Likes

Aptitude Questions

Aptitude Questions



                                                           (Datatypes C#)




1. 
Which of the following statements are correct about data types?

1.            If the integer literal exceeds the range of byte, a compilation error will occur.
2.            We cannot implicitly convert non-literal numeric types of larger storage size                  to byte.
3.            Byte cannot be implicitly converted to float.
4.            A char can be implicitly converted to only int data type.
5.            We can cast the integral character codes.
A.
1, 3, 5
B.
2, 4
C.
3, 5
D.
1, 2, 5   

2. 
Which of the following is an 8-byte Integer?
A.
Char
B.
Long
C.
Short
D.
Byte
E.
Integer          


4. 
Which of the following statements is correct?
A.
Information is never lost during narrowing conversions.
B.
The CInteger() function can be used to convert a Single to an Integer.
C.
Widening conversions take place automatically.
D.
Assigning an Integer to an Object type is known as Unboxing.
E.
3.14 can be treated as Decimal by using it in the form 3.14F.


5. 
Which of the following are value types?
1.            Integer
2.            Array
3.            Single
4.            String
5.            Long
A.
1, 2, 5
B.
1, 3, 5
C.
2, 4
D.
3, 5


6. 
Which of the following does not store a sign?
A.
Short
B.
Integer
C.
Long
D.
Byte
E.
Single


7. What is the size of a Decimal?
A.
4 byte
B.
8 byte
C.
16 byte
D.
32 byte


8. 
Which of the following is the correct size of a Decimal datatype?
A.
8 Bytes
B.
4 Bytes
C.
10 Bytes
D.
16 Bytes
E.
None of the above.



                                                               (Networking)

1. 
How long is an IPv6 address?
A.
32 bits
B.
128 bytes
C.
64 bits
D.
128 bits


2. 
What flavor of Network Address Translation can be used to have one IP address allow many users to connect to the global Internet?
A.
NAT
B.
Static
C.
Dynamic
D.
PAT

3. 
What are the two main types of access control lists (ACLs)?
1.            Standard
2.            IEEE
3.            Extended
4.            Specialized
A.
1 and 3
B.
2 and 4
C.
3 and 4
D.
1 and 2

Shortcuts keys

Shortcuts keys


Aero Shortcuts

Windows + Spacebar
Make all open windows transparent to view gadgets and icons on desktop.

·                     [Windows] + [D] (Aero Peek)
Show or hide the desktop.
·                     [Windows] + [Home] (Aero Shake)
Minimize all but selected window. Reverse by clicking the key combination again.
·                     [Windows] + left arrow OR [Windows] + right arrow (Aero Snap)
Dock selected window to the left or right half of your screen.
·                     [Windows] + up arrow OR [Windows] + down arrow (Aero Snap)
Maximized and restores the selected window.
·                     [Windows] + [SHIFT] + up arrow OR [Windows] + [SHIFT] + down arrow
Maximizes and restores selected window in vertical dimension only.
·                     Windows + Tab
Launch 3D representation of open windows and click [Tab] key again to flip through them.


Window 10 Keyboard shortcuts
Press this key
To do this
Ctrl+C (or Ctrl+Insert)
Copy the selected item
Ctrl+X
Cut the selected item
Ctrl+V (or Shift+Insert)
Paste the selected item
Ctrl+Z
Undo an action
Alt+Tab
Switch between open apps
Alt+F4
Close the active item, or exit the active app
Windows logo key Windows logo key+L
Lock your PC or switch accounts
Windows logo key Windows logo key+D
Display and hide the desktop

