Placement Papers for All Companies

3i infotech
Abacus Infotech
Abatix
Abaxis
ABB
ACC Limited
Accel Frontline
Accenture
Aditi Technologies
Adobe System
ADP
Agilysys
AgreeYa
AIG
AirNet
Alanco Technologies
Alle Technologies
Allfon
Alter Systems
Amazon
AMDL
Amdocs
AMI
Amiti Software Technologies
ANZ
Apple
Applied Materials
Apps Associates
Aricent
ASDC
Ashok Leyland Ltd
Asian Paints
Aspire System
AT & T
Atlas Copco
Atos Origin
AXA Technology Services
Axes Technology
Bain
Bajaj
Bayer
Bharti Airtel Ltd
Bhawan Cybertek
Birlasoft
Blue Star Infotech
BMC
BOB
Brakes India
C-DOT
CA Technologies
Cadence
Calsoft
Canarys
Capgemini
Caterpillar
Celstream
CGI Group
Changepond Technologies
Cimtrix Systems
Cisco system
Citicorp Overseas Software Ltd
ClinTech
CMC Limited
CMS
Cognizant
Compaq
Consagous Technologies
Convergys
CORDYS
CRISIL
Crompton Greaves
CSC
CSFB
CtrlS Datacenters Ltd
Cummins
Cyient
Daffodil
Daimler
Dell
Deloitte
Delphi-TVS
Dharma Systems
Directi
DSRC
Eicher
ELGI
ELICO
EMC Corporation
Emphasis
Ericsson
Ernst & Young
ESKO
Essar
Facebook
Fanuc Corporation
Fidelity
Flextronics
Flipkart
Freescale
Fujitsu
Gajshield
GE
Genpact India
Geodesic
Geometric Limited
GlobalEdge
GlobalLogic
GMR Group
Godrej Infotech
Google
Grapecity
Harita - TVS
HCL
HCL Technologies
Headstrong
Healthasyst
HEC Ltd
Hexaware
HFCL
Holool
Honeywell
HP
HTC Global Services
Huawei
Hughes
Hyundai
IBM
IBS Software Services
IGate
Ikanos
IKOS
Impetus
iNautix
Indecomm
IndiaBulls Power Limited
Inductis-EXL
Industrial Alliance
Infineon
Infogain
Infosys
Intec
Integra
Intel
Intergraph
ITC Infotech
Jindal Steel and Power Limited
KPIT
L & T
L & T Infotech
LG Soft
Linde India Ltd
LnT Emsys
LnT-ECC
Lucas - TVS
Mahindra Engineering Services Ltd
Mahindra Ltd
Maruti
Matrix
Maveric Systems
McAfee
Microland
Microsoft
Mindtree
Miraclesoft
MKCL
Motorola
Mu-Sigma
Nagarro
NASSCOM
NCR Corporation
Ness Technologies
Neudesic
NIIT Technologies
Novell
Nvidia
Oracle
Persistent
Philips
Planetasia
Polaris
Poornam Info Vision
PSI Data Systems Limited
Quest-Global
Quinnox
R Systems
Redpine
Reliance Energy
Robert Bosch
RS Software
Samsung
SAP labs India
Sapient
Sasken Communications
Schneider India
Serco
Siemens
Sierra Atlantic
SkyTECH
Soliton
Sonata Software
Sony India
SQL Star
Steria
Subex Limited
Sutherland Global Services
Syntel
Talisma
Tata motors
Tata technologies
Tata-ELXSI
TCE
TCS
Tech Mahindra
Temenos
Tesco
Texas Instruments
Thermax
ThoughtWorks
Torry Harris
Triad
Trianz
Trilogy
TVS Motor
Unisys
UnitedHealth Group
UST Global
UTC Aerospace System
Valuelabs
Vedanta
Verifone
Verizon
Virtusa
Vision Infotech
Vizual
VMware
Wipro
Yahoo
YASH Technologies
Zenith
Zensar Technologies
ZTE

3i infotech Technical Paper 2014

Posted on :12-02-2016

Q1. A 2MB PCM(pulse code modulation) has

a) 32 channels 
b) 30 voice channels & 1 signalling channel.
c) 31 voice channels & 1 signalling channel.
d) 32 channels out of which 30 voice channels, 1 signalling channel, & 1 Synchronization channel. 

