HOME         WALKINS         CORE JOBS          GOVT JOBS          TESTING JOBS          BPO JOBS amity niit hp idea nokia religare samsung max_new_york_life naukri

Friday, October 15, 2010

Basic Networking Questions-3

What is Mail Gateway?
It is a system that performs a protocol translation between different electronic mail delivery protocols

What is wide-mouth frog?

Wide-mouth frog is the simplest known key distribution center (KDC) authentication protocol.

What are Digrams and Trigrams?

The most common two letter combinations are called as digrams. e.g. th, in, er, re and an. The most common three letter combinations are called as trigrams. e.g. the, ing, and, and ion.

What is silly window syndrome?

It is a problem that can ruin TCP performance. This problem occurs when data are passed to the sending TCP entity in large blocks, but an interactive application on the receiving side reads 1 byte at a time.

What is region?
When hierarchical routing is used, the routers are divided into what we will call regions, with each router knowing all the details about how to route packets to destinations within its own region, but knowing nothing about the internal structure of other regions

What is multicast routing?
Sending a message to a group is called multicasting, and its routing algorithm is called multicast routing.

What is traffic shaping?
One of the main causes of congestion is that traffic is often busy. If hosts could be made to transmit at a uniform rate, congestion would be less common. Another open loop method to help manage congestion is forcing the packet to be transmitted at a more predictable rate. This is called traffic shaping.

What is virtual channel?

Virtual channel is normally a connection from one source to one destination, although multicast connections are also permitted. The other name for virtual channel is virtual circuit.

What is logical link control?
One of two sublayers of the data link layer of OSI reference model, as defined by the IEEE 802 standard. This sublayer is responsible for maintaining the link between computers when they are sending data across the physical network connection.

What is the difference between routable and non- routable protocols?

Routable protocols can work with a router and can be used to build large networks. Non-Routable protocols are designed to work on small, local networks and cannot be used with a router

Basic Networking Questions-2

What does the Mount protocol do ?
The Mount protocol returns a file handle and the name of the file system in which a requested file resides. The message is sent to the client from the server after reception of a client's request.




What is anonymous FTP and why would you use it?


Anonymous FTP enables users to connect to a host without using a valid login and password. Usually, anonymous FTP uses a login called anonymous or guest, with the password usually requesting the user's ID for tracking purposes only. Anonymous FTP is used to enable a large number of users to access files on the host without having to go to the trouble of setting up logins for them all. Anonymous FTP systems usually have strict controls over the areas an anonymous user can access.



What is the Network Time Protocol?
The Network Time Protocol is a protocol for synchronizing the clocks of computer systems over packet-switched, variable-latency data networks. NTP uses UDP port 123 as its transport layer. It is designed particularly to resist the effects of variable latency (Jitter).NTP is one of the oldest Internet protocols still in use (since before 1985).




What is a pseudo tty?

In Unix, a pseudo terminal is a pseudo-device pair that provides a text terminal interface without associated virtual console, computer terminal or serial port hardware. Instead, a process replaces the role of the underlying hardware for the pseudo terminal session.For each pseudo terminal, the operating system kernel provides two character devices: a master device and a slave device.The master and slave devices, in their most common deployment, form an association between a Unix shell and a terminal emulation program or some sort of network server.The slave device file, which generally has a nomenclature of /dev/ttyp*, has the appearance and supported system calls of any text terminal. Thus it has the understanding of a login session and session leader process (which is typically the shell program).The master device file, which generally has a nomenclature of /dev/ptyp*, is the endpoint for communication with the terminal emulator. It receives the control requests and information from the other party over this interface and responds accordingly.





What is External Data Representation?

eXternal Data Representation (XDR) is an IETF standard from 1995 of the presentation layer in the OSI model. XDR allows data to be wrapped in an architecture independent manner so data can be transferred between heterogeneous computer systems. Converting from the local representation to XDR is called encoding. Converting from XDR to the local representation is called decoding. XDR is implemented as a software library of functions that is portable between different operating systems and is also independent of the transport layer.



What is the difference between interior and exterior neighbor gateways?
Interior gateways connect LANs of one organization, whereas exterior gateways connect the organization to the outside world.




What are 10Base2, 10Base5 and 10BaseT Ethernet LANs ?
10Base2—An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband
signaling, with a contiguous cable segment length of 100
meters and a maximum of 2 segments.
10Base5—An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband
signaling, with 5 continuous segments not exceeding 100
meters per segment.
10BaseT—An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband
signaling and twisted pair cabling.




BOOTP helps a diskless workstation boot. How does it get a message to the network looking for its IP address and the location of its operating system boot files ?
BOOTP sends a UDP message with a subnetwork broadcast address and waits for a reply from a server that gives it the IP address. The same message might contain the name of the machine that has the boot files on it. If the boot image location is not specified, the workstation sends another UDP message to query the server



What protocol is used by DNS name servers ?
DNS uses UDP for communication between servers. It is a better choice than TCP because of the improved speed a connectionless protocol offers. Of course, transmission reliability suffers with UDP.



Which are the three types of routing tables ?
The three types of routing tables are fixed, dynamic, and fixed central. The fixed table must be manually modified every time there is a change. A dynamic table changes its information based on network traffic, reducing the amount of manual maintenance. A fixed central table lets a manager modify only one table, which is then read by other devices. The fixed central table reduces the need to update each machine's table, as with the fixed table. Usually a dynamic table causes the fewest problems for a network administrator, although the table's contents can change without the administrator being aware of the change.

Basic Networking Questions-1

What is source-route bridging algorithm ?
The source-route bridging (SRB) algorithm was developed by IBM and was proposed to the IEEE 802.5 committee as the means to bridge between all LANs. SRBs are so named because they assume that the complete source-to-destination route is placed in all inter-LAN frames sent by the source. SRBs store and forward the frames as indicated by the route appearing in the appropriate frame field. Assume that Host X wants to send a frame to Host Y. Initially, Host X does not know whether Host Y resides on the same LAN or a different LAN. To determine this, Host X sends out a test frame. If that frame returns to Host X without a positive indication that Host Y has seen it, Host X assumes that Host Y is on a remote segment. To determine the exact remote location of Host Y, Host X sends an explorer frame. Each bridge receiving the explorer frame copies the frame onto all outbound ports. Route information is added to the explorer frames as they travel through the internetwork. When Host X's explorer frames reach Host Y, Host Y replies to each individually, using the accumulated route information. Upon receipt of all response frames, Host X chooses a path based on some predetermined criteria. Host X must select one of these two routes. The IEEE 802.5 specification does not mandate the criteria that Host X should use in choosing a route, but it does make several suggestions, including the following:
•First frame received
•Response with the minimum number of hops
•Response with the largest allowed frame size
•Various combinations of the preceding criteria
In most cases, the path contained in the first frame received is used.


What is Transparent Bridge ?
Transparent bridges were first developed at Digital Equipment Corporation (Digital) in
the early 1980s. Transparent bridges are so named because their presence and operation are transparent to network hosts. When transparent bridges are powered on, they learn the workstation locations by analyzing the source address of incoming frames from all attached networks. For example, if a bridge sees a frame arrive on port 1 from Host A, the bridge concludes that Host A can be reached through the segment connected to port 1. Through this process, transparent bridges build a table. The bridge uses its table as the basis for traffic forwarding. When a frame is received on one of the bridge's interfaces, the bridge looks up the frame's destination address in its internal table. If the table contains an association between the destination address and any of the bridge's ports aside from the one on which the frame was received, the frame is forwarded out the indicated port. If no association is found, the frame is flooded to all ports except the inbound port. Broadcasts and multicasts also are flooded in this way. Transparent bridges successfully isolate intrasegment traffic, thereby reducing the traffic seen on each individual segment. This is called filtering and occurs when the source and destination MAC addresses reside on the same bridge interface. Filtering usually improves network response times, as seen by the user. The extent to which traffic is reduced and response times are improved depends on the volume of intersegment traffic relative to the total traffic, as well as the volume of broadcast and multicast traffic.


What is the basic difference between transparent bridges and source-route bridges relative to the forwarding processes ?
In a transparent bridged environment, bridges determine whether a frame needs to be forwarded, and through what path based upon local bridge tables. In an SRB network, the source device prescribes the route to the destination and indicates the desired path in the RIF.


What is Switched Multimegabit Data Service ?
Switched Multimegabit Data Service (SMDS) is a high-speed, packet-switched, datagram-based WAN networking technology used for communication over public data networks (PDNs). SMDS can use fiber- or copper-based media. SMDS networks consist of several underlying devices to provide high-speed data service. These include customer premises equipment (CPE), carrier equipment, and the subscriber network interface (SNI). CPE is terminal equipment typically owned and maintained by the customer. CPE includes end devices, such as terminals and personal computers, and intermediate nodes, such as routers, modems, and multiplexers. Intermediate nodes, however, sometimes are provided by the SMDS carrier. Carrier equipment generally consists of high-speed WAN switches that must conform to certain network equipment specifications. These specifications define network operations, the interface between a local carrier network and a long-distance carrier network, and the interface between two switches inside a single carrier network.


Where is SMDS Interface Protocol used ?
The SMDS Interface Protocol (SIP) is used for communications between CPE (Customer premises equipment) and SMDS (Switched Multimegabit Data Service) carrier equipment. SIP provides connectionless service across the subscriber network interface (SNI), allowing the CPE to access the SMDS network.

What is Data-Link Switching ?
Data-link switching (DLSw) provides a means of transporting IBM Systems Network Architecture (SNA) and network basic input/output system (NetBIOS) traffic over an IP network. It serves as an alternative to source-route bridging (SRB), a protocol for transporting SNA and NetBIOS traffic in Token Ring environments that was widely deployed before the introduction of DLSw. In general, DLSw addresses some of the shortcomings of SRB for certain communication requirements—particularly in WAN implementations. This chapter contrasts DLSw with SRB, summarizes underlying protocols, and provides a synopsis of normal protocol operations. The three primary functions of DLSw are :
•The Switch-to-Switch Protocol (SSP) is the protocol maintained between two DLSw nodes or routers.
•The termination of SNA data-link control (DLC) connections helps to reduce the likelihood of link layer timeouts across WANs.
•The local mapping of DLC connections to a DLSw circuit.

