Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

Consider the following table of arrival time and burst time for three processes P0, P1 and P2.Process Arrival time Burst TimeP0 0 ms 9 msP1 1 ms 4 msP2 2 ms 9 msThe pre-emptive shortest job first scheduling algorithm is used. Scheduling is carried out only at arrival or completion of processes. What is the average waiting time for the three processes?(A) 5.0 ms(B) 4.33 ms(C) 6.33(D) 7.33

Answer»
2.

A thread is usually defined as a “light weight process” because an operating system (OS) maintains smaller data structures for a thread than for a process. In relation to this, which of the following is TRUE?(A) On per-thread basis, the OS maintains only CPU register state(B) The OS does not maintain a separate stack for each thread(C) On per-thread basis, the OS does not maintain virtual memory state(D) On per-thread basis, the OS maintains only scheduling and accounting information

Answer»
3.

The lexical analysis for a modern computer language such as Java needs the power of which one of the following machine models in a necessary and sufficient sense?(A) Finite state automata(B) Deterministic pushdown automata(C) Non-Deterministic pushdown automata(D) Turing Machine

Answer»
4.

Database table by name Loan_Records is given below.Borrower Bank_Manager Loan_Amount Ramesh Sunderajan 10000.00 Suresh Ramgopal 5000.00 Mahesh Sunderajan 7000.00What is the output of the following SQL query?SELECT Count(*) FROM ( ( SELECT Borrower, Bank_Manager FROM Loan_Records) AS S NATURAL JOIN ( SELECT Bank_Manager, Loan_Amount FROM Loan_Records) AS T );(A) 3(B) 9(C) 5(D) 6

Answer»
5.

Consider the language L1,L2,L3 as given below.L1={ | p,q N}L2={ | p,q N and p=q}L3={ | p,q,r N and p=q=r}Which of the following statements is NOT TRUE?(A) Push Down Automata (PDA) can be used to recognize L1 and L2(B) L1 is a regular language(C) All the three languages are context free(D) Turing machine can be used to recognize all the three languages

Answer» None
6.

Which of the following pairs have DIFFERENT expressive power?(A) Deterministic finite automata(DFA) and Non-deterministic finite automata(NFA)(B) Deterministic push down automata(DPDA)and Non-deterministic push down automata(NPDA)(C) Deterministic single-tape Turing machine and Non-deterministic single-tape Turing machine(D) Single-tape Turing machine and multi-tape Turing machine

Answer»
7.

Which one of the following is NOT desired in a good Software Requirement Specifications (SRS) document?(A) Functional Requirements(B) Non-Functional Requirements(C) Goals of Implementation(D) Algorithms for Software Implementation

Answer»
8.

The time taken to switch between user and kernel modes of execution be t1 while the time taken to switch between two processes be t2.Which of the following is TRUE?(A) t1 > t2(B) t1 = t2(C) t1 < t2(D) nothing can be said about the relation between t1 and t2

Answer»
9.

A company needs to develop digital signal processing software for one of its newest inventions. The software is expected to have 40000 lines of code. The company needs to determine the effort in person-months needed to develop this software using the basic COCOMO model. The multiplicative factor for this model is given as 2.8 for the software development on embedded systems, while the exponentiation factor is given as 1.20. What is the estimated effort in person-months?(A) 234.25(B) 932.50(C) 287.80(D) 122.40

Answer» None
10.

Consider a hypothetical processor with an instruction of type LW R1, 20(R2), which during execution reads a 32-bit word from memory and stores it in a 32-bit register R1. The effective address of the memory location is obtained by the addition of a constant 20 and the contents of register R2. Which of the following best reflects the addressing mode implemented by this instruction for operand in memory?(A) Immediate Addressing(B) Register Addressing(C) Register Indirect Scaled Addressing(D) Base Indexed Addressing

Answer»
11.

A max-heap is a heap where the value of each parent is greater than or equal to the values of its children. Which of the following is a max-heap?(A) A(B) B(C) C(D) D

Answer»
12.

An algorithm to find the length of the longest monotonically increasing sequence of numbers in an array A[0 :n-1] is given below.Let Li denote the length of the longest monotonically increasing sequence starting at index i in the arrayWhich of the following statements is TRUE?(A) The algorithm uses dynamic programming paradigm(B) The algorithm has a linear complexity and uses branch and bound paradigm(C) The algorithm has a non-linear polynomial complexity and uses branch and bound paradigm(D) The algorithm uses divide and conquer paradigm.

Answer»
13.

Let P be a regular language and Q be context-free language such that Q P. (For example, let P be the language represented by the regular expression p*q* and Q be {pnqn|n N}). Then which of the following is ALWAYS regular?(A) P Q(B) P – Q(C) * – P(D) * – Q(A) A(B) B(C) C(D) D

Answer»
14.

Consider a relational table with a single record for each registered student with the following attributes.1. Registration_Num: Unique registration number of each registered student2. UID: Unique identity number, unique at the national level for each citizen3. BankAccount_Num: Unique account number at the bank. A student can have multiple accounts or join accounts. This attribute stores the primary account number.4. Name: Name of the student5. Hostel_Room: Room number of the hostel Which one of the following option is INCORRECT?(A) BankAccount_Num is candidate key(B) Registration_Num can be a primary key(C) UID is candidate key if all students are from the same country(D) If S is a superkey such that S∩UID is NULL then S∪UID is also a superkey

Answer»
15.

