Below are few sample questions compiled on the basis of latest recruitment papers of the company. These are technical questions and have been solved for you. You can expect questions of similar nature in the placement tests.
1)Name any two models of SDLC (Software Design Life Cycle) ?
Answer:
Water Fall Model and Spiral Model. (There are several other models as well which you could answer.)
2)What is the use of HTTPS protocol and how it differs from HTTP ?
Answer:
HTTPS transmits HTTP interactions via secured channel (encrypted). HTTPS is used for secured data transmissions over network where HTTP might not be a safer option.
3)Name the data structure that uses a hash function to map keys to their associated values.
Answer:
Hast Table or Hash Map.
4)Expansion of CDMA ?
a) Code Division Multiple Access
b) Cell Data Multiple Access
c) Code Data Multiple Access
d) None of the above.
Answer:
The above aptitude question is from communication systems. However this question is a basic one which
everyone should remember. The answer is
a)Code Division Multiple Access. You could expect similar
questions like expansion of GSM, GPS etc in wipro placement papers.
5)Which of the following layers are not in TCP / IP?
a) Application Layer
b) Network Layer
c) Bridging Layer
d) Data Link Layer
Answer:
c) Bridging Layer. You can always expect one or two questions from computer networks in
Wipro papers.
6)What will printf(++i) in C will do?
a) Print i and then increment i by 1
b) Increment i by 1 and then print i
c) Print i and then increment i by i
d) Increment i by i and then print i
Answer:b)Increment i by 1 and then print i
This is one common question which you can expect in Wipro Papers. These kinds of questions dealing with
basics of C statements are common in other company placemente papers as well. This includes TCS,
Accenture, HCL, HP etc.
7)What is the function of assembler?
a) Converts assembly to binary code
b) Converts high level language code into assembly code
c) Interprets and executes assembly code
d) Noe of the above
Answer a) Assembly to binary code
Wipro Solved Placement Papers - Technical
8) A 2 mb PCM (Pulse Code Modulation) has
a)32 voice channels
b)30 voice channels & 1 signalling channel
c)31 voice chanels & 1 signalling channel
d)32 channels out of which 30 voice channels, 1 signalling channel and 1 syncronization channel.
Answer is :31 voice chanels & 1 signalling channel
9) Word alignment is
a)alligning the address to the next word boundary of the machine
b)alligning to even boundary
c)alligning to word boundary
d)none of the above
Answer is : alligning the address to the next word boundary of the machine
10) To send a packet data using datagram, connection will be established..
a)before data transmission
b)connection is not establshed before data transmission
c)no connection required
d)none of the above
Answer is : no connection required
11) The status of the kernel is?
a)task
b)process
c)not defined
d)none of the above
The correct asnwer is : Process
12) Explain the use of the WHERE clause.
Answer: It directs SQL to extract data from rows where the value of the column is the same as the current value of the WHERE clause variable.
13) What technique is used to retrieve data from more than one table in a single SQL statement?
Answer:The Join statement combines data from more that two tables
14) What is a foreign key?
Answer: It identifies a related row in another table and establishes a logical relationship between rows in two tables.
15) What are the reasons for adding an index to a table ?
Answer: To increase lookup performance. For a unique key to guarantee the uniqueness of the values for a column on a table.
16) What is PL/SQL ?
Answer: A programming language available in Oracle. It is a way of wrapping SQL with 3GL constructs such as IF..THEN..ELSE, WHILE etc.
17) What is locking and what is it used for ?
Answer: Locking is a mechanism to restrict access to data. It prevents one user updating data whilst another user is looking at it.
18) What types of locking are available with Oracle?
Answer: Row locking and table locking.
19) What happens if a tablespace clause is left off of a primary key constraint clause?
Answer: This results in the index that is automatically generated being placed in the users default tablespace. Since this will usually be the same tablespace as the table is being created in, this can cause serious performance problems.
20) In 8085 microprocessor READY signal does.which of the following is incorrect statements
[a] It is input to the microprocessor
[b] It sequences the instructions
Answer: It sequences the instructions
21) int zap(int n)
{
if(n<=1)then zap=1;
else zap=zap(n-3)+zap(n-1);
}
then the call zap(6) gives the values of zap
[a] 8
[b] 9
[c] 6
[d] 12
[e] 15
Answer : 9
22) Virtual memory size depends on
[a] address lines
[b] data bus
[c] disc space
[d] a & c
[e] none
Answer :8
23) load a
mul a
store t1
load b
mul b
store t2
mul t2
add t1
then the content in accumulator is
Answer : a**2+b**4
24)Consider a string variable stroriginal holding a string value in its memory. Consider the following lines of C code.
strcpy(strdummy,stroriginal);
strreversed = strrev(strdummy);
If stroriginal is a palindrome which of the following statements is true.
a) strcmp(stroriginal,strreversed) is 0
b) strcmp(stroriginal,strrev(strreversed)) is 1
c) strcmp(stroriginal,strreversed) is 1
Answer:
Option a) is the right answer. If the string is a palindrome the strcmp will return 0 while comparing the original and the reversed string.
Placement Question 2
25)Consider the following lines of C code :
int i,j,summ,lim;
i=0;
j=1;
for(lim = 1; lim <= 10; lim++)
{
summ = j + i;
i = j;
j = sum;
printf("%d",summ);
}
What kind of sequence the above code will generate ?
a) Even Numbers
b) Arithmetic Progression
c) Fibonacci Series
Answer2
The above code would generate option c) Fibonacci Series
26)State True or False. Recursion Type Programming can be used to generate Fibonacci series in C
Answer:True.
Fibonacci series can be generated by recursion programming.
