Placement Papers - Hughes

HUGHES Paper Pattern Sec -2
Posted by :
George
(8)
HUGHES (Paper)
It Consist of Two Section Part A and B or C
For CSE Student part A & B is Better.
Part A and B for CSE Student
1.
f(char *p)
{
p[0]? f(++p):1;
printf("%c",*p);
}
if call that fuction with f(Aabcd) what is the output??
Ans:dcbaA (Just reversing the string
2.
f(char *p)
{
p=(char *)malloc(sizeof(6));
strcpy(p,"HELLO");
}
main()
{
char *p="BYE";
f(p)
printf("%s",p);
}
what is the o/p???
Ans:HELLO
3. To sorting array of 10 elements which sorting is best
a)slection
b)bubble
c)tree sort
d)....
Ans:a
4. To saving space paoint of view which sort is best
a)selection
b)insertion
c)both a & b
d)...
Check it once Can easy Answer this Question(UCA)
5. Which statement is wrong on heap
a) Any two childs should not same
b)..
c)..
d)...
Ans:a
6). One more question on heap
UCA
7. Read about cyclometric complexity..
8. How many null pointer are there in N number binary tree
Ans:N+1
9. Two sorted list of size n what are the maximum comparison in merge
ANs:2n-1
10. Converting 41.685 to binary
11. Pc is incremented while executing ---------- instruction ans:fetch instruction
12. This is gates (NAND)problem It means some gate figure has given with all NAND gate we have write equavalent gate
Ans:OR gate
13. x:validating :Are we producing product right y:verification:Are we producing right right
a)X is wrong statement
b)y is "
c)x and Y "
d)x & y is right statement
14. NFS some queston in NSF. see distibuted operation System book by Tenaun Bamab
15.IP & IPX is implemented in transport layer....... mama all our friends can answer this question .Here i am unable to recall that question. If u a have any doubts on IP & IPX contact HARI because he did his project is B.Tech in that protocols
UCA
16. Comparison between hashtable and binary tree
Ans:a
UCA
17
client server is working in asyn mode then how communication will take place
bt client and server.
UCA
18. Once context swithing occures then ------------will take place
a)saving register
b)saving stack
c)....
d).....
UCA
19. If precondition is failed what u say about postcondition?
Note: Read about preconditon and postcondition
20. Whiling download java applete then web broswer do the folling
a)checking the class structure..
b)...c)....d).....
Read about this:
21. Strings in Java
a)Mutable
b)variable length string
c)...
d)....
Ans:b
22. In Internet Transport layer which is not a protocol
a)/etc/host
b)TCP
c)UDP
d)...
UCA
23 .Which is not specified in CODD\'s rules
a)....
b)....
c)...
d).....
It is from DBMS Question
24. What is the use of Normalization
a)....b)....c)...d)...
Any one can answer
25. Futional dependecy x->y is shows that
a)if x1=x2 then y1=y2
b)...c)...d)...
Ans:a
26. One question on IP addsress 243.65.77.8 some thing
a)...b)..c)..d)...
Every one can answer
27. If A sends a message to B with encryption then key is
a)A public key
b)B public key
c)A private key
d)B private key
Ans:b (Check it once)
28. In a class only declaration of the function is there but defintion is not there then what is that function
Ans:virtual function
29. What is not necessary condition in dead lock
Ans:a
30. One question from multible inheritance...
a)..b)..c)...d)......
31. ICV protocols i don\'t know about this mama .Till now i didn\'t heard that protocol mama..just know what is that then u can answer this question
32. One question from catches like write-through protocal etc
33. Catche access time is 100ns ,memory access time is 1000ns and hit ratio is 0.9 then what is average memery access time
a)100ns
b)200ns
c)400ns
d)500ns
Ans:b
It Consist of Two Section Part A and B or C
For CSE Student part A & B is Better.
Part A and B for CSE Student
1.
f(char *p)
{
p[0]? f(++p):1;
printf("%c",*p);
}
if call that fuction with f(Aabcd) what is the output??
Ans:dcbaA (Just reversing the string
2.
f(char *p)
{
p=(char *)malloc(sizeof(6));
strcpy(p,"HELLO");
}
main()
{
char *p="BYE";
f(p)
printf("%s",p);
}
what is the o/p???
Ans:HELLO
3. To sorting array of 10 elements which sorting is best
a)slection
b)bubble
c)tree sort
d)....
Ans:a
4. To saving space paoint of view which sort is best
a)selection
b)insertion
c)both a & b
d)...
Check it once Can easy Answer this Question(UCA)
5. Which statement is wrong on heap
a) Any two childs should not same
b)..
c)..
d)...
Ans:a
6). One more question on heap
UCA
7. Read about cyclometric complexity..
8. How many null pointer are there in N number binary tree
Ans:N+1
9. Two sorted list of size n what are the maximum comparison in merge
ANs:2n-1
10. Converting 41.685 to binary
11. Pc is incremented while executing ---------- instruction ans:fetch instruction
12. This is gates (NAND)problem It means some gate figure has given with all NAND gate we have write equavalent gate
Ans:OR gate
13. x:validating :Are we producing product right y:verification:Are we producing right right
a)X is wrong statement
b)y is "
c)x and Y "
d)x & y is right statement
14. NFS some queston in NSF. see distibuted operation System book by Tenaun Bamab
15.IP & IPX is implemented in transport layer....... mama all our friends can answer this question .Here i am unable to recall that question. If u a have any doubts on IP & IPX contact HARI because he did his project is B.Tech in that protocols
UCA
16. Comparison between hashtable and binary tree
Ans:a
UCA
17
client server is working in asyn mode then how communication will take place
bt client and server.
UCA
18. Once context swithing occures then ------------will take place
a)saving register
b)saving stack
c)....
d).....
UCA
19. If precondition is failed what u say about postcondition?
Note: Read about preconditon and postcondition
20. Whiling download java applete then web broswer do the folling
a)checking the class structure..
b)...c)....d).....
Read about this:
21. Strings in Java
a)Mutable
b)variable length string
c)...
d)....
Ans:b
22. In Internet Transport layer which is not a protocol
a)/etc/host
b)TCP
c)UDP
d)...
UCA
23 .Which is not specified in CODD\'s rules
a)....
b)....
c)...
d).....
It is from DBMS Question
24. What is the use of Normalization
a)....b)....c)...d)...
Any one can answer
25. Futional dependecy x->y is shows that
a)if x1=x2 then y1=y2
b)...c)...d)...
Ans:a
26. One question on IP addsress 243.65.77.8 some thing
a)...b)..c)..d)...
Every one can answer
27. If A sends a message to B with encryption then key is
a)A public key
b)B public key
c)A private key
d)B private key
Ans:b (Check it once)
28. In a class only declaration of the function is there but defintion is not there then what is that function
Ans:virtual function
29. What is not necessary condition in dead lock
Ans:a
30. One question from multible inheritance...
a)..b)..c)...d)......
31. ICV protocols i don\'t know about this mama .Till now i didn\'t heard that protocol mama..just know what is that then u can answer this question
32. One question from catches like write-through protocal etc
33. Catche access time is 100ns ,memory access time is 1000ns and hit ratio is 0.9 then what is average memery access time
a)100ns
b)200ns
c)400ns
d)500ns
Ans:b
Quick links
Quantitative Aptitude
Verbal (English)
Reasoning
Programming
Interview
Placement Papers