0% found this document useful (0 votes)
65 views14 pages

DXC Tech 2

The document contains a technical question paper with multiple choice questions related to computer science topics like databases, operating systems, computer architecture, and more. There are questions related to technologies like SQL, HTML, C programming, and concepts like memory management, interrupts, registers, and more.

Uploaded by

Temp
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
65 views14 pages

DXC Tech 2

The document contains a technical question paper with multiple choice questions related to computer science topics like databases, operating systems, computer architecture, and more. There are questions related to technologies like SQL, HTML, C programming, and concepts like memory management, interrupts, registers, and more.

Uploaded by

Temp
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

DXC Technology Technical Question Paper

1.------- is associated with webservices.


a) WSDL b) WML c) web sphere d) web logic
[Link] large single block of data stored in a database, such as a picture or sound file, which
does not include record fields, and cannot be directly searched by the database​s search
engine.
a) TABLE b) BLOB c) VIEW d) SCHEME
[Link] area of the immediate access memeory used to increase the running speed of
the computer program.
a) session memory b) bubble memory c) cache memory d) shared memory
4.a small subnet that sit between atrusted internal network and an untruster external
network, such as the public internet.
a) LAN b) MAN c) WAN d) DMZ
[Link] that use radio waves to automatically identify people or objects,which is very
similar to the barcode identification systems,seen in retail stores everyday.
a)BLUETOOTH b) RADAR c)RSA SECURE ID d)RFID
[Link](){
float fl = 10.5;
double dbl = 10.5
if(fl ==dbl)
printf(​UNITED WE STAND​);
else
printf(​DIVIDE AND RULE​)
}
what is the output?
a) compilation error b)UNITED WE STAND c)DIVIDE AND RULE d)linkage error.
[Link](){
static int ivar = 5;
printf(​%d​,ivar--);
if(ivar)
main();
}
what is the output?
a)1 2 3 4 5 b) 5 4 3 2 1 c)5 d)compiler error:main cannot be recursive function.
[Link]()
{
extern int iExtern;
iExtern = 20;

[Link]
DXC Technology Technical Question Paper

printf(​%d​,iExtern);
}
what is the output?
a)2 b) 20 c)compile error d)linker error
9..#define clrscr() 100
main(){
clrscr();
printf(​%d\n\t​, clrscr());
}
what is the output?
a)100 b)10 c)compiler errord)linkage error
[Link]()
{
void vpointer;
char cHar = ​g​, *cHarpointer = ​GOOGLE​;
int j = 40;
vpointer = &cHar;
printf(​%c​,*(char*)vpointer);
vpointer = &j;
printf(​%d​,*(int *)vpointer);
vpointer = cHarpointer;
printf(​%s​,(char*)vpointer +3);
}
what is the output?
a)g40GLE b)g40GOOGLE c)g0GLE d)g4GOO
11.#define FALSE -1
#define TRUE 1
#define NULL 0
main() {
if (NULL)
puts (​NULL​);
else if(FALSE)
puts (​TRUE​);
else
puts (​FALSE​);
}
what is the output?

[Link]
DXC Technology Technical Question Paper

a) NULL b) TRUE c) FALSE d)0


[Link]() {
int i =5,j= 6, z;
printf(​%d​,i+++j);
}
what is the output?
a)13 b)12 c)11 d) compiler error
[Link]() {
int i ;
i = accumulator();
printf(​%d​,i);
}
accumulator(){
_AX =1000;
}
what is output?
a)1 b)10 c)100 d)1000
[Link]() {
int i =0;
while(+(+i--)!= 0)
i- = i++;

printf(​%d​,i);
}
what is the output?
a)-1 b)0 c)1 d)will go in an infinite loop
[Link](){
int i =3;
for(; i++=0;)
printf((​%d​,i);
}
what is the output?
a)1b)2c)1 2 3d)compiler error:L value required.
[Link](){
int i = 10, j =20;
j = i ,j?(i,j)?i :j:j;
printf(​%d%d​,i,j);
}what is the output?

