Вы находитесь на странице: 1из 43

TECHNICAL

1.

Delete from table tempv where rowid in (select rowid from tempv where

rowid in (((select min(rowid) from tempv where ... count(*) > 1))) union(select
rowid from tempv where rowid in (((select min(rowid) from tempv where ...
count(*) > 1)));
2.

When there is a failure in fetching the rows from a cursor...


a. %isopen
b. %notfound
c. %found
d. %rowcount

3.

Select 'oracle' from dual where null = null;


a. oracle
b. null
c. error out
d. no rows selected

4.

here is a question of Package body and Package Specification, they have

provided the code for that describing the scenario of movie_tickets_sold and
asked the programmer to insert a block of code...., where that code block to be
inserted? In Package body? or in Package Specification?
5.

Which of the following operator is not used in Outer Join?

a. =
b. !=
c. AND
d. OR
6.

PL/SQL uses which of the following

a. Early Binding
b. Late binding
c. No Binding
d. Deferred Binging

7.

Following is a database trigger, CREATE OR REPLACE TRIGGER

delete_row ON DELETE
not remember the complete question.
8.

If table contains 100 rows and it is truncated, how many rows get updated

a. 0
b. 1
c. 100
d. No rows updated
9.

There are some questions on Basic SELECT STATEMENTS...

10.

Some questions on Triggers, Procedures

11.

VARRAYS/Nesting of Table: 1 question is there

12.

NLS_DATE_FORMAT: 1 question

13.

The size of the float data type in C language is

14.

he size of the float data type in C language is

What is the output of the following C program.


Main()
{
printf(%c,abcdefgh[4]);
}
15.

What is the o/p of the following C-program.

Main()
{
char str[7]=strings;
printf(%s,str);
}
16.

main()

{
file *fp;
fp=fopen(xyz,r);

}
What does fp point to?
17.

What is the maximum no. of arguments that can be given in a command

line in C.
18.

When the variables are pushed into the stack, which method is used to

retrieve them from it.


a) pop b) pull c) remove d) none of these.
19.

What is the size of integer variable in JAVA?

20.

A programs reads The man and the boy\r\n from a file using fgets() and

stores it in str[]. Then the string stored in str is


a) The man and the boy\r\n\0
b) The man and the boy\r\0
c) The man and the boy\n\0
d) The man and the boy\0
21.

After this written exam, we had another written for the short-listed

students. It contained algorithms and coding. There were two questions.


22.

The first one was the conversion of a given expression into its postfix

form and then to evaluate it.


23.

The question was to have a circularly linked link-list of integers 1 to n. I

we give k as an input then we have to output(print) 1, k, 1+2k, 1+3k till n and


we have to delete these numbers. When we give then next k we have to continue
the same process starting with 2. The linked needs to be maintained.

1.

Full form of URL ? a) universal resource locator b) uniform resource

locator c)none of these d) unidentified random locator.


2.

CDROM access is a) RANDOM b) SEMI RANDOM 3) SEQUENTIAL

4) ?????????/

3.

Total time spent by process...waiting in queue, execution etc

4.

response time..of process.

5.

What is the function of shell?

Interpreter b) command interpreter c) interface d) /?????????


6.

Which is a command interpreter ?

a) Shell b) Kernel c)??? d)None of these


7.

main()

{
printf("%c","abcdef"[4]);
}
what is the output ? a) abcdef b) d c) e d) ERROR.
8.

main()

{ char dummy[20]; scanf("%[^a]",dummy);


printf("%s", dummy); }
what will it do?
a) ERROR b) take characters till ctrl z is pressed c) take upto 19 characters d)
None of These
9.

How are objects in cpp passed ?

a) By value b) By reference
10.

If the ethernet card is removed .

a) IP address will change b) MAC address will change c) ????


11.

Operation of queue a) FIFO b) LIFO c) FILO d) None of these

12.

Static member of a class is a) class specific b) Object specific c)

Referenced by using the scope resolution operator d)


a&c
13.

TCP is a) connection oriented b) connection less c) god only knows d)

None of these
14.

How is data send by IP layer?

a) as frames b) as packets c) as datagrams d) None of these

15.

If Link list is used to implement a stack what operations should be

implemented :
a) insert front, delete front b) insert front , delete rear c) insert rear, delete front d)
None of these
16.

Link list is implemented as a structure (data, link *), How is pointer

moved to the next node , cursor points to the present node.


a) cursor == cursor->link, b) cursor ++ c) ++ cursor d) None of these.
17.

How is memory allocated by new ?

a) In a heap b) in a stack b) both a & b c) None of these.


Technical Interview: The interview was over in 30 min
18.

Difference between structure and class.

19.

How to resolve ambiguity in multiple inheritance ?

20.

What is static and dynamic binding in C ?

21.

What is the difference between structure and array?

22.

Difference between calloc and malloc & realloc?

23.

What is static class and static member function?

24.

What is pointer to a pointer? How it is declared and how is it accessed?

25.

What is the difference between function overriding and overloading ?

26.

What is the scope of a variable ?

27.

What is the difference between C & C++ ?

28.

Some questions on templates and exceptions.

29.

What is stream ? How is it opened and describe file handling in CPP?