Ans: (c)

Q2. Time taken for 1 satellite hop in voice communication is

a) 1/2 second 
b) 1 seconds 
c) 4 seconds 
d) 2 seconds 

Ans: (a)

Q3. A dishonest shopkeeper professes to sell pulses at the cost price, but he uses a false weight of   950gm. for a kg. His gain is ...%.

Q4. Max number of satellite hops allowed in voice communication is :

a) only one 
b) more than one 
c) two hops 
d) four hops 

Ans: (c)

Q5. Conditional results after execution of an instruction in a micro processor is stored in

a)  register 
b) accumulator 
c) flag register 
d) flag register  part of PSW(Program Status Word) 

Ans: (d)

Q6. Frequency at which VOICE is sampled is

a) 4 Khz 
b) 8 Khz 
c) 16 Khz 
d) 64 Khz 

Ans: (a)

Q7. Line of Sight is 

a) Straight Line 
b) Parabolic 
c) Tx & Rx should be visible to each other
d) none 

Ans: (c)

Q8. Purpose of PC(Program Counter) in a Micro Processor is

a) To store address of TOS (Top Of Stack)
b) To store address of next instruction to be executed.
c) count the number of instructions.
d) to store base address of the stack. 

Ans: (b)

Q9. What action is taken when the processor under execution is interrupted by a non-maskable interrupt?

a) Processor serves the interrupt request after completing the execution of the current   instruction.
b) Processor serves the interrupt request after completing the current task.
c) Processor serves the interrupt request immediately.
d) Processor serving the interrupt request depends upon the priority of the current task under  execution. 

Ans: (a)

Q10. The status of the Kernel is

a) task 
b) process 
c) not defined. 
d) none of the above. 

Ans: (b)

Q11. To send a data packet using datagram , connection will be established

a) before data transmission.
b) connection is not established before data transmission.
c) no connection is required.
d) none of the above. 

Ans: (c)

Q12. Word allignment is

a) alligning the address to the next word boundary of the machine.
b) alligning to even boundary.
c) alligning to word boundary.
d) none of the above. 

Ans: (a)

Q13. When a C function call is made, the order in which parameters passed to the function are pushed into the stack is 

a) left to right 
b) right to left
c) bigger variables are moved first than the smaller variables.
d) smaller variables are moved first than the bigger ones.
e) none of the above. 

Ans: (b)

Q14. What is the type of signalling used between two exchanges?

a) inband 
b) common channel signaling 
c) any of the above
d) none of the above. 

Ans: (a)

Q15. Buffering is 

a) the process of temporarily storing the data to allow for small variation in device speeds
b) a method to reduce cross talks
c) storage of data within transmitting medium until the receiver is ready to receive.
d) a method to reduce routing overhead. 

Ans: (a)

Q16. Memory allocation of variables declared in a program is

a) allocated in RAM. 
b) allocated in ROM. 
c) allocated on stack.
d) assigned to registers. 

Ans: (c)


Q17. A software that allows a personal computer to pretend as a computer terminal is 

a) terminal adapter 
b) bulletin board 
c) modem 
d) terminal emulation

Ans: (d)

Q18. Find the output of the following program

int *p,*q;
p=(int *)1000;
q=(int *)2000;
printf("%d",(q-p)); 

Ans: 500

Q19. Which addressing mode is used in the following statements:

(a) MVI B,55 
(b) MOV B,A 
(c) MOV M,A

Ans: (a) Immediate addressing mode.
(b) Register Addressing Mode
(c) Direct addressing mode

Q20. RS-232C standard is used in _____________. 

Ans: Serial I/O

Q21. Memory Management in Operating Systems is done by

a) Memory Management Unit
b) Memory management software of the Operating System 
c) Kernel

Ans: (b)

Q22. What is done for a Push operation?

Ans: SP is decremented and then the  value is stored.

Q23. Binary equivalent of 52 

Ans: 110100

Q24. Hexadecimal equivalent of 3452 

Ans: 72A

Q25. Explain Just In Time Concept ? Ans: Elimination of waste by purchasing manufacturing exactly   when needed

Q26. A good way of unit testing s/w program is 
 
Ans: User test

Q27. OOT uses 

Ans: Encapsulated of detect methods

Q28. EDI useful in 

Ans: Electronic Transmission

Q29. MRPII different from MRP 

Ans: Modular version of man redundant initials

Q30. Hard disk time for R/W head to move to correct sector 

Ans: Latency Time

Q31. The percentage of times a page number bound in associate register is called

Ans: Bit ratio

Q32. Expand MODEM 

Ans: Modulator and Demodulator

Q33. RDBMS file system can be defined as 

Ans: Interrelated

Q34. Super Key is 

Ans: Primary key and Attribute

Q35. Windows 95 supports

(a) Multiuser 
(b) n tasks 
(c) Both 
(d) None 

Ans: (a)

