,c):lee(a,b,c))
void main (void)
{
int num = 70;
char ch = '0';
float f = 2.0;
if des(num,ch,f,0) puts ("lee..");
else puts("geq...");
}
58.
#include <stdio.h>
char *rev(int val);
void main(void)
{
extern char dec[];
printf ("%c", *rev);
}
char *rev (int val)
{
char dec[]="abcde";
return dec;
}
59.
#include<stdio.h>
void main(void)
{
enum sub
{
chemistry, maths, physics
};
struct result
{
char name[30];
enum sub sc;
};
60.
#include <stdio.h>
void swap (int x, int y, int t)
{
t = x;
x = y;
y = t;
printf ("x inside swap: %d\t y inside swap : %d\n",x,y);
}
void main(void)
{
int x;
int y;
int t;
x = 99;
y = 100;
swap (x,y,t);
printf ("x inside main:%d\t y inside main: %d",x,y);
}
a. x inside swap : 100 y inside swap : 99 x inside main : 100 y inside main : 99
b. x inside swap : 100 y inside swap : 99 x inside main : 99 y inside main : 100
c. x inside swap : 99 y inside swap : 100 x inside main : 99 y inside main : 100
d. x inside swap : 99 y inside swap : 100 x inside main : 100 y inside main : 99
e. Not sure
61.
#include <stdio.h>
struct my_struct
{
int p:1;
int q:1;
int r:6;
int s:2;
};
struct my_struct bigstruct;
struct my_struct1
{
char m:1;
};
struct my_struct1 small struct;
void main (void)
{
printf ("%d %d\n",sizeof (bigstruct),sizeof (smallstruct));
}
62.
#include <stdio.h>
void main (void)
{
short x = 0x3333;
short y = 0x4321;
long z = x;
z = z << 16;
z = z | y;
printf("%1x\t",z);
z = y;
z = z >> 16;
z = z | x;
printf("%1x\t",z);
z = x;
y = x && y;
z = y;
printf("%1x\t",z);
}
63.
#include <stdio.h>
void main (void)
{
char *p = "Bangalore";
#if 0
printf ("%s", p);
#endif
}
64.
b. void *
c. no return type: return type is void
d. int e. Not sure
65.
y = *(float *)&x;
66.
B.
C.
D.
E.
Ans-C
67.
To avoid the race condition, the number of processes that may be simultaneously inside their
critical section is
A.
B.
C.
16
D.
E.
Ans-B
68.
Which one of the following kinds of materials has the lowest permeability?
A.
A diamagnetic material
B.
A paramagnetic material
C.
A feiTomagnetic material
D.
E.
Ans-A
69.
B.
C.
D.
E.
Ans-D
70.
he rise time of a pulse waveform is the time required for the voltage to rise:
A.
B.
C.
D.
E.
Ans-D
71.
B.
C.
D.
currently, there is a very high demand for them, particularly from firms that use
personal computers
E.
Ans-A
72.
B.
C.
D.
E.
Ans-D
73.
Which of the following symbol modes are used to input of graphics to General CAD system?
A.
B.
C.
D.
E.
Ans-D
74.
System.out.print("foo ");
y = x;
}
public static int bar(int z)
{
System.out.print("bar ");
return y = z;
}
public static void main(String [] args )
{
int t = 0;
assert t > 0 : bar(7);
assert t > 1 : foo(8); /* Line 18 */
System.out.println("done ");
}
}
Ans-foo done
75.
int a = Math.abs(-5);
B.
int b = Math.abs(5.0);
C.
int c = Math.abs(5.5F);
D.
int d = Math.abs(5L);
Ans-A
Aptitude
1.
One year ago, the ratio of Roonies and Ronaldos age was 6: 7 respectively. Four years hence,
this ratio would become 7: 8. How old is Ronaldo ?
Ans-36 years
2.
In what ratio must rice at Rs. 9.30 per kg be mixed with rice at Rs. 10.80 per kg so that the
mixture be worth Rs. 10 per kg ?
Ans-8:7
3.
