Thursday, September 30, 2010

State Bank of India Exam Paper - Computer

रिडनडेंसी को परिभाषित कीजिए ।
उत्तर: एक ही डाटा को कई जगह पर सेव करना रिडनडेंसी कहलाता है ।

डाटा माइनिंग का क्या अर्थ है ?
उत्तर: ग्राहक के पास स्टोर किये गए डाटा का विश्लेषण करना डाटा माइनिंग कहलाता है ।

ग्राहक डाटाबेस में, ग्राहक का कुल नाम कहाँ डाला जाता है ?
उत्तर: टेक्स्ट फील्ड में

IP Address से क्या तात्पर्य है ?
उत्तर: इन्टरनेट पर प्रत्येक डिवाइस का एक यूनिक IP Address होता है । इसे इन्टरनेट एड्रेस भी कहते हैं । वह उसी तरह इसकी पहचान करना है जैसे गली का पता घर की पहचान करता है ।

क्लाइंट/सर्वर मॉडल में, क्लाइंट प्रोग्राम क्या करता है ?
उत्तर: सॉफ्टवेयर फाइलें दूसरे कम्प्यूटरों को सर्व करता है ।

Wednesday, September 15, 2010

Basic Computer Questions - Bank PO Exam

11. A(n)………contains commands that can be selected.
(A) pointer
(B) menu
(C) icon
(D) button
(E) None of these
Ans : (B)

12. An error is also known as—
(A) bug
(B) debug
(C) cursor
(D) icon
(E) None of these
Ans : (A)

13. Arithmetic Operations—
(A) involve matching one data item to another to determine if the first item is greater than, equal to, or less than the other item
(B) sort data items according to standard, predefined criteria in ascending order or descending order
(C) use conditions with operators such as AND, OR and NOT
(D) include addition, subtraction, multiplication and division
(E) None of these
Ans : (D)

14. Sending an e-mail is similar to—
(A) picturing an event
(B) narrating a story
(C) writing a letter
(D) creating a drawing
(E) None of these
Ans : (C)

15. Promotion in Marketing means—
(A) passing an examination
(B) elevation from one grade to another
(C) selling the products through various means
(D) selling the product in specific areas
(E) None of these
Ans : (C)

16. Microsoft Word is an example of—
(A) an operating system
(B) a processing device
(C) application software
(D) an input device
(E) None of these
Ans : (B)

17. Sources of Sales Leads are—
(A) Data Mining
(B) Market Research
(C) Media Outlets
(D) Promotional Programs
(E) All of these
Ans : (E)

18. Any data or instruction entered into the memory of a computer is considered as—
(A) storage
(B) output
(C) input
(D) information
(E) None of these
Ans : (A)

19. Which part of the computer displays the work done ?
(B) printer
(C) monitor
(E) None of these
Ans : (C)

20. Which is the part of a computer that one can touch and feel ?
(A) Hardware
(B) Software
(C) Programs
(D) Output
(E) None of these
Ans : (A)

Basic Questions of Computer Science for Bank Exam

1. A keyboard is this kind of device—
(A) black
(B) input
(C) output
(D) word Processing
(E) None of these
Ans : (B)

2. IT stands for—
(A) information Technology
(B) integrated Technology
(C) intelligent Technology
(D) interesting Technology
(E) None of these
Ans : (A)

3. Which of the following refers to the fastest, biggest and most expensive computers ?
(A) Personal Computers
(B) Supercomputers
(C) Laptops
(D) Notebooks
(E) None of these
Ans : (B)

4. A collection of related information sorted and dealt with as a unit is a—
(A) disk
(B) data
(C) file
(D) floppy
(E) None of these
Ans : (C)

5. The process of a computer receiving information from a server on the Internet is known as—
(A) pulling
(B) pushing
(C) downloading
(D) transferring
(E) None of these
Ans : (C)

6. Which part of the computer helps to store information ?
(A) Disk drive
(B) Keyboard
(C) Monitor
(D) Printer
(E) None of these
Ans : (A)

7. ………………is the process of carrying out commands.
(A) Fetching
(B) Storing
(C) Executing
(D) Decoding
(E) None of these
Ans : (C)

8. The role of a………generally is to determine a buyer’s needs and match it to the correct hardware and software.
(A) computer Scientist
(B) computer sales representative
(C) computer consultant
(D) corporate trainer
(E) None of these
Ans : (B)

9. Which of the following groups consist of only output devices ?
(A) Scanner, Printer, Monitor
(B) Keyboard, Printer, Monitor
(C) Mouse, Printer, Monitor
(D) Plotter, Printer, Monitor
(E) None of these
Ans : (D)

10. The rectangular area of the screen that displays a program, data, and/or information is a—
(A) title bar
(B) button
(C) dialog box
(D) window
(E) None of these
Ans : (D)

Tuesday, September 14, 2010

How to unblock a person in Orkut

You can unblock a user by following these steps:

1. Visit your home page and click the "lists" button under your photo.
2. Click the "view ignore-list" button.
3. Click the "remove(delete)" button next to the name of the person you would like to remove from your ignore list.

