Sei sulla pagina 1di 28

1. What is virtual constructors/destructors?

Virtual destructors: If an object (with a non-virtual destructor) is destroyed explicitly by applying the delete operator to a base-class pointer to the object, the base-class destructor function (matching the pointer type) is called on the object. There is a simple solution to this problem declare a virtual base-class destructor. This makes all derived-class destructors virtual even though they dont have the same name as the base-class destructor. Now, if the object in the hierarchy is destroyed explicitly by applying the delete operator to a base-class pointer to a derived-class object, the destructor for the appropriate class is called. Virtual constructor: Constructors cannot be virtual. Declaring a const ructor as a virtual function is a syntax error. Does c++ support multilevel and multiple inheritance? Yes. 2. Why Garbage collection? Since C++ does not provide automatic garbage collection like some other languages, smart pointers can be used for that purpose. The simplest garbage collection scheme is reference counting or reference linking, but it is quite possible to implement more sophisticated garbage collection schemes with smart pointers. 3. How to write a swap( ) function which swaps the values of the variables using bitwise operators.? Ans: Here is the swap( ) function. swap ( int *x, int *y ) { *x ^= *y ; *y ^= *x ; *x ^= *y ; } The swap( ) function uses the bitwise XOR operator and does not require any temporary variable for swapping. 4. What are the advantages of inheritance? It permits code reusability. Reusability saves time in program development. It encourages the reuse of proven and debugged high -quality software, thus reducing problem after a system becomes functional. 5. What is the difference between declaration and definition? The declaration tells the compiler that at some later point we plan to present the definition of this declaration. E.g.: void stars () //function declaration The definition contains the actual implementatio n. E.g.: void stars () // declarator { for(int j=10; j>=0; j--) //function body cout<<*; cout< function_declaration; template function_declaration; The only difference between both prototypes is the use of keyword class or typename, its use is indistinct since both expressions have exactly the same meaning and behave exactly the same way. 6. What do you mean by inline function? The idea behind inline functions is to insert the code of a called function at the point where the

function is called. If done carefully, this can improve the application's performance in exchange for increased compile time and possibly (but not always) an increase in the size of the generated binary executables. 7. What is virtual class and friend class? Friend classes are used when two or more classes are designed to work together and need access to each other's implementation in ways that the rest of the world shouldn't be allowed to have. In other words, they help keep private things private. For instance, it may be desirable for class DatabaseCursor to have more privilege to the internals of class Database than main() has. 8. What is function overloading and operator overloading? Student Resources Function overloading: C++ enables several functions of the same name to be defined, as long as these functions have different sets of parameters (at least as far as their types are concerned). This capability is called function overloading. When an overloaded function is called, the C++ compiler selects the proper function by examining the number, types and order of the arguments in the call. Function overloading is commonly used to create several functions of the same name that perform similar tasks but on different data types. Operator overloading allows existing C++ operators to be redefined so that they work on objects of user-defined classes. Overloaded operators are syntactic sugar for equivalent function calls. They form a pleasant facade that doesn't add anything fundamental to the language (but they can improve understandability and reduce maintenance costs). 9. Difference between realloc() and free()? The free subroutine frees a block of memory previously allocated by the malloc subroutine. Undefined results occur if the Pointer parameter is not a valid pointer. If the Pointer parameter is a null value, no action will occur. The realloc subroutine changes the size of the block of memory pointed to by the Pointer parameter to the number of bytes specified by the Size parameter and returns a new pointer to the block. The pointer specified by the Pointer parameter must have been created with the malloc, calloc, or realloc subroutines and not been deallocated with the free or realloc subroutines. Undefined results occur if the Pointer parameter is not a valid pointer 10. What do you mean by binding of data and functions? Encapsulation. 11. What is abstraction? Abstraction is of the process of hiding unwanted details from the user. 12. What is encapsulation? Packaging an objects variables within its methods is called encapsulation. 13. What is the difference between an object and a class? Classes and objects are separate but related concepts. Every object belongs to a class and every class contains one or more related objects. A Class is static. All of the attributes of a class are fixed before, during, and after the execution of a program. The attributes of a class don't change. The class to which an object belongs is also (usually) static. If a particular object belongs to a certain class at the time that it is created then it almost certainly will still belong to that class right up until the time that it is destroyed. An Object on the other hand has a limited lifespan. Objects are created and eventually

destroyed. Also during that lifetime, the attributes of the object may undergo significant change. 14. What is polymorphism? Explain with an example? "Poly" means "many" and "morph" means "form". Polymorphism is the ability of an object (or reference) to assume (be replaced by) or become many different forms of object. Example: function overloading, function overriding, virtual functions. Another example can be a plus + sign, used for adding two integers or for using it to concatenate two strings. 15. What do you mean by inheritance? Inheritance is the process of creating new classes, called derived classes, from existing classes or base classes. The derived class inherits all the capabilities of the base class, but can add embellishments and refinements of its own. 16. What is a scope resolution operator? A scope resolution operator (::), can be used to define the member functions of a class outside the class. 17. What are virtual functions? A virtual function allows derived classes to replace the implementation provided by the base class. The compiler makes sure the replacement is always called whenever the object in question is actually of the derived class, even if the object is accessed by a base pointer rather than a derived pointer. This allows algorithms in the base class to be replaced in the derived class, even if users don't know about the derived class. 18. What is friend function? As the name suggests, the function acts as a friend to a class. As a friend of a class, it can access its private and protected members. A friend function is not a member of the class. But it must be listed in the class definition. 19. What is the difference between class and structure? Structure: Initially (in C) a structure was used to bundle different type of data types together to perform a particular functionality. But C++ extended the structure to contain functions also. The major difference is that all declarations inside a structure are by default public. Class: Class is a successor of Structure. By default all the members inside the class are private. 20. What is public, protected, private? Public, protected and private are three access specifiers in C++. Public data members and member functions are accessible outside the class. Protected data members and member functions are only available to derived classes. Private data members and member functions cant be accessed outside the class. However there is an exception can be using friend classes. 21. What is an object? Object is a software bundle of variables and related methods. Objects have state and behavior. 22. What is a class? Class is a user-defined data type in C++. It can be created to solve a particular kind of problem. After creation the user need not know the specifics of the working of a class.

