NIC Placement Papers

Answer Posted / arun

/
Question Paper for the post of
Scientific OfficerlEngineer"SB"(ProgrammerfDistrict
Informatics Officer)-2008
( N/{'- 0 76bb/S'8
There are TWO PARTS in this paper. PART ONE contains THREE
questions and PART
TWO contains SIX questions.
2 PART ONE is to be answered in the SPECIAL ANSWER SHEET
only, attached to the
ANSWER BOOK, as per the instructions contained therein.
TOTAL MARKS: 100
(PART ONE - 30, PART TWO - 70)
PART 1
(Answer all the questions)
1 Each question below gives multiple choices of answers.
Choose the most appropriate
one and enter in the "SPECIAL ANSWER SHEET" attached to the
ANSWER
BOOK, following instructions therein.
(1 X 10)
1.1 A list of items, in which additions and deletions may be
made at either end is known as
a
jy Queue.
B. Push-down stack
C. Deque
D. None of the above
1.2 Reentrant code provides for
A. Execution of object program instruction segments by more
than one process at the
same time.
J1. Improved console operations.
C. Multiprocessing
D. Contiguous areas of memory for storage of program,
variables, data, reference,
and dynamic process history.
1.3 Which is not a debugging technique
A. Core dumps
B. Traces -e: Print Statements
D. Regression Testing
1.4 The process of transforming a model into source code is
A. Reverse Engineering
B. Forward Engineering
C. Re-engineering
.p. Re-structuring
1.5 The process by which existing processes and methods are
replaced by new processes
and techniques is
A. Reverse Engineering
B. Business Process Re-engineering
C. Software Process Management ». Forward Engineering
1.6 init and cron are:
ft.. linux processes
B. DOS processes
C. Windows processes
D. None of the above.
1.7 The differences between constructors and destructor in
C++ are
A. constructors can take arguments but destructor can't
B. constructors can be overloaded but destructor can't be
overloaded
.AJ. both A & B
D. none of these
1.8 Use Case is a:
A. case in case/switch statement in a programming language .
..E. a part of use case diagram, a modeling element.
C. special case in legal cases in computer industry.
D. None of the above.
1.9 PATH
A. is a system variable naming the list of directories
required to be searched for
finding the commands to be executed.
vi3. is a path to be followed in finding Critical Path
Method in Pert/CPM techniques
C. is a system variable naming the list of directories
required to be searched for
finding a class.
D. None of the above.
1.10 When a language has the capability to prod\lce new
datatype, it is called
~ Extensible
B. Overloaded
C. Encapsulated
D. Reprehensible
2 Each statement below is either TRUE or FALSE. Choose the
most appropriate one
and ENTER in the "SPECIAL ANSWER SHEET" attached to the ANSWER
BOOK, following instructions therein.
2.1 JavaScript is an old version of Java Language. 'I (j)
2.2 Maintenance stage in SDLS precedes Implementation . ../'
2.3 Symbian is an operating system. X- (j)
2.4 Hotswappable hard disks requires systems to be closed
and cooled before they can be
removed. ~
2.5 PHP and Perl are examples of spreadsheet packages . .:x! (!)
2.7 The fields in a C++ program are by default private. vi' (j)
2.9 A return code of 0 from a function is interpreted that
there are errors during its
execution. 'I
2.10 When a variable is passed by reference to a procedure,
the changes made to the
variable are passed back to the calling procedure. ;/'
3 Each statement below has a blank space to be filled. Enter
your choice in the
"SPECIAL ANSWER SHEET" attached to the ANSWER BOOK, following
instructions therein.
(1 X 10)
interface.
3.2 The time required by a sector to reach below the
read/write head I~ 7'
3.3 What will be the output of the following code snippet r
/. Ie ~ J)v I" c
try {
int x = 0;
int y = SO/x;
System.out.println("Division by Zero is an error");
}
catch(ArithmeticException e) {
System.out.print1n("catch block");
}
In a select statement /ul1f\1' 11; clause restricts the
grouped rows that appear in
the result.
3.5 The process of mapping/initialising a disk is called
/,"zl,£ '1
3.6 A popular open source DBMS J'&l J2 2=)!~;4""
3.7 An image scanner with tit YCbtvf software can translate
a scanned text into text that
can be edited.
3.8 A BIOS routine called , that run~ whenever the system l~
started to
determine the functioning of various parts of the computer
system.
PART 2
(Answer any five questions)
4 Write short note on
4. De-fragmentation, compression and encryption
.-b. Open Source, Commercial Software and Freeware
c. Paging and Segmentation
d. SDLC and its stages
fl What do you understand by Complexity of Sorting
Algorithms? Explain in the
context of various sorting techniques.
b. Write Quick Sort Algorithm using pseudocode and verify
your code by tracing an
example.
~. Explain final, finally, finalise, this and super in Java
Context
b. Consider the following stack, where stack is allocated N
= 6 memory cells
STACK: AAA, DDD, EEE, FFF, GGG, _
Describe the stack as the following operations take place:
(i) PUSH(ST ACK,KKK),
(ii) POP(ST ACK,ITEM),
(iii) PUSH(STACK,LLL),
(iv) PUSH(STACK,SSS),
(v) POP(ST ACK,ITEM),
(vi) PUSH(STACK,TTT)
c. What does chmod, vi and grep do in linux system?
a. What is Object Oriented Programming? Why is Java called
portable or platform
independent language
b.Write a program(in Java or C++) to produce fibonacci numbers
FO, Fl given below. Should one use recursion or iteration
for the above
program and why?
Fn = {~
Fn-l + Fn-2
n=O,
n=l,
n>=2
a. Let a and b denote positive integers. Suppose a function
Q is defined recursively
as follows
Q(a,b) = { 0
Q(a-b,b) + I
ifa<b
ifb<=a
(i) Find the value ofQ(2,3) and Q(l4,3)
(ii) What does this function do? Find Q(5861,7).
c-b. Describe Method Overloading and Method Overriding.
c. Let LIST be a linked list in memory. v\7ritea procedure
which finds the number
NUM of times a given ITEM occurs in LIST
a. Based on type of organization ,< of data what are
different types of DBMS? Oive
examples of commercially available DBMS's today.
b. An organization conducts training programmes (courses)
for its own employees.
'" These employees are recognized in the organization by an
~mployee code and are
placed in different specialized groups called Divisions
headed by HODs (who are
also employees). Design a fully normalized database, clearly
indicating primary
key and foreign key constraints, to store following information:
Employee Name, Employee Code, Designation, Division Name,
HOD Name,
Course Title (Training Programme Title), Course Start Date,
Course Duration etc
Write SQL statementto generate
(i)Division wise (List of all employees in a division) with
the HOD Name
(ii)List of courses attended by a particular employee
(iii)List of employees who have attended a particular
training programme
c. Describe ACID in the context of DBMS.