When you unblock an orkut member, you'll be able to receive messages, scraps, testimonials and invitations from them.

State Bank of India PO Exam - Computer Knowledge

1. The —- shows all the websites and pages that you have visited over a period of time.
(A) status bar
(B) task bar
(C) history list
(D) tool bar
(E) None of these

2. A proxy server is used for the which of the following?
(A) To provide security against unauthorized users
(B) To process client requests for web pages
(C) To process client requests for database access
(D) To provide TCP/IP
(E) None of these

3. A repair for a known software bug, usually available at no charge on the internet , is called a (n) —
(A) version
(B) Patch
(C) Tutorial
(E) None of these

4. In the URL, the portion labelled http is the —
(A) host
(B) domain name
(C) protocol
(D) top-level domain
(E) None of these

5. Which of the following organizations has recently given a US$ 600 million loan to Power Grid Corporation of India , a Govt. run organization?
(A) Asian Development Bank
(B) World Bank
(C) International Monetary Fund
(D) Bank of America
(E) None of these

6. The ability to easily add additional users means that a network is –
(A) Scalable
(B) dedicated
(C) Decentralized
(D) Secure
(E) None of these

7. In a database , a field is a –
(A) lable
(B) table of information
(C) group of related records
(D) category of information
(E) None of these

8. The number of pixels displayed on a screen is known as the screen–
(A) resolution
(B) colour depth
(C) refresh rate
(D) viewing size
(E) None of these

8. Word processing , spreadsheet , and photo-editing are example of –
(A) application software
(B) system software
(C) operating system software
(D) platform software
(E) None of these

9. If you wish to extend the length of the network without having the signal degrade, you would use a —
(A) repeater
(B) router
(C) gateway
(D) switch
(E) None of these

10. A—- is approximately a million bytes.
(A) gigabyte
(B) kilobyte
(C) megabyte
(D) terabyte
(E) None of these

11. The time it takes a device to locate data and instructions and make them available to CPU is known as –
(A) clock speed
(B) a processing cycle
(C) CPU speed
(D) access time
(E) None of these

12. ——– controls the way in which the computer system functions and provides a means by which users are interact with the computer.
(A) The platform
(B) The operating system
(C) Application software
(D) The motherboard
(E) None of these

13. ——– means that the data contained in a database is accurate and reliable.
(A) Data redundancy
(B) Data integrity
(C) Data reliability
(D) Data consistency
(E) None of these

14. A(n) —— is a private corporate network, used exclusively by company employees.
(A) Internet
(B) local area network
(C) peer-to-peer
(D) intranet
(E) None of these

15. A characteristic of a file server is which of the following?
(A) Manages file operations and is shared on a network
(B) Manages file operations and is limited to one PC
(C) Acts as fat client and is shared on a network
(D) Acts as fat client and is limited to one PC
(E) None of these

Monday, September 13, 2010


TeamViewer is a computer software package for remote control, desktop sharing, and file transfer between computers. This software operates with Microsoft Windows, Mac OS X[1][2], and Linux[3].This is able to function while the computers are protected by firewalls and NAT proxy.

TeamViewer connects to any PC or server around the world within a few seconds. You can remote control your partner's PC as if you were sitting right in front of it.
You can start with it. It's free with full version. Go to TeamViewer and download it.

Sunday, September 12, 2010

Some C++ Interview Questions

1. What do you mean by Stack unwinding ?

Ans: It is a process during exception handling when the destructor is called for all local objects between the place where the exception was thrown and where it is caught.

2. Define precondition and post-condition to a member function.

Ans: Precondition: A precondition is a condition that must be true on entry to a member function. A class is used correctly if preconditions are never false. An operation is not responsible for doing anything sensible if its precondition fails to hold. For example, the interface invariants of stack class say nothing about pushing yet another element on a stack that is already full. We say that isful() is a precondition of the push operation. Post-condition: A post-condition is a condition that must be true on exit from a member function if the precondition was valid on entry to that function. A class is implemented correctly if post-conditions are never false. For example, after pushing an element on the stack, we know that isempty() must necessarily hold. This is a post-condition of the push operation.

3. What is polymorphism?

Ans: Polymorphism is the idea that a base class can be inherited by several classes. A base class pointer can point to its child class and a base class array can store different child class objects.

4. How do you find out if a linked-list has an end? (i.e. the list is not a cycle)

Ans: You can find out by using 2 pointers. One of them goes 2 nodes each time. The second one goes at 1 nodes each time. If there is a cycle, the one that goes 2 nodes each time will eventually meet the one that goes slower. If that is the case, then you will know the linked-list is a cycle.