What is Banyan VINES ?
Banyan Virtual Integrated Network Service (VINES) implements a distributed network operating system based on a proprietary protocol family derived from the Xerox Corporation's Xerox Network Systems (XNS) protocols. VINES uses a client/server architecture in which clients request certain services, such as file and printer access, from servers.

What is Enhanced Interior Gateway Routing Protocol ?
The Enhanced Interior Gateway Routing Protocol (EIGRP) represents an evolution from its predecessor IGRP. This evolution resulted from changes in networking and the demands of diverse, large-scale internetworks. EIGRP integrates the capabilities of link-state protocols into distance vector protocols. Additionally, EIGRP contains several important protocols that greatly increase its operational efficiency relative to other routing protocols. One of these protocols is the Diffusing update algorithm (DUAL). DUAL enables EIGRP routers to determine whether a path advertised by a neighbor is looped or loop-free, and allows a router running EIGRP to find alternate paths without waiting on updates from other routers. EIGRP provides compatibility and seamless interoperation with IGRP routers. An automatic-redistribution mechanism allows IGRP routes to be imported into EIGRP, and vice versa, so it is possible to add EIGRP gradually into an existing IGRP network. Because the metrics for both protocols are directly translatable, they are as easily comparable as if they were routes that originated in their own autonomous systems (ASs). In addition, EIGRP treats IGRP routes as external routes and provides a way for the network administrator to customize them.

Name the four key technologies that are used by EIGRP ?
EIGRP employs four key technologies, including neighbor discover/recovery, Reliable Transport Protocol (RTP), Diffusing Update ALgorithm (DUAL) finite-state machine, and a modular architecture that enables support for new protocols to be easily added to an existing network.

Why EIGRP is more efficient in operation than IGRP ?
Unlike most other distance vector routing protocols, EIGRP does not mandate a periodic update of routing tables between neighboring routers. Instead, it employs a neighbor discovery/recovery mechanism to ensure that neighbors remain aware of each other's accessibility. As long as a router receives periodic hello packets from its neighbors, it can assume that those neighbors remain functional. More importantly, it can assume that all of its routes that rely upon passage through those neighbors remain usable. Thus, EIGRP is much more efficient than conventional distance vector routing protocols because it imposes much less overhead on routers and transmission facilities during normal operation.

What is Interior Gateway Protocol ?
IGRP is a distance vector Interior Gateway Protocol (IGP). Distance vector routing protocols mathematically compare routes using some measurement of distance. This measurement is known as the distance vector. Routers using a distance vector protocol must send all or a portion of their routing table in a routing-update message at regular intervals to each of their neighboring routers. As routing information proliferates through the network, routers can identify new destinations as they are added to the network, learn of failures in the network, and, most importantly, calculate distances to all known destinations.

Thursday, October 14, 2010

Basic questions

What is MAC address?
The address for a device as it is identified at the Media Access Control (MAC) layer in the network architecture. MAC address is usually stored in ROM on the network adapter card and is unique.

What is cladding?
A layer of a glass surrounding the center fiber of glass inside a fiber-optic cable.

How Gateway is different from Routers?
A gateway operates at the upper levels of the OSI model and translates information between two completely different network architectures or data formats

What is passive topology?
When the computers on the network simply listen and receive the signal, they are referred to as passive because they don’t amplify the signal in any way. Example for passive topology - linear bus.

What is SAP?
Series of interface points that allow other computers to communicate with the other layers of network protocol stack.

What is subnet?

A generic term for section of a large networks usually separated by a bridge or router.

What is IP?

IP is Internet Protocol. It is the network protocol which is used to send information from one computer to another over the network over the internet in the form of packets

What’s the meaning of ARP in TCP/IP?
The “ARP” stands for Address Resolution Protocol. The ARP standard defines two basic message types: a request and a response. a request message contains an IP address and requests the corresponding hardware address; a replay contains both the IP address, sent in the request, and the hardware address.

What is data link layer in the OSI reference model responsible for?
Data link layer is located above the physical layer, but below the network layer. Taking raw data bits and packaging them into frames. The network layer will be responsible for addressing the frames, while the physical layer is reponsible for retrieving and sending raw data bits.

What is binding order?
The order by which the network protocols are used for client-server communications. The most frequently used protocols should be at the top.

How do cryptography-based keys ensure the validity of data transferred across the network?
Each IP packet is assigned a checksum, so if the checksums do not match on both receiving and transmitting ends, the data was modified or corrupted.

What is UTP?
UTP — Unshielded twisted pair 10BASE-T is the preferred Ethernet medium of the 90s. It is based on a star topology and provides a number of advantages over coaxial media.
It uses inexpensive, readily available copper phone wire. UTP wire is much easier to install and debug than coax. UTP uses RG-45 connectors, which are cheap and reliable.

What is a router? What is a gateway?
Routers are machines that direct a packet through the maze of networks that stand between its source and destination. Normally a router is used for internal networks while a gateway acts a door for the packet to reach the ‘outside’ of the internal network

What is Semaphore? What is deadlock?

Semaphore is a synchronization tool to solve critical-section problem, can be used to control access to the critical section for a process or thread. The main disadvantage (same of mutual-exclusion) is require busy waiting. It will create problems in a multiprogramming system, where a single CPU is shared among many processes.
Busy waiting wastes CPU cycles.
Deadlock is a situation when two or more processes are waiting indefinitely for an event that can be caused by only one of the waiting processes. The implementation of a semaphore with a waiting queue may result in this situation
What MAU?

In token Ring , hub is called Multistation Access Unit(MAU).



What is difference between baseband and broadband transmission?

In a baseband transmission, the entire bandwidth of the cable is consumed by a single signal. In broadband transmission, signals are sent on multiple frequencies, allowing multiple signals to be sent simultaneously.


What are the important topologies for networks?



BUS topology:In this each computer is directly connected to primary network cable in a single line.
Advantages:Inexpensive, easy to install, simple to understand, easy to extend.
STAR topology:In this all computers are connected using a central hub.
Advantages:Can be inexpensive, easy to install and reconfigure and easy to trouble shoot physical problems.

RING topology:In this all computers are connected in loop.
Advantages:All computers have equal access to network media, installation can be simple, and signal does not degrade as much as in other topologies because each computer regenerates it



What is the difference between TFTP and FTP application layer protocols?


The Trivial File Transfer Protocol (TFTP) allows a local host to obtain files from a remote host but does not provide reliability or security. It uses the fundamental packet delivery services offered by UDP.The File Transfer Protocol (FTP) is the standard mechanism provided by TCP / IP for copying a file from one host to another. It uses the services offer by TCP and so is reliable and secure. It establishes two connections (virtual circuits) between the hosts, one for data transfer and another for control information.



What are the data units at different layers of the TCP / IP protocol suite?



The data unit created at the application layer is called a message, at the transport layer the data unit created is called either a segment or an user datagram, at the network layer the data unit created is called the datagram, at the data link layer the datagram is encapsulated in to a frame and finally transmitted as signals along the transmission media.



What are the different type of networking / internetworking devices?

Repeater:Also called a regenerator, it is an electronic device that operates only at physical layer. It receives the signal in the network before it becomes weak, regenerates the original bit pattern and puts the refreshed copy back in to the link.
Bridges: These operate both in the physical and data link layers of LANs of same type. They divide a larger network in to smaller segments. They contain logic that allow them to keep the traffic for each segment separate and thus are repeaters that relay a frame only the side of the segment containing the intended recipent and control congestion.
Routers:They relay packets among multiple interconnected networks (i.e. LANs of different type). They operate in the physical, data link and network layers. They contain software that enable them to determine which of the several possible paths is the best for a particular transmission.
Gateways:They relay packets among networks that have different protocols (e.g. between a LAN and a WAN). They accept a packet formatted for one protocol and convert it to a packet formatted for another protocol before forwarding it. They operate in all seven layers of the OSI model.



What is Project 802?



It is a project started by IEEE to set standards to enable intercommunication between equipment from a variety of manufacturers. It is a way for specifying functions of the physical layer, the data link layer and to some extent the network layer to allow for interconnectivity of major LAN
protocols.It consists of the following:
802.1 is an internetworking standard for compatibility of different LANs and MANs across protocols.
802.2 Logical link control (LLC) is the upper sublayer of the data link layer which is non-architecture-specific, that is remains the same for all IEEE-defined LANs.
Media access control (MAC) is the lower sublayer of the data link layer that contains some distinct modules each carrying proprietary information specific to the LAN product being used.
The modules are Ethernet LAN (802.3), Token ring LAN (802.4), Token bus LAN (802.5).
802.6 is distributed queue dual bus (DQDB) designed to be used in MANs.



What are the types of Transmission media?



Signals are usually transmitted over some transmission media that are broadly classified in to two categories.
a)Guided Media:These are those that provide a conduit from one device to another that include twisted-pair, coaxial cable and fiber-optic cable. A signal traveling along any of these media is directed and is contained by the physical limits of the medium. Twisted-pair and coaxial cable use metallic that accept and transport signals in the form of electrical current. Optical fiber is a glass or plastic cable that accepts and transports signals in the form of light.
b) Unguided Media: This is the wireless media that transport electromagnetic waves without using a physical conductor. Signals are broadcast either through air. This is done through radio communication, satellite communication and cellular telephony.




What is Bandwidth?



Every line has an upper limit and a lower limit on the frequency of signals it can carry. This limited range is called the bandwidth



Difference between bit rate and baud rate.

Bit rate is the number of bits transmitted during one second whereas baud rate refers to the number of signal units per second that are required to represent those bits.
baud rate = bit rate / N ,where N is no-of-bits represented by each signal shift.

