Assistant Programmer of multiple ministry-2016
Q-1. Give
the full form of: CDMA, LCD, DVD, HDTV, HTML, LED, EDGE , XML, RAID and DAT
Ans:
CDMA- Code
Division Multiple Access.
LCD-Liquid
Crystal Display
DVD-Digital
Versatile Disc
HDTV-High-Definition
Television
LED-Light-Emitting
Diode
EDGE-Enhanced
Data GSM Environment
XML-Extensible
Markup Language
RAID-
Redundant Array of Independent Disks
DAT-Digital Audio Tape
Q-2. Write
a short note on video RAM, E-R Model, SDLC Model, and sensor based network
Ans:
Video RAM: VRAM (video RAM) is a reference to any type of random access memory (RAM) used to store image data for a computer display.
All types of VRAM are special arrangements of dynamic RAM (DRAM). VRAM is a buffer between the computer processor and the display, and is often called the frame buffer. When images are to be sent to the display, they are first read by the processor as data from some form of main (non-video) RAM and then written to VRAM.
ER model
- ER model stands for an
Entity-Relationship model. It is a high-level data model. This model is
used to define the data elements and relationship for a specified system.
- It develops a conceptual design
for the database. It also develops a very simple and easy to design view
of data.
- In ER modeling, the database
structure is portrayed as a diagram called an entity-relationship diagram.
Software Development Life Cycle : Software Development Life Cycle, SDLC for short, is a
well-defined, structured sequence of stages in software engineering to develop
the intended software product.[ SDLC, Programmer at
Ministry of Finance-2013]
SDLC Activities :SDLC provides a series of steps to be followed to design and develop a software product efficiently. SDLC framework includes the following steps:
Sensor based network: A sensor network comprises a group of tiny, typically battery-powered devices and wireless infrastructure that monitor and record conditions in any number of environments -- from the factory floor to the data center to a hospital lab and even out in the wild. The sensor network connects to the Internet, an enterprise WAN or LAN, or a specialized industrial network so that collected data can be transmitted to back-end systems for analysis and used in applications
Q-3.Explain
Nested Structure and Array of structure with example.
Ans:
Nested Structure in
C
C provides us the feature of nesting one structure within another structure by using which, complex data types are created. For example, we may need to store the address of an entity employee in a structure. The attribute address may also have the subparts as street number, city, state, and pin code. Hence, to store the address of the employee, we need to store the address of the employee into a separate structure and nest the structure address into the structure employee. Consider the following program
#include<stdio.h>
struct address
{
char city[20];
int pin;
char phone[14];
};
struct employee
{
char name[20];
struct address add;
};
void main ()
{
struct employee emp;
printf("Enter employee information?\n");
scanf("%s %s %d %s",emp.name,emp.add.city, &emp.add.pin, emp.add.phone);
printf("Printing the employee information....\n");
printf("name: %s\nCity: %s\nPincode: %d\nPhone: %s",emp.name,emp.add.city,emp.add.pin,emp.add.phone);
}
Array of structure : Structure is collection of different datatypes ( variables ) which are grouped together. Whereas, array of structures is nothing but collection of structures. This is also called as structure array in C.
#include<stdio.h>
#include <string.h>
struct student{
int rollno;
char name[10];
};
int main(){
int i;
struct student st[5];
printf("Enter Records of 5 students");
for(i=0;i<5;i++){
printf("\nEnter Rollno:");
scanf("%d",&st[i].rollno);
printf("\nEnter Name:");
scanf("%s",&st[i].name);
}
printf("\nStudent Information List:");
for(i=0;i<5;i++){
printf("\nRollno:%d, Name:%s",st[i].rollno,st[i].name);
}
return 0;
}Q-4. Write the algorithm to convert infix expressions to postfix expression.
Ans:Algorithm to convert
Infix To Postfix
Let, X is an arithmetic expression written in infix notation. This
algorithm finds the equivalent postfix expression Y.
- Push
“(“onto Stack, and add “)” to the end of X.
- Scan X from
left to right and repeat Step 3 to 6 for each element of X until the Stack
is empty.
- If an
operand is encountered, add it to Y.
- If a left
parenthesis is encountered, push it onto Stack.
- If an
operator is encountered ,then:
- Repeatedly
pop from Stack and add to Y each operator (on the top of Stack) which has
the same precedence as or higher precedence than operator.
- Add
operator to Stack.
[End of If] - If a right
parenthesis is encountered ,then:
- Repeatedly
pop from Stack and add to Y each operator (on the top of Stack) until a
left parenthesis is encountered.
- Remove the
left Parenthesis.
[End of If]
[End of If] - END.
Q-5.Explain
pass by value and pass by reference in C Language with examples.
Ans:Pass by value: In this approach we pass copy of actual variables in function as a parameter. Hence any modification on parameters inside the function will not reflect in the actual variable. For example:
#include<stdio.h>
int main(){
int a=5,b=10;
swap(a,b);
printf("%d %d",a,b);
return 0;
}
void swap(int a,int b){
int temp;
temp =a;
a=b;
b=temp;
}
Pass by reference: In this approach we
pass memory address actual variables in function as a parameter. Hence any
modification on parameters inside the function will reflect in the actual variable.
