This is Trinadh, student of VRSEC, CSE branch. I want to share my experience with us, friends this is my 7th attempt, CSC conducted campus selection on Aug 5th in my college, they are around 300 students who participated in this selection, they conducted 2 written tests one aptitude, another one is technical test. After this they short the list 75 members, for these members they conducted JUST A MIN, and ESSAY WRITING, after this 2 rounds they shorted 30 members, again they conduct technical, HR round, in tech mainly they concentrated on DBMS, SO prepare this throughly. finally they selected 21 members, I m one of these members. thanks god.

Friends dont loose hope and confidence, God will help u. For technical test the questions which are mentioned in previous papers is more enough, so u must go through once.

This is a 40 minutes paper containing 75 questions. There is no negative marking

1.——- is associated with webservices.
a) WSDL b) WML c) web sphere d) web logic

2. any large single block of data stored in a database, such as a picture or sound file, which does not include record fields, and cannot be directly searched by the database’s search engine.

3. A reserved area of the immediate access memory used to increase the running speed of the computer program.
a) session memory b) bubble memory c) cache memory d) shared memory

4.a small subnet that sit between a trusted internal network and an untrusted external network, such as the public internet.
a) LAN b) MAN c) WAN d) DMZ

5.technologies that use radio waves to automatically identify people or objects, which is very similar to the barcode identification systems,seen in retail stores everyday.

float fl = 10.5;
double dbl = 10.5
if(fl ==dbl)
printf(“UNITED WE STAND”);

what is the output?
a) compilation error b)UNITED WE STAND c)DIVIDE AND RULE d)linkage error.

static int ivar = 5;

what is the output?
a)1 2 3 4 5 b) 5 4 3 2 1 c)5 d)compiler error:main cannot be recursive function.

extern int iExtern;
iExtern = 20;

what is the output?
a)2 b) 20 c)compile error d)linker error

9..#define clrscr() 100
printf(“%d\n\t”, clrscr());

what is the output?
a)100 b)10 c)compiler errord)linkage error

void vpointer;
char cHar = ‘g’, *cHarpointer = “GOOGLE”;
int j = 40;
vpointer = &cHar;
vpointer = &j;
printf(“%d”,*(int *)vpointer);
vpointer = cHarpointer;
printf(“%s”,(char*)vpointer +3);

what is the output?
a)g40GLE b)g40GOOGLE c)g0GLE d)g4GOO

11.#define FALSE -1
#define TRUE 1
#define NULL 0
main() {
if (NULL)
puts (“NULL”);
else if(FALSE)
puts (“TRUE”);
puts (“FALSE”);

what is the output?
a) NULL b) TRUE c) FALSE d)0

12.main() {
int i =5,j= 6, z;
what is the output?
a)13 b)12 c)11 d) compiler error

13.main() {
int i ;
i = accumulator();
_AX =1000;

what is output?
a)1 b)10 c)100 d)1000

14.main() {
int i =0;
while(+(+i–)!= 0)
i- = i++;

what is the output?
a)-1 b)0 c)1 d)will go in an infinite loop

int i =3;
for(; i++=0;)

what is the output?
a)1b)2c)1 2 3d)compiler error:L value required.

int i = 10, j =20;
j = i ,j?(i,j)?i :j:j;
}what is the output?
a)20 b)20 c)10 d)10
extern i;
int i =20;

what is output?
a) “Extern valueof i” 20 b) Externvalue of i
c)20 d)linker Error:unresolved external symbol i DIMension(int array[]){
return sizeof(array/sizeof(int);}
int arr[10];
printf(“Array dimension is %d”, DIMension(arr));

what is output?
a)array dimension is 10 b)array dimension is 1
c) array dimension is 2 d)array dimension is 5

void swap();
int x = 45, y = 15;
printf(“x = %d y=%d”x,y);
void swap(int *a, int *b){
*a^=*b, *b^=*a, *a^ = *b;

what is the output?
a) x = 15, y =45 b)x =15, y =15 c)x =45 ,y =15 d)x =45 y = 45

int i =257;
int *iptr =&i;
printf (“%d%d”,*((char*)iptr),* ((char *)iptr+1));

what is output?
a)1, 257 b)257 1c)0 0d)1 1

int i =300;
char *ptr = &i;

what is output?
a)556 b)300 c)2 d)302

22. #include
char *str =”yahoo”;
char *ptr =str;
char least =127;
least = (*ptr
printf (“%d”,least);

what is the output?
a)0 b)127 c) yahoo d) y

23.Declare an array of M pointers to functions returning pointers to functions returning pointers to characters.
a)(*ptr[M]()(char*(*)()); b)(char*(*)())(*ptr[M])()
c) (char*(*)(*ptr[M]())(*ptr[M] () d)(char*(*)(char*()))(*ptr[M]) ();

