Pages

Ads 468x60px

Monday, November 17, 2008

3i Infotech

company for placement 3i Infotech


3i Infotech is a global Information Technology company which provides technology solutions to over 500 customers in more than 45 countries across 4 continents, spanning a range of verticals - Banking, Insurance, Manufacturing, Contracting, Retail & Distribution and Government.

3i Infotech offers a comprehensive range of software and IT solutions, including packaged applications, for the Banking, Financial Services & Insurance (BFSI), Manufacturing, Contracting, and Retail & Distribution industries. In addition, it offers a broad range of software services such as Custom Software Development, IT Consulting, IS and IT Security Consulting, Enterprise Application Integration (EAI), and specialized services such as Product Re-engineering, Compliance Consultancy, Application Rehabilitation and e-Governance, among others.

The Company's quality certifications include SEI CMM Level 5 for its Software business and ISO 9001:2000 for its Infrastructure Services and Business Process Outsourcing (BPO) operations.The Company's Global Delivery Model provides for the best resources to be drawn from its vast talent pool across the globe to offer optimal solutions.

List of customers worldwide includes Standard Chartered Bank, Finansa, AIG, Emirates Bank, RAK Bank, International Factors, SBI Factors, Oriental Insurance Company Limited, The National Health Insurance Fund, Solidarity Islamic Insurance & Assurance Co., Commercial America Insurance Company, National Takaful Insurance, Hirsch International Corporation, Pidilite Industries among others.

The Company was promoted by the NYSE-listed ICICI Bank, India's largest private sector bank.

3i Infotech integrates its products and services to create customized solutions to allow you to undertake technology-based business transformation that allows reorganization in line with today's dynamic digital business environment.

For more details visit www.icici-infotech.com

C/C++ Questions for placement / aptitude / interview/assessment/multiple choice/campus/career

Frequently Asked Questions - C/C++ Questions for placement / aptitude / interview/assessment/multiple choice/career/campus

1. What does static variable mean?
2. What is a pointer?
3. What is a structure?
4. What are the differences between structures and arrays?
5. In header files whether functions are declared or defined?
6. What are the differences between malloc() and calloc()?
7. What are macros? what are its advantages and disadvantages?
8. Difference between pass by reference and pass by value?
9. What is static identifier?
10. Where are the auto variables stored?
11. Where does global, static, local, register variables, free memory and C Program instructions get stored?
12. Difference between arrays and linked list?
13. What are enumerations?
14. Describe about storage allocation and scope of global, extern, static, local and register variables?
15. What are register variables? What are the advantage of using register variables?
16. What is the use of typedef?
17. Can we specify variable field width in a scanf() format string? If possible how?
18. Out of fgets() and gets() which function is safe to use and why?
19. Difference between strdup and strcpy?
20. What is recursion?
21. Differentiate between a for loop and a while loop? What are it uses?
22. What are the different storage classes in C?
23. Write down the equivalent pointer expression for referring the same element a[i][j][k][l]?
24. What is difference between Structure and Unions?
25. What the advantages of using Unions?
26. What are the advantages of using pointers in a program?
27. What is the difference between Strings and Arrays?
28. In a header file whether functions are declared or defined?
29. What is a far pointer? where we use it?
30. How will you declare an array of three function pointers where each function receives two ints and returns a float?
31. what is a NULL Pointer? Whether it is same as an uninitialized pointer?
32. What is a NULL Macro? What is the difference between a NULL Pointer and a NULL Macro?
33. What does the error 'Null Pointer Assignment' mean and what causes this error?
34. What is near, far and huge pointers? How many bytes are occupied by them?
35. How would you obtain segment and offset addresses from a far address of a memory location?
36. Are the expressions arr and &arr same for an array of integers?
37. Does mentioning the array name gives the base address in all the contexts?
38. Explain one method to process an entire string as one unit?
39. What is the similarity between a Structure, Union and enumeration?
40. Can a Structure contain a Pointer to itself?
41. How can we check whether the contents of two structure variables are same or not?
42. How are Structure passing and returning implemented by the complier?
43. How can we read/write Structures from/to data files?
44. What is the difference between an enumeration and a set of pre-processor # defines?
45. what do the 'c' and 'v' in argc and argv stand for?
46. Are the variables argc and argv are local to main?
47. What is the maximum combined length of command line arguments including the space between adjacent arguments?
48. If we want that any wildcard characters in the command line arguments should be appropriately expanded, are we required to make any special provision? If yes, which?
49. Does there exist any way to make the command line arguments available to other functions without passing them as arguments to the function?
50. What are bit fields? What is the use of bit fields in a Structure declaration?
51. To which numbering system can the binary number 1101100100111100 be easily converted to?
52. Which bit wise operator is suitable for checking whether a particular bit is on or off?
53. Which bit wise operator is suitable for turning off a particular bit in a number?
54. Which bit wise operator is suitable for putting on a particular bit in a number?
55. Which bit wise operator is suitable for checking whether a particular bit is on or off?
56. which one is equivalent to multiplying by 2:Left shifting a number by 1 or Left shifting an unsigned int or char by 1?
57. Write a program to compare two strings without using the strcmp() function.
58. Write a program to concatenate two strings.
59. Write a program to interchange 2 variables without using the third one.
60. Write programs for String Reversal & Palindrome check
61. Write a program to find the Factorial of a number
62. Write a program to generate the Fibinocci Series
63. Write a program which employs Recursion
64. Write a program which uses Command Line Arguments
65. Write a program which uses functions like strcmp(), strcpy()? etc
66. What are the advantages of using typedef in a program?
67. How would you dynamically allocate a one-dimensional and two-dimensional array of integers?
68. How can you increase the size of a dynamically allocated array?
69. How can you increase the size of a statically allocated array?
70. When reallocating memory if any other pointers point into the same piece of memory do you have to readjust these other pointers or do they get readjusted automatically?
71. Which function should be used to free the memory allocated by calloc()?
72. How much maximum can you allocate in a single call to malloc()?
73. Can you dynamically allocate arrays in expanded memory?
74. What is object file? How can you access object file?
75. Which header file should you include if you are to develop a function which can accept variable number of arguments?
76. Can you write a function similar to printf()?
77. How can a called function determine the number of arguments that have been passed to it?
78. Can there be at least some solution to determine the number of arguments passed to a variable argument list function?
79. How do you declare the following:
* An array of three pointers to chars
* An array of three char pointers
* A pointer to array of three chars
* A pointer to function which receives an int pointer and returns a float pointer
* A pointer to a function which receives nothing and returns nothing
80. What do the functions atoi(), itoa() and gcvt() do?
81. Does there exist any other function which can be used to convert an integer or a float to a string?
82. How would you use qsort() function to sort an array of structures?
83. How would you use qsort() function to sort the name stored in an array of pointers to string?
84. How would you use bsearch() function to search a name stored in array of pointers to string?
85. How would you use the functions sin(), pow(), sqrt()?
86. How would you use the functions memcpy(), memset(), memmove()?
87. How would you use the functions fseek(), freed(), fwrite() and ftell()?
88. How would you obtain the current time and difference between two times?
89. How would you use the functions randomize() and random()?
90. How would you implement a substr() function that extracts a sub string from a given string?
91. What is the difference between the functions rand(), random(), srand() and randomize()?
92. What is the difference between the functions memmove() and memcpy()?
93. How do you print a string on the printer?
94. Can you use the function fprintf() to display the output on the screen?

C++ Questions

1. What is a class?
2. What is an object?
3. What is the difference between an object and a class?
4. What is the difference between class and structure?
5. What is public, protected, private?
6. What are virtual functions?
7. What is friend function?
8. What is a scope resolution operator?
9. What do you mean by inheritance?
10. What is abstraction?
11. What is polymorphism? Explain with an example.
12. What is encapsulation?
13. What do you mean by binding of data and functions?
14. What is function overloading and operator overloading?
15. What is virtual class and friend class?
16. What do you mean by inline function?
17. What do you mean by public, private, protected and friendly?
18. When is an object created and what is its lifetime?
19. What do you mean by multiple inheritance and multilevel inheritance? Differentiate between them.
20. Difference between realloc() and free?
21. What is a template?
22. What are the main differences between procedure oriented languages and object oriented languages?
23. What is R T T I ?
24. What are generic functions and generic classes?
25. What is namespace?
26. What is the difference between pass by reference and pass by value?
27. Why do we use virtual functions?
28. What do you mean by pure virtual functions?
29. What are virtual classes?
30. Does c++ support multilevel and multiple inheritance?
31. What are the advantages of inheritance?
32. When is a memory allocated to a class?
33. What is the difference between declaration and definition?
34. What is virtual constructors/destructors?
35. In c++ there is only virtual destructors, no constructors. Why?
36. What is late bound function call and early bound function call? Differentiate.
37. How is exception handling carried out in c++?
38. When will a constructor executed?
39. What is Dynamic Polymorphism?
40. Write a macro for swapping integers.

