Technical Interview Questions
Technical Interview Questions
Technical Interview Questions
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. What does static variable mean? What is a pointer? What is a structure? What are the differences between structures and arrays? In header files whether functions are declared or defined? What are the differences between malloc() and calloc()? What are macros? what are its advantages and disadvantages? Difference between pass by reference and pass by value? What is static identifier? Where are the auto variables stored? Where does global, static, local, register variables, free memory and C Program instructions get stored? Difference between arrays and linked list? What are enumerations? Describe about storage allocation and scope of global, extern, static, local and register variables? What are register variables? What are the advantage of using register variables? What is the use of typedef? Can we specify variable field width in a scanf() format string? If possible how? Out of fgets() and gets() which function is safe to use and why? Difference between strdup and strcpy? What is recursion? Differentiate between a for loop and a while loop? What are it uses? What are the different storage classes in C? Write down the equivalent pointer expression for referring the same element a[i][j][k][l]? What is difference between Structure and Unions? What the advantages of using Unions? What are the advantages of using pointers in a program? What is the difference between Strings and Arrays? In a header file whether functions are declared or defined? What is a far pointer? where we use it? How will you declare an array of three function pointers where each function receives two ints and returns a float? what is a NULL Pointer? Whether it is same as an uninitialized pointer? What is a NULL Macro? What is the difference between a NULL Pointer and a NULL Macro? What does the error 'Null Pointer Assignment' mean and what causes this error? What is near, far and huge pointers? How many bytes are occupied by them? How would you obtain segment and offset addresses from a far address of a memory location? Are the expressions arr and &arr same for an array of integers? Does mentioning the array name gives the base address in all the contexts?
80. 81. 82. 83. 84. 85. 86. 87. 88. 89. 90. 91. 92. 93. 94.
C++ Questions
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37.
What is a class? What is an object? What is the difference between an object and a class? What is the difference between class and structure? What is public, protected, private? What are virtual functions? What is friend function? What is a scope resolution operator? What do you mean by inheritance? What is abstraction? What is polymorphism? Explain with an example. What is encapsulation? What do you mean by binding of data and functions? What is function overloading and operator overloading? What is virtual class and friend class? What do you mean by inline function? What do you mean by public, private, protected and friendly? When is an object created and what is its lifetime? What do you mean by multiple inheritance and multilevel inheritance? Differentiate between them. Difference between realloc() and free? What is a template? What are the main differences between procedure oriented languages and object oriented languages? What is R T T I ? What are generic functions and generic classes? What is namespace? What is the difference between pass by reference and pass by value? Why do we use virtual functions? What do you mean by pure virtual functions? What are virtual classes? Does c++ support multilevel and multiple inheritance? What are the advantages of inheritance? When is a memory allocated to a class? What is the difference between declaration and definition? What is virtual constructors/destructors? In c++ there is only virtual destructors, no constructors. Why? What is late bound function call and early bound function call? Differentiate. How is exception handling carried out in c++?
OOAD
1. What do you mean by analysis and design? Analysis: Basically, it is the process of determining what needs to be done before how it should be done. In order to accomplish this, the developer refers the existing systems and documents. So, simply it is an art of discovery. Design: It is the process of adopting/choosing the one among the many, which best accomplishes the users needs. So, simply, it is compromising mechanism. 2. What are the steps involved in designing? Before getting into the design the designer should go through the SRS prepared by the System Analyst. The main tasks of design are Architectural Design and Detailed Design. In Architectural Design we find what are the main modules in the problem domain. In Detailed Design we find what should be done within each module. 3. What are the main underlying concepts of object orientation? Objects, messages, class, inheritance and polymorphism are the main concepts of object orientation. 4. What do u meant by "SBI" of an object? SBI stands for State, Behavior and Identity. Since every object has the above three. State: It is just a value to the attribute of an object at a particular time. Behaviour: It describes the actions and their reactions of that object. Identity: An object has an identity that characterizes its own existence. The identity makes it possible to distinguish any object in an unambiguous way, and independently from its state. 5. Differentiate persistent & non-persistent objects? Persistent refers to an object's ability to transcend time or space. A persistent object stores/saves its state in a permanent storage system with out losing the information represented by the object. A non-persistent object is said to be transient or ephemeral. By default objects are considered as non-persistent.
uses
class A
class B
Aggregation: Its' the relationship between two classes which are related in the fashion that master and slave. The master takes full rights than the slave. Since the slave works under the master. It is represented as line with diamond in the master area. ex: car contains wheels, etc. car car
wheels
Containment: This relationship is applied when the part contained with in the whole part, dies when the whole part dies.
class A
class B
Generalization: This relationship used when we want represents a class, which captures the common states of objects of different classes. It is represented as arrow line pointed at the class, which has captured the common states.