Friday, July 16, 2010

citrix written test questions

1. What is the output of this statement ?
Printf(“%d”,printf(“%d %d”,2,2) & printf(“%d %d ”, 2, 2));
a. 22222
b. 22221
c. It will give an error during compilation

2. What is the output of this code snippet


main()
{ int *p[10];
printf("%d %d\n",sizeof(*p),sizeof(p));
}



3. Function inlining is best used when
a. In a small recursive function
b. In large function where number of variables used is small
c. In a large function where there are many loops and number of variables used is small
d. None of these

4. If there is a large quantum in round robin it will be equivalent to
a. First come first serve
b. Shortest job first
c. Least recently used
d. None of these

5 . which of the following will lead to starvation
a. Fifo
b. Shortest job first
c. Round robin
d. Least recently used

6 . if the address space is 192.168.36.16/28 which of the following is the broadcast ip
a. 192.168.36.0
b. 192.168.36.1
c. 192.168.36.255
d. 192.168.36.31

7. if there are 9 yellow balls, 3 red balls and 2 green balls. What is the probability that the second ball picked is yellow given the first ball is yellow
a. 8/13
b. 9/13
c. 8/14
d. 9/14

8. How many processes are created in this snippet?
Main()
{
Fork();
Fork() && fork () || fork ();
Fork ();
}

a. 15
b. 19
c. 21
d. 27
e. 31

9. which of the following is TRUE about the declaration const char * p
a. the pointer cannot be changed but the value to which it points can be changed
b. the value is constant but the pointer can be changed
c. neither the value nor the pointer can be changed
d. none of these

10. If F and L are the pointers to the first and last elements in a linked list, then which of the following operations is dependent on the length of the list?
a. delete the first element in the list
b. insert a new element as a first element
c. delete the last element of the list
d. add a new element at the end of the list

Monday, April 26, 2010

Visual basic Interview questions 2

31. What are the Style Properties of Combo Box?
Simple, Dropdown list We can type and select. Dropdown Combo Only Drop Down.
32. What are the Style properties of List Box?
Simple Single Select , Extended. Multiple Select.

33. What is Collection Objects?
Similarly to arrays but is preferred over an array because of the following reasons.
1. A collection objects uses less Memory than an array.
2. It provides methods to add and delete members.
3. It does not required reason statement when objects are added or deleted.
4. It does not have boundary limitations.

34. What is the difference between Property Get, Set and Let?
Set Value is assigned to ActiveX Object from the form.
Let Value is retried to ActiveX Object from the form.
Get- Assigns the value of an expression to a variable or property.

35. How to change the Mouse Pointer?
Screen.MousePointer = VBHourGlass/VBNormal.

36. What is Friend Variable?
Scope sharable between projects.

37. What is DBFailError?
Rolls Back updates if any errors Occurs
38. What are the record set types?
RdOpenFowardOnly 0 (Default used only for the read only purpose)
RdOpenStatic 1
RdOpenDynamic 2
RdOpenKeySet 3 (Normally used for the live project)

39. What is the diff between RDO and ADO?
RDO is Hierarchy model where as ADO is Object model. ADO can access data from both flat files as well as the data bases. I.e., It is encapsulation of DAO, RDO , OLE that is why we call it as OLE-DB Technology.

40. Diff types of Lock Types?
RdConcurReadOnly 0 (Default)
RdConcurLock 1 (Pessimistic Locking)
RdConcurRowver 2 (Optimistic Lociking)
RdConcurValues 3
RdConcurBatch 4

41. What are the scopes of the class?
Public, private, Friend

42. Have you create Properties and Methods for your own Controls?
Properties Public variable of a Class
Method Public procedure of a class

43. Private Dim x as integer. Valid ?
Private cannot be used in front of DIM.
44. Different type of Instantiation?
Private Only for the Specific Module.
Public not creatable Private & Public
Multi Use - Variable we have to declare.
Single Use Not possible through dll.
Global Multiuse Have variable not Required to Declare.
Global Single Use - Only for exe.

45. What are the different types of Dialog Box?
Predefined, Custom, User Defined.

Wednesday, April 7, 2010

Visual basic Interview questions 1

1. How do you register a component?

Compiling the component, running REGSVR32 MyDLL.dll

2. Name and explain the different compatibility types when creating a COM component

No Compatibility ? New GUID created, references from other components will not workProject Compatibility ? Default for a new component Binary Compatibility ? GUID does not change, references from other components will work

3. Why iss it important to use source control software for source code?

Modification history.Code ownership: Multiple people can not modify the same code at the same time

4. What two methods are called from the ObjectContext object to inform MTS that the transaction was successful or unsuccessful?


SetComplete and SetAbort.

5. What is the tool used to configure the port range and protocols for DCOM communications?

DCOMCONFIG.EXE

6. What does Option Explicit refer to?

All variables must be declared before use. Their type is not required.

7. What are the different ways to Declare and Instantiate an object in Visual Basic 6?


Dim obj as OBJ.CLASS with eitherSet obj = New OBJ.CLASS orSet obj = CreateObject(OBJ.CLASS?) orSet obj = GetObject( , OBJ.CLASS?)orDim obj as New OBJ.CLASS

8. Name the four different cursor types in ADO and describe them briefly.


The cursor types are listed from least to most resource intensive.Forward Only Fastest, can only move forward in recordset Static Can move to any record in the recordset. Data is static and never changes.KeySet Changes are detectable, records that are deleted by other users are unavailable, and records created by other users are not detectedDynamic ? All changes are visible.

9. Name the four different locking type in ADO and describe them briefly.


LockPessimistic Locks the row once after any edits occur.LockOptimistic Locks the row only when Update is called.LockBatchOptimistic Allows Batch Updates.LockReadOnly Read only. Can not alter the data.

10. Describe Database Connection pooling (relative to MTS )?

This allows MTS to reuse database connections. Database connections are put to sleep as opposed to being created and destroyed and are activated upon request.

11. What are the ADO objects?

Provide a scenario using three of them to return data from a database. Expected answer: Connection Connects to a data source; contains the Errors collectionCommand Executes commands to the data source. Is the only object that can accept parameters for a stored procedure.Recordset The set of data returned from the database.Scenario: There are many possibilities. The most likely is as follows:Dim conn As ADODB.ConnectionDim rs As ADODB.RecordsetDim Cmd As ADODB.Commandconn.ConnectionString = ?CONNECTION STRING?conn.OpenSet Cmd.ActiveConnection = connCmd.CommandText = ?SQL STATEMENT?Set rs = Cmd.ExecuteSet rs.ActiveConnection = Nothingconn.Close

12. Under the ADO Command Object, what collection is responsible for input to stored procedures?

The Parameters collection.

13. What are some benefits of using MTS?

Database Pooling, Transactional operations, Deployment, Security, Remote Execution.

14. What is the benefit of wrapping database calls into MTS transactions?

If database calls are made within the context of a transaction, aborting the transaction will undo and changes that occur within that transaction. This removes the possibility of stranded, or partial data.

15. Describe and In Process vs. Out of Process component. Which is faster?

An in-process component is implemented as a DLL, and runs in the same process space as its client app, enabling the most efficient communication between client and component.Each client app that uses the component starts a new instance of it.An out of process component is implemented as an EXE, and unlike a dll, runs in its own process space. As a result, exe’s are slower then dll’s because communications between client and component must be marshalled across process boundaries. A single instance of an out of process component can service many clients

16. What are the main components of the ADO object model? How are they used?

Connection: Used to make a connection between your app and an external data source, ie, sql server.Command: Used to build queries, including user-specific parameters, to access records from a data source (which are returned in a Recordset)Recordset:Used to access records returned from an SQL query. With a recordset, you can navigate returned records. You can also add, modify or delete records.

17. Can We create CGI scripts in VB??

Yes.

18. Dim x, y as integer. What is x and y data type?

X as variant and y as integer.

19. What is Centralization Error Handling?

Writing function and calling it when error occurs.

20. What is frx?

When some controls like grid and third party control placed in our application then it will create frx in run time.

21. What is the Dll required for running the VB?

Vbrun300.dll

22. Why we use Treeview Control?

To list the hierarchical list of the node objects. Such of files and Directories.

23. Handling Error in Calling chain.

This will call the top most error where the error is handled.

24. In project properties if we set Unattended what is it mean?

This cannot have user interface. This can be used for the COM creation.

25. What is the size of the variant data type?

The Variant data type has a numeric storage size of 16 bytes and can contain data up to the range of a Decimal, or a character storage size of 22 bytes (plus string length),and can store any character text.

26. What is view Port?


The area under which the container provides the view of the ActiveX Document is known as a view port.

27. What are the different types of error?

Syntax Errors, Runtime , Logic.

28. What is the diff between the Std and Class Module?


Std Global with in the project. Cls Global through out the all project only thing is we want to set the type lib. Class Modules can be Instantiated.

29. What is Mixed Cursors?

Static + Keyset

30. Drag and Drop state numbers and functions?


State 0 Source control is being dragged with the range of a target.
1 Out of the range of a target.
2 One position in the target to another.

Tuesday, March 23, 2010

Puzzle 2

For questions 1 to 10 :Complete the following series.

1)2,3,11,38,102,__
1)200 2)208 3)227 4)236

2)6,27,138,831,5820,__
1)50523 2)46563 3)41203 4)43123

3)2,8,13,41,79,239,__
1)475 2)470 3)467 4)462

4)25,62,123,214,341,__
1)488 2)510 3)496 4)574

5)11,48,927,25125,__
1)49343 2)81729 3)1001000 4)64512

6)3,4,9,32,155,__
1)729 2)924 3)876 4)961

7)29,27,31,29,37,31,41,__
1)30 2)33 3)35 4)37

8)8,9,16,51,200,__
1)995 2)805 3)795 4)1005

9)15,66,132,363,726,__
1)1353 2)1303 3)1293 4)1403

10)5040,2520,3360,2800,3200,__
1)3000 2)2880 3)2960 4)3020

For questions 11-25:Choose the correct alternative from the given choices

11)In a certain code language, if the word PRINTER is coded as EINPRRT and the word SERVICE is coded as EINPRRT and the word SERVICE is coded as CEEIRSV, then how is the word SCANNING coded in that language?
1)ACIGSNNN 2)ACGNNNSI 3)ACGINNNS 4)ACIGNNNS

12)In a certain code language, if the word MATERIAL is coded as LAIRETAM, then how is the word FOUNDATION coded in that language?
1)NOITADNOF 2)NOITDANUOF 3)NOITANDUOF 4)NIOTADNUOF

13)In a certain code language, if the word PROJECT is coded as QTRNJIA, then how is the word PACKAGE coded in the language?
1)QCFOFML 2)QCFOEML 3)QCFOFNK 4)QCFOFMK