Q. When linking C or Assembly language modules with C++ modules I get undefined symbol errors at link time. It appears that none of the C or Assembly public symbols can be found. A. C++ is a strongly typed language. In order to support the language to its fullest, Turbo C++ must attach information to the symbols gene rated for function names and variables. When this is done, the symbol will no longer match the standard C style function name. In order to link correctly, the compiler must be notified that the symbol is declared in an external module without type information tacked on to the symbol. This is done by prototyping the function as type extern "C". Here is a quick example: extern "C" int normal_c_func( float, int, char ); // name not altered void cplusplus_function( int ); // name altered See related comments under Linker Errors and in the Paradox Engine question in this section. Q. Classes with static data members are getting linker errors ("undefined"). A. This code is built into Turbo C++ 1.0 but not in version 3.0. In the 1.0 compiler, static members without definitions were given a default value of 0. This default definition will no longer be made in the compiler. The programmer must now give an explicit definition for each static member. Here is a quick example: class A { static int i; }; A linker error saying that A::i is not defined will result unless the source also contains a line such as: int A::i = 1; Q. What potential problems can arise from typecasting a base class pointer into a derived class pointer so that the derived class's member func tions can be called? A. Syntactically this is allowable. There is always the possibility of a base pointer actually pointing to a base class. If this is typecast to a derived type, the method being called may not exist in the base class. Therefore, you would be grabbing the address of a function that does not exist. Q: What's the difference between the keywords STRUCT and CLASS? A: The members of a STRUCT are PUBLIC by default, while in CLASS, they default to PRIVATE. They are otherwise functionally equivalent. Q: I have declared a derived class from a base class, but I can't access any of the base class members with the derived class function. A: Derived classes DO NOT get access to private members of a base class. In order to access members of a base class, the base class members must be declared as either public or protected. If they are public, then any portion of the program can access them. If they are protected, they are accessible by the class members, friends, and any derived classes. Q: How can I use the Paradox Engine 1.0 with C++?, A: Because the Paradox Engine functions are all compiled as C functions, you will have to assure that the names of the functions do not get "mangled" by the C++ compiler. To do this you need to prototype the Engine functions as extern "C". In the pxengine.h header file insert the following code at the lines indicated. /* inserted at line # 268 */ #ifdef __cplusplus extern "C" { #endif

/* inserted at line # 732, just before the final #endif */ #ifdef __cplusplus } #endif Paradox Engine version 2.0 is "aware" of C++ and thus does not require any modifications to its header file. Q: I have a class that is derived from three base classes. Can I insure that one base class constructor will be called before all other constructors? A: If you declare the base class as a virtual base class, its constructor will be called before any non-virtual base class constructors. Otherwise the constructors are called in left-to-right order on the declaration line for the class. Q: Are the standard library I/O functions still available for use with the C++ iostreams library? A: Yes, using #include functions such as printf() and scanf() will continue to be available. However, using them in conjunction with stream oriented functions can lead to unpredictable behaviour. Q. In C++, given two variables of the same name, one local and one global, how do I access the global instance within the local scope? A. Use the scope (::) operator. int x = 10; for(int x=0; x < ::x; x++) { cout << "Loop # " << x << "\n"; // This will loop 10 times } Q. Will the following two functions be overloaded by the compiler, or will the compiler flag it as an error? Why? void test( int x, double y); & int test( int a, double b); A. The compiler will flag this as a redeclaration error because neither return types nor argument names are considered when determining unique signatures for overloading functions. Only number and type of arguments are considered. Q. If I pass a character to a function which only accepts an int, what will the compiler do? Will it flag it as an error? A. No. The compiler will promote the char to an int and use the integer representation in the function instead of the character itself. Q. I was trying to allocate an array of function pointers using the new operator but I keep getting declaration syntax errors using the following syntax: new int(*[10])(); What's wrong? A. The new operator is a unary operator and binds first to the int keyword producing th e following: (new int) (*[10])(); You need to put parentheses around the expression to produce the expected results: new (int (*[10]()); Q. What are inline functions? What are their advantages? How are they declared? A. An inline function is a function which gets textually inserted by the compiler, much like macros. The advantage is that execution time is shortened because linker overhead is minimized. They are declared by using the inline keyword when the function is

declared: inline void func(void) { cout << "printing inline function \n"; } or by including the function declaration and code body within a class: class test { tv public: void func(void) { cout << "inline function within a class. \n"} }; Q. If I don't specify either public or private sections in a class, what is the default? A. In a class, all members are private by default if neither public nor private sections are declared. Q. What does the _seg modifier do? A. Using _seg causes a pointer to become a storage place for a segment value, rather than an offset ( or a segment/offset ). For instance, if "int _seg *x" contains the value 0x40, then when you use "*x", the value pointed to will be at segment 0x40, offset 0. If you add a value to the pointer, the value is multiplied by the size of the pointer type. That new value is used as an offset, and is combined with the segment value contained in the pointer. For instance, int _seg *x; int value; x = (int _seg *)0x40; value = *(x + 20); value is assigned the value of the integer at 0x40:0x28 (Remember, 20 * sizeof(int) = 40 = 0x28).

Q. Can I statically allocate more than 64K of data in a single module? A. Yes. Far data items are now supported: ... char far array1[60000L]; char far array2[60000L]; ... For arrays larger than 64k use: char huge array3[100000L]; Q. What is a friend member function? A. Declaring a friend gives non-members of a class access to the non-public members of a class. Q. Why do I get a "Type name expected" error on my definition of a friend class in my new class? A You need to let the compiler know that the label you use for your friend class is another class. If you do not want to define your entire class, you can simply have "class xxx", where xxx is your label. Q: How can I output hex values in upper case using the iostream libraries? A: You need to set the state of the stream using setf(). For example,

#include int main(void) { cout << hex; cout << "\nNot upper-case : " << 255; cout.setf(ios::upper-case); cout << "\nUppercase : " << 255; return 0; } Q. What is the "this" pointer? A. "this" is a local variable in the body of a non -static member function. It is a pointer to the object for which the function was invoked. It cannot be used outside of a class member function body. Q. Why does a binary member function only accept a single argument? A. The first argument is defined implicitly. Q. Looking through the class libraries there are definitions in classes which look like: class test { int funct( void ) const; }; What is the const keyword doing here? A. There is a pointer to the object for which a function is called known as the 'this' pointer. By default the type of 'this' is X *const ( a constant pointer). The const keyword changes the type to const X *const ( a constant pointer to constant data ). Q: I want to use _new_handler and set_new_handler. A: Turbo C++ supports _new_handler and set_new_handler. The type of _new_handler is as follows. typedef void (*vfp)(void); vfp _new_handler; vfp set_new_handler( vfp ); Q: I would like to use C++ fstreams on a file opened in binary mode, how is this done? A: Use ios::binary as the open mode for the file: #include ifstream binfile; binfile.open("myfile.bin", ios::binary); Q: How can I get at the DOS file handle associated with my iostream? A: Using a combination of member functions fd() and rdbuf() you can get at the file handle. #include #define fstrno(s) (((s).rdbuf())->fd()) ifstream test("test.txt"); cout << "handle is " << fstrno(test) << '\n'; 1. What is the difference between procedural and object -oriented programs?a) In procedural program, programming logic follows certain procedures and the instructions are executed one after another. In OOP program, unit of p rogram is object, which is nothing but combination of data and code. b) In procedural program, data is exposed to the whole program whereas in OOPs program, it is accessible with in the object and which in turn assures the security of the code.

