2023 2024 Student Forum > Management Forum > Main Forum

 
  #1  
13th August 2014, 01:21 PM
Unregistered
Guest
 
HAL Management Trainee (Technical) CSE previous year question papers

Will you please share with me the HAL Management Trainee (Technical) CSE previous year question papers?
Similar Threads
Thread
HAL Management Trainee Previous Year Question Papers with Answers
SAIL Management Trainee Previous Year Question Paper
HAL Management Trainee Previous Question Papers For ECE
Sail Management Trainee Previous Year Papers
Previous Year Papers of SAIL Management Trainee Exam for Computer Science
Previous year question papers of SAIL Management Trainee for electronics
Previous year papers of Sales and Marketing (Management Trainee) of Coal India Ltd
Hindustan Aeronautics Limited management Trainee (Technical) last year papers
Coal India Limited Management Trainee Exam previous year papers of EE
Sail Previous Year Question Paper For Management Trainee HR
Previous Year Papers Of Sail Management Trainee Exam For Electronics
Engineers India Ltd Management Trainee previous year question papers
Previous year question paper of sail management trainee administration
HAL Management Trainee Previous Year Question Papers CSE
HAL Management Trainee Mechanical Previous Year Question Papers
Hal Management Trainee Previous Year Question Paper For ECE
Engineer India Limited Management Trainee Exam previous year question papers
Steel Authority of India Ltd – SAIL Management Trainee previous year question papers
SAIL Management Trainee Previous Question Papers
Food Corporation of India Management Trainee previous year question papers
  #2  
13th August 2014, 02:12 PM
Super Moderator
 
Join Date: Apr 2013
Re: HAL Management Trainee (Technical) CSE previous year question papers

As you want to get the HAL Management Trainee (Technical) CSE previous year question papers so here it is for you:

6. A graph with ”n” vertices and n-1 edges that is not a tree, is
a) Connected
b) Disconnected
c) Euler
d) A circuit
Ans.
7. If a graph requires k different colours for its proper colouring,
then the chromatic number of the graph is
a) 1
b) k
c) k-1
d) k/2
Ans.
8. A read bit can be read
a) and written by CPU
b) and written by peripheral
c) by pheripheral and written by CPU
d) by CPU and written by the peripheral
Ans.
10. The term “aging” refers to
a) booting up the priority of a process in multi-level of queue without feedback.
b) gradually increasing the priority of jobs that wait in the system for a long time
to remedy infinite blocking.
c) keeping track of the following a page has been in memory for the purpose of
LRU replacement
d) letting job reside in memory for a certain amount of time so that the number of
pages required can be estimated accurately.
Ans.
11. Consider a set of n tasks with known runtimes r1, r2 ....... r to be run on a
unlprocessor machine. Which of the following processor scheduling algorithms
will result in the maximum throughput?
a) Round Robin
b) Shortest job first
c) Highest response ratio next
d) first cum first served
Ans.
14. The principal of locality of reference justifies the use of
a) virtual memory
b) interrupts
c) main memory
d) cache memory
Ans.
15. What is the value of I at the end of the pseudocode?
a) 4
b) 5
c) 6
d) 7
Ans.
16. The five items: A, B, C, D, and E are pushed in a stack, one after the other
starting from A. The stack is popped four times and each element Is inserted in a

queue. Then two elements are deleted from the queue and pushed back on the
stack. Now one item is popped from the stack. The popped item is
(a) A
(b) B
(c) C
(d) D
Ans.
17. Round Robin scheduling is essentially the pre-emptive version of
a) FIFO
b) Shortest Job First
c) shortest remaining time
d) Longest remaining time
Ans.
18. The number of digit I present in the binary representation of
3 x 512 +7 x 64 + 5 x 8 +3 is
(a) 8
(b) 9
(c) 1O
(d) 12
Ans.
19. Assume that each character code consists of 8 bits. The number of
characters that can be transmitted per second through an synchronous serial
line at 2400 baud rate, and with two stop bits is