50 Windows 8 Keyboard Shortcuts You Should Know
Windows Key + D
Show Desktop
Windows Key + C
Open Charms Menu
Windows Key + F
Charms Menu – Search
Windows Key + H
Charms Menu – Share
Windows Key + K
Charms Menu – Devices
Windows Key + I
Charms Menu – Settings
Windows Key + Q
Search For Installed Apps
Windows Key + W
Search Settings
Windows Key + Tab
Cycle through open Modern UI Apps
Windows Key + Shift + Tab
Cycle through open Modern UI Apps in reverse order
Windows Key + .
Snaps app to the right (split screen multitasking)
Windows Key + Shift + .
Snaps app to the left (split screen multitasking)
Windows Key + ,
Temporarily view desktop
Alt + F4
Quit Modern UI Apps
Windows Key + E
Launch Windows Explorer Window
Windows Key + L
Lock PC and go to lock screen
Windows Key + T
Cycle through icons on taskbar (press Enter to launch app)
Windows Key + X
Show Advanced Windows Settings Menu
Windows Key + E
Launch Windows Explorer Window
Windows Key + Page Down
Moves Start screen and apps to secondary monitor on the right
Windows Key + M
Minimize all Windows
Windows Key + Shift + M
Restore all minimized Windows
Windows Key + R
Open Run dialog box
Windows Key + Up Arrow
Maximize current window
Windows Key + Down Arrow
Minimize current window
Windows Key + Left Arrow
Maximize current window to left side of the screen
Windows Key + Right Arrow
Maximize current window to right side of the screen
Ctrl + Shift + Escape
Open Task Manager
Windows Key + Print Screen
Takes a Print Screen and saves it to your Pictures folder
Windows Key + Page Up
Moves Start screen and apps to secondary monitor on the left
Windows Key + Pause Break
Display System Properties
Shift + Delete
Permanently delete files without sending it to Recycle Bin
Windows Key + F1
Open Windows Help and Support
Windows Key + V
Cycle through notifications
Windows Key + Shift + V
Cycle through notifications in reverse order
Windows Key + 0 to 9
Launch/show app pinned to taskbar at indicated number
Windows Key + Shift + 0 to9
Launch new instance of app pinned to taskbar at indicated number
Alt + Enter
Display Properties of selected item in File Explorer
Alt + Up Arrow
View upper level folder of current folder in File Explorer
Alt + Right Arrow
View next folder in File Explorer
Alt + Left Arrow
View previous folder in File Explorer
Windows Key + P
Choose secondary display modes
Windows Key + U
Open Ease of Access Center
Alt + Print Screen
Print Screen focused Window only
Windows Key + Spacebar
Switch input language and keyboard layout
Windows Key + Shift +Spacebar
Switch to previous input language and keyboard layout
Windows Key + Enter
Open Narrator
Windows Key + +
Zoom in using Magnifier
Windows Key + -
Zoom out using Magnifier
Windows Key + Escape
Exit Magnifier
Microsoft Natural Keyboard keys

· Windows Logo: Start menu
· Windows Logo+R: Run dialog box
· Windows Logo+M: Minimize all
· SHIFT+Windows Logo+M: Undo minimize all
· Windows Logo+F1: Help
· Windows Logo+E: Windows Explorer
· Windows Logo+F: Find files or folders
· Windows Logo+D: Minimizes all open windows and displays the desktop
· CTRL+Windows Logo+F: Find computer
· CTRL+Windows Logo+TAB: Moves focus from Start, to the Quick Launch toolbar, to the system tray (use RIGHT ARROW or LEFT ARROW to move focus to items on the Quick Launch toolbar and the system tray)
· Windows Logo+TAB: Cycle through taskbar buttons
· Windows Logo+Break: System Properties dialog box
· Application key: Displays a shortcut menu for the selected item

Mouse click/keyboard modifier combinations for shell objects
· SHIFT+right click: Displays a shortcut menu containing alternative commands
· SHIFT+double click: Runs the alternate default command (the second item on the menu)
· ALT+double click: Displays properties
· SHIFT+DELETE: Deletes an item immediately without placing it in the Recycle Bin
Windows program key combinations

CTRL+C: Copy
CTRL+X: Cut
CTRL+V: Paste
CTRL+Z: Undo
CTRL+B: Bold
CTRL+U: Underline
CTRL+I: Italic


Windows system key combinations
· F1: Help
· CTRL+ESC: Open Start menu
· ALT+TAB: Switch between open programs
· ALT+F4: Quit program
· SHIFT+DELETE: Delete item permanently
· Windows Logo+L: Lock the computer (without using CTRL+ALT+DELETE)

