Top Banner
Music competition at CRAMER(Questions): 'You Are the Sunshine Of My Life', written by Stevie Wonder in 1972, has been covered by over twenty-five different artists. The chorus includes which of the following lyrics? What cell phone does Lil’ Wayne mention in his hit song , 'A Milli' Which Ke$ha song proclaims, 'Got Jesus on my necklace' Ans :-We r who v r The maximum number of Grammy’s that can be awarded to an artist in a single year is 8. Only one solo artist has managed this feat. Who?
46

CSC

Sep 21, 2014

Download

Documents

Ankit Bharathan

compiled collection of CSE questions
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: CSC

Music competition at CRAMER(Questions):

'You Are the Sunshine Of My Life', written by Stevie Wonder in 1972, has been covered by over twenty-five different artists. The chorus includes which of the following lyrics?

What cell phone does Lil’ Wayne mention in his hit song , 'A Milli'

Which Ke$ha song proclaims, 'Got Jesus on my necklace'

Ans :-We r who v r

The maximum number of Grammy’s that can be awarded to an artist in a single year is 8. Only one solo artist has managed this feat. Who?

Ans -Michael Jackson

Page 2: CSC

Eric Clapton

Beyonce

Quincy Jones

Which two cities are mentioned in Chris Brown’s 'I Can Transform Ya'?

Britney Spear’s videos are as popular as her songs, but which one, of her music videos is still incomplete?

Outrageous

Anticipating

Do Somethin

Gimme More

Which one of Rihanna's songs, was co-written by Chris Brown and was originally intended for him to record?https://rapidshare.com/files/2136887219/CSE.docx

http://channel-oneknowledgeformanendragarh.blogspot.com/2011/08/sameer-placement-paper-for-computer.html

compiled collection by Ankit Bharthan

I. APTITUDEIn this round, they asked 40 questions in 40 minutes which includes

Two from Venn diagram, (easy)One from probability,3*3 Sudoku like below, (very easy)8 29

You have to fill the numbers from 1-9 in the boxes, such that it should have 15 from top to bottom and across the diagonal, then you would have the box as like the one below:8 2 51 4 76 9 3

From this you might have questions like, summing up the numbers which are right and left to the number 2. For us, three questions were asked from this: Some four questions were asked from the four different passages. One problem based on age.

Page 3: CSC

(easy) Three questions based on Speed and Distance. One from permutation Percentage ( easy ) Few questions based on functions. (very easy one) II. TECHNICAL It consists of 75 questions and duration is 40 minutes. We had the questions from previous year papers.

1. ------- is associated with web services. a) WSDL b) WML c) web sphere d) web logic Ans: a

2.any large single block of data stored in a database, such as a picture or sound file, which does not include record fields, and cannot be directly searched by the database's search engine.a) TABLE b) BLOB c) VIEW d) SCHEME Ans: b

3.A reserved area of the immediate access memory used to increase the running speed of the computer program. a) session memory b) bubble memory c) cache memory d) shared memory Ans: c

4.a small subnet that sit between a trusted internal network and an untruster external network, such as the public internet.a) LAN b) MAN c) WAN d) DMZ Ans: d

5.technologies that use radio waves to automatically identify people or objects,which is very similar to the barcode identification systems,seen in retail stores everyday.a) BLUETOOTH b) RADAR c) RSA SECURE ID d) RFID Ans: d

6.main(){float fl = 10.5;double dbl = 10.5

Page 4: CSC

if(fl ==dbl)printf("UNITED WE STAND");

elseprintf("DIVIDE AND RULE")

}

What is the output?a) compilation error b) UNITED WE STAND c) DIVIDE AND RULE d) Linkage error.Ans: c

7.main(){static int ivar = 5;printf("%d",ivar--);if(ivar)

main();}

What is the output?a)1 2 3 4 5 b) 5 4 3 2 1 c)5 d) Compiler error:main cannot be recursive function.Ans: b

8.main(){

extern int iExtern;iExtern = 20;printf("%d",iExtern);

}

What is the output?a)2 b) 20 c) compile error d) linker error Ans: d

9..#define clrscr() 100main(){

clrscr();printf("%d

Page 5: CSC

", clrscr());}

What is the output?a)100 b)10 c)compiler errord)linkage errorAns: a

10.main(){

void vpointer;char cHar = 'g', *cHarpointer = "GOOGLE";int j = 40;vpointer = &cHar;printf("%c",*(char*)vpointer);vpointer = &j;printf("%d",*(int *)vpointer);vpointer = cHarpointer;printf("%s",(char*)vpointer +3);

}

What is the output?a) g40GLE b) g40GOOGLE c) g0GLE d) g4GOOAns: a

11.#define FALSE -1#define TRUE 1 #define NULL 0main() {

if(NULL)puts("NULL");

else if(FALSE)puts("TRUE");

elseputs("FALSE");

}

What is the output?a) NULL b) TRUE c) FALSE d)0 Ans: b

Page 6: CSC

12.main() {int i =5,j= 6, z;printf("%d",i+++j);

}

What is the output?a)13 b)12 c)11 d) Compiler errorAns: c

13.main() {int i ;i = accumulator();printf("%d",i);