(a)109
(b)216
(c) 218
(d)219
Ans.
20. If the bandwidth of a signal is 5 kHz and the lowest frequency is 52 kHz,
what is the highest frequency?
(a) 5 kHz
(b) 10 kHz
(C) 47 kHz
(d) 57 kHz
Ans.
21. An Ethernet hub
(a) functions as a repeater
(b) connects to a digital PBX
(c) connects to a token-ring network
(d) functions as a gateway
Ans.
22. Phase transition for each bit are used in
(a) Amplitude modulation
(b) Carrier modulation
(C) Manchester encoding
(d) NRZ encoding
Ans.
23. Which of the following is printed as a result of the call demo (1234)?
a) 1441
b) 3443
C) 12344321
d) 43211234
Ans.
24. Bit stuffing refers to
(a) inserting a ‘0’ in user stream to differentiate it with a flag
(b) inserting a ‘0’ in flag stream to avoid ambiguity
(C) appending a nibble to the flag sequence
(d ) appending a nibble to the use data stream
Ans.
25. What is the name of the technique in which the operating system of a
computer executes several programs concurrently by switching back and forth
between them?
(a) Partitioning
(b) Multi tasking
(C) Windowing
(d) Paging
Ans.
26. If there are five routers and six networks in an intranet using link state
routing, how many routing tables are there?
(a) 1
(b) 5
(c) 6
(d) 11
Ans.
27. Virtual memory is
a) Part of Main Memory only used for swapping
b) A technique to allow a program, of size more than the size of the main
memory, town
C) Part of secondary storage used in program execution
d) None of these
Ans.
28. The level of aggregation of information required for operational control is
(a) Detailed
(b) Aggregate
(C) Qualitative
(d) None of the above
Ans.
30. 0.75 in decimal system is equivalent to _______ in octal system
a) 0.60
b) 0.52
C) 0.54
d) 0.50
Ans.
31. In an SR latch made by cross coupling two NAND gates, if both S and R inputs
are set to 0, then it will result in
a) Q= 0, QO = 1
b) Q= 1,Q0 = 0
c) Q= 1,Q0 = 1
d) Indeterminate states
Ans.
33. Company X shipped 5 computer chips, I of which was defective, and
Company Y shipped 4 computer chips, 2 of which were defective. One computer
chip is to be chosen uniformly at random from the 9 chips shipped by the
companies. If the chosen chip is found to be defective, what is the probability
that the chip came from Company Y?
a) 2/9
b) 4/9
c) 2/3
d) 1/2
Ans.
34. Ring counter is analogous to
(a) Toggle Switch
(b) Latch
(C) Stepping Switch
(d) S-R flip flop
Ans.
35. The output 0 and I level for TTL Logic family is approximately

a) 0.1 and5 V
b) 0.6 and 3.5 V
C) 0.9 and 1.75 V
d) —i.75 and O.9 V
Ans.
37. In comparison with static RAM memory, the dynamic RAM memory has
a) lower bit density and higher power consumption
b) higher bit density and higher power consumption
C) lower bit density and lower power consumption
d) higher bit density and lower power consumption.
Ans.
38 The Hexadecimal equivalent of 01111100110111100011 is
(a) CD73E
(b) ABD3F
(c) 7CDE3
(d) FA4CD
Ans.
39. Disk requests are received by a disk drive for cylinder 5, 25, 18, 3, 39, 8 and
35 in that order. A seek takes 5 msec per cylinder moved. How much seek time
is needed to serve these requests for a Shortest Seek First (SSF) algorithm?
Assume that the arm is at cylinder ?,0 when the last of these requests is made
with none of the requests yet served
a) 125 msec
b) 295 msec