class A
class B
class C
Dependency: It is the relationship between dependent and independent classes. Any change in the independent class will affect the states of the dependent class. DIAGRAM: class A class B 11. Why generalization is very strong? Even though Generalization satisfies Structural, Interface, Behaviour properties. It is mathematically very strong, as it is Antisymmetric and Transitive. Antisymmetric: employee is a person, but not all persons are employees. Mathematically all As are B, but all Bs not A. Transitive: A=>B, B=>c then A=>c. A. Salesman. B. Employee. C. Person. Note: All the other relationships satisfy all the properties like Structural properties, Interface properties, Behaviour properties. 12. Differentiate Aggregation and containment? Aggregation is the relationship between the whole and a part. We can add/subtract some properties in the part (slave) side. It won't affect the whole part. Best example is Car, which contains the wheels and some extra parts. Even though the parts are not there we can call it as car.
Booch: In this method classes are represented as "Clouds" which are not very easy to draw as for as the developer's view is concern. Diagram:
18. What is an USECASE? Why it is needed? A Use Case is a description of a set of sequence of actions that a system performs that yields an
19. Who is an Actor? An Actor is someone or something that must interact with the system.In addition to that an Actor initiates the process(that is USECASE). It is represented as a stickman like this. Diagram:
20. What is guard condition? Guard condition is one, which acts as a firewall. The access from a particular object can be made only when the particular condition is met. For Example, customer check customer number ATM. Here the object on the customer accesses the ATM facility only when the guard condition is met. 21. Differentiate the following notations? I: :obj1 :obj2 II: :obj1 :obj2
In the above representation I, obj1 sends message to obj2. But in the case of II the data is transferred from obj1 to obj2. 22. USECASE is an implementation independent notation. How will the designer give the implementation details of a particular USECASE to the programmer? This can be accomplished by specifying the relationship called "refinement which talks about the two different abstraction of the same thing. Or example, calculate pay calculate class1 class2 class3 23. Suppose a class acts an Actor in the problem domain, how to represent it in the static model? In this scenario you can use stereotype. Since stereotype is just a string that gives extra semantic to the particular entity/model element. It is given with in the << >>. class A
10
11
Data Structures
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. What is a data structure? What does abstract data type means? Evaluate the following prefix expression " ++ 26 + - 1324" (Similar types can be asked) Convert the following infix expression to post fix notation ((a+2)*(b+4)) -1 (Similar types can be asked) How is it possible to insert different type of elements in stack? Stack can be described as a pointer. Explain. Write a Binary Search program Write programs for Bubble Sort, Quick sort Explain about the types of linked lists How would you sort a linked list? Write the programs for Linked List (Insertion and Deletion) operations What data structure would you mostly likely see in a non recursive implementation of a recursive algorithm? What do you mean by Base case, Recursive case, Binding Time, Run-Time Stack and Tail Recursion? Explain quick sort and merge sort algorithms and derive the time-constraint relation for these. Explain binary searching, Fibinocci search. What is the maximum total number of nodes in a tree that has N levels? Note that the root is level (zero) How many different binary trees and binary search trees can be made from three nodes that contain the key values 1, 2 & 3? A list is ordered from smaller to largest when a sort is called. Which sort would take the longest time to execute? A list is ordered from smaller to largest when a sort is called. Which sort would take the shortest time to execute? When will you sort an array of pointers to list elements, rather than sorting the elements themselves? The element being searched for is not found in an array of 100 elements. What is the average number of comparisons needed in a sequential search to determine that the element is not there, if the elements are completely unordered? What is the average number of comparisons needed in a sequential search to determine the position of an element in an array of 100 elements, if the elements are ordered from largest to smallest?
12
3. What are the major data structures used in the following areas : RDBMS, Network data model & Hierarchical data model. RDBMS Array (i.e. Array of structures) Network data model Graph Hierarchical data model Trees 4. If you are using C language to implement the heterogeneous linked list, what pointer type will you use? The heterogeneous linked list contains different data types in its nodes and we need a link, pointer to connect them. It is not possible to use ordinary pointers for this. So we go for void pointer. Void pointer is capable of storing pointer to any type as it is a generic pointer type. 5. Minimum number of queues needed to implement the priority queue? Two. One queue is used for actual storing of data and another for storing priorities. 6. What is the data structures used to perform recursion? Stack. Because of its LIFO (Last In First Out) property it remembers its caller so knows whom to return when the function has to return. Recursion makes use of system stack for storing the return addresses of the function calls.
13
Null Branches
It will have only 6 (ie,5+1) null branches. In general, A binary tree with n nodes has exactly n+1 null nodes. 11. What are the methods available in storing sequential files ? Straight merging, Natural merging, Polyphase sort, Distribution of Initial runs.
12. How many different trees are possible with 10 nodes ? 1014 For example, consider a tree with 3 nodes(n=3), it will have the maximum combination of 5 different (ie, 23 - 3 = 5) trees.
