DXC Tech 2
DXC Tech 2
https://www.freshersnow.com/
DXC Technology Technical Question Paper
printf(%d,iExtern);
}
what is the output?
a)2 b) 20 c)compile error d)linker error
9..#define clrscr() 100
main(){
clrscr();
printf(%d\n\t, clrscr());
}
what is the output?
a)100 b)10 c)compiler errord)linkage error
10.main()
{
void vpointer;
char cHar = g, *cHarpointer = GOOGLE;
int j = 40;
vpointer = &cHar;
printf(%c,*(char*)vpointer);
vpointer = &j;
printf(%d,*(int *)vpointer);
vpointer = cHarpointer;
printf(%s,(char*)vpointer +3);
}
what is the output?
a)g40GLE b)g40GOOGLE c)g0GLE d)g4GOO
11.#define FALSE -1
#define TRUE 1
#define NULL 0
main() {
if (NULL)
puts (NULL);
else if(FALSE)
puts (TRUE);
else
puts (FALSE);
}
what is the output?
https://www.freshersnow.com/
DXC Technology Technical Question Paper
printf(%d,i);
}
what is the output?
a)-1 b)0 c)1 d)will go in an infinite loop
15.main(){
int i =3;
for(; i++=0;)
printf((%d,i);
}
what is the output?
a)1b)2c)1 2 3d)compiler error:L value required.
16.main(){
int i = 10, j =20;
j = i ,j?(i,j)?i :j:j;
printf(%d%d,i,j);
}what is the output?
https://www.freshersnow.com/
DXC Technology Technical Question Paper
https://www.freshersnow.com/
DXC Technology Technical Question Paper
21.main(){
int i =300;
char *ptr = &i;
*++ptr=2;
printf(%d,i);
}
what is output?
a)556 b)300 c)2 d)302
22. #include
main(){
char *str =yahoo;
char *ptr =str;
char least =127;
while(*ptr++)
least = (*ptr
printf (%d,least);
}
what is the output?
a)0 b)127 c) yahoo d) y
23.Declare an array of M pointers to functions returing pointers to functions returing
pointers to characters.
a)(*ptr[M]()(char*(*)()); b)(char*(*)())(*ptr[M])()
c) (char*(*)(*ptr[M]())(*ptr[M] () d)(char*(*)(char*()))(*ptr[M]) ();
24.void main(){
int I =10, j=2;
int *ip = &I ,*jp =&j;
int k = *ip/*jp;
printf(%d,k);
}
what is the output?
a)2 b)5 c)10 d)compile error:unexpected end of file in comment started in line 4
25.main()
{
char a[4] =GOOGLE;
printf(%s,a);
}
https://www.freshersnow.com/
DXC Technology Technical Question Paper
https://www.freshersnow.com/
DXC Technology Technical Question Paper
35.An 8085 based microprocessor with 2MHz clock frequency,will execute the following
chunk of code with how much delay?
MVI B,38H
HAPPY: MVI C, FFH
SADDY: DCR C
JNZ SADDY
DCR B
JNC HAPPY
a) 102.3 b)114.5 c)100.5 d)120
36.In 8085 MPU what will be the status of the flag after the execution of the following chunk
of code.
MVI B,FFH
MOV A,B
CMA
HLT
a)S = 1, Z = 0, CY = 1 b)S = 0, Z = 1, CY = 0
c) S = 1, Z = 0, CY = 0 d)S = 1, Z = 1 ,CY = 1
37.A positive going pulse which is always generated when 8085 MPU begins the machine
cycle.
a) RD b) ALE c) WR d) HOLD
38.when a ----- instruction of 8085 MPU is fetched , its second and third bytes are placed in
the W and Z registers.
a) JMP b) STA c) CALL d) XCHG
39.what is defined as one subdivision of the operation performed in one clock period.
a) T- State b) Instruction Cycle c) Machine Cycle d) All of the above
40.At the end of the following code, what is the status of the flags.
LXI B, AEC4H
MOV A,C
ADD B
HLT a) S = 1, CY = 0, P = 0 , AC = 1 b) S =0 , CY = 1, P = 0,AC = 1 c) S = 0, CY = 1, P =
0 , AC = 1 d) S = 0, CY = 1, P = 1 , AC = 1
https://www.freshersnow.com/
DXC Technology Technical Question Paper
46.The repeated execution of a loop of code while waiting for an event to occur is called
---------.The cpu is not engaged in any real productive activity during this period,and the
process doesnt progress towards completion.
a) dead lock b) busy waiting c) trap door d) none.
47. Transparent DBMS is defined as
a) A DBMS in which there are no program or user access languages. b) A DBMS which has
no cross file capabilities but is user friendly and provides user interface management. c) A
DBMS which keeps its physical structure hidden from user d) none.
48.Either all actions are carried out or none are.users should not have to worry about the
effect of incomplete transctions.DBMS ensures this by undoing the actions of incomplete
transctions.this property is known as
a) Aggregation b) atomicity c) association d) data integrity.
