Fidelity Technical Questions: Technical Questions Part III

Download PDF of This Page (Size: 112K)

Examrace Placement Series prepares you for the toughest placement exams to top companies.

  1. Which of the following involves context switch

    1. system call

    2. priviliged instruction

    3. floating poitnt exception

    4. all the above

    5. none of the above

    Ans: (a)

  2. In OST, terminal emulation is done in

    1. sessions layer

    2. application layer

    3. presentation layer

    4. transport layer

    Ans: (b)

  3. For 1 MB memory, the number of address lines required

    1. 11

    2. 16

    3. 22

    4. 24

    Ans (b).

  4. Semaphore is used for

    1. synchronization

    2. dead-lock avoidence

    3. box

    4. none

    Ans (a).

  5. Which holds true for the following statement class c: Public A, public B

    1. 2 member in class A, B should not have same name

    2. 2 member in class A, C should not have same name

    3. both

    4. none

    Ans (a).

  6. Preproconia. Does not do which one of the following

    1. macro

    2. conditional compliclation

    3. in type checking

    4. including load file

    Ans (c).

  7. Piggy backing is a technique for

    1. Flow control

    2. Sequence

    3. Acknowledgement

    4. retransmition

    Ans (c).

  8. Which is not a memory management scheme?

    1. buddy system

    2. swapping

    3. monitors

    4. paging

    Ans: c

  9. There was a circuit given using three nand gates with two inputs and one output. Find the output.

    1. OR

    2. AND

    3. XOR

    4. NOT

    Ans (a).

  10. Iintegrated check value (ICV) are used as: Ans. The client computes the ICV and then compares it with the senders value.

  11. When applets are downloaded from web sites, a byte verifier performs _________? Ans. Status check.

  12. An IP/IPX packet received by a computer using… Having IP/IPX both how the packet is handled. Ans. Read the, field in the packet header with to send IP or IPX protocol.

  13. The UNIX shell ____

    1. does not come with the rest of the system

    2. forms the interface between the user and the kernal

    3. does not give any scope for programming

    4. deos not allow calling one program from with in another

    5. all of the above

    Ans (b).

  14. In UNIX a files i-node ____? Ans. Is a data structure that defines all specifications of a file like the file size, number of lines to a file, permissions etc.

  15. The very first process created by the kernal that runs till the kernal process is halts is

    1. init

    2. getty

    3. both (a) and (b)

    4. none of these

    Ans (a).

  16. In the process table entry for the kernel process, the process id value is

    1. 0

    2. 1

    3. 2

    4. 255

    5. it does not have a process table entry

    Ans (a).

  17. Which of the following API is used to hide a window

    1. ShowWindow

    2. EnableWindow

    3. MoveWindow

    4. SetWindowPlacement

    5. None of the above

    Ans (a).

  18. Which function is the entry point for a DLL in MS Windows 3.1

    1. Main

    2. Winmain

    3. Dllmain

    4. Libmain

    5. None

Ans (b).