[Link]
DXC Technology Technical Question Paper

a)20 b)20 c)10 d)10


[Link](){
extern i;
printf(​%d\t​,i);{
int i =20;
printf(​%d\t​,i);
}
}
what is output?
a) ​Extern valueof i ​ 20 b)Externvalue of i​c)20d)linker Error:unresolved external symbol i
[Link] DIMension(int array[]){
return sizeof(array/sizeof(int);}
main(){
int arr[10];
printf(​Array dimension is %d​,DIMension(arr));
}
what is output?
a)array dimension is 10 b)array dimension is 1
c) array dimension is 2 d)array dimension is 5
[Link]()
{
void swap();
int x = 45, y = 15;
swap(&x,&y);
printf(​x = %d y=%d​x,y);
}
void swap(int *a, int *b){
*a^=*b, *b^=*a, *a^ = *b;
what is the output?
a) x = 15, y =45 b)x =15, y =15 c)x =45 ,y =15 d)x =45 y = 45
[Link](){
int i =257;
int *iptr =&i;
printf (​%d%d​,*((char*)iptr),* ((char *)iptr+1));
}
what is output?
a)1, 257 b)257 1c)0 0d)1 1

[Link]
DXC Technology Technical Question Paper

[Link](){
int i =300;
char *ptr = &i;
*++ptr=2;
printf(​%d​,i);
}
what is output?
a)556 b)300 c)2 d)302

22. #include
main(){
char *str =​yahoo​;
char *ptr =str;
char least =127;
while(*ptr++)
least = (*ptr
printf (​%d​,least);
}
what is the output?
a)0 b)127 c) yahoo d) y
[Link] an array of M pointers to functions returing pointers to functions returing
pointers to characters.
a)(*ptr[M]()(char*(*)()); b)(char*(*)())(*ptr[M])()
c) (char*(*)(*ptr[M]())(*ptr[M] () d)(char*(*)(char*()))(*ptr[M]) ();
[Link] main(){
int I =10, j=2;
int *ip = &I ,*jp =&j;
int k = *ip/*jp;
printf(​%d​,k);
}
what is the output?
a)2 b)5 c)10 d)compile error:unexpected end of file in comment started in line 4
[Link]()
{
char a[4] =​GOOGLE​;
printf(​%s​,a);
}

[Link]
DXC Technology Technical Question Paper

what is the output?


a)2 b) GOOGLE c) compile error: yoo mant initializers d) linkage error.
[Link] 1MB memory, the number of address lines required
a)12 b)16 c)20 d)32
[Link] is a circuit using 3 nand gates with 2 inputes and 1 output,f ind the output.
a) AND b) OR c) XOR d) NAND
[Link] is done for push operation
a) SP is incremented and then the value is stored.
b) PC is incremented and then the value is stored.
c) PC is decremented and then the value is stored.
d) SP is decremented and then the value is stored.
[Link] allocation of variables declared in a program is ------
a) Allocated in RAM
b) Allocated in ROM
c) Allocated in stack
d) Assigned in registers.
[Link] action is taken when the processer under execution is interrupted by TRAP in
8085MPU?
a) Processor serves the interrupt request after completing the execution of the current
instruction.
b) processer serves the interrupt request after completing the current task.
c) processor serves the interrupt immediately.
d) processor serving the interrupt request depent deprnds upon the priority of the current
task under execution.
[Link] of PC (program counter)in a microprocessor is ----
a) To store address of TOS(top of stack)
b) To store address of next instructions to be executed
c) count the number of instructions
d) to store the base address of the stack.
[Link] results after execution of an instruction in a microprocess is stored in
a) register b) accumulator c) flag register d) flag register part of PSW (program status
word)
[Link] OR gate can be converted to the NAND function by adding----gate(s)to the input of
the OR gate.
a) NOT b) AND c) NOR d) XOR
[Link] 8051microcontroller ,------has a dual function.
a) port 3 b) port 2 c) port 1 d) port 0

[Link]
DXC Technology Technical Question Paper

[Link] 8085 based microprocessor with 2MHz clock frequency,will execute the following
chunk of code with how much delay?
MVI B,38H
HAPPY: MVI C, FFH
SADDY: DCR C
JNZ SADDY
DCR B
JNC HAPPY
a) 102.3 b)114.5 c)100.5 d)120
[Link] 8085 MPU what will be the status of the flag after the execution of the following chunk
of code.
MVI B,FFH
MOV A,B
CMA
HLT
a)S = 1, Z = 0, CY = 1 b)S = 0, Z = 1, CY = 0
c) S = 1, Z = 0, CY = 0 d)S = 1, Z = 1 ,CY = 1
37.A positive going pulse which is always generated when 8085 MPU begins the machine
cycle.
a) RD b) ALE c) WR d) HOLD
[Link] a ----- instruction of 8085 MPU is fetched , its second and third bytes are placed in
the W and Z registers.
a) JMP b) STA c) CALL d) XCHG
[Link] is defined as one subdivision of the operation performed in one clock period.
a) T- State b) Instruction Cycle c) Machine Cycle d) All of the above

[Link] the end of the following code, what is the status of the flags.

