Aptitude

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

Aptitude

It involves 40 questions which include some English part also. Numeric part was not so
tough but it was very difficult to break English questions.. time limit was 40 mts.

1) There are 3 piles of books on the table you need to arrange them in the self such that 1st
book of each pile gets placed on the self, what is the possible no of arrangements:
a)12! b)12C3 * 9C4 c)12^12 d)none

2) Price of a book increases 15% successively (2times) what is the new price of the book
more compared to that of the old price:
a)32.25% b)23.34% c)36% d)39%

3) There are 3 mixtures when mixed in the ratio of 3:4:5 price was 240. When mixed with
6:4:9 price was 340. what's the price when mixed in 5:6:8 ration price is _______

4) One question based on Venn Diagram.75 total no of students. 25 don't know typing, 50
know shorthand. then question were based on find no of students dont knwing both etc.

5) One person has 2 child.At least one of them was a girl. Then the Probability that 2 of the
are girl is_____
a)1/2 b)1/4 c)0.36 d)1

6) Swati when get married to jayanta her age was 3/4 th of her husband's age. After 12
years her age became 5/6 th of her husband's age.Then what's the age of swati when she
got married??

7) y=MAX((3x+y),(11x-y)) then what's the value of y???

8) some passages were there based on illegal drugs smuggling and based on this some
questions.

9) Some Analogy Questions: some i do remeber like SYCOPHANTIC: FLATTER SILENT:


QUIET others I dont remember.

10) Some questions based on if f(x,0)=x+1 f(o,y)=y f(x,y)=f(f(x,0),f(2*x-1)) then find


f(1,1),f(2,3),f(3,0) etc and some relations based on this very easy

11) One question based on the average speed

12) one question based on Sudoku type very easy, u can do it in one attempt

Technical paper

1. ------- is associated with webservices.


a) WSDL b) WML c) web sphere d) web logic
ans:a

2. Any large single block of data stored in a database, such as a picture or sound file, which
does not include record fields, and cannot be directly searched by the database’s search
engine.
a) TABLE b) BLOB c) VIEW d) SCHEME
ans: b
3. A reserved area of the immediate access memory used to increase the running speed of
the computer program.
a) session memory b) bubble memory c) cache memory d) shared memory
ans: c

4. A small subnet that sit between atrusted internal network and an untruster external
network, such as the public internet.
a) LAN b) MAN c) WAN d) DMZ
ans: c

5. Technologies that use radio waves to automatically identify people or objects,which is


very similar to the barcode identification systems,seen in retail stores everyday.
a)BLUETOOTH b) RADAR c)RSA SECURE ID d)RFID ans: d

6. main(){ float fl = 10.5; double dbl = 10.5 if(fl ==dbl) printf(“UNITED WE STAND”); else
printf(“DIVIDE AND RULE”) } what is the output?
a) compilation error b)UNITED WE STAND c)DIVIDE AND RULE d)linkage error.
ans: b

7. main(){ static int ivar = 5; printf(“%d”,ivar--); if(ivar) main(); } what is the output?
a)1 2 3 4 5 b) 5 4 3 2 1 c)5 d)compiler error:main cannot be recursive function.
ans b

8. main() { extern int iExtern; iExtern = 20; printf(“%d”,iExtern); } what is the output?
a)2 b) 20 c)compile error d)linker error
ans d

9. #define clrscr() 100 main(){ clrscr(); printf(“%d\n\t”, clrscr()); } what is the output?
a)100 b)10 c)compiler errord)linkage error
ans: a

10. main() { void vpointer; char cHar = ‘g’, *cHarpointer = “GOOGLE”; int j = 40; vpointer
= &cHar; printf(“%c”,*(char*)vpointer); vpointer = &j; printf(“%d”,*(int *)vpointer);
vpointer = cHarpointer; printf(“%s”,(char*)vpointer +3); } what is the output?
a)g40GLE b)g40GOOGLE c)g0GLE d)g4GOO
ans: a

11. #define FALSE -1 #define TRUE 1 #define NULL 0 main() { if(NULL) puts(“NULL”); else
if(FALSE) puts(“TRUE”); else puts(“FALSE”); } what is the output?
a)NULL b)TRUE c)FALSE d)0
ans: b

12. main() { int i =5,j= 6, z; printf(“%d”,i+++j); } what is the output?


a)13 b)12 c)11 d)compiler error
ans: c If there is 5+++++ symbol then it will show error as Lvalue required

