Provided by www.YuvaJobs.com - Flextronics Placement Paper Not Specified 31 December 2010 FLEXTRONICS PAPER Section C 1. An lead compensator zero is at Z=Zc, pole is at P=Pc then the following is correct a. Pc > Zc, pc< 0, zc< 0 b. c. 2. gain margin of g(s)h(s)=1/s(s+k); a. sqrt(1+k2) b. 0 c. infinity d. 1 3. machestor code does not improves a. clock recovery b. bandwidth efficiency c. 4. possion distribution is used for a. used in FSM b. c.used for queuing delay system of mutually identical events of arrival d. both a and c 5. no.of filpflops for mod 11 counter a. four b. five c. 6. no.of filpflops for mod 11 counter a. four b. five c. 7. if even parity is used for parity generation, what is the hamming distance (simple fig is given) ans:2 8. the code set is {00000,00111,11100,11011} what is the error detecting and correcting capability? ans:2,1 9. operational amp characteristics following is correct: 1. input impedance is 0 2. output impedance is infinity 3. input impedance is infinity 4. gain is infinity which combinations are correc 10. band pass signal having frequencies 2.5k and 4.5k?give the sampling freq a. 9k b. 4k c. 4.5k d. 7k 11. definition of avalanche diode multiplication 12. more no of ripples are present in the diagram?which is correct a. lower order filter b. high order filter c. 13. If CPU have one interrupt pin and on to connect with external devices with some priority? which type of the following is used? a. parallel priority interrupt b. daisy chain c. RS filpflop d. 14. one megabit file transfer, serially on 9600 baud one start bit and two stop bits, then how much time it takes (approx) a. 4 hours b. 2 hours c. 20 minutes d. 2 minute 15. IEEE 802.5 is ans: TOKEN RING 16. Code sequence is given what is the error correcting distance 17. bit stuffing used in HDLC Protocol for ans: b is correct(read on text book) Section A AND B (Both are mixed ) 18 If "AaBbCc" is passed to the char char x(*a) { a[0]?x(a+1):1; printf("%c",a[0]); return 1; } what will be the output? 19 f(*p) { p=(char *)malloc(6); p="hello"; return; } main() { char *p="bye"; f(p); printf("%s",p); } what is the o/p? ans:bye 20 hen the program counter is incremented in the instruction cycle a. fetch cycle b. int cycle c. execuation cycle d. 21 wo sorted lists of n elements will take at least fine the order of complexity? a. 2n b. n/2 c. square(n) 22 logic diagram is given? find the expression ans: OR gate 23 uestion on JAVA string ans: string ends without a null character 24 ache access time is 100ns. main memory access time is 1000ns, hit ratio is .9, find mean access time? ans :200ns 25 hich is not suitable to find out IP address ans:ARP 26 about deadlock condition 27 convert 41.6875 into binary 28 read about IP AND IPX 29 read about NFS 30 DHCP is a. for routing b. for network address conversion c. for diagnosis d. 31 xecution phase can be a. pipelined b. no parallelism is possible c. vector processing d. 32 In public key algorithm , A wants to send message to B ..... which key is used a. A public key b. A private key c. B public key d. B private key 33 to prevent replay attacks in transmission a. symmetric encoding b. Asymmetric encoding c. for every exchange, key should be changed 34 irtual functionality is used in C++ a. dynamic binding b. if the derived func is present but base class not present c. 35 if there are n nodes in a binary tree, how many null pointers are there ans:n+1; 36 if heap sort contains n elements, no of comparsions required are a. log(n) b. height of heap sort c. d. 37 question on ICV(integrity check) 38 which of the following is efficient in terms of space a. insertion sort b. quick sort c. selection d. both a and c 39 in 32 bit representation, the range of numbers in 2,s complement form ans :-2 to the power of 31 to 2 to the power of 31 minus 1 40 about normalization 41 socket is implemented in TCP Layer. which of the following is related to TCP layer ans: port number 42 in reentrant procedure, which should be not used for passing parameters? a. passed by reg b. by direct c. by indirect d. by stack 43 flow control is used for a. congestion at receiver b. c. d. 44 flow control is used for a. congestion at receiver b. c. d. 45 5 questions on DBMS are there 46 in global static variable , declartion in a file a. localization of scope b. persistance of the value through out the file c. d. 47 in sorted table contains elements , which of the searching is false a. hash table b. binary searching 48 in demand paging overhead of context switching is more due to a. copy processes from disk to memory b. viceversa c. to get associative table d. swapping to the disk 49 when write through is better than write back(related to cache memory) 50 which is false when normalization is used?can,t express 51 I :verification: are we doing right product II: validation:are we doing product right a. i and ii are true b. i and ii are false c. i true and ii false d. i false and ii true 52 A table contains less than 10 elements which one is fastest a. bubble sort b. selection sort c. quick sort 53 about subroutine, precondition is false. what about post condition a. post condition is not defined b. post condition is always true c. d. 54 When