The milk and water in two vessels A and B are in the ratio 4 : 3 and 2: 3 respectively. In what
ratio, the liquids in both the vessels be mixed to obtain a new mixture in vessel C containing half milk
and half water?
Ans-7:5
4.
field.
One side of a rectangular field is 15 m and one of its diagonals is 17 m. Find the area of the
Ans-120m2
5.
A rectangular grassy plot 110 m. by 65 m has a gravel path 2.5 m wide all round it on the
inside. Find the cost of gravelling the path at 80 paise per sq. metre
Ans- Rs 680
6.
There are two sections A and B of a class consisting of 36 and 44 students respectively. If the
average weight of section A is 40kg and that of section B is 35kg, find the average weight of the whole
class?
Ans-37.25 kg
7.
Of the three numbers, second is twice the first and is also thrice the third.If the average of the
three numbers is 44.Find the largest number.
Ans-72
8.
9.
10.
11.
Two cards are drawn at random from a pack of 52 cards.what is the probability that either both
are black or both are queen?
Ans-55/221
12.
A bag contains 6 white and 4 black balls .2 balls are drawn at random. find the probability that
they are of same colour.
Ans-7/15
13.
. In a km race, A beats B by 28 metres or 7 seconds. Find A's time over the course.
14.
A, Band C are three contestants in a km race. If A can give B a start of 40 m and A can give C
a start of 64m how many metre's start can B give C ?
15.
If a : b = 5 : 9 and b : c = 4: 7, find a : b : c.
Ans-20:36:63
16.
A bag contains 50 p, 25 P and 10 p coins in the ratio 5: 9: 4, amounting to Rs. 206. Find the
number of coins of each type
Ans- Number of 50 p coins = 360;
Number of 10 p coins = 160
17.
Monday
B.
Tuesday
C.
Wednesday
D.
Thursday
Ans-C
18.
The calendar for the year 2007 will be the same for the year:
A.
2014
B.
2016
C.
2017
D.
2018
Ans-D
19.
Find the angle between the hour hand and the minute hand of a clock when 3.25.
20.
At what time between 4 and 5 o'clock will the hands of a clock be at right angle?
21.
Find at what time between 8 and 9 o'clock will the hands of a clock being the same straight
line but not together
Ans-120/11 min
22.
Find compound interest on Rs. 7500 at 4% per annum for 2 years, compounded annually.
Ans-RS612
23.
Find the compound interest on Rs. 10,000 in 2 years at 4% per annum, the interest being
compounded half-yearly.
Ans-Rs 824.32
24.
In what time will Rs. 1000 become Rs. 1331 at 10% per annum compounded annually?
Ans-3 years
25.
The difference between the compound interest and simple interest on a certain sum at 10% per
annum for 2 years is Rs. 631. Find the sum.
Ans- Rs631,00
26.
The sum of a rational number and its reciprocal is 13/6. Find the number
Ans-2/3 ot 3/2
27.
If the sum of two numbers is 42 and their product is 437, then find the absolute difference
between the numbers
Ans-4
28.
The average of four consecutive even numbers is 27. Find the largest of these numbers.
Ans-30
29.
Of two numbers, 4 times the smaller one is less then 3 times the 1arger one by 5. If the sum of
the numbers is larger than 6 times their difference by 6, find the two numbers.
Ans-59 & 43
30.
If three numbers are added in pairs, the sums equal 10, 19 and 21. Find the numbers
Ans-6, 4 & 15
31.
Simplify :
32.
1114
Ans-9
33.
An electric pump can fill a tank in 3 hours. Because of a leak in ,the tank it took 3(1/2) hours to
fill the tank. If the tank is full, how much time will the leak take to empty it
Ans-21 hrs
34.
Two pipes A and B can fill a tank in 36 min. and 45 min. respectively. A water pipe C can empty
the tank in 30 min. First A and B are opened. after 7 min,C is also opened. In how much time, the tank
is full?
Ans-39 min
35.
36.
37.
Ans-1.69897
38.
Peter can cover a certain distance in 1 hr. 24 min. by covering two-third of the distance at 4
kmph and the rest at 5 kmph. Find the total distance.
Ans-6 km
39.
Arrange the fractions 5/8, 7/12, 13/16, 16/29 and 3/4 in ascending order of magnitude.
40.
FLOATPTR a,b;
a) float b) float pointer c) int d) int pointer
20. In the following code;
#include<stdio.h>
main()
{
FILE *fp;
fp= fopen("trial","r");
}
fp points to:
a) The first character in the file.
b) A structure which contains a "char" pointer which points to the first character in the file.
c) The name of the file. d) None of the above.
21. Input:A is non-empty list of numbers L
X-infinity
For each item in the list L,do
If the item>x,then
Xthe item
Return X
X represents:a)largest number
b)smallest number
c)smallest negative number
d) none
22. Let A and B be nodes of a heap,such that B is a child of A. the heap must then satisfy the following
conditions
a)key(A)>=key(B)
b)key(A)
c)key(A)=key(B)
d)none
23. String ,List,Stack,queue are examples of___________
a)primitive data type
b)simple data type
c)Abstract data type
d)none
24. which of the following is not true for LinkedLists?
a)The simplest kind of linked list is a single linked list ,which has one link per node .this link points to
the next node in the list,or to a null value or emptylist if it is the last node.
b)a more sophisticated kind of linked list is a double linkedlist or two way linkedlist .Each node has two
links ,one to the previous node and one to the next node.
c) in a circleLinkedList ,the first and last nodes are linked together.this can be done only for double
linked list.
d) to traverse a circular linkedlist ,u begin at any node and follow the list in either direction until u
return to the original node.
25. sentinel node at the beginning and /or at the end of the linkedlist is not used to store the data
a) true
b) false
Logged
/\
16
d) none.
23. in recursive implementations which of the following is true for saving the state of the steps
a)as full state on the stack
b) as reversible action on the stack
c)both a and b
d)none
24. which of the following involves context switch
a)previliged instruction
b)floating point exception
c)system calls
d)all
e)none
25. piggy backing is a technique for
a)acknowledge
b)sequence
c)flow control
d)retransmission
26. a functional dependency XY is ___________dependency if removal of any attribute A from X means
that the dependency does not hold any more
a)full functional
b) multi valued
c)single valued
d)none
27. a relation schema R is in BCNF if it is in ___________and satisfies an additional constraints that for
every functional dependency XY,X must be a candidate key
a)1 NF
b)2 NF
c)3 NF
d)5 NF
28. a _________sub query can be easily identified if it contains any references to the parent sub query
columns in the _________ clause
A) correlated ,WHERE
b) nested ,SELECT
c) correlated,SELECT
d) none
29. hybrid devise that combines the features of both bridge and router is known as
a)router b)bridge c)hub d)brouter
30. In 8051 micro controller what is the HEX number in the accumulator after the execution of the
following code.
MOV A,#0A5H
CLR C
RRC A
RRC A
RL A
RL A
SWAP A
a)A6 b)6A c)95 d)A5.
31. The Pentium processor requires ------------ volts.
a)9 b)12 c)5 d)24.
32. The data bus on the Celeron processor is-------bits wide.
a)64 b)32 c)16 d)128.
33. K6 processor
a) Hitachi b) toshiba c) zilog d) AMD.
34. What is the control word for 8255 PPI,in BSR mode to set bit PC3.
a)0EH b)0FH c)07H d)06H.
What is the value of i if the function is called twice ?
35. Given the following c program
func(int *i, int*j)
{*i=*i * *i;
*j=*j* *j;
}
main()
{ int i = 5, j = 2;
func(&i,&j);
printf("%d %d", i, j);}
36. Find the outpur of the following C program
void f(char *p)
{p=(char *) malloc(6);
strcpy(p,"hello");
}
void main( )
{char *P="bye";
f(p);
printf("%s ,p);
}
37. For the following C program
int x(char *a)
{a=(char *) malloc(10*sizeof(char));
*a="hello";
}
main()
{char *a="new";
x(a);
printf("%s",a);
}
The output is
a) Hello
b) New
c) Hello new
d) Run time error
38. Find the error if any {
struct *sPtr, *nPtr
for(;*nPtr;nPtr=nPtr->next)
free(nPtr);
}
39. Find the output main()
{ void f(int, int);
int i, j;
i=10;
j=10;
f(++i,j++);
}
void f(int i, int j)
{if(i>50)return;
else
i+=j;
f(i,j);
printf("%d",i);
}
Ans 413121
40. kernel executes the first process when system starts
ans :- init();
41.
