Point To Remember: Is An Object?
Point To Remember: Is An Object?
1. What is your strongest programming language (Java, ASP, C, C++, VB, HTML, C#, etc.)?
Point to remember: Before interview You should decide your Favorite programming language and be
prepared based on that question.
2.Differences between C and Java?
1.JAVA
is
Object-Oriented
while
C
is
procedural.
2.Java
is
an
Interpreted
language
while
C
is
a
compiled
language.
3.C
is
a
low-level
language
while
JAVA
is
a
high-level
language.
4.C uses the top-down approach while JAVA uses the bottom-up approach.
5.Pointer go backstage in JAVA while C requires explicit handling of pointers.
6.The Behind-the-scenes Memory Management with JAVA & The User-Based Memory Management in
C.
7.JAVA supports Method Overloading while C does not support overloading at all.
8.Unlike C, JAVA does not support Preprocessors, & does not really them.
9.The standard Input & Output Functions--C uses the printf & scanf functions as its standard input &
output
while
JAVA
uses
the
System.out.print
&
System.in.read
functions.
10.Exception Handling in JAVA And the errors & crashes in C.
3.In header files whether functions are declared or defined?
Functions are declared within header file. That is function prototypes exist in a header file,not function
bodies. They are defined in library (lib).
4.What
are
the
different
storage
classes
in
There are four types of storage classes in C. They are extern, register, auto and static
5.What
does
static
variable
mean?
Static is an access qualifier. If a variable is declared as static inside a function, the scope is limited to
the function,but it will exists for the life time of the program. Values will be persisted between
successive
calls to a function
6.How
do
you
Use %p in printf to print the address.
an
address
7.What
are
macros?
what
are
its
advantages
and
disadvantages?
Macros are processor directive which will be replaced at compile time.
The disadvantage with macros is that they just replace the code they are not function calls. similarly the
advantage is they can reduce time for replacing the same values.
8.Difference between pass by reference and pass by value?
Pass by value just passes the value from caller to calling function so the called function cannot modify
the values in caller function. But Pass by reference will pass the address to the caller function instead
of value if called function requires to modify any value it can directly modify.
9.What
is
an
object?
Object is a software bundle of variables and related methods. Objects have state and behavior
10.What
is
a
class?
Class is a user-defined data type in C++. It can be created to solve a particular kind of problem. After
creation the user need not know the specifics of the working of a class.
11.What
is
the
difference
between
class
and
structure?
Structure: Initially (in C) a structure was used to bundle different type of data types together to perform
a particular functionality. But C++ extended the structure to contain functions also.
The major difference is that all declarations inside a structure are by default public.
Class: Class is a successor of Structure. By default all the members inside the class are private.
12.
What
is
ponter?
Pointer is a variable in a program is something with a name, the value of which can vary. The way the
compiler
and
linker
handles
this
is
that
it
assigns
a specific block of memory within the computer to hold the value of that variable.
13.What
is
the
difference
between
null
and
void
pointer?
A Null pointer has the value 0. void pointer is a generic pointer introduced by ANSI. Generic pointer
can hold the address of any data type.
14.what is function overloading
Function overloading is a feature of C++ that allows us to create multiple functions with the same
name, so long as they have different parameters.Consider the following function:
int
Add(int
nX,
int
nY)
{
return
nX
+
nY;
}
15.What is function overloading and operator overloading?
Function overloading: C++ enables several functions of the same name to be defined, as long as
these functions have different sets of parameters (at least as far as their types are concerned). This
capability is called function overloading. When an overloaded function is called, the C++ compiler
selects the proper function by examining the number, types and order of the arguments in the call.
Function overloading is commonly used to create several functions of the same name that perform
similar
tasks
but
on
different
data
types.
Operator overloading allows existing C++ operators to be redefined so that they work on objects of
user-defined classes. Overloaded operators are syntactic sugar for equivalent function calls. They
form a pleasant facade that doesn't add anything fundamental to the language (but they can improve
understandability and reduce maintenance costs).
An abstract class is a class which does not fully represent an object. Instead, it represents a broad
range of different classes of objects. However, this representation extends only to the features that
those classes of objects have in common. Thus, an abstract class provides only a partial description of
its objects.
19.What is the difference between realloc() and free()?