}

accumulator(){_AX =1000

}

What is output?a)1 b)10 c)100 d)1000Ans: d

14.main() {int i =0;while(+(+i--)!= 0)

i- = i++;printf("%d",i);

}

What is the output?a) -1 b) 0 c) 1 d) Will go in an infinite loopAns: a

Page 7: CSC

15.main(){int i =3;for(; i++=0;)

printf(("%d",i);}

What is the output?a) 1b) 2c) 1 2 3d) Compiler error : L value required.Ans: d

16. main(){int i = 10, j =20;j = i ,j?(i,j)?i :j:j;printf("%d%d",i,j);}

What is the output?a) 20 20 b) 20 10 c) 10 20 d) 10 10Ans: d

17.main(){extern i;printf("%d ",i);{int i =20;printf("%d ",i);}}

What is the output?a) "Extern valueof i " 20 b) Externvalue of i"c) 20d) linker Error: unresolved external symbol iAns: d

18.int DIMension(int array[]){return sizeof(array/sizeof(int);}main(){int arr[10];

Page 8: CSC

printf("Array dimension is %d",DIMension(arr));}

What is output?a) array dimension is 10 b) array dimension is 1 c) array dimension is 2 d) array dimension is 5Ans: b

19. main(){void swap();int x = 45, y = 15;swap(&x,&y);printf("x = %d y=%d"x,y);}void swap(int *a, int *b){*a^=*b, *b^=*a, *a^ = *b;

What is the output?a) x = 15, y =45 b) x =15, y =15 c) x =45 ,y =15 d) x =45 y = 45Ans: a

20.main(){int i =257;int *iptr =&i;printf("%d%d",*((char*)iptr),*((char *)iptr+1));}

What is output?a)1, 257 b)257 1c)0 0d)1 1Ans: d

21.main(){int i =300;char *ptr = &i;*++ptr=2;printf("%d",i);}

What is output?

Page 9: CSC

a) 556 b) 300 c) 2 d) 302Ans: a

22.#includemain(){char *str ="yahoo";char *ptr =str;char least =127;while(*ptr++)least = (*ptrprintf("%d",least);}

What is the output?a) 0 b)127 c) yahoo d) yAns: a

23.Declare an array of M pointers to functions returing pointers to functions returing pointers to characters.a) (*ptr[M]()(char*(*)()); b) (char*(*)())(*ptr[M])() c) (char*(*)(*ptr[M]())(*ptr[M]() d) (char*(*)(char*()))(*ptr[M])();

24.void main(){int I =10, j=2;int *ip = &I ,*jp =&j;int k = *ip/*jp;printf("%d",k);}

What is the output?a) 2 b) 5 c) 10 d) compile error:unexpected end of file in comment started in line 4Ans: d

25.main(){

Page 10: CSC

char a[4] ="GOOGLE";printf("%s",a);}

What is the output?a) 2 b) GOOGLE c) compile error: yoo mant initializers d) linkage error.Ans: c

26.For 1MB memory, the number of address lines requireda) 12 b) 16 c) 20 d) 32Ans: 16

27.There is a circuit using 3 nand gates with 2 inputes and 1 output,f ind the output.a) AND b) OR c) XOR d) NANDAns: b (not sure)

28. What is done for push operationa) SP is incremented and then the value is stored.b) PC is incremented and then the value is stored.c) PC is decremented and then the value is stored.d) SP is decremented and then the value is stored.Ans: d

29.Memory allocation of variables declared in a program is:a) Allocated in RAMb) Allocated in ROMc) Allocated in stackd) Assigned in registers.Ans: c

30.What action is taken when the processer under execution is interrupted by TRAP in 8085MPU?a) Processor serves the interrupt request after completing the execution of the current instruction.b) processer serves the interrupt request after completing the current task.c) processor serves the interrupt immediately.d) processor serving the interrupt request depent deprnds upon the priority of the current task under execution.

Page 11: CSC

Ans: a

31.purpose of PC (program counter)in a microprocessor is:a) To store address of TOS(top of stack)b) To store address of next instructions to be executedc) count the number of instructionsd) to store the base address of the stack.Ans: b

32.conditional results after execution of an instruction in a microprocess is stored ina) register b) accumulator c) flag register d) flag register part of PSW (program status word)Ans: c

33.The OR gate can be converted to the NAND function by adding----gate(s)to the input of the OR gate.a) NOT b) AND c) NOR d) XORAns: a

34. In 8051 microcontroller , has a dual function.a) port 3 b) port 2 c) port 1 d) port 0Ans: b

35.An 8085 based microprocessor with 2MHz clock frequency,will execute the following chunk of code with how much delay?MVI B,38HHAPPY: MVI C, FFHSADDY: DCR CJNZ SADDYDCR BJNC HAPPY

a) 102.3 b)114.5 c)100.5 d)120

Page 12: CSC

36.In 8085 MPU what will be the status of the flag after the execution of the following chunk of code.MVI B,FFHMOV A,BCMAHLTa) S = 1, Z = 0, CY = 1 b) S = 0, Z = 1, CY = 0 c) S = 1, Z = 0, CY = 0 d) S = 1, Z = 1 ,CY = 1

