      ## Print this Job Post ## Written Test

At the moment we have just one paper of Hughes Software. The paper is technical based with a question or two of probabilty
thrown in. Subjects stressed are Operating Systems, Data Structures, C Programming, Communications etc. We have given a
rough idea on the kind of paper that you can expect. We are not providing you with the inputs of the interview for this company but
we hope to add it very shortly.

PAPER
1. Find the probability of getting a number with 7 between 100 and 999 (both inclusive).

2. There are 10 items in a box, out of which 3 are defective.2 balls are taken one after the other.
What is the probability that both of them are defective?

3. Context free grammar is accepted by
a) finite automata
b) push down automata
c) two way bounded automata
d) both b and c

4. Which is not a memory management scheme?
a) buddy system
b) swapping
c) monitors
d) paging
Ans : c

5. missing question

6. Question on NAND gates implementation.

7. Definition of Context Sensitive Grammar

8. An identifier can start with a letter followed by any number of letter or digits .

9. With the following configuration:8MB total memory, 256kb cache , 4kb is block size.Using direct mapping, how many different physical memory blocks can be mapped on to the cache.
a) 64
b) 256
c) 128
d)28

10. CSMA/CD is used in
a) token ring
b) FDDI
c) ethernet

11. In TCP/IP header, checksum contains
a) sum of all the words
b) ones complement of the data
c) ones complement of the sum of all the words
d) ones complement of the sum in ones complement

12. What is the maximum number of acknowledgements for a 4 bit sequence number in a sliding window protocol.

13. Which is a good way of representing varaibles in recursion
a) local variables
b) static varaibles
c) global variables

14. Given the following c program
func()
{s
tatic int i = 10;
printf("%d",i);
i++;
}
What is the value of i if the function is called twice ?

15. Given the following c program
func(int *i, int*j)
{*i=*i * *i;
*j=*j* *j;
}
main()
{ int i = 5, j = 2;
func(&i,&j);
printf("%d %d", i, j);}

16. There was a circuit given using three nand gates with two inputs and one output.
Find the output.
a) OR
b) AND
c) XOR
d) NOT
Ans. (a)

17. Suggest a sorting algorithm which is efficient (in worst case) to 10 values
a) Binary tree
b) Selection
c) Bubble
d) Any of the above

18. What is the number of comparisons in the worst case to merge two sorted lists containing n elements each.
a) 2n
b) 2n1
c) 2n+1
d) 2n2

19.Iintegrated check value(ICV) are used as:
Ans. The client computes the ICV and then compares it with the senders value.

21. If a binary tree is constructed using nodes with two pointers each,
how many null pointers does a tree with N nodes have
a) n1
b) n
c) n+1
d) Depends on the number of edges

22. Which of following statements about heap is wrong
a) An n element heap has height log n(base of log is 2)
b) Smallest element of heap is always a leaf
c) A array in reverse sorted order is a heap
d) A heap can't contain any element more than once

23. When applets are downloaded from web sites , a byte verifier performs _________?
Ans. Status check.

24. For the following C program
void insert(key,r)
typekey key,data array r;
{extern int n;
if(n>=max) /*error table if full */
else r[n++].k=key;
}
This on executing, enables a
a) Basic sequential search
b) Binary search
c) Interpolation search
d) None

25. Find the outpur of the following C program
void f(char *p)
{p=(char *) malloc(6);
strcpy(p,"hello");
}
void main( )
{char *P="bye";
f(p);
printf("%s',p);
}

26. Time taken to access cache is 100ns and to access memory is 1000ns. Hit ratio given. Find the average access time

27. Path testing is
a) Black box testing strategy
b) White box testing strategy
c) An installation .........
d) An enviornment

28. X:verification' asks are we building the right product
Y:validation' asks are we building the product right

29. Which one of the following can't be used to find an internet address given the domain name
a) /etc/host
b) NIS yellow pages
c) DNS
d) ARP

30. Flow control is necessary for the transport protocol layer due to the following reasons
c) Packets out of sequence
d) None of these

31. In public key encryption, if A wants to send a message to B so that no one else can read the message then A encrypts the message using
a) A's public key
b) A's private key
c) B's public key
d) B's private key

32. Which of the following is not condition having a deadlock resource previous granted can be forcebly taken away from a process
a) Resources need to be used in mutually exclusion fashion
b) Process can request new resources, as they continue to hold on to old ones
c) Here is a cycle in the resource allocation graph

33. An IP/IPX packet received by a computer using... having IP/IPX both how the packet is handled.
Ans. Read the, field in the packet header with to send IP or IPX protocol.

34. The range of the 32 bit number in two's complement form is _______

35. Find the Cyclomatic complexity
{if((x=0) or (y=0))
p=0;
else
{p=x;i=1;
while(i!=y)
{p=p+x;
i=i+1; }
}}

36. Activation record will contain the
a) Storage for simple names
b) Information about attributes for local names
d) All of the above

37. Global static variable within a file is intended to
a) Localize swap
b) Retain value persistently
c) Define constant

38. Why is thread switch faster than a process switch

39. What is the binary equivalent of 41.6875

40. Checkpoint value will be calculated in

41. DHCP is used for
b)dynamic host configuration protocol

42. For the following C program
int x(char *a)
{a=(char *) malloc(10*sizeof(char));
*a="hello";
}
main()
{char *a="new";
x(a);
printf("%s",a);
}
The output is
a) Hello
b) New
c) Hello new
d) Run time error