Home »» Placement Papers »» All Papers »» Hughes »» Placement Paper

HUGHES Paper Pattern DCE 2


Hughes Paper In DCE 
(Section 2)



  1. a processor has two level cache.Their access time (level1 and level2) is 100ns and 300ns respect.Memeory access time is 1000ns$
  ans is 140 (b)

  2.diskless server uses
  a rarp
 b arp
 c ftp
 d.telnet
  ans rarp

  3.which one of them is not a client server
  e-mail
 telephone
 webserver
 and one more
  ans is e-mail or telephone.

  4.Which one is used to represent operations
  infix
 postfix
 binarytree
 and one more
  ans binary tree 

  5.one qustion was on private key and public key.The quest. was if a wants to send a message to b that no one other that b should $
  A private key
 A public key
 B private key
 B public key

  6.compliers maintain
  ans is symbol table 

 1) what a java interface not have ?
      ans - instance variables

  2) what is done with java code on a web-page
     ans - downloaded and executed on ur pc

  3) what is the order of deleting a node from a linked list given a ptr to it 
     ans O(n)  ( since u have to traverse the list to reach the prev. node)

  3) what is RSA

  4) how can A send a messageto B so that B knows its from A 
     ans A uses his private key so that B can use A's public key

  5) what is the best sort in worst case
    ans heap sort

  6) what is the given sorting
    ans selection ( check it )

  7) what can access protected memebers of a class
    ans other classes of that program

  8) what protocol is used by a machine to map an ip to hardware address
   ans arp

  9) what is the size of ipv6
   ans 128 bits

  10) what protocol has ping 
   ans icmp


11) how many keys are needed in symmetric and asymmetric crptography?
    ans - i dont know 

  12) one on a right threaded tree

  13) very easy k-map 
     ans i think its b)

  14) very easy ckt 
      ans choice which has option : a&c are equivalent

  15) what in unix doesnt have a fd
      ans process  ( this was the first ques ).


Hughes (Question Paper)

 Paper they conducted two tests. Both were technical (no aptitude test).  First one was compulsory for everybody. In second one could opt for electronics or computers. In all i suppose there were 50 questions. I sent a request to my classmates to send me questions whatevery they could recall. Till now only one person has responded. I am sending those Questions to you.

And just before interview you were supposed to fill up a performa which they call Behavioural Test. This was to check you interpersonal skills and socialising capabilities.  Questions like - would you like to be elected leaders of organising committees, do you like peoply express their agonies to you, do you wish people be close to you type questions were repeated in one and the other form. 

Interview was technical as well as personal. CGPA did count - it seems. They selected 8 people from here. BTW what's your current CGPA and what's the strength of your class. Do they come for B.Tech and M.Tech separatel as the case here is or it's all at once.

 Questions :

 1.If a precondition of a sub routine fails then
   a. post condition fails as well
  b. Post condition may fail
  c. post condition is declared but now defined.

 2. whatz the o/p of the following program
  char * a= "AabbCc";
 void x(char *a)
 { 
   a[0] == 0 ? x(a+1):1;
   printf("%c",*a);
   return 1; 
}
   x(a);
a. AaBbCc
b. cCbBaA

 3. What is DHCP used for?

 4. There are 2protocols IP and IPX are running on top of Ethernet. Suppose a packet addressed to that ethernt card arrives, to which protocol the ethernet sends the packet?

1. It checks the payload of the frame and finds out the protocol type and despatches it to the right protocol

2. It fins out the protocol type that is mentioned in the ethernet frame.

3. despatches to both the protocol

5. What is the use of global static variable in C?

6. In which stage of the compilation the Macro in C are converted into Iline code? (this is not the exact Qn a slight variation of it)

7 In the IP/Ethernet network, a packet with destination address 192.32.65.70 arrives and there is no entry for this address in the routing table of the m/c? what does the m/c do about the packe 
 a. discards the packet.
b. Brodacasts into the ethernet.
c. sends to default router

 8. in Public key Encryption , if A wants to send a encrypted msg to B then A encrypts the message with 
 a. A's public key
2. A Pvt key
c. B's public key
d. B's Pvt key

 9. consider the SQL statement "Create table New as select * from oldtable"
 a. the sql stament is a correct one
b. New is reservd word there is an error
c. you can't select anything while creating a table

 11. If X and Y are two attriubutes of a relation and 1 and 2 be any two tuples in that relation Y is fuctionally dpndant on X if (X-Y)

a. if (x1 == x2) then y1==y2
b. if (x1==y1) then x2 == y2
someother combinations

 12.The normalization process 
 1.reduces the data redundancy
2.It reduces the inconsistency that arises due to the data redundancy


 13. ((A nand A) nand (B Nand B)) = ?
 a. A+B

 14. whtz the purpose of flow control?
 1. to control errors
. to control congession the receiving end
3. to sequnce the out of sequence packets

 15. Whic is false about Java strings
 1. The are Null terminated
2. Set of Chars
3. The Condition checking == and = on a sme pair of strings gives different results.

 16. When a java Applet is downloaded what does it do?
 Don't remeber the options
it's went something like this:
1. checks the magic nubmer


Some More Questions...