14)In a certain code language, if the word KIDNAP is coded as 30, and the word TERRORIST as 72, then how is the word MISCHIEF coded in that language?
1)80 2)56 3)72 4)42

15)In a certain code language, if the word MADRID is coded as 49, and the word TOKYO as 86, then how is the word RANGOON coded in that language?
1)83 2)85 3)84 4)86

16)Raju decided to go to Ravi's house.So he started out by his bike.Initially he travelled 10 km towards east and then he turned to his left and travelled 5 km.Later he travelled 8 km more to his right before turning to his left to travel 3 km more.Finally he travelled 3 km to his left to reach Raju's house.What is the distance between Raju's starting point and Ravi's house and in which direction is Ravi's house and in which direction is Ravi's house with respect to Raju's starting point?
1)17 km,South-east 2)23 km,North-east 3)17 km,North-east 4)23 km,North-west

17)One evening,Srinivas and Balaji were standing in a park,facing each other.It was observed that Balaji's shadow was falling to his right.Then which direction was Srinivas facing?
1)East 2)West 3)North 4)South

18)If 2*5=17 and 3*4=19 then 5*6=?
1)41 2)30 3)11 4)31

19)If 3#4=7 and 7#11=72 then 6#10=?
1)60 2)61 3)16 4)64

20)In a certain code language '+' means '*','*' means '-','-' means '/' and '/' means '+',then what is the simplified value for the following expression in which the mathematical operators are written according to the above code?
12-4+15*4+6/10

Answer

1)3 1)3
It is of the form 0^2+2,1^2+2,3^2+2,6^2+2,10^2+2,.....
The sequence of n is 0,1,3,6,10,... so the next n is 15 => 15^2+2

2)2
The function is S(n)=S(n-1)*(n+2) + 3 ,n>1
=6 ,n=1

3)1
It is of the form S(n)*3+2 for even and S(n)*2-3 for odd where S(n) is the nth element.
So 7th element = 239*2-3=475

4)2
The function is S(n)=(n+2)^3 -2

5)1
The numbers in the sequence is a combination of n^2 and n^3 and n is odd.

6)2
The function is S(n)=S(n-1)*n-n n>1
=3 n=1

7)

8)1
The function is S(n)=(S(n-1)-1)*(n-1) n>1
=8 n=1

9)

10)


1 2)256 3)68.6 4)53

Puzzles 1

For questions 1-10 : Find the odd one

1)
1)518 2)448 3)426 4)574

2)
1)4 2)28 3)48 4)100

3)
1)AON 2)EWR 3)IEV 4)OLB

4)
1)Mouse 2)Monitor 3)Keyboard 4)Joy stick

5)
1).jpeg 2).exe 3).jpg 4).gif

6)
1)Scissors 2)Knives 3)Trousers 4)Knickers

7)
1)Kill 2)Will 3)Fill 4)Bill

8)
1)Xylophone 2)Telephone 3)Violin 4)Clarinet

9)
1)Nucles 2)Mitochondria 3)Celloplasm 4)Tissue

10)
1)RAM 2)Cache 3)Hard disk 4)Compact Disc

Direction for questions 11 to 15: Each question contains five or six statements followed by four sets of three statements each.Choose the set in which the statements are logically related.

11)
(A)No teacher is patient.
(B)Some teacher are not patients.
(C)No teachers is a doctor.
(D)Some nurses are not teachers.
(E)Some nurses are doctors.
(F)All patients are doctors.
1)CAF 2)CED 3)BCF 4)All the three

12)
(A)Some bowlers are not cricketers.
(B)All batsmen are bowlers.
(C)All cricketers are not batsmen.
(D)All bowlers are cricketers.
(E)Some cricketers are bowlers.
(F)Some bowlers are not batsmen.
1)ECF 2)ABC 3)CDF 4)None of these

13)
(A)Some SMS are not GMS.
(B)Each SMS is TMS.
(C)Some SMS are MMS.
(D)No MMS is GMS.
(E)Most TMS is MMS.
(F)No GMS is TMS.
1)ADC 2)DEF 3)BDF 4)None of these

14)
(A)No CPI is BJP.
(B)No BJP is Congress.
(C)Some BJP's are SAD
(D)No Congress is CPI
(E)Some SAD's are not Congress.
(F)Some SAD's are CPI's.
1)ABD 2)ECB 3)DFC 4)None of these

15)
(A)Every credit card is not a green card.
(B)Some credit cards are direct credit cards.
(C)Some direct credit cards are not debit cards.
(D)No credit card is a debit card.
(E)Some green cards are debit cards.
(F)No credit card is a direct credit card.
1)CDF 2)AED 3)BCD 4)None of these

Directions for questions 16 to 20: Read the following passage, and from the statements that follow each passage choose the one that can be concluded from the passage.

16)Those who can speak English. Some Marathi speaking people cannot speak English. All Bengali speaking people are Indians.All Indians can speak Hindi.
1)Some Bengali speaking people cannot speak Marathi.
2)Some English speaking people are not Indians.
3)Some Marathi speaking people cannot speak Bengali.
4)None of these

17)Some non vegetarians are animals.Vegetarian eat only vegatables.All non-vegetarians are vegetarians. Those who eat only vegetables do not eat meat.No animal is a human.
1)Some, who do not eat meat,are human.
2)No animal is vegetarian.
3)Human do not eat meat.
4)None of these.

18)Norah Jones is a singer.Those who don't know how to play violin,know how to play guitar.Those who sing songs,don't know how to play violin.Every singer sings songs.
1)Singers know how to play guitar.
2)All singers don't know how to play violine.
3)Norah Jones knows how to play guitar.
4)None of these.

19)Coal is black.Somethings which glitter are diamonds.No glitter is gold.Diamond is coal.
1)Some gold is coal.
2)Somethings, which are gold are not black.
3)Somethings, which are black are not gold.
4)None of these

20)Leaders are assertive people.Trainees are developers.Those who take classes are not Doctors.Doctors are not leaders.Some developers take classes.
1)Some assertive people are not trainees.
2)All trainees are not assertive people.
3)Some leaders are not trainees.
4)None of these.

Answer

1)

2)3,
The number obtained by dividing 48 with 4 is 12 which is even while all the others get odd number for the same.

3)4,
The sequence has to be AON,EWR,IEV,MMZ

4)2
The remaining 3 are input devices.

5)2
The remaining 3 represent an image.

6)3
Trousers can only take a plural form while others can also take a singular form.

7)

8)

9)4
All the other three lie inside a cell.

10)

11)4

12)3

13)1

14)2

15)3

16)3

17)1

18)3

19)3

20)4

Monday, March 15, 2010

Microsoft interview Questions

Round 1: Written test
Paper style: 3 subjective questions
Time limit: 1½ hour
Question 1: Finding output....
It was string cruncher program. First remove all repeated consecutive substring with length 1, then delete substring of length 2 and so on...
Example : string is “abcabeccced”
After removing repeated substring of length 1: “abcababceccced” --> “abcababceced” (2 'c' are removed)
After removing repeated substring of length 2: “abcababceced” --> “abcabceced” (substring “ab” is removed)
and so on...
Question 2: Writing a program.
Definition: You are given 3 integer arrays A, B and C of length n1, n2 and n3 respectively. All arrays are sorted. We define triplet of these 3 arrays as (x,y,z) where x is any integer from A, y from B and z from C. We define distance of triplet as maximum difference among triplet elements, i.e. Maximum of x – y, y – z or z – x. Write a program to find minimum triplet distance. (means there are n1*n2*n3 number of possible triplets are possible...among all triplets which triplet has minimum distance...Give only distance, but not triplet elements). Your program must be as much efficient as possible.
Question 3: Writing program.
Definition: You are given 2 integer numbers in linked list form. Add those 2 numbers.
Example: First number is 234 and second number is 35. So, you are provided with 2 linked lists 2->3->4 and 3->5. Your answer must be 2->6->9. (Make sure to take care of carry number). This example was given in paper.
Round 2: Group Interview
All candidates who had cleared the written test were called for group interview. Here we were given 3 problems one by one. Time limit was between 15 to 20 minutes. Once they gave problem definition we were supposed to think on it and discuss our ideas and logic about solving that problem with one of the representatives from Microsoft. Once that representative was convinced with our logic then we had to write code for that problem on paper.
Problem 1: You are given a string. Develop a function to remove duplicate characters from that string. String could be of any length. Your algorithm must be in space. If you wish you can use constant size extra space which is not dependent any how on string size. Your algorithm must be of complexity of O(n). Example: Given string is BANANAS. Output must be BANS. All repeated characters are removed.
Problem 2: You have a tree and address of its root. Write an efficient program to test whether a given tree is Binary search Tree or not. (Hint: In-order traversal of binary search tree is sorted in increasing order. Use this property to develop program)
Problem 3: You have 2 sorted lists and a function that merge that 2 lists such that output is again sorted and duplicates are removed. That means output is union of those 2 lists in sorted form.
Example: First list is 2->3->5->6->8 and second list is 4->5->6->7 and output of function is 2->3->4->5->6->7->8.
Develop test cases to test given function such that your test cases ensures that given function works for every situation. That is if inputs are valid then it gives proper output in any case or otherwise it shows error message.
Round 3: First Technical Interview
All those who had cleared group interview were called for first technical interview. They were taking minimum 2 hours for first interview. Some of us also faced interview for 3 or more hours.
Round 4: Second Technical Interview
All those who had cleared first technical interview were called for second interview. This was last round of interview. They took 1½ to 2 hours for this second interview.
I don't remember all the questions which were asked to me in both interviews. But still some of the questions which I can remember (almost 80 to 90% questions) are listed below.
In both interview they ask questions from C/C++, java, OS, Data structure and algorithms, Microprocessors and compiler constructions. With this, they also asked me to develop more than 6 to 8 programs. You can develop all programs in 5 to 7 minutes. But after writing program they asked to find its complexity and try to reduce the complexity and write the program again. In this way it took almost 15 to 20 min for each program. Some took less than 15 minutes also.
Some of the interview questions are as follows:
1. You are given a linked list and block size k. Reverse block of size k from list.
For example you are given linked list of 1000 nodes and block size is 5 then instead of reversing whole list, reverse first 5 elements, then 6 to 10 elements, then 11 to 15 elements, and so on...You have singly linked list and your algorithm which you will implement must be in space, that is no extra space is allowed.
2. You are given a tree and any 2 nodes of that tree. Find common parent of both nodes. Develop as much efficient program as you can.
3. In unix there is a command called “tail”. Implement that command in C.
4. Some questions about race condition (OS)
5. Questions related to semaphores.
6. Questions related to mutex. Applications of mutex. How to implement mutex in OS?
7. Questions about Critical region (OS).
8. How to ensure that race condition doesn't occur. Give your view as you are OS designer.
9. How to ensure that each process lock the critical region before they enter in it. As OS designer How will you force the process to do this?
10. Questions on IPC
11. Questions on Shared memory and Message passing mechanism.
12. Difference between system call and API call
13. How system call works? What happens when system call is invoked?
14. Different types of system calls?
15. Some questions from microprocessor. About Interrupts
16. Types of Interrupts. What happened when interrupt is called?
17. You are given a hard copy of a program which contains some errors. Your job is to find all types of errors from it. And discuss why is it an error. Write correct program for the same.
18. You are given a linked list and a number n. You also have a function to delete all nodes from that list which are at position which multiple of n in the list.
Example: if number is 3 then delete 3rd, 6th, 9th ,...nodes form the list. Develop a program that tests whether given function works properly or not. (In short they are asking me to develop general program for all test cases. By running that program all tests can be performed.)
19. Questions on java. Exception handling
20. Need of catch and finally block in java exception handling..
21. How will you create your own exception.. Explain with example.
22. Some questions on compiler construction. What is parser? What is input to the parser and what is output of parser? Difference between top down and bottom up parser.
23. F(1) = 1.
F(2n) = F (n) and F(2n+1) = F(n) + F(n+1).
Develop recursive program.
24. You are given a string which contains some special characters. You also have set of special characters. You are given other string (call it as pattern string). Your job is to write a program to replace each special characters in given string by pattern string. You are not allowed to create new resulting string. You need to allocate some new memory to given existing string but constraint is you can only allocate memory one time. Allocate memory exactly what you need not more not less.
25. Assume that your friend is writing a book . He gives you a file that contains that book. Your job is to develop an algorithm for indexing of that book. In every book there is one index at end which contains some words which are not there in normal vocabulary dictionary. It also contains page number for reference. You can use any data structure you want. You need to justify why you have used that data structure and also need to justify your logic.
26. Question from my B.E. final semester project. Asked me to explain whole project.
27. Question from everything written on my resume.
28. Question from my every project I did. They asked me to explain each project and then how to do some modification? That modification will be suggested by interviewer himself.
29. My experience in Teaching assistantship.
30. They had my written test answer sheet. They opened it and asked me to explain why I gave that output or why I implement that logic. How did I arrive to that solution which I had written in answer sheet.
31. In written test, for second question I had implement a program which was not much efficient. During interview they ask me to optimize my program. They also gave hint to optimize it.
32. During group interview, in second problem I was only able to discuss logic I was unable to develop program in given time limit. Interviewer knew this. She asked me to develop that program during interview.
33. Which is your favorite software tool? If you are allowed to add any feature in it which feature you will add?
34. Which is your favorite subject? Some questions from that subject.
35. Something about yourself , your hobbies, interests, strengths and weakness.