14
ii
iii
iv
In general: If there are n nodes, there exist 2n-n different trees. 13. List out few of the Application of tree data-structure? The manipulation of Arithmetic expression, Symbol Table construction, Syntax analysis.
14. List out few of the applications that make use of Multilinked Structures? Sparse matrix, Index generation. 15. In tree construction which is the suitable efficient data structure? (a) Array (b) Linked list (c) Stack (d) Queue (e) none (b) Linked list 16. What is the type of the algorithm used in solving the 8 Queens problem? Backtracking 17. In an AVL tree, at what condition the balancing is to be done? If the pivotal value (or the Height factor) is greater than 1 or less than 1. 18. What is the bucket size, when the overlapping and collision occur at same time? One. If there is only one entry possible in the bucket, when the collision occurs, there is no way to accommodate the colliding value. This results in the overlapping of values. 19. Traverse the given tree using Inorder, Preorder and Postorder traversals.
Given tree:
A
G 15
Inorder : D H B E A F C I G J Preorder: A B D H E C F G I J Postorder: H D E B F I J G C A 20. There are 8, 15, 13, 14 nodes were there in 4 different trees. Which of them could have formed a full binary tree? 15. In general: There are 2n-1 nodes in a full binary tree. By the method of elimination: Full binary trees contain odd number of nodes. So there cannot be full binary trees with 8 or 14 nodes, so rejected. With 13 nodes you can form a complete binary tree but not a full binary tree. So the correct answer is 15. Note: Full and Complete binary trees are different. All full binary trees are complete binary trees but not vice versa. 21. In the given binary tree, using array you can store the node 4 at which location?
4
At location 6 1 Root 2 LC1 3 RC1
5
LC2 RC2 4 LC3 RC3 LC4 5 RC4
where LCn means Left Child of node n and RCn means Right Child of node n 22. Sort the given values using Quick Sort? 65 70 75 80 85 60 55 50 45
16
Since pivot is not yet changed the same process is continued after interchanging the values at positions 65 65 65 65 45 45 45 45 75 L 50 50 50 80 80 L 55 55 85 85 85 L 60 R 60 60 60 R 85 L 55 55 R 80 80 50 R 75 75 75 70 70 70 70
and
When the L and R pointers cross each other the pivot value is interchanged with the value at right pointer. If the pivot is changed it means that the pivot has occupied its original position in the sorted order (shown in bold italics) and hence two different arrays are formed, one from start of the original array to the pivot position-1 and the other from pivot position+1 to end. 60 L 55 L 50 L 45 45 45 R 50 50 R 55 55 R 60 60 65 65 65 85 L 70 R 70 80 80 L 80 L 75 75 75 R 70 R 85 85
23. For the given graph, draw the DFS and BFS?
A X G
BFS: DFS: AXGHPEMYJ AXHPEYMJG
H E P
Y M J
24. Classify the Hashing Functions based on the various methods by which the key value is found.
17
25. What are the types of Collision Resolution Techniques and the methods used in each of the type? Open addressing (closed hashing), The methods used include: Overflow block, Closed addressing (open hashing) The methods used include: Linked list, Binary tree 26. In RDBMS, what is the efficient data structure used in the internal storage representation? B+ tree. Because in B+ tree, all the data is stored only in leaf nodes, that makes searching easier. This corresponds to the records that shall be stored in leaf nodes. 27. Draw the B-tree of order 3 created by inserting the following data arriving in sequence 92 24 6 7 11 8 22 4 5 16 19 20 78
11
19
24
16
20
22
78
92
28. Of the following tree structure, which is, efficient considering space and time complexities? (a) Incomplete Binary Tree (b) Complete Binary Tree (c) Full Binary Tree (b) Complete Binary Tree. By the method of elimination: Full binary tree loses its nature when operations of insertions and deletions are done. For incomplete binary trees, extra storage is required and overhead of NULL node checking takes place. So complete binary tree is the better one since the property of complete binary tree is maintained even after operations like additions and deletions are done on it. 29. What is a spanning Tree?
18
612
2985
200
410
310
5
400
1421
410 2
32. Which is the simplest file structure? (a) Sequential (b) Indexed (c) Random (a) Sequential 33. Whether Linked List is linear or Non-linear - data structure? According to Access strategies Linked list is a linear one. According to Storage Linked List is a Non-linear one. 34. Draw a binary Tree for the expression :
A * B - (C + D) * (P / Q)
/ 19
35. For the following COBOL code, draw the Binary tree? 01 STUDENT_REC. 02 NAME. 03 FIRST_NAME PIC X(10). 03 LAST_NAME PIC X(10). 02 YEAR_OF_STUDY. 03 FIRST_SEM PIC XX. 03 SECOND_SEM PIC XX.