5. What is Boyce Codd Normal form ?

Ans: A relation schema R is in BCNF with respect to a set F of functional dependencies if for all functional dependencies in F+ of the form a->b, where a and b is a subset of R, at least one of the following holds:

Objective Type Computer Science Questions for Public Sector Recruitment Exam

1. The problem of fragmentation arises in
(a) static storage Allocation
(b) stack allocation of storage
(c) stack allocation with dynamic binding
(d) Heap allocation

Ans: (d)

2. The process of organizing the memory into two banks to allow 8 and 16-bit data operation is called

a. Bank Switching
b. Indexed Mapping
c. Two-way memory interleaving
d. Memory segmentation

Ans: (c)

3. Memory refreshing may be done

a. by the CPU that contains a special regress counter, only
b. by an external refresh controller, only
c. either by the CPU or by an external refresh controller
d. none of the above

Ans: (c)

4. The use of hardware in memory management is through segment relocation and protection is

a. to perform address translation to reduce size of the memory
b. to perform address translation to reduce execution time overhead
c. both (a) and (b)
d. none of the above

Ans: (c)

5. Thrashing occurs when

a. too much of the time is spent in waiting to swap between memory and disk
b. two processes try to access the same resource
c. the size of the data to be inserted is less than the size of a page in memory
d. the processor's mapping table discovers that the program is trying to use an address that doesn't currently exist

Ans: (a)

C++ Interview

1. What is an adaptor class or Wrapper class?
Ans: A class that has no functionality of its own. Its member functions hide the use of a third party software component or an object with the non-compatible interface or a non-object-oriented implementation.

2. What is a Null object?
Ans: It is an object of some class whose purpose is to indicate that a real object of that class does not exist. One common use for a null object is a return value from a member function that is supposed to return an object with some specified properties but cannot find such an object.

3. What is class invariant?

Ans: A class invariant is a condition that defines all valid states for an object. It is a logical condition to ensure the correct working of a class. Class invariants must hold when an object is created, and they must be preserved under all operations of the class. In particular all class invariants are both preconditions and post-conditions for all operations or member functions of the class.

4. Differentiate between the message and method.
* Objects communicate by sending messages to each other.
* A message is sent to invoke a method.

* Provides response to a message.
* It is an implementation of an operation.

5. What is a dangling pointer?
Ans: A dangling pointer arises when you use the address of an object after
its lifetime is over. This may occur in situations like returning
addresses of the automatic variables from a function or using the
address of the memory block after it is freed.

Bank IT Officer Exam Papers

1. The model which provides a concrete expression of these concepts by means of two fundamental ideas — logical records and links, is called a

A. relationship model
B. network model
C. hicrachical model
D. none of the above

2. The network model has been established by

A. CODASYL committee
D. none of the above

3. A link may be defined as the representation of an

A. objects
B, programs
C. association
D. none of the above

4. DML is intended provide operations which ope- rate upon data stored in the

A, file
B. record
C. database
D. none of the above

5. In the hierarchical model a hierarchical schema is defined by a tree whose nodes are

A. database
B. logical record types
C. links
D. none of the above

6. The set of all values in the relations represents the contents of the

A. database
B. record file
C. table
D. none of the above

7. In hierarchical data model, the database is represented by

A. a directed graph
B. tree structures
C. relation
D, none of the above

8. A Database Management System (DBMS) is a software system capable of supporting and managing any number of independent

A. results
B. relations
c. none of the above

9. Support for data independence is arguably the most important feature of a

A system
B. database system
C. relation
D. none of the above

10. Distinct levels of data independence arc

A. two
B. three
C. four
D. none of the above

11. Database software may be divided into

A. four distinct categories
B. three distinct categories
C. two distinct categories
D. none of the above

12. Any large software project may be divided into several

A. project phases
B. sub projects
C. hardware
D. none of the above

13. Data modeling occupies an important position in the

A. database file
B. database life cycle
C. relation
D. none of the above

14. The term "software engineering" implies the application of scientific knowledge and discipline to the construction of

A. database record
B. computer hardware system
C. computer software system
D. none of the above

15. Program correctness has been a strong motivation for much of the work in software engineering and

A. high-level language programming
B. programming language design
C. Pascal
D. none of the above

1. B

2. A

3. B

4. B

5. B

6. A

7. B

8. C

9. Do Yourselves

10. Do Yourselves

11. B

12. A

13. B

14. C

15. B

Saturday, September 11, 2010

C++ Interview Questions

1. What is the word you will use when defining a function in base class to allow this function to be a polimorphic function?

Ans: virtual

2. What do you mean by binding of data and functions?

Ans: Encapsulation.

3. What is the difference between an object and a class?

Ans: Classes and objects are separate but related concepts. Every object belongs to a class and every class contains one or more related objects.

- A Class is static. All of the attributes of a class are fixed before, during, and after the execution of a program. The attributes of a class don't change.
- The class to which an object belongs is also (usually) static. If a particular object belongs to a certain class at the time that it is created then it almost certainly will still belong to that class right up until the time that it is destroyed.

- An Object on the other hand has a limited lifespan. Objects are created and eventually destroyed. Also during that lifetime, the attributes of the object may undergo significant change.