2. What are Encapsulation, Inheritance and Polymorphism? - Encapsulation is the mechanism that binds together code and data it manipulates and keeps both safe from outside interference and misuse. Inheritance is the process by which one object acquires the properties of another object. Polymorphism is the feature that allows one interface to be used for general class actions. 3. What is the difference between Assignment and Initialization? - Assignment can be done as many times as desired whereas initialization can be done only once. 4. What is OOPs?- Object oriented programming organizes a program around its data, i. e. , objects and a set of well defined interfaces to that data. An object-oriented program can be characterized as data controlling access to code. 5. What are Class, Constructor and Primitive data types? - Class is a template for multiple objects with similar features and it is a blue print for objects. It defines a type of object according to the data the object can hold and the operations the object can perform. Constructor is a special kind of method that determines how an object is initialized when created. Primitive data types are 8 types and they are: byte, short, int, long, float, double, boolean, char. 6. What is an Object and how do you allocate memory to it? - Object is an instance of a class and it is a software unit that combines a structured set of data with a set of operations for inspecting and manipulating that data. When an object is created using new operator, memory is allocated to it. 7. What is the difference between constructor and method?- Constructor will be automatically invoked when an object is created whereas method has to be called explicitly. 8. What are methods and how are they defined? - Methods are functions that operate on instances of classes in which they are defined. Objects can communicate with each other using methods and can call methods in other classes. Method definition has four parts. They are name of the method, type of object or primitive type the method returns, a list of parameters and the body of the method. A methods signature is a combination of the first three parts mentioned above. 9. How many ways can an argument be passed to a subroutine and explain them?- An argument can be passed in two ways. They are passing by value and passing by reference. Passing by value: This method copies the value of an argument into the formal parameter of the subroutine. Passing by reference: In this method, a reference to an argument (not the value of the argument) is passed to the parameter. 10. What is the difference between an argument and a parameter? - While defining method, variables passed in the method are called parameters. While using those methods, values passed to those variables are called arguments. 11. What are different types of access modifiers? - public: Any thing declared as public can be accessed from anywhere. private: Any thing declared as private cant be seen outside of its class. protected: Any thing declared as protected can be accessed by classes in the same package and subclasses in the other packages. default modifier : Can be accessed only to classes in the same package. 12. What are Transient and Volatile Modifiers? - Transient: The transient modifier applies to variables only and it is not stored as part of its objects Persistent state. Transient variables are not serialized. Volatile: Volatile modifier applies to variables only and it tells the compiler that the variable modified by volatile can be changed unexpectedly by other parts of the program. 13. What is method overloading and method overriding?- Method overloading: When a method in a class having the same method name with different arguments is said to be method overloading. Method overriding : When a method in a class having the same method name with same arguments is said to be method overriding. 14. What is difference between overloading and overriding? - a) In overloading, there is a relationship between methods available in the same class whereas in overriding, there is relationship between a superclass method and subclass method. b) Overloading does not block inheritance from the superclass whereas overriding blocks inheritance from the superclass. c) In overloading, separate methods share

the same name whereas in overriding, subclass method replaces the superclass. d) Overloading must have different method signatures whereas overriding must have same signature. 15. What is meant by Inheritance and what are its advantages? - Inheritance is the process of inheriting all the features from a class. The advantages of inheritance are reusability of code and accessibility of variables and methods of the super class by subclasses. 16. What is the difference between this() and super()? - this() can be used to invoke a constructor of the same class whereas super() can be used to invoke a super class constructor. 17. What is the difference between superclass and subclass? - A super class is a class that is inherited whereas sub class is a class that does the inheriting. 18. What modifiers may be used with top-level class?- public, abstract and final can be used for top-level class. 19. What are inner class and anonymous class? - Inner class : classes defined in other classes, including those defined in methods are called inner classes. An inner class can have any accessibility including private. Anonymous class : Anonymous class is a class defined inside a method without a name and is instantiated and declared in the same place and cannot have explicit constructors. 20. What is interface and its use?- Interface is similar to a class which may contain methods signature only but not bodies and it is a formal set of method and constant declarations that must be defined by the class that implements it. Interfaces are useful for: a)Declaring methods that one or more classes are expected to implement b)Capturing similarities between unrelated classes without forcing a class relationship. c)Determining an objects programming interface without revealing the actual body of the class. 21. What is an abstract class?- An abstract class is a class designed with implementation gaps for subclasses to fill in and is deliberately incomplete. 22. What is the difference between abstract class and interface? - a) All the methods declared inside an interface are abstract whereas abstract class must have at least one abstract method and others may be concrete or abstract. b) In abstract class, key word abstract must be used for the methods whereas interface we need not use that keyword for the methods. c) Abstract class must have subclasses whereas interface cant have subclasses. 23. Can you have an inner class inside a method and what variables can you access?- Yes, we can have an inner class inside a method and final variables can be accessed. 24. What is the difference between Array and ve ctor?- Array is a set of related data type and static whereas vector is a growable array of objects and dynamic. 25. What is the difference between exception and error? - The exception class defines mild error conditions that your program encounters. Exceptions can occur when trying to open the file, which does not exist, the network connection is disrupted, operands being manipulated are out of prescribed ranges, the class file you are interested in loading is missing. The error class defines serious error conditions that you should not attempt to recover from. In most cases it is advisable to let the program terminate when such an error is encountered. 26. What is the difference between process and thread? - Process is a program in execution whereas thread is a separate path of execution in a program. 27. What is multithreading and what are the methods for inter -thread communication and what is the class in which these methods are defined? Multithreading is the mechanism in which more than one thread run independent of each other within the process. wait (), notify () and notifyAll() methods can be used for inter-thread communication and these methods are in Object class. wait() : When a thread executes a call to wait() method, it surrenders the object lock and enters into a waiting state. notify() or notifyAll() : To remove a thread from the waiting state, some other thread must make a call to notify() or notifyAll() method on the same object.

Database 1. What are the components of physical database structure of Oracle database? Oracle database is comprised of three types of files. One or more datafiles, two are more redo log files, and one or more control files. 2. What are the components of logical database structure of Oracle database? There are tablespaces and database's schema objects. 3. What is a tablespace? A database is divided into Logical Storage Unit called tablespaces. A tablespace is used to grouped related logical structures together. 4. What is SYSTEM tablespace and when is it created? Every Oracle database contains a tablespace named SYSTEM, which is automatically created when the database is created. The SYSTEM tablespace always contains the data dictionary tables for the entire database. 5. Explain the relationship among database, tablespace and data file. Each databases logically divided into one or more tablespaces one or more data files are explicitly created for each tablespace.

JAVA
What is interface and its use?- Interface is similar to a class which may contain methods signature only but not bodies and it is a formal set of method and constant declarations that must be defined by the class that implements it. Interfaces are useful for: a)Declaring methods that one or more classes are expected to implement b)Capturing similarities between unrelated classes without forcing a class relationship. c)Determining an objects programming interface without revealing the actual body of the class.