01 STUDENT_REC
02
NAME
02
YEAR_OF_STUDY
03
FIRST_NAME
03
LAST_NAME
03
FIRST_SEM
03
SECOND_SEM
20
Java
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. What is the difference between an Abstract class and Interface? What is user defined exception? What do you know about the garbage collector? What is the difference between java and c++? In an htm form I have a button which makes us to open another page in 15 seconds. How will you do that? What is the difference between process and threads? What is update method called? Have you ever used HashTable and Directory? What are statements in Java? What is a JAR file? What is JNI? What is the base class for all swing components? What is JFC? What is the difference between AWT and Swing? Considering notepad/IE or any other thing as process, What will happen if you start notepad or IE 3 times ? Where three processes are started or three threads are started? How does thread synchronization occur in a monitor? Is there any tag in htm to upload and download files? Why do you canvas? How can you know about drivers and database information ? What is serialization? Can you load the server object dynamically? If so what are the 3 major steps involved in it? What is the layout for toolbar? What is the difference between Grid and Gridbaglayout? How will you add panel to a frame? Where are the card layouts used?
21
22
23
Advanced Java
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. What is RMI? Explain about RMI Architecture? What are Servelets? What is the use of servlets? Explain RMI Architecture? How will you pass values from htm page to the servlet? How do you load an image in a Servelet? What is purpose of applet programming? How will you communicate between two applets? What IS the difference between Servelets and Applets? How do you communicate in between Applets and Servlets? What is the difference between applet and application? What is the difference between CGI and Servlet? In the servlets, we are having a web page that is invoking servlets ,username and password? which is checks in database? Suppose the second page also if we want to verify the same information whether it will connect to the database or it will be used previous information? What are the difference between RMI and Servelets? How will you call an Applet using Java Script Function? How can you push data from an Applet to a Servlet? What are 4 drivers available in JDBC? At what situation are four of the drivers used? If you are truncated using JDBC , how can you that how much data is truncated? How will you perform truncation using JDBC? What is the latest version of JDBC? What are the new features added in that? What is the difference between RMI registry and OS Agent? To a server method, the client wants to send a value 20, with this value exceeds to 20 a message should be sent to the client . What will you do for achieving this?
24
25
Micro processor
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. Which type of architecture 8085 has? How many memory locations can be addressed by a microprocessor with 14 address lines? 8085 is how many bit microprocessor? Why is data bus bi-directional? What is the function of accumulator? What is flag, bus? What are tri-state devices and why they are essential in a bus oriented system? Why are program counter and stack pointer 16-bit registers? What does it mean by embedded system? What are the different addressing modes in 8085? What is the difference between MOV and MVI? What are the functions of RIM, SIM, IN? What is the immediate addressing mode? What are the different flags in 8085? What happens during DMA transfer? What do you mean by wait state? What is its need? What is PSW? What is ALE? Explain the functions of ALE in 8085. What is a program counter? What is its use? What is an interrupt? Which line will be activated when an output device require attention from CPU?
26
Computer Networks
What are the two types of transmission technology available? (i) Broadcast and (ii) point-to-point 1. What is subnet? A generic term for section of a large networks usually separated by a bridge or router. 2. Difference between the communication and transmission. Transmission is a physical movement of information and concern issues like bit polarity, synchronisation, clock etc. Communication means the meaning full exchange of information between two communication media. 3. What are the possible ways of data exchange? (i) Simplex (ii) Half-duplex (iii) Full-duplex. 4. What is SAP? Series of interface points that allow other computers to communicate with the other layers of network protocol stack. 5. What do you meant by "triple X" in Networks? The function of PAD (Packet Assembler Disassembler) is described in a document known as X.3. The standard protocol has been defined between the terminal and the PAD, called X.28; another standard protocol exists between hte PAD and the network, called X.29. Together, these three recommendations are often called "triple X" 6. What is frame relay, in which layer it comes? Frame relay is a packet switching technology. It will operate in the data link layer.
27
28
29
30
31
32
33
Data Base management 1. What is database? A database is a logically coherent collection of data with some inherent meaning, representing system some aspect of real world and which is designed, built and populated with data for a specific purpose.
2. What is DBMS? It is a collection of programs that enables user to create and maintain a database. In other words it is general-purpose software that provides the users with the processes of defining, constructing and manipulating the database for various applications. 3. What is a Database system? The database and DBMS software together is called as Database system. 4. Advantages of DBMS? Redundancy is controlled. Unauthorised access is restricted. Providing multiple user interfaces. Enforcing integrity constraints. Providing backup and recovery.
