Ness Technologies - Sample Placement Paper
1. What is non static block in java
2. How to sort the elements in HashMap
3. How many objects are created for a singleton class
4. Java violates few objected oriented concepts. Can you explain in what way?
5. When you say String is immutable, what do you mean by that? Say I have String s ="Ness" s= s+"Technologies"; What will happen? If the value gets appended, then what is the meaning of immutable here?
6. What is meant by event handling in SAX parser?
7. What is meant by Encapsulation? Can you write a class to explain encapsulation?
8. How does Vector implement synchronization?
9. What is the purpose of having the concept of overloading?
10. What is the difference between Checked and Unchecked exception? Give some examples
11. Nullpointer exception is a very common exception. Why is it not made as a checked exception?
12. Configuration of an UART in serial communication has
a.clock signal
b.baud rate, stop bit, data length
c.both
d.none
13. Deadlock happens when two process waiting for the resources used by each other in this condition
a.both process knows that they are waiting for each other
b.one process knows that other is waiting
c.both a and b
d.none
14.Physical memory location in running program is resolved by
a.linker
b.compiler
c.loader
d.none
15.Task switching is switching between
a.process
b.threads
c.concurrent part in same progarm
d.all
16.In 2-pass compiler
a.identifier can be used without its declaration
b.indentifier should be declared before its first use.
c.both
d.none
17.Difference between functional/ordinary SDLC and object-oriented SDLC is
a.in functional SDLC the develpoment time is more than design time
b.in object oriented SDLC, design time is more than development time.
c.both
d.none
18.Which of the following is not a bus-interface for a microprocessor
a.ISA
b.AGP
c.PCI
d.ICE
19.Which of the following statement are true for structure
a. a structure can contain a pointer to itself.
b. structure can be compared
c.both
d.none
20.Which is not defined as codd's rule of RDBMS
a.comprehensive data sub language rule
b.view updates.
c.physical data dependency
d.integrity dependency
21.Encryption means
a.text to cipher
b.cipher to text
22.Cache is
a..ROM
b.RAM
c.PROM
d.EPROM
23.Unix os implements two types of pipes ,one is formatted and other is
a.low level pipes
b.high level pipes
c.middle level pipes
d.none
24.
void main()
{
extern int a;
a=10;
printf("%d",sizeof(a));
}
will ?
a. give linker error- a not defined
b. print 10
c. give compiler error
25.
int a[10];
a[0]=12;
a[12]=17;
printf("%d,%d",a[0],a[12]);
will compiler show any error?
26.socket() is a
a.system call
b. library function
c.both
d. none
27. The parameter of sizeof operatror is
a.data type
b.variable
c.both
d.none
28. The argument of switch command is of type
a.character
b.integer
c.both
d.all of the above
29. Differance between pointer and referance
30. Inheritance of a class is relationship like