The free subroutine frees a block of memory previously allocated by the malloc subroutine. Undefined
results occur if the Pointer parameter is not a valid pointer. If the Pointer parameter is a null value, no
action will occur. The realloc subroutine changes the size of the block of memory pointed to by the
Pointer parameter to the number of bytes specified by the Size parameter and returns a new pointer
to the block. The pointer specified by the Pointer parameter must have been created with the malloc,
calloc, or realloc subroutines and not been deallocated with the free or realloc subroutines. Undefined
results occur if the Pointer parameter is not a valid pointer.
23. Can you list out the areas in which data structures are applied extensively?
Compiler
Operating
Database
Management
Statistical
analysis
Numerical
Graphics,
Artificial
Simulation
24.What are the advantages of inheritance?
Design,
System,
System,
package,
Analysis,
Intelligence,
It permits code reusability. Reusability saves time in program development. It encourages the reuse of
proven and debugged high-quality software, thus reducing problem after a system becomes
functional.
25. what are the two integrity rules used in DBMS?
The two types of integrity rules are referential integrity rules and entity integrity rules. Referential
integrity rules dictate that a database does not contain orphan foreign key values. This means that
A primary key value cannot be modified if the value is used as a foreign key in a child table. Entity
integrity dictates that the primary key value cannot be Null.
26. Tell something about deadlock and how can we prevent dead lock?
In an operating system, a deadlock is a situation which occurs when a process enters a waiting state
because a resource requested by it is being held by another waiting process, which in turn is waiting for
another resource. If a process is unable to change its state indefinitely because the resources
requested by it are being used by other waiting process, then the system is said to be in a deadlock.
Mutual Exclusion: At least one resource must be non-shareable.[1] Only one process can use the
resource
at
any
given
instant
of
time.
Hold and Wait or Resource Holding: A process is currently holding at least one resource and requesting
additional
resources
which
are
being
held
by
other
processes.
No Preemption: The operating system must not de-allocate resources once they have been allocated;
they
must
be
released
by
the
holding
process
voluntarily.
Circular Wait: A process must be waiting for a resource which is being held by another process, which
in turn is waiting for the first process to release the resource. In general, there is a set of waiting
processes, P = {P1, P2, ..., PN}, such that P1 is waiting for a resource held by P2, P2 is waiting for a
resource held by P3 and so on till PN is waiting for a resource held by P1.[1][7]
Thus prevention of deadlock is possible by ensuring that at least one of the four conditions cannot
hold.
27. What is Insertion sort, selection sort, bubble sort( basic differences among the functionality
of the three sorts and not the exact algorithms)
28. What is Doubly link list?
A doubly linked list is a linked data structure that consists of a set of sequentially linked records called
nodes. Each node contains two fields, called links, that are references to the previous and to the next
node in the sequence of nodes. The beginning and ending nodes' previous and next links, respectively,
point to some kind of terminator, typically a sentinel node or null, to facilitate traversal of the list. If there
is only one sentinel node, then the list is circularly linked via the sentinel node. It can be conceptualized
as two singly linked lists formed from the same data items, but in opposite sequential orders.
29.What is data abstraction? what are the three levels of data abstraction with Example?
Abstraction is the process of recognizing and focusing on important characteristics of a situation or
object and leaving/filtering out the un-wanted characteristics of that situation or object.
Lets take a person as example and see how that person is abstracted in various situations
A doctor sees (abstracts) the person as patient. The doctor is interested in name, height, weight, age,
blood
group,
previous
or
existing
diseases
etc
of
a
person
An employer sees (abstracts) a person as Employee. The employer is interested in name, age,
health, degree of study, work experience etc of a person.
Abstraction is the basis for software development. Its through abstraction we define the essential
aspects of a system. The process of identifying the abstractions for a given system is called as
Modeling (or object modeling).
Three
levels
of
data
abstraction
are:
1. Physical level : how the data is stored physically and where it is stored in database.
2. Logical level : what information or data is stored in the database. eg: Database administrator
3.View level : end users work on view level. if any amendment is made it can be saved by other name.
30.What is command line argument?
Getting the arguments from command prompt in c is known as command line arguments. In c main
function
has
three
arguments.They
are:
Argument
counter
Argument
vector
Environment
vector
31.Advantages
of
a
macro
over
a
function?