13. main() { int i ; i = accumulator(); printf(“%d”,i); } accumulator(){ _AX =1000 } what


is output?
a)1 b)10 c)100 d)1000
ans: d

14. main() { int i =0; while(+(+i--)!= 0) i- = i++; printf(“%d”,i); } what is the output? a)-
1 b)0 c)1 d)will go in an infinite loop ans: a
15. main(){ int i =3; for(; i++=0;) printf((“%d”,i); } what is the output? a)1b)2c)1 2
3d)compiler error: L value required.
ans: d

16. main(){ int i = 10, j =20; j = i ,j?(i,j)?i :j:j; printf(“%d%d”,i,j); }what is the output?
a)20 20 b)20 10 c)10 20 d)10 10
ans: 10 10

17. main(){ extern i; printf(“%d\t”,i);{ int i =20; printf(“%d\t”,i); } } what is output?


a) “Extern valueof i “ 20 b)Externvalue of i”c)20d)linker Error:unresolved external symbol i
ans: d

18. int DIMension(int array[]){ return sizeof(array/sizeof(int);} main(){ int arr[10];


printf(“Array dimension is %d”,DIMension(arr)); } what is output?
a)array dimension is 10 b)array dimension is 1 c) array dimension is 2 d)array dimension is
5
ans: a

19. main(){ void swap(); int x = 45, y = 15; swap(&x,&y); printf(“x = %d y=%d”x,y); }
void swap(int *a, int *b){ *a^=*b, *b^=*a, *a^ = *b; what is the output?
a) x = 15, y =45 b)x =15, y =15 c)x =45 ,y =15 d)x =45 y = 45
ans: a

20. main(){ int i =257; int *iptr =&i; printf(“%d%d”,*((char*)iptr),*((char *)iptr+1)); }


what is output?
a)1, 257 b)257 1c)0 0d)1 1
ans: d

21. main(){ int i =300; char *ptr = &i; *++ptr=2; printf(“%d”,i); } what is output?
a)556 b)300 c)2 d)302 ans: a

22. #include main(){ char *str =”yahoo”; char *ptr =str; char least =127; while(*ptr++)
least = (*ptr printf(“%d”,least); } what is the output?
a)0 b)127 c)yahoo d)y
Ans-0

23. Declare an array of M pointers to functions returing pointers to functions returing


pointers to characters.
a)(*ptr[M]()(char*(*)()); b)(char*(*)())(*ptr[M])() c)(char*(*)(*ptr[M]())(*ptr[M]() d)
(char*(*)(char*()))(*ptr[M])();

24.void main(){ int I =10, j=2; int *ip = &I ,*jp =&j; int k = *ip/*jp; printf(“%d”,k); }
what is the output?
a)2 b)5 c)10 d)compile error:unexpected end of file in comment started in line 4
ans: b

25. main(){ char a[4] =”GOOGLE”; printf(“%s”,a); } what is the output? a)2 b) GOOGLE c)
compile error: too many initializers d) linkage error.
ans: c

26. For 1MB memory, the number of address lines required


a)12 b)16 c)20 d)32 ans: 20
27. There is a circuit using 3 nand gates with 2 inputes and 1 output, find the output.
a) AND b) OR c) XOR d) NAND
ans:b

28. What is done for push operation


a) SP is incremented and then the value is stored. b) PC is incremented and then the value
is stored. c) PC is decremented and then the value is stored. d) SP is decremented and then
the value is stored.
ans: a

29. Memory allocation of variables declared in a program is ------


a) Allocated in RAM b) Allocated in ROM c) Allocated in stack d) Assigned in registers.
ans: c

30. What action is taken when the processer under execution is interrupted by TRAP in
8085MPU?
a) Processor serves the interrupt request after completing the execution of the current
instruction. b) processer serves the interrupt request after completing the current task. c)
processor serves the interrupt immediately. d) processor serving the interrupt request
depent deprnds upon the priority of the current task under execution.
ans: a

31. Purpose of PC (program counter)in a microprocessor is ----


a) To store address of TOS (top of stack) b) To store address of next instructions to be
executed c) count the number of instructions d) to store the base address of the stack.
ans: b

32. conditional results after execution of an instruction in a microprocess is stored in


a) register b) accumulator c) flag register d) flag register part of PSW (program status
word)
ans: c

33.The OR gate can be converted to the NAND function by adding----gate(s)to the input of
the OR gate.
a) NOT b) AND c) NOR d) XOR
ans: a

