You are on page 1of 19

2011 CDAC Placement Paper:1.

The programming language that was designed for specifying algorithm Address ASCII ALGOL None of these options 2. _____ contains the addresses of all the records according to the contents of the field designed as the record key. Index<------ans Subscript Array File 3. _________ symbol is used for Processing of data. Oval Parallelogram<------ans Rectangle Diamond 4. __________ is the analysis tool used for planning program logic Protocol None of these options PROLOG Pseudocode 5. Machine language has two part format the first part is__________ and the second part is __________ OPCODE,OPERAND<------ans OPERAND,OPCODE DATA CODE,OPERAND OPERAND,CODEOP 6. Language Primarily used for internet-based applications ADA C++

JAVA;------ans FORTRAN 7. _________ is a point at which the debugger stops during program execution and awaits a further command. Memory Dump Watch point<------ans Break point None of these options 8. ________do not contain any program logic and are ignored by the language Processor Protocol Virus Comment None of these options 9. The component of data base management system is ________ Data definition Language Data manipulation Language Data definition Language and Data manipulation Language None of these options 10. The quality of Algorithm is judged on the basis of_________ Time requirement Memory Requirement Accuracy of solution All of these options<------ans 11. Advantages of using flow charts is Effective Analysis Efficient Coding Time consuming Effective Analysis and Efficient Coding<-----ans Programming in C 12. The Real constants in C can be expressed in which of the following forms Fractional form only

Exponential form only ASCII form only Both Fractional and Exponential forms<------ans 13. The program, which translates high-level program into its equivalent machine language program, is called Transformer Language processor Converter None of these options<------ans<!--[if !supportEmptyParas]--> 14. Consider the following statements. i.Multiplication associates left to right ii.Division associates left to right iii.Unary Minus associates right to left iv.subtraction associates left to right All are true <------ans only i and ii are true all are false only iii and iv are true 15. What will be the value of variable a in the following code? unsigned char a; a = 0xFF + 1; printf("%d", a); 0xFF 0x100 0 <------ans 0x0 16. A set of rules, which enable orderly exchange of information between two devices. a) Topology b) Protocol c) Transmission Media d) None of the above

17. ISO stands for a) International Standards Organization b) International Organization for Standardization c) Both of above d) None of above 18. Proposal for a new Internet standard is called a) RFC b) Internet draft c) Draft Standard d) Proposed Standard

19. The data sent between layers is called a) Protocol Data Unit b) Datagram c) Service Data Unit d) Packet

20. The Private Automatic Branch Exchange is an example of a) Bus Topology b) Ring Topology c) Tree Topology d) Star Topology

21. Topology, which connects every single node in the network to every other node, is a) Star b) Ring c) Mesh d) Bus

22. Which of the following is not a hybrid topology a) Tree b) String c) Bus d) None of the above

23. The term 10Base2 indicates a network a) 10 mbps speed, Base Band Signaling, 200 meters segment length b) 10 mbps speed, Base Band Signaling, 200 meters maximum length c) 10 mbps speed, Base Band Signaling, 185 meters segment length d) None of the above 24. Coaxial cable, UTP cable, STP cable and fibre cables are popular network media today. Order these in increasing order of data security a) Coaxial, UTP, STP, Fibre b) UTP, Coaxial, STP, Fibre c) UTP, STP, Coaxial, Fibre d) None of the above 25. Bridges are simple devices that are used to connect LANs of a) Different Architecture (eg. Ethernet to Token Ring) b) Same architecture (eg. Ethernet to Ethernet) c) Architecture does not matter e) None of the above 26. Which application uses existing CSMA/VD over existing twisted-pair cable with bandwidths of 100 mbps? a) 10BaseF b) 100BaseX c) 100VG-AnyLAN d) 10BaseFD

27. What model divides the network communication process into seven layers? a) Layered Model b) TCP/IP c) OSI d) X.25

28. B-ISDN uses fiber as a transmission medium and _______ as the switching infrastructure a) Ethernet b) FDDI c) ATM d) None of the above