What is an abstract class?- An abstract class is a class designed with implementation gaps for subclasses to fill in and is deliberately incomplete.

What is a cloneable interface and how many methods does it contain?- It is not having any method because it is a TAGGED or MARKER interface. Can you have an inner class inside a method and what variables can you access?- Yes, we can have an inner class inside a method and final variables can be accessed.

What is multithreading and what are the methods for inter-thread communication and what is the class in which these methods are defined?- Multithreading is the mechanism in which more than one thread run independent of each other within the process. wait (), notify () and notifyAll() methods can be used for inter-thread communication and these methods are in Object class. wait() : When a thread executes a call to wait() method, it surrenders the object lock and enters into a waiting state. notify() or notifyAll() : To remove a thread from the waiting state, some other thread must make a call to notify() or notifyAll() method on the same object.

Which containers use a Flow layout as their default layout? - Panel and Applet classes use the FlowLayout as their default layout.

What are wrapper classes?- Wrapper classes are classes that allow primitive types to be accessed as objects. What are Vector, Hashtable, LinkedList and Enumeration? - Vector : The Vector class provides the capability to implement a growable array of objects. Hashtable : The Hashtable class implements a Hashtable data structure. A Hashtable indexes and stores objects in a dictionary using hash codes as the objects keys. Hash codes are integer values that identify objects. LinkedList: Removing or inserting elements in the middle of an array can be done using LinkedList. A LinkedList stores each object in a separate link whereas an array stores object references in consecutive locations. Enumeration: An object that implements the Enumeration interface generates a series of elements, one at a time. It has two methods, namely hasMoreElements() and nextElement(). HasMoreElemnts() tests if this enumeration has more elements and nextElement method returns successive elements of the series. What is a stream and what are the types of Streams and classes of the Streams?- A Stream is an abstraction that either produces or consumes information. There are two types of Streams and they are: Byte Streams: Provide a convenient means for handling input and output of bytes. Character Streams: Provide a convenient means for handling input & output of characters. Byte Streams classes: Are defined by using two abstract classes, namely InputStream and OutputStream. Character Streams classes: Are defined by using two abstract classes, namely Reader and Writer.
Is it possible to communicate from an applet to servlet and how many ways and how?- Yes, there are three ways to communicate from an applet to servlet and they are: a) HTTP Communication(Text-based and object-based) b) Socket Communication c) RMI Communication

What is connection pooling?- With servlets, opening a database connection is a major bottleneck because we are creating and tearing down a new connection for every page request and the time taken to create connection will be more. Creating a connection pool is an ideal approach for a complicated servlet. With a connection pool, we can duplicate only the resources we need to duplicate rather than the entire servlet. A connection pool can also intelligently manage the size of the pool and make sure each connection remains valid. A number of connection pool packages are currently available. Some like DbConnectionBroker are freely available from Java Exchange Works by creating an object that dispenses connections and connection Ids on request. The ConnectionPool class maintains a Hastable, using Connection objects as keys and Boolean values as stored values. The Boolean value indicates whether a connection is in use or not. A program calls getConnection() method of the ConnectionPool for getting Connection object it can use; it calls returnConnection() to give the connection back to the pool. Why should we go for interservlet communication?- Servlets running together in the same server communicate with each other in several ways. The three major reasons to use interservlet communication are: a) Direct servlet manipulation - allows to gain access to the other currently loaded servlets and perform certain tasks (through the ServletContext object) b) Servlet reuse - allows the servlet to reuse the public methods of another servlet. c) Servlet collaboration - requires to communicate with each other by sharing specific information (through method invocation) Is it possible to call servlet with parameters in the URL?- Yes. You can call a servlet with parameters in the syntax as (?Param1 = xxx || m2 = yyy).

What is Servlet chaining?- Servlet chaining is a technique in which two or more servlets can cooperate in servicing a single request. In servlet chaining, one servlets output is piped to the next servlets input. This process continues until the last servlet is reached. Its output is then sent back to the client

NETWORk

1. What are the two types of transmission technology available? (i) Broadcast and (ii) point-to-point

2. What is subnet? A generic term for section of a large networks usually separated by a bridge or router. 3. Difference between the communication and transmission. Transmission is a physical movement of information and concern issues like bit polarity, synchronisation, clock etc. Communication means the meaning full exchange of information between two communication media. 4. What are the possible ways of data exchange? (i) Simplex (ii) Half-duplex (iii) Full-duplex.

5. What is SAP? Series of interface points that allow other computers to communicate with the other layers of network protocol stack. 6. What do you meant by "triple X" in Networks? The function of PAD (Packet Assembler Disassembler) is described in a document known as X.3. The standard protocol has been defined between the terminal and the PAD, called X.28; another standard protocol exists between hte PAD and the network, called X.29. Together, these three recommendations are often called "triple X" 7. What is frame relay, in which layer it comes? Frame relay is a packet switching technology. It will operate in the data link layer. 8. What is terminal emulation, in which layer it comes? Telnet is also called as terminal emulation. It belongs to application layer. 9. What is Beaconing? The process that allows a network to self-repair networks problems. The stations on the network notify the other stations on the ring when they are not receiving the transmissions. Beaconing is used in Token ring and FDDI networks. 10. What is redirector? Redirector is software that intercepts file or prints I/O requests and translates them into network requests. This comes under presentation layer. 11. What is NETBIOS and NETBEUI?

NETBIOS is a programming interface that allows I/O requests to be sent to and received from a remote computer and it hides the networking hardware from applications. NETBEUI is NetBIOS extended user interface. A transport protocol designed by microsoft and IBM for the use on small subnets. 12. What is RAID? A method for providing fault tolerance by using multiple hard disk dri ves. 13. What is passive topology? When the computers on the network simply listen and receive the signal, they are referred to as passive because they dont amplify the signal in any way. Example for passive topology - linear bus. 14. What is Brouter? Hybrid devices that combine the features of both bridges and routers. 15. What is cladding? A layer of a glass surrounding the center fiber of glass inside a fiber-optic cable. 16. What is point-to-point protocol A communications protocol used to connect computers to remote networking services including Internet service providers. 17. How Gateway is different from Routers? A gateway operates at the upper levels of the OSI model and translates information between two completely different network architectures or data formats 18. What is attenuation? The degeneration of a signal over distance on a network cable is called attenuation. 19. What is MAC address? The address for a device as it is identified at the Media Access Control (MAC) layer in the network architecture. MAC address is usually stored in ROM on the network adapter card and is unique. 20. Difference between bit rate and baud rate. Bit rate is the number of bits transmitted during one second whereas baud rate refers to the number of signal units per second that are required to represent those bits. baud rate = bit rate / N where N is no-of-bits represented by each signal shift.