34. In 8051microcontroller ,------has a dual function.


a) port 3 b) port 2 c) port 1 d) port 0
ans; b

35. An 8085 based microprocessor with 2MHz clock frequency,will execute the following
chunk of code with how much delay? MVI B,38H HAPPY: MVI C, FFH SADDY: DCR C JNZ
SADDY DCR B JNC HAPPY
a) 102.3 b)114.5 c)100.5 d)120

36. In 8085 MPU what will be the status of the flag after the execution of the following
chunk of code. MVI B,FFH MOV A,B CMA HLT a)S = 1, Z = 0, CY = 1 b)S = 0, Z = 1, CY = 0
c) S = 1, Z = 0, CY = 0 d)S = 1, Z = 1 ,CY = 1

37. A positive going pulse which is always generated when 8085 MPU begins the machine
cycle.
a) RD b) ALE c) WR d) HOLD
ans: b

38. When a ----- instruction of 8085 MPU is fetched, its second and third bytes are placed in
the W and Z registers.
a) JMP b) STA c) CALL d) XCHG
ans: d (not sure)

39. What is defined as one subdivision of the operation performed in one clock period.
a) T- State b) Instruction Cycle c) Machine Cycle d) All of the above
ans:a

40. At the end of the following code, what is the status of the flags. LXI B, AEC4H MOV A,C
ADD HLT
a) S = 1, CY = 0, P = 0 , AC = 1 b) S =0, CY = 1, P = 0,AC = 1 c) S = 0, CY = 1, P = 0 ,
AC = 1 d) S = 0, CY = 1, P = 1 , AC = 1

41. In 8051 micro controller what is the HEX number in the accumulator after the execution
of the following code. MOV A,#0A5H CLR C RRC A RRC A RL A RL A SWAP A
a)A6 b)6A c)95 d)A5.
ans: a

42. The Pentium processor requires --- volts.


a)9 b)12 c)5 d)24
ans; b

43. The data bus on the Celeron processor is----bits wide.


a)64 b)32 c)16 d)128.
ans: a

44. K6 processor
a) Hitachi b) toshiba c) zilog d) AMD.
ans: d

45. What is the control word for 8255 PPI,in BSR mode to set bit PC3.
a)0EH b)0FH c)07H d)06H.
ans: c

46. The repeated execution of a loop of code while waiting for an event to occur is called
----.The cpu is not engaged in any real productive activity during this period, and the
process doesn’t progress towards completion.
a) dead lock b) busy waiting c) trap door d) none.
ans: b

47. Transparent DBMS is defined as


a) A DBMS in which there are no program or user access languages. b) A DBMS which has
no cross file capabilities but is user friendly and provides user interface management. c) A
DBMS which keeps its physical structure hidden from user d) none.
Ans: c

48. Either all actions are carried out or none are.users should not have to worry about the
effect of incomplete transctions.DBMS ensures this by undoing the actions of incomplete
transctions. this property is known as
a) Aggregation b) atomicity c) association d) data integrity.
Ans-b

49. --- algorithms determines where in available to load a program. common methods are
first fit, next fit, best fit.------- algorithm are used when memory is full, and one process (or
part of a process) needs to be swaped out to accommodate a new program. The ------
algorithm determines which are the partions to be swaped out.
a) placement, placement, replacement b) replacement, placement, placement c)
replacement, placement, replacement d) placement, replacement, replacement

50. Trap door is a secret undocumented entry point into a program used to grant access
without normal methods of access authentication. A trap is a software interrupt,usually the
result of an error condition.
a)true b)false.
ans: b

51. Given a binary search tree, print out the nodes of the tree according to post order
traversal. 4 / \ 2 5 / \ 1 3
a)3,2,1,5,4. b)1,2,3,4,5. c)1,3,2,5,4. d)5,3,1,2,4.

52. which one of the following is the recursive travel technique.


a) depth first search b)preorder c)breadth first search d)none.
Ans: a

53. Which of the following needs the requirement to be a binary search tree.
a) 5 / \ 2 7 / 1 b) 5 / \ 6 7 c) 5 / \ 2 7 /\ 1 6 d) none.

