[go: up one dir, main page]

0% found this document useful (0 votes)
83 views8 pages

Tagore Institute of Engineering and Technology

This document contains a faculty interview question set with 50 multiple choice questions related to computer science topics like operating systems, computer networks, databases, algorithms, and programming. The questions cover concepts such as critical sections, thrashing, subnet masks, SQL triggers, PERT charts, data structures, C programming, Java threads, .NET frameworks, regular expressions, and complexity analysis.

Uploaded by

csetiet csetiet
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
83 views8 pages

Tagore Institute of Engineering and Technology

This document contains a faculty interview question set with 50 multiple choice questions related to computer science topics like operating systems, computer networks, databases, algorithms, and programming. The questions cover concepts such as critical sections, thrashing, subnet masks, SQL triggers, PERT charts, data structures, C programming, Java threads, .NET frameworks, regular expressions, and complexity analysis.

Uploaded by

csetiet csetiet
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Tagore Institute of Engineering and Technology

Department of Computer Science and Engineering


Faculty Interview Question – Set 1

Name of the Candidate:


Date:

1. To avoid the race condition, the number of processes that may be simultaneously inside their
critical section is
A
8
.
B.1
C.16
D
0
.
E. None of the above

2. Thrashing
A
is a natural consequence of virtual memory systems
.
B.can always be avoided by swapping
C.always occurs on large computers
D
can be caused by poor paging algorithms
.
E. None of the above

3. How many digits of the DNIC (Data Network Identification Code) identify the country?
A
first three
.
B.first four
C.first five
D
first six
.
E. None of the above

4. You have a class A network address 10.0.0.0 with 40 subnets, but are required to add 60 new
subnets very soon. You would like to still allow for the largest possible number of host IDs per
subnet. Which subnet mask should you assign?
A
255.240.0.0 B.255.248.0.0
.
C.255.252.0.0 D.255.254.0.0
E. 255.255.255.255

5. How many hosts are attached to each of the local area networks at your site?
A
128
.
B.254
C.256
D 64
.
E. None of the above
6. Programming a robot by physically moving it through the trajectory you want it to follow is
called:
A
contact sensing control
.
B.continuous-path control
C.robot vision control
D
pick-and-place control
.
E. None of the above

7. An AI technique that allows computers to understand associations and relationships between


objects and events is called:
A
heuristic processing
.
B.cognitive science
C.relative symbolism
D
pattern matching
.
E. None of the above

8. Ambiguity may be caused by:


A
syntactic ambiguity
.
B.multiple word meanings
C.unclear antecedents
D
All of the above
.
E. None of the above

9. In SQL, which command(s) is(are) used to enable/disable a


database trigger?
A
MODIFY USER
.
B.CHANGE USER
C.ALTER TRIGGER
D
All of the above
.
E. None of the above

10. Critical path of the PERT chart is:


A
path which takes the longest time to complete the project
.
B.the shortest path
C.both of the above
D
path which takes the shortest time to complete the project
.
E. None of the above

11. A Ring, refers to a record chain, the last of which refers to the first record, in the chain, is
called a/an
A
addressing
.
B.location
C.pointer
D
loop
.
E. None of the above

12. In raster-scan colour monitors, colour can be intensified by:


A
grouping the phosphor dots in a circular pattern
.
B.having each electron gun controlled by a composite signal
C.using an in-line gun arrangement with a solid metal mesh
D
having each electron gun controlled by separate signal
.
E. None of the above

13. Speech recognition:


A
will never be used in industrial controls
.
B.is already widely used in industrial controls
C.will be used in more applications as the technology matures.
D
All of the above
.
E. None of the above

14. Which of the following are valid characters for a numeric literal constant?
A
a comma
.
B.a dollar sign ($)
C.a percent sign (%)
D
a space
.
E. None of the above

15. In a file contains the line "I am a boy\r\n" then on reading this line into the array str using
fgets(). What will str contain?
A
"I am a boy\r\n\0" B."I am a boy\r\0"
.
C."I am a boy\n\0" D."I am a boy"

16. What will the SWAP macro in the following program be expanded to on preprocessing? will
the code compile?
#include<stdio.h>
#define SWAP(a, b, c)(c t; t=a, a=b, b=t)
int main()
{
int x=10, y=20;
SWAP(x, y, int);
printf("%d %d\n", x, y);
return 0;
}
A
It compiles
.
B.Compiles with an warning
C.Not compile
D
Compiles and print nothing
.