Some More Questions ::

1. What is the output of printf("%d")
2. What will happen if I say delete this
3. Difference between "C structure" and "C++ structure".
4. Difference between a "assignment operator" and a "copy constructor"
5. What is the difference between "overloading" and "overriding"?
6. Explain the need for "Virtual Destructor".
7. Can we have "Virtual Constructors"?
8. What are the different types of polymorphism?
9. What are Virtual Functions? How to implement virtual functions in "C"
10. What are the different types of Storage classes?
11. What is Namespace?
12. What are the types of STL containers?.
13. Difference between "vector" and "array"?
14. How to write a program such that it will delete itself after execution?
15. Can we generate a C++ source code from the binary file?
16. What are inline functions?
17. Talk something about profiling?
18. How many lines of code you have written for a single program?
19. What is "strstream" ?
20. How to write Multithreaded applications using C++?
21. Explain "passing by value", "passing by pointer" and "passing by reference"
22. Write any small program that will compile in "C" but not in "C++"
23. Have you heard of "mutable" keyword?
24. What is a "RTTI"?
25. Is there something that I can do in C and not in C++?
26. Why preincrement operator is faster than postincrement?
27. What is the difference between "calloc" and "malloc"?
28. What will happen if I allocate memory using "new" and free it using "free" or allocate sing "calloc" and free it using "delete"?
29. What is Memory Alignment?
30. Explain working of printf.
31. Difference between "printf" and "sprintf".
32. What is "map" in STL?
33. When shall I use Multiple Inheritance?
34. What are the techniques you use for debugging?
35. How to reduce a final size of executable?
36. Give 2 examples of a code optimization.

c++ quesfor placement / aptitude / interview/assessment/multiple choice/career/campus

c++ questions for placement / aptitude / interview/assessment/multiple choice/career/campus




* What is a container class? view answer
* What is an orthogonal base class? view answer
* What is a node class? view answer
* Name some pure object oriented languages. view answer
* What are proxy objects? view answer
* What are the conditions that have to be met for a condition to be an invariant of the class? view answer
* Define precondition and post-condition to a member function. view answer
* What do you mean by Stack unwinding? view answer
* What is class invariant? view answer
* What is a Null object? view answer
* What is an adaptor class or Wrapper class? view answer
* Differentiate between the message and method. view answer
* What is a dangling pointer? view answer
* *i=0; view answer
* int *i=0x400 // answer = ? view answer
* What is an incomplete type? view answer
* List out some of the object-oriented methodologies. view answer
* List out some of the OODBMS available. view answer
* What is an Iterator class? view answer
* What is the use of ?using? declaration. view answer
* Define namespace. view answer
* When does a name clash occur? view answer
* Differentiate between a template class and class template. view answer
* What is an accessor? view answer
* What is a modifier? view answer
* How do you find out if a linked-list has an end? (i.e. the list is not a cycle) view answer
* How do you write a function that can reverse a linked-list? view answer
* Can a copy constructor accept an object of the same class as parameter, instead of reference of the object? view answer
* What is a local class? Why can it be useful? view answer
* hat is a nested class? Why can it be useful? view answer
* What are the access privileges in C++? What is the default access level? view answer
* What is multiple inheritance(virtual inheritance)? What are its advantages and disadvantages? view answer
* How do you access the static member of a class? view answer
* What does extern "C" int func(int *, Foo) accomplish? view answer
* What are the differences between a C++ struct and C++ class? view answer
* Can you overload a function based only on whether a parameter is a value or a reference? view answer
* Can you think of a situation where your program would crash without reaching the breakpoint which you set at the beginning of main()? view answer
* What is Virtual Destructor? view answer
* How can I handle a destructor that fails? view answer
* How can I handle a constructor that fails? view answer
* What is the difference between const char *myPointer and char *const myPointer? view answer
* How are prefix and postfix versions of operator++() differentiated? view answer
* What is the difference between a pointer and a reference? view answer
* What is name mangling in C++?? view answer
* What happens when you make call "delete this;" ?? view answer
* What is "this" pointer? view answer
* What is Overriding? view answer
* What is overloading?? view answer
* What is inline function?? view answer
* What is a container class? What are the types of container classes? view answer
* Name the operators that cannot be overloaded?? view answer
* What do you mean by Stack unwinding? view answer
* What is a dangling pointer? view answer
* What is an Iterator class? view answer
* What is the use of 'using' declaration? view answer
* What problem does the namespace feature solve? view answer
* What is Memory alignment?? view answer
* What is pure virtual function? or what is abstract class? view answer
* What is virtual function? view answer
* When are temporary variables created by C++ compiler? view answer
* When do use "const" reference arguments in function? view answer
* What is reference ?? view answer
* What are storage qualifiers in C++ ? view answer
* What is the diff between "new" and "operator new" ? view answer
* What is diff between malloc()/free() and new/delete? view answer
* What is conversion operator?? view answer
* What is conversion constructor? view answer
* What is assignment operator? view answer
* What is copy constructor? and copy constructors called? view answer
* What is default constructor? view answer
* What is destructor? view answer
* What is constructor or ctor? view answer
* What is Polymorphism?? view answer
* What is inheritance? view answer
* What is encapsulation?? view answer

links

links

www.geekinterview.com/Interview-Questions/Languages/C-Plus-Plus

www.coolinterview.com/type.asp?iType=41

www.techinterviews.com/?p=69

http://c-faq.com/decl/

http://www.mywebedu.com/

http://www.techfaq360.com

http://www.freshersworld.com/placementweek/papers.asp

http://www.allinterview.com/placement-papers/All.html


http://techpreparation.com/cpp-interview-question-answer1.htm

C++ questions for placement / aptitude / interview/assessment/multiple choice/career/campus

Some good C++ questions to ask a job applicant.

1. How do you decide which integer type to use?
2. What should the 64-bit integer type on new, 64-bit machines be?
3. What’s the best way to declare and define global variables?
4. What does extern mean in a function declaration?
5. What’s the auto keyword good for?
6. I can’t seem to define a linked list node which contains a pointer to itself.
7. How do I declare an array of N pointers to functions returning pointers to functions returning pointers to characters?
8. How can I declare a function that returns a pointer to a function of its own type?
9. My compiler is complaining about an invalid redeclaration of a function, but I only define it once and call it once. What’s happening?
10. What can I safely assume about the initial values of variables which are not explicitly initialized?
11. Why can’t I initialize a local array with a string?
12. What is the difference between char a[] = “string”; and char *p = “string”; ?
13. How do I initialize a pointer to a function?

c questions for placement / aptitude / interview/assessment/multiple choice/career/campus

1. What is the final value of y when the code int y; for(y=0; y<10; y++) {} is run?
A. 10
B. 9
C. 0
D. 1

2. When does the code block following while(y<100) execute?
A. When y is less than one hundred
B. When y is greater than one hundred
C. When y is equal to one hundred
D. While it wishes


3. Which is not a loop structure?
A. for
B. do while
C. while
D. repeat until

4. How many times is a do while loop guaranteed to loop?
A. 0
B. Infinitely
C. 1
D. Variable

Interview/campus/HR/placememnt questions - Why should I hire you?

Interview/campus/HR/placememnt questions - Why should I hire you?


Question : Why should I hire you?

Most of the companies ask this question so now this question is open for all of you.
Add your comments/Answer about this question.

Use comments link available in the last of this post.

Suggested Answer: The easy answer is that you are the best person for the job.
And don’t be afraid to say so.
But then back it up with what specifically differentiates you.

For example: “You should hire me because I’m the best person for the job. I realize that there are likely other candidates who also have the ability to do this job. Yet I bring an additional quality that makes me the best person for the job--my passion for excellence. I am passionately committed to producing truly world class results."

All The Best

How would you describe yourself?

How would you describe yourself?



"Describe yourself" this is most likely question which asked in personal interview. So what do we say?
Frankly, just answer the question as it comes but don't answer like this
"Sir basicly , my name is xyz. My father's name is...."
Why don't we realise that our CV is there right in front of the interviewer, and he knows this already.

Actually, a question of this kind is an ideal way to plug in everything we want to say about ourselves that we had leave out of the CV. If you have attended a premier institution, say that the institution taught you much more than the degree it awared ypu, mention people who influenced ypu, talk about the books you like reading, your hobbies and your other interests.

Talk about your strengths; perhaps mention an instance when you used your conflict resolution skills or selling skills or whatever. But make certain that it does not sound like blowing your trumpet. Mention these instances as learning.

Tall about your weaknesses, but make sure that they are 'positive' weaknesses. For instance you could say that that you sometimes pay more attention to detail than is warranted. You can openly confess a tendency to be impatient with team members who cannot carry their own weight, or who cannot contribute sufficiently.

But first, think today what you want to say and practice.

Interview/campus/HR/placememnt questions - What is your greatest weakness

Interview/campus/HR/placememnt questions - What is your greatest weakness





What is your greatest weakness?

Answer : Most career books tell you to select a strength and present it as a weakness. Such as: “I work too much. I just work and work and work.” Wrong. First of all, using a strength and presenting it as a weakness is deceiving. Second, it misses the point of the question.

You should select a weakness that you have been actively working to overcome. For example: “I have had trouble in the past with planning and prioritization. However, I’m now taking steps to correct this. I just started using a pocket planner . . .” then show them your planner and how you are using it.

Talk about a true weakness and show what you are doing to overcome it.

SQL - Question for placement / aptitude / interview/assessment/multiple choice/career/campus

SQL - Question
1. Which is the subset of SQL commands used to manipulate Oracle Database structures, including tables?
Data Definition Language (DDL)

2. What operator performs pattern matching?
LIKE operator

3. What operator tests column for the absence of data?
IS NULL operator

4. Which command executes the contents of a specified file?
START or @

5. What is the parameter substitution symbol used with INSERT INTO command?
&

6. Which command displays the SQL command in the SQL buffer, and then executes it?
RUN

7. What are the wildcards used for pattern matching?
_ for single character substitution and % for multi-character substitution

8. State true or false. EXISTS, SOME, ANY are operators in SQL.
True

9. State true or false. !=, <>, ^= all denote the same operation.
True

10. What are the privileges that can be granted on a table by a user to others?
Insert, update, delete, select, references, index, execute, alter, all

11. What command is used to get back the privileges offered by the GRANT command?
REVOKE

12. Which system tables contain information on privileges granted and privileges obtained?
USER_TAB_PRIVS_MADE, USER_TAB_PRIVS_RECD

13. Which system table contains information on constraints on all the tables created?
USER_CONSTRAINTS

14. TRUNCATE TABLE EMP;
DELETE FROM EMP;
Will the outputs of the above two commands differ?
Both will result in deleting all the rows in the table EMP.

15. What is the difference between TRUNCATE and DELETE commands?
TRUNCATE is a DDL command whereas DELETE is a DML command. Hence DELETE operation can be rolled back, but TRUNCATE operation cannot be rolled back. WHERE clause can be used with DELETE and not with TRUNCATE.