30.

Some questions related to Hard Disc :What is a hdd? How is a file

accessed from the hdd? Why isnt it used in place of a RAM ? What is RAID
describe its basic structure ? . Where is the file information stored on the hard disk
? What is FAT ? How are files physically arranged on the hard disc?

31.

What is JVM, what is BYTE CODE ? What is multithreading ? How can it

be implemented using C, write a program to describe it? What is the complexity


of radix sort and how is it determined? A sequence of 15 numbers was to be sorted
using heap sort. (He stopped me after the 3rd iteration).
32.

Some questions related to java-script, dynamic HTML, static HTML, ASP,

.NET A query on natural join in SQL, what is the need of normalization ? What is
data inconsistency and redundancy? What is the basic difference between file
systems and database systems? What are triggers and assertions in SQL? How can
you use C to connect with Oracle SQL database? (Using Oracle 8i PRO C/C++
precompiler )A complicated query on a trigger. (which I couldnt ans).
33.

What is fork system call? How is a child process called and what happens

to the parent ? In C what is spawnv () function, describe its execution. How can
you use C for writing assembly language programs ?
34. If you have done any project then try to bring the discussion towards it. I was
interviewed on the project for about 20 min and I kept on explaining till he took
up the HR form and signed it!!!! The interviewer was very impressed with my
technical knowledge and gave his feedback to the HR interviewer as Very
Confident & sound technical skills. (I had overlooked the remark when he was
writing it !!!)
binary equalent of 455 ?
35. whats the o/p of the following code ?
int main ()
{
int i = 0 ;
switch ( printf ("k") , printf ("ku"))
{
case 1 : printf (" %d" , i ) ;
break ;
case 2 : printf (" %d " , ++i ) ;
break ;

}
}
ans : a) k ku 1 also ans d) ( both are same )
36. Whats used to connect the computer with terminals ?
ans : a) Data Terminal equipment
37. A question about unix & linux
ans : b) [ unix from Bell labs ]
38. which is used to convert the assmbly code into binary
ans : assembler
39. whats the o/p of the following code ?
int main ()
{
int i = -1 ; j = 1 , k = 0 , m ;
m = i++ || j++ && k++ ;
printf ("\n\n%d %d %d " , i , j , k , m ) ;
}
40. Expansion of CDMA code divison multiple access .
41. A question from Microprocessor ( which segment is not used by Microprocessor ?
)
a. ) Data segment b) extended segment c) information segment d) none of these
42. Which of the following layer is not in Tcp/ip ?
a) transport b) application layer c) Network layer d) none of the above
43. If A= 10000011 and B=1010111 and c= 11000011 then whats the string represent
100001100011 .. (some thing like that )
44. A question regarding PCM
45. The best case comparison of Quick sort ?
46. The usage of static function ?
ans : to access static members

47. ACL stands for


a. access central limit
b. access control limit
c access control list
d. both a&b
48. Choose a valid statement: in c++ "this" is ans c references the object that has
invoked the method3 buffer registers are found in
a. data bus b main memory c. I/O devices d.cpu ans c(check)
49. An expression like ((A+B)*(D+E)/f) write the postfix expression
ans d AB+DE+*...
50. The depth of a tree is ans maximum level of a node
51. IEEE standard of wireless protocol ans 802.11
52. main()
{
i=10;
printf("%d",++i++);
printf("%d",++i);
}
a. 11&13 b.12&13 c.error d.? ans C (check)
53. What does the func return
int fun()
{
i=3;
i=6;
if(i=6)
i=7;
return i;
}
ans 7

54. main()
{
int a[]={0 1 2 3};
int *b;
printf("%d",b[-1]);
}
ans 1(check)
note: the elements of array may vary
Technical Interview
55. What are the layers in OSI stack & Explain them ?
56. What u know about trees ? & tell the types of tree ?
57. Give the syntax of binary tree ?
58. Write the program of factorial using recursion ?
59. Write a Sql Query for ......
60. Some questions from stack & Queue .
61. Write program for Single, doubly linked lists ?
62. ------stores a log of changes made to db,which are then written to _,which are then
written to _,which is used if db recovery is necc.
a) db buffer share pool
b) program global area,shared pool
c) system global area,large pool
d) redo log buffer,online redo log
63. ----means allowing objects of difference types to be considered as examples of a
higher level set :
ans: Generalization
64. The primary characteristic of key field is that it must be unique
65. Manager-------------- --emp managed by ans:one of many recursive relationship

66. If a member initialiser is not provided for a member object of a class .The object is called
a) static fn
b) non static fn
c) default constructor
d) none
67. class constest
{
private:
const int i;
public:
constest():i(10)
}
68. Inheritance
b) abstract base class
c) specifies a way to to define a const member data
d) none
69. Iimplement polymorphism when by object belonging to different class can
respond to the same message in diff ways.
a) late binding
b)dynamic binding
c) dynamically created object
d) virtual fun
70. Member function---------- and ----------- set and reset the format state of flags.
a) set,reset
b) set,get
c) set, unset
d) set ,unsetf