Microsoft Word shortcut keys

Shortcut Description
Ctrl + 0 Adds or removes 6pts of spacing before a paragraph.
Ctrl + A Select all contents of the page.
Ctrl + B Bold highlighted selection.
Ctrl + C Copy selected text.
Ctrl + D Open the font preferences window.
Ctrl + E Aligns the line or selected text to the center of the screen.
Ctrl + F Open find box.
Ctrl + I Italic highlighted selection.
Ctrl + J Aligns the selected text or line to justify the screen.
Ctrl + K Insert link.
Ctrl + L Aligns the line or selected text to the left of the screen.
Ctrl + M Indent the paragraph.
Ctrl + P Open the print window.
Ctrl + R Aligns the line or selected text to the right of the screen.
Ctrl + S Save the open document. Just like Shift + F12.
Ctrl + T Create a hanging indent.
Ctrl + U Underline highlighted selection.
Ctrl + V Paste.
Ctrl + X Cut selected text.
Ctrl + Y Redo the last action performed.
Ctrl + Z Undo last action.
Ctrl + Shift + L Quickly create a bullet point.
Ctrl + Shift + F Change the font.
Ctrl + Shift + > Increase selected font +1pts up to 12pt and then increases font +2pts.
Ctrl + ] Increase selected font +1pts.
Ctrl + Shift + < Decrease selected font -1pts if 12pt or lower, if above 12 decreases font by +2pt.
Ctrl + [ Decrease selected font -1pts.
Ctrl + / + c Insert a cent sign (¢).
Ctrl + ' + <char> Insert a character with an accent (grave) mark, where <char> is the character you want. For example, if you wanted an accented รจ you would use Ctrl + ' + e as your shortcut key. To reverse the accent mark use the opposite accent mark, often on the tilde key.
Ctrl + Shift + * View or hide non printing characters.
Ctrl + <left arrow> Moves one word to the left.
Ctrl + <right arrow> Moves one word to the right.
Ctrl + <up arrow> Moves to the beginning of the line or paragraph.
Ctrl + <down arrow> Moves to the end of the paragraph.
Ctrl + Del Deletes word to right of cursor.
Ctrl + Backspace Deletes word to left of cursor.
Ctrl + End Moves the cursor to the end of the document.
Ctrl + Home Moves the cursor to the beginning of the document.
Ctrl + Spacebar Reset highlighted text to the default font.
Ctrl + 1 Single-space lines.
Ctrl + 2 Double-space lines.
Ctrl + 5 1.5-line spacing.
Ctrl + Alt + 1 Changes text to heading 1.
Ctrl + Alt + 2 Changes text to heading 2.
Ctrl + Alt + 3 Changes text to heading 3.
Alt + Ctrl + F2 Open new document.
Ctrl + F1 Open the Task Pane.
Ctrl + F2 Display the print preview.
Ctrl + Shift + > Increases the highlighted text size by one.
Ctrl + Shift + < Decreases the highlighted text size by one.
Ctrl + Shift + F6 Opens to another open Microsoft Word document.
Ctrl + Shift + F12 Prints the document.
F1 Open Help.
F4 Repeat the last action performed (Word 2000+)
F5 Open the find, replace, and go to window in Microsoft Word.
F7 Spellcheck and grammar check selected text or document.
F12 Save as.
Shift + F3 Change the text in Microsoft Word from uppercase to lowercase or a capital letter at the beginning of every word.
Shift + F7 Runs a Thesaurus check on the word highlighted.
Shift + F12 Save the open document. Just like Ctrl + S.
Shift + Enter Create a soft break instead of a new paragraph.
Shift + Insert Paste.
Shift + Alt + D Insert the current date.
Shift + Alt + T Insert the current time.

HTML Tricks

HTML Tricks

How make clock in html............................?

ans :
 <!DOCTYPE html>
<html>
<head>
<script>
function startTime() {
    var today = new Date();
    var h = today.getHours();
    var m = today.getMinutes();
    var s = today.getSeconds();
    m = checkTime(m);
    s = checkTime(s);
    document.getElementById('txt').innerHTML =
    h + ":" + m + ":" + s;
    var t = setTimeout(startTime, 500);
}
function checkTime(i) {
    if (i < 10) {i = "0" + i};  // add zero in front of numbers < 10
    return i;
}
</script>
</head>

<body onload="startTime()">

<div id="txt"></div>

</body>
</html>
*********************************************************************************

Interview Questions (HR Interview)

Interview Questions
            (HR Interview)



Tell me about yourself.
Why should I hire you?
What are your strengths and weaknesses?
Why do you want to work at our company?
What is the difference between confidence and over confidence?
What is the difference between hard work and smart work?
How do you feel about working nights and weekends?
Can you work under pressure?
Are you willing to relocate or travel?
What are your goals?
What motivates you to do good job?
What makes you angry?
Give me an example of your creativity.
How long would you expect to work for us if hired?
Are not you overqualified for this position?
Describe your ideal company, location and job.
What are your career options right now?
Explain how would be an asset to this organization?
What are your outside interests?
Would you lie for the company?
Who has inspired you in your life and why?
What was the toughest decision you ever had to make?
Have you considered starting your own business?
How do you define success and how do you measure up to your own definition?

Tell me something about our company.
How much salary do you expect?
Where do you see yourself five years from now?
On a scale of one to ten, rate me as an interviewer.
Do you have any questions for me?

