Pandian Saraswathi Yadav Engineering College: Arasanoor, Sivagangai Interview Questions
Pandian Saraswathi Yadav Engineering College: Arasanoor, Sivagangai Interview Questions
Arasanoor, Sivagangai
Interview Questions
1. Randomized quicksort is an extension of quicksort where the pivot is chosen randomly. What is the worst
case complexity of sorting n numbers using randomized quicksort ?
2. What is the minimum number of stacks of size n required to implement a queue to size n ?
3. Level order traversal of a rooted tree can be done by stating from the root and Performing
(A) preorder traversal (B) in order traversal (C) depth first search (D) breadth first search
4. The tightest lower bound on the number of comparisons, in the worst case, for comparison -based sorting is
of the order of
5. Consider the label sequences obtained by the following pairs of traversals on a labeled binary tree. Which
of these pairs identify a tree uniquely?
6. Which of the following assertions is false about the internet Protocol (IP) ?
7. Which of the following functionalities must be implemented by a transport protocol over and
above the network protocol ?
8. Which of the following is NOT true with respective to a transparent bridge and a router ?
(A) Both bridge and router selectively farward data packets
(B) A bridge uses IP addresses while a router uses MAC addresses
(C) A bridge builds up its routing table by inspecting incoming packets
(D) A router can connect between a LAN and a WAN.
9. For which one of the following reason: does Internet Protocol (IP) use the timeto-live (TTL) field
in the IP datagram header?
(A) Internet chat (B) Web browsing (C) E-mail (D) Ping
13. Using a larger block size in a fixed block size file system leads to
14. The minimum number of page frames that must be allocated to a running process
in a virtual memory environment is determined by
(A) the instruction set architecture (B) page size (C) physical memory size (D) number of processes in
memory
15. Which of the following is NOT true of deadlock prevention and deadlock avoidance schemes?
(A) In deadlock prevention, the request for resources is always granted if the resulting state is safe
B) In deadlock avoidance, the request for resources is always granted if the resulting state is safe
(C) Deadlock avoidance is less restrictive than deadlock prevention
(D) Deadlock avoidance requires knowledge of resource requirements a priori
16. Which one of the following is NOT desired in a good Software Requirement Specifications (SRS)
document?
17. Which of the following scenarios may lead to an irrecoverable error in a database system?
Data_of_Birth"Age
Age"Eligibility
Name"Roll_number
Roll_number"Name
Course_number"Course_name
Course_number"Instructor
(Roll_number,Course_number)"Grade
The relation(Roll)number,Name,Date_of_brith,Age) is
(A) in second normal normal form but not in third normal form
(B) in third normal form but not in BCNF
(C) in BCNF
(D) in none of the above
(A) Non-key and ordering (B) Non-key and non-ordering (C) key and ordering (D) Key and non-ordering
Write a program to Find all Pairs in Array of Integers Whose sum is Equal to a Given Number at Runtime
Example :