Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

Consider the following C program:#include <stdio.h>typedef struct{char *a;char *b;} t;void f1(t s);void f2(t *p);main(){static t s = {"A", "B"};printf ("%s %s\n", s.a, s.b);f1(s);printf ("%s %s\n", s.a, s.b);f2(&s);}void f1(t s){s.a = "U";s.b = "V";printf ("%s %s\n", s.a, s.b);return;}void f2(t *p){p -> a = "V";p -> b = "W";printf("%s %s\n", p -> a, p -> b);return;}What is the output generated by the program ?(A) A BU VV WV W(B) A BU VA BV W(C) A BU VU VV W(D) A BU VV WU V

Answer»
2.

What is the output of the following program?#include <stdio.h>int funcf (int x);int funcg (int y);main(){int x = 5, y = 10, count;for (count = 1; count <= 2; ++count){y += funcf(x) + funcg(x);printf ("%d ", y);}}funcf(int x){int y;y = funcg(x);return (y);}funcg(int x){static int y = 10;y += 1;return (y+x);}(A) 43 80(B) 42 74(C) 33 37(D) 32 32

Answer» None
3.

Consider the following C program which is supposed to compute the transpose of a given 4 x 4 matrix M. Note that, there is an X in the program which indicates some missing statements. Choose the correct option to replace X in the program.#include<stdio.h>#define ROW 4#define COL 4int M[ROW][COL] = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16};main(){int i, j, t;for (i = 0; i < 4; ++i){X}for (1 = 0; i < 4; ++i)for (j = 0; j < 4; ++j)printf ("%d", M[i][j]);}A)for(j = 0; j < 4; ++j){ t = M[i][j]; M[i][j] = M[j][i]; M[j][i] = t;}B)for(j = 0; j < 4; ++j){ M[i][j] = t; t = M[j][i]; M[j][i] = M[i][j];}C)for(j = i; j < 4; ++j){ t = M[i][j]; M[i][j] = M[j][i]; M[j][i] = t;}D)for(j = i; j < 4; ++j){ M[i][j] = t; t = M[j][i]; M[j][i] = M[i][j];}(A) A(B) B(C) C(D) D

Answer» None
4.

A program attempts to generate as many permutations as possible of the string, ‘abcd’ by pushing the characters a, b, c, d in the same order onto a stack, but it may pop off the top character at any time. Which one of the following strings CANNOT be generated using this program?(A) abcd(B) dcba(C) cbad(D) cabd

Answer»
5.

A sender is employing public key cryptography to send a secret message to a receiver. Which one of the following statements is TRUE?(A) Sender encrypts using receiver’s public key(B) Sender encrypts using his own public key(C) Receiver decrypts using sender’s public key(D) Receiver decrypts using his own public key

Answer»
6.

Which of the following commands or sequences of commands will rename a file x to file y in a Unix system?I. mv y, xII. mvx, yIII. cp y, x (rm x)IV. cp x, y (rm x)(A) II and III(B) II and IV(C) l and III(D) II only

Answer» Answer: (B)
Explanation: I. mv y, x //will move contentsof file x to file y

II. mvx, y //will move contentsof file yto file x

III. cp y, x (rm x) //will copy file x to file y (removal of x after the command)

IV. cp x, y (rm x) //will move contents file yto file x (removal of x after the command)

7.

Which of the following objects can be used in expressions and scriplets in JSP (Java Server Pages) without explicitly declaring them?(A) session and request only(B) request and response only(C) response and session only(D) session, request and response

Answer»
8.

Which level of locking provides the highest degree of concurrency in a relational data base?(A) Page(B) Table(C) Row(D) Page, table and row level locking allow the same degree of concurrency

Answer»
9.

Which one of the following statements is FALSE?(A) TCP guarantees a minimum communication rate(B) TCP ensures in-order delivery(C) TCP reacts to congestion by reducing sender window size(D) TCP employs retransmission to compensate for packet loss

Answer»
10.

A software organization has been assessed at SEI CMM Level 4. Which of the following does the organization need to practice beside Process Change Management and Technology Change Management in order to achieve Level 5 ?(A) Defect Detection(B) Defect Prevention(C) Defect Isolation(D) Defect Propagation

Answer»
11.