21. What is Bandwidth? Every line has an upper limit and a lower limit on the frequency of signals it can carry. This limited range is called the bandwidth. 22. What are the types of Transmission media? Signals are usually transmitted over some transmission media that are broadly classified in to two categories. a) Guided Media: These are those that provide a conduit from one device to another that include twistedpair, coaxial cable and fiber-optic cable. A signal traveling along any of these media is directed and is contained by the physical limits of the medium. Twisted-pair and coaxial cable use metallic that accept and transport signals in the form of electrical current. Optical fiber is a glass or plastic cable that accepts and transports signals in the form of light. b) Unguided Media: This is the wireless media that transport electromagnetic waves without using a physical conductor. Signals are broadcast either through air. This is done through radio communication, satellite communication and cellular telephony. 23. What is Project 802? It is a project started by IEEE to set standards to enable intercommunication between equipment from a variety of manufacturers. It is a way for specifying functions of the physical layer, the data link layer and to some extent the network layer to allow for interconnectivity of major LANprotocols. It consists of the following:  802.1 is an internetworking standard for compatibility of different LANs and MANs across protocols.  802.2 Logical link control (LLC) is the upper sublayer of the data link layer which is non-architecture-specific, that is remains the same for all IEEE-defined LANs.  Media access control (MAC) is the lower sublayer of the data link layer that contains some distinct modules each carrying proprietary information specific to the LAN product being used. The modules are Ethernet LAN (802.3), Token ring LAN (802.4), Token bus LAN (802.5).  802.6 is distributed queue dual bus (DQDB) designed to be used in MANs. 24. What is Protocol Data Unit? The data unit in the LLC level is called the protocol data unit (PDU). The PDU contains of four fields a destination service access point (DSAP), a source service access point (SSAP), a control field and an information field. DSAP, SSAP are addresses used by the LLC to identify the protocol stacks on the receiving and sending machines that are generating and using the data. The control field specifies whether the PDU frame is a

information frame (I - frame) or a supervisory frame (S - frame) or a unnumbered frame (U - frame). 25. What are the different type of networking / internetworking devices? Repeater: Also called a regenerator, it is an electronic device that operates only at physical layer. It receives the signal in the network before it becomes weak, regenerates the original bit pattern and puts the refreshed copy back in to the link. Bridges: These operate both in the physical and data link layers of LANs of same type. They divide a larger network in to smaller segments. They contain logic that allow them to keep the traffic for each segment separate and thus are repeaters that relay a frame only the side of the segment containing the intended recipent and control congestion. Routers: They relay packets among multiple interconnected networks (i.e. L ANs of different type). They operate in the physical, data link and network layers. They contain software that enable them to determine which of the several possible paths is the best for a particular transmission. Gateways: They relay packets among networks that have different protocols (e.g. between a LAN and a WAN). They accept a packet formatted for one protocol and convert it to a packet formatted for another protocol before forwarding it. They operate in all seven layers of the OSI model. 26. What is ICMP? ICMP is Internet Control Message Protocol, a network layer protocol of the TCP/IP suite used by hosts and gateways to send notification of datagram problems back to the sender. It uses the echo test / reply to test whether a destination is reachable and responding. It also handles both control and error messages. 27. What are the data units at different layers of the TCP / IP protocol suite? The data unit created at the application layer is called a message, at the transport layer the data unit created is called either a segment or an user datagram, at the network layer the data unit created is called the datagram, at the data link layer the datagram is encapsulated in to a frame and finally transmitted as signals along the transmission media. 28. What is difference between ARP and RARP? The address resolution protocol (ARP) is used to associate the 32 bit IP address with the 48 bit physical address, used by a host or a router to find the physical address of another host on its network by sending a ARP query packet that includes the IP address of the receiver.

The reverse address resolution protocol (RARP) allows a host to discover its Internet address when it knows only its physical address. 29. What is the minimum and maximum length of the header in the TCP segment and IP datagram? The header should have a minimum length of 20 bytes and can have a maximum length of 60 bytes. 30. What is the range of addresses in the classes of internet addresses? Class A 0.0.0.0 - 127.255.255.255 - 191.255.255.255 - 223.255.255.255 - 239.255.255.255 - 247.255.255.255

Class B 128.0.0.0 Class C 192.0.0.0 Class D 224.0.0.0 Class E 240.0.0.0

31. What is the difference between TFTP and FTP application layer protocols? The Trivial File Transfer Protocol (TFTP) allows a local host to obtain files from a remote host but does not provide reliability or security. It uses the fundamental packet delivery services offered by UDP. The File Transfer Protocol (FTP) is the standard mechanism provided by TCP / IP for copying a file from one host to another. It uses the services offer by TCP and so is reliable and secure. It establishes two connections (virtual circuits) between the hosts, one for data transfer and another for control information. 32. What are major types of networks and explain?  Server-based network  Peer-to-peer network Peer-to-peer network, computers can act as both servers sharing resources and as clients using the resources. Server-based networks provide centralized control of network resources and rely on server computers to provide security and network administration 33. What are the important topologies for networks?  BUS topology: In this each computer is directly connected to primary network cable in a single line. Advantages: Inexpensive, easy to install, simple to understand, easy to extend.

 STAR topology: In this all computers are connected using a central hub. Advantages: Can be inexpensive, easy to install and reconfigure and easy to trouble shoot physical problems.  RING topology: In this all computers are connected in loop. Advantages: All computers have equal access to network media, installation can be simple, and signal does not degrade as much as in other topologies because each computer regenerates it. 34. What is mesh network? A network in which there are multiple network links between computers to provide multiple paths for data to travel. 35. What is difference between baseband and broadband transmission? In a baseband transmission, the entire bandwidth of the cable is consumed by a single signal. In broadband transmission, signals are sent on multiple frequencies, allowing multiple signals to be sent simultaneously. 36. Explain 5-4-3 rule? In a Ethernet network, between any two points on the network ,there can be no more than five network segments or four repeaters, and of those five segments only three of segments can be populated. 37. What MAU? In token Ring , hub is called Multistation Access Unit(MAU). 38. What is the difference between routable and non- routable protocols? Routable protocols can work with a router and can be used to build large networks. Non Routable protocols are designed to work on small, local networks and cannot be used with a router 39. Why should you care about the OSI Reference Model? It provides a framework for discussing network operations and design. 40. What is logical link control? One of two sublayers of the data link layer of OSI reference model, as defined by the IEEE 802 standard. This sublayer is responsible for maintaining the link between computers when they are sending data across the physical network connection.