24.void main(){
int I =10, j=2;
int *ip = &I ,*jp =&j;
int k = *ip/*jp;

what is the output?
a)2 b)5 c)10 d)compile error:unexpected end of file in comment started in line 4

char a[4] =”GOOGLE”;

what is the output?
a)2 b) GOOGLE c) compile error: yoo mant initializers d) linkage error.

26.For 1MB memory, the number of address lines required
a)12 b)16 c)20 d)32

27.There is a circuit using 3 nand gates with 2 inputs and 1 output, find the output.
a) AND b) OR c) XOR d) NAND

28.what is done for push operation
a) SP is incremented and then the value is stored.
b) PC is incremented and then the value is stored.
c) PC is decremented and then the value is stored.
d) SP is decremented and then the value is stored.

29.Memory allocation of variables declared in a program is ——
a) Allocated in RAM
b) Allocated in ROM
c) Allocated in stack
d) Assigned in registers.

30.What action is taken when the processor under execution is interrupted by TRAP in 8085MPU?
a) Processor serves the interrupt request after completing the execution of the current instruction.
b) processor serves the interrupt request after completing the current task.
c) processor serves the interrupt immediately.
d) processor serving the interrupt request depends upon the priority of the current task under execution.

31.purpose of PC (program counter)in a microprocessor is —-
a) To store address of TOS (top of stack)
b) To store address of next instructions to be executed
c) count the number of instructions
d) to store the base address of the stack.

32.conditional results after execution of an instruction in a microprocessor is stored in
a) register b) accumulator c) flag register d) flag register part of PSW (program status word)

33.The OR gate can be converted to the NAND function by adding—-gate(s)to the input of the OR gate.
a) NOT b) AND c) NOR d) XOR

34.In 8051microcontroller,——has a dual function.
a) port 3 b) port 2 c) port 1 d) port 0

35.An 8085 based microprocessor with 2MHz clock frequency, will execute the following chunk of code with how much delay?
a) 102.3 b)114.5 c)100.5 d)120

36.In 8085 MPU what will be the status of the flag after the execution of the following chunk of code.
a) S = 1, Z = 0, CY = 1 b)S = 0, Z = 1, CY = 0
c) S = 1, Z = 0, CY = 0 d)S = 1, Z = 1, CY = 1

37.A positive going pulse which is always generated when 8085 MPU begins the machine cycle.
a) RD b) ALE c) WR d) HOLD

38.when a —– instruction of 8085 MPU is fetched, its second and third bytes are placed in the W and Z registers.
a) JMP b) STA c) CALL d) XCHG

39.what is defined as one subdivision of the operation performed in one clock period.
a) T- State b) Instruction Cycle c) Machine Cycle d) All of the above

40.At the end of the following code, what is the status of the flags.
a) S = 1, CY = 0, P = 0, AC = 1
b) S =0 , CY = 1, P = 0, AC = 1
c) S = 0, CY = 1, P = 0, AC = 1
d) S = 0, CY = 1, P = 1, AC = 1

46. The repeated execution of a loop of code while waiting for an event to occur is called ———. The cpu is not engaged in any real productive activity during this period, and the process doesn’t progress towards completion.
a) dead lock b) busy waiting c) trap door d) none.

47. Transparent DBMS is defined as
a) A DBMS in which there are no program or user access languages. b) A DBMS which has no cross file capabilities but is user friendly and provides user interface management. c) A DBMS which keeps its physical structure hidden from user d) none.

48. Either all actions are carried out or none are.users should not have to worry about the effect of incomplete transactions. DBMS ensures this by undoing the actions of incomplete transactions. this property is known as
a) Aggregation b) atomicity c) association d) data integrity.