37.A positive going pulse which is always generated when 8085 MPU begins the machine cycle.a) RD b) ALE address latch enablec) WR d) HOLDAns: b

38.when a ----- instruction of 8085 MPU is fetched , its second and third bytes are placed in the W and Z registers.a) JMP b) STA c) CALL d) XCHGAns: c

39.what is defined as one subdivision of the operation performed in one clock period.a) T- State b) Instruction Cycle c) Machine Cycle d) All of the above Ans: a

40.At the end of the following code, what is the status of the flags.LXI B, AEC4HMOV A,CADD HLT a) S = 1, CY = 0, P = 0 , AC = 1 b) S =0 , CY = 1, P = 0,AC = 1 c) S = 0, CY = 1, P = 0 , AC = 1 d) S = 0, CY = 1, P = 1 , AC = 1

41.In 8051 micro controller what is the HEX number in the accumulator after the execution of the following code.MOV A,#0A5H

Page 13: CSC

CLR CRRC ARRC ARL ARL ASWAP Aa)A6 b)6A c)95 d)A5.Ans: a

42.The Pentium processor requires ------------ volts.a)9 b)12 c)5 d)24ans; c

43. The data bus on the Celeron processor is-------bits wide.a)64 b)32 c)16 d)128. Ans: a

44.K6 processora) Hitachi b) toshiba c) zilog d) AMD. Ans: d

45. What is the control word for 8255 PPI,in BSR mode to set bit PC3.a)0EH b)0FH c)07H d)06H. ans:c

46.The repeated execution of a loop of code while waiting for an event to occur is called ---------.The cpu is not engaged in any real productive activity during this period,and the process doesn't progress towards completion.a) dead lock b) busy waiting c) trap door d) none.Ans: b

47. Transparent DBMS is defined asa) A DBMS in which there are no program or user access languages. b) A DBMS which has no cross file capabilities but is user friendly and provides user interface management. c) A DBMS which keeps its physical structure hidden from user d) none.Ans: c

48.Either all actions are carried out or none are. users should not have to worry about the effect of incomplete transctions.DBMS ensures this by undoing the actions of incomplete transctions.this property is known asa) Aggregation b) atomicity c) association d) data integrity.ans : B

49.------ algorithms determines where in available to load a program. common methods are first

Page 14: CSC

fit,next fit,best fit.--------- algorithm are used when memory is full , and one process (or part of a process) needs to be swaped out to accommodate a new program.The ------------- algorithm determines which are the partions to be swaped out.a) placement, placement, replacementb) replacement, placement, placementc) replacement, placement, replacementd) placement, replacement, replacement Ans: D

50.Trap door is a secret undocumented entry point into a program used to grant access without normal methods of access authentication. A trap is a software interrupt,usually the result of an error condition.a)true b)false.Ans: A

51. Given a binary search tree,print out the nodes of the tree according t5o post order traversal. 4/ 2 5/ 1 3a)3,2,1,5,4. b)1,2,3,4,5. c)1,3,2,5,4. d)5,3,1,2,4. Ans: C

52.which one of the following is the recursive travel technique.a)depth first search b)preorder c)breadth first search d)none.

53.which of the following needs the requirement to be a binary search tree.a) 5/ 2 7/1

b) 5/ 6 7

c) 5/ 2 7/1 6

d) none.

54.in recursive implementations which of the following is true for saving the state of the steps

Page 15: CSC

a) as full state on the stackb) as reversible action on the stackc) both a and bd) none

55.which of the following involves context switcha)previliged instructionb)floating point exceptionc)system callsd)alle)noneans : c

56.piggy backing is a technique fora)acknowledgeb)sequencec)flow controld)retransmissionans:A

57. a functional dependency XY is ___________dependency if removal of any attribute A from X means that the dependency does not hold any morea)full functionalb) multi valuedc)single valuedd)noneans : a

58)a relation schema R is in BCNF if it is in ___________and satisfies an additional constraints that for every functional dependency XY,X must be a candidate keya)1 NFb)2 NFc)3 NFd)5 NF

59) a _________sub query can be easily identified if it contains any references to the parent sub query columns in the _________ clauseA) correlated ,WHEREb) nested ,SELECTc) correlated,SELECTd) none

60) hybrid devise that combines the features of both bridge and router is known asa)router b)bridge c)hub d)brouter

Page 16: CSC

61) which of the following is the most crucial phase of SDLCa)testing b)code generation c) analysys and design d)implementationAns: c

62)to send a data packet using datagram ,connection will be establisheda)no connection is requiredb) connection is not established before data transmissionc)before data transmissiond)none Ans: c

63)a software that allows a personal computer to pretend as as computer terminal isa) terminal adapterb)terminal emulationc)modemd)none Ans: b

64) super key isa) same as primary keyb) primary key and attributec) same as foreign keyd) foreign key and attributeAns: b

65.In binary search tree which traversal is used for ascending order valuesa) Inorder b)preorder c)post order d)noneAns: a

