Placement Papers for All Companies

3i infotech
Abacus Infotech
Abatix
Abaxis
ABB
ACC Limited
Accel Frontline
Accenture
Aditi Technologies
Adobe System
ADP
Agilysys
AgreeYa
AIG
AirNet
Alanco Technologies
Alle Technologies
Allfon
Alter Systems
Amazon
AMDL
Amdocs
AMI
Amiti Software Technologies
ANZ
Apple
Applied Materials
Apps Associates
Aricent
ASDC
Ashok Leyland Ltd
Asian Paints
Aspire System
AT & T
Atlas Copco
Atos Origin
AXA Technology Services
Axes Technology
Bain
Bajaj
Bayer
Bharti Airtel Ltd
Bhawan Cybertek
Birlasoft
Blue Star Infotech
BMC
BOB
Brakes India
C-DOT
CA Technologies
Cadence
Calsoft
Canarys
Capgemini
Caterpillar
Celstream
CGI Group
Changepond Technologies
Cimtrix Systems
Cisco system
Citicorp Overseas Software Ltd
ClinTech
CMC Limited
CMS
Cognizant
Compaq
Consagous Technologies
Convergys
CORDYS
CRISIL
Crompton Greaves
CSC
CSFB
CtrlS Datacenters Ltd
Cummins
Cyient
Daffodil
Daimler
Dell
Deloitte
Delphi-TVS
Dharma Systems
Directi
DSRC
Eicher
ELGI
ELICO
EMC Corporation
Emphasis
Ericsson
Ernst & Young
ESKO
Essar
Facebook
Fanuc Corporation
Fidelity
Flextronics
Flipkart
Freescale
Fujitsu
Gajshield
GE
Genpact India
Geodesic
Geometric Limited
GlobalEdge
GlobalLogic
GMR Group
Godrej Infotech
Google
Grapecity
Harita - TVS
HCL
HCL Technologies
Headstrong
Healthasyst
HEC Ltd
Hexaware
HFCL
Holool
Honeywell
HP
HTC Global Services
Huawei
Hughes
Hyundai
IBM
IBS Software Services
IGate
Ikanos
IKOS
Impetus
iNautix
Indecomm
IndiaBulls Power Limited
Inductis-EXL
Industrial Alliance
Infineon
Infogain
Infosys
Intec
Integra
Intel
Intergraph
ITC Infotech
Jindal Steel and Power Limited
KPIT
L & T
L & T Infotech
LG Soft
Linde India Ltd
LnT Emsys
LnT-ECC
Lucas - TVS
Mahindra Engineering Services Ltd
Mahindra Ltd
Maruti
Matrix
Maveric Systems
McAfee
Microland
Microsoft
Mindtree
Miraclesoft
MKCL
Motorola
Mu-Sigma
Nagarro
NASSCOM
NCR Corporation
Ness Technologies
Neudesic
NIIT Technologies
Novell
Nvidia
Oracle
Persistent
Philips
Planetasia
Polaris
Poornam Info Vision
PSI Data Systems Limited
Quest-Global
Quinnox
R Systems
Redpine
Reliance Energy
Robert Bosch
RS Software
Samsung
SAP labs India
Sapient
Sasken Communications
Schneider India
Serco
Siemens
Sierra Atlantic
SkyTECH
Soliton
Sonata Software
Sony India
SQL Star
Steria
Subex Limited
Sutherland Global Services
Syntel
Talisma
Tata motors
Tata technologies
Tata-ELXSI
TCE
TCS
Tech Mahindra
Temenos
Tesco
Texas Instruments
Thermax
ThoughtWorks
Torry Harris
Triad
Trianz
Trilogy
TVS Motor
Unisys
UnitedHealth Group
UST Global
UTC Aerospace System
Valuelabs
Vedanta
Verifone
Verizon
Virtusa
Vision Infotech
Vizual
VMware
Wipro
Yahoo
YASH Technologies
Zenith
Zensar Technologies
ZTE

CSC Written Test Paper June 2010

Posted on :03-02-2016
WRITTEN TEST 

I. APTITUDE

In this round, they asked 40 questions in 40 minutes which includes 

Two from Venn diagram, (easy)
One from probability,
3*3 Sudoku like below, (very easy)
8 2
9

You have to fill the numbers from 1-9 in the boxes, such that it should have 15 from top to bottom and across the diagonal, then you would have the box as like the one below:

8 2 5
1 4 7
6 9 3
From this you might have questions like, summing up the numbers which are right and left to the number 2. For us, three questions were asked from this:

II. TECHNICAL 

It consists of 75 questions and duration is 40 minutes. We had the questions from previous year papers.