4. What is a class ?

Ans: Class is a user-defined data type in C++. It can be created to solve a particular kind of problem. After creation the user need not know the specifics of the working of a class.

5. What is friend function ?

Ans: As the name suggests, the function acts as a friend to a class. As a friend of a class, it can access its private and protected members. A friend function is not a member of the class. But it must be listed in the class definition.

6. Which recursive sorting technique always makes recursive calls to sort subarrays that are about half size of the original array?

Ans: Mergesort always makes recursive calls to sort subarrays that are about half size of the original array, resulting in O(n log n) time.

7. What is abstraction?

Ans: Abstraction is of the process of hiding unwanted details from the user.

What is Index?

A database index is a data structure which use to improve the speed of operations on a database table.

It’s a physical structure containing pointers to the data. Indices can be created using one or more columns of a database table. Indices are created in an existing table to quickly and efficiently lookups.

It is possible to create an index on one or more columns of a table, and each index is given a name. Best way to improve performance in a database application is effective indexes.

There are two type of index available.

1. Clustered index

Clustered index are physical form of sorting. Therefore only one clustered index can be created on each table because the data rows themselves can only be sorted in one order.

2. Non Clustered index
Non clustered indexes are logical form of sorting. Therefore more than one Non clustered indexes can be created on each table.

Friday, September 10, 2010

Operating System Interview Questions Answers

What is difference between NTFS & FAT32?

Ans: NTFS stands for new technology file system or network technology file system. In NTSF partition size can be of 2 TB or more. and file size can be 16 TB. file/folder encryption is done. and it supports file name character upto 255.

FAT32 stands for File allocation table. in FAT32 partition size can be Upto 2 TB. and file size can be 4 GB. file/folder encryption is not possible in FAT32. and it supports file name character upto 8.3.

What is the difference XP and Windows 2000?

Ans: Windows XP is some what faster than Windows 2000, assuming you have a fast processor and tons of memory (although it will run fine with a 300Mhz Pentium II and 128MB of RAM).

The new Windows XP interface is more cheerful and colorful than earlier versions, although the less-cartoony "Classic" interface can still be used if desired.
Windows XP has more bells and whistles, such as the Windows Movie Maker, built-in CD writer support, the Internet Connection Firewall, and Remote Desktop Connection.
Windows XP has better support for games and comes with more games than Windows 2000.
Windows XP is the latest OS - If you don't upgrade now, you'll probably end up migrating to XP eventually anyway, and we mere mortals can only take so many OS upgrades.

Thursday, September 9, 2010

Delhi Metro Rail Corporation Limited Recruitment Exam

1. Parameter passing mechanism for an array is
a. call by value b. call by value and call by reference
c. call by reference d. none of the above

Ans: (a)

2. Use of functions
a. help to avoid repeating a set of instructions many times
b. enhance the logical flow of the program
c. makes the debugging task easier
d. all of the above

Ans: (d)

3. Storage class defines
a. the data type
b. the scope
c. the scope and performance
d. the scop, performance and data type

Ans: (c)

4. The use of macros in place of functions
a. reduces execution times
b. reduces code size
c. increases execution time
d. increase code size

Ans: (a)

5. Scope of macro definition
a. cannot be beyond the file in which it is defined
b. may be part of a file
c. is in the entire program
d. excludes string of characters within double quotes
e. (a), (b), (d)

Ans: (e)

Wednesday, September 8, 2010

Bharat Electronics Limited Recruitment Exam

1. The address space of 8086 microprocessor is :
a. one megabyte b. 256 kilobytes
c. 1 K megabytes c. 64 kilobytes

Ans: (a) one megabyte

2. Which normal form is considered adequate for normal relational database design ?
a. 2 NF b. 5 NF
c. 4 NF d. 3 NF

Ans: (d) 3 NF

3. When the result of a computation depends on the speed of the processes involved there is said to be
a. cycle stealing b. race condition
c. a time lock d. a deadlock

Ans: (b) race condition

4. Zero has two representations in
a. sign magnitude
b. 1's complement
c. 2's compliment
d. None of the above

Ans: (a) sign magnitude

5. Which of the following addresing modes permits relocation without any change
a. Indirect addressing b. Indexed Addressing
c. Base register addressing d. PC relative addressing

Ans: (c) Base register addressing

Tuesday, September 7, 2010

Objective Type Question Answers of Operating System

1. Which of the command is used to remove files ?
a. erase
b. rm
c. delete
d. dm

Ans: b

2. Which of the following command is used to count just the number of lines contained in a file ?
a. wc-1
b. wc-w
d. wc-r

Ans: a

3. Which command is used to copy a file wb with the same name from the programs directory to the misc. directory ?
a. copy programs/wb misc/wb
b. cp programs/wb misc
c. copy a:programs/wb b:misc/wb
d. tar programs/wb misc/wb

Ans: b

4. The commonly used UNIX commands like date, Is, cat, etc. are stored in
a. /dev directory
b. /bin and /usr/bin directories
c. /unix directory
d. /tmp directory