66.You are creating an index on ROLLNO colume in the STUDENT table.which statement will you use?a) CREATE INDEX roll_idx ON student, rollno; b) CREATE INDEX roll_idx FOR student, rollno;c) CREATE INDEX roll_idx ON student( rollno);d) CREATE INDEX roll_idx INDEX ON student (rollno);Ans: c

67.A________class is a class that represents a data structure that stores a number of data objectsa. container b.component c.base d.derivedAns: a

68.Which one of the following phases belongs to the compiler Back-end.a. Lexical Analysis b.Syntax Analysis c. Optimization d.Intermediate Representation.Ans: c

Page 17: CSC

69.Every context _sensitive language is context_freea. true b.falseAns: b

70.Input:A is non-empty list of numbers LXß-infinityFor each item in the list L,doIf the item>x,thenXß the itemReturn XX represents:-a)largest numberb)smallest numberc)smallest negative numberd) none

71.Let A and B be nodes of a heap,such that B is a child of A. the heap must then satisfy the following conditionsa)key(A)>=key(B)b)key(A)c)key(A)=key(B)d)none

72.String ,List,Stack,queue are examples of___________a)primitive data typeb)simple data typec)Abstract data typed)noneAns: c

73.which of the following is not true for LinkedLists?a)The simplest kind of linked list is a single linked list ,which has one link per node .this link points to the next node in the list,or to a null value or emptylist if it is the last node.b)a more sophisticated kind of linked list is a double linkedlist or two way linkedlist .Each node has two links ,one to the previous node and one to the next node.c) in a circleLinkedList ,the first and last nodes are linked together.this can be done only for double linked list.d) to traverse a circular linkedlist ,u begin at any node and follow the list in either direction until u return to the original node.Ans: c

74.sentinel node at the beginning and /or at the end of the linkedlist is not used to store the dataa) trueb) false

Page 18: CSC

Ans:a

2. GROUP DISCUSSION

CSC is mainly looking in your communication and how well you are confident at. These guys are giving chance to everyone in putting their own points. i.e., they are conducting it in orderly fashion. She gave us: Should sex education be included in academic of school children. I was the first to start the GD, so, I went with the topic and No time was given to prepare. Results were immediately announced. In my batch, only one got eliminated. So guys, be confident while putting your points. GUYS dont initiate take time get some valid point then talk (100% fluency expect)Topic:Indian education system,valentans day,BPO services,About Bank etc....but i got eliminated at this round they taken 10:1 ratio.. its not my Day...but my friends are attend next round i had some remaining question forHR round....

3. TECHNICAL HRInitially the HR was started with my project, I explained my project entirely. And he raised few questions from that. I answered for all those. So, you must have thorough knowledge of your project you had done.

Besides, he raised questions like difference between array and Linked list then Stack, Queue from Data Structures, DBMS, and Operator Overloading, paging concept from Operating System, few concepts from Mobile Computing and some more. It took some 25-30 minutes for me.Depending on the panel, you will get questions. You brush up all the concepts from Data Structure, DBMS, Operating System and Programming Languages. If you are belonging to ECE, concentrate much on Microprocessor. (This info was given by my friend).You just give your answers if you are sure, otherwise, you say, sorry mam/sir, at present, I could not recollect. Do not try to give related or fake answers.

Hi frns I am Siva. I completed my engg in SBIT College, Khammam.

I want to share My interview Experience with U ......I hope it will be usefull for u..

Letz start.....

Written Test: Very Easy,Just be prepare Some Aptitude and Programming Basics.

Prepare Thoroughly Previous Papers With Answers..(If luck Favours ,paper will Repeat)

JAM Round: Max Elimination.......B carefull.....

they will Given u a Topic(or own Topic Selection) and will ask u to speak on the Given topic for

Page 19: CSC

atleast 1 min......

The Batch size for this round will be atleast 15 - 20 members.......I got "Technology Vs Agriculture" as my Topic for JAM(Same topic for the entire Batch).....In my batch only 3 are selected...

Tech Round: Be sure with ur Basic Knowledge in all ur Computer related Subjects......Be prepare about ur Final Year Project.....U can Expect Some programs......They Asked me to Write Quick Sort Program.........Ur selection is Based on Tech Round Score Only.........

HR Round: Very Easy.........If ur Technically Strong,No probs in this Round......Or else u have to Impress HR with ur Communication Skills.......

In my Event ,Around 1000 Members participated:

total 1000 memberswritten cleared:400Jam Cleard:150-200Tech Cleared:100-120HR cleared:100

Luckily I am one among 100.......All the Best Frns.....Hope we will meet in CSC......Experience Results........

2011 CSC Placement Paper:-

1.------- is associated with webservices.

a) WSDL b) WML c) web sphere d) web logic

2.any large single block of data stored in a database, such as a picture or sound file, which does not include record fields, and cannot be directly searched by the database’s search engine.

a) TABLE b) BLOB c) VIEW d) SCHEME

3.Areserved area of the immediate access memeory used to increase the running speed of the computer program.

a) session memory b) bubble memory c) cache memory d) shared memory

4.a small subnet that sit between atrusted internal network and an untruster external network, such as the public internet.