Saturday, March 13, 2010

Microsoft Interview Questions

• There are 2 sorted arrays A and B of size n each. Write an algorithm to find the median of the array obtained after merging the above 2 arrays(i.e. array of length 2n). Full points are given for the solution bearing efficiency O(log n). Partial points for the efficiency O(n).

• Given a string *Str of ASCII characters, write the pseudo code to remove the duplicate elements present in them. For example, if the given string is "Potato", then, the output has to be "Pota". Additional constraint is, the algorithm has to be in-place( no extra data structures allowed) . Extend your algorithm to remove duplicates in the string which consisted of UNICODE characters.

• Given that, there are 2 linked lists L1 and L2. The algorithm finds the intersection of the two linked lists. i.e' "L1 intersection L2 " ( similar to intersection of 2 sets ). Write all the possible test cases involved in the above given problem.

Friday, March 12, 2010

TCS whole test paper 29 jan 2010

1)APTITUDE TEST:

Questions = 82 ; time limit = 90 minutes. no negative marking. Offline (paper & pen) test and a PSYCHOMETRY TEST also.

Section 1: VERBAL ( 32 Questions ,20 minutes )

Directions for questions 1-10:Find the synonyms of the following words

1. ADAGE
A. advice B. proverb C. enlargement D. advantage

Ans: B

2. TO DISPEL
A. to dissipate B. to dissent C. to distort D. to disfigure
Ans: A

3. ERRATIC
A. unromantic B. unknown C. popular D. steady

Ans: B

4. TO MERIT
A. to embrace B. to devote C. to deserve D. to combine
Ans: C

5. RAPT
A. lively B. concealed C. engrossed D. prototype

Ans: B

6. TO HEAP

A. to pile B. to forbid C. to proceed D. to share

Ans: A


7. OVULATE
A. penury B. immunize C. fertilize D. reproduce

Ans: C

8. Motley

A. Uniform B. homogenous C. monochrome D. Assorted

Ans: D

9. mitigate

A. palliate B. Aggravate C. exacerbate D. None of these

Ans: A

10. Compunction

A. Regret B. scruple C. qualm D. None of these

Ans: D

Directions for questions 11-20:Find the Antonyms of the following words

11. Moribund

A. declining B. dilapidated C. waning D. thriving
Ans: D

12. Repudiate

A. reject B. disclaim C. acknowledge D. renounce,

Ans: C

13. Inundate

A. starve B. swamp C. deluge D. drown
Ans: A

14. Tenacity

A. obstinacy B. irresolution C. firmness D. resolve

Ans: B

15. Sobriety

A. flippancy B. temperance C. moderation D. soberness

Ans: A

16. Hidebound

A. narrow-minded B. conservative C. prejudiced D. broad-minded

Ans: D

17. Nebulous

A. vague B. imprecise C. precise D. hazy

Ans: C

18. Debacle

A. catastrophe B. fiasco C. success D. shambles,

Ans: C

19. Candid

A. frank B. guarded C. open D. truthful

Ans: B

20. Dangle

A. stick up B. sway C. suspend D. droop

Ans: A

Directions for Questions 21-26: Read the passage and answer the questions that follow on the basis of the information provided in the passage.

Educational planning should aim at meeting the educational needs of the entire population of all age groups. While the traditional structure of education as a three layer hierarchy from the primary stage to the university represents the core, we should not overlook the periphery which is equally important. Under modern conditions, workers need to rewind, or renew their enthusiasm, or strike out in a new direction, or improve their skills as much as any university professor. The retired and the aged have their needs as well. Educational planning, in their words, should take care of the needs of everyone.

Our structures of education have been built up on the assumption that there is a terminal point to education. This basic defect has become all the more harmful today, A UNESCO report entitled 'Learning to Be' prepared by Edger Faure and others in 1973 asserts that the education of children must prepare the future adult for various forms of self-learning. A viable education system of the future should consist of modules with different kinds of functions serving a diversity of constituents. And performance, not the period of study, should be the basis for credentials. The writing is already on the wall.

In view of the fact that the significance of a commitment of lifelong learning and lifetime education is being discussed only in recent years even in educationally advanced countries, The possibility of the idea becoming an integral part of educational thinking seems to be a far cry. For, to move in that direction means such more than some simple rearrangement of the present organisation of education. But a good begining can be made by developing open university programmes for older learners of different categories and introducing extension services in the conventional colleges and schools. Also these institutions should learn to co-operate with the numerous community organizations such as libraries, museums, municipal recreational programmes, health services etc.

21. What is the main thrust of the author ?

A) Traditional systems should be strengthened

B) Formal education is more important than non-formal

C) One should never cease to learn

D) It is impossible to meet the needs of everyone

E) There is no substitute for the extent system of education

Ans: C

22. Which of the following best describes the purpose of the author ?

A) To criticise the present educational system.

B) To strengthen the present educational practices

C) To support non-conventional educational organisations.

D) To present a pragmatic point of view

E) None of these

Ans : D

23.Which of the following is most nearly the same in meaning as the word 'meeting' as used in the passage.

A) Approaching B) Contacting C) introducing D) representing E) satisfying

Ans: E

24. Which of the following is most opposite in meaning to the word 'integral' as used in the passage.

A) essential B) independent C) major D) minor E) unwilling

Ans: B

25. According to the author, what should be the basis for awarding credentials?

A) Duration of the course

B) Competence of the course teachers

C) Diversity of the topics covered

D) Real grasp of matter or skill

E) Participation in community activities

Ans: D

26. According to the author, educational plan should attempt to

A) train the people at the core

B) encourage conventional schools and colleges

C) decide a terminal point to education

D) overlook the people on the periphery

E) fulfil the educational needs of everyone.

Ans : A

Directions 27-32 : Pick out the most effective word from the given words to fill in the blank to make the sentence meaningfully complete.

27. .............you meet my son in the market, ask him to come home at once

A) Will B) While C) Should D) Would

Ans : C

28. Sanjay was sure..............getting a first class in the examination

A) at B) of C) on D) about

Ans : B

29. She seems offended .................my remarks

A) with B) for C) upon D) at

Ans : D

30. The mounting pressure was so overwhelming that he ultimately.................to her wish

A) agreed in B) cowed in C) gave in D) yielded in

Ans : C

31. He has no objection.................my proposal

A) to B) for C) in D) towards

Ans: A

32. Wash your hands.............water

A) from B) with C) by D) in

Ans: B

Section 2: QUANTITATIVE/LOGICAL REASONING ( 38 questions , 40 minutes )

1. Two Pencils 8 cents 5 Pencils cost

Ans: 20 cents

2. If 2x-y=4 then 6x-3y=?
(a)15 (b)12 (c)18 (d)10

Ans. (b)

3. Pipe A can fill in 20 minutes and Pipe B in 30 mins and Pipe C can empty the same in 40 mins. If all of them work
together, find the time taken to fill the tank
(a) 17 1/7 mins (b) 20 mins (c) 8 mins (d) none of these
Ans. (a)

4. Thirty men take 20 days to complete a job working 9 hours a day. How many hour a day should 40 men work to
complete the job?
(a) 8 hrs (b) 7 1/2 hrs (c) 7 hrs (d) 9 hrs
Ans. (b)

5. A goat is tied to one corner of a square plot of side 12m by a rope 7m long. Find the area it can graze?
(a) 38.5 sq.m (b) 155 sq.m (c) 144 sq.m (d) 19.25 sq.m
Ans. (a)

6. Mr. Shah decided to walk down the escalator of a tube station. He found that if he walks down 26 steps, he
requires 30 seconds to reach the bottom. However, if he steps down 34 stairs he would only require 18 seconds
to get to the bottom. If the time is measured from the moment the top step begins to descend to the time he steps
off the last step at the bottom, find out the height of the stair way in steps?
Ans.46 steps.