Ans: b

5. Which of the following directories contain all the files created by a user, including his login directory ?
a. /tmp
b. /usr
c. /etc
d. /dev

Ans: b

6. Which command is used to copy the three files wb, colllect and mon into the misc directory, under the same, when you were currently in the programs directory ?
a. copy wb collect mon/misc
b. cp wb collect mon ../misc
c. copy wb ../misc collect ../misc mon ../misc
d. tar wb collect mon/misc

Ans: b

7. Which of the following command is used to display the directory attributes rather than its contents ?
a. 1s-1-d
b. Is-x
c. Is-1
d. is-F

Ans: a

8. Which command is used to remove a directory
a. rd
b. dldir
c. rmdir
d. rdir

Ans: c

9. Which command is used to list out all the hidden files along with the other files ?
a. Is-1
b. Is-F
c. Is-x
d Is-a

Ans: d

10. The file that contains a set of instructions which are performed when a user logs in, is
a) .exrc
b) .profile
c) autoexec.bat
d) .autoexec

Ans: b

Operating System Questions

1. Which of the following command can be used to get information about all user who are currently logged into the system ?
a. which
b. who am i
c. who
d. 1/u

Ans: c

2. The command used to remove the directory is
a. rmdir
b. remove
c. rd
d. rdir

Ans: a

3. Which of the following command can be used to get information about yourself
a. who am i
b. pwd
c. i/4
d. which

Ans: a

4. Which of the following command is used to summarize the disk usage ?
a. chkdsk
b. du
c. fdisk
d. disk

Ans: b

5. Which of the following commands is used to copy directory structures in and out ?
a. cp
b. cp-p
c. cpio
d. copy

Ans: c

6. Which of the following signs is used to backup over typing errors in vi ?
a. @
b. $
c. #
d. !

Ans: c

7. Which of the following commands is used to change the working directory ?
a. cd
b. chdir
c. changedir
d. cdir

Ans: a

8. Which of the following signs is used to erase or kill an entire line you have typed and start you are on a new line(but not display a new prompt) ?
a. @
b. $
c. #
d. !

Ans: a

9. Which of the following commands is used to count the total number of lines, words and characters contained in a file.
a. count p
b. wcount
c. wc
d. countw

Ans: c

10. Which of the following commands is used to list contents of directories ?
a. 1s
b. dir
c. 1p
d. tar

Ans: a

Monday, September 6, 2010

Technical Questions for PSU's

1. The operators << (left shift) and >> (right shift) are
a. assignment operators
b. relational operators
c. logical operators
d. bitwise logical operators

Ans: d

2. The values that can legally appear to the right of the assignment operator are called
a. rvalues
b. int values
c. variables
d. constants

Ans: a

3. The string containing certain required formating information is called
a. argument
b. character array
c. character string
d. control string

Ans: d

4. In C, the NULL statement which does nothing is just
(a.) a., (b) ;
(c) : (d) .

Ans: (b)

5. The general form of do-while statement is
a. do expression while statement;
b. do while expression;
c. do statement while expression;
d. do statement while statement;

Ans: c

6. The two statement that can be used to change the flow of control are
a. if and switch
b. if and while
c. switch and do-while
d. break and continue

Ans: a

7. In printf(), the appearance of the output can be affected by
a. field width
b. conversion character
c. flag
d. all of the above
e. none of the above

Ans: d

8. The conversion character 's' for data input means that the data item is
a. an unsigned decimal integer
b. a short integer
c. a hexadecimal integer
d. a string followed by whitespace character

Ans: d

9. The conversion character for data input which indicates that the data item is a floating-point values is
(a) f
(b) g
(c) e
(d) All of the above

Ans: d

10. The conversion character 'i' for data output means that the data item is displayed as -
(a) a floating point value with an exponent
(b) an unsigned decimal integer
(c) a signed decimal integer
(d) an octal integer

Ans: c

Objective Questions of 'C'

1. Precedence determines which operator
a. is evaluated first
b. is most important
c. is fastest
d. operates on the largest number

Ans: a

2. A expression contains relational assignment and arithmetic operator. In the absence of parentheses, the order of evaluation will be

a. assignment, relational, arithmetic
b. arithmetic, relational, assignment
c. relational, arithmetic, assignment
d. assignment, arithmetic, relational

Ans: b

3. The commands that send or "redirect" output of a program to a disk file or another system device such as the printer are

b. [and]
c. /* and /*
d. ( and )

Ans: a

4. Which of the following scanf() statements is true ?
a. scanf("%f', float-var-name);
b. scanf("%d ∑");
c. scanf("%d", &int-var-name);
d. scanf("%d", &number);

Ans: d

5. The meaning of conversion character h for data input is
a. data item is an unsigned decimal integer
b. data item is a short integer
c. data item is a hexadecimal integer
d. data item is a string folowed by a whitespace character

Ans: b

Objective Type Questions on Loop

1. The general form of the conditional expression is
a. expression 1 ? expression 2 :expression 3
b. expression 2 ? expression 3 ?expression 1
c. expression 3 ? expression 2 :expression 1
d. expression 1 ? expression 2 ?expression 3