Operating system (OS) questions placement / aptitude / interview/assessment/multiple choice/career/campus

Operating system (OS) questions placement / aptitude / interview/assessment/multiple choice/career/campus



OS question
1. Explain the concept of Reentrancy.
Answer: It is a useful, memory-saving technique for multiprogrammed timesharing systems. A Reentrant Procedure is one in which multiple users can share a single copy of a program during the same period. Reentrancy has 2 key aspects: The program code cannot modify itself, and the local data for each user process must be stored separately. Thus, the permanent part is the code, and the temporary part is the pointer back to the calling program and local variables used by that program. Each execution instance is called activation. It executes the code in the permanent part, but has its own copy of local variables/parameters. The temporary part associated with each activation is the activation record. Generally, the activation record is kept on the stack.
Note: A reentrant procedure can be interrupted and called by an interrupting program, and still execute correctly on returning to the procedure.


2. Explain Belady's Anomaly.
Answer: Belady's Anomaly also called FIFO anomaly. Usually, on increasing the number of frames allocated to a process' virtual memory, the process execution is faster, because fewer page faults occur. Sometimes, the reverse happens, i.e., the execution time increases even when more frames are allocated to the process. This is Belady's Anomaly. This is true for certain page reference patterns.

3. What is a binary semaphore? What is its use?
Answer: A binary semaphore is one, which takes only 0 and 1 as values. They are used to implement mutual exclusion and synchronize concurrent processes.

4. What is thrashing?
Answer: It is a phenomenon in virtual memory schemes when the processor spends most of its time swapping pages, rather than executing instructions. This is due to an inordinate number of page faults.

5. List the Coffman's conditions that lead to a deadlock.
Answer:
1.Mutual Exclusion: Only one process may use a critical resource at a time.
2.Hold & Wait: A process may be allocated some resources while waiting for others.
3.No Pre-emption: No resource can be forcible removed from a process holding it.
4.Circular Wait: A closed chain of processes exist such that each process holds at least one
resource needed by another process in the chain.

c aptitude for placement / aptitude / interview/assessment/multiple choice/career/campus

c aptitude for placement / aptitude / interview/assessment/multiple choice/career/campus



1. main()
{
int x=20;
{
int x=10;
printf(“%dn”,x);
}
printf(“%dn”,x);
}

Ans: 10
20

2. main()
{
int x=5;
x = x++;
printf (“%dn”,x);
}

Ans: 5

3. main()
{
int x=10;
printf(“%d %d”, ++x, ++x)
}

Ans: 12 11

4. What is the output of the following program if its command line argument were …
Sample 1 5 7

main(int argc, char *argv[])
{
int x;
x= argv[1] + argv[2] +argv[3]);
printf (“%d”, x);
}

Ans: Will show error because compiler treats 1 5 7 as characters array

5. # define VOLDEMORT he_who_must_not_be_names
main()
{
printf(“VOLDEMORT”);
}

Ans VOLDEMORT


Find out the output of following:

1. main()
{
char string[]="Hello World";
display(string);
}
void display(char *string)
{
printf("%s",string);
}

Answer : Compiler Error : Type mismatch in redeclaration of function display
Explanation :
In third line, when the function display is encountered, the compiler doesn't know anything about the function display. It assumes the arguments and return types to be integers, (which is the default type). When it sees the actual function display, the arguments and type contradicts with what it has assumed previously. Hence a compile time error occurs.

2. main()
{
int m=- -2;
printf("m=%d",m);
}

Answer: m=2;
Explanation:
Here unary minus (or negation) operator is used twice.
maths rules applies, minus * minus= plus.


3. #define int char
main()
{
int k=65;
printf("sizeof(k)=%d",sizeof(k));
}

Answer: sizeof(k)=1
Explanation:
Since the #define replaces the string int by the macro char


4. main()
{
int m=10;
m=!m>14;
printf("m=%d",m);
}

Answer: m=0


5. #include
main()
{
char s[]={'a','b','c','\n','c','\0'};
char *q,*str,*str1;
q=&s[3];
str=q;
str1=s;
printf("%d",++*q + ++*str1-32);
}

Answer: 77
Explanation:
q is pointing to character '\n'. str1 is pointing to character 'a' ++*q. "q is pointing to '\n' and that is incremented by one." the ASCII value of '\n' is 10, which is then incremented to 11. The value of ++*q is 11. ++*str1, str1 is pointing to 'a' that is incremented by 1 and it becomes 'b'. ASCII value of 'b' is 98.
Now performing (11 + 98 – 32), we get 77("M"); So we get the output 77 :: "M" (Ascii is 77).




Predict the output or error(s) for the following:

1. void main()
{
int const * p=5;
printf("%d",++(*p));
}

Answer:
Compiler error: Cannot modify a constant value.
Explanation:
p is a pointer to a "constant integer". But we tried to change the value of the "constant integer".

2. main()
{
char s[ ]="man";
int i;
for(i=0;s[ i ];i++)
printf("\n%c%c%c%c",s[ i ],*(s+i),*(i+s),i[s]);
}

Answer:
mmmm
aaaa
nnnn
Explanation:
s[i], *(i+s), *(s+i), i[s] are all different ways of expressing the same idea. Generally array name is the base address for that array. Here s is the base address. i is the index number/displacement from the base address. So, indirecting it with * is same as s[i]. i[s] may be surprising. But in the case of C it is same as s[i].

3. main()
{
float me = 1.1;
double you = 1.1;
if(me==you)
printf("I love U");
else
printf("I hate U");
}

Answer:
I hate U
Explanation:
For floating point numbers (float, double, long double) the values cannot be predicted exactly. Depending on the number of bytes, the precession with of the value represented varies. Float takes 4 bytes and long double takes 10 bytes. So float stores 0.9 with less precision than long double.
Rule of Thumb:
Never compare or at-least be cautious when using floating point numbers with relational operators (== , >, <, <=, >=,!= ) .

4. main()
{
static int var = 5;
printf("%d ",var--);
if(var)
main();
}

Answer: 5 4 3 2 1

Explanation:When static storage class is given, it is initialized once. The change in the value of a static variable is retained even between the function calls. Main is also treated like any other ordinary function, which can be called recursively.

5. main()
{
int c[ ]={2.8,3.4,4,6.7,5};
int j,*p=c,*q=c;
for(j=0;j<5;j++) j="0;j<5;j++)" i="20;" i="-1,j="-1,k="0,l="2,m;" m="i++&&amp;amp;j++&&k++l++;" 0 =" 0)." i="3;" foo =" 123;int" of =" 0" i =" 0," len =" strlen(s);" str =" (char" err_num =" 2;return" p1="“name”;" p2="(char*)malloc(20);" x="20,y="35;" x="y++" y=" ++y" x="5;">>2);
}

Answer: 5,20,1

4. What will be printed as the result of the operation below:
#define swap(a,b) a=a+b;b=a-b;a=a-b;
void main()
{
int x=5, y=10;
swap (x,y);
printf(“%d %d\n”,x,y);
swap2(x,y);
printf(“%d %d\n”,x,y);
}
int swap2(int a, int b)
{
int temp;
temp=a;
b=a;
a=temp;
return 0;
}

Answer: 10, 510, 5

5. What will be printed as the result of the operation below:
main()
{
char *ptr = ” Cisco Systems”;
*ptr++;
printf(“%s\n”,ptr);
ptr++;
printf(“%s\n”,ptr);
}

Answer:Cisco Systemsisco systems

6. What will be printed as the result of the operation below:
main()
{
char s1[]=“Cisco”;
char s2[]= “systems”;
printf(“%s”,s1);
}

Answer: Cisco

7. What will be printed as the result of the operation below:
main()
{
char *p1;
char *p2;
p1=(char *)malloc(25);
p2=(char *)malloc(25);
strcpy(p1,”Cisco”); s
trcpy(p2,“systems”);
strcat(p1,p2);
printf(“%s”,p1);
}

Answer: Ciscosystems

8. The following variable is available in file1.c, who can access it?:
static int average;
Answer: all the functions in the file1.c can access the variable.

9. WHat will be the result of the following code?
#define TRUE 0 // some code
while(TRUE)
{
// some code
}

Answer: This will not go into the loop as TRUE is defined as 0.

10. What will be printed as the result of the operation below:
int x;
int modifyvalue()
{
return(x+=10);
}
int changevalue(int x)
{
return(x+=1);
}

void main()
{
int x=10;
x++;
changevalue(x);
x++;
modifyvalue();
printf("First output:%d\n",x);
x++;
changevalue(x);
printf("Second output:%d\n",x);
modifyvalue();
printf("Third output:%d\n",x);
}

Answer: 12 , 13 , 13

11. What will be printed as the result of the operation below:
main()
{
int x=10, y=15;
x = x++;
y = ++y;
printf(“%d %d\n”,x,y);
}

Answer: 11, 16

12. What will be printed as the result of the operation below:
main()
{
int a=0;
if(a==0) printf(“Cisco Systems\n”);
printf(“Cisco Systems\n”);
}

Answer: Two lines with “Cisco Systems” will be printed.

Quantitative Aptitude for placement / aptitude / interview/assessment/multiple choice/career/campus

Quantitative Aptitude for placement / aptitude / interview/assessment/multiple choice/career/campus




Quantitative Aptitude

1. Five boys were climbing a hill. J was following H. R was just ahead of G. K was between G & H. They were climbing up in a column. Who was the second?
Answer 1: G.
Explanation: The order in which they are climbing is R – G – K – H – J

2-5 John is undecided which of the four novels to buy. He is considering a spy
thriller, a Murder mystery, a Gothic romance and a science fiction novel. The books are written by Rothko, Gorky, Burchfield and Hopper, not necessary in that order, and published by Heron, Piegon, Blueja and sparrow, not necessary in that order.
(1) The book by Rothko is published by Sparrow.
(2) The Spy thriller is published by Heron.
(3) The science fiction novel is by Burchfield and is not published by Blueja.
(4)The Gothic romance is by Hopper.

2. Pigeon publishes ____________.

3. The novel by Gorky ________________.

4. John ­purchases books by the authors whose names come first and third in alphabetical order. He does not buy the books ­­______.