71. #include<iostream.h>
struct abc
{
int i;
abc(int j)
{ i=j;}
public:
void display()
{ cout<<i;}
}
void main()
{
abc ob(10);
ob.disp();
}
a)10
b) error : constructor is not accessible
c) abc: i not accessible
d)none
72. # include<iostream.h>
class sample
{
public :
sample(int **pp)
{
p=pp;}
int **p;
int **sample:: *ptr=&sample ::p;

73. In a file A...Z characters are written.if we open the file using fopen and
lseek(fp,-10,2);
c=getc(fp);
printf("%c",c);
what will be the output.?
Ans . Y.(please verify Here last parameter is the integer value to seel_end
74. Same question with
lseek(fp,10,0);
c=getc(fp);
printf("%c",c);
ans. 11th character will be printed "K" verify.
75. Theory question about far pointers.
Hint: Far pointers are 4 bytes in size and local pointers are 2 bytes in
size. important: i saw in a previous question paper of accenture which is in the
chetana database, some lady wrote that size of an integer in C is 2 bytes and for
C++ it is 4 bytes. This is absurd.The size of types is entirely dependent on the
compiler used.for DOS Turbo C sizeof int is 2 and float is 4 bytes for windows
borland C,C++ size of int is 4 bytes for linux gcc, size of int is 2 bytes. All these
depends on the Operating system.Please keep this in mind.
76.

Now some questions about extern variables.

77. #include<stdio.h>
main()
{
char str[]={"hell"};
int i;
for(i=0;i<5;i++)
printf("%c%c%c%c\n",str[i],i[str],*(str+i),*(i+str));
getch();

}
ans.
hhhh
eeee
llll
llll
note that str[i] and i[str] are the same.in the question paper, the original word is
"hello".
78. Which of the following is not defined in string.h strtod,memchr,strspn,strchr
ans . strtod.(defined in STDLIB.H) it is used to convert a string to double.
79. Questions on macros with arguments .same pattern given in TEST UR C SKILLS
eg.#define SQUARE(x) x*x
main()
{
.......
y=SQUARE(2+3);
printf("%d",y);
}
ans. when the macro expands we get 2+3*2+3 = 2+6+3 =11.11 is the correct
answer not 25.
80. Remember an inline function does type checking and so it is better than a macro a
question on this.
81. Some memory is allocated using memalloc and then realloc is called. and now to
write the size of the variable.better learn memalloc and realloc. what it does and
syntax.

HR Interview.

82. First they will ask u to intro urself.


83. Ur strength and weakness.Be clear abt this
84. Ur acheivements
85. hey are very particular abt the GAPS in our studies.
86. Ur Hobbies
87. Why u choose accenture and tell abt it
Willing to relocate.(Say Yes &.ready to work anywhere for accenture)

TCS : C Paper
1.

The C language terminator is


a.semicolon
b.colon
c.period
d.exclamation mark

2.

What is false about the following A compound statement is

a.A set of simple statments


b.Demarcated on either side by curly brackets
c.Can be used in place of simple statement
d.A C function is not a compound statement.
3.

What is true about the following C Functions

a.Need not return any value


b.Should always return an integer
c.Should always return a float
d.Should always return more than one value.
4.

Main must be written as

a.the first function in the program


b.Second function in the program

c.Last function in the program


d.any where in the program
5.

Which of the following about automatic variables within a function is

correct ?
a.its type must be declared before using the variable
b.they are local
c.they are not initialised to zero
d.they are global.
6.

Write one statement equalent to the following two statements

x=sqr(a);
return(x);
Choose from one of the alternatives
a. return(sqr(a));
b. printf("sqr(a)");
c. return(a*a*a);
d. printf("%d",sqr(a));
7.

Which of the following about the C comments is incorrect ?

a.commentscan go over multiple lines


b.comments can start any where in the line
c.a line can contain comments with out any language statements
d.comments can occur within comments
8.

What is the value of y in the following code?

x=7; y=0;
if(x=6)
y=7;
else
y=1;
a.7
b.0

c.1
d.6
9.

Read the function conv() given below

conv(int t)
{
int u;
u=5/9 * (t-32);
return(u0;
}
What
a.15
b.0
c.16.1
d.29
10.

which of the following represents true statement either x is in the range of

10 and 50 or y is zero
a.x>=10 && x<=50 || y==0;
b.
c.
d.
11.

Which of the following is not an infinite loop ?

a.while(1){
....
}
b.for(;;){
...
}
c .x=0;
do{
/*x unaltered within theloop*/
...

}while(x==0);
d .# define TRUE 0
...
while(TRUE){
....
}
12.

what does the following function print?

func(int i)
{
if(i%2)return 0;
eale return 1;
}
main()
{
int =3;
i=func(i);
i=func(i);
printf("%d",i);}
a.3
b.1
c.0
d.2
13.

how does the C compiler interpret the following two statements

p=p+x;
q=q+y;
a. p=p+x;
q=q+y
b. p=p+xq=q+y
c. p=p+xq;

q=q+y
d. p=p+x/q=q+y
14.

read the folllowing code

# define MAX 100


# define MIN 100
....
....
if(x>MAX)
x=1;
else if(x<MIN)
x=-1;
x=50;
if the initial value of x=200,what is the vlaue after executing this code?
a.200
b.1
c.-1
d.50
15.

