Google
 

Sunday, May 6, 2007

HUGHES SOFTWARE SYSTEMS

_____________________________________________________________________________

Q1)there was a circuit given using three nand gates with two inputs and one output .you have to find the output.
a)or
b)and
c)xor
d)
ans- a) or
Q2)suggest a sorting algo whic is efficient( in worst case) to 10 values
a)binary tree
b)selection
c)bubble
d)any of the above
Q3)what is the number of comparisons in the worst case to merge two sorted lists containing n elements each.
a)2n
b)2n-1
c)2n+1
d)2n-2
Q4)integrated check value(ICV) are used as follow
ans- the client computes the ICV and then compares it with that send
Q5)one question on client server system using asyn. request from the client
Q6)if a binary tree is constructed using nodes with two pointers each ,how many null pointers does a tree with N nodes have
a)n-1
b)n
c)n+1
d)depends on the number of edges
Q7)which of statement about heap is wrong
a)n element heap has height log n(base of log is 2)
b)smallest element of heap is always a leaf
c)a array in reverse sorted order is a heap
d)a heap can't contain any element more than once
Q8)when applets are downloaded from web sites , a byte verifier performs status check, which of following is not true
Q9) void insert(key,r)
typekey key,data array r;
{
extern int n;
if(n>=max) /*error table if full */
else r[n++].k=key;
}
enables a
a)basic sequential search
b)binary search
c)interpolation search
d)none
ans-interpolation search
Q10) void f(char *p)
{
p=(char *) malloc(6);
strcpy(p,"hello");
}

void main( )
{
char *P="bye";
f(p);
printf("%s',p);
}
Q11)time taken to access cache is 100ns and to access memory is 1000ns. hit ratio given you have to find the average access time
ans-take care of the fact that every data transfer takes place through the cache,even if in memory
Q12)path testing is
a)black box testing strategy
b)white box testing strategy
c)an installation .........
d)...... enviornment
Q13) X:'verification" asks are we building the right product
Y:validation' asks are we building the product right
Q14)which one of the following can't be used to find an internet address given the domain name
a)/etc/host
b)NIS yellow pages
c)DNS
d)ARP
Q15)flow control is necessary for the t.p layer due to the following reasons
a)ureliable link
b)congestion at receiver
c)packets out of sequence
d)none of these
Q16)in public key encryption , if A wants to send a message to B so that no one else can read the message then A encrypts the message using
a)A's public key
b)A's private key
c)B's public key
d)B's private key
Q17)which of the following is not condition having a deadlock resource previous granted can be forcebly taken away from a process
a)resources need to be used in mutually exclusion fashion
b)process can request new resources, as they continue to hold on to old ones
c)here is a cycle in the resource allocation graph
Q16)a IP/IPX packet received by a computer using... having IP/IPX both how the packet is handled.
ans-read the ,field in the packet header with to send IP or IPX protocol.
Q17)the range of the 32 bit number in two's complement form is
ans- -31 31
2 to 2 -1
Q18) cyclomatic complexity
{
if((x=0) or (y=0))
p=0;
else {
p=x;i=1;
while(i!=y) {
p=p+x;
i=i+1; }
}
}
Q19)activation record will contain the
a)storage for simple names
b)information about attributes for local names
c)return address
d) all of the above
Q20) global static variable within a file is intended to
a)localize swap
b)retain value persistently
c) define constant
d)fixed address in memory
Q21)why thread switch is faster than a process switch
Q22)what is the binary equivalent of 41.6875
Q23)checkpoint value will be calculated in
Q24)DHCP is used for
a)IP address allocation
b)dynamic host configuration protocol
Q25)int x(char *a)
{
a=(char *) malloc(10*sizeof(char));
*a="hello";
}
main()]
{
char *a="new";
x(a);
printf("%s",a);
}
a) hello
b)new
c)hello new
d)run time error

No comments: