3i-Infotech Technical Placement Paper

  1. A 2MB PCM (pulse code modulation) has
    a) 32 channels
    b) 30 voice channels & 1 signaling channel.
    c) 31 voice channels & 1 signaling channel.
    d) 32 channels out of which 30 voice channels, 1 signaling channel, and 1synchronization channel.
    Ans: (c)

  2. Time taken for 1 satellite hop in voice communication is
    a) 1/2 second b) 1 seconds c) 4 seconds d) 2 seconds
    Ans: (a)

  3. A dishonest shopkeeper professes to sell pulses at the cost price, but he uses a false weight of 950gm. for a kg. His gain is ...%.

  4. Max number of satellite hops allowed in voice communication is:
    a) Only one b) more than one c) two hops d) four hops
    Ans: (c)

  5. Conditional results after execution of an instruction in a micro processor is stored in
    a) Register b) accumulator c) flag register d) flag register part of PSW (Program Status Word)
    Ans: (d)

  6. Frequency at which VOICE is sampled is
    a) 4 Khz b) 8 Khz c) 16 Khz d) 64 Khz Ans: (a)

  7. Line of Sight is
    a) Straight Line b) Parabolic c) Tx & Rx should be visible to each other
    d) None
    Ans: (c)

  8. Purpose of PC (Program Counter) in a Microprocessor is
    a) To store address of TOS (Top of Stack)
    b) To store address of next instruction to be executed.
    c) Count the number of instructions.
    d) To store base address of the stack.
    Ans: (b)

  9. What action is taken when the processor under execution is interrupted by a
    Non-maskable interrupts?
    a) Processor serves the interrupt request after completing the execution of the current instruction.
    b) Processor serves the interrupt request after completing the current task.
    c) Processor serves the interrupt request immediately.
    d) Processor serving the interrupt request depends upon the priority of the current task under execution.
    Ans: (a)

  10. The status of the Kernel is
    a) Task b) process c) not defined. d) None of the above.
    Ans: (b)

  11. To send a data packet using datagram, connection will be established
    a) Before data transmission.
    b) Connection is not established before data transmission.
    c) No connection is required.
    d) None of the above.
    Ans: (c)

  12. Word alignment is
    a) Aligning the address to the next word boundary of the machine.
    b) Aligning to even boundary.
    c) Aligning to word boundary.
    d) None of the above.
    Ans: (a)

  13. When a 'C' function call is made, the order in which parameters passed to the
    Function are pushed into the stack is
    a) Left to right b) right to left
    c) Bigger variables are moved first than the smaller variables.
    d) Smaller variables are moved first than the bigger ones.
    e) None of the above.
    Ans: (b)

  14. What is the type of signaling used between two exchanges?
    a) Inband b) common channel signaling c) any of the above
    d) None of the above.
    Ans: (a)

  15. Buffering is
    a) The process of temporarily storing the data to allow for small variation in device speeds
    b) A method to reduce cross talks
    c) Storage of data within transmitting medium until the receiver is ready to receive.
    d) A method to reduce routing overhead.
    Ans: (a)

  16. Memory allocation of variables declared in a program is
    a) Allocated in RAM.
    b) Allocated in ROM.
    c) Allocated on stack.
    d) Assigned to registers.
    Ans: (c)

  17. A software that allows a personal computer to pretend as a computer terminal is
    a) Terminal adapter b) bulletin board c) modem d) terminal emulation
    Ans: (d)

  18. Find the output of the following program
    int *p,*q;
    p=(int *)1000;
    q=(int *)2000;
    Ans: 500

  19. Which addressing mode is used in the following statements?
    (a) MVI B, 55 (b) MOV B, A (c) MOV M, A
    Ans: (a) immediate addressing mode.

  20. RS-232C standard is used in _____________. Ans: Serial I/O

  21. Memory. Management in Operating Systems is done by
    a) Memory Management Unit
    b) Memory management software of the Operating System c) Kernel
    Ans: (b)