5. On the basis of the first paragraph and statement (2), (3) and (4) only, it is possible to deduce that
1. Rothko wrote the murder mystery or the spy thriller
2. Sparrow published the murder mystery or the spy thriller
3. The book by Burchfield is published by Sparrow.


Answer:
Novel Name Author Publisher
Spy thriller Rathko Heron
Murder mystery Gorky Piegon
Gothic romance Burchfield Blueja
Science fiction Hopper Sparrow

Explanation:
Given
Novel Name Author Publisher
Spy thriller Rathko Heron
Murder mystery Gorky Piegon
Gothic romance Burchfield Blueja
Science fiction Hopper Sparrow

Since Blueja doesn’t publish the novel by Burchfield and Heron publishes the novel spy thriller, Piegon publishes the novel by Burchfield.
Since Hopper writes Gothic romance and Heron publishes the novel spy thriller, Blueja publishes the novel by Hopper.
Since Heron publishes the novel spy thriller and Heron publishes the novel by Gorky, Gorky writes Spy thriller and Rathko writes Murder mystery.

6. If a light flashes every 6 seconds, how many times will it flash in ¾ of an hour?

Answer: 451 times.
Explanation: There are 60 minutes in an hour.
In ¾ of an hour there are (60 * ¾) minutes = 45 minutes.
In ¾ of an hour there are (60 * 45) seconds = 2700 seconds.
Light flashed for every 6 seconds.
In 2700 seconds 2700/6 = 450 times.
The count start after the first flash, the light will flashes 451 times in ¾ of an hour.

7. If point P is on line segment AB, then which of the following is always true?
(1) AP = PB (2) AP > PB (3) PB > AP (4) AB > AP (5) AB > AP + PB

Answer:
(4)
Explanation:
P
A -----------> B
Since p is a point on the line segment AB, AB > AP

8. All men are vertebrates. Some mammals are vertebrates. Which of the following conclusions drawn from the above statement is correct.
(a)All men are mammals
(b)All mammals are men
(c)Some vertebrates are mammals.
(d)None

Answer: (c)

9. Which of the following statements drawn from the given statements are correct?
Given:
All watches sold in that shop are of high standard. Some of the HMT watches are sold in that shop.
a) All watches of high standard were manufactured by HMT.
b) Some of the HMT watches are of high standard.
c) None of the HMT watches is of high standard.
d) Some of the HMT watches of high standard are sold in that shop.

Answer: (b) & (d).




1. It was calculated that 75 men could complete a piece of work in 20 days. When work was scheduled to commence, it was found necessary to send 25 men to another project. How much longer will it take to complete the work?

Answer 1: 30 days.
Explanation:
Before:
One day work = 1 / 20
One man’s one day work = 1 / ( 20 * 75)
Now:
No. Of workers = 50
One day work = 50 * 1 / ( 20 * 75)

The total no. of days required to complete the work = (75 * 20) / 50 = 30


2. A student divided a number by 2/3 when he required to multiply by 3/2. Calculate the percentage of error in his result.

Answer 2: 0 %

Explanation: Since 3x / 2 = x / (2 / 3)

3. A dishonest shopkeeper professes to sell pulses at the cost price, but he uses a false weight of 950gm. for a kg. His gain is …%.

Answer 3: 5.3 %

Explanation: He sells 950 grams of pulses and gains 50 grams.
If he sells 100 grams of pulses then he will gain (50 / 950) *100 = 5.26

4. A software engineer has the capability of thinking 100 lines of code in five minutes and can type 100 lines of code in 10 minutes. He takes a break for five minutes after every ten minutes. How many lines of codes will he complete typing after an hour?

Answer 4:
250 lines of codes

5. A man was engaged on a job for 30 days on the condition that he would get a wage of Rs. 10 for the day he works, but he have to pay a fine of Rs. 2 for each day of his absence. If he gets Rs. 216 at the end, he was absent for work for ... days.

Answer 5:
7 days

Explanation:
The equation portraying the given problem is:
10 * x – 2 * (30 – x) = 216 where x is the number of working days.
Solving this we get x = 23
Number of days he was absent was 7 (30-23) days.

6. A contractor agreeing to finish a work in 150 days, employed 75 men each working 8 hours daily. After 90 days, only 2/7 of the work was completed. Increasing the number of men by­­ ________ each working now for 10 hours daily, the work can be completed in time.

Answer 6: 150 men.

Explanation:
One day’s work = 2 / (7 * 90)
One hour’s work = 2 / (7 * 90 * 8)
One man’s work = 2 / (7 * 90 * 8 * 75)

The remaining work (5/7) has to be completed within 60 days, because the total number of days allotted for the project is 150 days.

So we get the equation

(2 * 10 * x * 60) / (7 * 90 * 8 * 75) = 5/7 where x is the number of men working after the 90th day.

We get x = 225
Since we have 75 men already, it is enough to add only 150 men.


7. what is a percent of b divided by b percent of a?
(a) a (b) b (c) 1 (d) 10 (d) 100

Answer 7 : (c) 1
Explanation:
a percent of b : (a/100) * b
b percent of a : (b/100) * a
a percent of b divided by b percent of a : ((a / 100 )*b) / (b/100) * a )) = 1

8. A man bought a horse and a cart. If he sold the horse at 10 % loss and the cart at 20 % gain, he would not lose anything; but if he sold the horse at 5% loss and the cart at 5% gain, he would lose Rs. 10 in the bargain. The amount paid by him was Rs.­­­­_______ for the horse and Rs.________ for the cart.

Answer 8 : Cost price of horse = Rs. 400 & the cost price of cart = 200.
Explanation:-
Let x be the cost price of the horse and y be the cost price of the cart.
In the first sale there is no loss or profit. (i.e.) The loss obtained is equal to the gain.

Therefore (10/100) * x = (20/100) * y

X = 2 * y -----------------(1)
In the second sale, he lost Rs. 10. (i.e.) The loss is greater than the profit by Rs. 10.

Therefore (5 / 100) * x = (5 / 100) * y + 10 -------(2)
Substituting (1) in (2) we get
(10 / 100) * y = (5 / 100) * y + 10
(5 / 100) * y = 10
y = 200
From (1) 2 * 200 = x = 400

9. A tennis marker is trying to put together a team of four players for a tennis tournament out of seven available. males - a, b and c; females – m, n, o and p. All players are of equal ability and there must be at least two males in the team. For a team of four, all players must be able to play with each other under the following restrictions:
b should not play with m,
c should not play with p, and
a should not play with o.
Which of the following statements must be false?
1. b and p cannot be selected together
2. c and o cannot be selected together
3. c and n cannot be selected together.


Answer 9 : 3.

Explanation:
Since inclusion of any male player will reject a female from the team. Since there should be four member in the team and only three males are available, the girl, n should included in the team always irrespective of others selection


10. Five farmers have 7, 9, 11, 13 & 14 apple trees, respectively in their orchards. Last year, each of them discovered that every tree in their own orchard bore exactly the same number of apples. Further, if the third farmer gives one apple to the first, and the fifth gives three to each of the second and the fourth, they would all have exactly the same number of apples. What were the yields per tree in the orchards of the third and fourth farmers?

Answer 10 : 11 & 9 apples per tree.

Explanation:
Let a, b, c, d & e be the total number of apples bored per year in A, B, C, D & E ‘s orchard.
Given that a + 1 = b + 3 = c – 1 = d + 3 = e – 6
But the question is to find the number of apples bored per tree in C and D ‘s orchard. If is enough to consider c – 1 = d + 3.
Since the number of trees in C’s orchard is 11 and that of D’s orchard is 13. Let x and y be the number of apples bored per tree in C & d ‘s orchard respectively.
Therefore 11 x – 1 = 13 y + 3
By trial and error method, we get the value for x and y as 11 and 9


Send the answer as soon as possible to sandeepkumar@sandeepinfo.com
First five correct answer sender's name will be displayed on main page of sandeepinfo.com
Please send your college and branch name also with your answer.

All the Best
Posted by SandeepInfo at 8:37 PM 0 comments
Labels: Aptitude
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)
Links to new Blogs

* Interview Questions
* Puzzle World
* Expert Comments
* Great Shayari
* SMS World
* Jokes (Don't Laugh)

Click here to join campus_online
Click to join campus_online
Usful Links

* Home
* Puzzle World
* Interview Questions
* Send Free SMS
* Great Shayari
* Jokes (Don't Laugh)
* SMS World
* Problem Solver

Your Ad Here
Blog Archive

* ▼ 2007 (15)
o ▼ May (13)
+ Urgent
+ Campus_14
+ Campus_13 (C Question)
+ Campus_12 (Math - Aptitude)
+ Campus_11
+ Campus_10 (C Question)
+ Campus_9 (C Interview Questions)
+ Campus_8 (OS question)
+ Campus_7 (FAQ's)
+ Campus_6 (Quantitative Aptitude)
+ Campus_5( C Questions)
+ Campus_4 (C,C++ questions)
+ Campus_3(Quantitative Aptitude)
o ► April (2)
+ Campus_2(SQL - Question)
+ Campus_1 (C++ Question)

Labels

* Aptitude (4)
* C (4)
* C Interview Question (3)
* C++ (1)
* C++ Interview Questions (1)
* Operating System (1)
* SQL Question (1)

math-aptitude for placement / aptitude / interview/assessment/multiple choice/career/campus

math-aptitude for placement / aptitude / interview/assessment/multiple choice/career/campus



1. A trader has 100 Kg of wheat, part of which he sells at 5% profit and the rest at 20% profit. He gains 15% on the whole. Find how much is sold at 5% profit?
(A) 60
(B)50
(C)66.66
(D) 33.3

2. In 1978, a kg of paper was sold at Rs25/-. If the paper rate increases at 1.5% more than the inflation rate which is 6.5% a year, then what wil be the cost of a kg of paper after 2 years?

3. A driver drives at a speed of 72kmph in a highway. Another driver drives at the speed of 25 m/sec . find the difference in their speeds in m/sec. ?