What does the following fragment of C-program print?char c[] = "GATE2011";char *p =c;printf("%s", p + p[3] - p[1]) ;(A) GATE2011(B) E2011(C) 2011(D) 011

Answer»
16.

HTML(Hypertext Markup Language) has language elements which permit certain actions other than describing the structure of the web document. Which one of the following actions is NOT supported by pure HTML (without any server or client side scripting)pages?(A) Embed web objects from different sites into the same page(B) Refresh the page automatically after a specified interval(C) Automatically redirect to another page upon download(D) Display the client time as part of the page

Answer»
17.

The simplified SOP (Sum Of Product) form of the boolean expression (P + Q’ + R’) . (P + Q’ + R) . (P + Q + R’) is(A) (P’.Q + R’)(B) (P + Q’.R’)(C) (P’.Q + R)(D) (P.Q + R)

Answer»
18.

Which one of the following circuits is NOT equivalent to a 2-input XNOR (exclusive NOR) gate?(A) A(B) B(C) C(D) D

Answer»
19.

A computer handles several interrupt sources of which the following are relevant for this question.. Interrupt from CPU temperature sensor (raises interrupt if CPU temperature is too high). Interrupt from Mouse(raises interrupt if the mouse is moved or a button is pressed). Interrupt from Keyboard(raises interrupt when a key is pressed or released). Interrupt from Hard Disk(raises interrupt when a disk read is completed)Which one of these will be handled at the HIGHEST priority?(A) Interrupt from Hard Disk(B) Interrupt from Mouse(C) Interrupt from Keyboard(D) Interrupt from CPU temperature sensor

Answer»
20.

A layer-4 firewall (a device that can look at all protocol headers up to the transport layer) CANNOT(A) block entire HTTP traffic during 9:00PM and 5 :0OAM(B) block all ICMP traffic(C) stop incoming traffic from a specific IP address but allow outgoing traffic to the same IP address(D) block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM

Answer»
21.

A company needs to develop a strategy for software product development for which it has a choice of two programming languages L1 and L2. The number of lines of code (LOC) developed using L2 is estimated to be twice the LOC developed with Ll. The product will have to be maintained for five years. Various parameters for the company are given in the table below.ParameterLanguage L1Language L2Man years needed for developmentLOC/10000LOC/10000Development cost per man yearRs. 10,00,000Rs. 7,50,000Maintenance time5 years5 yearsCost of maintenance per yearRs. 1,00,000Rs. 50,000Total cost of the project includes cost of development and maintenance. What is the LOC for L1 for which the cost of the project using L1 is equal to the cost of the project using L2?(A) 4000(B) 5000(C) 4333(D) 4667

Answer»
22.

In a compiler, keywords of a language are recognized during(A) parsing of the program(B) the code generation(C) the lexical analysis of the program(D) dataflow analysis

Answer»
23.

An undirected graph G(V, E) contains n ( n > 2 ) nodes named v1 , v2 ,….vn. Two nodes vi , vj are connected if and only if 0 < |i – j| <= 2. Each edge (vi, vj ) is assigned a weight i + j. A sample graph with n = 4 is shown below.What will be the cost of the minimum spanning tree (MST) of such a graph with n nodes?(A) 1/12(11n^2 – 5n)(B) n^2 – n + 1(C) 6n – 11(D) 2n + 1

Answer»
24.

Which of the following options is the closest in the meaning to the word below:Inexplicable(A) incomprehensible(B) indelible(C) inextricable(D) infallible

Answer»
25.

Choose the word from the options given below that is most nearly opposite in meaning to the given word:Amalgamate(A) merge(B) split(C) collect(D) separate

Answer»
26.

Few school curricula include a unit on how to deal with bereavement and grief, and yet all students at some point in their lives suffer from losses through death and parting.Based on the above passage which topic would not be included in a unit on bereavement?(A) how to write a letter of condolence(B) what emotional stages are passed through in the healing process(C) what the leading causes of death are(D) Show to give support to a grieving friend

Answer»
27.

If Log(P) = (1/2)Log(Q) = (1/3)Log(R), then which of the following options is TRUE?(A) P2 = Q3R2(B) Q2 = PR(C) Q2 = R3P2(D) R = P2Q2

Answer» None
28.

The variable cost (V) of manufacturing a product varies according to the equation V = 4q, where q is the quantity produced. The fixed cost (F) of production of same product reduces with q according to the equation F = 100/q.How many units should be produced to minimize the total cost (V+F)?(A) 5(B) 4(C) 7(D) 6

Answer»
29.

P, Q, R and S are four types of dangerous microbes recently found in a human habitat. The area of each circle with its diameter printed in brackets represents the growth of a single microbe surviving human immunity system within 24 hours of entering the body. The danger to human beings varies proportionately with the toxicity, potency and growth attributed to a microbe shown in the figure below:A pharmaceutical company is contemplating the development of a vaccine against the most dangerous microbe. Which microbe should the company target in its first attempt?(A) P(B) Q(C) R(D) S

Answer» None
30.