Q36. In the command scanf, h is used for 

Ans: Short int

Q37. A process is defined as 

Ans: Program in execution

Q38. A thread is 

Ans: Detachable unit of executable code)

Q39. A thread is 

Ans: Detachable unit of executable code)

Q40. How is memory management done in Win95 

Ans: Through paging and segmentation

Q41. What is meant by polymorphism

Ans: Redefinition of a base class method in a derived class

Q42. What is the essential feature of inheritance 

Ans: All properties of existing class are derived

Q43. What does the protocol FTP do

Ans: Transfer a file b/w stations with user authentification

Q44. In the transport layer ,TCP is what type of protocol 

Ans: Connection oriented

Q45. Why is a gateway used 

Ans: To connect incompatible networks

Q46. How is linked list implemented 

Ans: By referential structures

Q47. What method is used in Win95 in multitasking 

Ans: Non preemptive check

Q48. What is a semaphore 

Ans: A method synchronization of multiple processes

Q49. What is the precedence order from high to low ,of the symbols ( ) ++ /

Ans:( ) , ++, /

Q50. Preorder of A*(B+C)/D-G 

Ans:*+ABC/-DG

Q51. What is the efficiency of merge sort 

Ans: O(n log n)

Q52. In which layer are routers used 

Ans: In network layer 

Q53. Which of the following sorting algorithm has average sorting behavior --Bubble sort, merge   sort, heap sort,  exchange sort 

Ans: Heap sort

Q54. In binary search tree which traversal is used for getting ascending order values--Inorder , post order, preorder 

Ans: Inorder

Q55. What are device drivers used for 

Ans: To provide software for enabling the hardware

Q56. What are device drivers used for 

Ans: To provide software for enabling the hardware

Q57. What is make command in unix 

Ans: Used for creation of more than one file

Q58. In unix .profile contains 

Ans: Start up program

Q59. In unix ls stores contents in 

Ans: inode block

Q60. Which of the following involves context switch,

(a) system call 
(b) priviliged instruction 
(c) floating poitnt exception
(d) all the above 
(e) none of the above 

Ans: (a)

Q61. In OST, terminal emulation is done in

(a) sessions layer 
(b) application layer 
(c) presentation layer 
(d) transport layer 

Ans: (b)

Q62. For 1 MB memory, the number of address lines required,

(a)11 
(b)16 
(c)22 
(d) 24 

Ans: (b)

Q63. Semaphore is used for

(a) synchronization 
(b) dead-lock avoidance 
(c) box 
(d) none 

Ans: (a)

Q64. Which holds true for the following statement class c: public A, public B

a) 2 member in class A, B should not have same name
b) 2 member in class A, C should not have same name
c) both 
d) none 

Ans: (a)

Q65. Preproconia.. does not do which one of the following

(a) macro 
(b) conditional compliclation 
(c) in type checking 
(d) including load file

Ans: (c)

Q66. Piggy backing is a technique for

a) Flow control 
b) Sequence 
c) Acknowledgement 
d) retransmition 

Ans: (c)

Q67. Which is not a memory management scheme?

a) buddy system 
b) swapping 
c) monitors 
d) paging 

Ans : c

Q68. There was a circuit given using three nand gates with two inputs and one output. Find the output.

a) OR 
b) AND 
c) XOR 
d) NOT 

Ans: (a)

Q69. Integrated check value(ICV) are used as: Ans: The client computes the ICV and then compares it with the senders value.

Q70. When applets are downloaded from web sites , a byte verifier performs _________?

Ans: Status check

Q71. An IP/IPX packet received by a computer using... having IP/IPX both how the packet Is handled. 
 
Ans: Read the, field in the packet header with to  send IP or IPX protocol.

Q72. The UNIX shell ....

a) does not come with the rest of the system
b) forms the interface between the user and the kernal
c) does not give any scope for programming
d) does not allow calling one program from with in another
e) all of the above 

Ans: (b)

Q73. In UNIX a files i-node ......?

Ans: Is a data structure that defines all specifications of a file like the file size, number of   lines to a file, permissions etc.