Ans: a

2. Any program in C, has access to three standard files
a. standrad input file, standard output file, standard error file
b. stdin, stdout, stderr
c. keyboard, screen, screen
d. all of the above
e. none of the above

Ans: d

3. In a simple 'if' statement with no 'else', what happens if the condition following the 'if' is false ?
a. The program searches for the last else in the program
b. Nothing
c. Control 'falls through' to the statement folowing 'if'
d. The body of the statement is executed

Ans: c

4. A while loop is more appropriate than a for loop when
a. the body of the loop will be executed at last once
b. the terminating condition occurs unexpectedly
c. the program will be executed at least once
d. the number of times the loop will be executed is known before the loop is executed
e. none of the above

Ans: b

5. The comma operator(,) is used to
a. permit two different expressions to appear in situations where only once expression would ordinarily be used
b. terminate loops or to exit from switch
c. alter the normal sequence of program execution by transferring control to some other part of the program
d. carry out a logical test and then take one of two possible actions, depending upon the outcome of the test

Ans: a

Relational Database Design and SQL Questions

1. In a relational schema, each tuple is divided into fields called
a. Relations
b. Domains
c. Queries
d. All of the above

Ans: b

2. A logical schema
a. is the entire database
b. is a standard way of organizing information into accessible parts
c. describes how data is actually stored on disk
d. all of the above

Ans: b

3. A form defines
a. where data are placed on the screen
b. the width of each field
c. both (a) and (b)
d. All of the above

Ans: c

4. A top-to-bottom relationship among the items in a database is established by a
a. Hierarchical Schema
b. Network Schema
c. Relational Schema
d. All of the above

Ans: b

5. A good query system
a. can accept English language commands
b. allows non-programmers to access information stored in a database
c. can be accessed only by data processing professionals
d. Both (a) and (b)

Ans: b

6. A report form
a. appears on the computer monitor during data entry
b. is used during report generation to format data
c. Both a and b
d. All of the above

Ans: b

7. A list consists of last names, first names, addresses and pincodes if all people in the list have the same last and the same pincode, a useful key would be
a. the pincode
b. the last name
c. a compound key consisting of the first name and the last name
d. all of the above

Ans: c

8. A command that lets you change one or more fields in a record is
a. Insert
b. Modify
c. Look-up
d. All of the above

Ans: b

10. Which of the following contains a complete record of all activity that affected the contents of a database during a certain period of time ?
a. Report writer
b. Query language
c. Data manipulation language
d. Transaction Log

Ans: d

Some 'C' Programming objective type questions

1. The recursive form of algebric formula
y=(x1,+x2+x3... +xn) is

a. y=x+n-1 xi i=1
b. y=xn+n xi i=1
c. y=xn+xi
d. y=xn+n-1 i=1 xi
e. none of the above

Ans: d

2. Which of the folowing, is a storage class specification of C ?
a. Automatic
b. Mean
c. External
d. String
e. none of the above

Ans: d

3. The statement following else in an 'if-else' construct are executed when
a. the conditional statement following the 'if' is false
b. the conditional statement following the 'if' is teue
c. the conditional statement following the 'else' is false
d. the conditional statement following the 'else' is true
e. none of the above

Ans: a

4. Given these variables
char ch;
short i;
unsigned long u1;
float f;
the overall type of this expression is

a. char
b. unsigned
c. float
d. double
e. none of the above

Ans: c

5. What will this program display ?
float f;
f= 10/3;
printf("%f", f);

a. 3.3
b. 3.000000
c. 3
d. 3.1

Ans: b

Sunday, September 5, 2010

C and C++ objective type questions

Q1. The braces that surround the code in a 'C' program
a. show what code goes in a particular function
b. delimit a section of code
c. separate the code from the constant
d. separate the source file from the subject file
e. none of the above

Q2. Almost every C program begins with the statement
a. main()
b. printf()
c. #include
d. scanf()
e. none of the above

Q3. A single character input from the keyboard can be obtained by using the function
a. printf()
b. getchar()
c. putchar()
d. scanf()
e. none of the above

Q4. The function scanf() reads
a. a single character
b. character and strings
c. any possible variable type
d. any possible number
e. none of the above

Q5. A field width specifier in a printf() function
a. specifies the maximum value of a number
b. controls the size of type used to print numbers
c. controls the margins of the program
d. specifies how many character positions will be used for a number
e. none of the above

Ans: 1. b , 2. c , 3. b , 4. c , 5. d

UGC Net Computer Science and Application Paper

1. The library files that comes with 'C' are -
Ans: files that contains functions which carry out various commonly used operations and calculations.

