Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

What is the output of the following JAVA program ?class simple{public static void main(String[ ] args){simple obj = new simple( );obj.start( );}void start( ){long [ ] P= {3, 4, 5};long [ ] Q= method (P);System.out.print (P[0] + P[1] + P[2]+”:”);System.out.print (Q[0] + Q[1] + Q[2]);}long [ ] method (long [ ] R){R [1]=7;return R;}} //end of class(A) 12 : 15(B) 15 : 12(C) 12 : 12(D) 15 : 15

Answer»
2.

The hexadecimal equivalent of the binary integer number 110101101 is:(A) D24(B) 1BD(C) 1AE(D) 1AD

Answer»
3.

What does the following logic diagram represent?(A) Synchronous Counter(B) Ripple Counter(C) Combinational Circuit(D) Mod 2 Counter

Answer»
4.

In a paged memory, the page hit ratio is 0.40. The time required to access a page in secondary memory is equal to 120 ns. The time required to access a page in primary memory is 15 ns. The average time required to access a page is ________.(A) 105(B) 68(C) 75(D) 78

Answer»
5.

In a multi-user operating system, 30 requests are made to use a particular resource per hour, on an average. The probability that no requests are made in 40 minutes, when arrival pattern is a poisson distribution, is _________.(A) e-15(B) 1 – e-15(C) 1 – e-20(D) e-20

Answer»
6.

At a particular time of computation, the value of a counting semaphore is 10. Then 12 P operations and “x” V operations were performed on this semaphore. If the final value of semaphore is 7, x will be:(A) 8(B) 9(C) 10(D) 11

Answer»
7.

Normally user programs are prevented from handling I/O directly by I/O instructions in them. For CPUs having explicit I/O instructions, such I/O protection is ensured by having the I/O instructions privileged. In a CPU with memory mapped I/O, there is no explicit I/O instruction. Which one of the following is true for a CPU with memory mapped I/O ?(A) I/O protection is ensured by operating system routines.(B) I/O protection is ensured by a hardware trap.(C) I/O protection is ensured during system configuration.(D) I/O protection is not possible.

Answer»
8.

Which UNIX/Linux command is used to make all files and sub-directories in the directory “progs” executable by all users ?(A) chmod− R a+x progs(B) chmod −R 222 progs(C) chmod−X a+x progs(D) chmod −X 222 progs

Answer»
9.

In Java, which of the following statements is/are True?S1 : The ‘final’ keyword applied to a class definition prevents the class from being extended through derivation.S2 : A class can only inherit one class but can implement multiple interfaces.S3 : Java permits a class to replace the implementation of a method that it has inherited. It is called method overloading.Code:(A) S1 and S2 only(B) S1 and S3 only(C) S2 and S3 only(D) All of S1, S2 and S3

Answer»
10.

Which of the following statements is/are True?P : C programming language has a weak type system with static types.Q : Java programming language has a strong type system with static types.Code:(A) P only(B) Q only(C) Both P and Q(D) Neither P nor Q

Answer»
11.

Which of the following statements are true ?(a) Three broad categories of Networks are(i) Circuit Switched Networks(ii) Packet Switched Networks(iii) Message Switched Networks(b) Circuit Switched Network resources need not be reserved during the set up phase.(c) In packet switching there is no resource allocation for packets.Code :(A) (a) and (b) only(B) (b) and (c) only(C) (a) and (c) only(D) (a), (b) and (c)

Answer»
12.

A graphic display system has a frame buffer that is 640 pixels wide, 480 pixels high and 1 bit of color depth. If the access time for each pixel on the average is 200 nanoseconds, then the refresh rate of this frame buffer is approximately :(A) 16 frames per second(B) 19 frames per second(C) 21 frames per second(D) 23 frames per second

Answer»
13.

In Challenge-Response authentication the claimant ________.(A) Proves that she knows the secret without revealing it(B) Proves that she doesn’t know the secret(C) Reveals the secret(D) Gives a challenge

Answer»
14.

Encrypt the Message “HELLO MY DEARZ” using Transposition Cipher with(A) HLLEO YM AEDRZ(B) EHOLL ZYM RAED(C) ELHL MDOY AZER(D) ELHL DOMY ZAER

Answer»
15.

To guarantee correction of upto t errors, the minimum Hamming distance d min in a block code must be ________.(A) t+1(B) t−2(C) 2t−1(D) 2t+1

Answer»