SIEMENS INFO
THIS PAPER CONSISTS 6 PARTS. all are multiple choice q's
1)general
2)c/unix
3)c++/motif
4)database
5)x-windows
6)ms-windows
We have written q's not acc. to each part.total 50. q's. time is
sufficient. If u have basic idea about all of the u can easily answer the paper.
paper
1)which of following operator can't be overloaded.
a)== b)++ c)?! d)<= 2)#include
3)CDPATH shell variable is in(c-shell)
a) b) c) d)
4) term stickily bit is related to a)kernel
b)undeletable file
c) d)none
5)semaphore variable is different from ordinary variable by
6)swap(int x,y)
{
int temp;
temp=x;
x=y;
y=temp;
}
main()
{
int x=2;y=3;
swap(x,y);
}
after calling swap ,what are yhe values x&y?
{
int temp;
temp=x;
x=y;
y=temp;
}
main()
{
int x=2;y=3;
swap(x,y);
}
after calling swap ,what are yhe values x&y?
7) static variable will be visible in
a)fn. in which they are defined
b)module " " " "
c)all the program
d)none
b)module " " " "
c)all the program
d)none
8)unix system is
a)multi processing
b)multi processing ,multiuser
c)multi processing ,multiuser,multitasking
d)multiuser,multitasking
a)multi processing
b)multi processing ,multiuser
c)multi processing ,multiuser,multitasking
d)multiuser,multitasking
9)x.25 protocol encapsulates the follwing layers
a)network
b)datalink
c)physical
d)all of the above
e)none of the above
a)network
b)datalink
c)physical
d)all of the above
e)none of the above
10)TCP/IP can work on
a)ethernet
b)tokenring
c)a&b
d)none
a)ethernet
b)tokenring
c)a&b
d)none
11)a node has the ip address 138.50.10.7 and 138.50.10.9.But it is
transmitting data from node1 to node2only. The reason may be
a)a node cannot have more than one address
b)class A should have second octet different
c)classB " " " " "
d)a,b,c
transmitting data from node1 to node2only. The reason may be
a)a node cannot have more than one address
b)class A should have second octet different
c)classB " " " " "
d)a,b,c
12) the OSI layer from bottom to top
13)for an application which exceeds 64k the memory model should be
a)medium
b)huge
c)large
d)none
a)medium
b)huge
c)large
d)none
14)the condition required for dead lock in unix sustem is
15)set-user-id is related to (in unix)
16) bourne shell has
a)history record
b)
c)
d)
a)history record
b)
c)
d)
17)wrong statement about c++
a)code removably
b)encapsulation of data and code
c)program easy maintenance
d)program runs faster
a)code removably
b)encapsulation of data and code
c)program easy maintenance
d)program runs faster
18)struct base {int a,b;
base();
int virtual function1();
}
struct derv1:base{
int b,c,d;
derv1()
int virtual function1();
}
base();
int virtual function1();
}
struct derv1:base{
int b,c,d;
derv1()
int virtual function1();
}
struct derv2 : base
{int a,e;
}
base::base()
{
a=2;b=3;
}
derv1::derv1(){
b=5;
c=10;d=11;}
base::function1()
{return(100);
}
derv1::function1()
{
return(200);
}
main()
base ba;
derv1 d1,d2;
printf("%d %d",d1.a,d1.b)
o/p is
a)a=2;b=3;
b)a=3; b=2;
c)a=5; b=10;
d)none
{int a,e;
}
base::base()
{
a=2;b=3;
}
derv1::derv1(){
b=5;
c=10;d=11;}
base::function1()
{return(100);
}
derv1::function1()
{
return(200);
}
main()
base ba;
derv1 d1,d2;
printf("%d %d",d1.a,d1.b)
o/p is
a)a=2;b=3;
b)a=3; b=2;
c)a=5; b=10;
d)none
19) for the above program answer the following q's
main()
base da;
derv1 d1;
derv2 d2;
printf("%d %d %d",da.function1(),d1.function1(),d2.function1());
o/p is
a)100,200,200;
b)200,100,200;
c)200,200,100;
d)none
main()
base da;
derv1 d1;
derv2 d2;
printf("%d %d %d",da.function1(),d1.function1(),d2.function1());
o/p is
a)100,200,200;
b)200,100,200;
c)200,200,100;
d)none
20)struct {
int x;
int y;
}abc;
you can not access x by the following
1)abc--x;
2)abc[0]--x;
abc.x;
(abc)--x;
a)1,2,3
b)2&3
c)1&2
d)1,3,4
int x;
int y;
}abc;
you can not access x by the following
1)abc--x;
2)abc[0]--x;
abc.x;
(abc)--x;
a)1,2,3
b)2&3
c)1&2
d)1,3,4
21) automatic variables are destroyed after fn. ends because
a)stored in swap
b)stored in stack and poped out after fn. returns
a)stored in swap
b)stored in stack and poped out after fn. returns
c)stored in data area
d)stored in disk
d)stored in disk
22) relation between x-application and x-server (x-win)
23)UIL(user interface language) (x-win)
24)which is right in ms-windows
a)application has single qvalue system has multiple qvalue
b) " multiple " " single "
c)" " " multiple "
d)none
a)application has single qvalue system has multiple qvalue
b) " multiple " " single "
c)" " " multiple "
d)none
25)widget in x-windows is
26)gadget in x_windows is