static variables are used, which one of the following is not possible? a. dynamic run time b. c. 55 in product of x and y, if(x=0|y=0) y=1; else y=0; (not cleared) what is cyclometric complexity? a. 3 b. 2 c. 1 d. 0 56 CREATE TABLE NEW AS SELECT BIG FROM EMP The above SQL statement is correct or not? (question is not cleared) 57 path testing is a. white box b. black box c. installation test d. environment test 58 program is given? above algorithm represents what type of search? a. binary search b. interpolation search c. sequential search d. (may be "b" is correct); 59 if x->y in a relation R, x1 and x2 are in x, y1 and y2 are in y (question not cleared), about functional dependancy a.x1=x2 and y1=y2 b. c. 60 in a down loading from website ,which one is correct? ans: check the byte code and indicate the error, if any. 61 about UDP one Address is given but that is not the state table what will it do the packet a. packet is discarded b. packet is sent to ethernet server c. packet is sent to other address d. 62 in associated memory for fast accessing which one is used a. single linked list b. double " c. hash table 63 hich of the folowing is not correct a. (x+y),=x,.y, b. (x,+y,),=x.y c. (x,.y,),=x+y d. (x,+y,),=x,.y, [d] 64 Question on logic ckt. U have to find the output ans. AB,+CD,+EF, 65 Output of MUX _________ c-----| | c,----| |-------Y c,----| | ans. A xor B xor C c-----| |--------- | | A B (select lines) 66 If X and Y are two sets. |X| and |Y| are corresponding coordinates and exact no.of functions from X to Y is 97 then a. |X|=97 |Y|=1 b. |X|=1 |Y|=97 c. |X|=97 |Y|=97 d. ..... 67 If two dies are thrown simultaneously what is the prob. of one of the dice getting face 6 ? a. 11/36 b. 1/3 c. 12/35 d. 1/36 [a] 68 The relation , O(log n) .. likewise Section C 92 ne question of Set Theory Like there Are two sets A and B and (A-B)union(B-A)union(A intersection B) is equivalent to Ans. A union B 93 Union and intersection are in there sign conventions. 94 One question of probability Like between 100 and 999 how many no have the prob that they does not contain 7 Ans. 16/25 (not sure u can check by own) 95 Of Newton Rapson method... 96 Of power set A set contains {(fi),a,{a,b}} what is the powerset of it Ans. 8 97 A question of logic gates Ans. U can got the answer very easily 98 A question on the Booths algo Ans. The sequence is 1010101010101010 99 Relative addressing mode is used for Ans. Dont know. 100 For how many numbers there is no difference between little endian and big endian Ans. 256 101 For the multiplication of two 8 bit numbers how much ROM will be used Ans. 64k*16 ROM(Check it) 102 Why direct mapping is not good for the mapping of Cache Memory. Ans. Dont know 103 What is the main property of Desiy I/O Sytem Ans. 104 A question on the nyquist theorem Ans. 18000 bps 105 What is the shannon theorem... Ans. Refer to data communication(Stalling) book 106 CSMA/CD protocol is used in Ans. Ethernet 107 What is the limitation of the Pulse Code Modulation Ans. Refer to data communication book 108 In CSMA/CD Ans. The Access to the channnel is probabilistic. 109 For an IP Router how many IP addresses Ans. Check it i think Answer is Only One. 110 Which protocol u used when you want to know the IP address corresponding to a MAC Address Ans. RARP 111 Which part of the IP header is used for the time limit of the packet. Ans. TTL 112 Which PageReplacement algo will give the best result Ans. By replacing that page which has the next reference after a long time.(optimal algo) 113 What the code will be said when it is called by another part and it is not completed yet Ans. Reentrant Code. 114 three questions on the simple programs 115 There is a sequence of no and prepare a binary tree and tell how many nodes are in the left and right sub tree. Ans. Check it Ans (4,7) 116 hat is the rank of the graph Ans. e-n+k 117 One question on the multithreading 118 Which traversal of the tree gives the node in the ascending order. Ans. Inorder 119 Which traversal of the tree gives the node in the ascending order. Ans. Inorder 120 What is garbage collector. 121 lead compensator zero is at Z=Zc, pole is at P=Pc then the following is correct a. Pc > Zc, pc< 0, zc< 0 b. c. 122 gain margin of g(s)h(s)=1/s(s+k); a. sqrt(1+k2) b. 0 c. infinity d. 1 123 machestor code does not improves a. clock recovery b. bandwidth efficiency c. 124 possion distribution is used for a. used in FSM b. c.used for queuing delay system of mutually identical events of arrival d. both a and c 125 no.of filpflops for mod 11 counter a. four b. five c. 126 no.of filpflops for mod 11 counter a. four b. five c. 127 if even parity is used for parity generation, what is the hamming distance (simple fig is given) ans:2 128 the code set is {00000,00111,11100,11011} what is the error detecting and correcting capability? ans:2,1 129 operational amp characteristics following is correct: 1. input impedance is 0 2. output impedance is infinity 3. input impedance is infinity 4. gain is infinity which combinations are correc 130 band pass signal having frequencies 2.5k and 4.5k?give the sampling freq a. 9k b. 4k c. 4.5k d. 7k 131 definition of avalanche diode multiplication 132 more no of