2. In 'C' square brackets[] are used in -
a. functions
b. arrays
c. statements
d. all of the above
ANs: b

3. A 'C' program contains the declarations and initial assignments:
int i=8, j=5;
The value of arithmetic expression is int from
2*((i/5)+(4*j-3)%(i+j-2)) is

a. 18
b. 14
c. 1
d. 17

Ans: b

4. The single character input/output functions are
Ans: getchar() and putchar()

5. The purpose of a conditional operator is to-
a. select one of the two values alternately
b. select the highest of the two values
c. select one of the two values depending on a condition
d. select the more equal of the two values

Ans: c

Objective type C & C++ Questions

Q1. An identifier in C
a. is a name of a thing such as variable and function
b. is made up of letters, numerals and the underscore
c. can obtain both upper case and lower case letter
d. all of the above
e. none of the above

Q2. The math library is setup for the user by the file
a. float.h
b. limits.h
c. math.h
d. time.h
e. none of the above

Q3. Which of the following does not have an unary operator ?
a. -7 b. ++i
c. j d. all of the above
e. none of the above

Q4. Assume x, y and z are floating point variables and they have been assigned the values x=8.8, y=3.5, z= -5.2 . The value of arithmetic expression 2*x/(3*y) is
a. 2.000000
b. 1.600000
c. 1.676190
d. 0.676190
e. none of the above

Q5. The two operators && and || are
a. arithmetic operators
b. equality operators
c. logical operators
d. relational operators
e. none of the above

Saturday, September 4, 2010

United Bank of India IT Officer Examination Technical Paper

Ques 1. What do you understand by M-Banking ? What the benifits of M-Banking in Banks ? How M-Marketing is useful for Banks net profit ?

Ques 2. Differentiate two-tier and three-tier client server architecture ?

Ques 3. What do you understand by knowledge searching in Database ? How you relate it with database mining ? How Data mining useful in Database and in busines ?

Multiple choice questions of networking

Q1. A distributed network configuration in which all data/information pass through a central computer is
a. bus network
b. ring network
c. star network
d. point-to-point network
e. none of the above

Q2. The most flexibility in how devices are wired together is provided by
a. bus networks
b. star networks
c. ring networks
d. T-switched networks
e. none of the above

Q3. The communication mode that supports two-way traffic but only one direction at a time is
a. simplex b. half duplex
c. duplex d. multiplex
e. none of the above

Q4. A central Computer surrounded by one or more satellite computers is called a
a. bus network
b. ring network
c. star network
d. all of the above
e. none of the above

Q5. FDDI is a
a. ring network
b. star network
c. mesh network
d. bus based network
e. none of the above

Ans: 1. c , 2. a , 3. b , 4. c , 5. a

Networking for UGC NET Exam

Q.1. Local area networks can transmit
a. slower than telecommunications over public telephone lines.
b. faster than telecommunications over public telephone lines.
c. using twisted-pair wiring or coaxial cables.
d. both a and c
e. none of the above

Q2. A Packet -switching network
a. is free
b. allows communication channels to be shared among more than one user.
c. can reduce the cost of using an information utility.
d. both a and b
e. none of the above

Q3. The application layer of a network
a. establishes, maintains and terminates virtual circuits
b. consists of software being run on the computer connected to the network
c. defines the user's port into the network
d. all of the above
e. none of the above

Q4. Devices on one network can communicate with devices on another network via a
a. file server b. printer server
c. utility server d. gateway
e. none of the above

Q5. A network that requires human inventation of route signals is called a
a. bus network
b. ring network
c. star network
d. T-switched network
e. none of the above

Ans: 1. d , 2. d , 3. b , 4. d , 5. d

Friday, September 3, 2010

Computer Networking Objective Type Question Answer

1. How many pairs of stations can simultaneously communicate on Ethernet LAN ?
Ans: 1

2. A modem that is attached to the telephone system by jamming the phone's handset into two flexible receptacles in the coupler ?

a. gateway
b. time-divison multiplexer
c. acoustic coupler
d. bridge

Ans: c

3. Which of the following allows devices on one network to communicate with devices on another network ?
a. multiplexer
b. gateway
c. t-switch
d. modem

Ans: b

4. A station in a network forwards incoming packets by placing them on its shortest output queue. What routing algorithm is being used ?
a. flooding
b. hot potato routing
c. static routing
d. delta routing

Ans: b

5. The communication mode that supports data in both directions at the same time is
a. simplex
b. half-simplex
c. full-duplex
d. multiplex

Ans: c

6. Modulation is the process of
a. sending a file from one computer to another computer
b. converting digital signals to analog signals
c. converting analog signals to digital signals
d. echoing every character that is received

7. The signal to noise ratio for a voice grade line is 30.1 db or a power ration of 1023:1. The maximum achievable data rate on this line whose spectrum ranges from 300 Hz to 4300 Hz is
a. 6200 bps b. 34000 bps
c. 9600 bps d. 31000 bps

ANs: d

8. Which of the following is used for modulation and demodulation ?
a. modem
b. protocol
c. gateway
d. multiplexer

Ans: a

9. A software that allows a personal computer to pretend is as a terminal is
a. auto-dialing
b. bulletin-board
c. modem
d. terminal emulation

