Search This Blog

Sunday 25 November 2012

CDAC Placement Paper 2



CDAC Placement Paper :-

1. What is the output of the following code? #include<stdio.h>
main()
{
register int a=2;
printf("\nAddress of a = %d,", &a); printf("\tValue of a = %d",a);
Address of a,2 <------ans
Linker error
Compile time error
None of these options

2. What is the output of the following code? #include<stdio.h>
void main()
{
int arr[]={0,1,2,3,4,5,6};
int i,*ptr;
for(ptr=arr+4,i =0; i<=4; i++) printf("\n%d",ptr[-i]);(as the 0=4,for -1 it becomes =3)
}
Error
6 5 4 3 2
0 garbage garbage garbage garbage
4 3 2 1 0 <------ans

3. Which of the following is the correct way of declaring a float pointer:
float ptr;
float *ptr; <------ans
*float ptr;
None of the above

4.If the following program (newprog) is run from the command line as:newprog 1 2 3 What would be the output of the following?
void main (int argc, char*argv[])
{
int I,j=0;
for (I=0;I<argc;I++)
j=j + atoi(argv[I]);
printf("%d",j);
}
123
6
123
Compilation error<------ans

5. Which of these are reasons for using pointers?
1. To manipulate parts of an array
2. To refer to keywords such as for and if
3. To return more than one value from a function 4. To refer to particular programs more conveniently
1 & 3<------ans
only 1
only 3
None of these options

6. The code
int i = 7;
printf("%d\n", i++ * i++);
prints 49
prints 56 <------ans
is compiler dependent
expression i++ * i++ is undefined


7. Which of the following is not a network operating system

a) Windows for Workgroup over MSDOS
b) Novell Netware
c) Windows 95
d) None of the above

8. Fiber optic token ring networks operate at the speed of

a) 16 mbps     b) 100 mbps     c) 1000 mbps     d) 10 mbps

9. The Synchronous Optical Network is an ANSI standard. A similar standard established in Europe is

a) Synchronous Digital Hierarchy
b) SONET
c) Switched Multi megabit Data Service
d) Distributed Queue Duel Bus

10. In the TCP/IP protocol family ___________ provides reliable transport service.

a) Transport Protocol     b) Transport Layer     c) TCP     d)All of above

11. IP address is a ___________ address.

a) Network Layer Address     b) Layer 2 address     c) Hardware Address     d) None of above

12. An IP address when logically ANDed with netmask, the result is _________________.

a) Host Address     b) Network Address     c) Broadcast Address     d) None of the above

13. Remote boot uses _______ protocol to discover IP address of diskless machine.

a) ICMP     b) SNMP     c) ARP     d) RARP

14. Once a datagram is fragmented in a IP network it is reassembled only at ____________.

a) Next hope     b) Next Router     c) Final Destination     d) Never

15. The source quench _________ message is used to control the rate at which datagrams are transmitted.

a) IP     b) ICMP     c) SNMP     d) TCP

16. TCP establishes an end to end _______________ between the sender and receiver.

a) Connection     b) Virtual Circuit     c) Path     d) None of above

Directions:- The given pair of words contains a specific relationship to each other. Select the best pair of choices which expresses the same relationship as the given

17.IGNOMINY : DISLOYALTY ::
fame : heroism
death : victory
derelict : fool
martyr : man

18. EXPLOSION : DEBRIS ::
flood : water
famine : food
fire : ashes
disease : germ

19. Bland : Piquant ::
inane : relevant
charlatan : genuine
slavish : servile
terse : serious

20. NEGLIGENT : REQUIREMENT::
remiss : duty
cogent :argument
easy : hard
careful : position

Directions:- Choose the best word, which is most opposite in the meaning to the given word

21. FETTER :
delay
stretch
comply
thrive

22. SEDULOUS :
rampant
esoteric
morose
indolent

23. SUCCULENT :
ordinary
tasteless
inexpensive
invigorating

24. DORMANT :
authoritative
elastic
active
uninteresting

25. COURT :
reject
uncover
infect
subject


26. Each SNMP managed object belongs to a ______________

a) Community     b) Network     c) Organization     D) SNMP Group

27. RTCP is the ________________ protocol designed to work with RTP

a) Application     b) Control     c) Network     d) Transport

28. For block devices all I/O occurs through the _________________

a) Blocks     b) Device     c) Buffer cache     d) None of above

29.  _______ is a international standard file format for describing interactive 3D multimedia on the Internet.

a) DHTML     b) XML     c) VRML     d) None of above

30. ___________ is a distance-vector routing protocol

a) RIP     b) IGRP     c) OSPF     d) All of above

31. IPng provides security through Authentication Headers and the default encryption method is ________

a) SSL     b) Public Key     c) MD5     d) None of above

32. RTSP is a ___________ protocol similar to HTTP

a) Network Layer     b) Internet     c) Application Layer     d) None of above

33. OSPF features include __________________.

a) Multi-Path routing
b) Equal-cost
c) Routing based on upper-layer TOS request
d) All of above

34. IP address is assigned to a __________.

a) Network     b) Host     c) Interface     d) All of above

35. Token Ring network operate at a speed of

a) 10 mbps     b) 100 mbps     c) 20 mbps     d) 16 mbps

36. Ethernet is an access method that strictly adheres to the

a) CSMA/CD     b) Token Passing     c) SPX/IPS     d) TCP/IP

37. 100BASET4 operates at 100 mbps using base band signaling and the media is

a) Two stands of fiber
b) Two pairs of data grade UTP
c) Four pairs of telephone grade UTP
d) None of the above

38 .Length of Ethernet address is

a) 24 bit     b) 12 bit     c) 48 bit     d) 32 bit

39. Frame Relay protocol is used for

a) WAN     b) LAN     c) Token Ring networks     d) None of the above

40. The expression x = 4 + 2 % -8 evaluates to -6
6
4
None of these options

41. UDP is used with ___________________ Protocol.

a) Trivial File Transfer     b) ICMP     c) LDAP     d) All of above

42. IP is a ___________ protocol

a) Routing Protocol     b) Routed Protocol     c) Both of above     d) None of above

43. ______ is a complex data structure that contains details about a connection

a) Socket     b) Port     c) TCB     d) None of above

44. The bind socket call is used to __________________________

a) Bind a local application to a remote application
b) Bind a socket to local port
c) Bind a socket to a remote port
d) Bind a local port to a remote port

45. Which of the following describes the OSI Class 3 transport (TP3)

a) Do nothing
b) Signaled Error Recovery
c) Multiplexing
d) Signalled error recovery and multiplexing

46. The issue of chekpointing and synchronization is handled by which layer

a) Session Layer     b) Transport Layer     c) Pressentation layer     d) Application Layer

47. In the OSI model, the responsibility for negotiating the encodings to be used in any perticular connection is entrusted upon

a) Application Layer     b) Session Layer     c) Presentation Layer     d) None of the above

48. TCP/IP is built on _________ technology

a) Connection oriented     b) Connection less     c) Datagram     d) Ethernet

49. IP addresses are ____ bit long

a) 4     b) 64     c) 48     d) 32

No comments:

Post a Comment