NIC Question-Paper |   6777

NIC Question-Paper

                                                          NIC Placement Paper

PART 1

1 Each question below gives multiple choices of answers. Choose the most appropriate one .

1.1 A list of items, in which additions and deletions may be made at either end is known as
a. Queue. 
B. Push-down stack 
C. Deque 
D. None of the above 

1.2 Reentrant code provides for 
A. Execution of object program instruction segments by more than one process at the same time. 
B. Improved console operations.
C. Multiprocessing
D. Contiguous areas of memory for storage of program, variables, data, reference, and dynamic process history.

1.3 Which is not a debugging technique
A. Core dumps
B. Traces 
C. Print Statements
D. Regression Testing 

1.4 The process of transforming a model into source code is
A. Reverse Engineering
B. Forward Engineering
C. Re-engineering
D . Re-structuring

1.5 The process by which existing processes and methods are replaced by new processes and techniques is
A. Reverse Engineering 
B. Business Process Re-engineering 
C. Software Process Management 
D . Forward Engineering 

1.6 init and cron are:
A. linux processes
B. DOS processes 
C. Windows processes 
D. None of the above. 

1.7 The differences between constructors and destructor in C++ are 
A. constructors can take arguments but destructor can't 
B. constructors can be overloaded but destructor can't be overloaded 
C. both A &B
D. none of these 

1.8 Use Case is a:
A. case in case/switch statement in a programming language .
B. a part of use case diagram, a modeling element. 
C. special case in legal cases in computer industry. 
D. None of the above. 

1.9 PATH
A. is a system variable naming the list of directories required to be searched for finding the commands to be executed.
B. is a path to be followed in finding Critical Path Method in Pert/CPM techniques 
C. is a system variable naming the list of directories required to be searched for finding a class. 
D. None of the above. 

1.10 When a language has the capability to prod\lce new datatype, it is called
A. Extensible
B. Overloaded 
C. Encapsulated 
D. Reprehensible 

2 Each statement below is either TRUE or FALSE. Choose the most appropriate answer.

2.1 JavaScript is an old version of Java Language. 

2.2 Maintenance stage in SDLS precedes Implementation . 

2.3 Symbian is an operating system.

2.4 Hotswappable hard disks requires systems to be closed and cooled before they can be removed. 

2.5 PHP and Perl are examples of spreadsheet packages 

2.6 The fields in a C++ program are by default private.

2.7 A return code of 0 from a function is interpreted that there are errors during its execution. 

2.8 When a variable is passed by reference to a procedure, the changes made to the variable are passed back to the calling procedure.

3. Fill in the blanks with suitable answers.

3.1 The time required by a sector to reach below the read/write head -------------

3.2 What will be the output of the following code snippet ----------
try

int x = 0; 
int y =SO /x ; 
System.out.println("Division by Zero is an error"); 

catch(ArithmeticException e) { 
System.out.print1n("catch block"); 


3.3 In a select statement ---------------- clause restricts the grouped rows that appear in the result.

3.4 The process of mapping/initialising a disk is called

3.5 A popular open source DBMS ---------------

3.6 An image scanner with ----------- software can translate a scanned text into text that can be edited.

3.7 A BIOS routine called ---------, that run~ whenever the system l~ started to determine the functioning of various parts of the computer system.

PART 2

1. Write short note on
a. De-fragmentation, compression and encryption
b. Open Source, Commercial Software and Freeware
c. Paging and Segmentation
d. SDLC and its stages

2.a.  What do you understand by Complexity of Sorting Algorithms? Explain in the context of various sorting techniques.
b. Write Quick Sort Algorithm using pseudocode and verify your code by tracing an example.

3.a. Explain final, finally, finalise, this and super in Java Context

b. Consider the following stack, where stack is allocated N = 6 memory cells
STACK: AAA, DDD, EEE, FFF, GGG, _
Describe the stack as the following operations take place:
(i) PUSH(ST ACK,KKK),
(ii) POP(ST ACK,ITEM),
(iii) PUSH(STACK,LLL),
(iv) PUSH(STACK,SSS),
(v) POP(ST ACK,ITEM),
(vi) PUSH(STACK,TTT)

c. What does chmod, vi and grep do in linux system? 

4. What is Object Oriented Programming? Why is Java called portable or platform independent language 

5. a. Based on type of organization of data what are different types of DBMS? Give examples of commercially available DBMS's today. 

b. An organization conducts training programmes (courses) for its own employees. These employees are recognized in the organization by an employee code and are placed in different specialized groups called Divisions headed by HODs (who are also employees). Design a fully normalized database, clearly indicating primary key and foreign key constraints, to store following information: Employee Name, Employee Code, Designation, Division Name, HOD Name, Course Title (Training Programme Title),Course Start Date, Course Duration etc Write SQL statementto generate 
(i)Division wise (List of all employees in a division) with the HOD Name (ii)List of courses attended by a particular employee 
(iii)List of employees who have attended a particular training programme 

c. Describe ACID in the context of DBMS.

feedback