A memory of 20 bytes is allocated to a string declared as char *s then the

following two statements are executed:


s="Etrance"
l=strlen(s);
what is the value of l ?
a. 20
b. 8
c. 9
d. 21
16.

Given the piece of code

int a[50];
int *pa;
pa=a;
to access the 6th element of the array which of the following is incorrect?

a. *(a+5)
b. a[5]
c. pa[5]
d. *(*pa + 5)
17.

consider the following structure:

struct num nam{


int no;
char name[25];
};
struct num nam
n1[]={{12,"Fred"},{15,"Martin"},{8,"Peter"},{11,Nicholas"}};
.....
.....
printf("%d%d",n1[2],no,(*(n1 + 2),no) + 1);
What does the above statement print?
a.8,9
b.9,9
c.8,8
d.8,unpredictable value
18.

I dentify the in correct _expression

a. a=b=3=4;
b. a=b=c=d=0;
float a=int b=3.5;
d. int a;
float b;
a=b=3.5;
19.

Regarding the scope of the varibles;identify the incorrect statement:

a. automatic variables are automatically initialised to 0


b. static variables are are automatically initialised to 0
c. the address of a register variable is not accessiable
d. static variables cannot be initialised with any _expression

20.

cond 1?cond 2?cond 3?:exp 1:exp 2:exp 3:exp 4; is equivalent to which of

the following?
a .if cond 1
exp 1;
else if cond 2
exp 2;
else if cond 3
exp 3;
else
exp 4;
b. if cond 1
if cond 2
if cond 3
exp 1;
else
exp 2;
else
exp 3;
else
exp 4;
c.if cond 1 && cond 2 && cond 3
exp 1 |exp 2|exp 3|exp 4;
d.if cond 3
exp 1;
else if cond 2
exp 2;
else if cond 3
exp 3;
else
exp 4;

21.

The operator for exponencation is

a. **
b .^
c. %
d. not available
22.

which of the following is invalid

a. a+=b
b. a*=b
c. a>>=b
d. a**=b
23.

What is y value of the code if input x=10

y=5;
if (x==10)
else if(x==9)
elae y=8;
a. 9
b. 8
c. 6
d. 7
24.

What does the following code do?

fn(int n,int p,int r)


{
static int a=p;
switch(n)
{
case 4:a+=a*r;
case 3:a+=a*r;
case 2:a+=a*r;
case 1:a+=a*r;
}
}

a.computes simple interest for one year


b.computes amount on compound interest for 1 to 4 years
c.computes simple interest for four year
d.computes compound interst for 1 year
25.

a=0;

while(a<5)
printf("%d\n",a++);
how many times does the loop occurs?
a. infinite
b. 5
c. 4
d. 6
26.

How many times does the loop iterated ?

for (i=0;i=10;i+=2)
printf("Hi\n");
a.10
b.2
c.5
d....
27.

What is incorrect among teh following A recursive functiion

a. calls itself
b. is equivalent to a loop
c. has a termination cond
d. does not have a return value at all
28.

Which of the following go out of the loopo if expn 2 becoming false

a.while(expn 1){...if(expn 2)continue;}


b.while(!expn 1){if(expn 2)continue;...}
c.do{..if(expn 1)continue;..}while(expn 2);
d.while(!expn 2){if(expn 1)continue;..}

29.

consider the following program

main()
{
unsigned int i=10;
while(i>=0){
printf("%u",i)
i--;
}
}
how many times the loop wxecuted
a.10
b.9
c.11
d.infinite
30.

pick out the add one out

a. malloc()
b. calloc()
c. free()
d. realloc()
31.

consider the following program

main()
{
int a[5]={1,3,6,7,0};
int *b;
b=&a[2];
}
the value of b[-1] is
a. 1
b .3

c. -6
d. none
32.

Consider the following program sigment

int n,sum=1;
switch(n)
{
case 2:sum=sum+2;
case 3:sum*=2;
break;
default:sum=0;
}
If n=2, what is the value of sum
a.0
b.6
c.3
d.none
33.

identify the incorrect one

1. if(c=1)
2. if(c!=3)
3. if(a<b)then
4. if(c==1)
a. 1 only
b. 1&3
c. 3 only
d. all
34.
a. %d
b. %o
c. %x
d. %u

Teh format specified for hexa decimal is

35.

Find the output of the following program

main()
{
int x=5, *p;
p=&x;
printf("%d",++*p);
}
a.5
b.6
c.0
d.none
36.

Consider the following C code

main()
{
int i=3,x;
while(i>0)
{
x=func(i);
i--;
}
int func(int n)
{
static sum=0;
sum=sum+n;
return(sum);
}
The final value of x is
a.6
b.8
c.1
d.3

37.

int *a[5] refers to

a. array of pointers
b. pointer to an array
c. pointerto a pointer
d......
38.

which of the following statements is incorrect

a. typedef struct new{


int n1;
char n2;
} DATA;
b. typedef struct {
int n3;
char *n4;
}ICE;
c .typedef union {
int n5;
float n6;
} UDT;
d. #typedef union {
int n7;
float n8;
} TUDAT;

12/2005 - Which of the below HTML tags is correct for inserting an image?
1. <a img="">
2. <img src="">
3. <image source="">
4. <image="">
The correct answer for this month's quiz is number two. The img src tag is the correct
tag to insert images into an HTML document. Additional information about HTML
and HTML tags can be found on our HTML help page.
11/2005 - What is the maximum transfer speed of the wireless 802.11a standard?
1. 100 Mbps
2. 54 Mbps
3. 24 Mbps
4. 10 Mbps
The correct answer for this month's quiz is number two. 54 Mbps is the maximum
transfer speed of this standard. See our 802.11 standard pages for a listing of each of
the standards and their capabilities.
10/2005 - Which of the below people is credited for developing the World Wide
Web?
1. Alan Kay
2. Tim Berners-Lee
3. Jack Kilby
4. Robert Noyce
The correct answer for this month's quiz is number two. Tim Berners-Lee is credited
for developing the Internet.
9/2005 - Which of the below is not a type of printer?
1. Bubble Jet printer
2. LED printer
3. Thermal printer
4. Microwave printer

The correct answer for this month's quiz is number four. See Bubble Jet printer definition,
LED printer definition, Thermal printer definition, or Microwave printer definition for
additional information about the other printers listed in this month's poll.
8/2005 - Which year was Microsoft Windows XP released?
1. 2000
2. 2001
3. 2002
4. 2003
The correct answer for this month's quiz is number two. Microsoft Windows XP was
released on October 25, 2001. Additional history on Microsoft Windows can also be
found on our Windows history page.
7/2005 - What is another name for a motherboard?
1. CPU
2. Fatherboard
3. Main system
4. System board
The correct answer for this month's quiz is number four. A system board is another
name for a computer motherboard. See our motherboard dictionary definition for
additional information about this term as well as other common names for it.
6/2005 - Which of the below is not a type of game?
1. FPS
2. RTS
3. RPG
4. ETS
The correct answer for this month's quiz is number four, ETS is not a type of game.
However, FPS, RTS, and RPG are all types of games.
5/2005 - Which of the below is a type of memory that cannot have information
written to it?
1. DRAM
2. RAM
3. ROM
4. SRAM
The correct answer for this month's quiz is number three. ROM, which is short for Read
Only Memory, is a type of memory that cannot have information written to it. See

our DRAM, RAM, ROM, and SRAM dictionary definitions for additional information
about each of these terms.
4/2005 - Which of the below is not a type of network?
1. MAN
2. HAN
3. LPN
4. VPN
The correct answer is number three. An LPN is not a type of network. See our MAN,
HAN, and VPN dictionary definitions for additional information about each of these
terms.
3/2005 - Which below file extension is not a type of compressed file?
1. .bin
2. .rar
3. .tar
4. .z
The correct answer for this month's quiz is number three. The .tar file extension is not a
type of compressed file; it is actually a single file that contains a group of files that is
uncompressed. Additional information about each of the above file extensions as well as
hundreds of other file extensions can be found on our file extension section.
Update - We would like to thank "Marduk" and "Father Nature" for bringing to our
attention that a .tar file is not actually a compressed file. It is actually a catalogued
conglomeration of files without compression. Therefore, if you answered .tar for this
month's quiz, it would have also been correct.
Update - We would like to thank Allan for bringing to our attention that a .bin file can be
a compressed file. The bin file can preserve resource forks in Mac OS files. For
example, a disk image (compressed) file that may have a Mac resource fork can be
preserved by making it a bin file.
Update - Because of the above updates, this month's correct answer as been changed to
number three.
2/2005 - What is UNIX short for?
1. UNIplex Information eXit
2. UNIveral multIcs eXit
3. UNiversal Internet eXperts
4. None of the above

The correct answer for this month's quiz is number four. Unix is actually not acronym for
anything; Unix was first known as UNICS (UNiplexed Information and Computing
Service) and later renamed. Additional information about Unix can be found on our
Unix / Linux page, see our Unix history page for more history on Unix.
1/2005 - Which of the below is not a text editor?
1. Vim
2. Perl
3. Pico
4. Vi
The correct answer for this month's quiz is number two; Perl is a programming
language and not a text editor. See our Vim, Perl, Pico, and Vi dictionary definitions for
additional information.

1/2006 - What is the .tbz file extension?


1. Compressed text file
2. Text file
3. Audio file
4. Compressed tar file
The correct answer for this months quiz is number four. A .tbz file is a tar file that has
been compressed using bzip.

12/2004 - Which of the below does not have the ability to allow a user to
communicate with another computer?
1. Network Card
2. Serial Port
3. VGA Port
4. Modem
The correct answer for this month's quiz is number three. A network card, serial port, and
Modem all are hardware devices that allow a user to communicate with another
computer. A VGA port, however, only allows the computer to communicate with a
computer monitor.

11/2004 - Which of the below is not a type of live communication?