27)variable DESTDIR in make program is accessed as
a)$(DESTDIR)
b)${DESTDIR}
c)DESTDIR
d)DESTDIR
a)$(DESTDIR)
b)${DESTDIR}
c)DESTDIR
d)DESTDIR
28)the keystroke mouse entrie are interpreted in ms windows as
a)interrupt
b)message
c)event
d)none of the above
a)interrupt
b)message
c)event
d)none of the above
29)link between program and out side world (ms -win)
a)device driver and hardware disk
b)application and device driver
c)application and hardware device
d)none
a)device driver and hardware disk
b)application and device driver
c)application and hardware device
d)none
30)ms -windows is
a)multitasking
b) c) d)
a)multitasking
b) c) d)
31)dynimic scoping is
32) after logout the process still runs in the background by giving
the command
a)nohop
b)
the command
a)nohop
b)
33)process dies out but still waita
a)exit
b)wakeup
c)zombie
d)steep
a)exit
b)wakeup
c)zombie
d)steep
34)in dynamic memory allocation we use
a)doubly linked list
b)circularly linked
c)B trees
d)L trees
e)none
a)doubly linked list
b)circularly linked
c)B trees
d)L trees
e)none
35)to find the key of search the data structure is
a)hask key
b)trees
c)linked lists
d)records
a)hask key
b)trees
c)linked lists
d)records
36)data base
-------------------------- --------------------------------
-------------------------- --------------------------------
employ_code salary employ_code leave
---------------------------
----------------------------------
from to
--------------------------------------
1236 1500 1238 --- ---
1237 2000 1238 --- ---
1238 2500 1237 ---
-----
1237 --- ---
1237 --- ---
1237 --- ---
-------------------------- --------------------------------------
select employ_code,employ_data ,leave
the number of rows in the o/p
a)18
b)6
c)7
d)3
---------------------------
----------------------------------
from to
--------------------------------------
1236 1500 1238 --- ---
1237 2000 1238 --- ---
1238 2500 1237 ---
-----
1237 --- ---
1237 --- ---
1237 --- ---
-------------------------- --------------------------------------
select employ_code,employ_data ,leave
the number of rows in the o/p
a)18
b)6
c)7
d)3
37)DBMS
38)read about SQL,db
39)which is true
a)bridge connects dissimiler LANand protocol insensitive
b)router " " " " "
c)gateway " " " " "
d)none of the above
a)bridge connects dissimiler LANand protocol insensitive
b)router " " " " "
c)gateway " " " " "
d)none of the above
40)read types of tree traversals.
41)42)43) simple programs on pointers in c
Siemens Information Systems Test
1. Which of following operator can't be overloaded.
a) ==b) ++ c) ?! d) <= 2. For the following C program #includemain(){printf("Hello World");}
The program prints Hello World without changing main() ,the output shouldbe
intialisationHello WorldDesruct
The changes should bea) IOstream operator<<(iostream os, char*s) os<<'intialisation'<<(Hello World)<
1. Which of following operator can't be overloaded.
a) ==b) ++ c) ?! d) <= 2. For the following C program #include
The program prints Hello World without changing main() ,the output shouldbe
intialisationHello WorldDesruct
The changes should bea) IOstream operator<<(iostream os, char*s) os<<'intialisation'<<(Hello World)<
c) d) none of the above
3. CDPATH shell variable is in(c-shell)
4. The term stickily bit is related to
a) Kernelb) Undeletable filec) Both (a) and (b)d) None
5. Semaphore variable is different from ordinary variable by
6. For the following C program:
swap(int x,y){ int temp;temp=x;x=y;y=temp;}
main(){int x=2;y=3;swap(x,y);}
After calling swap, what are the values x & y?
7. Static variable will be visible in
a) Function. in which they are definedb) Module in which they are definedc) All the programd) None
8. Unix system is
a) Multi processingb) Multi processing, multiuserc) Multi processing, multiuser, multitaskingd) Multiuser, multitasking
9. X.25 protocol encapsulates the follwing layers
a) Networkb) Datalinkc) Physicald) All of the abovee) None of the above
10. TCP/IP can work on
a) Ethernetb) Tokenringc) (a) & (b)d) None
11. A node has the IP address 138.50.10.7 and 138.50.10.9. But it is transmitting data from node1 to node 2only. The reason may be
3. CDPATH shell variable is in(c-shell)
4. The term stickily bit is related to
a) Kernelb) Undeletable filec) Both (a) and (b)d) None
5. Semaphore variable is different from ordinary variable by
6. For the following C program:
swap(int x,y){ int temp;temp=x;x=y;y=temp;}
main(){int x=2;y=3;swap(x,y);}
After calling swap, what are the values x & y?