main()
{ int i=1;
fork();
fork();
fork();
printf("%d",i);
}
how many times i will be printed
ans:8
42In a sequential search, what is the average number of comparisons it takes to search through n
elements ?
Ans: (n+1)/2.
43What is the size of the array declared as double * X[5] ?
Ans. 5 * sizeof ( double * )
44. Find the output for the following C program
main
{int x,j,k;
j=k=6;x=2;
x=j*k;
printf(%d, x);
d.none
Ans: D
2).#include
#define int printf("#int(intv)");
main()
{
int x;
float g;
g=int x
printf("-------------");
}
3) Main ()
{
Static char a[3][4]={"abcd","mnop" ,"fghi"}
Putchar(**a);
}
a)will not compile successfully b)prints a c)prints m d)prints garbage
Ans: b
4)main()
{
Int i=100;
Int M();
Printf("%d",(*M)(i));
}
Int M(x)
Int x;
{
Printf("%d",++x);
}
a)prints 100 b)prints 101 c)prints error d)prints 1013
5) main()
{
Int i=7
If(0==fork())
I+=10;
Else
{
Wait(0);
Printf("%d",i);
}
}
a)i+=10 is executed by child only
b)i+=10 is executed by parent only
c)The child can start executing only after the termination of the parent process.
d)none of the above
6) 27 |
a) 27
b)8
c)2
b)rm*
c)rm *.*
Ans.D
10)
if
A=10000001
B=10000010
100000111000000110000010 mean.
Ans. CAB
11.#define FALSE -1
#define TRUE 1
#define NULL 0
main() {
if(NULL)
puts(NULL);
else if(FALSE)
puts(TRUE);
else
puts(FALSE);
}
what is the output?
12.main() {
int i =5,j= 6, z;
printf(%d,i+++j);
}
what is the output?
a)13 b)12 c)11 d)compiler error
13.main() {
int i ;
i = accumulator();
printf(%d,i);
}
accumulator(){
_AX =1000
}
what is output?
C=10000011
then
what
does
the
word
14.main() {
int i =0;
while(+(+i--)!= 0)
i- = i++;
printf(%d,i);
}
what is the output?
15.main(){
int i =3;
for(; i++=0;)
printf((%d,i);
}
what is the output?
17.main(){
extern i;
printf(%d\t,i);{
int i =20;
printf(%d\t,i);
}
}
what is output?
a)
main(){
int arr[10];
printf(Array dimension is %d,DIMension(arr));
}
what is output?
19.main(){
void swap();
int x = 45, y = 15;
swap(&x,&y);
printf(x = %d y=%dx,y);
}
void swap(int *a, int *b){
*a^=*b, *b^=*a, *a^ = *b;
what is the output?
a)
x = 15, y =45 b)x =15, y =15 c)x =45 ,y =15 d)x =45 y = 45
20.main(){
int i =257;
int *iptr =&i;
printf(%d%d,*((char*)iptr),*((char *)iptr+1));
}
what is output?
21.main(){
int i =300;
char *ptr = &i;
*++ptr=2;
printf(%d,i);
}
what is output?
22.#include
main(){
char *str =yahoo;
a)(*ptr[M]()(char*(*)());
(*ptr[M])();
b)(char*(*)())(*ptr[M])()
c)(char*(*)(*ptr[M]())(*ptr[M]()
d)(char*(*)(char*()))
24.void main(){
int I =10, j=2;
int *ip = &I ,*jp =&j;
int k = *ip/*jp;
printf(%d,k);
}
what is the output?
a)2
b)5
c)10
25.main(){
char a[4] =GOOGLE;
printf(%s,a);
}
what is the output?