1. Chat
2. E-mail
3. Instant Messaging
4. IRC
The correct answer for this month's quiz is number two. Often e-mail will take several
minutes, hours, or even days to be read and/or replied to. Chat, Instant Messaging, and
IRC are all forms of live communication in most situations.
10/2004 - Which of the below is an input device?
1. Monitor
2. Printer
3. Scanner
4. Speakers
The correct answer for this month's quiz is number three. A computer scanner is one of
the many ways to input data into a computer. A monitor, printer, and speakers are all
examples of output devices.
9/2004 - Which of the below is not related to power?
1. PIO
2. Surge
3. UPS
4. VRM
The correct answer for this month's quiz is number one. Surge, UPS, and VRM are all
related to power. Where PIO is not related to power.
8/2004 - Which of the below is not a type of DVD drive?
1. DVD-RD
2. DVD-RW
3. DVD+RW
4. DVD-RAM
The correct answer for this month's quiz is number one. DVD-RW, DVD+RW, and DVDRAM are all types of DVD drives.
7/2004 - How many pins is a IDE/EIDE connector?
1. 20-pin
2. 25-pin

3. 40-pin
4. 50-pin
The correct answer for this month's quiz is number three. The IDE/EIDE connector is a
forty-pin connector and is is one of the most widely used type of connectors used on IBM
compatible computers.
6/2004 - Which of the below is related to memory?
1. PS
2. DSP
3. Flops
4. Cache
The correct answer for this month's quiz is number four. Cache is related to memory
while all other definitions are not. See the following definitions for additional
information about each of these terms: PS, DSP, Flops, and Cache.
5/2004 - Which of the following is not related to computer video.
1. DirectX
2. AC-3
3. GeForce
4. OpenGL
The correct answer for this month's quiz is number two. AC-3 is related to sound and not
computer video. See any of the following definitions for additional information about
each of these terms: DirectX, AC-3, GeForce, and OpenGL.
4/2004 - How many keys are there on the majority of the standard US keyboard
today?
1. 100
2. 102
3. 104
4. 106
The correct answer for this month's quiz is number three. Although many US computer
keyboards also have 101 keys, with the advent of the 104-key keyboard with the
Microsoft Windows keys, most computers are using a 104-key keyboard. Also see our
101-key keyboard definition and 104-key keyboard definition.
3/2004 - Which of the following is not related to chat?
1. IRC
2. IM

3. Op
4. AutoPlay
The correct answer for this month's quiz is number four. See each of the following
definitions for additional information about each of these terms. IRC, IM, Op, and
AutoPlay.
2/2004 - Which of the following is not considered a super user?
1. Admin
2. Agent
3. Op
4. Root
The correct answer for this month's quiz is number two. See each of the following
definitions for additional information about each of these terms. Admin, Agent, Op, and
Root.
1/2004 - Which of the below commands displays the time on most Linux and Unix
computers?
1. time
2. date
3. timex
4. now
The correct answer for this month's quiz is number two. The time command is used to
time a command and not display the time. To display the time and date, users must use
the date command. Users who may come from an MS-DOS environment may have
difficulties with this little difference at first.

1. Which of the following is most likely to make your computer stop working?
a. Trojan
b. Worm
c. Virus
d. Spyware
e. Adware
2. Which of the following is not a stand-alone program?
a. Trojan
b. Worm
c. Virus
d. Spyware
e. Adware

3. Which of the following is most likely to send spam emails from your computer?
a. Trojan
b. Worm
c. Virus
d. Spyware
e. Adware
4. Which of the following is lest likely to be detected with standard antivirus software?
a. Trojan
b. Worm
c. Virus
d. Spyware
e. Adware
5. Which of the following is most likely to come with other malware?
a. Trojan
b. Worm
c. Virus
d. Spyware
e. Adware
6. Which of the following is bundled with the peer-to-peer file-sharing software, Kazaa?
a. Trojan
b. Worm
c. Virus
d. Spyware
e. Adware
7. Which of the following is most likely to install a "backdoor" internet connection?
a. Trojan
b. Worm
c. Virus
d. Spyware
e. Adware
8. Which of the following is most likely to be involved in a denial-of-service attack?
a. Trojan
b. Worm
c. Virus
d. Spyware
e. Adware
9. Which of the following is the only malware publicly documented as having been
employed by the FBI to bring a suspect to trial?
a. Trojan
b. Worm
c. Virus
d. Spyware
e. Adware