c) 575 msec
d) 750 msec
Ans.
40. Consider a system having ‘m’ resources of the same type. The resources are
shared by 3 processes A,B,C which have peak time demands of 3,4,6
respectively. The minimum value of ‘m’ that ensures that deadlock will never
occur is
(a) 11
(b) 12
(c) 13
(d) 14
Ans.
41. A task in a blocked state
a) is executable
b) is running
C) must still be placed in the run queues
d) Is waiting for some temporarily unavailable resources.
Ans.
42. Semaphores
a) synchronize critical resources to prevent deadlock
b) synchronize critical resources to prevent contention
C) are used to do I/O
d) are used for memory management.
Ans.
43. On a system using non-preemptive scheduling, processes with expected run
times of 5, 18, 9 and 12 are in the ready queue. In what order should they be
run to minimize wait time?
(a) 5, 12, 9, 18
(b) 5, 9, 12,18
(C )12,18, 9, 5
(d) 9, 12, 18, 5
Ans.
44. The number of page frames that must be allocated to a running process in a
virtual memory environment is determined by
a) the instruction set architecture
b) page size
c) number of processes in memory
d) physical memory size
Ans.
46 Consider a small 2-way set-associative cache memory, consisting of four
blocks. For choosing the block to be replaced, use the least recently (LRU)
scheme. The number of cache misses for the following sequence of block
addresses is 8,12,0,12,8
a) 2
b) 3
c) 4
d) 5
Ans.
47. Which commands are used to control access over objects in relational
database?

a) CASCADE & MVD
b) GRANT & REVOKE
c) QUE & QUIST
d) None of these
Ans.
48. Which of the following is aggregate function in SQL?
a) Avg
b) Select
c) Ordered by
d) distinct
Ans.
49. One approach to handling fuzzy logic data might be to design a computer
using ternary (base..3) logic so that data could be stored as “true,” “false,” and
“unknown.” if each ternary logic element is called a flit, how many flits are
required to represent at least 256 different values?
a) 4
b) 5
c) 6
d) 7
Ans.
50. A view of a database that appears to an application program is known as
a) Schema
b) Subschema
c) Virtual table
d) None of these

Ans.
51 Armstrong’s inference rule doesn’t determine
a) Reflexivity
b) Augmentation
C) Transitivity
d) Mutual dependency
Ans.
52. Which operation is used to extract specified columns from a table?
a) Project
b) Join
C) Extract
d) Substitute
Ans.
53. In the Big- Endian system, the computer stores
a) MSB of data in the lowest memory address of data unit
b) LSB of data in the lowest memory address of data unit
C) MSB of data in the highest memory address of data unit
d) LSB of data in the highest memory address of data unit
Ans.
54. BCNF is not used for cases where a relation has
a) Two (or more) candidate keys
b) Two candidate keys and composite

c) The candidate key overlap
d) Two mutually exclusive foreign keys
Ans.
55. Selection sort algorithm design technique Is an example of
a) Greedy method
b) Divide-and-conquer
C) Dynamic Programming
d) Backtracking
Ans.
56. Which of the following RAID level provides the highest Data Transfer Rate
(Read / Write)
a) RAID 1
b) RAID 3
C) RAID 4
d) RAID 5
Ans.
57. Which of the following programming language(s) provides garbage
collection automatically
a) Lisp
b) C++
c) Fortran
d) C
Ans.
60. Which of the following is correct with respect to Two phase commit
protocol?
(a) Ensures serializability
(b) Prevents Deadlock
(C) Detects Deadlock
(d) Recover from Deadlock
Ans.
61 The Fibonacci sequence is the sequence of integers
a) 1,3,5,7,9,11,13
b) 0,1,1,2,3,5,8,13,21,54
c) 0, 1, 3, 4, 7, 11, 18, 29, 47
d) 0,1,3,7,15
Ans.
62 Let X be the adjacency matrix of a graph G with no self loops. The entries
along the principal diagonal of X are
(a) all zeros
(b) all ones
(C) both zeros and ones
(d) different
Ans.
63 Which of these is not a feature of WAP 2.0
(a) Push & Pull Model
(b) Interface to a storage device
(c) Multimedia messaging
(d) Hashing
Ans.
64 Feedback queues
(a) are very simple to implement
(b) dispatch tasks according to execution characteristics
(C) are used to favour real time tasks
(d) require manual intervention to implement properly
Ans.
65 Which of the following is not a UML DIAGRAM?
(a) Use Case
(b) Class Diagram
(c) Analysis Diagram
(d) Swimlane Diagram
Ans.
66 Silly Window Syndrome is related to
(a) Error during transmission
(b) File transfer protocol
(c) Degrade in TCP performance
(d) Interlace problem
Ans.
67 To execute all loops at their boundaries and within their operational bounds
is
an example of
(a) Black Box Testing
(b) Alpha Testing
(c) Recovery Testing
(d) White Box Testing
Ans.
68 SSL is not responsible for
(a) Mutual authentication of client & server
(b) Secret communication
(C) Data Integrity protection
(d) Error detection & correction
Ans.
69 A rule in a limited entry decision table is a
(a) row of the table consisting of condition entries
(b) row of the table consisting of action entries
(C) column of the table consisting of condition entries and the corresponding
action entries
(d) columns of the table consisting of conditions of the stub
Ans.
70 The standard for certificates used on internet is
a) X.25
b) X.301
c) X.409
d) X.509
Ans.