ripples are present in the diagram?which is correct a. lower order filter b. high order filter c. 133 If CPU have one interrupt pin and on to connect with external devices with some priority? which type of the following is used? a. parallel priority interrupt b. daisy chain c. RS filpflop d. 134 one megabit file transfer, serially on 9600 baud one start bit and two stop bits, then how much time it takes (approx) a. 4 hours b. 2 hours c. 20 minutes d. 2 minute 135 IEEE 802.5 is ans: TOKEN RING 136 Code sequence is given what is the error correcting distance 137 bit stuffing used in HDLC Protocol for ans: b is correct(read on text book) Section A AND B (Both are mixed ) 138 "AaBbCc" is passed to the char char x(*a) { a[0]?x(a+1):1; printf("%c",a[0]); return 1; } what will be the output? 139 f(*p) { p=(char *)malloc(6); p="hello"; return; } main() { char *p="bye"; f(p); printf("%s",p); } what is the o/p? ans:bye 140 when the program counter is incremented in the instruction cycle a. fetch cycle b. int cycle c. execuation cycle d. 141 two sorted lists of n elements will take at least fine the order of complexity? a. 2n b. n/2 c. square(n) 142 logic diagram is given? find the expression ans: OR gate 143 question on JAVA string ans: string ends without a null character 144 cache access time is 100ns. main memory access time is 1000ns, hit ratio is .9, find mean access time? ans :200ns 145 which is not suitable to find out IP address ans:ARP 146 about deadlock condition 147 convert 41.6875 into binary 148 read about IP AND IPX 149 read about NFS 150 DHCP is a. for routing b. for network address conversion c. for diagnosis d. 151 execution phase can be a. pipelined b. no parallelism is possible c. vector processing d. 152 In public key algorithm , A wants to send message to B ..... which key is used a. A public key b. A private key c. B public key d. B private key 153 to prevent replay attacks in transmission a. symmetric encoding b. Asymmetric encoding c. for every exchange, key should be changed 154 irtual functionality is used in C++ a. dynamic binding b. if the derived func is present but base class not present c. 155 if there are n nodes in a binary tree, how many null pointers are there ans:n+1; 156 if heap sort contains n elements, no of comparsions required are a. log(n) b. height of heap sort c. d. 157 question on ICV(integrity check) 158 which of the following is efficient in terms of space a. insertion sort b. quick sort c. selection d. both a and c 159 in 32 bit representation, the range of numbers in 2,s complement form ans :-2 to the power of 31 to 2 to the power of 31 minus 1 160 about normalization 161 socket is implemented in TCP Layer. which of the following is related to TCP layer ans: port number 162 in reentrant procedure, which should be not used for passing parameters? a. passed by reg b. by direct c. by indirect d. by stack 163 flow control is used for a. congestion at receiver b. c. d. 164 flow control is used for a. congestion at receiver b. c. d. 165 5 questions on DBMS are there 166 in global static variable , declartion in a file a. localization of scope b. persistance of the value through out the file c. d. 167 in sorted table contains elements , which of the searching is false a. hash table b. binary searching 168 in demand paging overhead of context switching is more due to a. copy processes from disk to memory b. viceversa c. to get associative table d. swapping to the disk 169 when write through is better than write back(related to cache memory) 170 which is false when normalization is used?can,t express 171 I :verification: are we doing right product II: validation:are we doing product right a. i and ii are true b. i and ii are false c. i true and ii false d. i false and ii true 172 A table contains less than 10 elements which one is fastest a. bubble sort b. selection sort c. quick sort 173 about subroutine, precondition is false. what about post condition a. post condition is not defined b. post condition is always true c. d. 174 When static variables are used, which one of the following is not possible? a. dynamic run time b. c. 175 in product of x and y, if(x=0|y=0) y=1; else y=0; (not cleared) what is cyclometric complexity? a. 3 b. 2 c. 1 d. 0 176 CREATE TABLE NEW AS SELECT BIG FROM EMP The above SQL statement is correct or not? (question is not cleared) 177 path testing is a. white box b. black box c. installation test d. environment test 178 program is given? above algorithm represents what type of search? a. binary search b. interpolation search c. sequential search d. (may be "b" is correct); 179 if x->y in a relation R, x1 and x2 are in x, y1 and y2 are in y (question not cleared), about functional dependancy a.x1=x2 and y1=y2 b. c. 180 in a down loading from website ,which one is correct? ans: check the byte code and indicate the error, if any. 181 about UDP one Address is given but that is not the state table what will it do the packet a. packet is discarded b. packet is sent to ethernet server c. packet is sent to other address d. 182 in associated memory for fast accessing which one is used a. single linked list b. double " c. hash table d. 183 nice(,val,)? unix command 184 for(l=1;a