Wednesday, December 29

Mindtree Placement Papers - Mindtree Model Paper - Mindtree Papers - Mindtree Campus Interview Papers - Mindtree Interview Questions Paper - Mindtree Placement Paper 2010 - Freshers Placement Paper

1. Do references in C++ completely compensate for Pointers everywhere.

NO

 

2. How the garbage collection works for java.

Latest Answer: Java uses a reference counting Algo for Garbage Collection.When a ref enters

JVM the ref count is incremented. When it leaves JVM the count is decremented.When an object

is not refernced at all (i.e) the ref count becomes zero then the object is ready ...

 

3. What is the difference between overriding parameters in procedures and symbolic

parameters?

Latest Answer: A symbolic is precedded by an "&" and a parm is information passed on to a

program or utility:         //PGMA  EXEC PROGRAM=PHASE2,PARM='T,114,PROD,'To override a parm

you would use this format: //stepname.PARM ...

 

4. We have to count the 3 letter,4letter and 5letter words from a file and print the number

of 3 letter,4letter We have to count the 3 letter,4letter and 5letter words from a file and

print the number of 3 letter,4letter and 5letter words. Delimiter is space,tab,hifen.Also we

should not consider the line in the file after we encounter # in that line.(ie after # we

should not consider the portion of line)

 

5. In file count the number of characters, number of words, number of line. Delimiter between

words is In file count the number of characters, number of words, number of line. Delimiter

between words is given as command line argument.

 

6. Mindtree Testing questions for experienced 11th june 2005 What is command to know the IP

and MAC address of your machine in windows platform?a) ifconfig b)Ipconfig/all c)ping d) All

the aboveMTFS, CDFS, EXT3, FAT32, and EXT2, which of the below are the windows

Latest Answer: Question: Mindtree Testing questions for experienced 11th june 2005  1.       

What is command to know the IP and MAC address of your machine in windows platform?a)

ifconfig b)Ipconfig/all c)ping d) All ...

 

1.What is the difference between the following

a. i=i+1;

b. ++i;

 

ANS: ++i is a single instruction while in i=i+1, first i+1 is computed and then assigned.

 

2.What is the difference between the two files.

 

file1.c

# include………..

int i;

void main()

{

……….

}

 

file2.c

# include

static int i;

void main()

{

…..

}

 

ANS: While in this case for both the programs… the scope and lifetime of variable 'i' is

throughout the program….. the value of 'i' is not.

 

For eg. if 'i=2′ in the file1.c, any other program accessing this variable from outside will

still see the value of i as 2. Whereas in File2.c if the variable 'i' is accessed from any

other program its value will always be seen as 0

 

Reason:For static variables their values are active only within the COMPILE AREA of where it

is declared or in the program where it is declared. www.hotwalkins.com

 

3.What are the criterias to be considered for Searching algorithms.

 

ANS: The size of the list and whether it is sorted.(these two are apparently most important….

and that is the answer they expect)

 

4.What is the key aspect of Object Oriented Programming

 

ANS: DATA ABSTRACTION (I personally felt "data encapsulation"…… but apparently the former

mentioned was and is correct)

 

5.Is the following code an Example of Dynamic Binding Explain?

class Base

{

Public:

virtual Bool Dosomething()

——

——

——

};

 

class Derived1: public Base

{

Public:

Bool Dosomething();

———–

———–

———–

};

 

class Derived2: public Base

{

Public:

Bool Dosomething();

———–

———–

———–

};

 

void main()

{

Derived1 derived1;

Derived2 derived2;

::process(derived1);

::process(derived2);

}

 

::Process(Base& Object)

{

Object.Dosomething();

}

 

Ans: In the processfunction above the downcasting is done while passing parameters and in the

function body upcasting is done so object.dosomething() will be dynamic binding ( i am unable

to explain the answer in clear terms….but the line of thinking is something like that….

 

6.What will happen if in the above code in the base class the keyword virtual is removed?

 

Ans: IF virtual is removed from the function declaration. when the process function is called

it calls the Dosomething function of the Baseclass itself rather than the derived classes.