29. ______ is the only standards based technology that has been designed from the beginning to accommodate the simultaneous transmission of voice, video and data a) Home cable network b) Satellite TV c) ATM d) All of the above

30. Which of the following common LAN protocols extend to OSI network layer. a) NetBIOS b) NetBEUI c) TCP/IP d) All of the above

1. Which of the following describes the OSI Class 3 transport (TP3) a) Do nothing b) Signaled Error Recovery c) Multiplexing d) Signalled error recovery and multiplexing 2. The issue of chekpointing and synchronization is handled by which layer a) Session Layer b) Transport Layer c) Pressentation layer d) Application Layer

3. In the OSI model, the responsibility for negotiating the encodings to be used in any perticular connection is entrusted upon a) Application Layer b) Session Layer c) Presentation Layer d) None of the above

4. TCP/IP is built on _________ technology a) Connection oriented b) Connection less c) Datagram d) Ethernet

5. IP addresses are ____ bit long a) 4 b) 64 c) 48 d) 32

6. Which of the following is not a network operating system a) Windows for Workgroup over MSDOS b) Novell Netware c) Windows 95 d) None of the above 7. Fiber optic token ring networks operate at the speed of a) 16 mbps b) 100 mbps c) 1000 mbps d) 10 mbps

8. The Synchronous Optical Network is an ANSI standard. A similar standard established in Europe is a) Synchronous Digital Hierarchy b) SONET c) Switched Multi megabit Data Service d) Distributed Queue Duel Bus 9. In the TCP/IP protocol family ___________ provides reliable transport service. a) Transport Protocol b) Transport Layer c) TCP d)All of above

10. IP address is a ___________ address. a) Network Layer Address above b) Layer 2 address c) Hardware Address d) None of

11. An IP address when logically ANDed with netmask, the result is _________________. a) Host Address b) Network Address c) Broadcast Address d) None of the above

12. Remote boot uses _______ protocol to discover IP address of diskless machine. a) ICMP b) SNMP c) ARP d) RARP

13. Once a datagram is fragmented in a IP network it is reassembled only at ____________. a) Next hope b) Next Router c) Final Destination d) Never

14. The source quench _________ message is used to control the rate at which datagrams

are transmitted. a) IP b) ICMP c) SNMP d) TCP

15. TCP establishes an end to end _______________ between the sender and receiver. a) Connection b) Virtual Circuit c) Path d) None of above

16. UDP is used with ___________________ Protocol. a) Trivial File Transfer b) ICMP c) LDAP d) All of above

17. IP is a ___________ protocol a) Routing Protocol b) Routed Protocol c) Both of above d) None of above

18. ______ is a complex data structure that contains details about a connection a) Socket b) Port c) TCB d) None of above

20. The bind socket call is used to __________________________ a) Bind a local application to a remote application b) Bind a socket to local port c) Bind a socket to a remote port d) Bind a local port to a remote port 21. Each SNMP managed object belongs to a ______________ a) Community b) Network c) Organization D) SNMP Group

22. RTCP is the ________________ protocol designed to work with RTP a) Application b) Control c) Network d) Transport

23. For block devices all I/O occurs through the _________________ a) Blocks b) Device c) Buffer cache d) None of above

24. _______ is a international standard file format for describing interactive 3D multimedia on the Internet. a) DHTML b) XML c) VRML d) None of above

25. ___________ is a distance-vector routing protocol a) RIP b) IGRP c) OSPF d) All of above

26. IPng provides security through Authentication Headers and the default encryption method is ________ a) SSL b) Public Key c) MD5 d) None of above

27. RTSP is a ___________ protocol similar to HTTP a) Network Layer b) Internet c) Application Layer d) None of above

28. OSPF features include __________________. a) Multi-Path routing b) Equal-cost c) Routing based on upper-layer TOS request d) All of above 29. IP address is assigned to a __________. a) Network b) Host c) Interface d) All of above