Above questions from NIC 2008

Is This Answer Correct ?    11 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

my question is : reverse a string in COBOL program (please write a code asap) input file: 1234abcdef output file: 8765_____ abc*$#1___ 1_2_3_4__ cdef____ghi h_k_z_a__ a_z_k_h___ ihg____ghi 4_3_2_1___ 1#$*cba__ ______5678 fedcb4321

1295


If anybody knows the recruitment procedure of IOTL & POWER MECHANICAL. send me the placement papers if u hav... very urgent ...

3894


A frog wants to climb a pole which is 15 feet in height, frog can jump 3 feet every minute after which he rests for a minute where he slips down 2 feet. How much time will the frog take to reach the top of the pole?

598


speak 1min on topic Travelling,memorable moment ,memorable day?

1738


your project to describe and tell about : 1. My favorite things 2. My favorite places at home 3. Animals *Choose one of them to describe *Write on your paper *If you done, Send me *Did you get it

784






What are the frequently asked questions for interview in capital iq company ?

1324


email me previous question papers of bob bank for po exams

2060


what is difference between uv and visible spectroscopy and how to differentiate the drug compounds in uv visible region

1593


Sks Microfinance

979


printf("%d",printf("%d",printf("%d",printf("%s","ILOVECPROGRAM")))); whats the output

1394


Recently conducted Apptitude test

1409


Zero setting of sejong rottary press

1198


Do we have vacancy for HR RECRUITER ?

1377


what you will do when you struck in traffic ?

1049


Hi.. Guys Im pranitha, presently im working in a organisation & im look for job at MNC's like DELL, Delloitte, Bank of America, Genpect, etc., I have completed B.com . Pls help me...

1147