Macro gets to see the Compilation environment, so it can expand #defines. It is expanded by the
preprocessor.
Auto,register,static,extern
33.Which header file should you include if you are to develop a function which can accept
variable number of arguments?
stdarg.h
34.What is cache memory ?
Cache Memory is used by the central processing unit of a computer to reduce the average time to
access
memory.
The
cache
is
a
smaller,
faster
memory
which stores copies of the data from the most frequently used main memory locations. As long as most
memory
accesses
are
cached
memory
locations,
the
average
latency of memory accesses will be closer to the cache latency than to the latency of main memory.
35.What
is
debugger?
A debugger or debugging tool is a computer program that is used to test and debug other programs
36. Const char *p , char const *p What is the difference between the above two?
1) const char *p - Pointer to a Constant char ('p' isn't modifiable but the pointer is)
2) char const *p - Also pointer to a constant Char
However
if
you
had
something
like:
char * const p - This declares 'p' to be a constant pointer to an char. (Char p is modifiable but the
pointer isn't)
37. What is Memory Alignment?
Data structure alignment is the way data is arranged and accessed in computer memory. It consists of
two separate but related issues: data alignment and data structure padding.
38.Explain the difference between 'operator new' and the 'new' operator?
The difference between the two is that operator new just allocates raw memory, nothing else. The new
operator starts by using operator new to allocate memory, but then it invokes the constructor for the
right type of object, so the result is a real live object created in that memory. If that object contains any
other objects (either embedded or as base classes) those constructors as invoked as well.
39. Difference between delete and delete[]?
The keyword delete is used to destroy the single variable memory created dynamically which is pointed
by
single
pointer
variable.
Eg:
int
*r=new(int)
the
memory
pointed
by
r
can
be
deleted
by
delete
r.
delete [] is used to destroy array of memory pointed by single pointer variable.
Eg:int
*r=new(int
a[10])
The memory pointed by r can be deleted by delete []r.
40. What is conversion constructor?
A conversion constructor is a single-parameter constructor that is declared without the function specifier
'explicit'. The compiler uses conversion constructors to convert objects from the type of the first
parameter to the type of the conversion constructor's class.To define implicit conversions, C++ uses
conversion constructors, constructors that accept a single parameter and initialize an object to be a
copy of that parameter.
41.What
is
a
spanning
Tree?
A spanning tree is a tree associated with a network. All the nodes of the graph appear on the tree
once. A minimum spanning tree is a spanning tree organized so that the total edge weight between
nodes
is
minimized.
42. Why should we use data ware housing and how can you extract data for analysis with
example?
If you want to get information on all the techniques of designing, maintaining, building and retrieving
data, Data warehousing is the ideal method. A data warehouse is premeditated and generated for
supporting the decision making process within an organization.
Here are some of the benefits of a data warehouse:
o With data warehousing, you can provide a common data model for different interest areas
regardless of data's source. In this way, it becomes easier to report and analyze information.
o Many inconsistencies are identified and resolved before loading of information in data warehousing.
This makes the reporting and analyzing process simpler.
o The best part of data warehousing is that the information is under the control of users, so that in
case the system gets purged over time, information can be easily and safely stored for longer time
period.
o Because of being different from operational systems, a data warehouse helps in retrieving data
without slowing down the operational system.
o Data warehousing enhances the value of operational business applications and customer
relationship management systems.
o Data warehousing also leads to proper functioning of support system applications like trend reports,
exception reports and the actual performance analyzing reports.
45.What
is
scope
of
a
variable?
Scope refers to the visibility of variables. It is very useful to be able to limit a variable's scope to a single
function. In other words, the variable wil have a limited scope
46.What
is
an
interrupt?
Interrupt is an asynchronous signal informing a program that an event has occurred. When a
program receives an interrupt signal, it takes a specified action.
Applet is java program that can be embedded into HTML pages. Java applets runs on the java enables
web browsers such as mozila and internet explorer. Applet is designed to run remotely on the client
browser, so there are some restrictions on it. Applet can't access system resources on the local
computer. Applets are used to make the web site more dynamic and entertaining.
49.What do you know about the garbage collector?
Garbage collection is the systematic recovery of pooled computer storage that is being used by a
program when that program no longer needs the storage. This frees the storage for use by other
programs
(or processes within a program). It also ensures that a program using increasing amounts of pooled
storage does not reach its quota (in which case it may no longer be able to function).