A transporter receives the same number of orders each day. Currently, he has some pending orders (backlog) to be shipped. If he uses 7 trucks, then at the end of the 4th day he can clear all the orders. Alternatively, if he uses only 3 trucks, then all the orders are cleared at the end of the 10th day. What is the minimum number of trucks required so that there will be no pending order at the end of the 5th day?(A) 4(B) 5(C) 6(D) 7

Answer» None
31.

A container originally contains 10 litres of pure spirit. From this container 1 litre of spirit is replaced with 1 litre of water. Subsequently, 1 litre of the mixture is again replaced with 1 litre of’water and this process is repeated one more time. How much spirit is now left in the container?(A) 7.58 litres(B) 7.84 litres(C) 7 litres(D) 7.29 litres

Answer»
32.

The following is the comment written for a C function. /* This function computes the roots of a quadratic equation a.x^2 + b.x + c = . The function stores two real roots in *root1 and *root2 and returns the status of validity of roots. It handles four different kinds of cases. (i) When coefficient a is zero irrespective of discriminant (ii) When discreminant is positive (iii) When discriminant is zero (iv) When discriminant is negative. Only in case (ii) and (iii) the stored roots are valid. Otherwise 0 is stored in roots. The function returns 0 when the roots are valid and -1 otherwise. The function also ensures root1 >= root2 int get_QuadRoots( float a, float b, float c, float *root1, float *root2); */A software test engineer is assigned the job of doing black box testing. He comes up with the following test cases, many of which are redundant.Which one of the following option provide the set of non-redundant tests using equivalence class partitioning approach from input perspective for black box testing?(A) T1,T2,T3,T6(B) T1,T3,T4,T5(C) T2,T4,T5,T6(D) T2,T3,T4,T5

Answer»
33.

Consider the following recursive C function that takes two argumentsunsigned int foo(unsigned int n, unsigned int r) {if (n > 0) return (n%r + foo (n/r, r ));else return 0;}What is the return value of the function foo when it is called as foo(345, 10) ?(A) 345(B) 12(C) 5(D) 3

Answer»
34.

Consider the same recursive C function that takes two argumentsunsigned int foo(unsigned int n, unsigned int r) {if (n > 0) return (n%r + foo (n/r, r ));else return 0;}What is the return value of the function foo when it is called as foo(513, 2)?(A) 9(B) 8(C) 5(D) 2

Answer»
35.

An 8KB direct-mapped write-back cache is organized as multiple blocks, each of size 32-bytes. The processor generates 32-bit addresses. The cache controller maintains the tag information for each cache block comprising of the following.1 Valid bit1 Modified bitAs many bits as the minimum needed to identify the memory block mapped in the cache. What is the total size of memory needed at the cache controller to store meta-data (tags) for the cache?(A) 4864 bits(B) 6144 bits(C) 6656 bits(D) 5376 bits

Answer» None
36.

Consider the matrix as given below.Which one of the following options provides the CORRECT values of the eigenvalues of the matrix?(A) 1, 4, 3(B) 3, 7, 3(C) 7, 3, 2(D) 1, 2, 3

Answer»
37.

Consider different activities related to email:m1: Send an email from a mail client to a mail serverm2: Download an email from mailbox server to a mail clientm3: Checking email in a web browserWhich is the application level protocol used in each activity?(A) m1: HTTP m2: SMTP m3: POP(B) m1: SMTP m2: FTP m3: HTTP(C) m1: SMTP m2: POP m3: HTTP(D) m1: POP m2: SMTP m3: IMAP

Answer»
38.

Which of the given options provides the increasing order of asymptotic complexity of functions f1, f2, f3 and f4?f1(n) = 2^nf2(n) = n^(3/2)f3(n) = nLognf4(n) = n^(Logn)(A) f3, f2, f4, f1(B) f3, f2, f1, f4(C) f2, f3, f1, f4(D) f2, f3, f4, f1

Answer»
39.

If two fair coins are flipped and at least one of the outcomes is known to be a head, what is the probability that both outcomes are heads?(A) 1/3(B) 1/4(C) 1/2(D) 2/3

Answer»
40.

If the difference between expectation of the square of a random variable (E[X²]) and the square of the expectation of the random variable (E[X])² is denoted by R, then?(A) R = 0(B) R < 0(C) R >= 0(D) R > 0

Answer»
41.

Choose the most appropriate word (s) from the options given below to complete the following sentence.I Contemplated ____________ Singapore for my vacation but decided against it.(A) to visit(B) having to visit(C) visiting(D) for a visit

Answer»
42.

Choose the most appropriate word from the options given below to complete the following sentence.If you are trying to make a strong impression on your audience, you cannot do so by being understated, tentative or_____________.(A) Hyperbolic(B) Restrained(C) Argumentative(D) Indifferent

Answer»
43.

Which of the following options is the closest in the meaning to the word below:Inexplicable (A) incomprehensible(B) indelible(C) inextricable(D) infallible

Answer»