Page 20: CSC

a) LAN b) MAN c) WAN d) DMZ

5.technologies that use radio waves to automatically identify people or objects,which is very similar to the barcode identification systems,seen in retail stores everyday.

a)BLUETOOTH b) RADAR c)RSA SECURE ID d)RFID

6.main(){float fl = 10.5;double dbl = 10.5if(fl ==dbl)printf(“UNITED WE STAND”);elseprintf(“DIVIDE AND RULE”)}what is the output?

a)compilation error b)UNITED WE STAND c)DIVIDE AND RULE d)linkage error.

7.main(){static int ivar = 5;printf(“%d”,ivar--);if(ivar)main();}

what is the output?

a)1 2 3 4 5 b) 5 4 3 2 1 c)5 d)compiler error:main cannot be recursive function.

8.main(){extern int iExtern;iExtern = 20;printf(“%d”,iExtern);}what is the output?

a)2 b) 20 c)compile error d)linker error

9..#define clrscr() 100main(){clrscr();printf(“%d\n\t”, clrscr());}what is the output?

a)100 b)10 c)compiler errord)linkage error

Page 21: CSC

10.main(){void vpointer;char cHar = ‘g’, *cHarpointer = “GOOGLE”;int j = 40;vpointer = &cHar;printf(“%c”,*(char*)vpointer);vpointer = &j;printf(“%d”,*(int *)vpointer);vpointer = cHarpointer;printf(“%s”,(char*)vpointer +3);}what is the output?

a)g40GLE b)g40GOOGLE c)g0GLE d)g4GOO

11.#define FALSE -1#define TRUE 1#define NULL 0main() {if(NULL)puts(“NULL”);else if(FALSE)puts(“TRUE”);elseputs(“FALSE”);}what is the output?

a)NULL b)TRUE c)FALSE d)0

12.main() {int i =5,j= 6, z;printf(“%d”,i+++j);}what is the output?a)13 b)12 c)11 d)compiler error

13.main() {int i ;i = accumulator();printf(“%d”,i);}accumulator(){_AX =1000;}what is output?

a)1 b)10 c)100 d)1000

Page 22: CSC

14.main() {int i =0;while(+(+i--)!= 0)i- = i++;printf(“%d”,i);}what is the output?a)-1 b)0 c)1 d)will go in an infinite loop

15.main(){int i =3;for(; i++=0;)printf((“%d”,i);}what is the output?

a)1b)2c)1 2 3d)compiler error:L value required.

16.main(){int i = 10, j =20;j = i ,j?(i,j)?i :j:j;printf(“%d%d”,i,j);}what is the output?a)20 b)20 c)10 d)10

17.main(){extern i;printf(“%d\t”,i);{int i =20;printf(“%d\t”,i);}}what is output?

a) “Extern valueof i “ 20 b)Externvalue of i”c)20d)linker Error:unresolved external symbol i

18.int DIMension(int array[]){return sizeof(array/sizeof(int);}main(){int arr[10];printf(“Array dimension is %d”,DIMension(arr));}what is output?

a)array dimension is 10 b)array dimension is 1c) array dimension is 2 d)array dimension is 5

19.main(){void swap();int x = 45, y = 15;

Page 23: CSC

swap(&x,&y);printf(“x = %d y=%d”x,y);}void swap(int *a, int *b){*a^=*b, *b^=*a, *a^ = *b;what is the output?

a) x = 15, y =45 b)x =15, y =15 c)x =45 ,y =15 d)x =45 y = 45

20.main(){int i =257;int *iptr =&i;printf(“%d%d”,*((char*)iptr),*((char *)iptr+1));}what is output?a)1, 257 b)257 1c)0 0d)1 1

21.main(){int i =300;char *ptr = &i;*++ptr=2;printf(“%d”,i);}what is output?

a)556 b)300 c)2 d)302

22.#includemain(){char *str =”yahoo”;char *ptr =str;char least =127;while(*ptr++)least = (*ptrprintf(“%d”,least);}what is the output?

a)0 b)127 c)yahoo d)y

23.Declare an array of M pointers to functions returing pointers to functions returing pointers to characters.a)(*ptr[M]()(char*(*)()); b)(char*(*)())(*ptr[M])()c)(char*(*)(*ptr[M]())(*ptr[M]() d)(char*(*)(char*()))(*ptr[M])();

24.void main(){int I =10, j=2;int *ip = &I ,*jp =&j;int k = *ip/*jp;printf(“%d”,k);

Page 24: CSC

}what is the output?

a)2 b)5 c)10 d)compile error:unexpected end of file in comment started in line 4

25.main(){char a[4] =”GOOGLE”;printf(“%s”,a);}what is the output?

a)2 b) GOOGLE c) compile error: yoo mant initializers d) linkage error.

26.For 1MB memory, the number of address lines required

a)12 b)16 c)20 d)32

27.There is a circuit using 3 nand gates with 2 inputes and 1 output,f ind the output.

a) AND b) OR c) XOR d) NAND

28.what is done for push operation

a) SP is incremented and then the value is stored.b) PC is incremented and then the value is stored.c) PC is decremented and then the value is stored.d) SP is decremented and then the value is stored.