7. Static variable will be visible in
a) Function. in which they are definedb) Module in which they are definedc) All the programd) None
8. Unix system is
a) Multi processingb) Multi processing, multiuserc) Multi processing, multiuser, multitaskingd) Multiuser, multitasking
9. X.25 protocol encapsulates the follwing layers
a) Networkb) Datalinkc) Physicald) All of the abovee) None of the above
10. TCP/IP can work on
a) Ethernetb) Tokenringc) (a) & (b)d) None
11. A node has the IP address 138.50.10.7 and 138.50.10.9. But it is transmitting data from node1 to node 2only. The reason may be
a) A node cannot have more than one addressb) class A should have second octet differentc) class B should have second octed differentd) All of the above
12. The OSI layer from bottom to top
13. For an application which exceeds 64k the memory model should be
a) Mediumb) Hugec) Larged) None
14. The condition required for dead lock in unix system is
15. Set-user-id is related to (in unix)
16. Bourne shell has
a) History record****other choices not given
17. Which of the following is not true about C++
a) Code removablyb) Encapsulation of data and codec) Program easy maintenanced) Program runs faster
18. For the following C program
struct base {int a,b;base();int virtual function1();}
struct derv1:base{int b,c,d;derv1()int virtual function1();}
struct derv2 : base{int a,e;}base::base(){a=2;b=3;}derv1::derv1(){b=5;c=10;d=11;}base::function1(){return(100);}derv1::function1(){return(200);}main()base ba;
12. The OSI layer from bottom to top
13. For an application which exceeds 64k the memory model should be
a) Mediumb) Hugec) Larged) None
14. The condition required for dead lock in unix system is
15. Set-user-id is related to (in unix)
16. Bourne shell has
a) History record****other choices not given
17. Which of the following is not true about C++
a) Code removablyb) Encapsulation of data and codec) Program easy maintenanced) Program runs faster
18. For the following C program
struct base {int a,b;base();int virtual function1();}
struct derv1:base{int b,c,d;derv1()int virtual function1();}
struct derv2 : base{int a,e;}base::base(){a=2;b=3;}derv1::derv1(){b=5;c=10;d=11;}base::function1(){return(100);}derv1::function1(){return(200);}main()base ba;
derv1 d1,d2;printf("%d %d",d1.a,d1.b)
Output of the program is:
a) a=2;b=3;b) a=3; b=2;c) a=5; b=10;d) none
19. For the above program answer the following q's
main()base da;derv1 d1;derv2 d2;printf("%d %d %d",da.function1(),d1.function1(),d2.function1());
Output is:
a) 100,200,200;b) 200,100,200;c) 200,200,100;d) None of the above
20. For the following C program
struct {int x;int y;}abc;
x cannot be accessed by the following
1)abc-->x;2)abc[0]-->x;3)abc.x;4)(abc)-->x;
a )1, 2, 3b) 2 & 3c) 1 & 2d) 1, 3, 4
21. Automatic variables are destroyed after fn. ends because
a) Stored in swapb) Stored in stack and poped out after fn. returnsc) Stored in data aread) Stored in disk
22. Relation between x-application and x-server (x-win)
23. What is UIL(user interface language) (x-win)
24)Which of the following is right in ms-windows
a) Application has single qvalue system has multiple qvalueb) Application has multiple qvalue system has single qvalue c) Application has multipleqvalue system has multiple qvalued) None
Output of the program is:
a) a=2;b=3;b) a=3; b=2;c) a=5; b=10;d) none
19. For the above program answer the following q's
main()base da;derv1 d1;derv2 d2;printf("%d %d %d",da.function1(),d1.function1(),d2.function1());
Output is:
a) 100,200,200;b) 200,100,200;c) 200,200,100;d) None of the above
20. For the following C program
struct {int x;int y;}abc;
x cannot be accessed by the following
1)abc-->x;2)abc[0]-->x;3)abc.x;4)(abc)-->x;
a )1, 2, 3b) 2 & 3c) 1 & 2d) 1, 3, 4
21. Automatic variables are destroyed after fn. ends because
a) Stored in swapb) Stored in stack and poped out after fn. returnsc) Stored in data aread) Stored in disk
22. Relation between x-application and x-server (x-win)
23. What is UIL(user interface language) (x-win)
24)Which of the following is right in ms-windows
a) Application has single qvalue system has multiple qvalueb) Application has multiple qvalue system has single qvalue c) Application has multipleqvalue system has multiple qvalued) None
No comments:
Post a Comment