symantec intern 2013

Upload: bhaskar-pathak

Post on 04-Jun-2018

219 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/13/2019 Symantec Intern 2013

    1/6

    previous paper ka.. 20. When inorder traversing a tree resulted E A C K F H D B G; the preorder traversal would return

    a. FAEKCDBHGb. FAEKCDHGBc. EAFKHDCBGd. FEAKDCHBG ******************************************************************************************************************* Answers according to me and preffered from net. correct if something is wrong and incomplete.

    **25 questions Max. Marks 50.0 --> 40 min**2 mark for correct and -1 for wrong**25 Multiple-Choice Questions

    1.Which of the following data structures are indexed structures?

    a. linear arrays

    b. linked listsc. both of aboved. none of aboveAns: a)

    2.In MS-DOS 5.0, which is the number that acts as a code to uniquely identify thesoftware product?

    A. MSB. DOSC. MS DOSD. 5.0

    E. None of the aboveAns: d)

    3.In virtual memory systems, Dynamic address translation

    A. is the hardware necessary to implement pagingB. stores pages at a specific location on diskC. is useless when swapping is usedD. is part of the operating system paging algorithmE. None of the aboveAns: a)

    4.What will be the output of the program?class PassS{ public static void main(String []args) { PassS p= new PassS(); p.start(); } void start()

  • 8/13/2019 Symantec Intern 2013

    2/6

    { String s1="slide"; String s2= fax(s1); System.out.println(s1+" "+s2); } String fax(String s) { String p= s +"stream"; System.out.println(p+" "); return s; }

    }a) slidestreamb)slide streamc)slidestream slide streamd)slidestream slideAns: c)

    5.The Memory Buffer Register (MBR)

    A. is a hardware memory device which denotes the location of the current instruction being executed.

    B. is a group of electrical circuits (hardware), that performs the intent of instructions fetched from memory.C. contains the address of the memory location that is to be read from or stored into.D. contains a copy of the designated memory location specified by the MAR aftera "read" or the new contents of the memory prior to a "write".E. None of the aboveAns: d) 6.Which of the following is not the required condition for binary search algorithm?

    a. The list must be sortedb. there should be the direct access to the middle element in any sublistc. There must be mechanism to delete and/or insert elements in listd. none of aboveAns: c)

    7.A fork system call will fail, ifa) yaad nahi..b) system exceed no. of processc) ststem exceed no. of process in something something...d) a and ce) b and c

    f) a and bAns: e)

    8.Interprocess communicationa) synchronization something...b)c)d)yaad nahi...

  • 8/13/2019 Symantec Intern 2013

    3/6

    9.To connect a computer with a device in the same room, you might be likely to use

    A. a coaxial cableB. a dedicated lineC. a ground stationD. All of the aboveE. None of the aboveAns: a)

    10.A hunter leaves his cabin early in the morning and walks one mile due south.Here he sees a Beer and starts chasing it for one mile due east before he is able to shoot the Beer.After shooting the Beer, he drags it one mile due north back tohis cabin where he started that morning.What color is the beer.a.Blackb.Brownc.White.d.GrayAns: c) 11.In a _____ a parent record type can be linked to one or more "child" record type

    s, but a child record type can have only one parent.A. Network databaseB. Relational databaseC. Distributed databaseD. Hierarchical databaseE. None of the aboveAns: d)

    12.Out of 7 consonants and 4 vowels, how many words of 3 consonants and 2 vowel can be formeda) 210

    b) 1050c) 25200d) 21400e) noneAns: c) 13.Unix Operating System is an ____.a) time sharingb) muti-taskingc) muti-userd) all aboveAns: d)

    14.In OSI network architecture, the dialogue control and token management are responsibility ofa. session layerb. network layerc. transport layerd. data link layere. none of aboveAns: a)

  • 8/13/2019 Symantec Intern 2013

    4/6

    15.Which of the following methods of collision processing has some of their address never be used.a) random collisionb) sequential collisionc) index collisiond) yaad nahi..Ans: a) 16.Suppose cursor points to a node in a linked list (using the node definition with member functions called data and link). What statement changes cursor so that it points to the next node?A. cursor++;B. cursor = link( );C. cursor += link( );D. cursor = cursor->link( );Ans: d) 17.he memory address of fifth element of an array can be calculated by the formula

    a. LOC(Array[5]=Base(Array)+w(5-lower bound), where w is the number of words per

    memory cell for the arrayb. LOC(Array[5])=Base(Array[5])+(5-lower bound), where w is the number of wordsper memory cell for the arrayc. LOC(Array[5])=Base(Array[4])+(5-Upper bound), where w is the number of wordsper memory cell for the arrayd. None of aboveAns: a) 18.Which of the following refers to the associative memory?a) the address of the data is generated by the CPUb) the address of the data is supplied by the usersc) there is no need for an address i.e. the data is used as an address

    d) the data are accessed sequentiallye) None of the aboveAns: c) 19.Which of the following TCP/IP protocol allows an application program on one machine to send a datagram to an application program on another machine?

    A. UDPB. VMTPC. X.25D. SMTPE. None of the above

    Ans: a)

    20. Which of the following hardware components is the most important to the operation of a database management system?

    A. high-resolution video displayB. printerC. high speed, large-capacity disk

  • 8/13/2019 Symantec Intern 2013

    5/6

    D. plotterE. mouse.Ans: c)

    21.In OSI network architecture, the routing is performed bya. network layerb. data link layerc. transport layerd. session layere. none of aboveAns: a)

    22.

    Look at this series: 2, 1, (1/2), (1/4), ... What number should come next?

    A. (1/3) B. (1/8)C. (2/8) D. (1/16)Ans: b)

    23.A file containing multiple indices to the data is called a/ana) index file

    b) sequential filec) index sequential filed) noneAns: c)

    24.Carrier is

    yaad nhi...

    25.Fork isA. the dispatching of a task

    B. the creation of a new jobC. the creation of a new processD. increasing the priority of a taskE. None of the aboveAns: c)

    *****************************************************************************************************************c:http://answers.yahoo.com/question/index?qid=20080328111325AANVZtM

    operating system:http://www.crazyengineers.com/threads/operating-system-quiz-answer-these-questio

    ns.45712/http://www.indiabix.com/computer-science/operating-systems-concepts/013010

    DS:http://www.psexam.com/MCQs-from-Data-Structures-and-Algorithms/data-structures-a-algorithms-multiple-choice-questions-mcqs-objective-set-2.html

    networking:https://docs.google.com/document/d/1ijAGZ3WMaQbgiKmU6VWwwEBFNQEYA_Ltx85f-EvfDZs/edit?hl=en_US

  • 8/13/2019 Symantec Intern 2013

    6/6

    http://www.indiabix.com/computer-science/networking/001008http://www.indiabix.com/computer-science/networking/001005

    dbms:http://www.indiabix.com/computer-science/database-systems/030005

    general:http://www.indiabix.com/logical-reasoning/number-series/