Q1. ------- is associated with web services. 

a) WSDL     
b) WML     
c) web sphere     
d) web logic 

ANS: a

Q2. Any large single block of data stored in a database, such as a picture or sound file, which does not include record fields, and cannot be directly searched by the database’s search engine.

a) TABLE     
b) BLOB     
c) VIEW     
d) SCHEME 

ANS: b

Q3. A reserved area of the immediate access memory used to increase the running speed of the computer program. 

a) session memory 
b) bubble memory 
c) cache memory 
d) shared memory 

ANS: c


Q4. A small subnet that sit between a trusted internal network and an untruster external network, such as the public internet.

a) LAN 
b) MAN 
c) WAN 
d) DMZ 

ANS: d

Q5.Technologies that use radio waves to automatically identify people or objects,which is very similar to the barcode identification systems,seen in retail stores everyday.

a) BLUETOOTH 
b) RADAR 
c) RSA SECURE ID 
d) RFID 

ANS: d

Q6. 
main(){
float fl = 10.5;
double dbl = 10.5
if(fl ==dbl)
printf(“UNITED WE STAND”);
else
printf(“DIVIDE AND RULE”)
}

What is the output?

a) compilation error 
b) UNITED WE STAND 
c) DIVIDE AND RULE 
d) Linkage error.

ANS: c

Q7.
main(){
static int ivar = 5;
printf(“%d”,ivar--);
if(ivar)
main();
}

What is the output?

a)1 2 3 4 5 
b) 5 4 3 2 1 
c) 5 
d) Compiler error:main cannot be recursive function.

ANS: b

Q8.

main()
{
extern int iExtern;
iExtern = 20;
printf(“%d”,iExtern);
}

What is the output?

a) 2 
b) 20 
c) compile error 
d) linker error 

ANS: d

Q9. 
#define clrscr() 100
main(){
clrscr();
printf(“%d ”, clrscr());
}

What is the output?

a) 100 
b) 10 
c) compiler error
d) linkage error

ANS: a 

Q10. 
main()
{
void vpointer;
char cHar = ‘g’, *cHarpointer = “GOOGLE”;
int j = 40;
vpointer = &cHar;
printf(“%c”,*(char*)vpointer);
vpointer = &j;
printf(“%d”,*(int *)vpointer);
vpointer = cHarpointer;
printf(“%s”,(char*)vpointer +3);
}

What is the output?

a) g40GLE 
b) g40GOOGLE 
c) g0GLE 
d) g4GOO

ANS: a

Q11. 
#define FALSE -1
#define TRUE 1 
#define NULL 0
main() {
if(NULL)
puts(“NULL”);
else if(FALSE)
puts(“TRUE”);
else
puts(“FALSE”);
}
What is the output?

a) NULL 
b) TRUE 
c) FALSE 
d) 0 

ANS: b

Q12. 
main() {
int i =5,j= 6, z;
printf(“%d”,i+++j);
}

What is the output?

a)13 
b)12 
c)11 
d) Compiler error

ANS: c

Q13. 
main() {
int i ;
i = accumulator();
printf(“%d”,i);
}
accumulator(){
_AX =1000
}
What is output? 

a)1 
b)10 
c)100 
d)1000 

ANS: d

Q14.
main() {
int i =0;
while(+(+i--)!= 0)
i- = i++;
printf(“%d”,i);
}

What is the output?

a) -1 
b) 0 
c) 1 
d) Will go in an infinite loop

ANS: a

Q15.
main(){
int i =3;
for(; i++=0;)
printf((“%d”,i);
}

What is the output?

a) 1
b) 2
c) 1 2 3
d) Compiler error : L value required.

