Professional Documents
Culture Documents
TITLE: Epson Sample Technical Placement Paper Level1 (Bolded option is your answer) 1. What will you do to treat the constant 3.14 as a long double? A use 3.14LD B use 3.14L C use 3.14DL D use 3.14LF
3. Which of the following cannot be checked in a switch-case statement? A Character B Integer C Float D enum
5. Which user action will not generate a server-side event? A Mouse Move B Text Change C Button Click D All of the above
6. What is the extension for a Visual Basic web form interface file? A .asp B .aspx C .asp.vb D aspx.vb
Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget freeupdates tomail https://groups.google.com/group/latestoffcampusLive updates on Facebook @ https://www.facebook.com/LatestOffCampus
Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget freeupdates tomail https://groups.google.com/group/latestoffcampusLive updates on Facebook @ https://www.facebook.com/LatestOffCampus
7. For every write() to a TCP socket, there must be a corresponding read() on the other end? A True B False C Both D None
8. A root DNS server contains all of the host-address mappings for every host on the Internet? A True B False C Both D None
10. The web typically sends multiple objects in a web page within a multipart MIME message? A True B False C Both D None
11. Twisted-pair cooper wire is no longer present in computer networks? A True B False C Both D None
12. Which of the following helps improve the performance of DNS? A Its distributed nature B Iterated requests C Caching D All of the above
13. Which of the following are benefits of an ISP increasing the number of connections to other ISPs in the Internet?
Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget freeupdates tomail https://groups.google.com/group/latestoffcampusLive updates on Facebook @ https://www.facebook.com/LatestOffCampus
Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget freeupdates tomail https://groups.google.com/group/latestoffcampusLive updates on Facebook @ https://www.facebook.com/LatestOffCampus
A Improved reliability
B Increased bandwidth
C Reduced delays
14. Which of the following approaches to switching share network resources? A Circuit switching B Packet switching C Both of the above D None of the above
15. Which of the following provides a connectionless transport service? A TCP B UDP C IP D HTTP
16. Which of the following provides a connection-oriented transport service? A TCP B UDP C IP D HTTP
18. Which of the following is used to contain an Internet standard? A RFC B IETF C DNS D PPP
19. The ability to recover and read deleted or damaged files from a criminal`s computer is an example of a law enforcement specialty called? A robotics B simulation C computer D animation forensics
Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget freeupdates tomail https://groups.google.com/group/latestoffcampusLive updates on Facebook @ https://www.facebook.com/LatestOffCampus
Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget freeupdates tomail https://groups.google.com/group/latestoffcampusLive updates on Facebook @ https://www.facebook.com/LatestOffCampus
20. _____terminals are often connected to complex inventory and sales computer systems? A Sale B Query C Point-of-sale D data conversion
21. Which of the following concepts means adding new components to a program as it runs? A Data hiding B Dynamic typing C Dynamic binding D Dynamic loading
22. A process known as ____________ is used by large retailers to study trends? A data mining B data selection C POS D data conversion
23. Which of the following approach is adapted by C++? ATop-down B Bottom-up C Right-left D Left-right
24. All of the following are examples of real security and privacy risks EXCEPT? A Hackers B Spams C Viruses D identity theft
25. Which of the following cables can transmit data at high speeds? A Coaxial cable B Optical fiber cable C Twisted pair cable D UTB cable
Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget freeupdates tomail https://groups.google.com/group/latestoffcampusLive updates on Facebook @ https://www.facebook.com/LatestOffCampus
Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget freeupdates tomail https://groups.google.com/group/latestoffcampusLive updates on Facebook @ https://www.facebook.com/LatestOffCampus
A Download node
B Star topology
C Point to point
D Both a and b
28. Which of the following keyword is used to change the data and behavior of a base class by replacing a member of a base class with a new derived member? A new B base C overloads D override 29. ____ is a collection of procedures, variables and data structures grouped together? A Monitors B Routeres C Semaphores D None
30. ______________ are the classic method for restricting access to shared resources in a multi-processing environment? A Semaphores B Processes C Both D None
31. To processes can communicate only if the processes have a ____? A Single mailbox B Shared mailbox C Multiple mailbox D All
32. _______________ is a mechanism that allow processes to communicate and to synchronize their actions? A Interprocess B Co-operating Communication process C Both D None
Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget freeupdates tomail https://groups.google.com/group/latestoffcampusLive updates on Facebook @ https://www.facebook.com/LatestOffCampus
Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget freeupdates tomail https://groups.google.com/group/latestoffcampusLive updates on Facebook @ https://www.facebook.com/LatestOffCampus
33. ______________ is one that can affect or be affected by the other processes executing in the system? A Interprocess Communication B Co-operating process C Both D None
34. A system is said to be in a safe state if it can allocate resources up to the ______ and is not in a state of deadlock? A maximum available B lowest level C moderate level D both b and c
35. Prevention of deadlock is possible by ensuring that at least one of the four conditions_____hold? A Must B Can not C may or may not D reverse to
36. Dead-lock avoidance scheme requires the operating system to know_______, the resources needed by a process for its entire lifetime? A in advance B everything C processor D both a and b requirements
Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget freeupdates tomail https://groups.google.com/group/latestoffcampusLive updates on Facebook @ https://www.facebook.com/LatestOffCampus