LXI B, AEC4H

MOV A,C

ADD B

HLT a) S = 1, CY = 0, P = 0 , AC = 1 b) S =0 , CY = 1, P = 0,AC = 1 c) S = 0, CY = 1, P =
0 , AC = 1 d) S = 0, CY = 1, P = 1 , AC = 1

[Link]
DXC Technology Technical Question Paper

[Link] repeated execution of a loop of code while waiting for an event to occur is called
---------.The cpu is not engaged in any real productive activity during this period,and the
process doesn​t progress towards completion.
a) dead lock b) busy waiting c) trap door d) none.
47. Transparent DBMS is defined as
a) A DBMS in which there are no program or user access languages. b) A DBMS which has
no cross file capabilities but is user friendly and provides user interface management. c) A
DBMS which keeps its physical structure hidden from user d) none.
[Link] all actions are carried out or none [Link] should not have to worry about the
effect of incomplete [Link] ensures this by undoing the actions of incomplete
[Link] property is known as
a) Aggregation b) atomicity c) association d) data integrity.
49.------ algorithms determines where in available to load a program. common methods
are first fit,next fit,best fit.--------- algorithm are used when memory is full , and one
process (or part of a process) needs to be swaped out to accommodate a new [Link]
------------- algorithm determines which are the partions to be swaped out.
a) placement, placement, replacement
b) replacement, placement, placement
c) replacement, placement, replacement
d) placement, replacement, replacement
[Link] door is a secret undocumented entry point into a program used to grant access
without normal methods of access authentication.A trap is a software interrupt,usually the
result of an error condition.
a)true b)false.
[Link] recursive implementations which of the following is true for saving the state of the
steps
a) as full state on the stack
b) as reversible action on the stack
c) both a and b
d) none
[Link] of the following involves context switch
a) previliged instruction
b) floating point exception
c) system calls
d) all
e) none
[Link] backing is a technique for

[Link]
DXC Technology Technical Question Paper

a) acknowledge
b) sequence
c) flow control
d) retransmission
58. a functional dependency XY is ___________dependency if removal of any attribute A
from X means that the dependency does not hold any more
a) full functional
b) multi valued
c) single valued
d) none
59)a relation schema R is in BCNF if it is in ___________and satisfies an additional
constraints that for every functional dependency XY,X must be a candidate key
a)1 NF
b)2 NF
c)3 NF
d)5 NF
60) a _________sub query can be easily identified if it contains any references to the
parent sub query columns in the _________ clause
A) correlated ,WHERE
b) nested ,SELECT
c) correlated, SELECT
d) none
[Link] of PC (program counter)in a microprocessor is ----

a) To store address of TOS(top of stack)

b) To store address of next instructions to be executed

c) count the number of instructions

d) to store the base address of the stack.

[Link] results after execution of an instruction in a microprocess is stored in

a) register b) accumulator c) flag register d) flag register part of PSW (program status

word)

[Link] OR gate can be converted to the NAND function by adding----gate(s)to the input of

the OR gate.

a) NOT b) AND c) NOR d) XOR

[Link]
DXC Technology Technical Question Paper

[Link] 8051microcontroller ,------has a dual function.

a) port 3 b) port 2 c) port 1 d) port 0

[Link] 8085 based microprocessor with 2MHz clock frequency,will execute the following

chunk of code with how much delay?

MVI B,38H

HAPPY: MVI C, FFH

SADDY: DCR C

JNZ SADDY

DCR B

JNC HAPPY

a) 102.3 b)114.5 c)100.5 d)120

[Link] 8085 MPU what will be the status of the flag after the execution of the following chunk

of code.

MVI B,FFH

MOV A,B

CMA

HLT

a)S = 1, Z = 0, CY = 1 b)S = 0, Z = 1, CY = 0

c) S = 1, Z = 0, CY = 0 d)S = 1, Z = 1 ,CY = 1

37.A positive going pulse which is always generated when 8085 MPU begins the machine

cycle.

a) RD b) ALE c) WR d) HOLD

[Link] a ----- instruction of 8085 MPU is fetched , its second and third bytes are placed in

the W and Z registers.

a) JMP b) STA c) CALL d) XCHG

[Link] is defined as one subdivision of the operation performed in one clock period.

a) T- State b) Instruction Cycle c) Machine Cycle d) All of the above

[Link]
DXC Technology Technical Question Paper

[Link] the end of the following code, what is the status of the flags.