71 Hashed message is signed by a sender using
a) his public key
b) his private key
C) receivers public key
d) receivers private key
Ans.
72 An email contains a textual birthday greeting, a picture of a cake, and a song.
The order is not important. What is the content-type?
a) Multipart / mixed
b) Multipart / parallel
c) Multipart / digest
d) Multipart / alternative
Ans.
73 Range of IP Address from 224.0.0.0 to 239.255.256.255 are
a) Reserved for Loopback
b) Reserved for broadcast
C) Used for muticast packets
d) Reserved for future addressing
Ans.
74 IEEE 802.11 is standard for
a) Ethernet
b) Bluetooth
C) Broadband Wireless
d) Wireless LANs
Ans.
75 When a host on network A sends a message to a host on network B, which
address does the router look at?
a) Port
b) IP
C) Physical
d) Subnet mask
Ans.
76 Which of the following is not an approach to Software Process Assessment?
a) SPICE (ISO/IECI 5504)
b) Standard CMMI Assessment Method for process improvement
C) ISO 9001 : 2000
d) IEEE 2000:2001
Ans.
77 A physical DFD specifies
a) what processes will be used
b) who generates data and who processes it
c) what each person in an organization does
d) which data will be generated
Ans.
78 In UML diagram of a class
a) state of object cannot be represented

b) state is irrelevant
c) state is represented as an attribute
d) state is represented as a result of an operation
Ans.
79 Which of the following models is used for software reliability?
a) Waterfall
b) Musa
c) COCOMO
d) Rayleigh
Ans.
80 Djikstra’s algorithm is used to
a) Create LSAs
b) Flood an internet with information
C) Calculate the routing tables
d) Create a link state database
Ans.
  #3  
21st May 2015, 04:21 PM
Unregistered
Guest
 
Re: HAL Management Trainee (Technical) CSE previous year question papers

Hi, Will any one here share the previous year question paper for the HAL management trainee (CSE) exam?
  #4  
21st May 2015, 04:22 PM
Super Moderator
 
Join Date: Apr 2013
Re: HAL Management Trainee (Technical) CSE previous year question papers

As per your request, I am forwarding you 2008 question paper for the Management Trainee (Computer science engineering) conducted by the HAL. Hope it works.

Section A : General Awareness :

1. The Kaziranga national park in Assam is famous for ---
A) one horn rhinoceros B)white tiger C)Impale D)none of these
ans a

2. The old name of Delhi was ---
a) Indrastuptha b)gaya c) pataliputra d) ayodhya

3. All the electioneering campaign has to end ---
a) before 48 hrs of polling b) before 48 hrs of commencement of results c) before 36 hrs of polling
d) before 72 hrs of polling

4. In 1590, when Portuguese first visited the island Taiwan they named it as
a) Taliban b)mayanmar c) forusa (spelling missing) d) none of these

