You are on page 1of 6

Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget freeupdates tomail https://groups.google.

com/group/latestoffcampusLive updates on Facebook @ https://www.facebook.com/LatestOffCampus

TITLE: Epson Sample Technical Placement Paper Level1 (Bolded option is your answer) 1. What will you do to treat the constant 3.14 as a long double? A use 3.14LD B use 3.14L C use 3.14DL D use 3.14LF

2. The binary equivalent of 5.375 is A 101.011 B 101.101110 C 101011 D None

3. Which of the following cannot be checked in a switch-case statement? A Character B Integer C Float D enum

4. Which property is used to name a web control? A ControlName B Designation C ID D Name

5. Which user action will not generate a server-side event? A Mouse Move B Text Change C Button Click D All of the above

6. What is the extension for a Visual Basic web form interface file? A .asp B .aspx C .asp.vb D aspx.vb

Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget freeupdates tomail https://groups.google.com/group/latestoffcampusLive updates on Facebook @ https://www.facebook.com/LatestOffCampus

Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget freeupdates tomail https://groups.google.com/group/latestoffcampusLive updates on Facebook @ https://www.facebook.com/LatestOffCampus

7. For every write() to a TCP socket, there must be a corresponding read() on the other end? A True B False C Both D None

8. A root DNS server contains all of the host-address mappings for every host on the Internet? A True B False C Both D None

9. SMTP uses persistent connections? A True B False C Both D None

10. The web typically sends multiple objects in a web page within a multipart MIME message? A True B False C Both D None

11. Twisted-pair cooper wire is no longer present in computer networks? A True B False C Both D None

12. Which of the following helps improve the performance of DNS? A Its distributed nature B Iterated requests C Caching D All of the above

13. Which of the following are benefits of an ISP increasing the number of connections to other ISPs in the Internet?

Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget freeupdates tomail https://groups.google.com/group/latestoffcampusLive updates on Facebook @ https://www.facebook.com/LatestOffCampus

Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget freeupdates tomail https://groups.google.com/group/latestoffcampusLive updates on Facebook @ https://www.facebook.com/LatestOffCampus

A Improved reliability

B Increased bandwidth

C Reduced delays

D All of the above

14. Which of the following approaches to switching share network resources? A Circuit switching B Packet switching C Both of the above D None of the above

15. Which of the following provides a connectionless transport service? A TCP B UDP C IP D HTTP

16. Which of the following provides a connection-oriented transport service? A TCP B UDP C IP D HTTP

17. cout is a/an __________ . A operator Bfunction C object D macro

18. Which of the following is used to contain an Internet standard? A RFC B IETF C DNS D PPP

19. The ability to recover and read deleted or damaged files from a criminal`s computer is an example of a law enforcement specialty called? A robotics B simulation C computer D animation forensics
Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget freeupdates tomail https://groups.google.com/group/latestoffcampusLive updates on Facebook @ https://www.facebook.com/LatestOffCampus

Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget freeupdates tomail https://groups.google.com/group/latestoffcampusLive updates on Facebook @ https://www.facebook.com/LatestOffCampus

20. _____terminals are often connected to complex inventory and sales computer systems? A Sale B Query C Point-of-sale D data conversion

21. Which of the following concepts means adding new components to a program as it runs? A Data hiding B Dynamic typing C Dynamic binding D Dynamic loading

22. A process known as ____________ is used by large retailers to study trends? A data mining B data selection C POS D data conversion

23. Which of the following approach is adapted by C++? ATop-down B Bottom-up C Right-left D Left-right

24. All of the following are examples of real security and privacy risks EXCEPT? A Hackers B Spams C Viruses D identity theft

25. Which of the following cables can transmit data at high speeds? A Coaxial cable B Optical fiber cable C Twisted pair cable D UTB cable

26. Which of the following is associated with networks?

Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget freeupdates tomail https://groups.google.com/group/latestoffcampusLive updates on Facebook @ https://www.facebook.com/LatestOffCampus

Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget freeupdates tomail https://groups.google.com/group/latestoffcampusLive updates on Facebook @ https://www.facebook.com/LatestOffCampus

A Download node

B Star topology

C Point to point

D Both a and b

27. Can we override private virtual methods? A Yes B No C Both D None

28. Which of the following keyword is used to change the data and behavior of a base class by replacing a member of a base class with a new derived member? A new B base C overloads D override 29. ____ is a collection of procedures, variables and data structures grouped together? A Monitors B Routeres C Semaphores D None

30. ______________ are the classic method for restricting access to shared resources in a multi-processing environment? A Semaphores B Processes C Both D None

31. To processes can communicate only if the processes have a ____? A Single mailbox B Shared mailbox C Multiple mailbox D All

32. _______________ is a mechanism that allow processes to communicate and to synchronize their actions? A Interprocess B Co-operating Communication process C Both D None

Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget freeupdates tomail https://groups.google.com/group/latestoffcampusLive updates on Facebook @ https://www.facebook.com/LatestOffCampus

Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget freeupdates tomail https://groups.google.com/group/latestoffcampusLive updates on Facebook @ https://www.facebook.com/LatestOffCampus

33. ______________ is one that can affect or be affected by the other processes executing in the system? A Interprocess Communication B Co-operating process C Both D None

34. A system is said to be in a safe state if it can allocate resources up to the ______ and is not in a state of deadlock? A maximum available B lowest level C moderate level D both b and c

35. Prevention of deadlock is possible by ensuring that at least one of the four conditions_____hold? A Must B Can not C may or may not D reverse to

36. Dead-lock avoidance scheme requires the operating system to know_______, the resources needed by a process for its entire lifetime? A in advance B everything C processor D both a and b requirements

Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget freeupdates tomail https://groups.google.com/group/latestoffcampusLive updates on Facebook @ https://www.facebook.com/LatestOffCampus

You might also like