49.------ algorithms determines where in available to load a program. common methods
are first fit,next fit,best fit.--------- algorithm are used when memory is full , and one
process (or part of a process) needs to be swaped out to accommodate a new program.The
------------- algorithm determines which are the partions to be swaped out.
a) placement, placement, replacement
b) replacement, placement, placement
c) replacement, placement, replacement
d) placement, replacement, replacement
50.Trap door is a secret undocumented entry point into a program used to grant access
without normal methods of access authentication.A trap is a software interrupt,usually the
result of an error condition.
a)true b)false.
55.in recursive implementations which of the following is true for saving the state of the
steps
a) as full state on the stack
b) as reversible action on the stack
c) both a and b
d) none
56.which of the following involves context switch
a) previliged instruction
b) floating point exception
c) system calls
d) all
e) none
57.piggy backing is a technique for
https://www.freshersnow.com/
DXC Technology Technical Question Paper
a) acknowledge
b) sequence
c) flow control
d) retransmission
58. a functional dependency XY is ___________dependency if removal of any attribute A
from X means that the dependency does not hold any more
a) full functional
b) multi valued
c) single valued
d) none
59)a relation schema R is in BCNF if it is in ___________and satisfies an additional
constraints that for every functional dependency XY,X must be a candidate key
a)1 NF
b)2 NF
c)3 NF
d)5 NF
60) a _________sub query can be easily identified if it contains any references to the
parent sub query columns in the _________ clause
A) correlated ,WHERE
b) nested ,SELECT
c) correlated, SELECT
d) none
31.purpose of PC (program counter)in a microprocessor is ----
a) register b) accumulator c) flag register d) flag register part of PSW (program status
word)
33.The OR gate can be converted to the NAND function by adding----gate(s)to the input of
the OR gate.
https://www.freshersnow.com/
DXC Technology Technical Question Paper
35.An 8085 based microprocessor with 2MHz clock frequency,will execute the following
MVI B,38H
SADDY: DCR C
JNZ SADDY
DCR B
JNC HAPPY
36.In 8085 MPU what will be the status of the flag after the execution of the following chunk
of code.
MVI B,FFH
MOV A,B
CMA
HLT
a)S = 1, Z = 0, CY = 1 b)S = 0, Z = 1, CY = 0
c) S = 1, Z = 0, CY = 0 d)S = 1, Z = 1 ,CY = 1
37.A positive going pulse which is always generated when 8085 MPU begins the machine
cycle.
a) RD b) ALE c) WR d) HOLD
38.when a ----- instruction of 8085 MPU is fetched , its second and third bytes are placed in
39.what is defined as one subdivision of the operation performed in one clock period.
https://www.freshersnow.com/
DXC Technology Technical Question Paper
40.At the end of the following code, what is the status of the flags.
LXI B, AEC4H
MOV A,C
ADD B
HLT
a) S = 1, CY = 0, P = 0 , AC = 1 b) S =0 , CY = 1, P = 0,AC = 1
c) S = 0, CY = 1, P = 0 , AC = 1 d) S = 0, CY = 1, P = 1 , AC = 1
46.The repeated execution of a loop of code while waiting for an event to occur is called
---------.The cpu is not engaged in any real productive activity during this period,and the
process doesnt progress towards completion. a) dead lock b) busy waiting c) trap door d)
none.
a) A DBMS in which there are no program or user access languages. b) A DBMS which has
no cross file capabilities but is user friendly and provides user interface management. c) A
DBMS which keeps its physical structure hidden from user d) none.
48.Either all actions are carried out or none are.users should not have to worry about the
are first fit,next fit,best fit.--------- algorithm are used when memory is full , and one
process (or part of a process) needs to be swaped out to accommodate a new program.The
https://www.freshersnow.com/
DXC Technology Technical Question Paper
50.Trap door is a secret undocumented entry point into a program used to grant access
a)true b)false.
55.in recursive implementations which of the following is true for saving the state of the
steps
c)both a and b
d)none
a) previliged instruction
c) system calls
d)all
e) none
a) acknowledge
b) sequence
c) flow control
d) retransmission
from X means that the dependency does not hold any more
https://www.freshersnow.com/
DXC Technology Technical Question Paper
a) full functional
b) multi valued
c) single valued
d) none
constraints that for every functional dependency XY,X must be a candidate key
a)1 NF
b)2 NF
c)3 NF
d)5 NF
60) a _________sub query can be easily identified if it contains any references to the
A) correlated ,WHERE
b) nested ,SELECT
c) correlated,SELECT
d) none
61) hybrid devise that combines the features of both bridge and router is known as
a) no connection is required
d) none
a) terminal adapter
https://www.freshersnow.com/
DXC Technology Technical Question Paper
b) terminal emulation
c) modem
d) none
66.In binary search tree which traversal is used for ascending order values
67.You are creating an index on ROLLNO colume in the STUDENT table.which statement will
you use?
68.A________class is a class that represents a data structure that stores a number of data
objects
a. true b.false
https://www.freshersnow.com/