Q74. The very first process created by the kernal that runs till the kernal process is halts is

a) init 
b) getty 
c) both (a) and (b) 
d) none of these 

Ans: (a)

Q75. In the process table entry for the kernel process, the process id value is

(a) 0 
(b) 1 
(c) 2 
(d) 255 
(e) it does not have a process table entry 

Ans: (a)

Q76. Which of the following API is used to hide a window

a) ShowWindow 
b) EnableWindow 
c) MoveWindow
d) SetWindowPlacement
e) None of the above 

Ans: (a)

Q77. Which function is the entry point for a DLL in MS Windows 3.1

a) Main 
b) Winmain 
c) Dllmain 
d) Libmain 
e) None 

Ans: (b)

Q78. The standard source for standard input, standard output and standard error is 

a) the terminal  
b) /dev/null
c) /usr/you/input, /usr/you/output/, /usr/you/error respectively
d) None 

Ans: (a)

Q79. The redirection operators > and >>

a) do the same function b) differ : > overwrites, while >> appends
c) differ : > is used for input while >> is used for output
d) differ : > write to any file while >> write only to standard output
e) None of these 

Ans: (b)

Q80. The command grep first second third /usr/you/myfile

a) prints lines containing the words first, second or third from the file /usr/you/myfile
b) searches for lines containing the pattern first in the files second, third, and /usr/you/myfile   and prints them
c) searches the files /usr/you/myfiel and third for lines containing the words first or second and   prints them
d) replaces the word first with the word second in the files third and /usr/you/myfile
e) None of the above

Ans: (b)

Q81. You are creating a Index on EMPNO column in the EMPLOYEE table. Which statement will you use?

a) CREATE INdEX emp_empno_idx ON employee, empno;
b) CREATE INdEX emp_empno_idx FOR employee, empno;
c) CREATE INdEX emp_empno_idx ON employee(empno); 
d) CREATE emp_empno_idx INdEX ON employee(empno); 

Ans: c

Q82. Which program construct must return a value?

a) Package 
b) Function 
c) Anonymous block 
d) Stored Procedure
e) Application Procedure 

Ans: b

Q83. Which Statement would you use to remove the EMPLOYEE_Id_PK PRIMARY KEY constraint and all depending constraints fromthe EMPLOYEE table?

a) ALTER TABLE employee dROP PRIMARY KEY CASCAdE; 
b) ALTER TABLE employee dELETE PRIMARY KEY CASCAdE;
c) MOdIFY TABLE employee dROP CONSTRAINT employee_id_pk CASCAdE;
d) ALTER TABLE employee dROP PRIMARY KEY employee_id_pk CASCAdE;
e) MOdIFY TABLE employee dELETE PRIMARY KEY employee_id_pk CASCAdE;

Ans: a

Q84. Which three commands cause a transaction to end? (Choose three)

a) ALTER 
b) GRANT 
c) DELETE 
d) INSERT 
e) UPdATE
f) ROLLBACK 

Ans: a ,b ,f

Q85. Under which circumstance should you create an index on a table?

a) The table is small.
b) The table is updated frequently.
c) A columns values are static and contain a narrow range of values
d) Two columns are consistently used in the WHERE clause join condition 
of SELECT statements.

Ans: d

Q86. What was the first name given to Java Programming Language. 

a) Oak - Java 
b) Small Talk 
c) Oak 
d) None 

Ans: a

Q87. A certain radioactive element A, has a half life = t seconds. In (t/2) seconds the fraction of  the initial quantity of the element so  far decayed is nearly

(a) 29% 
(b) 15% 
(c) 10% 
(d) 45% 

Ans: (a)

Q88. Which of the following plots would be a straight line ?

(a) Logarithm of decay rate against logarithm of time
(b) Logarithm of decay rate against logarithm of number of decaying nuclei
(c) Decay rate against time
(d) Number of decaying nuclei against time 

Ans: (b)

Q89. A radioactive element x has an atomic number of 100. It decays directly into an element y which decays directly into element z. In both processes a charged particle is emitted. Which of the following statements would be true?

(a) y has an atomic number of 102 
(b) y has an atomic number of 101
(c) z has an atomic number of 100 
(d) z has an atomic number of 101

Ans: (b)

Q90. If the sum of the roots of the equation ax2 + bx + c=0 is equal to the sum of the squares of their reciprocals then a/c, b/a, c/b are in 

(a) AP 
(b) GP 
(c) HP 
(d) None of these 

Ans: (c)

Q91. A man speaks the truth 3 out of 4 times. He throws a die and reports it to be a 6. What is the probability of it being a 6?