LXI B, AEC4H

MOV A,C

ADD B

HLT

a) S = 1, CY = 0, P = 0 , AC = 1 b) S =0 , CY = 1, P = 0,AC = 1

c) S = 0, CY = 1, P = 0 , AC = 1 d) S = 0, CY = 1, P = 1 , AC = 1

[Link] repeated execution of a loop of code while waiting for an event to occur is called

---------.The cpu is not engaged in any real productive activity during this period,and the

process doesn​t progress towards completion. a) dead lock b) busy waiting c) trap door d)

none.

47. Transparent DBMS is defined as

a) A DBMS in which there are no program or user access languages. b) A DBMS which has

no cross file capabilities but is user friendly and provides user interface management. c) A

DBMS which keeps its physical structure hidden from user d) none.

[Link] all actions are carried out or none [Link] should not have to worry about the

effect of incomplete [Link] ensures this by undoing the actions of incomplete

[Link] property is known as

a) Aggregation b) atomicity c) association d) data integrity.

49.------ algorithms determines where in available to load a program. common methods

are first fit,next fit,best fit.--------- algorithm are used when memory is full , and one

process (or part of a process) needs to be swaped out to accommodate a new [Link]

------------- algorithm determines which are the partions to be swaped out.

a) placement, placement, replacement

b) replacement, placement, placement

[Link]
DXC Technology Technical Question Paper

c) replacement, placement, replacement

d) placement, replacement, replacement

[Link] door is a secret undocumented entry point into a program used to grant access

without normal methods of access authentication.A trap is a software interrupt,usually the

result of an error condition.

a)true b)false.

[Link] one of the following is the recursive travel technique.

a)depth first search b)preorder c)breadth first search d)none.

[Link] recursive implementations which of the following is true for saving the state of the

steps

a)as full state on the stack

b) as reversible action on the stack

c)both a and b

d)none

[Link] of the following involves context switch

a) previliged instruction

b) floating point exception

c) system calls

d)all

e) none

[Link] backing is a technique for

a) acknowledge

b) sequence

c) flow control

d) retransmission

58. a functional dependency XY is ___________dependency if removal of any attribute A

from X means that the dependency does not hold any more

[Link]
DXC Technology Technical Question Paper

a) full functional

b) multi valued

c) single valued

d) none

59)a relation schema R is in BCNF if it is in ___________and satisfies an additional

constraints that for every functional dependency XY,X must be a candidate key

a)1 NF

b)2 NF

c)3 NF

d)5 NF

60) a _________sub query can be easily identified if it contains any references to the

parent sub query columns in the _________ clause

A) correlated ,WHERE

b) nested ,SELECT

c) correlated,SELECT

d) none

61) hybrid devise that combines the features of both bridge and router is known as

a)router b)bridge c)hub d)brouter

62) which of the following is the most crucial phase of SDLC

a) testing b) code generation c) analysys and design d) implementation

63)to send a data packet using datagram ,connection will be established

a) no connection is required

b) connection is not established before data transmission

c) before data transmission

d) none

64)a software that allows a personal computer to pretend as as computer terminal is

a) terminal adapter

[Link]
DXC Technology Technical Question Paper

b) terminal emulation

c) modem

d) none

65) super key is

a) same as primary key

b) primary key and attribute

c) same as foreign key

d) foreign key and attribute

[Link] binary search tree which traversal is used for ascending order values

a) Inorder b)preorder c)post order d)none

[Link] are creating an index on ROLLNO colume in the STUDENT [Link] statement will

you use?

a) CREATE INDEX roll_idx ON student, rollno;

b) CREATE INDEX roll_idx FOR student, rollno;

c) CREATE INDEX roll_idx ON student( rollno);

d) CREATE INDEX roll_idx INDEX ON student (rollno);

68.A________class is a class that represents a data structure that stores a number of data

objects

a. container [Link] [Link] [Link]

[Link] one of the following phases belongs to the compiler Back-end.

a. Lexical Analysis [Link] Analysis c. Optimization [Link] Representation.

[Link] context _sensitive language is context_free

a. true [Link]

[Link]

You might also like