29.Memory allocation of variables declared in a program is ------

a) Allocated in RAMb) Allocated in ROMc) Allocated in stackd) Assigned in registers.

30.What action is taken when the processer under execution is interrupted by TRAP in 8085MPU?

a) Processor serves the interrupt request after completing the execution of the current instruction.b) processer serves the interrupt request after completing the current task.c) processor serves the interrupt immediately.d) processor serving the interrupt request depent deprnds upon the priority of the current task under execution.

31.purpose of PC (program counter)in a microprocessor is ----

a) To store address of TOS(top of stack)b) To store address of next instructions to be executedc) count the number of instructions

Page 25: CSC

d) to store the base address of the stack.

32.conditional results after execution of an instruction in a microprocess is stored in

a) register b) accumulator c) flag register d) flag register part of PSW (program status word)

33.The OR gate can be converted to the NAND function by adding----gate(s)to the input of the OR gate.

a) NOT b) AND c) NOR d) XOR

34.In 8051microcontroller ,------has a dual function.

a) port 3 b) port 2 c) port 1 d) port 0

35.An 8085 based microprocessor with 2MHz clock frequency,will execute the following chunk of code with how much delay?MVI B,38HHAPPY: MVI C, FFHSADDY: DCR CJNZ SADDYDCR BJNC HAPPY

a) 102.3 b)114.5 c)100.5 d)120

36.In 8085 MPU what will be the status of the flag after the execution of the following chunk of code.

MVI B,FFHMOV A,BCMAHLT

a)S = 1, Z = 0, CY = 1 b)S = 0, Z = 1, CY = 0c) S = 1, Z = 0, CY = 0 d)S = 1, Z = 1 ,CY = 1

37.A positive going pulse which is always generated when 8085 MPU begins the machine cycle.

a) RD b) ALE c) WR d) HOLD

38.when a ----- instruction of 8085 MPU is fetched , its second and third bytes are placed in the W and Z registers.

a) JMP b) STA c) CALL d) XCHG

39.what is defined as one subdivision of the operation performed in one clock period.

a) T- State b) Instruction Cycle c) Machine Cycle d) All of the above

Page 26: CSC

40.At the end of the following code, what is the status of the flags.LXI B, AEC4HMOV A,CADD BHLT

a) S = 1, CY = 0, P = 0 , AC = 1 b) S =0 , CY = 1, P = 0,AC = 1c) S = 0, CY = 1, P = 0 , AC = 1 d) S = 0, CY = 1, P = 1 , AC = 1

 

Category IT

SubCategory Placement Papers

Location Noida - Delhi/NCR

Company CSC

About CSC:-

CSC was established in 1959. CSC developed smart, technology-enabled solutions to solve our clients' toughest challenges, demonstrating a commitment to excellence and a passion for exceeding expectations. CSC senior management team has an average of 25 years of domestic and international IT experience and a strong history of business, academic and technological accomplishments.

CSC (NYSE: CSC) reported trailing 12 months revenue of $16.2 billion for the third quarter ending December 31, 2010.

Why CSC - Why should i join CSC?:-

The Brand CSC:- The legendary CSC story only grows richer with age.

Great Work Culture:- CSC’s supportive work culture brings out the best in you.

Excellent People Practices:- When you join CSC, you become part of a caring family.

Dynamic Growth and Learning:- You’ll find opportunities to grow and learn all around you at CSC.

Embracing Diversity:- CSC has a strong commitment to supporting diversity of all kinds.

2011 CSC Placement Paper:-

1. In 8051 micro controller what is the HEX number in the accumulator after the execution of the

Page 27: CSC

following code.MOV A,#0A5HCLR CRRC ARRC ARL ARL ASWAP A

a)A6 b)6A c)95 d)A5.

2. The Pentium processor requires ------------ volts.

a)9 b)12 c)5 d)24.

3. The data bus on the Celeron processor is-------bits wide.

a)64 b)32 c)16 d)128.

4. K6 processor

a) Hitachi b) toshiba c) zilog d) AMD.

5. What is the control word for 8255 PPI,in BSR mode to set bit PC3.

a)0EH b)0FH c)07H d)06H.

6. The repeated execution of a loop of code while waiting for an event to occur is called ---------.The cpu is not engaged in any real productive activity during this period,and the process doesn’t progress towards completion.

a) dead lock b) busy waiting c) trap door d) none.

7. Transparent DBMS is defined as

a) A DBMS in which there are no program or user access languages. b) A DBMS which has no cross file capabilities but is user friendly and provides user interface management. c) A DBMS which keeps its physical structure hidden from user d) none.

8. Either all actions are carried out or none are.users should not have to worry about the effect of incomplete transctions.DBMS ensures this by undoing the actions of incomplete transctions.this property is known as

a) Aggregation b) atomicity c) association d) data integrity.

Page 28: CSC

9..------ algorithms determines where in available to load a program. common methods are first fit,next fit,best fit.--------- algorithm are used when memory is full , and one process (or part of a process) needs to be swaped out to accommodate a new program.The ------------- algorithm determines which are the partions to be swaped out.

a) placement, placement, replacementb) replacement, placement, placementc) replacement, placement, replacementd) placement, replacement, replacement

10. Trap door is a secret undocumented entry point into a program used to grant access without normal methods of access authentication.A trap is a software interrupt,usually the result of an error condition.

a)true b)false.

