Wednesday, 25 November 2015

Wipro - Technical Questions - Model-1




 1. The format specifier "-%d" is used for which purpose in C
 (a) Left justifying a string       (b) Right justifying a string      (c) Removing a string from the console
(d) Used for the scope specification of a char[] variable          Answer : a
 2. A sorting algorithm which can prove to be a best time algorithm in one case and a worst time algorithm in worst case is  (a) Quick Sort          (b) Heap Sort   (c) Merge Sort              (d) Insert Sort                Answer : a
 3. If the time quantum is too large, Round Robin scheduling degenerates to
 (a) Shortest Job First Scheduling         (b) Multilevel Queue Scheduling         (c) FCFS         
(d) None of the above              Answer : c
 4. Transponders are used for which of the following purposes
 (a) Uplinking  (b) Downlinking          (c) Both (a) and (b)      (d) None of the above  Answer : c
 5. What details should never be found in the top level of a top-down design?
 (a) Details       (b) Coding       (c) Decisions    (d) None of the above  Answer : c
6. Thrashing can be avoided if
 (a) The pages, belonging to the working set of the programs, are in main memory
(b) The speed of CPU is increased       (c) The speed of I/O processor are increased
(d) All of the above      Answer : a
 7. Which of the following communications lines is best suited to interactive processing applications?
 (a) Narrowband channels        (b) Simplex channels   (c) Full-duplex channels
(d) Mixed band channels          Answer : b
 8. A feasibility document should contain all of the following except
 (a) Project name          (b) Problem descriptions          (c) Feasible alternative
(d) Data flow diagrams             Answer : d
 9. In an absolute loading scheme, which loader function is accomplished by assembler
 (a) Reallocation          (b) Allocation              (c) Linking       (d) Both (a) and (b)       Answer : d
 10. Banker's algorithm for resource allocation deals with
 (a) Deadlock prevention         (b) Deadlock avoidance           (c) Deadlock recovery            
(d) None of these          Answer : b
11. A shift register can be used for
 (a) Parallel to serial conversion           (b) Serial to parallel conversion
(c) Digital delay line    (d) All the above           Answer : d
 12. In which of the following page replacement policies, Balady's anomaly occurs?
 (a) FIFO          (b) LRU           (c) LFU            (d) NRU            Answer : a
 13. Subschema can be used to
 (a) Create very different, personalised views of the same data
(b) Present information in different formats
(c) Hide sensitive information by omitting fields from the sub-schema's description
(d) All of the above                  Answer : d
 14. A 12 address lines maps to the memory of
 (a) 1k bytes     (b) 0.5k bytes  (c) 2k bytes      (d) none            Answer : b
 15. What is the main function of a data link content monitor?
 (a) To detect problems in protocols    (b) To determine the type of transmission used in a data link
(c) To determine the type of switching used in a data link      
(d) To determine the flow of data         Answer : a
 16. Which of the following memories has the shortest access time?
 (a) Cache memory      (b) Magnetic bubble memory   (c) Magnetic core memory   (d) RAM 
 Answer : a
17. In a processor these are 120 instructions . Bits needed to implement this instructions
 (a) 6    (b) 7     (c) 10   (d) none            Answer : b
 18. Predict the output or error(s) for the following:
 main()
{
char string[]=”Hello World”;
display (string);
}
void display (char *string)
{
printf(“%s”,string);
}
 Answer : Compiler Error: Type mismatch in redeclaration of function display
 19. What are the values printed by the following program?
#define dprint(expr) printf(#expr “=%d\n”,expr)
main()
{
int x=7;
int y=3;
dprintf(x/y);
}
 (a) #2 = 2        (b) expr=2        (c) x/y=2          (d) none            Answer : c
 20. Parameterization generally involves
 (a) Data table              (b) Random number    (c) Environment           (d) Both A & B           
(e) Both A, B & C         Answer : e
 21. The file which is used for recovering from the run time errors known as
 (a) QRS           (b) TSR            (c) PNG           (d) DAT            Answer : A
 22. Among the following recording modes, which method uses both the objects and mouse coordinates
 (a) Normal      (b) Low level   (c) Analog        (d) All of the above      Answer : b
 23.  Where do you set the action iterations for a specified action?
 (a) Action Settings      (b) Action Properties    (c) Action Run Properties        (d) Action Call Properties
 Answer : d
 24. Where do you mark an action as reusable?
 (a) Action Settings      (b) Action Properties    (c) Action Run Properties        (d) Action Call Properties
 Answer : b
 25. After running a test that contains both input and output parameters, where can the results of an output parameter be found?
 (a) Local Data Sheet   (b) Global Data Sheet  (c) Run-time Data Table          (d) Design-time Data Table
 Answer : c
 26. If you have a Virtual Object Collection stored on your machine, and you don’t want to use it what
you must do?
 (a) Disable Virtual Objects in Test Settings                 (b) Remove the Collection from your machine
(c) Disable Virtual Objects in General Options            (d) Remove the Collections from the Resources list
 Answer : c
 27. For a 25MHz processor, what is the time taken by the instruction which needs 3 clock cycles,
 (a) 120 nano secs        (b) 120 micro secs       (c) 75 nano secs           (d) 75 micro secs
 Answer : a
 28. For 1 MB memory, the number of address lines required,
 (a) 11              (b) 16               (c) 20               (d) 24                Answer : c
 29. Semaphore is used for
 (a) synchronization     (b) dead-lock avoidance          (c) box             (d) none            Answer : a
 30. OLE is used in
 (a) Inter connection in UNIX                          (b) Interconnection in WINDOWS
(c) Interconnection in WINDOWS NT (d)None            Answer : c
 31. Preprocessor does not do which one of the following
 (a) macro        (b) conditional compliclation               (c) in type checking     (d) including load file
 Answer : c
 32. Piggy backing is a technique for
 (a) Flow control          (b) Sequence    (c) Acknowledgement              (d) Retransmission        Answer : c
 33. In signed magnitude notation what is the minimum value that can be represented with 8 bits
 (a) -128           (b) -255           (c) -127            (d)   0                Answer : a
 34. When an array is passed as parameter to a function, which of the following statement is correct
 (a) The function can change values in the original array
(b) In C parameters are passed by value. The function cannot change the original value in the array
(c) It results in compilation error when the function tries to access the elements in the array
(d) Results in a run time error when the function tries to access the elements in the array
 Answer : a
 35. The type of the controlling statement of a switch statement cannot be of the type
 (a) int              (b) char            (c) short           (d) float           (e) none            Answer : d
 36. What is the value of the statement (3^6) + (a^a)?
 (a) 3                (b) 5                 (c) 6                 (d) 18               (e) None                       Answer : b
 37. Consider the following program:
 # include
class x {
public:
int a;
x();www.edugeeks.in
www.edugeeks.in
};
x::x() { a=10; cout<
class b:public x {
public:
b();
};
b::b() { a=20; cout<
main ()
{ b temp;
}
 What will be the output of this program?
 (a) 10  (b) 20   (c) 2010           (d) 1020            Answer : b

No comments:

Post a Comment