5. Disadvantage in File Processing System? Data redundancy & inconsistency. Difficult in accessing data.
34
6. Describe the three levels of data abstraction? The are three levels of abstraction: Physical level: The lowest level of abstraction describes how data are stored. Logical level: The next higher level of abstraction, describes what data are stored in database and what relationship among those data. View level: The highest level of abstraction describes only part of entire database. 7. Define the "integrity rules" There are two Integrity rules. Entity Integrity: States that Primary key cannot have NULL value Referential Integrity: States that Foreign Key can be either a NULL value or should be Primary Key value of other relation. 8. What is extension and intension? Extension It is the number of tuples present in a table at any instance. This is time dependent. Intension It is a constant value that gives the name, structure of table and the constraints laid on it. 9. What is System R? What are its two major subsystems? System R was designed and developed over a period of 1974-79 at IBM San Jose Research Center. It is a prototype and its purpose was to demonstrate that it is possible to build a Relational System that can be used in a real life environment to solve real life problems, with performance at least comparable to that of existing system. Its two subsystems are Research Storage System Relational Data System. 10. How is the data structure of System R different from the relational structure? Unlike Relational systems in System R Domains are not supported Enforcement of candidate key uniqueness is optional Enforcement of entity integrity is optional Referential integrity is not enforced 11. What is Data Independence? Data independence means that the application is independent of the storage structure and access strategy of data. In other words, The ability to modify the schema definition in one level should not affect the schema definition in the next higher level. Two types of Data Independence: Physical Data Independence: Modification in physical level should not affect the logical level. Logical Data Independence: Modification in logical level should affect the view level. NOTE: Logical Data Independence is more difficult to achieve
35
36
37
38
50. What is 5NF? A Relation schema R is said to be 5NF if for every join dependency {R1, R2, ..., Rn} that holds R, one the following is true Ri = R for some i. The join dependency is implied by the set of FD, over R in which the left side is key of R. 51. What is Domain-Key Normal Form? A relation is said to be in DKNF if all constraints and dependencies that should hold on the the constraint can be enforced by simply enforcing the domain constraint and key constraint on the relation. 52. What are partial, alternate,, artificial, compound and natural key? Partial Key: It is a set of attributes that can uniquely identify weak entities and that are related to same owner entity. It is sometime called as Discriminator. Alternate Key: All Candidate Keys excluding the Primary Key are known as Alternate Keys. Artificial Key: If no obvious key, either stand alone or compound is available, then the last resort is to simply create a key, by assigning a unique number to each record or occurrence. Then this is known as developing an artificial key. Compound Key: If no single data element uniquely identifies occurrences within a construct, then combining multiple elements to create a unique identifier for the construct is known as creating a compound key. Natural Key:
39
40
41
42
43
44
In addition to this list of exceptions, there is a catch-all exception named OTHERS that traps all errors for which specific error handling has not been established. 88. Does PL/SQL support "overloading"? Explain The concept of overloading in PL/SQL relates to the idea that you can define procedures and functions with the same name. PL/SQL does not look only at the referenced name, however, to resolve a procedure or function call. The count and data types of formal parameters are also considered. PL/SQL also attempts to resolve any procedure or function calls in locally defined packages before looking at globally defined packages or internal functions. To further ensure calling the proper procedure, you can use the dot notation. Prefacing a procedure or function name with the package name fully qualifies any procedure or function reference. 89. Tables derived from the ERD a) Are totally unnormalised b) Are always in 1NF c) Can be further denormalised d) May have multi-valued attributes
45
46
47
48
Operating systems
Following are a few basic questions that cover the essentials of OS: 1. Explain the concept of Reentrancy. It is a useful, memory-saving technique for multiprogrammed timesharing systems. A Reentrant Procedure is one in which multiple users can share a single copy of a program during the same period. Reentrancy has 2 key aspects: The program code cannot modify itself, and the local data for each user process must be stored separately. Thus, the permanent part is the code, and the temporary part is the pointer back to the calling program and local variables used by that program. Each execution instance is called activation. It executes the code in the permanent part, but has its own copy of local variables/parameters. The temporary part associated with each activation is the activation record. Generally, the activation record is kept on the stack. Note: A reentrant procedure can be interrupted and called by an interrupting program, and still execute correctly on returning to the procedure.
49
6. What are short-, long- and medium-term scheduling? Long term scheduler determines which programs are admitted to the system for processing. It controls the degree of multiprogramming. Once admitted, a job becomes a process. Medium term scheduling is part of the swapping function. This relates to processes that are in a blocked or suspended state. They are swapped out of real-memory until they are ready to execute. The swapping-in decision is based on memory-management criteria. Short term scheduler, also know as a dispatcher executes most frequently, and makes the finestgrained decision of which process should execute next. This scheduler is invoked whenever an event occurs. It may lead to interruption of one process by preemption. 7. What are turnaround time and response time? Turnaround time is the interval between the submission of a job and its completion. Response time is the interval between submission of a request, and the first response to that request. 8. What are the typical elements of a process image? User data: Modifiable part of user space. May include program data, user stack area, and programs that may be modified. User program: The instructions to be executed. System Stack: Each process has one or more LIFO stacks associated with it. Used to store parameters and calling addresses for procedure and system calls. Process control Block (PCB): Info needed by the OS to control processes. 9. What is the Translation Lookaside Buffer (TLB)? In a cached system, the base addresses of the last few referenced pages is maintained in registers called the TLB that aids in faster lookup. TLB contains those page-table entries that have been most recently used. Normally, each virtual memory reference causes 2 physical memory accesses-- one to fetch appropriate page-table entry, and one to fetch the desired data. Using TLB in-between, this is reduced to just one physical memory access in cases of TLB-hit.