27.There is a circuit using 3 nand gates with 2 inputes and 1 output,f ind the output.
a) Allocated in RAM
b) Allocated in ROM
c) Allocated in stack
d) Assigned in registers.
30.What action is taken when the processer under execution is interrupted by TRAP in 8085MPU?
a) Processor serves the interrupt request after completing the execution of the current instruction.
b) processer serves the interrupt request after completing the current task.
c) processor serves the interrupt immediately.
d) processor serving the interrupt request depent deprnds upon the priority of the current task under
execution.
a) register b) accumulator c) flag register d) flag register part of PSW (program status word)
33.The OR gate can be converted to the NAND function by adding----gate(s)to the input of the OR
gate.
35.An 8085 based microprocessor with 2MHz clock frequency,will execute the following chunk of code
with how much delay?
MVI B,38H
HAPPY:
MVI C, FFH
SADDY:
DCR C
JNZ SADDY
DCR B
JNC HAPPY
a)
36.In 8085 MPU what will be the status of the flag after the execution of the following chunk of code.
MVI B,FFH
MOV A,B
CMA
HLT
37.A positive going pulse which is always generated when 8085 MPU begins the machine cycle.
a) RD b) ALE c) WR d) HOLD
38.when a ----- instruction of 8085 MPU is fetched , its second and third bytes are placed in the W and
Z registers.
40.At the end of the following code, what is the status of the flags.
LXI B, AEC4H
MOV A,C
ADD HLT
a) S = 1, CY = 0, P = 0 , AC = 1 b) S =0 , CY = 1, P = 0,AC = 1
0, CY = 1, P = 1 , AC = 1
c) S = 0, CY = 1, P = 0 , AC = 1 d) S =
41.In 8051 micro controller what is the HEX number in the accumulator after the execution of the
following code.
MOV A,#0A5H
CLR C
RRC A
RRC A
RL A
RL A
SWAP A
a)A6
b)6A
c)95
d)A5.
a)9
b)12
c)5
d)24
d)128.
44.K6 processor
45. What is the control word for 8255 PPI,in BSR mode to set bit
a)0EH
b)0FH
c)07H
PC3.
d)06H.
46.The repeated execution of a loop of code while waiting for an event to occur is called ---------.The
cpu is not engaged in any real productive activity during this period,and the process doesnt progress
towards completion.
a) dead lock
b) busy waiting
a) A DBMS in which there are no program or user access languages. b) A DBMS which has no cross file
capabilities but is user friendly and provides user interface management. c) A DBMS which keeps its
physical structure hidden from user d) none.
48.Either all actions are carried out or none are.users should not have to worry about the effect of
incomplete transctions.DBMS ensures this by undoing the actions of incomplete transctions.this
property is known as
a) Aggregation b) atomicity
49.------ algorithms determines where in available to load a program. common methods are first fit,next
fit,best fit.--------- algorithm are used when memory is full , and one process (or part of a process)
needs to be swaped out to accommodate a new program.The ------------- algorithm determines which
are the partions to be swaped out.
50.Trap door is a secret undocumented entry point into a program used to grant access without normal
methods of access authentication. A trap is a software interrupt,usually the result of an error condition.
a)true b)false.
51. Given a binary search tree,print out the nodes of the tree according to post order traversal.
4
/ \
2
/\
1
d)none.
a) 5
/ \
2
/
1
b) 5
/ \
6
c)
/ \
2
/\
1 6
d) none.
54.in recursive implementations which of the following is true for saving the state of the steps
a)previliged instruction
b)floating point exception
c)system calls
d)all
e)none
a)acknowledge
b)sequence
c)flow control
d)retransmission
57. a functional dependency XY is ___________dependency if removal of any attribute A from X means
that the dependency does not hold any more
a)full functional
b) multi valued
c)single valued
d)none
58)a relation schema R is in BCNF if it is in ___________and satisfies an additional constraints that for
every functional dependency XY,X must be a candidate key
a)1 NF
b)2 NF
c)3 NF
d)5 NF
59) a _________sub query can be easily identified if it contains any references to the parent sub query
columns in the _________ clause
A) correlated ,WHERE
b) nested ,SELECT
c) correlated,SELECT
d) none
60) hybrid devise that combines the features of both bridge and router is known as
a) terminal adapter
b)terminal emulation
c)modem
d)none
65.In binary search tree which traversal is used for ascending order values
a) Inorder
66.You are creating an index on ROLLNO colume in the STUDENT table.which statement will you use?