  22. What is done for a Push operation?
    Ans: SP is decremented and then the value is stored.

  23. Binary equivalent of 52
    Ans: 110100

  24. Hexadecimal equivalent of 3452
    Ans: 72A

  25. Explain Just In Time Concept?
    Ans: Elimination of waste by purchasing manufacturing exactly when needed

  26. A good way of unit testing s/w program is
    Ans: User test

  27. OOT uses
    Ans: Encapsulated of detect methods

  28. EDI useful in
    Ans: Electronic Transmission

  29. MRPII different from MRP
    Ans: Modular version of man redundant initials

  30. Hard disk time for R/W head to move to correct sector
    Ans: Latency Time

  31. The percentage of times a page number bound in associate register is called
    Ans: Bit ratio

  32. Expand MODEM
    Ans: Modulator and Demodulator

  33. RDBMS file system can be defined as
    Ans: Interrelated

  34. Super Key is
    Ans: Primary key and Attribute

  35. Windows 95 supports
    (a) Multiuser (b) n tasks (c) Both (d) None
    Ans: (a)

  36. In the command scanf, h is used for
    Ans: Short int

  37. A process is defined as
    Ans: Program in execution

  38. A thread is
    Ans: Detachable unit of executable code

  39. How is memory management done in Win95?
    Ans: Through paging and segmentation

  40. What is meant by polymorphism?
    Ans: Redfinition of a base class method in a derived class

  41. What is the essential feature of inheritance?
    Ans: All properties of existing class are derived

  42. What does the protocol FTP DO?
    Ans: Transfer a file b/w stations with user authentification

  43. In the transport layer, TCP is what type of protocol
    Ans: Connection oriented

  44. Why is a gateway used?
    Ans: To connect incompatible networks

  45. How is linked list implemented?
    Ans: By referential structures

  46. What method is used in Win95 in multitasking?
    Ans: Non preemptive check

  47. What is a semaphore?
    Ans: A method synchronization of multiple processes

  48. What is the precedence order from high to low, of the symbols ( ) ++ /
    Ans: ( ), ++, /

  49. Preorder of A*(B+C)/D-G

  50. What is the efficiency of merge sort?
    Ans: O(n log n)

  51. In which layer are routers used
    Ans: In network layer

  52. Which of the following sorting algorithm has average sorting behavior --Bubble sort, merge sort, heap sort, and exchange sort?
    Ans: Heap sort

  53. In binary search tree which traversal is used for getting ascending order
    Values--Inorder, post order, preorder
    Ans: Inorder

  54. What are device drivers used for
    Ans: To provide software for enabling the hardware

  55. What are device drivers used for
    Ans: To provide software for enabling the hardware

  56. What is make command in UNIX
    Ans: Used forcreation of more than one file

  57. In UNIX .profile contains
    Ans: Start up program

  58. In unix 'ls 'stores contents in
    Ans: inode block

  59. Which of the following involves context switch?
    (a) System call (b) privileged instruction (c) floating point exception
    (d) All the above (e) none of the above
    Ans: (a)

  60. In OST, terminal emulation is done in
    (a) Sessions layer (b) application layer (c) presentation layer
    (d) Transport layer
    Ans: (b)

  61. For 1 MB memory, the number of address lines required,
    (a) 11 (b) 16 (c) 22 (d) 24
    Ans: (b)

  62. Semaphore is used for
    (a) Synchronization (b) dead-lock avoidance (c) box (d) none
    Ans: (a)

  63. Which holds true for the following statement class c: public A, public B
    a) 2 members in class A, B should not have same name
    b) 2 members in class A, C should not have same name
    c) Both d) none
    Ans: (a)

  64. Preproconia... Does not do which one of the following
    (a) Macro (b) conditional complication (c) in type checking (d) including load file
    Ans: (c)

  65. Piggy backing is a technique for
    a) Flow control b) Sequence c) Acknowledgement d) retransmition
    Ans: (c)

  66. Which is not a memory management scheme?
    a) Buddy system b) swapping c) monitors d) paging
    Ans: c

  67. There was a circuit given using three nand gates with two inputs and one output.
    Find the output.
    a) OR b) AND c) XOR d) NOT
    Ans: (a)

  68. Integrated check value(ICV) are used as:
    Ans: The client computes the ICV and then compares it with the senders value.

  69. When applets are downloaded from web sites, a byte verifier performs _________?
    Ans: Status check

  70. An IP/IPX packet received by a computer using... having IP/IPX both how the packet is handled.
    Ans: Read the, field in the packet header with to send IP or IPX protocol.

  71. The UNIX shell....
    a) Does not come with the rest of the system
    b) forms the interface between the user and the kernal
    c) Does not give any scope for programming
    d) Does not allow calling one program from with in another
    e) All of the above
    Ans: (b)

  72. In UNIX a files i-node......?
    Ans: Is a data structure that defines all specifications of a file like the file size, number of lines to a file, permissions etc.

  73. The very first process created by the kernal that runs till the kernal process is halts is
    a) init b) getty c) both (a) and (b) d) none of these
    Ans: (a)

  74. In the process table entry for the kernel process, the process id value is
    (a) 0
    (b) 1
    (c) 2
    (d) 255
    (e) It does not have a process table entry
    Ans: (a)

  75. Which of the following API is used to hide a window?
    a) ShowWindow b) EnableWindow c) MoveWindowd) SetWindowPlacement
    e) None of the above
    Ans: (a)

  76. Which function is the entry point for a DLL in MS Windows 3.1?
    a) Main b) Winmain c) Dllmain d) Libmain e) None
    Ans: (b)

  77. The standard source for standard input, standard output and standard error is
    a) The terminal
    b) /dev/null
    c) /usr/you/input, /usr/you/output/, /usr/you/error respectively
    d) None Ans: (a)

  78. The redirection operators > and >>
    a) do the same function b) differ : > overwrites, while >> appends
    c) differ : > is used for input while >> is used for output
    d) differ : > write to any file while >> write only to standard output
    e) None of these Ans: (b)

  79. The command grep first second third /usr/you/myfile
    a) Prints lines containing the words first, second or third from the file /usr/you/myfile
    b) Searches for lines containing the pattern first in the files second, third, and /usr/you/myfile and prints them
    c) Searches the files /usr/you/myfile and third for lines containing the words first or second and prints them
    d) Replaces the word first with the word second in the files third and /usr/you/myfile
    e) None of the above
    Ans: (b)