50
51
52
31. What is SMP? To achieve maximum efficiency and reliability a mode of operation known as symmetric multiprocessing is used. In essence, with SMP any process or threads can be assigned to any processor. 32. What are the key object oriented concepts used by Windows NT? Encapsulation Object class and instance 33. Is Windows NT a full blown object oriented operating system? Give reasons. No Windows NT is not so, because its not implemented in object oriented language and the data structures reside within one executive component and are not represented as objects and it does not support object oriented capabilities . 34. What is a drawback of MVT? It does not have the features like ability to support multiple processors virtual storage source level debugging 35. What is process spawning? When the OS at the explicit request of another process creates a process, this action is called process spawning.
53
39. What is process migration? It is the transfer of sufficient amount of the state of process from one machine to the target machine 40. What is mutant? In Windows NT a mutant provides kernel mode or user mode mutual exclusion with the notion of ownership. 41. What is an idle thread? The special thread a dispatcher will execute when no ready thread is found. 42. What is FtDisk? It is a fault tolerance disk driver for Windows NT. 43. What are the possible threads a thread can have? Ready Standby Running Waiting Transition Terminated.
44. What are rings in Windows NT? Windows NT uses protection mechanism called rings provides by the process to implement separation between the user mode and kernel mode.
54
47. What are DDks? Name an operating system that includes this feature. DDks are device driver kits, which are equivalent to SDKs for writing device drivers. Windows NT includes DDks. 48. What level of security does Windows NT meets? C2 level security.
1. What are the basic functions of an operating system? 2. Explain briefly about, processor, assembler, compiler, loader, linker and the functions executed by them. 3. What are the difference phases of software development? Explain briefly? 4. Differentiate between RAM and ROM? 5. What is DRAM? In which form does it store data? 6. What is cache memory? 7. What is hard disk and what is its purpose? 8. Differentiate between Complier and Interpreter? 9. What are the different tasks of Lexical analysis? 10. What are the different functions of Syntax phase, Sheduler? 11. What are the main difference between Micro-Controller and Micro- Processor? 12. Describe different job scheduling in operating systems. 13. What is a Real-Time System ? 14. What is the difference between Hard and Soft real-time systems ? 15. What is a mission critical system ? 16. What is the important aspect of a real-time system ? 17. If two processes which shares same system memory and system clock in a distributed system, What is it called? 18. What is the state of the processor, when a process is waiting for some event to occur? 19. What do you mean by deadlock? 20. Explain the difference between microkernel and macro kernel. 21. Give an example of microkernel. 22. When would you choose bottom up methodology? 23. When would you choose top down methodology? 24. Write a small dc shell script to find number of FF in the design. 25. Why paging is used ? 26. Which is the best page replacement algorithm and Why? How much time is spent usually in each phases and why? 27. Difference between Primary storage and secondary storage?
55
SQL
1. Which is the subset of SQL commands used to manipulate Oracle Database structures, including tables? Data Definition Language (DDL) 2. What operator performs pattern matching? LIKE operator
56
57
58
SQL QUERIES I. SCHEMAS Table 1 : STUDIES PNAME (VARCHAR), SPLACE (VARCHAR), COURSE (VARCHAR), CCOST (NUMBER) Table 2 : SOFTWARE PNAME (VARCHAR), TITLE (VARCHAR), DEVIN (VARCHAR), SCOST (NUMBER), DCOST (NUMBER), SOLD (NUMBER) Table 3 : PROGRAMMER PNAME (VARCHAR), DOB (DATE), DOJ (DATE), SEX (CHAR), PROF1 (VARCHAR), PROF2 (VARCHAR), SAL (NUMBER) LEGEND : PNAME Programmer Name, SPLACE Study Place, CCOST Course Cost, DEVIN Developed in, SCOST Software Cost, DCOST Development Cost, PROF1 Proficiency 1 QUERIES : 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. Find out the selling cost average for packages developed in Oracle. Display the names, ages and experience of all programmers. Display the names of those who have done the PGDCA course. What is the highest number of copies sold by a package? Display the names and date of birth of all programmers born in April. Display the lowest course fee. How many programmers have done the DCA course. How much revenue has been earned through the sale of packages developed in C. Display the details of software developed by Rakesh. How many programmers studied at Pentafour. Display the details of packages whose sales crossed the 5000 mark. Find out the number of copies which should be sold in order to recover the development cost of each package.