41. What is virtual channel? Virtual channel is normally a connection from one source to one destination, although multicast connections are also permitted. The other name for virtual channel is virtual circuit. 42. What is virtual path? Along any transmission path from a given source to a given destination, a group of virtual circuits can be grouped together into what is called path. 43. What is packet filter? Packet filter is a standard router equipped with some extra functionality. The extra functionality allows every incoming or outgoing packet to be inspected. Packets meeting some criterion are forwarded normally. Those that fail the test are dropped. 44. What is traffic shaping? One of the main causes of congestion is that traffic is often busy. If hosts could be made to transmit at a uniform rate, congestion would be less common. Another open loop method to help manage congestion is forcing the packet to be transmitted at a more predictable rate. This is called traffic shaping. 45. What is multicast routing? Sending a message to a group is called multicasting, and its routing algorithm is called multicast routing. 46. What is region? When hierarchical routing is used, the routers are divided into what we will call regions, with each router knowing all the details about how to route packets to destinations within its own region, but knowing nothing about the internal structure of other regions. 47. What is silly window syndrome? It is a problem that can ruin TCP performance. This problem occurs when data are passed to the sending TCP entity in large blocks, but an interactive application on the receiving side reads 1 byte at a time. 48. What are Digrams and Trigrams? The most common two letter combinations are called as digrams. e.g. th, in, er, re and an. The most common three letter combinations are called as trigrams. e.g. the, ing, and, and ion. 49. Expand IDEA. IDEA stands for International Data Encryption Algorithm.

50. What is wide-mouth frog?

Wide-mouth frog is the simplest known key distribution center (KDC) authentication protocol. 51. What is Mail Gateway? It is a system that performs a protocol translation between different electronic mail delivery protocols. 52. What is IGP (Interior Gateway Protocol)? It is any routing protocol used within an autonomous system. 53. What is EGP (Exterior Gateway Protocol)? It is the protocol the routers in neighboring autonomous systems use to identify the set of networks that can be reached within or via each autonomous system. 54. What is autonomous system? It is a collection of routers under the control of a single administrative authority and that uses a common Interior Gateway Protocol. 55. What is BGP (Border Gateway Protocol)? It is a protocol used to advertise the set of networks that can be reached with in an autonomous system. BGP enables this information to be shared with the autonomous system. This is newer than EGP (Exterior Gateway Protocol). 56. What is Gateway-to-Gateway protocol? It is a protocol formerly used to exchange routing information between Internet core routers. 57. What is NVT (Network Virtual Terminal)? It is a set of rules defining a very simple virtual terminal interaction. The NVT is used in the start of a Telnet session. 58. What is a Multi-homed Host? It is a host that has a multiple network interfaces and that requires multiple IP addresses is called as a Multi-homed Host. 59. What is Kerberos? It is an authentication service developed at the Massachusetts Institute of Technology. Kerberos uses encryption to prevent intruders from discovering passwords and gaining unauthorized access to files. 60. What is OSPF? It is an Internet routing protocol that scales well, can route traffic along multiple paths, and uses knowledge of an Internet's topology to make accurate routing decisions.

61. What is Proxy ARP? It is using a router to answer ARP requests. This will be done when t he originating host believes that a destination is local, when in fact is lies beyond router. 62. What is SLIP (Serial Line Interface Protocol)? It is a very simple protocol used for transmission of IP datagrams across a serial line. 63. What is RIP (Routing Information Protocol)? It is a simple protocol used to exchange information between the routers. 64. What is source route? It is a sequence of IP addresses identifying the route a datagram must follow. A source route may optionally be included i n an IP datagram header.

OS
1. What are the basic functions of an operating system? - Operating system controls and coordinates the use of the hardware among the various applications programs for various uses. Operating system acts as resource allocator and manager. Since there are many possibly conflicting requests for resources the operating system must decide which requests are allocated resources to operating the computer system efficiently and fairly. Also operating system is control program which controls the user programs to prevent errors and improper use of the computer. It is especially concerned with the operation and control of I/O devices. 2. Why paging is used? - Paging is solution to external fragmentation problem which is to permit the logical address space of a process to be noncontiguous, thus allowing a process to be allocating physical memory wherever the latter is available. 3. While running DOS on a PC, which command would be used to duplicate the entire diskette?diskcopy 4. What resources are used when a thread created? How do they differ from those when a process is created? - When a thread is created the threads does not require any new resources to execute the thread shares the resources like memory of the process to which they belong to. The benefit of code sharing is that it allows an application to have several different threads of activity all within the same address space. Whereas if a new process creation is very heavyweight because it always requires new address space to be created and even if they share the memory then the inter process communication is expensive when compared to the communication between the threads. 5. What is virtual memory? - Virtual memory is hardware technique where the system appears to have more memory that it actually does. This is done by timesharing, the physical memory and storage parts of the memory one disk when they are not actively being used. 6. What is Throughput, Turnaround time, waiting time and Response time? Throughput number of processes that complete their execution per time unit. Turnaround time amount of time to execute a particular process. Waiting time amount of time a process has been waiting in the ready queue. Response time amount of time it takes from when a request was submitted until the first response is produced, not output (for time-sharing environment). 7. What is the state of the processor, when a process is waiting for some event to occur? - Waiting state

8. What is the important aspect of a real -time system or Mission Critical Systems? - A real time operating system has well defined fixed time constraints. Process must be done within the defined constraints or the system will fail. An example is the operating system for a flight control computer or an advanced jet airplane. Often used as a control device in a dedicated application such as controlling scientific experiments, medical imaging systems, industrial control systems, and some display systems. Real-Time systems may be either hard or soft real-time. Hard real-time: Secondary storage limited or absent, data stored in short term memory, or read-only memory (ROM), Conflicts with time-sharing systems, not supported by general-purpose operating systems. Soft real-time: Limited utility in industrial control of robotics, Useful in applications (multimedia, virtual reality) requiring advanced operating-system features. 9. What is the difference between Hard and Soft real -time systems? - A hard real-time system guarantees that critical tasks complete on time. This goal requires that all delays in the system be bounded from the retrieval of the stored data to the time that it takes the operating system to finish any request made of it. A soft real time system where a critical real-time task gets priority over other tasks and retains that priority until it completes. As in hard real time systems kernel delays need to be bounded 10. What is the cause of thrashing? How does the system de tect thrashing? Once it detects thrashing, what can the system do to eliminate this problem? - Thrashing is caused by under allocation of the minimum number of pages required by a process, forcing it to continuously page fault. The system can detect thrashing by evaluating the level of CPU utilization as compared to the level of multiprogramming. It can be eliminated by reducing the level of multiprogramming. 11. What is multi tasking, multi programming, multi threading? - Multi programming: Multiprogramming is the technique of running several programs at a time using timesharing. It allows a computer to do several things at the same time. Multiprogramming creates logical parallelism. The concept of multiprogramming is that the operating system keeps several jobs in memory simultaneously. The operating system selects a job from the job pool and starts executing a job, when that job needs to wait for any i/o operations the CPU is switched to another job. So the main idea here is that the CPU is never idle.Multi tasking: Multitasking is the logical extension of multiprogramming .The concept of multitasking is quite similar to multiprogramming but difference is that the switching between jobs occurs so frequently that the users can interact with each program while it is running. This concept is also known as time-sharing systems. A time-shared operating system uses CPU scheduling and multiprogramming to provide each user with a small portion of time-shared system. Multi threading: An application typically is implemented as a separate process with several threads of control. In some situations a single application may be required to perform several similar tasks for example a web server accepts client requests for web pages, images, sound, and so forth. A busy web server may have several of clients concurrently accessing it. If the web server ran as a traditional single-threaded process, it would be able to service only one client at a time. The amount of time that a client might have to wait for its request to be serviced could be enormous. So it is efficient to have one process that contains multiple threads to serve the same purpose. This approach would multithread the web-server process, the server would create a separate thread that would listen for client requests when a request was made rather than creating another process it would create another thread to service the request. To get the advantages like responsiveness, Resource sharing economy and utilization of multiprocessor architectures multithreading concept can be used. 12. What is hard disk and what is its purpose? - Hard disk is the secondary storage device, which holds the data in bulk, and it holds the data on the magnetic medium of the disk.Hard disks have a hard platter that holds the magnetic medium, the magnetic medium can be easily erased and rewritten, and a typical desktop machine