COMPUTER NETWORKING INTERVIEW QUESTIONS



What do you mean by data communication?
2. What is simplex?
3. What is half-duplex?
4. What is full duplex?
5. What is a network?
6. What is distributed processing?
7. What is point to point connection?
8. What is multipoint connection?
9. What is a topology?
10. Define LAN, MAN and WAN.
11. Define internet?
12. What is a protocol?
13. What is TCP/IP protocol model?
14. Describe the functions of five layers?
15 What is ISO-OSI model?
16. What is multiplexing?
17. How data is transmitted over a medium?
18. Compare analog and digital signals?
19. Define bandwidth?
20. What are the factors on which data rate depends?
21. Define bit rate and bit interval?
22. What is Nyquist bit rate formula?
23. Define Shannon Capacity?
24. What is sampling?
25. Define pulse amplitude modulation?
26. Define pulse code modulation?
27. What is Nyquist Theorem?
28. What are the modes of data transmission?
29. What is Asynchronous mode of data transmission?
30. What is Synchronous mode of data transmission?
31. What are the different types of multiplexing?
32. What is FDM?
33. What are the different transmission media?
34. What are the different Guided Media?
35. Describe about the different Guided Medias.
36. What do you mean by wireless communication?
37. What do you mean by switching?
38. What are the switching methods?
39. What are the duties of data link layer?
40. What are the types of errors?
41. What do you mean by redundancy?
42. Define parity check.
43. Define cyclic redundancy check (CRC).
44. What is hamming code?
45. What do you mean by flow control?
46. What do you mean by error control?
47. Define stop and wait ARQ.
48. Define Go-Back-N ARQ?
49. Define Selective Repeat ARQ?
50. What do you mean by pipelining, is there any pipelining in error control?
51. What is HDLC?
52. What do you mean by point to point protocol?
53. What do you mean by point to point protocol stack?
54. What do you mean by line control protocol?
55. What do you mean by Authentication protocol?
56. What do you mean by network control protocol?
57. What do you mean by CSMA?
58. What do you mean by Bluetooth?
59. What is IP address?
60. What do you mean by subnetting?
61. What are the advantages of fiber optics cable ?
62. What are the disadvantages of fiber optics cable?
63. What are the propagation type of radio wave ?
64. What do you mean by Geosynchronous Satellites ?
65. What are the factors for evaluating the suitability of the media ?
66. What do you mean by medium access control (MAC) sublayer.
67. What do you mean by ALOHA ?
68. What is pure ALOHA ?
69. What is slotted ALOHA?
70. What do you mean by persistent CSMA (carrier sense multiple access) ?
71. What do you mean by non persistent CSMA (carrier sense multiple access) ?
72. What do you mean by p persistent CSMA (carrier sense multiple access) ?
73. What is FDDI ?
74. What is Firewalls?
75. What is Repeaters ?
76. What is Bridges ?
77. What is Routers ?
78. What is Gateway ?
79. What do you mean by Data Terminal Equipment (DTE) ?
80. What do you mean by Data Terminating Equipment (DCE) ?
81. What do you mean by protocol stack ?
82. What do you mean by peer ?
83. What do you mean by broadcasting ?
84. What are the advantages of broadcast network.
85. What do you mean by point to point network?
86. What are the design issue of layers ?
87. What are the protocols in application layer ?
88. What are the protocols in transport layer ?
89. Define TCP ?
90. Define UDP ?
91. Define IP ?
92. What do you mean by client server model ?
93. What are the information that a computer attached to a TCP/IP internet must possesses ?
94. What is domain name system (DNS)?
95. What is TELNET ?
96. What do you mean by local login and remote login ?
97. What is Network Virtual Terminal ?
98. What do you mean by Simple Mail Transfer Protocol ?
99. What is Hypertext Transfer Protocol (HTTP) ?
100. What is URL ?
102. What is HTML ?

Full Forms

Full Forms


USB - Universal Serial Bus

SAP - System Application & Products

Computer – Commonly Operated Machine Particularly Used for Technology Education and Research


ERP - Enterprise Resource Planning

MIS - Management Information Systems

Virus – Vital Information Resources Under Seize

DVD - Digital Video Disk or Digital Versatile Disc

WWW - World Wide Web

SQL - Structured Query Language

IT - Information Technology

AJAX – Asynchronous JavaScript and XML

SPSS - Statistical Package for the Social Sciences

HP   =  Hewlett Packard


SMPS - Switched-Mode Power Supply

PDF - Portable Document Format

How to create a symbolic folder

How to create a symbolic folder

TRickS 1:-
*Create a folder and rename it

* Activate NmLk Button

   *press Alt+2

lets enjoy with your smile symbolic folder


Tricks 2:-

*At fast create a folder than rename it CON or AUX
lets do it..