Garbage collection is an automatic memory management feature in many modern programming
languages, such as Java and languages in the .NET framework. Languages that use garbage
collection are often interpreted or run within a virtual machine like the JVM. In each case, the
environment that runs the code is also responsible for garbage collection.
arr[],int
size,
right,
while(left
{
middle = ((left + right)/2);
<=
int
item)
middle;
0;
right)
if(item
{
return(middle);
}
==
arr[middle])
if(item
{
left
}
else
{
right
}
}
>
arr[middle])
middle+1;
middle-1;
return(-1);
}
Cryptography is the science of enabling secure communications between a sender and one or more
recipients. This is achieved by the sender scrambling a message (with a computer program and a
secret key) and leaving the recipient to unscramble the message (with the same computer program
and a key, which may or may not be the same as the sender's key).
There are two types of cryptography: Secret/Symmetric Key Cryptography and Public Key
Cryptography
54.What is encryption?
Encryption is the transformation of information from readable form into some unreadable form.
55.What is decryption?
Decryption is the reverse of encryption; it's the transformation of encrypted data back into some
intelligible form.
Electronics
1. What is Electronic?
The study and use of electrical devices that operate by controlling the flow of electrons or other
electrically charged particles.
2. What is communication?
Communication means transferring a signal from the transmitter which passes through a medium then
the output is obtained at the receiver. (or)communication says as transferring of message from one
place to another place called communication.
3. Different types of communications? Explain.
Analog
and
digital
communication.
As a technology, analog is the process of taking an audio or video signal (the human voice) and
translating it into electronic pulses. Digital on the other hand is breaking the signal into a binary format
where the audio or video data is represented by a series of "1"s and "0"s.
Digital signals are immune to noise, quality of transmission and reception is good, components used
in digital communication can be produced with high precision and power consumption is also very less
when compared with analog signals.
4. What is sampling?
The process of obtaining a set of samples from a continuous function of time x(t) is referred to as
sampling.
5. State sampling theorem.
It states that, while taking the samples of a continuous signal, it has to be taken care that the sampling
rate is equal to or greater than twice the cut off frequency and the minimum sampling rate is known as
the Nyquist rate.
6. What is cut-off frequency?
The frequency at which the response is -3dB with respect to the maximum response.
7. What is pass band?
Passband is the range of frequencies or wavelengths that can pass through a filter without being
attenuated.
8. What is stop band?
A stopband is a band of frequencies, between specified limits, in which a circuit, such as a filter or
telephone circuit, does not let signals through, or the attenuation is above the required stopband
attenuation level.
9. Explain RF?
Radio frequency (RF) is a frequency or rate of oscillation within the range of about 3 Hz to 300 GHz.
This range corresponds to frequency of alternating current electrical signals used to produce and
detect radio waves. Since most of this range is beyond the vibration rate that most mechanical
systems can respond to, RF usually refers to oscillations in electrical circuits or electromagnetic
radiation.
10. What is modulation? And where it is utilized?
Modulation is the process of varying some characteristic of a periodic wave with an external signals.
Radio communication superimposes this information bearing signal onto a carrier signal.
These high frequency carrier signals can be transmitted over the air easily and are capable of
travelling
long
distances.
The characteristics (amplitude, frequency, or phase) of the carrier signal are varied in accordance with
the
information
bearing
signal.
Modulation is utilized to send an information bearing signal over long distances.
11. What is demodulation?
Demodulation is the act of removing the modulation from an analog signal to get the original
baseband signal back. Demodulating is necessary because the receiver system receives a modulated
signal with specific characteristics and it needs to turn it to base-band.
12. Name the modulation techniques.
For
Analog
modulation--AM,
SSB,
FM,
PM
Digital modulation--OOK, FSK, ASK, Psk, QAM, MSK, CPM, PPM, TCM, OFDM
and
SM
to
1705
kHz.
25.
What
is
inductor?
An inductor is a passive electrical device employed in electrical circuits for its property of inductance.
An inductor can take many forms.
26. What is conductor?
A substance, body, or device that readily conducts heat, electricity, sound, etc. Copper is a good
conductor of electricity.