30. Token Ring network operate at a speed of a) 10 mbps b) 100 mbps c) 20 mbps d) 16 mbps

31. Ethernet is an access method that strictly adheres to the a) CSMA/CD b) Token Passing c) SPX/IPS d) TCP/IP

32. 100BASET4 operates at 100 mbps using base band signaling and the media is a) Two stands of fiber b) Two pairs of data grade UTP c) Four pairs of telephone grade UTP d) None of the above 33 .Length of Ethernet address is a) 24 bit b) 12 bit c) 48 bit d) 32 bit

34. Frame Relay protocol is used for a) WAN b) LAN c) Token Ring networks d) None of the above

Directions:- The given pair of words contains a specific relationship to each other. Select the best pair of choices which expresses the same relationship as the given 35.IGNOMINY : DISLOYALTY :: fame : heroism death : victory derelict : fool martyr : man 36. EXPLOSION : DEBRIS :: flood : water famine : food fire : ashes disease : germ 37. Bland : Piquant :: inane : relevant charlatan : genuine slavish : servile terse : serious 38. NEGLIGENT : REQUIREMENT:: remiss : duty cogent :argument easy : hard careful : position Directions:- Choose the best word, which is most opposite in the meaning to the given word 39. FETTER : delay stretch comply thrive 40. SEDULOUS : rampant

esoteric morose indolent 41. SUCCULENT : ordinary tasteless inexpensive invigorating 42. DORMANT : authoritative elastic active uninteresting 43. COURT : reject uncover infect subject

44. The expression x = 4 + 2 % -8 evaluates to -6 6 4 None of these options 45. What is the output of the following code? #include<stdio.h> main() { register int a=2; printf("\nAddress of a = %d,", &a); printf("\tValue of a = %d",a); Address of a,2 <------ans Linker error Compile time error None of these options 46. What is the output of the following code? #include<stdio.h> void main() { int arr[]={0,1,2,3,4,5,6}; int i,*ptr;

for(ptr=arr+4,i =0; i<=4; i++) printf("\n%d",ptr[-i]);(as the 0=4,for -1 it becomes =3) } Error 65432 0 garbage garbage garbage garbage 4 3 2 1 0 <------ans 47. Which of the following is the correct way of declaring a float pointer: float ptr; float *ptr; <------ans *float ptr; None of the above 48.If the following program (newprog) is run from the command line as:newprog 1 2 3 What would be the output of the following? void main (int argc, char*argv[]) { int I,j=0; for (I=0;I<argc;I++) j=j + atoi(argv[I]); printf("%d",j); } 123 6 123 Compilation error<------ans 49. Which of these are reasons for using pointers? 1. To manipulate parts of an array 2. To refer to keywords such as for and if 3. To return more than one value from a function 4. To refer to particular programs more conveniently 1 & 3<------ans only 1 only 3 None of these options 50. The code int i = 7; printf("%d\n", i++ * i++); prints 49 prints 56 <------ans

is compiler dependent expression i++ * i++ is undefined

. How many terms of the series -9 , -6 , -3 ,.........must be taken such that the sum may be 66? 11 13 9 <------------ans10 2. The side of a rectangle are whole numbers. What must their lengths be for the perimeter for the rectangle to be numerically equal to its area? 3 and 6 4 and 5 4 and 6 5 and 5 3. A path 7 metres wide surrounds a circular lawn whose diameter is 252m.What is the area of path? 5698 sq.mtrs. 5000 sq.mtrs. 5500 sq.mtrs. None of these 4. If the negative of the sum of two consecutive odd numbers is less than -35, which of the following may be one of the numbers? 18 <-------------ans 16 15 13 5. What is the perimeter of a rectangle that is twice as long as it is wide and has the same area as a circle of diameter 8? 8(P)1/2 8P 12(2P)1/2