49. —— algorithms determines where in available to load a program. common methods are first fit,next fit, best fit.——— algorithm are used when memory is full , and one process (or part of a process) needs to be swapped out to accommodate a new program. The ——- algorithm determines which are the portions to be swapped out.
a) placement, placement, replacement
b) replacement, placement, placement
c) replacement, placement, replacement
d) placement, replacement, replacement

50. Trap door is a secret undocumented entry point into a program used to grant access without normal methods of access authentication. A trap is a software interrupt,usually the result of an error condition.
a)true b)false.

55. in recursive implementations which of the following is true for saving the state of the steps
a) as full state on the stack
b) as reversible action on the stack
c) both a and b
d) none

56. which of the following involves context switch
a) previliged instruction
b) floating point exception
c) system calls
d) all
e) none

57. piggy backing is a technique for
a) acknowledge b) sequence c) flow control d) retransmission

58. a functional dependency XY is _______ dependency if removal of any attribute A from X means that the dependency does not hold any more
a) full functional
b) multi valued
c) single valued
d) none

59) a relation schema R is in BCNF if it is in ________ and satisfies an additional constraints that for every functional dependency XY,X must be a candidate key
a)1 NF b)2 NF c)3 NF d)5 NF

60) a _________sub query can be easily identified if it contains any references to the parent sub query columns in the _________ clause
a) correlated, WHERE
b) nested, SELECT
c) correlated, SELECT
d) none

61) hybrid devise that combines the features of both bridge and router is known as
a)router b)bridge c)hub d)brouter

62) which of the following is the most crucial phase of SDLC
a) testing b) code generation c) analysys and design d) implementation
63)to send a data packet using datagram, connection will be established
a) no connection is required
b) connection is not established before data transmission
c) before data transmission
d) none

64)a software that allows a personal computer to pretend as as computer terminal is
a) terminal adapter
b) terminal emulation
c) modem
d) none

65) super key is
a) same as primary key
b) primary key and attribute
c) same as foreign key
d) foreign key and attribute

66.In binary search tree which traversal is used for ascending order values
a) Inorder b)preorder c)post order d)none

67.You are creating an index on ROLLNO colume in the STUDENT table.which statement will you use?
a) CREATE INDEX roll_idx ON student, rollno;
b) CREATE INDEX roll_idx FOR student, rollno;
c) CREATE INDEX roll_idx ON student (rollno);
d) CREATE INDEX roll_idx INDEX ON student (rollno);

68. A______ class is a class that represents a data structure that stores a number of data objects
a. container b.component c.base d.derived

69.Which one of the following phases belongs to the compiler Back-end.
a. Lexical Analysis b.Syntax Analysis c. Optimization d.Intermediate Representation.

70.Every context _sensitive language is context_free
a. true b.false

71.Input:A is non-empty list of numbers L
For each item in the list L, do
If the item>x,then
Xßthe item
Return X

X represents:-
a)largest number
b)smallest number
c)smallest negative number
d) none

72.Let A and B be nodes of a heap,such that B is a child of A. the heap must then satisfy the following conditions
a) key(A)>=key(B)
b) key(A)
c) key(A)=key(B)
d) none

73.String,List,Stack,queue are examples of________
a) primitive data type
b) simple data type
c) Abstract data type
d) none

74.which of the following is not true for LinkedLists?
a) The simplest kind of linked list is a single linked list, which has one link per node. this link points to the next node in the list, or to a null value or emptylist if it is the last node.
b)a more sophisticated kind of linked list is a double linkedlist or two way linkedlist. Each node has two links ,one to the previous node and one to the next node.
c) in a circleLinkedList, the first and last nodes are linked together. this can be done only for double linked list.
d) to traverse a circular linkedlist, u begin at any node and follow the list in either direction until u return to the original node.

75.sentinel node at the beginning and /or at the end of the linkedlist is not used to store the data
a) true b) false

For Technical test these questions are enough, but aptitude test some what tough, for this u must go through RS AGRWAL, this is enough to qualify these 2 tests.


If you have questions, please ask below

Leave a Reply

If you have any questions headover to our forums

You can use these XHTML tags: <a href="" title=""> <abbr title=""> <acronym title=""> <blockquote cite=""> <code> <em> <strong>