5. According to Indian mythology Ravana was well skilled in playing ---
a) sitar b)sarood c)Harmonium d) flute

6. Which of the following is not a beach in Goa --- no idea about options

7. Which hindi (b/w) film was first converted to color ---
a) Moghal E Azam b) Alam Ara c) Satya Harishchandra d) none

8. Which of the following book is not written by Charles Drekens... no idea about options English related ….

9. Escape : Abscond : ---

10. inception : Conclusion : ---

11. The appropriate meaning of Ocular in the following is ---

12. Which hand you use to write ---? A) about b) on c) in d) with

13. He is in the habit --- (find ) new things
a) in finding b) of finding c) with finding d)to finding

14. Phoebe was in the car when her phone is ringing --- rewrite the sentence without changing the meaning

15. She was in the kitchen when the telephone was ringing --- rewrite the sentence

16. All his friends are older --- him
a)to b)than c)for d)from

17. You --- be careful when you want not to be blamed
a)have to b) has to c) had to d) none of these

Section B : Mental Ability and Quants :

18. What is the next number in the series : 4, -8,16,-32,64,
a) 192 b) 256 c)-128 d)128 ans c

19. odd men out …. 3,5,7,11,12,13,17,19
a) 3 b) 7 c)12 d)19 ans c

20. In the following series which is not correctly fit 7,8,18,57,228,1165,6996
a)7 b)57 c)228 d) none of these ans c

21. odd men out 583, 462, 792,427,132
a) 462 b)427 c) 132 d) 792 ans b

22. if x>y and x2-2xy + y2 -9=0, x +y = 15 …what is the value of x
a)3 b)12 c)10 d)9 ans d

23. How many times in day the hands of a clock are straight
a) 48 b)44 c)22 d) 24 ans B

24. Which of the following numbers is divisible by 3,7,9 and 11
a)2079 b) 1266 c)1165 d) none of these ans a

25. Odd men out sitar, veena, tumpura, sarood

26. Odd men out : cricket, boxing, golf, tennis, hockey, football, bowling
a) cricket b)bowling c) golf d) boxing

Three Questions were given on figures like what is the next figure in sequence

Section C : Technical Related to Digital Electronics :

27. The radix or base of hexadecimal number system is ---
a) 8 b)16 c)5 d)none of these

28. The no of 1’s in the binary representation of the expression 162*9+162*7+16*5+3 are ….
a)10 b)23 c)6 d)4

29. The no of latches in F/F are ---
a)1 b) 2 c) 3 d)4

30. How many flip-flops are required to construct Mod -12 counter
a)5 b)4 c)12 d)none

31. Which logic gate has the output is compliment of its input ---
a) OR b) AND c)NOT d) X-OR

32. No.of 2-input multiplexers needed to construct a 210 input multiplexer….
a) 12 b)31 c)20 d)16

33. By adding inverters to the inputs and output of a AND gate we can obtain ……
a ) OR b) AND c)NOT d) X-OR

34. How many NAND gates are needed to realize OR gate ---
a)1 b) 2 c) 3 d)4

35. Which is the first integrated logic family ---
a) RTL b)DTL c)TTL d) none of these

36. The advantage of CMOS over TTL are ---

37. The range of allowable voltages for CMOS are ---

38. The voltages required to 0 and 1 in TTL family are ---

39. Which logic gate has output high if and only if all inputs are low ---?
a) NOR b)NAND c) X-NOR d)AND

40. According to Boolean algebra 1+A+B+C =
a) A b) A+B+C c)1 d) none of these

41. If a=0x6db7 and b=0x2ae9 then what is the value of a”b ---

Questions related to C :

42. Which of the following is not a primitive type in C
a)Int b)Float c) Char d) noneof these

43. If you want to accept variable no of arguments then you have to include which of the following header files
a) Vararg.h b) stdarg.h c) stdlib.h d) stdioh

44. Register variables are stored in ---
a) CPU b) main memory c) secondary memory d) peripheral memory

45. What are pointers , when declared , initialized to ---
a) Garbage b)NULL c)0 d) nothing

46. When you divide a program into functions ---
a) it is easy to conceptualize and runs faster than usual
b) it is easy to conceptualize
c) it runs faster than actual one
d) none