4. In a mixture R is 2 parts and S is 1 part. In order to make
S to 25% of the mixture how r is needed ?






1. I am three times as old as my son. Five years later I shall be two and a half times as old as my son. What is my age?

Answer: Let my age be x years and age of my son be y years.
(i) x = 3y
Five years later
(ii) x+5 = 5/2(y+5)
From (i) and (ii)
y=15 and x=45

2. The L.C.M. (Lowest (or Least) Common Multiple) of two numbers is 45 times to their H.C.F (Highest Common Factor). If one of the numbers is 125 and sum of L.C.M. and H.C.F. is
1150, the other number is:
a) 215
b) 220
c) 225
d) 235

Answer: Let L.C.M. be l and H.C.F. be h. Then l = 45h
l + h =1150
This gives h =25 and l = 1125
Thus the second number = (25 * 1125)/125 = 225

3. Six bells commence tolling together and toll at intervals 2,4,6,8,10 and 12 seconds respectively. In 30 minutes how many times they toll together.
a) 4
b) 10
c) 15
d) 16

Answer: L.C.M. of 2,4,6,8,10,12 = 120
So they toll together after every 120 seconds i.e. 2 minutes. So in 30 minutes they toll together 30/2 + 1 = 16 times

4. The value of (0.625 * 0.0729 * 28.9)/(0.0017 * 0.025 * 8.1) is
a) 3825
b) 3.825
c) 38.25
d) 382.5

Answer: The sum of decimal places in numerator and denominator being the same, decimal point can be removed
(625*729*289) / (17*25*81) = 3825


5. The number of coins 1.5 cm in diameter and 0.2cm thick to be melted to form a right circular cylinder of height 10 cm and diameter 4.5 cm is:
a) 380
b) 450
c) 472
d) 540

Answer: Volume of 1 coin = 22/7 *(1.5)/2*(1.5)/2 * 0.2 = 99/280 cm3
Volume of large cylinder = 22/7 *(4.5)/2*(4.5)/2 * 10 = (99*45)/28cm3
Number of coins = (99*45)/28 * 280/99 = 450

(C,C++ questions) for placement / aptitude / interview/assessment/multiple choice/career/campus

(C,C++ questions) for placement / aptitude / interview/assessment/multiple choice/career/campus



Campus_4 (C,C++ questions)


Q: How many ways are there to initialize an int with a constant?
A: There are two formats for initializers in C++ as shown in the example that follows. The first format uses the traditional C notation. The second format uses constructor notation.int foo = 123;int bar (123);

Q: Explain the scope resolution operator.
A: It permits a program to reference an identifier in the global scope that has been hidden by another identifier with the same name in the local scope.
The answer can get complicated. However, it should start with “::”. If the programmer is well into the design or use of classes that employ inheritance you might hear a lot about overriding member function overrides to explicitly call a function higher in the hierarchy. That’s good to know, but ask specifically about global scope resolution. You’re looking for a description of C++’s ability to override the particular C behavior where identifiers in the global scope are always hidden by like identifiers in a local scope.

Q: In C, why is the void pointer useful? When would you use it?
A: The void pointer is useful because it is a generic pointer that any pointer can be cast into and back again without loss of information.

Q: In C, what is the difference between a static variable and global variable?
A: A static variable declared outside of any function is accessible only to all the functions defined in the same file (as the static variable). However, a global variable can be accessed by any function (including the ones from different files).

Q: In C++, what is the difference between method overloading and method overriding?
A: Overloading a method (or function) in C++ is the ability for functions of the same name to be defined as long as these methods have different signatures (different set of parameters). Method overriding is the ability of the inherited class rewriting the virtual method of the base class.

Q: What is pure virtual function?
A: A class is made abstract by declaring one or more of its virtual functions to be pure. A pure virtual function is one with an initializer of = 0 in its declaration.

Q: What is a virtual destructor?
A: The simple answer is that a virtual destructor is one that is declared with the virtual attribute. The behavior of a virtual destructor is what is important. If you destroy an object through a pointer or reference to a base class, and the base-class destructor is not virtual, the derived-class destructors are not executed, and the destruction might not be complete.

Q: What is virtual channel?
A: Virtual channel is normally a connection from one source to one destination, although multicast connections are also permitted. The other name for virtual channel is virtual circuit.

Q: You have one base class virtual function how will call that function from derived class?
A: class a{public virtual int m(){return 1;}}
class b:a{public int j(){return m();}}

Q: Write a function that will reverse a string.
A: char *strrev(char *s)
{
int i = 0,
len = strlen(s);
char *str;
if ((str = (char *)malloc(len+1)) == NULL) /*cannot allocate memory */
err_num = 2;return (str);
}
while(len)str[i++]=s[?len];
str[i] = NULL;return (str);
}

RDBMS CONCEPTS for placement / aptitude / interview/assessment/multiple choice/career/campus

RDBMS CONCEPTS for placement / aptitude / interview/assessment/multiple choice/career/campus


RDBMS Concepts

1. What is database?

A database is a logically coherent collection of data with some inherent meaning, representing some aspect of real world and which is designed, built and populated with data for a specific purpose.



2. What is DBMS?

It is a collection of programs that enables user to create and maintain a database. In other words it is general-purpose software that provides the users with the processes of defining, constructing and manipulating the database for various applications.



3. What is a Database system?

The database and DBMS software together is called as Database system.



4. Advantages of DBMS?

Ø Redundancy is controlled.

Ø Unauthorised access is restricted.

Ø Providing multiple user interfaces.

Ø Enforcing integrity constraints.

Ø Providing backup and recovery.



5. Disadvantage in File Processing System?

Ø Data redundancy & inconsistency.

Ø Difficult in accessing data.

Ø Data isolation.

Ø Data integrity.

Ø Concurrent access is not possible.

Ø Security Problems.



6. Describe the three levels of data abstraction?

The are three levels of abstraction:

Ø Physical level: The lowest level of abstraction describes how data are stored.

Ø Logical level: The next higher level of abstraction, describes what data are stored in database and what relationship among those data.

Ø View level: The highest level of abstraction describes only part of entire database.

7. Define the “integrity rules”

There are two Integrity rules.

Ø Entity Integrity: States that “Primary key cannot have NULL value”

Ø Referential Integrity: States that “Foreign Key can be either a NULL value or should be Primary Key value of other relation.



8. What is extension and intension?

Extension -

It is the number of tuples present in a table at any instance. This is time dependent.

Intension -

It is a constant value that gives the name, structure of table and the constraints laid on it.



9. What is System R? What are its two major subsystems?

System R was designed and developed over a period of 1974-79 at

IBM
San Jose
Research
Center. It is a prototype and its purpose was to demonstrate that it is possible to build a Relational System that can be used in a real life environment to solve real life problems, with performance at least comparable to that of existing system.

Its two subsystems are

Ø Research Storage

Ø System Relational Data System.



10. How is the data structure of System R different from the relational structure?

Unlike Relational systems in System R

Ø Domains are not supported

Ø Enforcement of candidate key uniqueness is optional

Ø Enforcement of entity integrity is optional

Ø Referential integrity is not enforced



11. What is Data Independence?

Data independence means that “the application is independent of the storage structure and access strategy of data”. In other words, The ability to modify the schema definition in one level should not affect the schema definition in the next higher level.



Two types of Data Independence:

Ø Physical Data Independence: Modification in physical level should not affect the logical level.

Ø Logical Data Independence: Modification in logical level should affect the view level.

NOTE: Logical Data Independence is more difficult to achieve



12. What is a view? How it is related to data independence?

A view may be thought of as a virtual table, that is, a table that does not really exist in its own right but is instead derived from one or more underlying base table. In other words, there is no stored file that direct represents the view instead a definition of view is stored in data dictionary.

Growth and restructuring of base tables is not reflected in views. Thus the view can insulate users from the effects of restructuring and growth in the database. Hence accounts for logical data independence.



13. What is Data Model?

A collection of conceptual tools for describing data, data relationships data semantics and constraints.



14. What is E-R model?

This data model is based on real world that consists of basic objects called entities and of relationship among these objects. Entities are described in a database by a set of attributes.



15. What is Object Oriented model?

This model is based on collection of objects. An object contains values stored in instance variables with in the object. An object also contains bodies of code that operate on the object. These bodies of code are called methods. Objects that contain same types of values and the same methods are grouped together into classes.



16. What is an Entity?

It is a ‘thing’ in the real world with an independent existence.



17. What is an Entity type?

It is a collection (set) of entities that have same attributes.



18. What is an Entity set?

It is a collection of all entities of particular entity type in the database.



19. What is an Extension of entity type?

The collections of entities of a particular entity type are grouped together into an entity set.



20. What is Weak Entity set?

An entity set may not have sufficient attributes to form a primary key, and its primary key compromises of its partial key and primary key of its parent entity, then it is said to be Weak Entity set.



21. What is an attribute?

It is a particular property, which describes the entity.



22. What is a Relation Schema and a Relation?

A relation Schema denoted by R(A1, A2, …, An) is made up of the relation name R and the list of attributes Ai that it contains. A relation is defined as a set of tuples. Let r be the relation which contains set tuples (t1, t2, t3, …, tn). Each tuple is an ordered list of n-values t=(v1,v2, …, vn).



23. What is degree of a Relation?

It is the number of attribute of its relation schema.



24. What is Relationship?

It is an association among two or more entities.



25. What is Relationship set?

The collection (or set) of similar relationships.



26. What is Relationship type?

Relationship type defines a set of associations or a relationship set among a given set of entity types.

27. What is degree of Relationship type?

It is the number of entity type participating.



25. What is DDL (Data Definition Language)?

A data base schema is specifies by a set of definitions expressed by a special language called DDL.



26. What is VDL (View Definition Language)?

It specifies user views and their mappings to the conceptual schema.



27. What is SDL (Storage Definition Language)?

This language is to specify the internal schema. This language may specify the mapping between two schemas.



28. What is Data Storage - Definition Language?

The storage structures and access methods used by database system are specified by a set of definition in a special type of DDL called data storage-definition language.



