Placement Papers: Siemens Information System Limited

Download PDF of This Page (Size: 173K)

Examrace Placement Series prepares you for the toughest placement exams to top companies.

  1. Which of following operator can't be overloaded.

    1. = =

    2. + +

    3. ?

  2. For the following C program #include <iostream. h> main () { printf ( “Hello World” ); } The program prints Hello World without changing main (), the output should be intialisation Hello World Desruct The changes should be

  3. CDPATH shell variable is in (c-shell)

  4. The term stickily bit is related to

  5. Semaphore variable is different from ordinary variable by

  6. For the following C program: Swap (int x, y) { int temp; temp = x; x = y; y = temp; } main () { int x = 2; y = 3; swap (x, y); } After calling swap, what are the values x & y?

  7. Static variable will be visible in

  8. Unix system is

  9. X. 25 protocol encapsulates the follwing layers

  10. TCP/IP can work on

  11. A node has the IP address 138.50. 10.7 and 138.50. 10.9. But it is transmitting data from node1 to node 2only. The reason may be

  12. The OSI layer from bottom to top

  13. For an application which exceeds 64k the memory model should be

  14. The condition required for dead lock in unix system is

  15. Set-user-id is related to (in unix)

  16. Bourne shell has

  17. Which of the following is not true about C + +

  18. For the following C program struct base { int a, b; base (); int virtual function1 (); } struct derv1: Base { int b, c, d; derv1 () int virtual function1 (); } struct derv2: Base { int a, e; } base: Base () { a = 2; b = 3; } derv1: Derv1 () { b = 5; c = 10; d = 11; } base: Function1 () { return (100); } derv1: Function1 () { return (200); } main () base ba; derv1 d1, d2; printf ( “%d %d” d1. a, d1. b) Output of the program is:

  19. For the above program answer the following questions main () base da; derv1 d1; derv2 d2; printf ( “%d %d %d” da. Function1 (), d1. Function1 (), d2. Function1 () ); Output is:

    1. 100, 200, 200

    2. 200, 100, 200

    3. 200, 200, 100

    4. None of the above

  20. For the following C program struct { int x; int y; }abc; x cannot be accessed by the following

    1. abc → x

    2. abc[0] → x

    3. abc. x

    4. (abc) → x

  21. Automatic variables are destroyed after fn. Ends because

    1. Stored in swap

    2. Stored in stack and poped out after fn. Returns

    3. Stored in data area

    4. Stored in disk

  22. Relation between x-application and x-server (x-win)

  23. What is UIL (user interface language) (x-win)

  24. Which of the following is right in ms-windows

    1. Application has single qvalue system has multiple qvalue

    2. Application has multiple qvalue system has single qvalue

    3. Application has multipleqvalue system has multiple qvalue

    4. None

  25. Widget in x-windows is

  26. Gadget in x_windows is

  27. Variable DESTDIR in make program is accessed as

    1. $ (DESTDIR)

    2. ${ DESTDIR}

    3. DESTDIR

  28. The keystroke mouse entrie are interpreted in ms windows as

    1. Interrupt

    2. Message

    3. Event

    4. None of the above

  29. Link between program and outside world (ms-win)

    1. Device driver and hardware disk

    2. Application and device driver

    3. Application and hardware device

    4. None

  30. Ms-windows is

    1. multitasking

    2. multiuser

    3. bothof the above

    4. none of the above

  31. Dynamic scoping is

  32. After logout the process still runs in the background by giving the command

  33. Which process dies out but still waits

    1. Exit

    2. Wakeup

    3. Zombie

    4. Sleep

  34. In dynamic memory allocation we use

    1. Doubly linked list

    2. Circularly linked

    3. B trees

    4. L trees

    5. None

  35. To find the key of search the data structure is

    1. Hash key

    2. Trees

    3. Linked lists

    4. Records

  36. Which of the following is true

    1. Bridge connects dissimiler LANand protocol insensitive

    2. Router connects dissimiler LANand protocol insensitive

    3. Gateway connects dissimiler LANand protocol insensitive

    4. None of the above

  37. Read types of tree traversals.

  38. Read about SQL/Databases

  39. A DBMS table is given along with simple SQL statements. Find the output.

  40. Simple programs on pointers in c