ANS: d

Q16. 
main(){
int i = 10, j =20;
j = i ,j?(i,j)?i :j:j;
printf(“%d%d”,i,j);
}

What is the output?

a) 20 20 
b) 20 10 
c) 10 20 
d) 10 10

ANS: d

Q17.
main(){
extern i;
printf(“%d ”,i);{
int i =20;
printf(“%d ”,i);
}
}
What is the output?

a) “Extern valueof i “ 20 
b) Externvalue of i”
c) 20
d) linker Error: unresolved external symbol i

ANS: d

Q18.
int DIMension(int array[]){
return sizeof(array/sizeof(int);}
main(){
int arr[10];
printf(“Array dimension is %d”,DIMension(arr));
}

What is output?

a) array dimension is 10 
b) array dimension is 1 
c) array dimension is 2 
d) array dimension is 5

ANS: b

Q19. 
main(){
void swap();
int x = 45, y = 15;
swap(&x,&y);
printf(“x = %d y=%d”x,y);
}
void swap(int *a, int *b){
*a^=*b, *b^=*a, *a^ = *b;

What is the output?

a) x = 15, y =45 
b) x =15, y =15 
c) x =45 ,y =15 
d) x =45 y = 45

ANS: a

Q20. 
main(){
int i =257;
int *iptr =&i;
printf(“%d%d”,*((char*)iptr),*((char *)iptr+1));
}

What is output?

a) 1, 257 
b) 257 1
c) 0 0
d) 1 1

ANS: d

Q21.
main(){
int i =300;
char *ptr = &i;
*++ptr=2;
printf(“%d”,i);
}

What is output?

a) 556 
b) 300 
c) 2 
d) 302

ANS: a

Q22.
#include
main(){
char *str =”yahoo”;
char *ptr =str;
char least =127;
while(*ptr++)
least = (*ptr
printf(%d”,least);
}

What is the output?

a) 0 
b)127 
c) yahoo 
d) y

ANS: a

Q23. Declare an array of M pointers to functions returning pointers to functions returning pointers to characters.

a) (*ptr[M]()(char*(*)()); 
b) (char*(*)())(*ptr[M])() 
c) (char*(*)(*ptr[M]())(*ptr[M]() 
d) (char*(*)(char*()))(*ptr[M])();

Q24.
void main(){
int I =10, j=2;
int *ip = &I ,*jp =&j;
int k = *ip/*jp;
printf(“%d”,k);
}

What is the output?

a) 2 
b) 5 
c) 10 
d) compile error:unexpected end of file in comment started in line 4

ANS: d

Q25.
main(){
char a[4] =”GOOGLE”;
printf(“%s”,a);
}

What is the output?

a) 2 
b) GOOGLE 
c) compile error: yoo mant initializers 
d) linkage error.

ANS: c

Q26. For 1MB memory, the number of address lines required

a) 12 
b) 16 
c) 20 
d) 32

ANS: 16

Q27. There is a circuit using 3 nand gates with 2 inputs and 1 output,f ind the output.

a) AND 
b) OR 
c) XOR 
d) NAND

ANS: b

Q28. What is done for push operation

a) SP is incremented and then the value is stored.
b) PC is incremented and then the value is stored.
c) PC is decremented and then the value is stored.
d) SP is decremented and then the value is stored.

ANS: d

Q29. Memory allocation of variables declared in a program is:

a) Allocated in RAM
b) Allocated in ROM
c) Allocated in stack
d) Assigned in registers.

ANS: c

Q30. What action is taken when the processer under execution is interrupted by TRAP in 8085MPU?

a) Processor serves the interrupt request after completing the execution of the current instruction.
b) Processer serves the interrupt request after completing the current task.
c) Processor serves the interrupt immediately.
d) Processor serving the interrupt request depends upon the priority of the current task under execution.

ANS: a

Q31. Purpose of PC (program counter)in a microprocessor is:

a) To store address of TOS(top of stack)
b) To store address of next instructions to be executed
c) count the number of instructions
d) to store the base address of the stack.

ANS: b

Q32. Conditional results after execution of an instruction in a microprocessor is stored in

a) register 
b) accumulator 
c) flag register 
d) flag register part of PSW (program status word)

ANS: c

Q33. The OR gate can be converted to the NAND function by adding----gate(s) to the input of the OR gate.

a) NOT 
b) AND 
c) NOR 
d) XOR

ANS: a

Q34. In 8051 microcontroller , has a dual function.

a) port 3 
b) port 2 
c) port 1 
d) port 0

ANS: b

Q35. An 8085 based microprocessor with 2 MHz clock frequency,will execute the following chunk of code with how much delay?

