-->



Flextronics Placement Paper


1
f(char *p)
{
p[0]? f(++p):1;
printf("%c",*p);
}
if call that fuction with f(Aabcd) what is the output??
ans:dcbaA (Just reversing the string

2
f(char *p)
{
p=(char *)malloc(sizeof(6));
strcpy(p,"HELLO");
}
main()
{
char *p="BYE";
f(p)
printf("%s",p);
}
what is the o/p???
ans:HELLO

3 To sorting array of 10 elements which sorting is best
a)selection
b)bubble
c)tree sort
ans:a

4 To saving space point of view which sort is best
a)selection
b)insertion
c)both a & b


5 Which statement is wrong on heap
a)Any two childs should not same
b)..
c)..
d)...
ans:a

6 cache access time is 100ns ,memory access time is 1000ns and hit ratio
is 0.9 then what is average memory access time
a)100ns b)200ns c)400ns d)500ns ans:b

7 What is cyclometric complexity..

8 how many null pointer are there in N number binary tree
ans:N+1

9 Two sorted list of size n what are the maximum comparison in merge
ANs:2n-1

10 converting 41.685 to binary

11 pc is incremented while executing ---------- instruction
ans:fetch instruction

12 What are logic gates ?

13 x:validating :Are we producing product right
y:verification:Are we producing right right
a)X is wrong statement
b)y is "
c)x and Y "
d)x & y is right statement

14 what is not necessary condition in dead lock

15. IP & IPX is implemented in transport layer.

16 comparison between hashtable and binary tree

17 client server is working in asynchronous mode then how communication will take place bt client and server.

18 once context switching occurs then ------------will take place
a)saving register b)saving stack

19 If precondition is failed what u say about postcondition?

20 whiling download java applete then web broswer do the folling

21 Strings in Java
a)Mutable b)variable length string c).. d)..
ans:b

22 in Internet Transport layer which is not a protocol
a)/etc/host b)TCP c)UDP d)..

23 Which is not specified in CODD's rules

24 what is the use of Normalization

25 Functional dependency x->y is shows that
a)if x1=x2 then y1=y2 b).. c).. d).. ans:a

26 one question on IP address 243.65.77.8 some thing

27 If A sends a message to B with encryption then key is
a)A public key b)B public key c)A private key d)B private key ans:b

28 In a class only declaration of the function is there but definition is not there then what is that function
ans:virtual function

30 What is multiple inheritance...

31 What is ICV protocol

32 What is write-through protocol