67.A________class is a class that represents a data structure that stores a number of data objects
a. true b.false
a)largest number
b)smallest number
c)smallest negative number
d) none
71.Let A and B be nodes of a heap,such that B is a child of A. the heap must then satisfy the following
conditions
a)key(A)>=key(B)
b)key(A)
c)key(A)=key(B)
d)none
a)The simplest kind of linked list is a single linked list ,which has one link per node .this link points to
the next node in the list,or to a null value or emptylist if it is the last node.
b)a more sophisticated kind of linked list is a double linkedlist or two way linkedlist .Each node has two
links ,one to the previous node and one to the next node.
c) in a circleLinkedList ,the first and last nodes are linked together.this can be done only for double
linked list.
d) to traverse a circular linkedlist ,u begin at any node and follow the list in either direction until u
return to the original node.
74.sentinel node at the beginning and /or at the end of the linkedlist is not used to store the data
a) true
b) false
1.
2. If 36 men can do a piece of work in 25 hours, in how many hours will 15 men
do it ?
.3. If the wages of 6 men for 15 days be Rs.2100, then find the wages of
for 12 days.
4. If 20 men can build a wall 66 metres long in 6 days, what length of a similar can be built by 86 men
in 8 days?
Sol. 49 m.
5. If 15 men, working 9 hours a day, can reap a field in 16 days, in how many
days will 18 men reap the field, working 8 hours a day?
Sol 15.
7. A contract is to be completsd in 46 days sad 117 men were said to work 8 hours a day. After 33
days, (4/7) of the work is completed. How many additional men may be employed so that the work
may be completed in time, each man now working 9 hours a day?
Sol. 81.
8. A garrison of 3300 men had provisions for 32 days, when given at the rate of 860 gns per head. At
the end of 7 days, a reinforcement arrives and it was for that the provisions wi1l last 17 days more,
when given at the rate of 826 gms per head, What is the strength of the reinforcement?
Sol.1700.
9Rajeev's age after 15 years will be 5 times his age 5 years back. What is the
Sol. 10 years.
10. The ages of two persons differ by 16 years. If 6 years ago, the elder one be
3 times as old as the younger one, find their present ages.
11. The product of the ages of Ankit and Nikita is 240. If twice the age of Nikita
is more than Ankit's age by 4 years, what is Nikita's age?
Sol. 12 years.
12 . The present age of a father is 3 years more than three times the age of his son. Three years
hence, father's age will be 10 years more than twice the age of the son. Find the present age of the
father.
.
Sol. 33 years.
13 . Rohit was 4 times as old as his son 8 years ago. After 8 years, Rohit will be
twice as old as his son. What are their present ages?
14. One year ago, the ratio of Gauravs and Sachins age was 6: 7 respectively.
Four years hence, this ratio would become 7: 8. How old is Sachin ?
Sol: 36 years.
15. Abhays age after six years will be three-seventh of his fathers age. Ten years ago the ratio of their
ages was 1 : 5. What is Abhays father's age at present?
Sol. 50 years.
16:Two pipes A and B can fill a tank in 36 bours and 46 bours respectively. If both the pipes are
opened simultaneously, bow mucb time will be taken to fill the
tank?
Sol: 20 hours.
17: Two pipes can fill a tank in 10hours and 12 hours respectively while a third, pipe empties the full
tank in 20 hours. If all the three pipes operate simultaneously, in how much time will the tank be filled?
18: If two pipes function simultaneously, tbe reservoir will be filled in 12 hours. One pipe fills the
reservoir 10 hours faster than tbe otber. How many hours does it take the second pipe to fill the
reservoir?