29. What is DML (Data Manipulation Language)?

This language that enable user to access or manipulate data as organised by appropriate data model.

Ø Procedural DML or Low level: DML requires a user to specify what data are needed and how to get those data.

Ø Non-Procedural DML or High level: DML requires a user to specify what data are needed without specifying how to get those data.



31. What is DML Compiler?

It translates DML statements in a query language into low-level instruction that the query evaluation engine can understand.



32. What is Query evaluation engine?

It executes low-level instruction generated by compiler.



33. What is DDL Interpreter?

It interprets DDL statements and record them in tables containing metadata.



34. What is Record-at-a-time?

The Low level or Procedural DML can specify and retrieve each record from a set of records. This retrieve of a record is said to be Record-at-a-time.



35. What is Set-at-a-time or Set-oriented?

The High level or Non-procedural DML can specify and retrieve many records in a single DML statement. This retrieve of a record is said to be Set-at-a-time or Set-oriented.



36. What is Relational Algebra?

It is procedural query language. It consists of a set of operations that take one or two relations as input and produce a new relation.



37. What is Relational Calculus?

It is an applied predicate calculus specifically tailored for relational databases proposed by E.F. Codd. E.g. of languages based on it are DSL ALPHA, QUEL.



38. How does Tuple-oriented relational calculus differ from domain-oriented relational calculus

The tuple-oriented calculus uses a tuple variables i.e., variable whose only permitted values are tuples of that relation. E.g. QUEL

The domain-oriented calculus has domain variables i.e., variables that range over the underlying domains instead of over relation. E.g. ILL, DEDUCE.



39. What is normalization?

It is a process of analysing the given relation schemas based on their Functional Dependencies (FDs) and primary key to achieve the properties

Ø Minimizing redundancy

Ø Minimizing insertion, deletion and update anomalies.



40. What is Functional Dependency?

A Functional dependency is denoted by X Y between two sets of attributes X and Y that are subsets of R specifies a constraint on the possible tuple that can form a relation state r of R. The constraint is for any two tuples t1 and t2 in r if t1[X] = t2[X] then they have t1[Y] = t2[Y]. This means the value of X component of a tuple uniquely determines the value of component Y.



41. When is a functional dependency F said to be minimal?

Ø Every dependency in F has a single attribute for its right hand side.

Ø We cannot replace any dependency X A in F with a dependency Y A where Y is a proper subset of X and still have a set of dependency that is equivalent to F.

Ø We cannot remove any dependency from F and still have set of dependency that is equivalent to F.



42. What is Multivalued dependency?

Multivalued dependency denoted by X Y specified on relation schema R, where X and Y are both subsets of R, specifies the following constraint on any relation r of R: if two tuples t1 and t2 exist in r such that t1[X] = t2[X] then t3 and t4 should also exist in r with the following properties

Ø t3[x] = t4[X] = t1[X] = t2[X]

Ø t3[Y] = t1[Y] and t4[Y] = t2[Y]

Ø t3[Z] = t2[Z] and t4[Z] = t1[Z]

where [Z = (R-(X U Y)) ]



43. What is Lossless join property?

It guarantees that the spurious tuple generation does not occur with respect to relation schemas after decomposition.



44. What is 1 NF (Normal Form)?

The domain of attribute must include only atomic (simple, indivisible) values.



45. What is Fully Functional dependency?

It is based on concept of full functional dependency. A functional dependency X Y is full functional dependency if removal of any attribute A from X means that the dependency does not hold any more.



46. What is 2NF?

A relation schema R is in 2NF if it is in 1NF and every non-prime attribute A in R is fully functionally dependent on primary key.



47. What is 3NF?

A relation schema R is in 3NF if it is in 2NF and for every FD X A either of the following is true

Ø X is a Super-key of R.

Ø A is a prime attribute of R.

In other words, if every non prime attribute is non-transitively dependent on primary key.



48. What is BCNF (Boyce-Codd Normal Form)?

A relation schema R is in BCNF if it is in 3NF and satisfies an additional constraint that for every FD X A, X must be a candidate key.



49. What is 4NF?

A relation schema R is said to be in 4NF if for every Multivalued dependency X Y that holds over R, one of following is true

Ø X is subset or equal to (or) XY = R.

Ø X is a super key.



50. What is 5NF?

A Relation schema R is said to be 5NF if for every join dependency {R1, R2, …, Rn} that holds R, one the following is true

Ø Ri = R for some i.

Ø The join dependency is implied by the set of FD, over R in which the left side is key of R.

51. What is Domain-Key Normal Form?

A relation is said to be in DKNF if all constraints and dependencies that should hold on the the constraint can be enforced by simply enforcing the domain constraint and key constraint on the relation.

52. What are partial, alternate,, artificial, compound and natural key?

Partial Key:

It is a set of attributes that can uniquely identify weak entities and that are related to same owner entity. It is sometime called as Discriminator.

Alternate Key:

All Candidate Keys excluding the Primary Key are known as Alternate Keys.

Artificial Key:

If no obvious key, either stand alone or compound is available, then the last resort is to simply create a key, by assigning a unique number to each record or occurrence. Then this is known as developing an artificial key.

Compound Key:

If no single data element uniquely identifies occurrences within a construct, then combining multiple elements to create a unique identifier for the construct is known as creating a compound key.

Natural Key:

When one of the data elements stored within a construct is utilized as the primary key, then it is called the natural key.



53. What is indexing and what are the different kinds of indexing?

Indexing is a technique for determining how quickly specific data can be found.

Types:

Ø Binary search style indexing

Ø B-Tree indexing

Ø Inverted list indexing

Ø Memory resident table

Ø Table indexing



54. What is system catalog or catalog relation? How is better known as?

A RDBMS maintains a description of all the data that it contains, information about every relation and index that it contains. This information is stored in a collection of relations maintained by the system called metadata. It is also called data dictionary.



55. What is meant by query optimization?

The phase that identifies an efficient execution plan for evaluating a query that has the least estimated cost is referred to as query optimization.



56. What is join dependency and inclusion dependency?

Join Dependency:

A Join dependency is generalization of Multivalued dependency.A JD {R1, R2, …, Rn} is said to hold over a relation R if R1, R2, R3, …, Rn is a lossless-join decomposition of R . There is no set of sound and complete inference rules for JD.

Inclusion Dependency:

An Inclusion Dependency is a statement of the form that some columns of a relation are contained in other columns. A foreign key constraint is an example of inclusion dependency.



57. What is durability in DBMS?

Once the DBMS informs the user that a transaction has successfully completed, its effects should persist even if the system crashes before all its changes are reflected on disk. This property is called durability.



58. What do you mean by atomicity and aggregation?

Atomicity:

Either all actions are carried out or none are. Users should not have to worry about the effect of incomplete transactions. DBMS ensures this by undoing the actions of incomplete transactions.

Aggregation:

A concept which is used to model a relationship between a collection of entities and relationships. It is used when we need to express a relationship among relationships.



59. What is a Phantom Deadlock?

In distributed deadlock detection, the delay in propagating local information might cause the deadlock detection algorithms to identify deadlocks that do not really exist. Such situations are called phantom deadlocks and they lead to unnecessary aborts.



60. What is a checkpoint and When does it occur?

A Checkpoint is like a snapshot of the DBMS state. By taking checkpoints, the DBMS can reduce the amount of work to be done during restart in the event of subsequent crashes.



61. What are the different phases of transaction?

Different phases are

Ø Analysis phase

Ø Redo Phase

Ø Undo phase



62. What do you mean by flat file database?

It is a database in which there are no programs or user access languages. It has no cross-file capabilities but is user-friendly and provides user-interface management.



63. What is “transparent DBMS”?

It is one, which keeps its Physical Structure hidden from user.



64. Brief theory of Network, Hierarchical schemas and their properties

Network schema uses a graph data structure to organize records example for such a database management system is CTCG while a hierarchical schema uses a tree data structure example for such a system is IMS.



65. What is a query?

A query with respect to DBMS relates to user commands that are used to interact with a data base. The query language can be classified into data definition language and data manipulation language.



66. What do you mean by Correlated subquery?

Subqueries, or nested queries, are used to bring back a set of rows to be used by the parent query. Depending on how the subquery is written, it can be executed once for the parent query or it can be executed once for each row returned by the parent query. If the subquery is executed for each row of the parent, this is called a correlated subquery.

A correlated subquery can be easily identified if it contains any references to the parent subquery columns in its WHERE clause. Columns from the subquery cannot be referenced anywhere else in the parent query. The following example demonstrates a non-correlated subquery.

E.g. Select * From CUST Where ‘10/03/1990′ IN (Select ODATE From ORDER Where CUST.CNUM = ORDER.CNUM)



67. What are the primitive operations common to all record management systems?

Addition, deletion and modification.



68. Name the buffer in which all the commands that are typed in are stored

‘Edit’ Buffer



69. What are the unary operations in Relational Algebra?

PROJECTION and SELECTION.



70. Are the resulting relations of PRODUCT and JOIN operation the same?

No.

PRODUCT: Concatenation of every row in one relation with every row in another.

JOIN: Concatenation of rows from one relation and related rows from another.



71. What is RDBMS KERNEL?

Two important pieces of RDBMS architecture are the kernel, which is the software, and the data dictionary, which consists of the system-level data structures used by the kernel to manage the database

You might think of an RDBMS as an operating system (or set of subsystems), designed specifically for controlling data access; its primary functions are storing, retrieving, and securing data. An RDBMS maintains its own list of authorized users and their associated privileges; manages memory caches and paging; controls locking for concurrent resource usage; dispatches and schedules user requests; and manages space usage within its table-space structures

.

72. Name the sub-systems of a RDBMS

I/O, Security, Language Processing, Process Control, Storage Management, Logging and Recovery, Distribution Control, Transaction Control, Memory Management, Lock Management



73. Which part of the RDBMS takes care of the data dictionary? How

Data dictionary is a set of tables and database objects that is stored in a special area of the database and maintained exclusively by the kernel.



74. What is the job of the information stored in data-dictionary?

The information in the data dictionary validates the existence of the objects, provides access to them, and maps the actual physical storage location.