27. What is a semi conductor?
A semiconductor is a solid material that has electrical conductivity in between that of a conductor and
that of an insulator(An Insulator is a material that resists the flow of electric current. It is an object
intended to support or separate electrical conductors without passing current through itself); it can
vary over that wide range either permanently or dynamically.
28. What is diode?
In electronics, a diode is a two-terminal device. Diodes have two active electrodes between which the
signal of interest may flow, and most are used for their unidirectional current property.
29. What is transistor?
In electronics, a transistor is a semiconductor device commonly used to amplify or switch electronic
signals. The transistor is the fundamental building block of computers, and all other modern electronic
devices. Some transistors are packaged individually but most are found in integrated circuits
30. What is op-amp?
An operational amplifier, often called an op-amp , is a DC-coupled high-gain electronic voltage
amplifier with differential inputs[1] and, usually, a single output. Typically the output of the op-amp is
controlled either by negative feedback, which largely determines the magnitude of its output voltage
gain, or by positive feedback, which facilitates regenerative gain and oscillation.
31. What is a feedback?
Feedback is a process whereby some proportion of the output signal of a system is passed (fed back)
to the input. This is often used to control the dynamic behaviour of the system.
32. Advantages of negative feedback over positive feedback.
Much attention has been given by researchers to negative feedback processes, because negative
feedback processes lead systems towards equilibrium states. Positive feedback reinforces a given
tendency of a system and can lead a system away from equilibrium states, possibly causing quite
unexpected results.
33. What is Barkhausen criteria?
Barkhausen criteria, without which you will not know which conditions, are to be satisfied for
oscillations.
Oscillations will not be sustained if, at the oscillator frequency, the magnitude of the product of the
transfer gain of the amplifier and the magnitude of the feedback factor of the feedback network ( the
magnitude
of
the
loop
gain
)
are
less
than
unity.
The condition of unity loop gain -A = 1 is called the Barkhausen criterion. This condition implies that
A= 1and that the phase of - A is zero.
34. What is CDMA, TDMA, FDMA?
Code division multiple access (CDMA) is a channel access method utilized by various radio
communication technologies. CDMA employs spread-spectrum technology and a special coding
scheme (where each transmitter is assigned a code) to allow multiple users to be multiplexed over the
same physical channel. By contrast, time division multiple access (TDMA) divides access by time,
while
frequency-division
multiple
access
(FDMA)
divides
it
by
frequency.
An analogy to the problem of multiple access is a room (channel) in which people wish to
communicate with each other. To avoid confusion, people could take turns speaking (time division),
speak at different pitches (frequency division), or speak in different directions (spatial division). In
CDMA, they would speak different languages. People speaking the same language can understand
each other, but not other people. Similarly, in radio CDMA, each group of users is given a shared
code. Many codes occupy the same channel, but only users associated with a particular code can
understand each other.
35. explain different types of feedback
Types
of
feedback:
Negative feedback: This tends to reduce output (but in amplifiers, stabilizes and linearizes operation).
Negative feedback feeds part of a system's output, inverted, into the system's input; generally with the
result
that
fluctuations
are
attenuated.
Positive feedback: This tends to increase output. Positive feedback, sometimes referred to as
"cumulative causation", is a feedback loop system in which the system responds to perturbation (A
perturbation means a system, is an alteration of function, induced by external or internal mechanisms)
in the same direction as the perturbation. In contrast, a system that responds to the perturbation in the
opposite
direction
is
called
a
negative
feedback
system.
Bipolar feedback: which can either increase or decrease output.
36. What are the main divisions of power system?
The generating system,transmission system,and distribution system
37. What is Instrumentation Amplifier (IA) and what are all the advantages?
An instrumentation amplifier is a differential op-amp circuit providing high input impedances with ease
of gain adjustment by varying a single resistor.
38. What is meant by impedance diagram.
The equivalent circuit of all the components of the power system are drawn and they are
interconnected is called impedance diagram.
39.
What
is
the
need
for
load
flow
study.
The load flow study of a power system is essential to decide the best operation existing system and
for planning the future expansion of the system. It is also essential for designing the power system.
40. What is the need for base values?
The components of power system may operate at different voltage and power levels. It will be
convenient for analysis of power system if the voltage, power, current ratings of the components of the
power system is expressed with referance to a common value called base value