 

Testing of Non-Functional requirements does not involove

a) Performance tests b) Reliability tests c) usability tests d) Configuration tests

 

DNS is used to

a) MAP IP address to machine names b) MAP IP address to MAC address c) MAP IP address to

domain names d) None of the above

 

Based on risk exposure, which of the following risks would have the highest priority?

a) Risk A that has a 25% probability of a problem occuring that would cost $30,000

b) Risk B that has a 15% probability of a problem occuring that would cost $400,000

c) Risk C that has a 25% probability of a problem occuring that would cost $180,000

d) Risk D that has a 25% probability of a problem occuring that would cost $250,000

 

When a varaible is deleted using "my" in perl, then

a) It can be accessed only within the block it is declared

b) It can be accessed outside the block it is declared

c) It is visible in routines called from the block in which it is declared

d) It can be accessed globally across the program

 

what is the output of this perl statement

print join(':',split(/*/,'hi there'));

a) h:i:t:h:e:r:e

b) h:i: t:h:e:r:e

c) :h:i:t:h:e:r:e

d) h:i: :t:h:e:r:e

 

Which of these is reliable protocal?

a) UDP b) SNMP c) FTP d) TCP

 

1) There are total 15 people. 7 speaks french and 8 speaks spanish. 3 do not speak any

language. Which part of total people speaks both languages.

Ans: 1/5

 

2) A jogger wants to save ¼th of his jogging time. He should increase his speed by how

much %age.

Ans: 33.33 %

 

3) a is an integer. Dividing 89 & 125 gives remainders 4 & 6 respectively. Find a ?

Ans: 17

 

4) In a office work is distribute between p persons. If 1/8 members are absent then work

increased for each person.

Ans :

 

Section 2: Non- Verbal (10 Questoins)

 

1) Question based on cubes. In which fill the blank box.

2) 120, 315, 300, 345, ? ---- 390

3) 2,1, 4, 3, 6, 6, 8, 10, 10, ?, ? --- 12, 15

4) Questions based on figure rotation

5)

 

Section 3: Analytical Section

 

1) A Child is saying numbers 1, 2, 3, 4. When he says 1 Another child puts white marble in a

box.

On saying 2 he puts Blue marble and on saying 3 he puts red marble. When child says 4 other

child take out white and blue marble. Child says some no. in a sequence then questions are

based on the no. of marbles in the box. Like this

1,1,2,3,1, 4, 1,1,3,2,2,4,111…

 

a) Find the no. of Blue marble in the box …..2

b) Find the no. of White --------do----------- ----2

c) No. of red marbles ------- 7

 

2) Questions based on logical reasoning (R. S. Agrawal)

a) all pens are hens. All hens are doctor.

(I) all pens are doctor.

(II) all doctors are pen.

Ans: Only first conclusion is correct.

 

4. Flow Chart

 

 

 

What is command to know the IP and MAC address of your machine in windows platform?

a) ifconfig b)Ipconfig/all c)ping d) All the above

 

MTFS, CDFS, EXT3, FAT32, and EXT2, which of the below are the windows file system?

a) FAT32 and EXT3 b)EXT3 c) NTFS and FAT32 d) CDFS and EXT2

 

The completion and base lining of the users manual and installation instructions should be an

entry criteria into which of the following phase gate reviews.

a) Critical design review b) System test readiness review c) Ready to ship review d) Post

project review

 

The product quality risk from testing point of view is highest when the system under test is

a

a) Standalone b) Distributed System c) Client and server d) None of the above

 

Http is based on which underline protocal

a) TCP b) SNMP c) FTP d) IP

 

When can you say that performance of your application is high.

a) High through put low latency b) Low through put high latency c) High through put High

latency d) Low through put low latency

 

Which is the last/terminate state of a bug?

a) Re-open b) Defered c) Enhanced d) None of the above

 

Which of the following is a testing technique?

a) White box b) System testing c) unit testing d) Regression

 

How can you force the client to give up the dhcp lease if you have access to the client PC?

a) ipconfig/release b) ipconfig/renew c) ipconfig/delete d) ipconfig/new

1 comment: