Вы находитесь на странице: 1из 4

Oasis Technologies Pvt.

Ltd SAMPLE QUESTIONS


The Question Paper consists of three sections: Section A: Analog and Digital electronics Section B: C and OS Section C: Reasoning

Section A: Analog and Digital electronics (sample questions)


1) The diffusion potential across a PN junction a) Decreases with increasing doping concentration b) Increases with decreasing band gap c) Does not depend on doping concentrations d) Increases with increase in doping concentrations 2) Superposition Theorem is based on the concept of a. Reciprocity b. Duality c. Non linearity d. Linearity 3) Which of the following properties of the opamp permits voltage gain down to zero frequency? a. Feedback b. Direct Coupling c. Capacitive coupling d. High Open loop Gain 4) The minimum number of MOS transistors required to make a dynamic RAM cell is. a) 1 b) 2 c) 3 d) 4 5) A 12 bit ADC is operating with a 1 usec clock period 7 the total conversion time is seen to be 14 usec. A ADC must be the e. Flash type f. Counting Type g. Integrating Type h. Successive Approx. type Copyright 2005 Oasis Technologies Pvt. Ltd. www.oasistech.co.in

Oasis Technologies Pvt. Ltd Section B: C and OS


1) Which of the following is the correct code for strcpy, that is used to copy the contents from src to d```st?

a) strcpy (char *dst,char *src) { while (*src) *dst++ = *src++; } c) strcpy (char *dst,char *src) { while(*src) { *dst = *src; dst++; src++; }}

b) strcpy (char *dst,char *src) { while(*dst++ = *src++) }

d) strcpy(char *dst, char *src) { while(*++dst = *++src); }

2) main()

{
struct kk { int x=5; char name[ ]= Computer; }; struct kk *s = malloc(sizeof(struct kk)); printf(%d,s->x); printf(%s,s->name); } The Output will be a) 8Computer b) Compiler Error c) None 3) main() { int i= -1, j= -1, k=0, l=2, m; m= i++ && j++ && k++|| l++; printf("%d %d %d %d %d", i, j, k, l, m); } The output will be a) 0 0 1 3 1 b) -1 -1 0 2 0 c) 0 0 1 3 1 d) None of the above Copyright 2005 Oasis Technologies Pvt. Ltd. www.oasistech.co.in

Oasis Technologies Pvt. Ltd

4) Which of the following scheduling algorithms is non-preemptive? a. First-come-first-served scheduling b. Shortest-job-first scheduling c. Priority scheduling d. Round-Robin scheduling 5) The main disadvantage of threads is that a. They require large amounts of memory b. Writing of program requires very careful design. c. They consume processor time d. They are an incomplete solution

Section C: Reasoning
1) N can get a message to which of the following spies by using exactly one intermediate contact? O L P a) 1 only b) 3 only c) 1 and 3 only d) 2 and 3 only 2) Find out the missing numbers: 3 a) 63 15 ? 35 b) 69 9 143 c) 77 d) 81

J, L, M, N, O, P are the members of a spy network. For the security reasons, only certain spies are able to contact other spies. The only contacts allowed are: J can contact both L and N. L, M and P can contact O. N can contact M. O can contact both L and N. P can be contacted by M. A spy can receive a message from any spy who can contact him and, in turn, relay the message to any spy is able to contact.

Copyright 2005 Oasis Technologies Pvt. Ltd. www.oasistech.co.in

Oasis Technologies Pvt. Ltd


Which of the following spies can not be contacted by any other spy in the network? a) J b) M c) N d) O

N can get a message to which of the following spies by using exactly one intermediate contact? O L P a) 1 only b) 3 only c) 1 and 3 only d) 2 and 3 only How can O send a message to M? a) O can contact M directly. b) O can send message to M via J. c) O can send message to M via L. d) O can send message to M via N. If, for security reasons, O cannot be contacted, which of the following messages can be sent, either directly or with an intermediary? a) J to P b) L to M c) L to N d) M to L

Copyright 2005 Oasis Technologies Pvt. Ltd. www.oasistech.co.in

Вам также может понравиться