10. Which of the following is most likely to steal your identity?


a. Trojan
b. Worm
c. Virus
d. Adware
e. Spyware
Answers:
1. c. virus. Trojans, worms, spyware, and adware all depend on your computer staying
up and running. They use your computer's resources to accomplish whatever their
designer intended, such as sending emails, displaying advertising, or stealing
information from your computer. Viruses, however, are usually created by vandals who
just want to damage as many computers as possible.
2. c. virus. Viruses are not stand-alone programs. Just as biological viruses must take
over the cells of their host in order to function and reproduce; computer viruses must
take over one or more files of the computer on which they are stored. Trojans, worms,
spyware, and adware are all stand-alone programs that can run without the help of
another application, though they often come bundled with other applications as a decoy,
or with other malware.
3. b. worm. Worms are stand-alone programs that are often used to send spam emails,
or emails containing viruses. Trojans often contain worms which are then installed for the
purpose of sending spam emails, but the worms are what actually send the emails.
4. e. adware. In the strictest sense, adware is rarely patently illegal or destructive, and
so antivirus software makers have traditionally avoided treating it as malware. Adware
designers are usually large advertising companies with hundreds of millions of dollars,
and they take care to insert end-user licensing agreements (EULA) that supposedly
mean that the software is installed with permission. Also, adware will not usually do
anything more destructive than show advertising. Nonetheless, adware can quickly
multiply on a computer, hogging system resources and causing a computer to slow down
or even malfunction. That's why most anti-spyware software makers target adware as
well.
5. a. Trojan. By definition, Trojans bear other malware within them, just as the mythical
wooden worse bore Greek warriors. The malware can be viruses, worms, spyware, or
adware.
6. e. adware, though d. spyware, is also correct. Kazaa's developers, Sharman
Networks, make most of their money from the advertising shown by the included
adware. The adware typically runs even when the Kazaa software is not in use.
Sharman Networks has adamantly denied that the adware that comes with Kazaa is
spyware, since, like most adware, it comes with an end-user license agreement that
says the user grants permission for the software to be installed. In reality, few Kazaa
users, until recently, were aware of just how much adware was being installed on their
machines (as much as a dozen or more). Plus, the adware does monitor your internet
usage, and so is spyware in the strictest sense.
7. b. worm. Worms most commonly install a "backdoor" internet connection in order to
send out data (for instance, spam emails or requests to remote servers) undetected.

8. b. worm. Worms, which most commonly install a "backdoor" internet connection on


the host computer, are perfect for sending out the millions of server requests needed to
achieve a denial-of-service attack. A denial-of-service attack is when a server is
maliciously sent so many hits that it is overwhelmed and cannot continue to operate.
9. a. Trojan. The Trojan "Magic Lantern" was famously used to install monitoring
software on the computer of a suspect who was later brought to trial partly on the
strength of the evidence gathered.
10. e. Spyware. Spyware is malware that collects information from your computer and
sends it to another remote machine, so by definition any software that steals your
identity is spyware. However, spyware is often installed on your computer by a Trojan, or
sent to you by another computer infected with a worm, so other kinds of malware pose
an indirect threat of identity theft as well.

1) I can open a file from a floppy disk and save it on a hard drive and vice versa.
unable
adequate
fluent
Check Answer
2) I can cut, copy and paste text both within an application and between multiple open
applications.
unable
adequate
fluent
Check Answer
3) I can create, copy, move, rename and delete file folders.
unable
adequate

fluent
Check Answer
4) I can send, open, forward and reply to email messages.
unable
adequate
fluent
Check Answer
5) I can send, receive and open email attachments.
unable
adequate
fluent
Check Answer
6) I can install software.
unable
adequate
fluent
Check Answer
7) I can use a word processing program (MS Word).
unable
adequate

fluent
Check Answer
8) I know how to reload a page in a web browser.
unable
adequate
fluent
Check Answer
9) I know how to clear the cache or temporary Internet files in a web browser.
unable
adequate
fluent
Check Answer
10) I know how to make a bookmark/favorite in a web browser.
unable
adequate
fluent
1) Saving files from one computer drive to another is an essential computer skill.
Proficiency in this skill allows you to transport your files from one computer to another.
2) Adequate knowledge of the cut, copy, and paste command is essential in web-based
courses. You will often need to copy and paste your work into email, forms or threaded
discussions.
3) Being able to create, copy, move, rename and delete file folders will help you organize
and maintain your data.

4) A good knowledge of GroupWise, KUMC's email program, is essential in completing


your assignments in web-based courses.
5) You will often be asked to send your instructor a document, such as a term paper. The
easiest way to do this is to attach the document to an email message. Again, this is an
essential skill needed for completing your assignments.
6) Occasionally, you will be asked to install or reinstall software when troubleshooting
technical problems. It is recommended that you are comfortable with this skill.
7) Adequate skills in a word processing program such as MS Word or WordPerfect are
necessary for all course work, not just web-based courses.
8) Reloading a page in a Web browser is an essential skill. Reloading a Web page will
insure that you are getting the most recent version of that document.
9) Knowing how to clear the cache in Netscape or temporary Internet files in Internet
Explorer is a helpful skill to know. Clearing the cache or temporary Internet files often
times will solve a lot of browser problems.
10) Creating a bookmark/favorite will save you time when looking for frequently visited
sites.
Q.1. what are the different types of delay associated with packet switched networks?
Ans. Processing, Transmission, Queuing, Propogation delays.
Q.2. Given a 1 mbps Ethernet link, packet size of 10 MB, propagation speed = 2x108 m/s
and distance between the two end points to be 10 km. Assume there are no routers on the
link. What is the
(a) Propagation delay = 104 / 2*108 = 50 microsec.
(b) Transmission delay = L/R = (10 mb/ 1mb ) * 8 = 80 sec.
(c) Total packet transfer delay
Insufficient data
Q.3. Given a message of size M bits, packet size P bits, L number of links, each with
bandwidth B bps and propagation delay d seconds. Write down the formula for message
transfer delay.
(m/p -1)(p/b) + (p/b)(L)+dL
Q.5.FDM and TDM are used in circuit switching.
Q.6.the physical medium used in the ether net cable that comes in to your pc is Category
5 Twisted Pair Copper Wire.
Q.7.Error checking and recovery is the responsibility of the transport layer.
Q.8. name two types of physical links with typical bandwidths and propagation delays.
Dial up (Telephone line):
Bandwidth: 56 kbps,
Propagation delay of the order of few msec.
Ethernet LAN:
Bandwidth: 10-100 mbps

Propagation delay of the order of few microsec.