MVI B,38H
HAPPY: MVI C, FFH
SADDY: DCR C
JNZ SADDY
DCR B
JNC HAPPY

a) 102.3 
b)114.5 
c)100.5 
d)120

Q36. In 8085 MPU what will be the status of the flag after the execution of the following chunk of code.

MVI B,FFH
MOV A,B
CMA
HLT

a) S = 1, Z = 0, CY = 1 
b) S = 0, Z = 1, CY = 0 
c) S = 1, Z = 0, CY = 0 
d) S = 1, Z = 1 ,CY = 1

Q37. A positive going pulse which is always generated when 8085 MPU begins the machine cycle.

a) RD 
b) ALE address latch enable…
c) WR 
d) HOLD

ANS: b

Q38. When a ----- instruction of 8085 MPU is fetched , its second and third bytes are placed in the W and Z registers.

a) JMP 
b) STA 
c) CALL 
d) XCHG

ANS: c

Q39. What is defined as one subdivision of the operation performed in one clock period.

a) T- State 
b) Instruction Cycle 
c) Machine Cycle 
d) All of the above 

ANS: a

Q40. At the end of the following code, what is the status of the flags.
LXI B, AEC4H
MOV A,C
ADD HLT 

a) S = 1, CY = 0, P = 0 , AC = 1 
b) S =0 , CY = 1, P = 0,AC = 1 
c) S = 0, CY = 1, P = 0 , AC = 1 
d) S = 0, CY = 1, P = 1 , AC = 1

Q41. In 8051 micro controller what is the HEX number in the accumulator after the execution of the following code.

MOV A,#0A5H
CLR C
RRC A
RRC A
RL A
RL A
SWAP A

a) A6 
b) 6A 
c) 95 
d) A5.

ANS: a 


Q42. The Pentium processor requires ------------ volts.

a) 9 
b)12 
c) 5 
d) 24

ANS: c

Q43. The data bus on the Celeron processor is-------bits wide.

a) 64 
b) 32 
c) 16 
d) 128.

ANS: a

Q44. K6 processor

a) Hitachi 
b) toshiba 
c) zilog 
d) AMD. 

ANS: d

Q45. What is the control word for 8255 PPI,in BSR mode to set bit PC3.

a) 0EH 
b) 0FH 
c) 07H 
d) 06H. 

ANS: c

Q46. The repeated execution of a loop of code while waiting for an event to occur is called ---------.The cpu is not engaged in any real productive activity during this period,and the process doesnt progress towards completion.

a) dead lock 
b) busy waiting 
c) trap door 
d) none.

ANS: b

Q47. Transparent DBMS is defined as

a) A DBMS in which there are no program or user access languages. 
b) A DBMS which has no cross file capabilities but is user friendly and provides user interface management. 
c) A DBMS which keeps its physical structure hidden from user 
d) none.

ANS: c

Q48. Either all actions are carried out or none are. users should not have to worry about the effect of incomplete transactions.DBMS ensures this by undoing the actions of incomplete transactions. this property is known as

a) Aggregation 
b) atomicity 
c) association 
d) data integrity.

ANS: B…

Q49. ------ algorithms determines where in available to load a program. common methods are first fit, next fit, best fit.--------- algorithm are used when memory is full , and one process (or part of a process) needs to be swapped out to accommodate a new program.The ------------- algorithm determines which are the partitions to be swapped out.

a) placement, placement, replacement
b) replacement, placement, placement
c) replacement, placement, replacement
d) placement, replacement, replacement 

ANS: D

Q50.Trap door is a secret undocumented entry point into a program used to grant access without normal methods of access authentication. A trap is a software interrupt,usually the result of an error condition.

a) true 
b) false.

ANS: A

Q51. Given a binary search tree, print out the nodes of the tree according t5o post order traversal. 
4
/
2 5
/
1 3

a)3,2,1,5,4. 
b)1,2,3,4,5. 
c)1,3,2,5,4. 
d)5,3,1,2,4.

ANS: C

Q52. Which one of the following is the recursive travel technique.

a) depth first search 
b) preorder 
c) breadth first search 
d) none.

Q53. Which of the following needs the requirement to be a binary search tree.

a) 5
/
2 7
/
1

b) 5
/
6 7

c) 5
/
2 7
/
1 6

d) none.

