Tuesday 24 June 2014

ICICI Bank - Computer Awareness - 2

ICICI Bank – Computer Awareness - 2

Note: As I am not technically qualified I would advise the readers to check the answers for their correctness.

1.       What is done for a Push operation? 
Ans:  SP is decremented and then the value is stored.

2.       Binary equivalent of 52 
Ans:  110100

3.       Hexadecimal equivalent of 3452?
 Ans: 72A

4.       Explain Just In Time Concept? 
Ans:  Elimination of waste by purchasing manufacturing exactly when needed

5.       A good way of unit testing s/w program is 
Ans: . User test

6.       OOT uses 
Ans: . Encapsulated of detect methods

7.       EDI useful in 
Ans:  Electronic Transmission

8.       MRPII different from MRP 
Ans:  Modular version of man redundant initials

9.       Hard disk time for R/W head to move to correct sector 
Ans:  Latency Time

10.   The percentage of times a page number bound in associate register is called
Ans:  Bit ratio

11.   Expand MODEM 
Ans:  Modulator and Demodulator

12.   RDBMS file system can be defined as 
Ans:  Interrelated

13.   Super Key is
Ans:  Primary key and Attribute

14.   In the command scanf, h is used for 
Ans:  Short int

15.   A process is defined as
Ans:  Program in execution

16.   A thread is 
Ans:  Detachable unit of executable code)

17.   What is meant by polymorphism?
Ans:  Redefinition of a base class method in a derived class

18.   What is the essential feature of inheritance?
Ans:  All properties of existing class are derived

19.   What does the protocol FTP do?
Ans:  Transfer a file b/w stations with user authentication

20.   In the transport layer ,TCP is what type of protocol 
Ans:  Connection oriented

21.   Why is a gateway used 
Ans:  To connect incompatible networks

22.   How is linked list implemented 
Ans:  By referential structures

23.   What is a semaphore 
Ans:  A method synchronization of multiple processes

24.   What is the precedence order from high to low ,of the symbols ( ) ++ / 
Ans:  ( ) , ++, /

25.   Preorder of A*(B+C)/D-G 
Ans:  *+ABC/-DG

26.   What is the efficiency of merge sort 
Ans:   O(n log n)

27.   In which layer are routers used
Ans:  In network layer

28.   Which of the following sorting algorithm has average sorting behaviour –Bubble sort, merge sort, heap sort, exchange sort 
Ans:   Heap sort

29.   In binary search tree which traversal is used for getting ascending order values–In-order ,post order, pre-order 
Ans:  In-order

30.   What are device drivers used for? 
Ans: .To provide software for enabling the hardware


No comments:

Post a Comment