Q.10.For client-server type request reply queries TCP/UDP/HTTP is the protocol that is
widely used.
Q.11. which network forwards packets according to host destination address?
a) Circuit switched networks
b) Datagram networks: Answer
c) Virtual circuit networks
d) b and c
Q.12 Arrange the following protocol layers from top to bottom.
a) Network
b) Physical
c) Application
d) Transport
e) Link
Answer: Application->Transport->Network->Link->Physical
Q.13. Classify the following as applications using TCP or UDP
a) SMTP -- TCP
b) VoIP -- UDP
c) Multimedia streaming --UDP
d) Traceroute --ICMP
Q.14 Which feature is not offered by TCP?
a) Reliable data transfer
b) Congestion control
c) Constant bit rate: Answer
d) None of the above
Q.15 Which of the following is a list of TCP service features?
a) Reliable, flow control, data may be out of order
b) Reliable, connection oriented, flow control: Answer
c) Congestion control, no hand shaking, flow control
d) Reliable, congestion control, data may be out of order
Q.16 which of the following is a list of packet switching characteristics?
a) Bandwidth divided, store and forward, good for bursty data
b) Bandwidth shared, queues at routers, different paths possible: Answer
c) Bandwidth shared ,low transmission delay, routes may change during transmission
d) Bandwidth divided, translation tables for routing, destination address field in packet
Q.17 Data transfer between two neighboring routers involves only
a) Physical layer
b) Physical layer, link layer
c) Physical layer, link layer, network layer: Answer
d) Physical layer, link layer, network layer, transport layer
Q.18 When compared to transmission delay, propagation delay is always
a) Smaller or equal never greater
b) Always smaller
c) No restrictions-may be greater or smaller: Answer
d) Greater

Q.19.which of these is true?


a) Address info is added by the transport layer
b) Each layer adds a header of its own with a checksum
c) Network layer responsible for routing and end to end delivery
d) In a layered structure underlying protocols can be changed: Answer
Q.20 Assume applications generate messages of length M bytes and each layer adds a
header of h bytes. What fraction of network bandwidth is filled with headers?
3h/(m+3h)
In few cases there exist headers for the physical layer 4h/(m+4h)

Linux vs. Windows

Additional Information:
Users who are considering making a change from Windows to Linux or Linux to
Windows commonly want to know the advantages and disadvantages of each of the
Operating Systems. Below is a chart to help illustrate the major advantages and
disadvantages of each of these Operating Systems.

Additional information about Operating Systems can also be found on our


Operating Systems page.

Answer:
Topic
Price

Ease

Linux

Windows

The majority of Linux variants are


available for free or at a much lower
price than Microsoft Windows.

Microsoft Windows can run between


$50.00 - $150.00 US dollars per each
license copy.

Although the majority Linux variants


have improved dramatically in ease of
use, Windows is still much easier to
use for new computer users.

Microsoft has made several


advancements and changes that have
made it a much easier to use
Operating System, and although
arguably it may not be the easiest
Operating System, it is still Easier
than Linux.

Reliability The majority of Linux variants and


versions are notoriously reliable and
can often run for months and years
without needing to be rebooted.

Although Microsoft Windows has


made great improvements in
reliability over the last few versions
of Windows, it still cannot match the

reliability of Linux.
Linux has a large variety of available Because of the large amount of
software programs, utilities, and
Microsoft Windows users, there is a
Software games. However, Windows has a much much larger selection of available
larger selection of available software. software programs, utilities, and
games for Windows.
Many of the available software
programs, utilities, and games
available on Linux are freeware and/or
Software
open source. Even such complex
Cost
programs such as Gimp, OpenOffice,
StarOffice, and wine are available for
free or at a low cost.

Although Windows does have


software programs, utilities, and
games for free, the majority of the
programs will cost anywhere between
$20.00 - $200.00+ US dollars per
copy.

Linux companies and hardware


manufacturers have made great
advancements in hardware support for
Linux and today Linux will support
Hardware
most hardware devices. However,
many companies still do not offer
drivers or support for their hardware in
Linux.

Because of the amount of Microsoft


Windows users and the broader driver
support, Windows has a much larger
support for hardware devices and a
good majority of hardware
manufacturers will support their
products in Microsoft Windows.

Linux is and has always been a very


secure Operating System. Although it
still can be attacked when compared to
Security
Windows, it much more secure.

Although Microsoft has made great


improvements over the years with
security on their Operating System,
their Operating System continues to
be the most vulnerable to viruses and
other attacks.

Open
Source

Many of the Linux variants and many Microsoft Windows is not open
Linux programs are open source and source and the majority of Windows
enable users to customize or modify
programs are not open source.
the code however they wish to.

Although it may be more difficult to


find users familiar with all Linux
variants, there are vast amounts of
Support
available online documentation and
help, available books, and support
available for Linux.

Microsoft Windows includes its own


help section, has vast amount of
available online documentation and
help, as well as books on Each of the
versions of Windows.