Thanks for reading you can comment and can query us.
1)Name any two models of SDLC (Software Design Life Cycle) ?
Answer:
Water Fall Model and Spiral Model. (There are several other models as well which you could answer.)
2)What is the use of HTTPS protocol and how it differs from HTTP ?
Answer:
HTTPS transmits HTTP interactions via secured channel (encrypted). HTTPS is used for secured data transmissions over network where HTTP might not be a safer option.
3)Name the data structure that uses a hash function to map keys to their associated values.
Answer:
Hast Table or Hash Map.
4)Expansion of CDMA ?
a) Code Division Multiple Access
b) Cell Data Multiple Access
c) Code Data Multiple Access
d) None of the above.
Answer:
The above aptitude question is from communication systems. However this question is a basic one which
everyone should remember. The answer is
a)Code Division Multiple Access. You could expect similar
questions like expansion of GSM, GPS etc in wipro placement papers.
5)Which of the following layers are not in TCP / IP?
a) Application Layer
b) Network Layer
c) Bridging Layer
d) Data Link Layer
Answer:
c) Bridging Layer. You can always expect one or two questions from computer networks in
Wipro papers.
6)What will printf(++i) in C will do?
a) Print i and then increment i by 1
b) Increment i by 1 and then print i
c) Print i and then increment i by i
d) Increment i by i and then print i
Answer:b)Increment i by 1 and then print i
This is one common question which you can expect in Wipro Papers. These kinds of questions dealing with
basics of C statements are common in other company placemente papers as well. This includes TCS,
Accenture, HCL, HP etc.
7)What is the function of assembler?
a) Converts assembly to binary code
b) Converts high level language code into assembly code
c) Interprets and executes assembly code
d) Noe of the above
Answer a) Assembly to binary code
Wipro Solved Placement Papers - Technical
8) A 2 mb PCM (Pulse Code Modulation) has
a)32 voice channels
b)30 voice channels & 1 signalling channel
c)31 voice chanels & 1 signalling channel
d)32 channels out of which 30 voice channels, 1 signalling channel and 1 syncronization channel.
Answer is :31 voice chanels & 1 signalling channel
9) Word alignment is
a)alligning the address to the next word boundary of the machine
b)alligning to even boundary
c)alligning to word boundary
d)none of the above
Answer is : alligning the address to the next word boundary of the machine
10) To send a packet data using datagram, connection will be established..
a)before data transmission
b)connection is not establshed before data transmission
c)no connection required
d)none of the above
Answer is : no connection required
11) The status of the kernel is?
a)task
b)process
c)not defined
d)none of the above
The correct asnwer is : Process
12) Explain the use of the WHERE clause.
Answer: It directs SQL to extract data from rows where the value of the column is the same as the current value of the WHERE clause variable.
13) What technique is used to retrieve data from more than one table in a single SQL statement?
Answer:The Join statement combines data from more that two tables
14) What is a foreign key?
Answer: It identifies a related row in another table and establishes a logical relationship between rows in two tables.
15) What are the reasons for adding an index to a table ?
Answer: To increase lookup performance. For a unique key to guarantee the uniqueness of the values for a column on a table.
16) What is PL/SQL ?
Answer: A programming language available in Oracle. It is a way of wrapping SQL with 3GL constructs such as IF..THEN..ELSE, WHILE etc.
17) What is locking and what is it used for ?
Answer: Locking is a mechanism to restrict access to data. It prevents one user updating data whilst another user is looking at it.
18) What types of locking are available with Oracle?
Answer: Row locking and table locking.
19) What happens if a tablespace clause is left off of a primary key constraint clause?
Answer: This results in the index that is automatically generated being placed in the users default tablespace. Since this will usually be the same tablespace as the table is being created in, this can cause serious performance problems.
20) In 8085 microprocessor READY signal does.which of the following is incorrect statements
[a] It is input to the microprocessor
[b] It sequences the instructions
Answer: It sequences the instructions
21) int zap(int n)
{
if(n<=1)then zap=1;
else zap=zap(n-3)+zap(n-1);
}
then the call zap(6) gives the values of zap
[a] 8
[b] 9
[c] 6
[d] 12
[e] 15
Answer : 9
22) Virtual memory size depends on
[a] address lines
[b] data bus
[c] disc space
[d] a & c
[e] none
Answer :8
23) load a
mul a
store t1
load b
mul b
store t2
mul t2
add t1
then the content in accumulator is
Answer : a**2+b**4
24)Consider a string variable stroriginal holding a string value in its memory. Consider the following lines of C code.
strcpy(strdummy,stroriginal);
strreversed = strrev(strdummy);
If stroriginal is a palindrome which of the following statements is true.
a) strcmp(stroriginal,strreversed) is 0
b) strcmp(stroriginal,strrev(strreversed)) is 1
c) strcmp(stroriginal,strreversed) is 1
Answer:
Option a) is the right answer. If the string is a palindrome the strcmp will return 0 while comparing the original and the reversed string.
Placement Question 2
25)Consider the following lines of C code :
int i,j,summ,lim;
i=0;
j=1;
for(lim = 1; lim <= 10; lim++)
{
summ = j + i;
i = j;
j = sum;
printf("%d",summ);
}
What kind of sequence the above code will generate ?
a) Even Numbers
b) Arithmetic Progression
c) Fibonacci Series
Answer2
The above code would generate option c) Fibonacci Series
26)State True or False. Recursion Type Programming can be used to generate Fibonacci series in C
Answer:True.
Fibonacci series can be generated by recursion programming.
Thanks for reading you can comment and can query us.
No comments:
Post a Comment