75. Not only RDBMS takes care of locating data it also

determines an optimal access path to store or retrieve the data



76. How do you communicate with an RDBMS?

You communicate with an RDBMS using Structured Query Language (SQL)



77. Define SQL and state the differences between SQL and other conventional programming Languages

SQL is a nonprocedural language that is designed specifically for data access operations on normalized relational database structures. The primary difference between SQL and other conventional programming languages is that SQL statements specify what data operations should be performed rather than how to perform them.



78. Name the three major set of files on disk that compose a database in Oracle

There are three major sets of files on disk that compose a database. All the files are binary. These are

Ø Database files

Ø Control files

Ø Redo logs

The most important of these are the database files where the actual data resides. The control files and the redo logs support the functioning of the architecture itself.

All three sets of files must be present, open, and available to Oracle for any data on the database to be useable. Without these files, you cannot access the database, and the database administrator might have to recover some or all of the database using a backup, if there is one.



79. What is an Oracle Instance?

The Oracle system processes, also known as Oracle background processes, provide functions for the user processes—functions that would otherwise be done by the user processes themselves

Oracle database-wide system memory is known as the SGA, the system global area or shared global area. The data and control structures in the SGA are shareable, and all the Oracle background processes and user processes can use them.

The combination of the SGA and the Oracle background processes is known as an Oracle instance



80. What are the four Oracle system processes that must always be up and running for the database to be useable

The four Oracle system processes that must always be up and running for the database to be useable include DBWR (Database Writer), LGWR (Log Writer), SMON (System Monitor), and PMON (Process Monitor).



81. What are database files, control files and log files. How many of these files should a database have at least? Why?

Database Files

The database files hold the actual data and are typically the largest in size. Depending on their sizes, the tables (and other objects) for all the user accounts can go in one database file—but that’s not an ideal situation because it does not make the database structure very flexible for controlling access to storage for different users, putting the database on different disk drives, or backing up and restoring just part of the database.

You must have at least one database file but usually, more than one files are used. In terms of accessing and using the data in the tables and other objects, the number (or location) of the files is immaterial.

The database files are fixed in size and never grow bigger than the size at which they were created

Control Files

The control files and redo logs support the rest of the architecture. Any database must have at least one control file, although you typically have more than one to guard against loss. The control file records the name of the database, the date and time it was created, the location of the database and redo logs, and the synchronization information to ensure that all three sets of files are always in step. Every time you add a new database or redo log file to the database, the information is recorded in the control files.

Redo Logs

Any database must have at least two redo logs. These are the journals for the database; the redo logs record all changes to the user objects or system objects. If any type of failure occurs, the changes recorded in the redo logs can be used to bring the database to a consistent state without losing any committed transactions. In the case of non-data loss failure, Oracle can apply the information in the redo logs automatically without intervention from the DBA.

The redo log files are fixed in size and never grow dynamically from the size at which they were created.



82. What is ROWID?

The ROWID is a unique database-wide physical address for every row on every table. Once assigned (when the row is first inserted into the database), it never changes until the row is deleted or the table is dropped.

The ROWID consists of the following three components, the combination of which uniquely identifies the physical storage location of the row.

Ø Oracle database file number, which contains the block with the rows

Ø Oracle block address, which contains the row

Ø The row within the block (because each block can hold many rows)

The ROWID is used internally in indexes as a quick means of retrieving rows with a particular key value. Application developers also use it in SQL statements as a quick way to access a row once they know the ROWID



83. What is Oracle Block? Can two Oracle Blocks have the same address?

Oracle “formats” the database files into a number of Oracle blocks when they are first created—making it easier for the RDBMS software to manage the files and easier to read data into the memory areas.

The block size should be a multiple of the operating system block size. Regardless of the block size, the entire block is not available for holding data; Oracle takes up some space to manage the contents of the block. This block header has a minimum size, but it can grow.

These Oracle blocks are the smallest unit of storage. Increasing the Oracle block size can improve performance, but it should be done only when the database is first created.

Each Oracle block is numbered sequentially for each database file starting at 1. Two blocks can have the same block address if they are in different database files.



84. What is database Trigger?

A database trigger is a PL/SQL block that can defined to automatically execute for insert, update, and delete statements against a table. The trigger can e defined to execute once for the entire statement or once for every row that is inserted, updated, or deleted. For any one table, there are twelve events for which you can define database triggers. A database trigger can call database procedures that are also written in PL/SQL.



85. Name two utilities that Oracle provides, which are use for backup and recovery.

Along with the RDBMS software, Oracle provides two utilities that you can use to back up and restore the database. These utilities are Export and Import.

The Export utility dumps the definitions and data for the specified part of the database to an operating system binary file. The Import utility reads the file produced by an export, recreates the definitions of objects, and inserts the data

If Export and Import are used as a means of backing up and recovering the database, all the changes made to the database cannot be recovered since the export was performed. The best you can do is recover the database to the time when the export was last performed.



86. What are stored-procedures? And what are the advantages of using them.

Stored procedures are database objects that perform a user defined operation. A stored procedure can have a set of compound SQL statements. A stored procedure executes the SQL commands and returns the result to the client. Stored procedures are used to reduce network traffic.



87. How are exceptions handled in PL/SQL? Give some of the internal exceptions’ name

PL/SQL exception handling is a mechanism for dealing with run-time errors encountered during procedure execution. Use of this mechanism enables execution to continue if the error is not severe enough to cause procedure termination.

The exception handler must be defined within a subprogram specification. Errors cause the program to raise an exception with a transfer of control to the exception-handler block. After the exception handler executes, control returns to the block in which the handler was defined. If there are no more executable statements in the block, control returns to the caller.

User-Defined Exceptions

PL/SQL enables the user to define exception handlers in the declarations area of subprogram specifications. User accomplishes this by naming an exception as in the following example:

ot_failure EXCEPTION;

In this case, the exception name is ot_failure. Code associated with this handler is written in the EXCEPTION specification area as follows:

EXCEPTION

when OT_FAILURE then

out_status_code := g_out_status_code;

out_msg := g_out_msg;

The following is an example of a subprogram exception:

EXCEPTION

when NO_DATA_FOUND then

g_out_status_code := ‘FAIL’;

RAISE ot_failure;

Within this exception is the RAISE statement that transfers control back to the ot_failure exception handler. This technique of raising the exception is used to invoke all user-defined exceptions.

System-Defined Exceptions

Exceptions internal to PL/SQL are raised automatically upon error. NO_DATA_FOUND is a system-defined exception. Table below gives a complete list of internal exceptions.



PL/SQL internal exceptions.



Exception Name Oracle Error

CURSOR_ALREADY_OPEN ORA-06511

DUP_VAL_ON_INDEX ORA-00001

INVALID_CURSOR ORA-01001

INVALID_NUMBER ORA-01722

LOGIN_DENIED ORA-01017

NO_DATA_FOUND ORA-01403

NOT_LOGGED_ON ORA-01012

PROGRAM_ERROR ORA-06501

STORAGE_ERROR ORA-06500

TIMEOUT_ON_RESOURCE ORA-00051

TOO_MANY_ROWS ORA-01422

TRANSACTION_BACKED_OUT ORA-00061

VALUE_ERROR ORA-06502

ZERO_DIVIDE ORA-01476



In addition to this list of exceptions, there is a catch-all exception named OTHERS that traps all errors for which specific error handling has not been established.




88. Does PL

/SQL support “overloading”? Explain

The concept of overloading in PL/SQL relates to the idea that you can define procedures and functions with the same name. PL/SQL does not look only at the referenced name, however, to resolve a procedure or function call. The count and data types of formal parameters are also considered.

PL/SQL also attempts to resolve any procedure or function calls in locally defined packages before looking at globally defined packages or internal functions. To further ensure calling the proper procedure, you can use the dot notation. Prefacing a procedure or function name with the package name fully qualifies any procedure or function reference.



89. Tables derived from the ERD

a) Are totally unnormalised

b) Are always in 1NF

c) Can be further denormalised

d) May have multi-valued attributes



(b) Are always in 1NF



90. Spurious tuples may occur due to

i. Bad normalization

ii. Theta joins

iii. Updating tables from join

a) i & ii b) ii & iii

c) i & iii d) ii & iii



(a) i & iii because theta joins are joins made on keys that are not primary keys.



91. A B C is a set of attributes. The functional dependency is as follows

AB -> B

AC -> C

C -> B

a) is in 1NF

b) is in 2NF

c) is in 3NF

d) is in BCNF



(a) is in 1NF since (AC)+ = { A, B, C} hence AC is the primary key. Since C B is a FD given, where neither C is a Key nor B is a prime attribute, this it is not in 3NF. Further B is not functionally dependent on key AC thus it is not in 2NF. Thus the given FDs is in 1NF.



92. In mapping of ERD to DFD

a) entities in ERD should correspond to an existing entity/store in DFD

b) entity in DFD is converted to attributes of an entity in ERD

c) relations in ERD has 1 to 1 correspondence to processes in DFD

d) relationships in ERD has 1 to 1 correspondence to flows in DFD



(a) entities in ERD should correspond to an existing entity/store in DFD



93. A dominant entity is the entity

a) on the N side in a 1 : N relationship

b) on the 1 side in a 1 : N relationship

c) on either side in a 1 : 1 relationship

d) nothing to do with 1 : 1 or 1 : N relationship



(b) on the 1 side in a 1 : N relationship



94. Select ‘NORTH’, CUSTOMER From CUST_DTLS Where REGION = ‘N’ Order By

CUSTOMER Union Select ‘EAST’, CUSTOMER From CUST_DTLS Where REGION = ‘E’ Order By CUSTOMER

The above is

a) Not an error

b) Error - the string in single quotes ‘NORTH’ and ‘SOUTH’

c) Error - the string should be in double quotes

d) Error - ORDER BY clause



(d) Error - the ORDER BY clause. Since ORDER BY clause cannot be used in UNIONS



95. What is Storage Manager?

It is a program module that provides the interface between the low-level data stored in database, application programs and queries submitted to the system.