11. Given a binary search tree,print out the nodes of the tree according t5o post order traversal.

4/ \2 5/ \1 3

a)3,2,1,5,4. b)1,2,3,4,5. c)1,3,2,5,4. d)5,3,1,2,4.

12. which one of the following is the recursive travel technique.

a)depth first search b)preorder c)breadth first search d)none.

13. which of the following needs the requirement to be a binary search tree.

a) 5/ \2 7/1

b) 5/ \6 7

c) 5/ \2 7

Page 29: CSC

/\1 6

d) none.

14. in recursive implementations which of the following is true for saving the state of the steps

a)as full state on the stackb) as reversible action on the stackc)both a and bd)none

15. which of the following involves context switch

a)previliged instructionb)floating point exceptionc)system callsd)alle)none

16. piggy backing is a technique for

a)acknowledgeb)sequencec)flow controld)retransmission

17. a functional dependency XY is ___________dependency if removal of any attribute A from X means that the dependency does not hold any more

a)full functionalb) multi valuedc)single valuedd)none

18. a relation schema R is in BCNF if it is in ___________and satisfies an additional constraints that for every functional dependency XY,X must be a candidate key

a)1 NFb)2 NFc)3 NFd)5 NF

19. a _________sub query can be easily identified if it contains any references to the parent sub query columns in the _________ clause

Page 30: CSC

A) correlated ,WHEREb) nested ,SELECTc) correlated,SELECTd) none

20. hybrid devise that combines the features of both bridge and router is known as

a)router b)bridge c)hub d)brouter

21. which of the following is the most crucial phase of SDLC

a)testing b)code generation c) analysys and design d)implementation

22. to send a data packet using datagram ,connection will be established

a)no connection is requiredb) connection is not established before data transmissionc)before data transmissiond)none

23. a software that allows a personal computer to pretend as as computer terminal is

a) terminal adapterb)terminal emulationc)modemd)none

24. super key is

a) same as primary keyb) primary key and attributec) same as foreign keyd) foreign key and attribute

25. In binary search tree which traversal is used for ascending order values

a) Inorder b)preorder c)post order d)none

26. You are creating an index on ROLLNO colume in the STUDENT table.which statement will you use?

a) CREATE INDEX roll_idx ON student, rollno;b) CREATE INDEX roll_idx FOR student, rollno;c) CREATE INDEX roll_idx ON student( rollno);

Page 31: CSC

d) CREATE INDEX roll_idx INDEX ON student (rollno);

27. A________class is a class that represents a data structure that stores a number of data objects

a. container b.component c.base d.derived

28. Which one of the following phases belongs to the compiler Back-end.

a. Lexical Analysis b.Syntax Analysis c. Optimization d.Intermediate Representation.

29. Every context _sensitive language is context_free

a. true b.false

30. Input:A is non-empty list of numbers L

Xß-infinityFor each item in the list L,doIf the item>x,thenXßthe itemReturn XX represents:-

a)largest numberb)smallest numberc)smallest negative numberd) none

31. Let A and B be nodes of a heap,such that B is a child of A. the heap must then satisfy the following conditions

a)key(A)>=key(B)b)key(A)c)key(A)=key(B)d)none

32. String ,List,Stack,queue are examples of___________

a)primitive data typeb)simple data typec)Abstract data typed)none

33. which of the following is not true for LinkedLists?

Page 32: CSC

a)The simplest kind of linked list is a single linked list ,which has one link per node .this link points to the next node in the list,or to a null value or emptylist if it is the last node.b)a more sophisticated kind of linked list is a double linkedlist or two way linkedlist .Each node has two links ,one to the previous node and one to the next node.c) in a circleLinkedList ,the first and last nodes are linked together.this can be done only for double linked list.d) to traverse a circular linkedlist ,u begin at any node and follow the list in either direction until u return to the original node.

34. sentinel node at the beginning and /or at the end of the linkedlist is not used to store the data

a) trueb) false

1. Point out the error in the following program

main(){const char *fun();*fun()='A';}const char *fun(){return "Hello";}Ans. fun() returns to a "const char" pointer which cannot be modified

2. What would be the output of the following program?

main(){const int x=5;int *ptrx;ptrx=&x;*ptrx=10;printf("%d",x);}a) 5 b) 10 c) Error d) Garbage value

3. A switch statement cannot include

a) constants as arguments b) constant expression as argumentsc) string as an argument d) None of the above

Page 33: CSC

4. How long the following program will run?

main(){printf("\nSonata Software");main();}a) infinite loop b) until the stack overflowsc) All of the above d) None of the above

5. On combining the following statements, you will get char*p; p=malloc(100);

a) char *p= malloc(100) b) p= (char*)malloc(100)c) All of the above d) None of the above

6.Point out the error in the following program

main(){int a=10;void f();a=f();printf("\n%d",a);}void f(){printf("\nHi");}Ans. The program is trying to collect the value of a "void" function into an integer variable.