will have a hard disk with a capacity of between 10 and 40 gigabytes. Data is stored onto the disk in the form of files. 13. What is fragmentation? Different types of fragmentation? - Fragmentation occurs in a dynamic memory allocation system when many of the free blocks are too small to satisfy any request. External Fragmentation : External Fragmentation happens when a dynamic memory allocation algorithm allocates some memory and a small piece is left over that cannot be effectively used. If too much external fragmentation occurs, the amount of usable memory is drastically reduced. Total memory space exists to satisfy a request, but it is not contiguous. Internal Fragmentation: Internal fragmentation is the space wasted inside of allocated memory blocks because of restriction on the allowed sizes of allocated blocks. Allocated memory may be slightly larger than requested memory; this size difference is memory internal to a partition, but not being used 14. What is DRAM? In which form does it store data? - DRAM is not the best, but its cheap, does the job, and is available almost everywhere you look. DRAM data resides in a cell made of a capacitor and a transistor. The capacitor tends to lose data unless its recharged every couple of milliseconds, and this recharging tends to slow down the performance of DRAM compared to speedier RAM types. 15. What is Dispatcher? - Dispatcher module gives control of the CPU to the process selected by the short-term scheduler; this involves: Switching context, Switching to user mode, Jumping to the proper location in the user program to restart that program, dispatch latency time it takes for the dispatcher to stop one process and start another running. 16. What is CPU Scheduler? - Selects from among the processes in memory that are ready to execute, and allocates the CPU to one of them. CPU scheduling decisions may take place when a process: 1.Switches from running to waiting state. 2.Switches from running to ready state. 3.Switches from waiting to ready.4.Terminates. Scheduling under 1 and 4 is non -preemptive. All other scheduling is preemptive. 17. What is Context Switch? - Switching the CPU to another process requires saving the state of the old process and loading the saved state for the new process. This task is known as a context switch. Context-switch time is pure overhead, because the system does no useful work while switching. Its speed varies from machine to machine, depending on the memory speed, the number of registers which must be copied, the existed of special instructions(such as a single instruction to load or store all registers). 18. What is cache memory? - Cache memory is random access memory (RAM) that a computer microprocessor can access more quickly than it can access regular RAM. As the microprocessor processes data, it looks first in the cache memory and if it finds the data there (from a previous reading of data), it does not have to do the more time-consuming reading of data from larger memory. 19. What is a Safe State and what is its use in deadlock avoidance? - When a process requests an available resource, system must decide if immediate allocation leaves the system in a safe state. System is in safe state if there exists a safe sequence of all processes. Deadlock Avoidance: ensure that a system will never enter an unsafe state. 20. What is a Real-Time System? - A real time process is a process that must respond to the events within a certain time period. A real time operating system is an operating system that can run real time processes successfully

1. A man starts his walking at 3PM from point A, he walks at the rate of 4km/hr in plains and 3km/hr in hills to reach the point B. During his return journey he walks at the rate of 6km/hr in hills and 4km/hr in plains and reaches the point A at 9PM.What is the distance between A and B?

Ans: 12km Solution: T1+T2=6 T1-time for forward journey, T2-time for return journey D1+D2=forward /return distance D1-distance in plains D2-distance in hills D1/4 +D2/3=T1 (forward time) D1/4 +D2/6=T2 (return time) Adding we will get D1+D2=12 km 2. A boy asks his father, " what is the age of grand father?". Father replied " He is x years old in x^2 years", and also said, "we are talking about 20th century". what is the year of birth of grand father? Ans: 1892 3. A boy travels in a scooter after covering 2/3rd of the distance the wheel got punctured he covered the remaining distance by walk. Walking time is twice that of the time the boys riding time. How many times the riding speed as that of the walking speed? Ans: 4 times. 4. In a Knockout tournament 51 teams are participated, every team thrown out of the tournament if they lost twice. How many matches to be held to choose the winner? Ans: 101 matches 5. A man sold 2 pens. Initial cost of each pen was Rs. 12. If he sell it together one at 25% profit and another 20% loss. Find the amount of loss or gain, if he sells them separately. Ans: 60 Paise gain 6. Find the 3 digit no. whose last digit is the square root of the first digit and second digit is the sum of the other two digits. Ans: 462 7. Meera was playing with her brother using 55 blocks. She gets bored playing and starts arranging the blocks such that the no. of blocks in each row is one less than that in the lower row. Find how many were there in the bottom most row? Ans: 10 8. Two people are playing with a pair of dies. Instead of numbers, the dies have different colors on their sides. The first person wins if the same color appears on both the dies and the second person wins if the colors are different. The odds of their winning are equal. If the first dice has 5 red sides and 1 blue side, find the color(s) on the second one. Ans: 3 Red, 3 Blue 9. A person travels in a car with uniform speed. He observes the milestone, which has 2 digits. After one hour he observes another milestone with same digits reversed. After another hour he observes another milestone withsame 2 digits separated by 0. Find the speed of the car?

Ans : 45 10. Three persons A, B &C went for a robbery in different directions and they theft one horse, one mule and one camel. They were caught by the police and when interrogated gave the following statements A: B has stolen the horse B: I didn't rob anything. C: both A & B are false and B has stolen the mule. The person who has stolen the horse always tell the truth and The person who has stolen the camel always tell the lie. Find who has stolen which animal? Ans: A- camel B- mule C- horse 11. One quarter of the time till now from midnight and half of the time remaining from now up to midnight addsto the present time. What is the present time? Ans: 9:36AM 12. After world war II three departments did as follows First department gave some tanks to 2nd &3rd departments equal to the number they are having. Then 2nd department gave some tanks to 1st & 3rd departments equal to the number they are having. Then 3rd department gave some tanks to 2nd &1st departments equal to the number they are having. Then each department has 24 tanks. Find the initial number of tanks of each department? Ans : A-39 B-21 C-12 13. A, B, C, D&E are having their birthdays on consecutive days of the week not necessarily in the same order.A 's birthday comes before G's as many days as B's birthday comes after E's. D is older than E by 2 days. This time G's birthday came on Wednesday. Then find the day of each of their birthdays? Ans: Birthday Birthday Birthday Birthday Birthday

of of of of of

D on SUNDAY B on MONDAY E on TUESDAY G on WEDNESDAY A on THURSDAY

14. A girl 'A' told to her friend about the size and color of a snake she has seen in the beach. It is one of the colors brown/black/green and one of the sizes 35/45/55.