ANs: a

10. Which of the following refers to the terms "residual error rate" ?
a. the number of bit error per twenty four hours of continuous operation on an asynchronus line
b. the probability that one or more errors will be undetected when an error detection scheme is used
c. the probability that one or more errors will be detected when an error detection mechanism is used
d. signal to noise ratio divided by the ratio of energy per bit to noise per hertz

Ans: b

Computer Networks Question Papers

State Whether True or False:

1. The 5-7 digits are known as the country code of the Network User Address(NUA). (T/F)

2. The physical layer, in reference to the OSI model, defines the interface between the X.25 network and the Packet mode device. (T/F)

3. The second layer of communication is the data link layer. (T/F)

4. The data link layer, in reference to the OSI model, the Recommendation X.25 specifies data link procedures that provide for the exchange of data via frames that can be sent and recieved. (T/F)

5. The third layer of communication is the network layer. (T/F)


(1) T
(2) T
(3) T
(4) F
(5) T

Networking Question for Examinations

State Whether True or False

1. The First three digit of the DNIC(Data Network Identification Code) identify the city. (T/F)

2. The use of an X.25 Switch as a gateway between the public and private networks provides a cost-effective means of sharing relatively expensive X.25 access lines to the public data networks. (T/F)

3. The Network User Address (NUA) consist of 12 decimal digits and two optional extra digits which are available for packet terminals only to use for sub-addressing. (T/F)

4. The first digit of Network User Address(NUA) are known as the DNIC(Data Network Identification Code). (T/F)

5. The term 'gateway' is commonly used to define a facility which interconnects two networks so that users on one network can communicate with user on another network. (T/F)

6. The term 'gateway' which provides interconnection between private packet switching networks based on OSI principles and the public packet data networks based on the X-series recommendations. (T/F)

7. The 1-4 digits are known as the country code of the Network User Address(NUA). (T/F)

8. The digits 8 to 12 are known as the terminal number of the NUA. (T/F)

9. The CCITT Recommendation X.25 specifies three layers of communications: session, transport and network. (T/F)

10. CCITT Recommendation X.21 defines the international nubering plan for private data networks. (T/F)

(1). T, (2). T, (3). T, (4). F, (5). T, (6). T, (7). F, (8). T, (9). T, (10). T

Thursday, September 2, 2010

PSU Papers for Computer Science

1. Dijkstra's banking algorithm in an operating system solves the problem of -
Ans: Deadlock Avoidance

2. In a paged memory system, if the page size is increased, then the internal fragmentation generally -
Ans: Becomes more

3. An operating system contains 3 user processes each requiring 2 units of resources R. The minimum number of units of R such that no deadlock will ever occur is -
Ans: 4

4. Critical region is -
Ans: A set of instructions that access common shared resources which exclude one another in time

5. Kernel is -
Ans: The set of primitive functions upon which the rest of operating system functions are built up

6. Necessary conditions for deadlock are -
Ans: Non-preemption and circular wait, Mutual exclusion and partial allocation

7. In a time sharing operating system, when the time slot given to a process is completed, the process goes from the RUNNING state to the -
Ans: READY state

8. Supervisor call -
Ans: Are privileged calls that are used to perform resource management functions, which are controlled by the operating system

9. Semaphores are used to solve the problem of -
Ans: Mutual exclusion, Process synchronization

10. If the property of locality of reference is well pronounced in a program-
Ans: The number of page faults will be less

Operating System - Question Answer

1. In Round Robin CPU Scheduling, as the time quantum is increased, the average turn around time-
Ans: varies irregulary

2. In a multiprogramming environment-
Ans: more than one process resides in the memory

3. The size of the virtual memory depends on the size of the -
Ans: Address Bus

4. Give example of Scheduling Policies in which context switching never take place-
Ans: Shortest Job First, First-cum-first-served

5. Suppose that a process is in 'BLOCKED' state waiting for some I/O service. When the service is completed, it goes to the-
Ans: READY State

Operating System Question Answer for Competitive Exams

1. Pre-emptive scheduling, is the strategy of temporarily suspending a running process-
Ans: before the CPU time slice expires

2. Mutual exclusion problem occurs -
Ans: among processes that share resources

3. Sector interleaving in disks is done by -
Ans: the operating system

4. Disk scheduling involves deciding-
Ans: the order in which disk access requests must be serviced

5. Dirty bit is used to show the -
Ans: page that is modified after being loaded into cache memory

6. Fence register is used for-
Ans: memory protection.

7. The first-fit, best-fit and worst-fit algorithm can be used for-
Ans: contiguous allocation of memory

8. Give example of single-user operating systems-

Wednesday, September 1, 2010

Operating System Question Answer

1. Concurrent processes are processes that -
Ans: Overlap in time

2. The page replacement policy that sometimes leads to more page faults when the size of the memory is increased is -

3. The only state transition that is initiated by the user process itself is -
Ans: Block

4. Fragmentation is -
Ans: fragments of memory words unused in a page

5. Give Example of real time systems
Ans: Aircraft control system, A process control system