How to create a folder with out any name

How to create a folder with out any name

1.Simple  create a folder and right click on this folder and click on Rename option

2. Now activate NmLk Button. [eg-press Funcation key(Fn) and press NmLk button which is by default in my laptop]

****Press Alt+255



[note-dont lose tha alt button when press 255]

Top 10 keyboard shortcuts everyone should know

Top 10 keyboard shortcuts everyone should know


Copy:
Ctrl+C or Ctrl+Insert

Paste:-
Ctrl+V or Shift+Insert

Undo:-
Ctrl+Z

Redo:-
Ctrl+Y

Find:
Ctrl+F

Save:
Ctrl+S

Close Any Apllication
Ctrl+Alt+Delete

Move Backwards:
Alt+Tab

Print preview:
Ctrl+P

RUN:
Windows key + R

Quick Shutdown Windows

Quick Shutdown Windows By Giri
Windows XP tricks:-
*Press windows key than press U U
Example-[windows key ][ U ][ U ]

Windows 8 or Windows 8.1 tricks:-
* Atfast press WINDOWS KEY + I
than click on Power button and press Shutdown Button

Example:-

Windows 8.1 tricks:-
Press windows key +x button than goto shutdown or signout and click Shut down.a

How to Installed java

How to Installed java

1. At fast installed java software which in available in the website ,after finished download you installed it.

2. Open command prmt and type javac. if that time showing some msg like"java c is not recognized as an internal or extranal cmd, that means you set path.

SET the PATH:-

* search the Bin folder which is include program file means where you instlled java file than right click on BIN folder and click on properties button and copy tha file location .
EXAMPLE-"C:\Program Files\Java\jdk1.7.0_02\bin;"->this is file location

*Now right click on tha My computer or This pc,than click on Properties button &  Advance System setting and click Environment Variable .
* click on NEW and enter the Variable name-PATH & Variable Value-"file location"[eg-"C:\Program Files\Java\jdk1.7.0_02\bin;"]

Example:-

*After finished the PATH setting you go to CMD Prmt and type javac ..

HOW TO RUN JAVA PROGRAM useing CMD Prmt:-
#open CMD prmt..

* type -cd/

*type-cd folder name

#type- javac filename.java
#type- java

[note:- dont miss" ;" this symbol when you set your path and dont rename variable name, its allways used PATH]

How To Create a PDF file

How To Create a PDF file


1. Open you browser than goto type  www.google.com  and search save as PDF.exe download or
click on download  button < download>
2. Installed this exe file than open MS word and click on file option, and click on save as PDF button.


[note-other wise you have used msword2010 or 2013 this PDF option all ready include in save as type button]
Email This
BlogThis!

How to save webpage in PDF format by giri

How to save webpage in PDF format


1. You must used Google Chrome browser which is available on Website .

*Open any site in Chrome Browser & press Ctrl+P button than open a tag select the destination "Save as PDF" and save it.
 now enjoy your webpage in a PDF format

 Example:----



[note-ctrl+p means both key r pressing same time don't press + sign ]

Gniit SEM A MT2 Dumps C#


  1. You are creating a Windows-based application that takes age from the user. The application should convert the age from character data type to integer data type. Which of the following functions you need to use to accomplish the desired task?
 1, Convert.ToInt32
2, convert.ToInt32
3, Parse.ToInt32
4, Convert.ToInt