7. The average age of 10 members of a committee is the same as it was 4 years ago, because an old member has
been replaced by a young member. Find how much younger is the new member?
Ans.40 years.

8. ABCE is an isosceles trapezoid and ACDE is a rectangle. AB = 10 and EC = 20. What is the length of AE?

Ans. AE = 10.

9.Three cards are drawn at random from an ordinary pack of cards. Find the probability that they will consist of a
king, a queen and an ace.
Ans. 64/2210.

10. A number of cats got together and decided to kill between them 999919 mice. Every cat killed an equal number
of mice. Each cat killed more mice than there were cats. How any cats do you think there were ?
Ans. 991

11. If Log2 x - 5 Log x + 6 = 0, then what would the value / values of x be?
Ans. x = e2 or e3.

12. The square of a two digit number is divided by half the number. After 36 is added to the quotient, this sum is
then divided by 2. The digits of the resulting number are the same as those in the original number, but they are
in reverse order. The ten's place of the original number is equal to twice the difference between its digits.
What is the number?
Ans. 46

13. A monkey starts climbing up a tree 20ft. tall. Each hour, it hops 3ft. and slips back 2ft. How much time would it
take the monkey to reach the top?
Ans.18 hours

14. What is the missing number in this series?
8 2 14 6 11 ? 14 6 18 12
Ans. 9

15. A certain type of mixture is prepared by mixing brand A at Rs.9 a kg. with brand B at Rs.4 a kg. If the mixture
is worth Rs.7 a kg , how many kgs. of brand A are needed to make 40kgs of the mixture?
Ans. Brand A needed is 24kgs.

16. A wizard named Nepo says "I am only three times my son's age. My father is 40 years more than twice my age.
Together the three of usare a mere 1240 years old." How old is Nepo?
Ans. 360 years old.

17. One dog tells the other that there are two dogs in front of me. The other one also shouts that he too had two
behind him. How many are they?
Ans. Three.

18. A man ate 100 bananas in five days, each day eating 6 more than the previous day. How many bananas did he
eat on the first day?
Ans. Eight.

19. If it takes five minutes to boil one egg, how long will it take to boil four eggs?
Ans. Five minutes.

20.Daal is now being sold at Rs. 20 a kg. During last month its rate was Rs. 16 per kg. By how much percent
should a family reduce its consumption so as to keep the expenditure fixed?
Ans. 20 %

21. Can you find out what day of the week was January 12, 1979?
Ans. Friday

22. From 5 different green balls, four different blue balls and three different red balls, how many combinations of
balls can be chosen taking at least one green and one blue ball?
Ans. 3720.

23. Three pipes, A, B, & C are attached to a tank. A & B can fill it in 20 & 30 minutes respectively while C can
empty it in 15 minutes. If A, B & C are kept open successively for 1 minute each, how soon will the tank be
filled?
Ans. 167 minutes.
24. A person walking 5/6 of his usual rate is 40 minutes late. What is his usual time?

Ans. 3 hours 20 minutes.
25. A garrison of 3300 men has provisions for 32 days, when given at a rate of 850 grams per head. At the end of
7 days reinforcement arrives and it was found that now the provisions will last 8 days less, when given at the rate
of 825 grams per head.How, many more men can it feed?
Ans. 1700 men

26. In the given figure, PA and PB are tangents to the circle at A and B respectively and the chord BC is parallel to
tangent PA. If AC = 6 cm, and length of the tangent AP is 9 cm, then what is the length of the chord BC?
Ans. BC = 4 cm

27. A boat travels 20 kms upstream in 6 hrs and 18 kms downstream in 4 hrs. Find the speed of the boat in still
water and the speed of thewater current?
(a) 1/2 kmph (b) 7/12 kmph (c) 5 kmph (d) none of these
Ans. (b)

28. Find the smallest number in a GP whose sum is 38 and product 1728
(a) 12 (b) 20 (c) 8 (d) none of these
Ans. (c)
29. If x=y=2z and xyz=256 then what is the value of x?

(a)12 (b)8 (c)16 (d)6

Ans. (b)

30. (1/10)18 - (1/10)20 = ?
(a) 99/1020 (b) 99/10 (c) 0.9 (d) none of these
Ans. (a)
31.A train running at 72 kms per hour crosses a coconut tree standing by the side of the track in 7 seconds. The
length of the train is:

(A) 104 metres (B) 140 metres (C) 504 metres (D) 540 metres

Ans: B

32. If 12 men and 16 boys can do a piece of work in 5 days and 13 men and 24 boys can do it in 4 days, the ratio
of daily work done by a man to that done by a boy is:

(A) 1 : 3 (B) 1 : 2 (C) 2 : 1 (D) 3 : 1

Ans: C

33. A cistern is filled by a tap in 3 1/2hours. Due to a leak in its bottom, it takes 12 hour longer to fill. If cistern is
full, how long will it take to leak to empty it?

(A) 7 hours (B) 8 hours (C) 14 hours (D) 28 hours

Ans: D

34. A can do a piece of work in 7 days of 9 hours each whereas B can do the same work in 6 days of 7 hours each
How long will it take to complete the work together working 8 2/5 hours a day?

(A) 2 days (B) 3 days (C) 3 1/7 days (D) 4 2/5 days

Ans: B

35. A bus left Delhi for Ambala at 50 km/hr and turned over the same route at 40 km/hr. Thus it took 1 hour more
on the return trip. The distance between Delhi and Ambala is:

(A) 200 kms (B) 180 kms (C) 400 kms (D) None of these

Ans: A

36. A man purchased a bag of rice containing 70 kgs for Rs 175. He sold it at the rate of Rs 2.75 per kg.
Find the profit and loss per cent.

(A) 10% profit (B) 10% loss (C) 12.5% profit (D) 12.5% loss

Ans: A

37. A shopkeeper gives 3 consecutive discounts of 10%, 15% and 15% after which he sells his goods at a
percentage profit of 30.05% on the cost price. Find the value of the percentage profit that the shopkeeper
would have earned if he had given discounts of 10% and 15% only:

(A) 53% (B) 62.5% (C) 72.5% (D) 68.6%

Ans: A

38. A journey of 192 kms takes 2 hours less by a fast train than by a slow train. If the average speed of the slow
train is 16 kmph less than that of a fast train, what is the average speed of the fast train?

(A) 30 kmph (B) 48 kmph (C) 20 kmph (D) 25 kmph

Ans: B

Section 3: CRITICAL REASONING ( 12 questions , 30 minutes)

Directions 1-12: Answer the questions given below the passage or statement as true, false or can't say.

PASSAGE : In the past helicopters were forced to ground or crash because of the formation of the ice on the rotors and engines. A new electronic device has been developed which can detect the water content in the atmosphere and warns the pilot if the temperature is below freezing temperature about the formation of the ice on the rotors and wings.

Answer questions 17-20 based on passage

1.The electronic device can avoid formation of the ice on the wings

Ans.False

2. There will be the malfunction of rotor & engine because of formation of ice

Ans.True

3. The helicopters were to be crashed or grounded

Ans.True

4. There is only one device that warn about the formation of ice

Ans.True

PASSAGE : Human existence is suspicious of arbitrary divide between concise and unconcise. The concise world invades shape activity of the unconcise, while many of great activity of humanity waking as whole or partially improved by dreams. Even it could be ignored that dreams precede exceptional such a dichotomy could not be drawn as the influence of dream on waking state would remain unclear. But as yet no company rebuilt exists to record the substitute of prenatal dreaming.

Answer questions 5- 8 based on passage

5. Sleepy can be creative state

Ans. True
6. It is difficult to tell whether a sleeper is dream or not

Ans. True
7. If we know what babies would dream about before they are born we could show that the concise and unconcise
mind influence on one another .

Ans. Can't say
8. It is untrue claim that concise and unconcise world never impinge one another

Ans.True

PASSAGE : Although invaders represent a threat to the conservation of flora and fauna, there are two special cases in which invasion have been deliberately brought about. One is the desire to control presents by natural predators, which may have to be brought in from other countries. The second is releasing organisms into the wild (or on to farms, from which they might escape) that are completely novel, because they have been genetically engineered. There is nothing intrinsically sinister about engineered organisms, but any novelty must be regarded as a potential invader.

Answer questions 9-12 based on passage

9.Pest control does not threat the conservation of flora and fauna.

Ans.True
10.Genetically engineered organisms must always be regarded as potentially dangerous.

Ans. False
11.Natural predators are work harmful than pests.

Ans. True
12.Genetically engineered organisms escaped from the farm, they will be pose a threat to wildlife.

Ans. True

3i INFO TECH Aptitude

Aptitude Questions

1.

If 2x-y=4 then 6x-3y=?
(a)15 (b)12 (c)18 (d)10 Ans. (b)
2.

If x=y=2z and xyz=256 then what is the value of x? (a)12 (b)8 (c)16 (d)6 Ans. (b)

3. (1/10)18 - (1/10)20 = ?

(a) 99/1020 (b) 99/10 (c) 0.9 (d) none of these Ans. (a)
4. Pipe A can fill in 20 minutes and Pipe B in 30 mins and Pipe C can empty the same in 40 mins.If all of them work together, find the time taken to fill the tank

(a) 17 1/7 mins (b) 20 mins (c) 8 mins (d) none of these Ans. (a)
5. Thirty men take 20 days to complete a job working 9 hours a day.How many hour a day should 40 men work to complete the job?