19: A cistern has two taps which fill it in 12 minutes and 15minutes respectively. There is also a waste
pipe in the cistern. When all the 3 are opened , the empty cistern is full in 20 minutes. How long will
the waste pipe take to empty the full cistern?
Sol: the waste pipe will empty the full cistern in 10min
20: An electric pump can fill a tank in 3 hours. Because of a leak in ,the tank it took 3(1/2) hours to fill
the tank. If the tank is full, how much time will the leak take
to empty it ?
Sol: 21 hours.
21. Two pipes can fill a cistern in 14 hours and 16 hours respectively. The pipes
are opened simultaneously and it is found that due to leakage in the bottom it tooki 32 minutes more
to fill the cistern.When the cistern is full, in what time will the leak empty it?
22: Two pipes A and B can fill a tank in 36 min. and 45 min. respectively. A water pipe C can empty the
tank in 30 min. First A and B are opened. after 7 min,C is also opened. In how much time, the tank is
full?
Sol: 39 minutes.
23: Two pipes A,B can fill a tank in 24 min. and 32 min. respectively. If both the pipes are opened
simultaneously, after how much time B should be closed so that the tank is full in 18 min.?
Sol: 8 min.
24. In a km race, A beats B by 28 metres or 7 seconds. Find A's time over the course.
Sol. Winning post must be 196 m away from the starting point.
26. A can run 1 km in 3 min. 10 sec. and B can cover the same distance in 3 min. 20 sec. By what
distance can A beat B ?
27 . In a 100 m race, A runs at 8km per hour. If A gives B a start of 4 m and still him by 15 seconds,
what is the speed of B ?
29. In a game of 80 points; A can give B 5 points and C 15 points. Then how many points B can give
C in a game of 60 ?
Sol.
30. Find the present worth of Rs. 930 due 3 years hence at 8% per annum. Also find the discount.
Sol. Rs. 180.
31. The true discount on a bill due 9 months hence at 12% per annum is Rs. Find the amount of the bill
and its present worth.
Sol.
Rs. 6000.
32. The true discount on a certain sum of money due 3 years hence is Rb. 250 and the simple interest
on the same sum for the same time and at the same rate is Rs. 375. Find the sum and the rate
percent.
Sol. 16 2/3%
33. The difference between the simple interest and true discount on a certain sum
of money for 6 months at 12% per annum is Rs. 25. Find the sum.
34. A bill falls due in 1 year. The creditor agrees to accept immediate payment of the half and to defer
the payment of the other half for 2 years. By this arrangement ins Rb. 40. What is the amount of the
bill, if the money be worth 12-z% ?
Sol . Rs. 3600.
35. Find the volume and surface area of a cuboid 16 m long, 14 m broad and
7 m high.
Sol. 868
36. Find the length of the longest pole that can be placed in a room 12 m long
8m broad and 9m high.
Sol. 17 m.
37. Tbe volume of a wall, 5 times as high as it is broad and 8 times as long as
it is high, is 12.8 cu. metres. Find the breadth of the wall.
Sol. 40 cm
38. Find the number of bricks, each measuring 24 cm x 12 cm x 8 cm, required to construct a wall 24
m long, 8m high and 60 cm thick, if 10% of the wall is filled with mortar?
Sol. 45000.
39. Water flows into a tank 200 m x 160 m througb a rectangular pipe of
1.5m x 1.25 m @ 20 kmph . In what time (in minutes) will the water rise by 2
metres?
Sol. 96min
40. Tbe dimensions of an open box are 50 cm, 40 cm and 23 cm. Its thickness is
2 cm. If 1 cubic cm of metal used in the box weighs 0.5 gms, find the weight of the box.
26. what would be the output of the following echo command in sequence?