12P 6. Towns A and C are connected by a straight highway which is 60 miles long. The straight line distance between town A and town B is 50 miles, and the straight line distance from town B to town C is 50 miles. How many miles is it from town B to the point on the highway connecting town A and C which is closest to town B? 30 40 50 60 7. A batsman played 17 innings during a season and he was not out. The score of 85 improves his average by 3 runs in the 17th innings. His average score after 16th innings is 37 35 34 36 8. If paper costs 1 paisa per sheet, and a buyer gets a 2% discount on all the paper he buys after the first 1000 sheets, how much will it costs to buy 5000 sheets of paper? Rs 49.30 Rs 50.00 Rs 39.20 Rs 49.20 9. The income of a broker remains unchanged though the rate of commission is increased from 4% to 5%. The percentage of slump in business is 8% 1% 20% 80% 10. There are 4 quarts in a gallon. A gallon of motor oil sells for Rs.12 and a quart of the same oil sells for Rs.5. The owner of a rental agency has 6 machines and each machine needs 5 quarts of oil. What is the minimum amount of money she must spend to purchase enough oil ? Rs.84 Rs.94

Rs.96 Rs.102 11. A truck departed from Newton at 11:53a.m. and arrived in Far City,240 miles away, at 4:41 p.m. on the same day. What was the approximate average speed of the truck on this trip? 16/1,200 MPH 40/288 MPH 1,494/240 MPH 50 MPH 12. A girl rode her bicycle from home to school, a distance of 15 miles, at an average speed of 15 miles per hour. She returned home from school by walking at an average speed of 5 miles per hour. What was her average speed for the round trip if she took the same route in both directions? 7.5 miles per hour 10 miles per hour 12.5 miles per hour 13 miles per hour 13. A is thrice as good a workman as B. If the time taken by B to do piece of works exceeds that taken by A by 8 days. In how many days A does the work. 8 4 12 10 14. The population of a town was 54,000 in the last census. It has increased 2/3 since then. Its present population is 18,000 36,000 72,000 90,000 15. One hundred job applicants show up in response to a classified ad.If 60 percent of them are female and if 3/4 of the female applicants are willing to relocate if the job demands it, how many are not willing to relocate? 55 45

15 It cannot be determined from the information given 16. Mr. Smith drove at an average speed of 50mph for the first two hours of his trip. For the next three hours, he averaged 20 mph. What was Mr. Smith`s average speed for the five-hour trip ? 20 mph 32 mph 35 mph 38 mph 17. A postal truck leaves its station and heads for Chicago, averaging 40mph. An error in the mailing schedule is spotted and 24 minutes after the truck leaves, a car is sent to overtake the truck. If the car averages 50mph, how long will it take to catch the postal truck? 1.6 hours 3 hours 2 hours 1.5 hours 18. The length breadth and height of a cuboid are in the ratio 1 : 2 :3. The length, breadth and height of the cuboid are increased by 100%, 200% and 200% respectively. Then the increase in the volume of the cuboid is 5 times 6 times 12 times 17 times 19. An Automobile covers the distance between two cities at a speed of 60km. per hour and on the return journey it covers at a speed of 40 km. per hour. Find the average speed. 60 50 48 55 20. A man buys 200 shares (par value of Rs.10) of a company, which pays 12% per annum as dividend, at such a price he gets 15% on his money. Find the market value(app.) of a share.

Rs. 9 Rs. 12 Rs. 8 Rs. 7.50 21. An old picture has dimensions 33 inches by 24 inches. What one length must be cut from each dimension so that the ratio of the shorter side to the longer side is 2:3? 2 inches 6 inches 9 inches 10 1/2 inches 22. Hiralal earned a profit of Rs. 300 by selling 100 kg of mixture of A and B types of rice at a total price of Rs. 1100. What was the proportion of A and B types of rice in the mixture if the cost prices of A and B types of rice are Rs. 10 and Rs. 5 per kg respectively ? 3:2 2:5 2 : 773 5:2 23. A fraction has a value of 2/5. If the numerator is decreased by 2 and the denominator increased by 1, then the resulting fraction is 1/4.What is the value of the numerator of the original fraction ? 5 6 7 8 24. TCP/IP Protocol Architecture was designed to carry data over the ARPANET. What type of network is the ARPANET? a) Message switching network. b) Packet switching network. c) Packet routing network. d) A hybrid of a packet and message routing network. 25. Your company has been assigned a Class B IP address. You are administrating a country-wide network with 45 individual subnets. Over the next year, you will be adding 60 subnets. What subnet mask should you use that will allow the most hosts per subnet?