  • 2.The _______ model is based on a real world perception that comprises a collection of objects or entities and the relationships among these.
1, ER
2, Network
3, Hierarchical
4, Relational
3.The ABC University used to offer a course in Visual Basic. However, due to less demand of the subject, the university dropped the course from its IT curriculum. This resulted in modification of the complete IT curriculum. Identify the type of entity that the Visual Basic course is.
1, Independent entity
2, Dependent entity
3, Weak entity
4, Subentity
4. A computer institute offers courses on various programming languages for students. The students can select any number of offered courses. Which type of relationship exists between the students and offered courses?
1, One-to-Many Relationship
2, Many-to-One relationship
3, Many-to-Many Relationship
4, One-to-One relationship
5. Sam is accessing a table that contains details of all the employees of his organization. He needs to retrieve the details of those employees who have more than $10000 salary per month. He has decided to use the PRODUCT relational operator to accomplish this task. However, his manager has informed him that the use of this relational operator will not give the desired result. Analyze the situation and provide the operator that Sam should use.
1, PROJECT
2, UNION
3, DIVIDE
4, RESTRICT
6. Smith works as a Manager in TechnoWorld, Inc. He manages and evaluates the performance of his team. Identify the entities and relationship in the given scenario.
1, Entities: Smith, team
Relationship: manage
2, Entities: Smith
Relationship: manage and evaluate
3, Entities: Smith, team
Relationship: evaluate
4, Entities: Smith,        team        Relationship: manage and evaluate
7. Identify the type of relationship in the following sentence: Software engineers can work on various programming languages.
1, One-to-One Relationship
2, Many-to-One Relationship
3, One-to-Many Relationship
4, Many-to-Many Relationship
8. There are _______ types of relationships that exist between entities.
1, one
2, two
        3, three   
4, four
9. Peter is working as a Senior Software Engineer in NewSol, Inc. His Employee ID is N0065. He joined the organization on 19 Aug, 2008. Identify the attributes of the entity instance.
1, Date of joining(19 Aug, 2008), Employee_ID(N0065), and Designation(Senior Software Engineer).
2, Employee_ID(N0065) and Designation(Senior Software Engineer).
3, Date of joining(19 Aug, 2008) and  Employee_ID(N0065)
4, Employee_ID (N0065)
10. Peter has been given a task to simplify a database structure. He has to represent the data and the relationships among them in the form of rows and columns. He has decided to use the Network model for completing this task. However, his manager has informed him that the use of this model will not generate the desired result. Analyze the situation and provide the correct model that Peter should use.
1, Hierarchical model
2, Conceptual model
                 3, Relational model
4, ER Model
11. Sam is working on two tables, Employee Details and Department Details. The Employee Details table contains employee ID, employee name, department ID, and designation of all employees. The  Department Details table contains department ID and department names. Sam has to retrieve the name of the department that has the maximum number of employees working. Which operator should Sam select for the given scenario?
1, Join
2, Intersect
3, Union
4, Product
12. Subtypes are connected to the supertype by a relationship known as _________.
1, one-to-one
2, one-to-many
3, many-to-many
 4, unnamed
13. __________ is a scientific method of breaking down complex table structures into simple table structures by using certain rules.
1, Normalization
2, Renormalization
3, Functional Dependency
4, Specialization
14. When each cell of the table contains precisely one value, the table is said to be in the ______ normal form.
1, first
2, second
3, third
4, Boyce-Codd
15. Jim works as a database administrator in TechnoSol, Inc. He has a table that contains details of employees and location of the meetings they have attended in the last one year. Jim has to normalize the table. The table columns consist the details of Employee ID, Department ID, meeting date, and location of the meeting. On analyzing the table he found that meeting date and location of the meeting columns consist of more than one value in each cell. Jim has decided to normalize the table by using second normal form. However, his manager has informed him that using second normal form for the given scenario will not be correct. Analyze the situation and provide the normal form that Jim should use.
1, BCNF             2, First normal form         3, Second normal form       4, Third normal form
16. A table lists the details of all the students studying in an institute. Identify the determinant among the four columns of the given table. Click the Exhibit button to view the table.
1, Student Name       2, Student Roll Number         3, Student Address       4, Student Fathers’ Name
17. Which of the following sentences is CORRECT about second normal form?
1, A table is said to be in second normal form if Boyce-Codd normal form is applied to it.
2, A table is said to be in second normal form when every attribute in a row is not functionally dependent on any particular key.
3,A table is said to be in second normal form, when every attribute in a row is dependent on just part of the whole key.
          4, A table is said to be in second normal form, when every attribute in a row is functionally dependent upon the whole key, and not just part of the key.
18. A table is said to be in _____ normal form when it is in second normal form and every non-key attribute is functionally dependent only on the primary key.
1, first      2,fourth           3, third           4, Boyce-Codd
19. Which of the following processes can increase disk space utilization?
1, Normalization        2, Denormalization  3,Generalization     4, Specialization
20. Stella is working on a table that contains the details of students who have appeared for different course exams. She has to normalize the table. The primary key of the given table is Roll Number + Exam Code. On analyzing, Stella found that any modification in Student Name column will lead to modification in the whole table and Student Name + Exam Code can also be chosen as the primary key. To avoid this redundancy, which normal form should Stella select? Click the Exhibit button to view the table.
1, 1NF     2, 2NF      3, 3NF        4, BCNF
21. Jim is working on an ER diagram. He has been instructed by his manager to map the given ER diagram to its corresponding tables. On analyzing the whole ER diagram, he is planning to create a table called Account Details. However, his colleague has advice him that creating only one table will not give the desired result. Analyze the given ER diagram and provide the tables that Jim should create.
1, Account Details  and Saving Account Details
2, Account Details , Current Account Details ,and Saving Account Details
3, Salary Account Details , Current Account Details ,and Saving Account Details
4, Account Details, Salary Account Details , Current Account Details ,and Saving Account Details
22. The _________ operator builds a relation from tuples appearing in either or both of the specified relations.
1, Project         2, Divide         3, Join         4, Union
23. The ________ model represents all data in a database as simple tables in the row-column format.
1, Relational           2, Hierarchical         3, Network         4, ER
24. Replacing optional attributes with subentities is called __________.
1, denormalization         2, normalization         3, generalization         4, specialization
25. Which of the following sentences is NOT correct about normalization?
3, There should be atleast one column that accepts a NULL value.
26. Which of the following sentences is NOT true about an attribute?