$x=1
$echo'x=2'>setx
$sh setx
$echo $x
$x=3
$setx
$echo $x
a.2,2
b.1,2
c2,3
d.1,3
27.memory reference instruction branch subroutine (BSB) IS given instruction transferming control to subroutine
b.first word of the subroutine
c.address of next instruction in sequence which is presently held in pc (return addres)
d.another BSBinstruction
28.assume memory units has 65536 words of 8bits.the number of bits in program counter.accumalator. memory address register
instruction respectively are
a.16,8,16,8
b16,16,8,8
c8,16,8,16
d8,8,16,16
29.which of the following instruction is used to load 2050h address toHL register pair?
a.LOD H,2050H
B.LOAD H,2050H
C.LXIH,2050H
D.LDAH,2050H
30.what will be the value of the accumalator having AAH after executing RLC instruction twice?
a.55h
b.abh
c.bah
d.aah
31.the top of the stack contains 5A&next byte down the stack is 14(all address in hexadecimal) the stack pointer (sp) containts
3A56.an instruction call subroutint stored at location 67AE whick is 3 bytes long is located at memory address 013F. What shall
be the contents of Program Counter, SP and stack respectively after the call instruction is executed?
PC SP stack
a. 67AE 3A58 42,01,5A,14
b. 0142 3A58 01,42,5A,14
c. 67AE 3A56 42,01,5A,14
d. 0142 3A56 01,42,5A,14
32. Time oriented metrics is one of the below i.e. times it takes to analyze change request, design an appropriate modification,
implement the change, test it and distribute to all users.
a. MTBR b. MTTC c. MTBW d. MTTW
33. which of the following is not a tool for application prototyping?
a. Application Generators.
37. The approach used in Top Down Analysis and design is:
a. To identify a top level function by combining many smaller componen into a single entity.
b. To identify a top level function and then create a hierarchy of lower level modules and components.
c. To prepare flowchart after programming has completed.
d. None of the above.
38. Engineers use the CASE tolls to:
a. Analyze these requirements and determine their feasibility.
b. Design the system's general algorithms.
c. Design an actual detailed implementation in terms of target environment.
d. All of the above.
39. While constructing a data dictionary, the analyst considers:
a. Each data flow in the DFD has one data dictionary entry.
b. Definitions must be readily accessible by name.
c. There should be no redundancy in data definition.
e. All of the above.
40. The procedure for evaluating relative performance of defferent systems is referred to as:
a. Parallel processing.
b. Bench marking.
c. Comparative analysis.
d. Standard Evaluation.
41. The variable used to change the secondary prom string is:
a. PS3
b. PS1
c. PS2
d. Not possible.
c.C
d.D
52.in TCP/IP protocol suite the protocol which controls the flow of data isa.ARP
b.ICMP
c.RARP
d.IP
2
d.none
b.65 AND A
c.A and 65
65 and A
d.65 and A
A and 65
63.output of following will be
# include
#include
main()
{
unsigned short p=pow(2,15)+pow(2,9)+pow(2,6)+poe(2,0); //33345
char c;
c=p;
printf("%c/n",c);
}
a.33345
b.45
c.A
d.none
64. p in following statement is
int (*p(char *a))[10];
a.integer
b.array
c.fuction
d.pointer
GROUP BY STORE_ID ]
c.
_SELECT STORE _ID ,SUM( QTY*PRICE)
FROM SALES,SALES
GROUP BY STORE_ID
WHERE TITLES .TITLE_ID+SALES.TITLE_ID
d.
SELECT STORE _ID ,SUM( QTY*PRICE)
FROM SALES,SALES
ORDER BY TITLE_ID
WHERE TITLES .TITLE_ID=SALES.TITLE_ID
b;
A 11 AAAAA
C 22 BBBBB
E 33 CCCCC
C.
B 11 AAAAA
D 22 BBBBB
E 33 CCCCC
D.NONE
CSC OFF Campus Recruitment Process Latest 2012 -Selection Procedure Questions of CSC
Placement Paper|on March 28 and 28,2012
CSC Written Test Pattern|CSC Technical Written Test Pattern|CSC HR and Technical
Interview Pattern and Questions
CSC Latest Test Pattern and Selection Procedure
In CSC Selection there are 5 rounds
1.
2.
Written Test-Technical
3.
Group Discussion
4.
Technical Hr
5.
Personal HR
Blood Relation
2.
3.
4.