54. In recursive implementations which of the following is true for saving the state of the
steps
a) as full state on the stack b) as reversible action on the stack c) both a and b d) none
Ans-c

55. Which of the following involves context switch


a)previliged instruction b)floating point exception c)system calls d)all e)none Ans-c

56. Piggy backing is a technique for


a)acknowledge b)sequence c)flow control d)retransmission
ans: c

57. a functional dependency XY is ____ dependency if removal of any attribute A from X


means that the dependency does not hold any more a)full functional b) multi valued
c)single valued d)none
Ans: a

58. A relation schema R is in BCNF if it is in ____and satisfies an additional constraints that


for every functional dependency XY, X must be a candidate key a)1 NF b)2 NF c)3 NF d)5
NF
Ans: c

59. a _____ sub query can be easily identified if it contains any references to the parent sub
query columns in the _________ clause A) correlated, WHERE b) nested, SELECT c)
correlated,SELECT d) none
Ans: a
60. Hybrid devise that combines the features of both bridge and router is known as
a)router b)bridge c)hub d)brouter
Ans-brouter

61. Which of the following is the most crucial phase of SDLC


a)testing b)code generation c) analysys and design d)implementation
ans: c

62. To send a data packet using datagram, connection will be established


a)no connection is required b) connection is not established before data transmission
c)before data transmission d)none
ans: a

63. A software that allows a personal computer to pretend as as computer terminal is


a) terminal adapter b)terminal emulation c)modem d)none
ans: b

64. Super key is


a) same as primary key b) primary key and attribute c) same as foreign key d) foreign key
and attribute
ans: b

65. In binary search tree which traversal is used for ascending order values
a) Inorder b)preorder c)post order d)none
Ans: a

66. You are creating an index on ROLLNO colume in the STUDENT table.which statement
will you use?
a) CREATE INDEX roll_idx ON student, rollno; b) CREATE INDEX roll_idx FOR student,
rollno; c) CREATE INDEX roll_idx ON student (rollno); d) CREATE INDEX roll_idx INDEX ON
student (rollno);

67. A____class is a class that represents a data structure that stores a number of data
objects
a. container b.component c.base d.derived
Ans: c

68. Which one of the following phases belongs to the compiler Back-end.
a. Lexical Analysis b.Syntax Analysis c. Optimization d.Intermediate Representation.
ans: c

69. Every context _sensitive language is context_free


a. true b.false
ans: a

70. Input:A is non-empty list of numbers L Xß-infinity For each item in the list L, do If the
item>x, then Xß the item Return X X represents:-
a)largest number b)smallest number c)smallest negative number d) none

71. Let A and B be nodes of a heap,such that B is a child of A. the heap must then satisfy
the following conditions
a)key(A)>=key(B) b)key(A) c)key(A)=key(B) d)none
Ans-a

72. String, List, Stack, queue are examples of_______


a)primitive data type b)simple data type c)Abstract data type d)none
ans: a

73. Which of the following is not true for LinkedLists?


a) The simplest kind of linked list is a single linked list, which has one link per node .this link
points to the next node in the list, or to a null value or emptylist if it is the last node. b) a
more sophisticated kind of linked list is a double linkedlist or two way linkedlist. Each node
has two links ,one to the previous node and one to the next  node. c) in a circleLinkedList,
the first and last nodes are linked together. this can be done only for double linked list. d) to
traverse a circular linkedlist, u begin at any node and follow the list in either direction until u
return to the original node.

74. Sentinel node at the beginning and /or at the end of the linkedlist is not used to store
the data
a) true b) false
ans: a

Technical Written :
It involves 55 questions - to be completed in 40 minutes. it has questions from
microprocessor, C, C++, data struct.

Communication (just a min) :


Easy round you just have to speak for 1 minute. If you speak you will be selected

Technical Interview :
My technical interview was very short. It went for only 10 min.
I: may I come in sir
HR: yes sure..
I: Good evening sir
HR: very Good evening Mohanakannan ...have a seat... I sat he congrats me for clearing
my previous round.
HR: tell me about ur self
I: I told
HR: Shall we start
I: yes
HR: tell me abt structures
I: told
Hr: ok.. write a program to print 2 strings.
I wrote with output....
Hr: tell me abt your project.....
I: I told
HR: what it LAN?
I: Answered..
HR: what is DBMS?
I: sorry sir, I am from ECE thats why I don’t know
HR: You don’t know oh
I: ya sir
HR:then he ask me generally abt cricket (IPL) Then he pass me to HR

HR Interview :
he asked me about the enviorment I would like to work... I satisfy the bond and
condition.... my family background... and very special my hobbies.. and my achivement I
have written in my resume...
http://www.ChetanaS.org
It was not my day for me I have rejected. salary package is 3 lakh; after training 3.5
lakh/annum

Spread The Word

You might also like