59
60
II . SCHEMA : Table 1 : DEPT DEPTNO (NOT NULL , NUMBER(2)), DNAME (VARCHAR2(14)), LOC (VARCHAR2(13) Table 2 : EMP EMPNO (NOT NULL , NUMBER(4)), ENAME (VARCHAR2(10)), JOB (VARCHAR2(9)), MGR (NUMBER(4)), HIREDATE (DATE), SAL (NUMBER(7,2)), COMM (NUMBER(7,2)), DEPTNO (NUMBER(2)) MGR is the empno of the employee whom the employee reports to. DEPTNO is a foreign key. QUERIES 1. List all the employees who have at least one person reporting to them. 2. List the employee details if and only if more than 10 employees are present in department no 10. 3. List the name of the employees with their immediate higher authority. 4. List all the employees who do not manage any one. 5. List the employee details whose salary is greater than the lowest salary of an employee belonging to deptno 20. 6. List the details of the employee earning more than the highest paid manager. 7. List the highest salary paid for each job. 8. Find the most recently hired employee in each department. 9. In which year did most people join the company? Display the year and the number of employees.
61
62
ADO.NET
1. Write a Generic Data Access Component which selects a data provider at run time? 2. Transfer data from a SQL Server database to an Excel database? 3. Create a Custom Data Provider? 4. Bind IList to a DataGrid? 5. Use DiffGrams in a DataSet? 6. Data Binding in DataGrid Control? 7. How to I get the modified rows (deleted, added, updated) of a DataSet? 8. Send only affected rows of a DataSet to the database when saving results? 9. Make DataSet save operation faseter? 10. Get rid of '+' sign from a DataGrid? 11. Get all tables of a database programmatically? 12. Get all columns of a table without using DataSet? 13. Get a list of all available tables of an Access database? 14. Update a database using DataSet? 15. Add ComboBox to a DataGrid? 16. Add CheckBox to a DataGrid? 17. Use Date or DateTime values in a SQL statement? 18. Create a SQL Server database programmatically? 19. Read data from a database using ADO.NET? 20. Write data to an access database using SQL Query and ADO? 21. Use DataGrid to display data from a table? 22. Get a database table's column properties such as name, type etc? 23. I'm having problem connecting MySQL Server using ODBC .Net Data Provider. 24. Get a list of available ODBC DSNs using ADO.NET? 25. Is there any sample available to connect to MySQL Server? 26. Navigate through database records in an unbound DataGrid control? 27. Transfer data from SQL Server to Excel? 28. Create my own Data Adapter? 29. View an Oracle database tables and their contents? 30. Connect to an Oracle database?
63
64
ASP.NET
1. How to Hide and Show Rows in a DataList? 2. How to Display BoundColumn Based on a Condition? 3. How to Change the Column Value Dynamically to display in a DataGrid? 4. How to Hide a DataGrid Column Dynamically? 5. How to Sort a DataGrid Column Data Dynamically? 6. How to use DataFormatString in a DataGrid? 7. How to use HyperLink Column of DataGrid? 8. How to use ItemTemplate in a DataGrid Dynamically? 9. Hide the data if a database field value is null? 10. Hide a DataGrid column? 11. Reshuffle or Change the order of DataGrid columns? 12. Change Color of a DataGrid Column Based on Column Values 13. How to Add a Counter Column to the DataGrid? 14. How to Display Data Vertically? 15. How to add a DataGrid Column for Calculations? 16. Determine Windows users logged on a machine? 17. Start an outside application programmatically? 18. Write my "Hello, World!" program in C#? 19. Read or write data streams? 20. Get IP Address of a Host? 21. Call a Windows API? 22. Open a wav file to play a sound? 23. Send a mail using SMTP? 24. Convert from one data type to another? 25. Create a Windows Service? 26. Open a browser from my application? 27. Get Current date/time? 28. Get all the running process on your machine? 29. Add events to a Windows Control at design time? 30. Copy a text file to HTTP output stream? 31. Developing a multi-threaded application? 32. Read windows registry? 33. Provide Cut and Paste functionality by using System Clipboard? 34. Write my first multithreading application? 35. Deploy my .NET Applications on other machines? 36. Find an Operating System version?
