1. Do references in C++ completely compensate for Pointers everywhere.
NO
2. How the garbage collection works for java.
Latest Answer: Java uses a reference counting Algo for Garbage Collection.When a ref enters
JVM the ref count is incremented. When it leaves JVM the count is decremented.When an object
is not refernced at all (i.e) the ref count becomes zero then the object is ready ...
3. What is the difference between overriding parameters in procedures and symbolic
parameters?
Latest Answer: A symbolic is precedded by an "&" and a parm is information passed on to a
program or utility: //PGMA EXEC PROGRAM=PHASE2,PARM='T,114,PROD,'To override a parm
you would use this format: //stepname.PARM ...
4. We have to count the 3 letter,4letter and 5letter words from a file and print the number
of 3 letter,4letter We have to count the 3 letter,4letter and 5letter words from a file and
print the number of 3 letter,4letter and 5letter words. Delimiter is space,tab,hifen.Also we
should not consider the line in the file after we encounter # in that line.(ie after # we
should not consider the portion of line)
5. In file count the number of characters, number of words, number of line. Delimiter between
words is In file count the number of characters, number of words, number of line. Delimiter
between words is given as command line argument.
6. Mindtree Testing questions for experienced 11th june 2005 What is command to know the IP
and MAC address of your machine in windows platform?a) ifconfig b)Ipconfig/all c)ping d) All
the aboveMTFS, CDFS, EXT3, FAT32, and EXT2, which of the below are the windows
Latest Answer: Question: Mindtree Testing questions for experienced 11th june 2005 1.
What is command to know the IP and MAC address of your machine in windows platform?a)
ifconfig b)Ipconfig/all c)ping d) All ...
1.What is the difference between the following
a. i=i+1;
b. ++i;
ANS: ++i is a single instruction while in i=i+1, first i+1 is computed and then assigned.
2.What is the difference between the two files.
file1.c
# include………..
int i;
void main()
{
……….
}
file2.c
# include
static int i;
void main()
{
…..
}
ANS: While in this case for both the programs… the scope and lifetime of variable 'i' is
throughout the program….. the value of 'i' is not.
For eg. if 'i=2′ in the file1.c, any other program accessing this variable from outside will
still see the value of i as 2. Whereas in File2.c if the variable 'i' is accessed from any
other program its value will always be seen as 0
Reason:For static variables their values are active only within the COMPILE AREA of where it
is declared or in the program where it is declared. www.hotwalkins.com
3.What are the criterias to be considered for Searching algorithms.
ANS: The size of the list and whether it is sorted.(these two are apparently most important….
and that is the answer they expect)
4.What is the key aspect of Object Oriented Programming
ANS: DATA ABSTRACTION (I personally felt "data encapsulation"…… but apparently the former
mentioned was and is correct)
5.Is the following code an Example of Dynamic Binding Explain?
class Base
{
Public:
virtual Bool Dosomething()
——
——
——
};
class Derived1: public Base
{
Public:
Bool Dosomething();
———–
———–
———–
};
class Derived2: public Base
{
Public:
Bool Dosomething();
———–
———–
———–
};
void main()
{
Derived1 derived1;
Derived2 derived2;
::process(derived1);
::process(derived2);
}
::Process(Base& Object)
{
Object.Dosomething();
}
Ans: In the processfunction above the downcasting is done while passing parameters and in the
function body upcasting is done so object.dosomething() will be dynamic binding ( i am unable
to explain the answer in clear terms….but the line of thinking is something like that….
6.What will happen if in the above code in the base class the keyword virtual is removed?
Ans: IF virtual is removed from the function declaration. when the process function is called
it calls the Dosomething function of the Baseclass itself rather than the derived classes.
Testing of Non-Functional requirements does not involove
a) Performance tests b) Reliability tests c) usability tests d) Configuration tests
DNS is used to
a) MAP IP address to machine names b) MAP IP address to MAC address c) MAP IP address to
domain names d) None of the above
Based on risk exposure, which of the following risks would have the highest priority?
a) Risk A that has a 25% probability of a problem occuring that would cost $30,000
b) Risk B that has a 15% probability of a problem occuring that would cost $400,000
c) Risk C that has a 25% probability of a problem occuring that would cost $180,000
d) Risk D that has a 25% probability of a problem occuring that would cost $250,000
When a varaible is deleted using "my" in perl, then
a) It can be accessed only within the block it is declared
b) It can be accessed outside the block it is declared
c) It is visible in routines called from the block in which it is declared
d) It can be accessed globally across the program
what is the output of this perl statement
print join(':',split(/*/,'hi there'));
a) h:i:t:h:e:r:e
b) h:i: t:h:e:r:e
c) :h:i:t:h:e:r:e
d) h:i: :t:h:e:r:e
Which of these is reliable protocal?
a) UDP b) SNMP c) FTP d) TCP
1) There are total 15 people. 7 speaks french and 8 speaks spanish. 3 do not speak any
language. Which part of total people speaks both languages.
Ans: 1/5
2) A jogger wants to save ¼th of his jogging time. He should increase his speed by how
much %age.
Ans: 33.33 %
3) a is an integer. Dividing 89 & 125 gives remainders 4 & 6 respectively. Find a ?
Ans: 17
4) In a office work is distribute between p persons. If 1/8 members are absent then work
increased for each person.
Ans :
Section 2: Non- Verbal (10 Questoins)
1) Question based on cubes. In which fill the blank box.
2) 120, 315, 300, 345, ? ---- 390
3) 2,1, 4, 3, 6, 6, 8, 10, 10, ?, ? --- 12, 15
4) Questions based on figure rotation
5)
Section 3: Analytical Section
1) A Child is saying numbers 1, 2, 3, 4. When he says 1 Another child puts white marble in a
box.
On saying 2 he puts Blue marble and on saying 3 he puts red marble. When child says 4 other
child take out white and blue marble. Child says some no. in a sequence then questions are
based on the no. of marbles in the box. Like this
1,1,2,3,1, 4, 1,1,3,2,2,4,111…
a) Find the no. of Blue marble in the box …..2
b) Find the no. of White --------do----------- ----2
c) No. of red marbles ------- 7
2) Questions based on logical reasoning (R. S. Agrawal)
a) all pens are hens. All hens are doctor.
(I) all pens are doctor.
(II) all doctors are pen.
Ans: Only first conclusion is correct.
4. Flow Chart
What is command to know the IP and MAC address of your machine in windows platform?
a) ifconfig b)Ipconfig/all c)ping d) All the above
MTFS, CDFS, EXT3, FAT32, and EXT2, which of the below are the windows file system?
a) FAT32 and EXT3 b)EXT3 c) NTFS and FAT32 d) CDFS and EXT2
The completion and base lining of the users manual and installation instructions should be an
entry criteria into which of the following phase gate reviews.
a) Critical design review b) System test readiness review c) Ready to ship review d) Post
project review
The product quality risk from testing point of view is highest when the system under test is
a
a) Standalone b) Distributed System c) Client and server d) None of the above
Http is based on which underline protocal
a) TCP b) SNMP c) FTP d) IP
When can you say that performance of your application is high.
a) High through put low latency b) Low through put high latency c) High through put High
latency d) Low through put low latency
Which is the last/terminate state of a bug?
a) Re-open b) Defered c) Enhanced d) None of the above
Which of the following is a testing technique?
a) White box b) System testing c) unit testing d) Regression
How can you force the client to give up the dhcp lease if you have access to the client PC?
a) ipconfig/release b) ipconfig/renew c) ipconfig/delete d) ipconfig/new
thank u :)
ReplyDelete