If it were not green or if it were not of length 35 it is 55. If it were not black or if it were not of length 45 it is 55. If it were not black or if it were not of length 35 it is 55. a) What is the color of the snake? b) What is the length of the snake? Ans: a) brown b) 55 15. There are 2 persons each having same amount of marbles in the beginning. after that 1 person gain 20 more from second person n he eventually lose two third of it during the play n the second person now have 4 times marble of what 1st person is having now. find out how much marble did each had in the beginning. Ans - 100 each 16. A lady was out for shopping. she spent half of her money in buying A and gave 1 dollar to bagger. fathershe spent half of her remaining money and gave 2 dollar to charity. further she spent half of remaining money n gave 3 dollar to some children. now she has left with 1 dollar. how much she had in the beginning? Ans: $42 17. There are certain diamonds in a shop. 1 thief stole half of diamonds and 2 more. 2 thief stole half of remaining and 2 more 3. same as above 4 same as above. 5 came nothing was left for that. how many diamonds was there??? Ans: 60 diamonds 18. There are three friends A B C. 1. Either A or B is oldest 2. Either C is oldest or A is youngest. Who is Youngest and who is Oldest? Ans: A is youngest n B is oldest. 19. Father says my son is five times older than my daughter. my wife is 5 times older that my son. I am twice old from my wife and altogether (sum of our ages) is equal to my mother 's age and she is celebrating her 81 birthday. so what is my son's age?

Ans: 5 years. 20.

Fodder, Wheat and Rice often eat dinner out.

a) each orders either coffee or tea after dinner. b) if fodder orders coffee, then Wheat orders the drink that Rice orders c) if Wheat orders coffee, then fodder orders the drink that Rice does not order d) if Rice orders tea, then fodder orders the drink that Wheat orders

which person/persons always orders the same drink after dinner ?

Ans: Fodder
21. We are given 100 pieces of a puzzle. If fixing two components together is counted as 1 move ( a component can be one piece or an already fixed set of pieces), how many moves do we need to fix the entire puzzle. Ans: 99 22. Two guys work at some speed...After some time one guy realizes he has done only half of the other guy completed which is equal to half of what is left ! So how much faster than the other is this guy supposed to do to finish with the first... Ans: one and half times or 3/2 23. There is a square cabbage patch. He told his sister that i have a larger patch than last year and hence 211 more cabbages this year. Then how many cabbages I have this year.? Ans:106*106=11236 24. There are three guesses on the color of a mule 1 says: its not black 2 says: its brown or grey 3 says: its brown At least one of them is wrong and one of them is true.....Then whats the color of mule? Ans: Grey

25. There are two containers on a table. A and B . A is half full of wine, while B, which is twice A's size, is one quarter full of wine . Both containers are filled with water and the contents are poured into a third container C. What portion of container C's mixture is wine ? Ans:33.33% 26. A man was on his way to a marriage in a car with a constant speed. After 2 hours one of the tier is punctured and it took 10 minutes to replace it. After that they traveled with a speed of 30 miles/hr and reached the marriage 30 minutes late to the scheduled time. The driver told that they would be late by 15 minutes only if the 10 minutes was not waste. Find the distance between the two towns? Ans: 120 miles 27. Farmer Jones sold a pair of cows for Rs. 210 , On one he made a profit of ten percent and on the other he lost ten percent. Although he made a profit of five percent. How many did each cow originally cost him? Ans:150,50 28. I spent one-sixth of my age as a boy and one-12th in youth, remarked the boss "spent one-seventh and five years in matrimony". My son born just after that period was elected as a governor 4 years back when he was half of my present age. What is the age of the boss? Ans: 84 29. A girl had several dollars with her. she went out for shopping and spent half of them in shopping mall, being generous she had given 1 dollar to the beggar. After that she went for lunch and spent the half of the remaining and gave 2 dollars as tip to the waiter. Then she went to watch a movie and spent the half of remaining dollars and gave autorikshaw-wala 3 dollars. This left her with only 1 dollar. How many dollars did she had with her at the beginning. Ans:$42. 30. A bargain hunter bought some plates for $ 1.30 from a sale on Saturday, where price 2cents was marked off at each article .On Monday she went to return them at regular prices, and bought some cups and saucers from that much amount of money only. The normal price of plate were equal to the price of 'one cup and one saucer'. In total she bought 16 items more than previous. saucers were only of 3 cents hence she brought 10 saucers more than the cups, How many cups and saucers she bought and at what price? Ans: 8,18 Price: 12,3. 31. Mr. T has a wrong weighing pan. One arm is lengthier than other.1 kilogram on left balances 8 melons on right.1 kilogram on right balances 2 melons on left. If all melons are equal in weight, what is the weight of a single melon? Ans:200 gms 32. A card board of 34 * 14 has to be attached to a wooden box and a total of 35 pins are to be used on the each side of the cardbox. Find the total number of pins used . Ans: 210 33. Last Year my cousin came to my place and we played a game where the loosing one has to give one chocolate to the person who won the game .At the end of the vacation, i.e. the day my cousin was leaving she counted number of games that i won an she won. At last she gave me a total of 8 chocolates even though she won about 12 games. Find the number of games that we played.

Ans: 20 34. Here is a five digit number. The fifth digit is one fourth of the third digit and one half of the fourth digit. Third digit is one half of the first digit. second digit is 5 more than the fifth digit. What is that 5 digit no.? Ans: 86421 35. A boy goes to school from his house. On one fourth of his way to school, he crosses a machinery station. And on one third of his way to school, he crosses a Railway station. He crossed the machinery station at 7:30 and he crosses the Railway station at 7:35. when does he leave the house & when does he reach the school ? (5M) Ans: 7:15 - 8:15 36. Four persons A,B,C,D were there. All were of different weights. All Four gave a statement. Among the four statements only the person who is lightest in weight of all others gave a true statement. A Says : B is heavier than D. B Says : A is heavier than C. C Says : I am heavier than D. D Says : C is heavier than B. Ans: ACDB. 37. A man was traveling to a place 30 miles away from starting point. he was speeding at 60 miles/hr. but when he came back, his car got breakdown and half an hour was wasted in repairing that. altogether he took 1 hr for return journey. Find the avg. speed of the whole journey. Ans:60 miles/hour.

Potrebbero piacerti anche