47. In order to use a pointer it has to be ---
a) declared b) declared and initialized c) no need of declaration d) initialized

48. What is the output of the following program snippet
Int a=6,b=4; Pirntf(“%d”, a==b); a) Prints 6 b)prints 0 c)Prints 1 d) prints 6 4

49. What is the output of following code segment Char wer[3][4] = {‘per’,’max,’min’}; Char (*ptr)[4]=wer; Printf (“%d%d”,ptr,ptr++);
a)262 262 b)262 263 c)262 265 d0262 266

50. If we give 12345 through scanf what are the values stored at a,b,c Int a,b,c; Scanf(“%d%d%d”, &a,&b,&c);
a)a=12, b=34,c=5 b)a=12345 and nothing at b,c c)c=12345 and nothing at a,b d)an error message

51. What is the value stored in S Char s[4]; Scanf(“%s”, ‘1234’);
a)1234 b) 1 c) garbze d) error

52. What is the output if we give abc through scanf Char x,y,z; Printf(“%d”,scanf(“%c%c%c”, &x,&y,&z));
a) prints 3 b) prints 1 c) error message d) prints nothing

53. A variable declared as “ unsigned U” then u is interpreted as
a) unsigned char b) unsigned int c) unsigned float d) the declaration is not possible

54. char c;Printf(“%d”, c); prints ----------------
A negative integer b)always positive integer c) garbage d)none

55. What is the output of the following program
Int a=1;
Printf(“%d”,(a++));
a)1 b)2 c)error message d) none

56.which of the following is incorrect about ++ operator
It is a unary operator b) it can be used in expressions c) left as well as right associative d) can be overloaded

Questions related to TOC and LP :

57. Two languages S and T represented by the regular expressions s=(a+b*) T=(a+b)* then the relation between them is
a)s

58. The language L={an bn cn /n=1,2,3,4………} is
a) not context free language but its complement is I CF
b) a context free language
c) a context free language and accepted by Push Down Automata
d) a context sensitive language

59. Finite State Automation --- device
a) repeater b) acceptor c) divider d) adder

60. The language L={anbn /n=1,2,3,4…………} can be generated from
a) S? ab/aSb/
b) S? aaSbb/ab
c)S? abb/aSb
d) ab/aSb

61. The regular expression (a/b) generates the set
a) {a} b) {b} c{a,b} d) none

62. The regular expression (a/b)* represents
a) all combinations of a or b and same as (a*b*)*
b) all combinations of a or b and not same as (a*b*)*
c) all combinations of a and b , same as (a*b*)*
d) all combinations of a and b not same as (a*b*)*

63. Context sensitive Languages are ---
a) super set of context free languages and accepted by Push Down Automata
b) super set of context free languages and accepted by non deterministic PDA
c) Accepted by Turing machines only d) none of the above statements are correct

64. Any context free Grammar can be converted into
a) Chomsky Normal Form b) GreiBack Normal form c) CNF and GBNF d) none

65. If a grammar is left-recursive and right-recursive to a non-terminal symbol then the grammar is
a) Ambiguous b) Unambiguous c) the information provided is not sufficient to determine d) none

66. FSA can be used to add two Integers ---
a)TRUE b) may be TRUE c)FALSE d ) may be FALSE

67. context sensitive languages are ---
a) accepted by push down automata b) accepted by non-deterministic pushdown automata
c) accepted by 2- way linear bounded automata d) a& c

68. The difference between the Moor and Mealay machines is
a) the former one depends on the present state and present inputs
b) the former one depends on the present state only
c) the later depends on the present state and present inputs
d) the later depends on the present input only

69. An FSA can be stated as ---
A Turing machine with finite tape, unidirectional moment
A Turing machine with finite tape and bidirectional moment
A Turing machine with finite tape, unidirectional and no repetitions
A Turing machine with infinite tape, unidirectional and no repetitions

70. Recursive Languages are ---
a) super set of all languages
b) type -8 grammar languages
c) accepted by Turing machine
d) we cant say anything about acceptance