4, It cannot refer to another entity.
27. The Employee_Details table lists the details of an employee. If Employee ID is the primary key, identify the alternate key in the table?
  1. Click the Exhibit button to view the table.
2, Designation Code
28. In the database structure, a table is called by which of the following name?
3, Relation
29. Jack is working on a table that describes salary details of an employee. Which of the columns in the table will you use to uniquely identify all the rows of the table? Click the Exhibit button to view the table.
1, Employee ID +Account Number
30. Ryan is working on a table containing details of projects that the students have submitted after completing a course on a specific programming language.
31. The primary key in the table is Student ID + Project Code. Ryan is thinking of applying third normal form to simplify the table structure. On discussing with his senior, he found that his decision of selecting the third normal form is not correct. Analyze the given table and identify which normal form should Ryan select.
Click the Exhibit button to view the table.
2, Second Normal Form
32. John is working on a table that includes the details of employees and their departments. He has to normalize that table. The primary key of that table is Employee ID. Which normal form should he choose to simplify the table? Click the Exhibit button to view the table.
3, 3NF
33. Which of the following commands is used to initiate a chat session in Linux?
2, talk
34. Joe is communicating with Jack by using the Chat utility of Linux. Now, he wants to end the chat session. Which of the following commands would help him do so?
1, Ctrl + C keys
35. Kim has logged on to the Linux system. She received a query from the customer. To resolve the query, she has to communicate with the back office. Identify the correct sequence of steps that she needs to follow to communicate with the back office.
1, 1. Identify the user with whom she needs to communicate.
2. Check whether the user is online and ready to receive messages.
3. Identify the mechanism for communication.
4. Identify the contents of the message.
36. Joe is working on a Linux system. He has to chat with Angela. He first wants to check whether Angela is online and ready to receive messages. For this, he types the following command at the shell prompt and presses the Enter key:
  1. who
    However, the preceding command displays the list of currently logged on users. This list does not indicate whether the user is ready to receive messages. Identify the correct command that Joe should use to accomplish the required task?
2, who -T
37.  Which of the following options is NOT an example of Mail User Agent (MUA)?
4, sendmail
38. Which of the following statements is a function of Mail User Agent (MUA)?
4, MUA is used to read the message at the recipient’s end.
39. Jack is working on his Linux system. His boss has sent him a mail that lists the tasks to be performed by Jack. Jack has to access his inbox to read the new mails received on his Linux system. Identify the correct sequence of steps that Jack needs to follow to read the new mails.
3, 1. Type pine at the shell prompt, and press Enter.
2. Press L.
3. Select the relevant mail by using the up and down-arrow keys.
4. Press Enter.
40. Julia is logged on to the Linux system. She has to access her Inbox to read mails. She invoked the pine MUA and pressed the S key to display the list of folders. Analyze whether Julia has pressed the correct key to display the list of folders. If not, provide the correct solution.
2, No, Julia needs to press the L key.
41. Which of the following options do you need to press on the main menu of pine to configure the pine options?
1, S
42. You have sent a mail by using the pine utility of Linux. Now, you need to verify whether the mail has been sent or not. How will you perform this task?
3, By checking the contents of the sent-mail folder.
43. You have sent an E-mail to your friend by using the pine utility of Linux. After you have sent the mail, its copy is saved automatically in the sent-mail folder. Now, you need to verify this by checking the content of the sent-mail folder. Which of the following sequence of steps do you follow to perform this task?
1, 1. Press the M key.
2. Select the Folders List option, and press Enter.
3. Select the sent-mail option from the Folders List by using the Tab key, and press Enter.
44. You have a Linux system. You have to send an E-mail to your friend. For this, you performed the followed steps:
  1. 1. Type pine at the shell prompt, and press Enter.
    2. Press C.
    3. Type the name of the recipient in the To: block, and press Enter.
    4. Type the subject in the Subject: block, and press Enter.
    5. Type the contents of the mail.
    6. Press the Ctrl and C keys to send the e-mail.However, you are not able to send the e-mail by using the preceding steps. Identify the problem and provide the correct solution.
4, At step 6, the Ctrl and X keys should be pressed to send the E-mail.
45. Which of the following statements is NOT the correct file naming guideline of the Linux operating system?
2, A file name can have maximum of 286 characters.
46. Which of the following options do you need to press to switch to the Insert mode and then type the contents at the current cursor position of the vi editor?
1, i
47. Which of the following commands can be used to replace a character at the current cursor position and switch back to the Command mode?
4, r
48. You have written a file by using the vi editor. Now, you need to save the file by the name myfile.txt. Which of the following steps do you need to follow to save the file and close the vi editor?
1, 1. Press the Esc key.
2. Type :w /home/Complaints/myfile.txt, and press Enter.
3. Type :q, and press Enter.
49. You have opened a file in the vi editor. You have to make some changes in the third line of the file. The cursor is currently at the end of the second line. To make changes in the third line, you pressed the k command. However, the cursor moved to the first line instead of the third line. Analyze the situation and provide the correct command that should have been used to move the cursor from the second to the third line.
1, You need to press the j command to move to the third line.
50. You have to view the files stored in the /home/bill directory. You are currently in the bill directory. Which of the following commands would you use for this purpose?
1, ls
51. There are three files in the /home/math directory. The file names are math001.2009, math002.2009, and math003.2009. You need to copy all the files in the /home/math directory to the /home/backup directory. You are currently in the math directory. Which of the following commands would you use to perform this task?
4, cp /home/math/math00[1-3].2009 /home/backup
52. There is a file named myfile001.txt in the /home/mydir directory. You need to rename the file to myfile002.txt. You are currently in the mydir directory. For this, you typed the following command at the shell prompt:
  1. rm /home/mydir/myfile001.txt /home/mydir/myfile002.txt
    Analyze and predict whether the preceding command is able to accomplish the required task. If not, predict the correct command.
2, No, the correct command is:
mv /home/mydir/myfile001.txt /home/mydir/myfile002.txt
53. ABC Bank is offering personal loans to its customers at reduced interest rates. This offer is valid for only a limited period. The bank intends to use a software application to record all loan details. The bank wants that once the offer period ends, the interest rates and other details such as loan limits are changed to the original values. The bank does not want to modify the complete software application as a result of change in such loan details. Identify the tier on which the bank should place such details in order to accomplish their requirement.
3, Business tier