Q54. In recursive implementations which of the following is true for saving the state of the steps

a) as full state on the stack
b) as reversible action on the stack
c) both a and b
d) none

Q55. Which of the following involves context switch

a) previliged instruction
b) floating point exception
c) system calls
d) all
e) none

ANS: c


Q56. Piggy backing is a technique for
 
a) acknowledge
b) sequence
c) flow control
d) retransmission

ANS: A

Q57. a functional dependency XY is ___________dependency if removal of any attribute A from X means that the dependency does not hold any more

a) full functional
b) multi valued
c) single valued
d) none

ANS: a

Q58)a relation schema R is in BCNF if it is in ___________and satisfies an additional constraints that for every functional dependency XY,X must be a candidate key

a)1 NF
b)2 NF
c)3 NF
d)5 NF

Q59) a _________sub query can be easily identified if it contains any references to the parent sub query columns in the _________ clause

a) correlated ,WHERE
b) nested ,SELECT
c) correlated,SELECT
d) none

Q60) hybrid devise that combines the features of both bridge and router is known as

a) router 
b) bridge 
c) hub 
d) brouter

Q61) which of the following is the most crucial phase of SDLC

a) testing 
b) code generation 
c) analysis and design
d) implementation

ANS: c

Q62)To send a data packet using datagram ,connection will be established

a)no connection is required
b) connection is not established before data transmission
c)before data transmission
d)none 

ANS: c

Q63) A software that allows a personal computer to pretend as as computer terminal is

a) terminal adapter
b) terminal emulation
c) modem
d) none 

ANS: b

Q64) Super key is

a) same as primary key
b) primary key and attribute
c) same as foreign key
d) foreign key and attribute

ANS: b

Q65) In binary search tree which traversal is used for ascending order values

a) Inorder 
b) preorder 
c) post order 
d) none

ANS: a

Q66) You are creating an index on ROLLNO column in the STUDENT table.which statement will you use?

a) CREATE INDEX roll_idx ON student, rollno; 
b) CREATE INDEX roll_idx FOR student, rollno;
c) CREATE INDEX roll_idx ON student( rollno);
d) CREATE INDEX roll_idx INDEX ON student (rollno);

ANS: c

Q67. A________class is a class that represents a data structure that stores a number of data objects

a. container 
b.component 
c.base 
d.derived

ANS: a

Q68.Which one of the following phases belongs to the compiler Back-end.

a. Lexical Analysis
b.Syntax Analysis 
c. Optimization 
d.Intermediate Representation.

ANS: c

Q69. Every context _sensitive language is context_free

a. true 
b.false

ANS: b

Q70. Input:A is non-empty list of numbers L
Xß-infinity
For each item in the list L,do
If the item>x,then
Xß the item
Return X
X represents:-

a) largest number
b) smallest number
c) smallest negative number
d) none

Q71. Let A and B be nodes of a heap,such that B is a child of A. the heap must then satisfy the following conditions

a) key(A)>=key(B)
b) key(A)
c) key(A)=key(B)
d) none

Q72. String , List, Stack, queue are examples of___________

a) primitive data type
b) simple data type
c) Abstract data type
d) none

ANS: c

Q73. Which of the following is not true for Linked Lists?

a) The simplest kind of linked list is a single linked list ,which has one link per node .this link points to the next node in the list,or to a null value or empty list if it is the last node.
b) a more sophisticated kind of linked list is a double linkedlist or two way linked list .Each node has two links ,one to the previous node and one to the next node.
c) in a circle Linked List ,the first and last nodes are linked together.this can be done only for double linked list.
d) to traverse a circular linked list ,u begin at any node and follow the list in either direction until u return to the original node.
ANS: c

Q74. Sentinel node at the beginning and /or at the end of the linked list is not used to store the data

a) true
b) false 

ANS: a



  
   






FreshersLive - No.1 Job site in India. Here you can find latest 2016 government as well as private job recruitment notifications for different posts vacancies in India. Get top company jobs for both fresher and experienced. Job Seekers can get useful interview tips, resume services & interview Question and answer. Practice online test free which is helpful for interview preparation. Register with us to get latest employment news/rojgar samachar notifications. Also get latest free govt and other sarkari naukri job alerts daily through E-mail.

closepop
closepop