a) 255.255.252.0

b) 255.255.254.0

c) 255.0.0.0

d) 255.255.0.0

26. What layer of the OSI model handles such issues as file access and transfer and virtual terminal emulation? a) Application b) Network c) Transport d) Session

27. You have implemented RSA encryption technology on your network. It seems to be working well. However, one station always receives encrypted emails as garbled text, meaning the protocol stack is corrupted. What OSI layer above can be assumed to be faulty? a) Data Link Layer b) Presentation Layer c) Session Layer d) Transport Layer

28.What is the maximum segment length for 10Broad36? a) 85 meters b) 200 meters c) 36 meters d) 3600 meters

29. Which networking standard describes cabling requirements for Ethernet? a) 802.2 b) 802.3 c) 802.4 d) 802.5

30. You have been given the Class C address of 205.222.5.0. What size subnet mask will give you the greatest possible number of hosts? a) An 8-bit mask of 255.255.255.255 for 254 hosts. b) An 8-bit mask of 255.255.255.0 for 254 hosts. c) An 8-bit mask of 255.255.0.0 for 65,534 hosts. d) An 8-bit mask of 255.255.0.0 for 8190 hosts. 31. Describe a fully-meshed star network. a) A network with a central router that has a unique path to each end-point router and some of the end-point routers have links to one another. b) A network with a central router that feeds a number of smaller routers that in turn feed a number of end-point routers. c) A network with a central router that has a unique path to each end-point router. d) A network in which all the routers have unique paths to one another 32. Why is SNMP considered lacking in security? a) SNMP devices send messages about their failing conditions. b) The SNMP manager broadcasts sensitive information to the managed devices.

c) The SNMP passwords are clear ASCII text. d) SNMP passwords cannot be changed. 33. Which one of the following statements correctly describes differences between a bridge and a layer two switch? a) A layer two switch is a high speed, multi-port bridge. b) A layer two switch cannot use the Spanning Tree Protocol to learn a networks topology, while c) A layer two switch can support multiple network media types, such as twisted pair, fiber, and coax, while a bridge is limited to supporting a single network media type. d) A layer two switch is than an Ethernet hub that supports different speeds on different ports, while a bridge requires all ports to have the same speed. 34. How are packet forwarding decisions made in an OSI reference model layer three device? a) The device compares the destination MAC address to an internal table that associates MAC addresses to particular ports. b) In a layer three device, every packet is sent out of every port. c) In a layer three device, packets are forwarded based on node name. d) The device compares the destination network address to an internal table that associates network addresses to particular ports. 35. Which one of the following describes the IP address 192.4.2.4 a) A Class A address that is 32 bits in length b) A Class B address that is 16 bits in length c) A Class B address that is 32 bits in length d) A Class C address that is 32 bits in length 36. What is the main function of a router? a) Setting up communications between networks that use dissimilar IP segments but the same Subnet Masks b) Connecting logically separate network segments. c) Providing IP configuration to computers using DHCP d) Authenticating users to the network e) Connecting to the Internet. 37. Network cards in computers communicate with each other using unique MAC addresses, similar to street addresses. Where do these unique addresses come from? a) The network administrator makes up addresses to use and then programs them into the

software. b) The manufacturer publishes a range of addresses in the manual that you choose from. c) The network card searches the network and then assigns itself a unique address from an elaborate algorithm using the alread-allocated addresses. d) The IEEE assigns every manufacturer a prefix and a block of address range, typically expressed in hexadecimala bridge can. 38. Portability standards are discussed widely in four areas, which of the following is not one of them. a) Operating Systems b) Data Management c) Programming Languages d) Hardware 39. Which of the following is not an essential feature of Data Link Layer protocols as defined by ISO/OSI model a) Message orientation b) Error Detection c) Error correction by re-transmission d) None of the above 40. Which of the following describes the OSI Class 3 transport (TP3) a) Do nothing b) Signaled Error Recovery c) Multiplexing d) Signalled error recovery and multiplexing

You might also like