65
Technical Aptitude Questions 37. What is .NET Framework? 38. What language can I use to write ASP.NET applications? 39. What kind of applications can we build using the .NET Framework? 40. How is ASP.NET different than ASP 3.0? 41. What do I need to run ASP.NET? 42. Do I need Visual Studio .NET to develop ASP.NET applications? 43. Is ASP.NET cross-browser compatible? 44. What platform ASP.NET will run on? 45. What is "<%=...%> in ASP.NET?How do I call an aspx page from a WebForm button Click? 46. How do I create a table Programmatically? 47. How do I add check boxes to a table? 48. How do I add combo boxes to a table? 49. How do I provide paging support in a DataGrid control?
50. Which method do you invoke on the DataAdapter control to load your generated dataset with data? 51. Can you edit data in the Repeater control? 52. Which template must you provide, in order to display data in a Repeater control? 53. How can you provide an alternating color scheme in a Repeater control? 54. What property must you set, and what method must you call in your code, in order to bind the data from some data source to the Repeater control? 55. What base class do all Web Forms inherit from? 56. What method do you use to explicitly kill a user s session? 57. How do you turn off cookies for one page in your site? 58. Which two properties are on every validation control? 59. What tags do you need to add within the asp:datagrid tags to bind columns manually? 60. How do you create a permanent cookie? 61. What tag do you use to add a hyperlink column to the DataGrid? 62. What is the standard you use to wrap up a call to a Web service 63. Which method do you use to redirect the user to another page without performing a round trip to the client? 64. What is the transport protocol you use to call a Web service SOAP 65. True or False: A Web service can only be written in .NET 66. What does WSDL stand for? 67. What property do you have to set to tell the grid which page to go to when using the Pager object? 68. Where on the Internet would you look for Web services? 69. What tags do you need to add within the asp:datagrid tags to bind columns manually. 70. Which property on a Combo Box do you set with a column name, prior to setting the DataSource, to display data in the combo box? 71. How is a property designated as read-only? 72. Which control would you use if you needed to make sure the values in two different controls matched? 73. True or False: To test a Web service you must create a windows application or Web application to consume this service? 74. How many classes can a single .NET DLL contain? a. One and only one b. Not more than 2 c. Many
66
3 main differences between flexgrid control and dbgrid control ActiveX and Types of ActiveX Components in VB Advantage of ActiveX Dll over Active Exe Advantages of disconnected recordsets a. Benefit of wrapping database calls into MTS transactions 79. Benefits of using MTS 80. Can database schema be changed with DAO, RDO or ADO? 81. Can you create a tabletype of recordset in Jet - connected ODBC database engine? 82. Constructors and distructors 83. Controls which do not have events 84. Default property of datacontrol 85. Define the scope of Public, Private, Friend procedures? 86. Describe Database Connection pooling relative to MTS 87. Describe: In of Process vs. Out of Process component. Which is faster? 88. Difference between a function and a subroutine, Dynaset and 89. Snapshot,early and late binding, image and picture controls,Linked Object and 90. Embedded Object,listbox and combo box,Listindex and Tab index,modal and moduless window, Object and Class,Query unload and unload in form, 91. Declaration and Instantiation an object? 92. Draw and explain Sequence Modal of DAO 93. How can objects on different threads communicate with one another? 94. How can you force new objects to be created on new threads? 95. How does a DCOM component know where to instantiate itself? 96. How to register a component? 97. How to set a shortcut key for label? 98. Kind of components can be used as DCOM servers 99. Name of the control used to call a windows application 100. Name the four different cursor and locking types in ADO and describe them briefly 101. Need of zorder method, no of controls in form, Property used to add a menus at runtime, Property used to count number of items in a combobox,resize a label control according to your caption. 102. Return value of callback function, The need of tabindex property 103. Thread pool and management of threads within a thread pool 104. To set the command button for ESC, Which property needs to be changed? 105. Type Library and what is it's purpose? 106. Types of system controls, container objects, combo box 107. Under the ADO Command Object, what collection is responsible for input 108. to stored procedures? 109. VB and Object Oriented Programming 110. What are the ADO objects? Explain them. 111. What are the different compatibility types when we create a COM component? 112. What do ByVal and ByRef mean and which is the default? 113. What does Option Explicit refer to? 114. What does the Implements statement do? 115. What is OLE and DDE? Explain. 116. What is the difference between Msgbox Statement and MsgboxQ function? 117. What keyword is associated with raising system level events in VB?
67
68
C#
1. What is C#? 2. Why Do I need a new language like C#? 3. Will C# replace C++? 4. Will C# replace Java? 5. How do I install C#? 6. Where is C# compiler? 7. How do I write and run my first C# application? 8. Does C# need Windows 2000? 9. What are delegates? 10. What is Reflection and how to use it? 11. What is boxing and unboxing? And how to use it? 12. What are new and override Modifiers in C#? 13. What is boxing and unboxing - #2? 14. Read Optional Parameters in ,NET? 15. Find out number of days between two dates? 16. Get an input from the console? 17. Create a class and call it from the Main function? 18. Use an array? 19. Use an ArrayList?
69