For example:
#incude<stdio.h>
int main(){
int a=5,b=10;
swap(&a,&b);
printf("%d %d",a,b);
return 0;
}
void swap(int *a,int *b){
int *temp;
*temp =*a;
*a=*b;
*b=*temp;
}
Q-6.Write
a C program that reads a positive integer, calculate the factorial number using
recursion and print the result.
Ans:
#include<stdio.h>
#include<conio.h>
int fact(int);
int main()
{
intx,n;
printf(" Enter the Number to Find
Factorial :");
scanf("%d",&n);
x=fact(n);
printf(" Factorial of %d is %d",n,x);
getch();
return 0;
}
int fact(int n)
{
if(n==0)
return(1);
return(n*fact(n-1));
}
Q-7.What
is mean the term ‘‘ Peer to peer protocol”?
Ans: Peer-to-peer (P2P) is a decentralized communications model in which each party has the same capabilities and either party can initiate a communication session. Unlike the client/server model, in which the client makes a service request and the server fulfills the request, the P2P network model allows each node to function as both a client and server.
P2P systems can be used to provide anonymized routing of network traffic, massive parallel computing environments, distributed storage and other functions. Most P2P programs are focused on media sharing and P2P is therefore often associated with software piracy and copyright violation.
Q-8.Explain
how data is transmitted along a fiber optic cable.
The light pulses are essentially tiny particles of light ricocheting down each optical fiber of the fiber optic cables. The light is kept inside the pipe by utilizing two things: the principle of total internal reflection and the structure of the cable itself. Light traveling in a clear glass filament can leak out of the edges, but if the light strikes the glass at a shallow angle, then total internal reflection occurs and the light is contained within the glass filament. The optical cable itself is constructed of two separate parts. The core of the cable, where the light travels, is in the middle. The cladding is a layer of glass around the core which helps keep the light signals contained within the core.
Q-9.What
is MAC address ?
Ans: A MAC address is the
unique identifier that is assigned by the manufacturer to a piece of network
hardware (like a wireless card or an ethernet card). MAC stands for Media
Access Control, and each identifier is intended to be unique to a particular
device.
A MAC address consists of six sets of two characters, each separated by a colon. 00:1B:44:11:3A:B7 is an example of a MAC address
Q-10.What
is the difference between DOMAIN and WORK GROUP?
Ans:
In a domain:
-There will be one or computers are the servers.
The security and permissions are controlled by network administrators.
-A user with an account on the domain can log
onto any computer system, without having the account on that computer.
-The number of computer systems can be hundreds
or thousands of computers.
-The computers can be connected to different
local networks
In a workgroup:
-All computer systems are peers and no computer
can not control another computer
-Every computer sets user accounts. To make use
of any system, one must have an account on that computer.
-The numbers of computer systems are limited to
ten or twenty.
-Every computer must be part of the same LAN or
subnet.
Domain |
Workgroup |
Centralized
administrator |
No
Centralized administrator |
Client/Server
Network |
Peer-Peer
Network |
For
Data security |
Not
much security for Data, User & Groups |
Centralized
login |
Local
login |
Multiple
Login possible |
Single
Login Only |
Good
for large Network |
Good
for Small Network |
Q-11.What
is the file transfer protocol ?list out the steps involved in downloading
/uploading a file by using FTP service:
Ans:
File Transfer Protocol (FTP) is a
standard Internet protocol for transmitting files between computers on the
Internet over TCP/IP connections. FTP is a client-server protocol where a
client will ask for a file, and a local or remote server will provide it.
Download a single file
from server using FTP
Step I : ftp to remote server
1, ftp domain.com
2, ftp IP-Address-of-server
3, ftp Host-name-of-server
Step II : Execute the following command to download file.
get file-name-to-download
Example:
get download1.txt
Upload a
single file to server using FTP
Step I : Connect to ftp account.
Step II : Type
the ‘put’ command as bellow:
put file-to-upload
Example:
put upload1.txt
For uploading multiple files, use ‘mput’ instead of ‘put’.
mput upload1.txt upload2.txt upload3.txt
Q-12.What
is an anonymous FTP site ? What is used ?
Ans:
A method for downloading public files using the File Transfer Protocol (FTP).
Anonymous FTP is called anonymous because you don't need to identify yourself before accessing files.
In general, you enter the word anonymous or ftp when the host prompts you for a username; you can enter anything for the password, such as your e-mail address or simply the word "guest". In many cases, when you access an anonymous FTP site, you won't even be prompted for your name and password.
Anonymous
FTP is beneficial for the distribution of large files to the public, without
having to assign large numbers of login and password combinations for FTP
access.
Q-13.Consider
the following set of processes, with the length of the CPU-burst time given in
milliseconds
Q-14. What
is race condition ? Give an example .
Ans:
A race
condition or race hazard is a scenario in an electronic
processing system where the result of a calculation might be affected by an
unforeseen or uncontrolled sequence of events. The underlying concept is that
the results of a process should never be affected by one of the operations
"winning a race" (finishing first).
Race condition example
Consider the following set of operations:
1. variable a = 1
2. variable a = a * 5
3. variable b = a - 1
If these operations are processed in the proper sequence, variable b should equal 4. But if operation 3
is executed before operation 2 has completed, b would equal 0.
0 মন্তব্যসমূহ