17.Declare the following statement?


"A pointer to an array of three chars".
A
char *ptr[3](); B.char (*ptr)*[3];
.
D
C.char (*ptr[3])(); char (*ptr)[3];
.

18. Which of the following is the correct order if calling functions in the below code?
a = f1(23, 14) * f2(12/4) + f3();
A
f1, f2, f3
.
B.f3, f2, f1
C.Order may vary from compiler to compiler
D
None of above
.

19. What is stderr ?


A
standard error B.standard error types
.
C.standard error streams D.standard error definitions

20. How will you free the memory allocated by the following program?
#include<stdio.h>
#include<stdlib.h>
#define MAXROW 3
#define MAXCOL 4
int main()
{
int **p, i, j;
p = (int **) malloc(MAXROW * sizeof(int*));
return 0;
}
A
memfree(int p); B.dealloc(p);
.
C.malloc(p, 0); D.free(p);

21. Which bitwise operator is suitable for checking whether a particular bit is on or off?
A
&& operator B.& operator
.
D
C.|| operator ! operator
.

22. What will be the output of the program ?


#include<stdio.h>
int main()
{
enum days {MON=-1, TUE, WED=6, THU, FRI, SAT};
printf("%d, %d, %d, %d, %d, %d\n", MON, TUE, WED, THU, FRI, SAT);
return 0;
}
A
-1, 0, 1, 2, 3, 4 B.-1, 2, 6, 3, 4, 5
.
C.-1, 0, 6, 2, 3, 4 D.-1, 0, 6, 7, 8, 9

23. Which two are valid constructors for Thread?


1. Thread(Runnable r, String name)
2. Thread()
3. Thread(int priority)
4. Thread(Runnable r, ThreadGroup g)
5. Thread(Runnable r, int priority)
A
1 and 3 B.2 and 4
.
C.1 and 2 D.2 and 5

24. Which of the following is the root of the .NET type hierarchy?
A
System.Object
.
B.System.Type
C.System.Base
D
System.Parent
.
E. System.Root

25. Which of the following will be the correct output for the C#.NET code snippet given below?
String s1 = "ALL MEN ARE CREATED EQUAL";
String s2;
s2 = s1.Substring(12, 3);
Console.WriteLine(s2);
A
ARE B.CRE
.
C.CR D.REA
E. CREATED

 26. A single packet on a data link is known as_____________________________________


27. A system program that combines the separately compiled modules of a program into a form
suitable for execution is _____________________________________________________

28. In vi editor, forward search is performed using the command is ____________________

29. In OSI network architecture, the dialogue control and token management are responsible
of_________________________________________________

30. Contention is_______________________________________________________________

31. In CRC there is no error if the remainder at the receiver is ___________________________

32. Each of data files has a _________________that describe the way the data is stored in the
file.

33. Constructor is executed when ____________________

34. Copy constructor must receive its arguments by ________________________________

35. A reference is declared using the _____________ symbol.

36. What are the notations used in Evaluation of Arithmetic Expressions using prefix and postfix
forms___________________________________________________________________

37. A_____________ variable is a variable that may not be serialized.

38. The gap between what applications expects and what the underlying technology can provide
is called______________________

39. The regular expression for an identifier is__________________________


40. The process of factoring out of common prefixes of alternates is
called__________________________

41. The time complexity for summation of N numbers is________________

42. __________________________ is a type of absolute loader which loads the first program to
be run by the computer.

43. ____________________is the concept of distributed computing technologies for computing


resource sharing among participants in a virtualized collection of organization.

44. A register in the microprocessor that keeps track of the answer or results of any arithmetic or
logic operation is the ____________________
45. ______________________is a document produced at the time of requirement gathering
process.

46. ______________________is a measure that defines the degree of intra-dependability among


the elements of the module.

47. A ___________________ is any device that prevents a specific type of information from
moving between the untrusted network outside and the trusted network inside

48. _________________are decoy systems designed to lure potential attackers away from
critical systems and encourage attacks against the themselves.

49. _______________________is the process of obtaining the original message(called


plaintext) from an encrypted message(called the ciphertext) without knowing the algorithms and
keys used to perform the encryption.

50. _______________________is a technique used to gain unauthorized access whereby the


intruder sends messages to a computer with an IP address indicating that the message is coming
from a trusted host.

You might also like