Which one of the following statements is FALSE?(A) Packet switching leads to better utilization of bandwidth resources than circuit switching.(B) Packet switching results in less variation in delay than circuit switching.(C) Packet switching requires more per packet processing than circuit switching(D) Packet switching can lead to reordering unlike in circuit switching

Answer»
12.

A software configuration management tool helps is(A) keeping track of the schedule based on the milestones reached(B) maintaining different versions of the configurable items(C) managing manpower distribution by changing the project structure(D) all of the above

Answer»
13.

In a softwareproject, COCOMO (Constructive Cost Model) is used to estimate(A) effort and duration based on the size of the software(B) size and duration based on the effort of the software(C) effort and cost based on the duration of the software(D) size, effort and duration based on the cost of the software

Answer»
14.

The diagram that helps in understanding and representing user requirements for a software project using UML (Unified Modeling Language) is:(A) Entity Relationship Diagram(B) Deployment Diagram(C) Data Flow Diagram(D) Use Case Diagram

Answer»
15.

Which one of the following statements is FALSE?(A) HTTP runs over TCP(B) HTTP describes the structure of web pages(C) HTTP allows information to be stored in a URL(D) HTTP can be used to test the validity of a hypertext link

Answer»
16.

In an enhancement of a design of a CPU, the speed of a floating point unit has been increased by 20% and the speed of a fixed point unit has been increased by 10%. What is the overall speedup achieved if the ratio of the number of floating point operations to the number of fixed point operations is 2:3 and the floating point operation used to take twice the time taken by the fixed point operation in the original design?(A) 1.155(B) 1.185(C) 1.255(D) 1.285

Answer» None
17.

Consider a 4 stage pipeline processor. The number of cycles needed by the four instructions I1, I2, I3, I4 in stages S1, S2, S3, S4 is shown below:What is the number of cycles needed to execute the following loop?for (i = 1; i < = 1000; i++) {I1, I2, I3, I4}(A) 11 ns(B) 12 ns(C) 13 ns(D) 28 ns

Answer»
18.

What is the minimum size of ROM required to store the complete truth table of an 8-bit x 8-bit multiplier?(A) 32 K x 16 bits(B) 64 K x 16 bits(C) 16 K x 32 bits(D) 64 K x 32 bits

Answer»
19.

A CPU has only three instructions I1, I2 and I3, which use the following signals in time steps T1-T5:I1 : T1 : Ain, Bout, CinT2 : PCout, BinT3 : Zout, AinT4 : Bin, CoutT5 : EndI2 : T1 : Cin, Bout, DinT2 : Aout, BinT3 : Zout, AinT4 : Bin, CoutT5 : EndI3 : T1 : Din, AoutT2 : Ain, BoutT3 : Zout, AinT4 : Dout, AinT5 : EndWhich of the following logic functions will generate the hardwired control for the signal Ain ?(A) T1.I1 + T2.I3 + T4.I3 + T3(B) (T1 + T2 + T3).I3 + T1.I1(C) (T1 + T2 ).I1 + (T2 + T4).I3 + T3(D) (T1 + T2 ).I2 + (T1 + T3).I1 + T3

Answer»
20.

A disk has 200 tracks (numbered 0 through 199). At a given time, it was servicing the request of reading data from track 120, and at the previousrequest, service was for track 90. The pending requests (in order of their arrival) are for track numbers.30 70 115 130 110 80 20 25.How many times will the head change its direction for the disk scheduling policies SSTF(Shortest Seek Time First) and FCFS (First Come First Serve)(A) 2 and 3(B) 3 and 3(C) 3 and 4(D) 4 and 4

Answer»
21.

A 20 Kbps satellite link has a propagation delay of 400 ms. The transmitter employs the “go back n ARQ” scheme with n set to 10. Assuming that each frame is 100 bytes long, what is the maximum data rate possible?(A) 5Kbps(B) 10Kbps(C) 15Kbps(D) 20Kbps

Answer» None
22.

Which one of the following is NOT shared by the threads of the same process?(A) Stack(B) Address Space(C) File Descriptor Table(D) Message Queue

Answer»
23.

In a virtual memory system, size of virtual address is 32-bit, size of physical address is 30-bit, page size is 4 Kbyte and size of each page table entry is 32-bit. The main memory is byte addressable. Which one of the following is the maximum number of bits that can be used for storing protection and other information in each page table entry?(A) 2(B) 10(C) 12(D) 14

Answer»