96. What is Buffer Manager?

It is a program module, which is responsible for fetching data from disk storage into main memory and deciding what data to be cache in memory.



97. What is Transaction Manager?

It is a program module, which ensures that database, remains in a consistent state despite system failures and concurrent transaction execution proceeds without conflicting.



98. What is File Manager?

It is a program module, which manages the allocation of space on disk storage and data structure used to represent information stored on a disk.



99. What is Authorization and Integrity manager?

It is the program module, which tests for the satisfaction of integrity constraint and checks the authority of user to access data.

100. What are stand-alone procedures?

Procedures that are not part of a package are known as stand-alone because they independently defined. A good example of a stand-alone procedure is one written in a SQL*Forms application. These types of procedures are not available for reference from other Oracle tools. Another limitation of stand-alone procedures is that they are compiled at run time, which slows execution.



101. What are cursors give different types of cursors.

PL/SQL uses cursors for all database information accesses statements. The language supports the use two types of cursors

Ø Implicit

Ø Explicit



102. What is cold backup and hot backup (in case of Oracle)?

Ø Cold Backup:

It is copying the three sets of files (database files, redo logs, and control file) when the instance is shut down. This is a straight file copy, usually from the disk directly to tape. You must shut down the instance to guarantee a consistent copy.

If a cold backup is performed, the only option available in the event of data file loss is restoring all the files from the latest backup. All work performed on the database since the last backup is lost.

Ø Hot Backup:

Some sites (such as worldwide airline reservations systems) cannot shut down the database while making a backup copy of the files. The cold backup is not an available option.

So different means of backing up database must be used — the hot backup. Issue a SQL command to indicate to Oracle, on a tablespace-by-tablespace basis, that the files of the tablespace are to backed up. The users can continue to make full use of the files, including making changes to the data. Once the user has indicated that he/she wants to back up the tablespace files, he/she can use the operating system to copy those files to the desired backup destination.

The database must be running in ARCHIVELOG mode for the hot backup option.

If a data loss failure does occur, the lost database files can be restored using the hot backup and the online and offline redo logs created since the backup was done. The database is restored to the most consistent state without any loss of committed transactions.



103. What are Armstrong rules? How do we say that they are complete and/or sound

The well-known inference rules for FDs

Ø Reflexive rule :

If Y is subset or equal to X then X Y.

Ø Augmentation rule:

If X Y then XZ YZ.

Ø Transitive rule:

If {X Y, Y Z} then X Z.

Ø Decomposition rule :

If X YZ then X Y.

Ø
Union or Additive rule:

If {X Y, X Z} then X YZ.

Ø Pseudo Transitive rule :

If {X Y, WY Z} then WX Z.

Of these the first three are known as Amstrong Rules. They are sound because it is enough if a set of FDs satisfy these three. They are called complete because using these three rules we can generate the rest all inference rules.



104. How can you find the minimal key of relational schema?

Minimal key is one which can identify each tuple of the given relation schema uniquely. For finding the minimal key it is required to find the closure that is the set of all attributes that are dependent on any given set of attributes under the given set of functional dependency.

Algo. I Determining X+, closure for X, given set of FDs F

1. Set X+ = X

2. Set Old X+ = X+

3. For each FD Y Z in F and if Y belongs to X+ then add Z to X+

4. Repeat steps 2 and 3 until Old X+ = X+



Algo.II Determining minimal K for relation schema R, given set of FDs F

1. Set K to R that is make K a set of all attributes in R

2. For each attribute A in K

a. Compute (K – A)+ with respect to F

b. If (K – A)+ = R then set K = (K – A)+





105. What do you understand by dependency preservation?

Given a relation R and a set of FDs F, dependency preservation states that the closure of the union of the projection of F on each decomposed relation Ri is equal to the closure of F. i.e.,

((PR1(F)) U … U (PRn(F)))+ = F+

if decomposition is not dependency preserving, then some dependency is lost in the decomposition.

106. What is meant by Proactive, Retroactive and Simultaneous Update.

Proactive Update:

The updates that are applied to database before it becomes effective in real world .

Retroactive Update:

The updates that are applied to database after it becomes effective in real world .

Simulatneous Update:

The updates that are applied to database at the same time when it becomes effective in real world .



107. What are the different types of JOIN operations?

Equi Join: This is the most common type of join which involves only equality comparisions. The disadvantage in this type of join is that there

INTERVIEW QUESTIONS for placement / aptitude / interview/assessment/multiple choice/career/campus

INTERVIEW QUESTIONS for placement / aptitude / interview/assessment/multiple choice/career/campus


Technical Questions in the second round –

—————————————

[1] What are the current trends and areas of focus in IT.

My Ans. Talked about emerging trends of S/W Engg and ISO 9000 stuff

(gave vague ideas about them as I don’t know much nor do I care

about these topics myself ;-)). Then mentioned the proliferation of O-O

methodologies and their usefulness in speeding up development process,

code re-usability, ease of maintenance, ease of bug-fixing.

Thirdly, mentioned the work going on in High-Speed N/w - FDDI, ATM,

Fast-Ethernet(100Mbps). Told whatever little I knew about ATM in

response to another question.

[2] What is a Micro-Kernel architecture.

My Ans. This is a developing area in OSs where instead of building the

kernel as a single monolithic structure starting from scratch, it is

built as a set of layers. The micro-kernel provides only the bare-bones

like Device-drivers, rudimentary filesystem support etc. on which,

depending on the intended area of application of the OS, it can be

customized to provide various higher level OS features like

Multiprocessing, IPC, etc.

Personal Questions in the second round –

————————————–

1. Tell us about yourself, your background.

2. What does your father do currently.

3. Your performance in schooling, B.E.

4. Your +/- points.

5. Why do you think Wipro should take you.

6. What qualities do you have that make you a person suitable for going

into the IT industry (a corollary to the previous question).

7. What do your friends opine about you.

8. When do you think you will complete and be able to join.

9. How can you assure that you will join by that time.

10. Anything you want to know about us.

} /* End of for() */

a) Describe the memory management policies in Unix. How is paging

implemented? How page faults are handled?

Seems to be a favorite question for these chaps —- Maurice Bach.

b) Write a macro in C for swapping two nibbles in a byte.

-Use the shift operators and be careful while defining temporary

variables( if you do so) as you have to write a macro. Otherwise

it is pretty simple.

c) What is the CPU-scheduling policy in Unix? - Round robin scheduling

with multilevel queues.

d) Diffrence between short term, long term and medium term scheduler.

-First two should be peaceful. The last one is also known as

swapper. (See Taenenbaum and/or Peterson)

e) Name various page-replacement policies. Which can be implemented

both with and without pre-emption? - see Peterson.

f) Describe the Sliding window protocol. What is it’s advantage

over stop-and-wait? - Saves bandwidth. (Taenenbaum please)

2ND INTERVIEW (Both personal and technical interleaved)

a) Tell us something about yourself.

b) Aren’t you going for higher studies abroad? Why?

c) Rank and CGPA. MSites do not have ranks but still they wanted to

know my approx position in my batch.

- Shady question. It is your job to convince them that for

MS, grades do not hold any meaning.

d) What is re-entrant code? — Non-self modifying code. Can be

shared by many processes simultaneously. Gave e.g. of text-editors

like ‘vi’.

Counter Q: But then no code modifies itself. What does ‘non-self

modifying’ mean? —- I don’t know for sure.

e) Diff between compilers and interpreters. Some fundaes about

how to link code in different files.

f) What would your friends tell us about you if we ask them?

Standard question for everyone.

Second interview: (fully personal) — This was more interesting;-)

a) What did you feel about the ppt? — wasn’t very impressive

so gave some shady answer.

b) Have you heard of creativity? — Ya.

Have you heard of Bernard Shaw? — Ya.

(Then he rattled off some quote of BS regarding creativity)

What do you say? — I put some shadiest fundaes regarding

visionaries and Leonardo da Vinci conceptualising Helicopters

in his time!

************************************************************************

NOTE: If you have been offered a job previously by any other company

after your BTech/BE or if you have even slightest of work experience

then make it a point to mention about it. It is a major plus point.

The interviewers will be definitely interested in knowing that some

other company also found you good enough to be selected.

************************************************************************

***************************************************************************

Personal Questions asked:

a)question

1. Tell me about urself, family background ..

2. Btech projects and M.S. projects

( spend more time here, even if u have not done much

workl; create a good impression)

3. Significant achievements in life.

( may be paper publications etc. )

4. Why did u leave ur previous company ( If u were working)

5. What do u expect from a company ?

( like how shd be the work environment etc. etc. )

************************************************************************

Technical Questions asked:

1. Explain your project

2. What are your areas of interest in Appli Prog

Personal Questions asked:

1. Introduce yourself

2. Why do you want to join INFOSYS

3. Do you have a passport

4. Have you taken GRE/TOEFL

5. Will you go abroad

6. Which prog is better - MTech or MS

7. Which prog do people prefer - MTech or MS

8. Why

Personal Questions asked:

a)Which other companies are you applying to?

in interview

a)question

my weakness, kinds of friendship, family details

b) response

They are impressed if one presents papers.

I have presented conference papers

in the national level.

Generally most of the companies asks about the project.

Regarding other technical questions, they put questions

on the courses I did.

B) Personal

———–

i) Tell us something about yourself. (This has to be there)

ii) Strengths and weaknesses (This question also disguised in various

forms is always asked).

iii) Why should we hire you?

iv) Can you describe your project in short?

v) Why did you take 2-1/2 years to complete (My case!)

vi) If given the job when can you join. (Caution: Don’t think that if

you give some unreal early deadlines they will offer you the job.

Always play safe and give a deadline by which time you are sure to

complete and join. Asking for extensions is the worst scenario).

Tips: Be confident, frank (But need not give away information which may weigh

against your case), free (use first names while addresing them, so be

alert when they introduce themselves) and cheerful (attend an interview

with a positive frame of mind). Remember you are IITians and you always

have an edge. That may sound arrogant, but its true.