71. Which of the following statement is wrong about regular expressions
a) there exists a FSM to accept regular expression
b) there exists a N-FSM to accept regular expression
c) there are no ? symbols in regular expression
d) none

72. Regular expression cannot be used in which of the following
a) construction of text editors
b) design of serial circuits
c) design of compilers
d) finding text patterns

Questions related to hardware and OS :

73. The term “memory” is related to
a) input and output b) storage c) ALU d) none

74. Which of the following is not a Operating system
a)AIX b)PROLOG c) WINDOWS d) UNIX

75. The CPU or MPU consists of
a) input and output b) memory c) ALU d) All of the above

76. In a multiprogramming system
a) there are more than one processor
b) program are executed faster than actual
c) used in case of large programs only
d) more programs executed than actual in given time

77. The front side bus (FSB) also called as
a) control bus b) the processor bus c) PCI bus and processor bus d) none

78. Which language is used Artificial Intelligence SYSTEMS
a) Java b) c# c) prolog d) Lisp

79. What is the capacity of Hollerith card when it is in extended state
a) 32kb b) 120 kb c) 240 kb d) 20 kb

80. How many slots are there for UTM device
a)1 b) 2 c) 3 d) 4

81. Which part of the computer has the capability to acces memory and manipulate the memory contents
a) input/output b) cpu d) ALU d) none

82. The register which is used to locate the address of the operands and restore the contents is
a) memory address register b) memory data register c) instruction register d) none

83. The opcode ---
a) tells the address of operands b) instructs the processor c) stores the values d) specifies the operation

84.the language first executed by microprocessor is
a) BASIC b) FORTRAN c) PASCAL d) MODULA

85. which language most suitable for mathematical calculations
a) FORTRAN b) PASCAL c ) C++ d) NONE

Questions related to C++ and OOPs : they asked around 20 qs on this (5+ related to friend function)

86. The protected members are ---
a) accessible within the class only b) accessible within the class and derived class c)cannot be accessed outside the class d)can be accessed anywhere

87. By default the access specifier is ---
a)private b)public c)protected d)none

88. A class is a ---
a) a abstract data type b) way of encapsulating data and code c) structure d)…….

89. Which function can access the private members of a class ---
a) any function b) member function of derived class c) friend function of that class d) friend function of derived class

90. In order to access the private members of four classes that function has to be declared as friend of ---
a) any one class b) all four classes c)any three classes d) any two classes

91. When a class is derived from another derived class then that inheritance is called ----------
a) multiple b) multipath c) hybrid d) multilevel

92. Which of the following are correct about A static member function
a) it has only one copy for all instances and it can access constant variables
b) it has separate copy for each instances
c) it cannot operate on constant variable
d) ………….

93. You are hiding the data when you are writing
a) a class b) cryptic code c) static function d) ADT

94. In order to declare a member function of one class as a friend of another class we need to use
a) the key word Friend b) the key word friend and scope resolution c) only scope resolution d) nothing

Question s from Discrete mathematics (only 2) :

95. There are 100 nodes in a graph . if two nodes i ,j are said to be adjacent then |i-j|=12 or 8.
How many connected components in the above graph a)4 b) 8 c) 12 d) 25

96. In case of a binary tree all parent nodes are having degree 2 and in the child level the child are associated to left . what is the name of the tree
a) full binary tree b) complete binary tree c) threaded binary tree d) none

DAA :

97. What is the worst case complexity of bubble sort
a) O(n) b) O(logn) c) O(nlogn) d) O(n2)

98.which of the following sorting technique performs well when the element are in reverse order
a) bubble sort b) insertion sort b) mergesort d) heap sort

99. In which type of searching we can search the element in O(1) time averagely
a) linear search b) radix search c) hash based search d) binary search


Quick Reply
Your Username: Click here to log in

Message:
Options




All times are GMT +5. The time now is 11:47 AM.


Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2024, vBulletin Solutions Inc.
SEO by vBSEO 3.6.0 PL2

1 2 3 4