(a) 3/8 
(b) 5/8 
(c) 3/4
(d) None of the above 

Ans: (a)

Q92. If cos2A + cos2B + cos2C = 1 then ABC is a

(a) Right angle triangle 
(b) Equilateral triangle 
(c) All the angles are acute
(d) None of these 

Ans: (a)

Q93. Image of point (3,8) in the line x + 3y = 7 is

(a) (-1,-4) 
(b) (-1,4) 
(c) (2,-4) 
(d) (-2,-4) 

Ans: (a)

Q94. The mass number of a nucleus is 

(a) Always less than its atomic number 
(b) Always more than its atomic number
(c) Sometimes more than and sometimes equal to its atomic number
(d) None of the above 

Ans: (c)

Q95. The maximum KE of the photo electron emitted from a surface is dependent on 

(a) The intensity of incident radiation 
(b) The potential of the collector electrode 
(c) The frequency of incident radiation
(d) The angle of incidence of radiation of the surface 

Ans: c

Q96. Which of the following is not an essential condition for interference

(a) The two interfering waves must be propagated in almost the same direction or  the two interfering waves must intersect at a very small angle
(b) The waves must have the same time period and wavelength
(c) Amplitude of the two waves should be the same
(d) The interfering beams of light must originate from the same source 

Ans: (c)

Q97. When X-Ray photons collide with electrons 

(a) They slow down 
(b) Their mass increases 
(c) Their wave length  increases 
(d) Their energy decreases 

Ans: (c)

Q98. An electron emits energy 

(a) Because its in orbit (b) When it jumps from one energy level to another
(c) Electrons are attracted towards the nucleus
(d) The electrostatic force is insufficient to hold the electrons in orbits

Ans: (b)

Q99. An electron emits energy 

(a) Because its in orbit (b) When it jumps from one energy level to another
(c) Electrons are attracted towards the nucleus
(d) The electrostatic force is insufficient to hold the electrons in orbits

Ans: (b)

Q100. How many bonds are present in CO2 molecule?

(a) 1 
(b) 2 
(c) 0 
(d) 4 

Ans: (d)

Q101. Is string reference type / value type ?

Q102. What are different type of routing protocols

Q103. Requirement is: try { SQL Query } catch(Exception i) { print a } catch(SQLQueryException e) {   SQL Query } Qu)I Got Exception in "try" block. Which "catch" statement (i.e. 1st catch or 2nd   catch ) catches the exception and Why???

Q104. How do you relate an aspx page with its code behind page?

Q105. What is OBP and how do you access it? 

Q106. There are Two pl / sql Libraries Lib1, Lib2 are attached to a form and these two libraries contains   functions with same name fun1 (i,e lib1 have a function fun1 and lib2 also have a function fun1).how to call these functions from forms?

Q107. How to make a file encrypt and decrypt?

Q108. What do u mean by co-relation?

Q109. What Is the command to change a files creation time. means one file is created at the time 15:19   then time should br changed to 14:14

Q110. Difference between Recordset and Querydef?

Q111. What is the exact difference between Integration & System testing; give me examples

Q112. How do you go about testing a web application?
 
Q113. What is an equivalence class

Q114. What are the properties of a good requirement? 

Q115. How to do test if we have minimal or no documentation about the product?

Q116. What is code coverage?

Q117. What types of code coverage do you know? 

Q118. What can you tell about the project if during testing you found 80 bugs in it

Q119. At what stage of the development cycle software errors are least costly to correct?

Q120. You filed a bug that has high severity & high priority what happens till it gets fixed(that means  

Q121. What u do till it gets fixed)? Urgent

Q122. If we have a column (Key) in a table. and values of that column is Key 1 1 1 2 2 3 3 4 4 5 5 5 and  

Q123. We want to show the data after query..like.. 1(3) 2(3) 3(2) 4(2) 5(3) how many times a single term comes.. 

Q124. How to check the Back Ground Color of screen in Win runner?


  
   






FreshersLive - No.1 Job site in India. Here you can find latest 2016 government as well as private job recruitment notifications for different posts vacancies in India. Get top company jobs for both fresher and experienced. Job Seekers can get useful interview tips, resume services & interview Question and answer. Practice online test free which is helpful for interview preparation. Register with us to get latest employment news/rojgar samachar notifications. Also get latest free govt and other sarkari naukri job alerts daily through E-mail.

closepop
closepop