UTC Aerospace Systems Hiring Process consists following sections
a)Written Test
b)Group Discussion
c)Face to Face Interview (Technical and HR Interview )
UTC Aerospace Systems Written Test consists 2 Parts Aptitude and Technical
a)Written Test
No of Questions :60
i)Aptitude -30 Questions
ii)Technical :30 question
Time Limit : 60 Minutes
1.DML is provided for
(A)Description of logical structure of database.
(B)Description of logical structure of database.
(C)Manipulation & processing of database.
(D)Definition of physical structure of database system.
Ans:(C)
2.What is data integrity?
3.The keyword to eliminate duplicate rows from the query result in SQL is
4.1. What will be the output of the program?
#include<stdio.h>
int main()
{
const int x=5;
const int *ptrx;
ptrx = &x;
*ptrx = 10;
printf("%d\n", x);
return 0;
}
5
10
Error
Garbage value
Ans:C
5.What will be output when you will execute following c code?
#include<stdio.h>
void main(){
char arr[7]="Network";
printf("%s",arr);
}
Network
N
Garbage Value
Compilation error
Ans:C
6.What is the similarity between a structure, union and enumeration?
All of them let you define new values
All of them let you define new data types
All of them let you define new pointers
All of them let you define new structures
Ans:B
7.What is the default subnet mask for a class C network?
127.0.0.1
255.0.0.0
255.255.0.0
255.255.255.0
Ans:D
8.Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another?
FTP
SNMP
SMTP
RPC
Ans:C
9.Which of the following is the address of the router?
The IP address
The TCP address
The subnet mask
The default gateway
Ans:D
10.FDDI is a
ring network
star network
mesh network
bus based network
Ans:A
11.Fragmentation of the file system
occurs only if the file system is used improperly
can always be prevented
can be temporarily removed by compaction
is a characteristic of all file systems
None of the above
Ans:(C)
12.Which is a permanent database in the general model of compiler?
Literal Table
Identifier Table
Terminal Table
Source code
None of the above
Ans:(C)
13.Swapping
works best with many small partitions
allows many programs to use memory simultaneously
allows each program in turn to use the memory
does not work with overlaying
None of the above
Ans:(C)
14.Which scheduling policy is most suitable for a time-shared operating system
Shortest-job First.
Elevator.
Round-Robin.
First-Come-First-Serve.
Ans:C
15.Semaphores
synchronize critical resources to prevent deadlock
synchronize critical resources to prevent contention
are used to do I/O
are used for memory management
Ans:A
16.2. PHP is a widely used â¦â¦â¦â¦â¦. scripting language that is especially suited for web development and can be embedded into html
Open source general purpose
Proprietary general purpose
Open source special purpose
Proprietary special purpose
Ans:A
17.Which of the following functions require the allow-url-fopen must be enabled?
include()
require()
both of above
None of above
Ans:C
18.The feature in object-oriented programming that allows the same operation to be carried out differently, depending on the object, is_____
inheritance
polymorphism
overfunctioning
overriding
Ans:B
19.Examine the following program and determine the output
#include <iostream>
using namespace std;
int operate (int a, int b)
{
return (a * b);
}
float operate (float a, float b)
{
return (a/b);
}
int main()
{
int x=5, y=2;
float n=5.0, m=2.0;
cout << operate(x,y) <<"\t";
cout << operate (n,m);
return 0;
}
10.0 5.0
5.0 2.5
10.0 5
10 2.5
Ans:D
20.1. Find out the error in following block of code.
If (x = 100)
Cout << âx is 100â;
100 should be enclosed in quotations
There is no semicolon at the end of first line
Equals to operator mistake
Variable x should not be inside quotation
Ans:C
21.. Which of the following components of the .NET framework provide an extensible set of classes that can be used by any .NET compliant programming language?
.NET class libraries
Common Language Runtime
Common Language Infrastructure
Component Object Model
Ans:A
22.Which of the following security features can .NET applications avail?
1. PIN Security
2. Code Access Security
3. Role Based Security
4. Authentication Security
5. Biorhythm Security
1, 4, 5
2, 5
2, 3
3, 4
Ans:C
23. How many levels of compilation happens in .NET Framework?
One
Two
Three
Four
Ans:B
24.. For the code snippet shown below, which of the following statements are valid?
public class Generic<T>
{
public T Field;
public void TestSub()
{
T i = Field + 1;
}
}
class MyProgram
{
static void Main(string[] args)
{
Generic<int> gen = new Generic<int>();
gen.TestSub();
}
}
Addition will produce result 1.
Result of addition is system-dependent.
Program will generate run-time exception.
Compiler will report an error: Operator '+' is not defined for types T and int.
Ans:D
25.What will be the output of the program?
public class SqrtExample
{
public static void main(String [] args)
{
double value = -9.0;
System.out.println( Math.sqrt(value));
}
}
3.0
-3.0
NaN
Compilation fails.
Ans:C
Explanation: The sqrt() method returns NaN (not a number) when it's argument is less than zero.