  80. You are creating a Index on EMPNO column in the EMPLOYEE table. Which statement will you use?
    a) CREATE INdEX emp_empno_idx ON employee, empno;
    b) CREATE INdEX emp_empno_idx FOR employee, empno;
    c) CREATE INdEX emp_empno_idx ON employee(empno);
    d) CREATE emp_empno_idx INdEX ON employee(empno);
    Ans: c

  81. Which program construct must return a value?
    a) Package b) Function c) Anonymous block d) Stored Procedure
    e) Application Procedure
    Ans: b

  82. Which Statement would you use to remove the EMPLOYEE_Id_PK PRIMARY KEY?
    Constraints and all depending constraints from the EMPLOYEE table are?
    c) MOdIFY TABLE employee dROP CONSTRAINT employee_id_pk CASCAdE;
    d) ALTER TABLE employee dROP PRIMARY KEY employee_id_pk CASCAdE;
    e) MOdIFY TABLE employee dELETE PRIMARY KEY employee_id_pk CASCAdE;
    Ans: a

  83. Which three commands cause a transaction to end? (Chosse three)
    Ans: a, b, f

  84. Under which circumstance should you create an index on a table?
    a) The table is small.
    b) The table is updated frequently.
    c) A columns values are static and contain a narrow range of values
    d) Two columns are consistently used in the WHERE clause join condition
    of SELECT statements.
    Ans: d

  85. What was the first name given to Java Programming Language?
    a) Oak - Java b) Small Talk c) Oak d) None
    Ans: a

  86. A certain radioactive element A, has a half life = t seconds. In (t/2) seconds the fraction of the initial quantity of the element so
    far decayed is nearly
    (a) 29% (b) 15% (c) 10% (d) 45%
    Ans: (a)

  87. Which of the following plots would be a straight line?
    (a) Logarithm of decay rate against logarithm of time
    (b) Logarithm of decay rate against logarithm of number of decaying nuclei
    (c) Decay rate against time
    (d) Number of decaying nuclei against time
    Ans: (b)

  88. A radioactive element x has an atomic number of 100.
    It decays directly into an element y which decays directly into element z.
    In both processes a charged particle is emitted.
    Which of the following statements would be true?
    (a) y has an atomic number of 102 (b) y has an atomic number of 101
    (c) z has an atomic number of 100 (d) z has an atomic number of 101
    Ans: (b)

  89. If the sum of the roots of the equation ax2 + bx + c=0 is equal to the sum of
    the squares of their reciprocals then a/c, b/a, c/b are in
    (a) AP (b) GP (c) HP (d) None of these
    Ans: (c)

  90. A man speaks the truth 3 out of 4 times. He throws a die and reports it to be a 6.
    What is the probability of it being a 6?
    (a) 3/8 (b) 5/8 (c) ¾ (d) None of the above
    Ans: (a)

  91. If cos2A + cos2B + cos2C = 1 then ABC is a
    (a) Right angle triangle (b) Equilateral triangle (c) All the angles are acute
    (d) None of these
    Ans: (a)

  92. Image of point (3, 8) in the line x + 3y = 7 is
    (a) (-1,-4) (b) (-1, 4) (c) (2,-4) (d) (-2,-4)
    Ans: (a)

  93. The mass number of a nucleus is
    (a) Always less than its atomic number (b) Always more than its atomic number
    (c) Sometimes more than and sometimes equal to its atomic number
    (d) None of the above
    Ans: (c)

  94. The maximum KE of the photoelectron emitted from a surface is dependent
    on (a) The intensity of incident radiation (b) The potential of the collector
    electrode (c) The frequency of incident radiation
    (d) The angle of incidence of radiation of the surface
    Ans: (c)

  95. Which of the following is not an essential condition for interference?
    (a) The two interfering waves must be propagated in almost the same direction or
    the two interfering waves must intersect at a very small angle
    (b) The waves must have the same time period and wavelength
    (c) Amplitude of the two waves should be the same
    (d) The interfering beams of light must originate from the same source
    Ans: (c)

  96. When X-Ray photons collide with electrons
    (a) They slow down (b) Their mass increases (c) Their wave length
    Increases (d) their energy decreases
    Ans: (c)

  97. An electron emits energy
    (a) Because it’s in orbit
    (b) When it jumps from one energy level to another
    (c) Electrons are attracted towards the nucleus
    (d) The electrostatic force is insufficient to hold the electrons in orbits
    Ans: (b)

  98. An electron emits energy
    (a) Because it’s in orbit
    b) When it jumps from one energy level to another
    (c) Electrons are attracted towards the nucleus
    (d) The electrostatic force is insufficient to hold the electrons in orbits
    Ans: (b)

  99. How many bonds are present in CO2 molecule?
    (a) 1 (b) 2 (c) 0 (d) 4 Ans: (d)
3i-Infotech Technical Placement Paper 3i-Infotech Technical Placement Paper Reviewed by Job today on 12:35 Rating: 5

No comments:

Powered by Blogger.