7. In the following program how would you print 50 using p?

main(){int a[]={10, 20, 30, 40, 50};char *p;p= (char*) a;}Ans. printf("\n%d",*((int*)p+4));

8. Would the following program compile?

main(){int a=10,*j;void *k;j=k=&a;j++;k++;

Page 34: CSC

printf("\n%u%u",j,k);}a) Yes b) No, the format is incorrectc) No, the arithmetic operation is not permitted on void pointersd) No, the arithmetic operation is not permitted on pointers

9. According to ANSI specifications which is the correct way of declaring main() when it receives command line arguments?

a) main(int argc, char *argv[]) b) main(argc,argv) int argc; char *argv[];c) main() {int argc; char *argv[]; } d) None of the above

10. What error would the following function give on compilation?

f(int a, int b){int a;a=20;return a;}a) missing parenthesis in the return statement b) The function should be declared as int f(int a, int b)c) redeclaration of a d) None of the above

11.  If the program (myprog) is run from the command line as myprog 1 2 3 , What would be the output?

main(int argc, char *argv[]){int i;for(i=0;i<argc;i++)printf("%s",argv[i]);}a) 1 2 3 b) C:\MYPROG.EXE 1 2 3c) MYP d) None of the above

12. If the following program (myprog) is run from the command line as myprog 1 2 3, What would be the output?

main(int argc, char *argv[]){int i,j=0;for(i=0;i<argc;i++)j=j+ atoi(argv[i]);printf("%d",j);}a) 1 2 3 b) 6 c) error d) "123"

13. If the following program (myprog) is run from the command line as myprog monday tuesday wednesday thursday? What would be the output?

Page 35: CSC

main(int argc, char *argv[]){while(--argc >0)printf("%s",*++argv);}a) myprog monday tuesday wednesday thursday b) monday tuesday wednesday thursdayc) myprog tuesday thursday d) None of the above

14. In the following code, is p2 an integer or an integer pointer?

typedef int* ptrptr p1,p2;Ans. Integer pointer

15. If the following program (myprog) is run from the command line as myprog friday tuesday sunday, What would be the output?

main(int argc, char *argv[]){while(sizeofargv)printf("%s",argv[--sizeofargv]);}a) myprog friday tuesday sunday b) myprog friday tuesdayc) sunday tuesday friday myprog d) sunday tuesday friday

16. What would be the output of the following program?

main(){int i=4;switch(i){default:printf("\n A mouse is an elephant built by the Japanese");case 1:printf(" Breeding rabbits is a hair raising experience");break;case 2:printf("\n Friction is a drag");break;case 3:printf("\n If practice make perfect, then nobody's perfect");}}a) A mouse is an elephant built by the Japanese b) Breeding rabbits is a hare raising experiencec) All of the above d) None of the above

17. What is the output of the following program?

Page 36: CSC

#define SQR(x) (x*x)main(){int a,b=3;a= SQR(b+2);printf("%d",a);}a) 25 b) 11 c) error d) garbage value

18. In which line of the following, an error would be reported?1. #define CIRCUM(R) (3.14*R*R);2. main()3. {4. float r=1.0,c;5. c= CIRCUM(r);6. printf("\n%f",c);7. if(CIRCUM(r))==6.28)8. printf("\nGobbledygook");9. }a) line 1 b) line 5 c) line 6 d) line 7

19. What is the type of the variable b in the following declaration?

#define FLOATPTR float*FLOATPTR a,b;a) float b) float pointer c) int d) int pointer

20. In the following code;#include<stdio.h>main(){FILE *fp;fp= fopen("trial","r");}fp points to:a) The first character in the file.b) A structure which contains a "char" pointer which points to the first character in the file.c) The name of the file. d) None of the above.

  Company Details

About CSC:-

A Fortune 200 company, CSC is one of the world's largest and most respected providers of information technology services since 1959, Headquarters in Falls Church, Virginia, USA. For more than 50 years, CSC has developed smart, technology-enabled solutions to solve their clients' toughest challenges, demonstrating a commitment to excellence and a passion for exceeding expectations. CSC is also a leading provider of information technology services to commercial and government markets worldwide.

Page 37: CSC

The CSC culture of innovation powers every advanced capability they deliver - in systems design and integration, information technology and business process outsourcing, applications software development, Web and application hosting, mission support and management consulting

Careers at CSC:-

Today CSC is the world’s oldest IT services company, one of the Big Six and one of the Fortune 200. With approximately 91,000 employees in 92 countries worldwide, CSC offers their clients a wealth of experience and an unparalleled scope of services across 12 industries.

GlobalSource is CSC’s career development and job search site bringing you employment opportunities in real time — 24 hours a day, 7 days a week. CSCs powerful search capability makes it easy for you to find the job you’re looking for in the country and location you want. From C++ to SOAP, Java to COGNOS, CSC India offers careers in an unmatched array of technologies and industries.

CSC offers entry-level positions in both business and technical areas to fresh engineering / diploma / business administration graduates. Their Entry-Level Campus Hiring Program rotates qualified graduates through various technical training positions over a one-year period. Successful completion of this program prepares you for key technical positions within CSC India.