(a) 8 hrs (b) 7 1/2 hrs (c) 7 hrs (d) 9 hrs Ans. (b)
6. . Find the smallest number in a GP whose sum is 38 and product 1728

(a) 12 (b) 20 (c) 8 (d) none of these Ans. (c)
7. A boat travels 20 kms upstream in 6 hrs and 18 kms downstream in 4 hrs.Find the speed of the boat in still water and the speed of the water current?

(a) 1/2 kmph (b) 7/12 kmph (c) 5 kmph (d) none of these Ans. (b)
8. A goat is tied to one corner of a square plot of side 12m by a rope 7m long.Find the area it can graze?

(a) 38.5 sq.m (b) 155 sq.m (c) 144 sq.m (d) 19.25 sq.mAns. (a)
9. Mr. Shah decided to walk down the escalator of a tube station. He found that if he walks down 26 steps, he requires 30 seconds to reach the bottom. However, if he steps down 34 stairs he would only require 18 seconds to get to the bottom. If the time is measured from the moment the top step begins to descend to the time he steps off the last step at the bottom, find out the height of the stair way in steps?

Ans.46 steps.
10.

The average age of 10 members of a committee is the same as it was 4 years ago, because an old member has been replaced by a young member. Find how much younger is the new member ? Ans.40 years.
11.

Three containers A, B and C have volumes a, b, and c respectively; and container A is full of water while the other two are empty. If from container A water is poured into container B which becomes 1/3 full, and into container C which becomes 1/2 full, how much water is left in container A?

12.

ABCE is an isosceles trapezoid and ACDE is a rectangle. AB = 10 and EC = 20. What is the length of AE? Ans. AE = 10
13.

In the given figure, PA and PB are tangents to the circle at A and B respectively and the chord BC is parallel to tangent PA. If AC = 6 cm, and length of the tangent AP is 9 cm, then what is the length of the chord BC? Ans. BC = 4 cm.
14.

Three cards are drawn at random from an ordinary pack of cards. Find the probability that they will consist of a king, a queen and an ace. Ans. 64/2210
15.

A number of cats got together and decided to kill between them 999919 mice. Every cat killed an equal number of mice. Each cat killed more mice than there were cats. How many cats do you think there were ? Ans. 991.
16. If Log2 x - 5 Log x + 6 = 0, then what would the value / values of x be?

Ans. x = e2 or e3.
17.

In june a baseball team that played 60 games had won 30% of its game played. After a phenomenal winning streak this team raised its average to 50% .How many games must the team have won in a row to attain this average?

A. 12 B. 20 C. 24 D. 30 (Ans. C)
18. .Can you tender a one rupee note in such a manner that there shall be total 50 coins but none of them would be 2 paise coins.? Ans. 45 one paisa coins, 2 five paise coins, 2 ten paise coins, and 1 twenty-five paise coins.
19. A monkey starts climbing up a tree 20ft. tall. Each hour, it hops 3ft. and slips back 2ft. How much time would it take the monkey to reach the top? Ans.18 hours.
20. What is the missing number in this series? 8 2 14 6 11 ? 14 6 18 12 Ans. 9
21. A certain type of mixture is prepared by mixing brand A at Rs.9 a kg. with brand B at Rs.4 a kg. If the mixture is worth Rs.7 a kg., how many kgs. of brand A are needed to make 40kgs. of the mixture? Ans. Brand A needed is 24kgs.
22.

A wizard named Nepo says "I am only three times my son's age. My father is 40 years more than twice my age. Together the three of us are a mere 1240 years old." How old is Nepo? Ans. 360 years old.

23.

One dog tells the other that there are two dogs in front of me. The other one also shouts that he too had two behind him. How many are they? Ans. Three
24.

A man ate 100 bananas in five days, each day eating 6 more than the previous day. How many bananas did he eat on the first day? Ans. Eight.

25. If it takes five minutes to boil one egg, how long will it take to boil four eggs?

Ans. Five minutes.
26.

The minute hand of a clock overtakes the hour hand at intervals of 64 minutes of correct time. How much a day does the clock gain or lose? Ans. 32 8/11 minutes.

27.

Solve for x and y: 1/x - 1/y = 1/3, 1/x2 + 1/y2 = 5/9. Ans. x = 3/2 or -3 and y = 3 or -3/2.
28.

Daal is now being sold at Rs. 20 a kg. During last month its rate was Rs. 16 per kg. By how much percent should a family reduce its consumption so as to keep the expenditure fixed? Ans. 20 %.

29.

Find the least value of 3x + 4y if x2y3 = 6. Ans. 10.
30.

Can you find out what day of the week was January 12, 1979?Ans. Friday.
31.

A garrison of 3300 men has provisions for 32 days, when given at a rate of 850 grams per head. At the end of 7 days a reinforcement arrives and it was found that now the provisions will last 8 days less, when given at the rate of 825 grams per head. How, many more men can it feed? Ans. 1700 men.

32.

From 5 different green balls, four different blue balls and three different red balls, how many combinations of balls can be chosen taking at least one green and one blue ball?

33.

Three pipes, A, B, & C are attached to a tank. A & B can fill it in 20 & 30 minutes respectively while C can empty it in 15 minutes. If A, B & C are kept open successively for 1 minute each, how soon will the tank be filled? Ans. 167 minutes.
34.

A person walking 5/6 of his usual rate is 40 minutes late. What is his usual time? Ans. 3 hours 20 minutes.
35. For a motorist there are three ways going from City A to City C. By way of bridge the distance is 20 miles and toll is $0.75. A tunnel between the two cities is a distance of 10 miles and toll is $1.00 for the vehicle and driver and $0.10 for each passenger. A two-lane highway without toll goes east for 30 miles to city B and then 20 miles in a northwest direction to City C.
1. . Which is the shortest route from B to C
(a) Directly on toll free highway to City C (b) The bridge (c) The Tunnel
(d) The bridge or the tunnel (e) The bridge only if traffic is heavy on the toll free highway
Ans. (a)
2. The most economical way of going from City A to City B, in terms of toll and distance is to use the
(a) tunnel (b) bridge (c) bridge or tunnel (d) toll free highway
(e) bridge and highway
Ans. (a)
3. Jim usually drives alone from City C to City A every working day. His firm deducts a percentage of employee pay for lateness. Which factor would most influence his choice of the bridge or the tunnel ?
(a) Whether his wife goes with him (b) scenic beauty on the route
(c) Traffic conditions on the road, bridge and tunnel
(d) saving $0.25 in tolls (e) price of gasoline consumed in covering additional 10 miles on the bridge
Ans. (a)
4.

In choosing between the use of the bridge and the tunnel the chief factor(s) would be: I. Traffic and road conditions II. Number of passengers in the car
III. Location of one's homes in the center or outskirts of one of the cities
IV. Desire to save $0.25
(a) I only (b) II only (c) II and III only (d) III and IV only
(e) I and II only Ans. (a)
36.

The letters A, B, C, D, E, F and G, not necessarily in that order, stand for seven consecutive integers from 1 to 10, D is 3 less than A, B is the middle term
F is as much less than B as C is greater than D, G is greater than F,

1.

The fifth integer is
(a) A (b) C (c) D (d) E (e) F Ans. (a)
2.

A is as much greater than F as which integer is less than G
(a) A (b) B (c) C (d) D (e) E Ans. (a)
3. If A = 7, the sum of E and G is
(a) 8 (b) 10 (c) 12 (d) 14 (e) 16 Ans. (a)
4. A - F = ?
(a) 1 (b) 2 (c) 3 (d) 4 (e) Cannot be determined Ans. (a)
5. An integer T is as much greater than C as C is greater than E. T can be written as A + E. What is D?
(a) 2 (b) 3 (c) 4 (d) 5 (e) Cannot be determined Ans. (a)
6. The greatest possible value of C is how much greater than the smallest possible value of D? (a) 2 (b) 3 (c) 4 (d) 5 (e) 6 Ans. (a)

37.

1. All G's are H's
2. All G's are J's or K's
3. All J's and K's are G's
4. All L's are K's
5. All N's are M's
6. No M's are G's
1.

If no P's are K's, which of the following must be true?
(a) All P's are J's (b) No P is a G (c) No P is an H (d) If any P is an H it is a G (e) If any P is a G it is a J Ans. (a)
2.

Which of the following can be logically deduced from the conditions stated?
(a) No M's are H's (b) No M's that are not N's are H's (c) No H's are M's
(d) Some M's are H's (e) All M's are H's Ans. (a)
3.

Which of the following is inconsistent with one or more of the conditions?
(a) All H's are G's (b) All H's that are not G's are M's (c) Some H's are both M's and G's (d) No M's are H's (e) All M's are H's Ans. (a)
4.

The statement "No L's are J's" is
I. Logically deducible from the conditions stated
II. Consistent with but not deducible from the conditions stated
III. Deducible from the stated conditions together with the additional statement "No J's are K's"
(a) I only (b) II only (c) III only (d) II and III only
(e) Neither I, II nor III Ans. (a)
38.

In country X, democratic, conservative and justice parties have fought three civil wars in twenty years. TO restore stability an agreement is reached to rotate the top offices President, Prime Minister and Army Chief among the parties so that each party controls one and only one office at all times. The three top office holders must each have two deputies, one from each of the other parties. Each deputy must choose a staff composed of equally members of his or her chiefs party and member of the third party.
1.

When Justice party holds one of the top offices, which of the following cannot be true
(a) Some of the staff members within that office are justice party members
(b) Some of the staff members within that office are democratic party members
(c) Two of the deputies within the other offices are justice party members
(d) Two of the deputies within the other offices are conservative party members
(e) Some of the staff members within the other offices are justice party members.
Ans. (a)
2.

