if call that fuction with f(Aabcd) what is the output??
ans:dcbaA (Just reversing the string
what is the o/p???
3 To sorting array of 10 elements which sorting is best
4 To saving space point of view which sort is best
c)both a & b
5 Which statement is wrong on heap
a)Any two childs should not same
6 cache access time is 100ns ,memory access time is 1000ns and hit ratio
is 0.9 then what is average memory access time
a)100ns b)200ns c)400ns d)500ns ans:b
7 What is cyclometric complexity..
8 how many null pointer are there in N number binary tree
9 Two sorted list of size n what are the maximum comparison in merge
10 converting 41.685 to binary
11 pc is incremented while executing ---------- instruction
12 What are logic gates ?
13 x:validating :Are we producing product right
y:verification:Are we producing right right
a)X is wrong statement
b)y is "
c)x and Y "
d)x & y is right statement
14 what is not necessary condition in dead lock
15. IP & IPX is implemented in transport layer.
16 comparison between hashtable and binary tree
17 client server is working in asynchronous mode then how communication will take place bt client and server.
18 once context switching occurs then ------------will take place
a)saving register b)saving stack
19 If precondition is failed what u say about postcondition?
20 whiling download java applete then web broswer do the folling
21 Strings in Java
a)Mutable b)variable length string c).. d)..
22 in Internet Transport layer which is not a protocol
a)/etc/host b)TCP c)UDP d)..
23 Which is not specified in CODD's rules
24 what is the use of Normalization
25 Functional dependency x->y is shows that
a)if x1=x2 then y1=y2 b).. c).. d).. ans:a
26 one question on IP address 243.65.77.8 some thing
27 If A sends a message to B with encryption then key is
a)A public key b)B public key c)A private key d)B private key ans:b
28 In a class only declaration of the function is there but definition is not there then what is that function
30 What is multiple inheritance...
31 What is ICV protocol
32 What is write-through protocol