Aptitude Questions

(Datatypes C#)




1. 
Which of the following statements are correct about data types?

1.            If the integer literal exceeds the range of byte, a compilation error will occur.
2.            We cannot implicitly convert non-literal numeric types of larger storage size                  to byte.
3.            Byte cannot be implicitly converted to float.
4.            A char can be implicitly converted to only int data type.
5.            We can cast the integral character codes.
A.
1, 3, 5
B.
2, 4
C.
3, 5
D.
1, 2, 5   

2. 
Which of the following is an 8-byte Integer?
A.
Char
B.
Long
C.
Short
D.
Byte
E.
Integer          

4. 
Which of the following statements is correct?
A.
Information is never lost during narrowing conversions.
B.
The CInteger() function can be used to convert a Single to an Integer.
C.
Widening conversions take place automatically.
D.
Assigning an Integer to an Object type is known as Unboxing.
E.
3.14 can be treated as Decimal by using it in the form 3.14F.

5. 
Which of the following are value types?
1.            Integer
2.            Array
3.            Single
4.            String
5.            Long
A.
1, 2, 5
B.
1, 3, 5
C.
2, 4
D.
3, 5

6. 
Which of the following does not store a sign?
A.
Short
B.
Integer
C.
Long
D.
Byte
E.
Single

7. What is the size of a Decimal?
A.
4 byte
B.
8 byte
C.
16 byte
D.
32 byte

8. 
Which of the following is the correct size of a Decimal datatype?
A.
8 Bytes
B.
4 Bytes
C.
10 Bytes
D.
16 Bytes
E.
None of the above.



(Networking)


1. 
How long is an IPv6 address?
A.
32 bits
B.
128 bytes
C.
64 bits
D.
128 bits


2. 
What flavor of Network Address Translation can be used to have one IP address allow many users to connect to the global Internet?
A.
NAT
B.
Static
C.
Dynamic
D.
PAT

3. 
What are the two main types of access control lists (ACLs)?
1.            Standard
2.            IEEE
3.            Extended
4.            Specialized
A.
1 and 3
B.
2 and 4
C.
3 and 4
D.
1 and 2