When the democratic party holds presidency, the staff of the prime minister's deputies are composed
I. One-fourth of democratic party members
II. One-half of justice party members and one-fourth of conservative party members
III. One-half of conservative party members and one-fourth of justice party members.
(a) I only (b) I and II only (c) II or III but not both
(d) I and II or I and III (e) None of these Ans. (a)
3. Which of the following is allowable under the rules as stated:
(a) More than half of the staff within a given office belonging to a single party
(b) Half of the staff within a given office belonging to a single party
(c) Any person having a member of the same party as his or her immediate superior
(d) Half the total number of staff members in all three offices belonging to a single party
(e) Half the staff members in a given office belonging to parties different from the party of the top office holder in that office.
Ans. (a)
4. The office of the Army Chief passes from Conservative to Justice party. Which of the following must be fired.
(a) The democratic deputy and all staff members belonging to Justice party
(b) Justice party deputy and all his or hers staff members
(c) Justice party deputy and half of his Conservative staff members in the chief of staff office
(d) The Conservative deputy and all of his or her staff members belonging to Conservative party
(e) No deputies and all staff members belonging to conservative parties.
Ans. (a)
39. In recommendations to the board of trustees a tuition increase of $500 per year, the president of the university said "There were no student demonstrations over the previous increases of $300 last year and $200 the year before". If the president's statement is accurate then which of the following can be validly inferred from the information given:
I. Most students in previous years felt that the increases were justified because of increased operating costs.
II. Student apathy was responsible for the failure of students to protest the previous tuition increases.
III. Students are not likely to demonstrate over new tuition increases.

(a) I only (b) II only (c) I or II but not both (d) I, II and III
(e) None Ans. (a)
40. The office staff of XYZ corporation presently consists of three bookeepers--A, B, C and 5 secretaries D, E, F, G, H. The management is planning to open a new office in another city using 2 bookeepers and 3 secretaries of the present staff . To do so they plan to seperate certain individuals who don't function well together. The following guidelines were established to set up the new office

I. Bookeepers A and C are constantly finding fault with one another and should not be sent together to the new office as a team
II. C and E function well alone but not as a team , they should be seperated
III. D and G have not been on speaking terms and shouldn't go together
IV Since D and F have been competing for promotion they shouldn't be a team
1. .If A is to be moved as one of the bookeepers,which of the following cannot be a possible working unit.
A.ABDEH B.ABDGH C.ABEFH D.ABEGH Ans.B
2. If C and F are moved to the new office,how many combinations are possible
A.1 B.2 C.3 D.4 Ans.A
3. If C is sent to the new office,which member of the staff cannot go with C
A.B B.D C.F D.G Ans.B
4. Under the guidelines developed,which of the following must go to the new office
A.B B.D C.E D.G Ans.A
5. If D goes to the new office,which of the following is/are true
I.C cannot go II.A cannot go III.H must also go

A.I only B.II only C.I and II only D.I and III only Ans.D


41.

After months of talent searching for an administrative assistant to the president of the college the field of applicants has been narrowed down to 5--A, B, C, D, E .It was announced that the finalist would be chosen after a series of all-day group personal interviews were held.The examining committee agreed upon the following procedure
I.The interviews will be held once a week
II.3 candidates will appear at any all-day interview session
III.Each candidate will appear at least once
IV.If it becomes necessary to call applicants for additonal interviews, no more 1 such applicant should be asked to appear the next week
V.Because of a detail in the written applications,it was agreed that whenever candidate B appears, A should also be present.
VI.Because of travel difficulties it was agreed that C will appear for only 1 interview.
1.

.At the first interview the following candidates appear A,B,D.Which of the follwing combinations can be called for the interview to be held next week.
A.BCD B.CDE C.ABE D.ABC Ans.B
2.

Which of the following is a possible sequence of combinations for interviews in 2 successive weeks
A.ABC;BDE B.ABD;ABE C.ADE;ABC D.BDE;ACD Ans.C
3. If A ,B and D appear for the interview and D is called for additional interview the following week,which 2 candidates may be asked to appear with D?
I. A II B III.C IV.E

A.I and II B.I and III only C.II and III only D.III and IV only
Ans.D
4. Which of the following correctly state(s) the procedure followed by the search committee
I.After the second interview all applicants have appeared at least once
II.The committee sees each applicant a second time
III.If a third session,it is possible for all applicants to appear at least twice

A.I only B.II only C.III only D.Both I and II Ans.A
42.

A certain city is served by subway lines A,B and C and numbers 1 2 and 3
When it snows , morning service on B is delayedWhen it rains or snows , service on A, 2 and 3 are delayed both in the morning and afternoon When temp. falls below 30 degrees farenheit afternoon service is cancelled in either the A line or the 3 line,
but not both When the temperature rises over 90 degrees farenheit, the afternoon service is cancelled in either the line C or the 3 line but not both.When the service on the A line is delayed or cancelled, service on the C line which connects the A line, is delayed When service on the 3 line is cancelled, service on the B line which connects the 3 line is delayed.
1. On Jan 10th, with the temperature at 15 degree farenheit, it snows all day. On how many lines will service be affected, including both morning and afternoon.

(A) 2 (B) 3 (C) 4 (D) 5 Ans. D
2. On Aug 15th with the temperature at 97 degrees farenheit it begins to rain at 1 PM. What is the minimum number of lines on which service will be affected?

(A) 2 (B) 3 (C) 4 (D) 5 Ans. C
3. On which of the following occasions would service be on the greatest number of lines disrupted.

(A) A snowy afternoon with the temperature at 45 degree farenheit
(B) A snowy morning with the temperature at 45 degree farenheit
(C) A rainy afternoon with the temperature at 45 degree farenheit
(D) A rainy afternoon with the temperature at 95 degree farenheit

Ans. B
43. In a certain society, there are two marriage groups, red and brown. No marriage is permitted within a group. On marriage, males become part of their wives groups; women remain in their own group. Children belong to the same group as their parents. Widowers and divorced males revert to the group of their birth. Marriage to more than one person at the same time and marriage to a direct descendant are forbidden
1. A brown female could have had

I. A grandfather born Red
II. A grandmother born Red
III Two grandfathers born Brown
(A) I only (B) III only (C) I, II and III (D) I and II onlyAns. D
2. A male born into the brown group may have

(A) An uncle in either group (B) A brown daughter (C) A brown son
(D) A son-in-law born into red group Ans. A
3. Which of the following is not permitted under the rules as stated.

(A) A brown male marrying his father's sister
(B) A red female marrying her mother's brother
(C) A widower marrying his wife's sister
(D) A widow marrying her divorced daughter's ex-husband

Ans. B
4. . If widowers and divorced males retained their group they had upon marrying which of the following would be permissible ( Assume that no previous marriage occurred)

(A) A woman marrying her dead sister's husband
(B) A woman marrying her divorced daughter's ex-husband
(C) A widower marrying his brother's daughter
(D) A woman marrying her mother's brother who is a widower.

Ans. D
5. I. All G's are H's
II. All G's are J's or K's
III All J's and K's are G's
IV All L's are K's
V All N's are M's
VI No M's are G's
44. There are six steps that lead from the first to the second floor. No two people can be on the same step
Mr. A is two steps below Mr. C
Mr. B is a step next to Mr. D
Only one step is vacant ( No one standing on that step )
Denote the first step by step 1 and second step by step 2 etc.
1. If Mr. A is on the first step, Which of the following is true?
(a) Mr. B is on the second step (b) Mr. C is on the fourth step.
(c) A person Mr. E, could be on the third step (d) Mr. D is on higher step than Mr. C.

Ans: (d)
2. If Mr. E was on the third step & Mr. B was on a higher step than Mr. E which step must be vacant
(a) step 1 (b) step 2 (c) step 4 (d) step 5 (e) step 6 Ans: (a)
3. If Mr. B was on step 1, which step could A be on?
(a) 2&e only (b) 3&5 only (c) 3&4 only (d) 4&5 only (e) 2&4 only Ans: (c)
4. If there were two steps between the step that A was standing and the step that B was standing on, and A was on a higher step than D , A must be on step

(a) 2 (b) 3 (c) 4 (d) 5 (e) 6 Ans: (c)
5. Which of the following is false

i. B&D can be both on odd-numbered steps in one configuration
ii. In a particular configuration A and C must either both an odd numbered steps or both an even-numbered steps
iii. A person E can be on a step next to the vacant step.

(a) i only (b) ii only (c) iii only (d) both i and iii Ans: (c)
45. Six swimmers A, B, C, D, E, F compete in a race. The outcome is as follows.
i. B does not win.
ii. Only two swimmers separate E & D
iii. A is behind D & E
iv. B is ahead of E , with one swimmer intervening
v. F is a head of D

1. Who stood fifth in the race ?
(a) A (b) B (c) C (d) D (e) E Ans: (e)
2. . How many swimmers seperate A and F ?
(a) 1 (b) 2 (c) 3 (d) 4 (e) cannot be determined Ans: (d)
3. The swimmer between C & E is
(a) none (b) F (c) D (d) B (e) A Ans: (a)
4. If the end of the race, swimmer D is disqualified by the Judges then swimmer B finishes in which place
(a) 1 (b) 2 (c) 3 (d) 4 (e) 5 Ans: (b)
46. Five houses lettered A,B,C,D, & E are built in a row next to each other. The houses are lined up in the order A,B,C,D, & E. Each of the five houses has a colored chimney. The roof and chimney of each housemust be painted as follows.
i. The roof must be painted either green,red ,or yellow.
ii. The chimney must be painted either white, black, or red.
iii. No house may have the same color chimney as the color of roof.
iv. No house may use any of the same colors that the every next house uses.
v. House E has a green roof.
vi. House B has a red roof and a black chimney
1. Which of the following is true ?
(a) At least two houses have black chimney.
(b) At least two houses have red roofs.(c) At least two houses have white chimneys
(d) At least two houses have green roofs(e) At least two houses have yellow roofs

Ans: (c)
2. Which must be false ?
(a) House A has a yellow roof (b) House A & C have different color chimney
(c) House D has a black chimney (d) House E has a white chimney
(e) House B&D have the same color roof. Ans: (b)
3. If house C has a yellow roof. Which must be true.
(a) House E has a white chimney (b) House E has a black chimney
(c) House E has a red chimney (d) House D has a red chimney
(e) House C has a black chimney Ans: (a)
4. Which possible combinations of roof & chimney can house
I. A red roof 7 a black chimney II. A yellow roof & a red chimney
III. A yellow roof & a black chimney

(a) I only (b) II only (c) III only (d) I & II only (e) I&II&III Ans: (e)
47.

Find x+2y
(i). x+y=10 (ii). 2x+4y=20 Ans: (b
48.

Is angle BAC is a right angle
(i) AB=2BC (2) BC=1.5AC Ans: (e)
49.

Is x greater than y
(i) x=2k (ii) k=2y Ans: (e)