 1: a machine A wants to set it's time same as a a machine B so it sends a packet to B and b sends reply.but the time on packet is over by the timete packet  reached A.A has to 
 a1: set the time on packet
b2: increment its time slowly so as to reduce deifference
c: send packets repeatedly till it gets a packet with time less tan the current time
d:....


 2.which of the following protocols does not find mac address given internet address 
 a. arp
b. rarp
c....
d...

 3.when an java applet get's downloaded what happens
 a.the byte verifier checks the magic number
b...
c...
d...

 4.when A wants to send a mesg to B using Public key cryptography he uses
 a.A's public key
b.A's private key
c.B's public
d.B's private


 5.how does a string in java differ from that of c/c++
 a1.java strings are mutable
b.java strings does not have a 
c.
d.

 6.given str="AaBbCc"and a small c program
 something like
a:b:(  )
the program actually reverses the string recursively

 7.some protocol  SHDC

 8.NFS server is similar to
 a.provides similar sevices as unix
b.a file trans fer.....
c.just gets the file for reading..
d.


 9.an address 202.15.46.45 is to be located.the machine does not have  info about 202.0.0.0 or 202.15.0.0 0r 202.15.46.0 so the DNS server willl now
 a.discard the packet
b.send the mesg to a default server if available
c.send mesg to a DNS server if available
d......

 10.verification:"are u building the right product"   validation:"are we building the product right"
 a.both are wrong(ans)
b.both are correct
c.first wrong second correct
d.first correct second wrong

 11.A:"cohesion is a desirable property"  B:"cohesion means the property that the entire unit is one......"
 a.both are correct 
b.both are wrong
c.first wrong second correct
d.first correct second wrong


 12:definition of functional dependency.

 13:which of the following does not use extra memory
 a.....
b.insertion sort
c.shell sort
d.both b and c.

 14:which of the following is better for ten elements
 a.bubble sort
b.selection sort
c.quick sort
d......

 15.the memory reference time for cache is 100 ms and for memory is 1000ms. the probability of a hot is .9.the average memory access time is
 a:100
b:200(Ans)
c:500
d:1000
 Ans: (b)

 16.a question on socket numbers

17there is an ordered binary tree and an index structure
a.we can use ordbintree without ordering
b.orb are used with ordering where as indexing canbe done without ordering
c.indexing uses extra memory
d......

 18.there is ethernet protocol and ethernetIPstack in MAC sublayer when an address has to be found which is used



Some more questions:

 A question on multi threading! It has got a PC, register space kind of options.

A question on NFS.
a. doesn't allow read.
b. it is just like Unix file system.
c. After the file is opened, the whole file os transferred to the client
d. there is no state information maintained.

 What takes maximum time in a context switch.
 a. saving registers.
b. address space switching.
c. flushing the TLB
d. getting the new process inside the memory.

 1.If a precondition of a sub routine fails then
   a. post condition fails as well
  b. Post condition may fail
  c. post condition is declared but now defined.

 2. whatz the o/p of the following program
  char * a= "AabBCc";
 void x(char *a)
 { 
   a[0] == 0 ? x(a+1):1;
   printf("%c",*(a+0));
   return 1; 
}
   x(a);

a. AaBbCc
b. cCbBaA

 3. What is DHCP used for?
 Assignment of IP addresses.

 4. There are 2protocols IP and IPX are running on top of Ethernet. Suppose a packet addressed to that ethernt card arrives, to which protocol the ethernet sends the packet? 

1. It checks the payload of the frame and finds out the protocol type and despatches it to the right protocol

2. It fins out the protocol type that is mentioned in the ethernet frame.

3. despatches to both the protocol

5. What is the use of global static variable in C?

6. In which stage of the compilation the Macro in C are converted into Iline code? (this is not the exact Qn a slight variation of it) pre-processing stage. 

7 In the IP/Ethernet network, a packet with destination address 192.32.65.70 arrives and there is no entry for this address in the routing table of the m/c? what does the m/c do about the packe
 a. discards the packet.
b. Brodacasts into the ethernet.
c. sends to default gateway
d. sends to the server

 8. in Public key Encryption , if A wants to send a encrypted msg to B then A encrypts the message with 
 a. A's public key
2. A Pvt key
c. B's public key(Answer)
d. B's Pvt key

 9. consider the SQL statement "Create table New as select * from oldtable"
 a. the sql stament is a correct one
b. New is reservd word there is an error
c. none
d. new should come within quotes.

 10. By Codd's 14 rules for RDBMS whih one of following is not right?
 a. null values r not defined.

 11. If X and Y are two attriubutes of a relation and 1 and 2 be any two tuples in that relation Y is fuctionally dependant on X iff (X-Y)
 a. if (x1 == x2) then y1==y2
b. if (x1==y1) then x2 == y2
someother combinations

 12.The normalization process 
 1. reduces the data redundancy
2. It reduces the inconsistency that arises due to the data redundancy


 13. ((A nand A) nand (B Nand B)) = ?
 a. A+B
The question was not exactly in this form. gates represented pictorilly

 14. whtz the purpose of flow control?
 1. to control errors to control congession the receiving end
3. to sequnce the out of sequence packets

 15. Whic is false about Java strings
 1. The are Null terminateds
2. Set of Chars
3. The Condition checking == and = on a sme pair of strings gives different results.

 17. Whatz is the Cyclometic complexity of the following code don't remember the code exactly

Comment

0 Answers