Orp

  • May 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Orp as PDF for free.

More details

  • Words: 562
  • Pages: 4
// 3 Sections -1) Aptitude 2) General System Concepts 3) Unix 4) C/C++ 5) Windows 6) Java/Html u have a option between aswering 3 or 5 and 4 or 6 // Techinical---> 1) a) b) c) d)

X.25 is a Parallel switch network access protocol. Circuit Switch Packet Switch ----------

2) a) b) c)

Udp is Connectionless Unreliable Connectionoriented.

A) only a is correct B) a and b are correct.

3) a) b) c) d)

Swapping is done by Short term scheduler long term meduim term none

5) #define sqrt(x) ((x)*(x)) What will be the output of the following code. main() { int i=10,j=10;

a) b) c) d)

} 100,100 110,110 100,110 110,100

printf("%d %d\n",sqrt(i++),sqrt(j++));

6) If O_NDELAY Flag is set when opening a pipe and when the reading process sees no data in the pipe then a) returns an error b) return zero data read c) waits for data

d) 7) S-> xxw {printf("1)} s->y {printf("2")} w->sz {printf("3")} what will be the output for the string xxxxyzz ? 8)After fork which process get a return value 0 ? a) child b) parent c) sibling d) none 9)which system call doesnot return after successfull completion ? a) mknod b) exec c) fork d) open 6)Semaphores can be created by a) Semget b) semopt c) semcreate d) none 7) a) b) c) d)

192.168.199.4 is a which class network A B C D

8) a) b) c) d)

Unix uses which cache replacement policy during disk IO FiFo Lifo LRU Least refernced page

9) what will be the output of the followinf C Code ? main() { char arr1[]="AB",arr2[]={'A','b'},arr3[]={"ABC","DEF"}; printf("%d %d %d \n",siezof(arr1),sizeof(arr2),sizeof(arr3); } 10) which is true 1) if a is function is private then it can be accesses by members of the class 2) if it is protected then it can be accessed by the members of the class 3) if it is protected then it can be accesses by its class members and friend class a) Combinations of 1,2,3...................// 11) which of the following signals cannot be trapped a) SIGINT b) SIGKILL

3) SIGALRAM 4) .... 12) FIFO is created by a) fork b) open c) pipe d) mknod 13) Overflow a) carry bit b) carry bit c) carry bit 14)

is detected by in the sign bit out of sign bit into sign bit

Segment 0 1 3 4 5)

Base

xxx

Width 2190 14 xxx xxx xxx xx

xx xx xx

1..5 Base values are less than 2000 physical address for loigcal address 2500 is a) .... b) .... c) .... d) none 15) main() { const char *ptr="Abde"; ptr[3]='f'; printf("%s",ptr); a) b) c) d)

} will give Error Abde Abfe none

16)Memory leak is a) Data exists but no pointer to it exists b) Data ceases but pointer exists c) Both a & b d) none 17) C------>(derived from) B --------->(dreived from) A then the order in which the constructors will be called is 18) char *f() { char *s=(char *)malloc(sizeof(char)*5);

}

strcpy(s,"hi"); return s;

char *globptr; main() { globptr=f(); printf("%s",globptr); } what will be the output of the above code ? 19) To prevent deadlock the following should not be there a) Circular wait b) Mutual exclusion c) Hold and wait d) .... 20) u can change ur password because a) u have read permission in /etc/password file b) u have execute permission on ,, c)

Related Documents

Orp
May 2020 0