PO INTERVIEW SUBJECT RELATED QUESTION COMPUTER SCIENCE – 1 1. What is your strongest programming language (Java, ASP, C, C++, VB, HTML, C#, etc.)? Point to remember: Before interview You should decide your Favorite programming language and be prepared based on that question. 2.Differences between C and Java? 1.JAVA is Object-Oriented while C is procedural. 2.Java is an Interpreted language while C is a compiled language. 3.C is a low-level language while JAVA is a high-level language. 4.C uses the top-down approach while JAVA uses the bottom-up approach. 5.Pointer go backstage in JAVA while C requires explicit handling of pointers. 6.The Behind-the-scenes Memory Management with JAVA & The User-Based Memory Management in C. 7.JAVA supports Method Overloading while C does not support overloading at all. 8.Unlike C, JAVA does not support Preprocessors, & does not really them. 9.The standard Input & Output Functions--C uses the printf & scanf functions as its standard input & output while JAVA uses the System.out.print & System.in.read functions. 10.Exception Handling in JAVA And the errors & crashes in C. 3.In header files whether functions are declared or defined? Functions are declared within header file. That is function prototypes exist in a header file,not function bodies. They are defined in library (lib). 4.What are the different storage classes in C ? There are four types of storage classes in C. They are extern, register, auto and static 5.What does static variable mean? Static is an access qualifier. If a variable is declared as static inside a function, the scope is limited to the function,but it will exists for the life time of the program. Values will be persisted between successive calls to a function 6.How do you print an address ? Use %p in printf to print the address. 7.What are macros? what are its advantages and disadvantages? Macros are processor directive which will be replaced at compile time. The disadvantage with macros is that they just replace the code they are not function calls. similarly the advantage is they can reduce time for replacing the same values. 8.Difference between pass by reference and pass by value? Pass by value just passes the value from caller to calling function so the called function cannot modify the values in caller function. But Pass by reference will pass the address to the caller function instead of value if called function requires to modify any value it can directly modify. 9.What is an object? Object is a software bundle of variables and related methods. Objects have state and behavior 10.What is a class?

AAA-BRIGHT ACADEMY - 9872474753

1

Class is a user-defined data type in C++. It can be created to solve a particular kind of problem. After creation the user need not know the specifics of the working of a class. 11.What is the difference between class and structure? Structure: Initially (in C) a structure was used to bundle different type of data types together to perform a particular functionality. But C++ extended the structure to contain functions also. The major difference is that all declarations inside a structure are by default public. Class: Class is a successor of Structure. By default all the members inside the class are private. 12. What is ponter? Pointer is a variable in a program is something with a name, the value of which can vary. The way the compiler and linker handles this is that it assigns a specific block of memory within the computer to hold the value of that variable. 13.What is the difference between null and void pointer? A Null pointer has the value 0. void pointer is a generic pointer introduced by ANSI. Generic pointer can hold the address of any data type. 14.what is function overloading Function overloading is a feature of C++ that allows us to create multiple functions with the same name, so long as they have different parameters.Consider the following function: int Add(int nX, int nY) { return nX + nY; } 15.What is function overloading and operator overloading? Function overloading: C++ enables several functions of the same name to be defined, as long as these functions have different sets of parameters (at least as far as their types are concerned). This capability is called function overloading. When an overloaded function is called, the C++ compiler selects the proper function by examining the number, types and order of the arguments in the call. Function overloading is commonly used to create several functions of the same name that perform similar tasks but on different data types. Operator overloading allows existing C++ operators to be redefined so that they work on objects of user-defined classes. Overloaded operators are syntactic sugar for equivalent function calls. They form a pleasant facade that doesn't add anything fundamental to the language (but they can improve understandability and reduce maintenance costs). 16.what is friend function? A friend function for a class is used in object-oriented programming to allow access to public, private, or protected data in the class from the outside. Normally, a function that is not a member of a class cannot access such information; neither can an external class. Occasionally, such access will be advantageous for the programmer. Under these circumstances, the function or external class can be declared as a friend of the class using the friend keyword. 17.What do you mean by inline function? The idea behind inline functions is to insert the code of a called function at the point where the function is called. If done carefully, this can improve the application's performance in exchange for increased compile time and possibly (but not always) an increase in the size of the generated binary executables. 18. Tell me something about abstract classes?

AAA-BRIGHT ACADEMY - 9872474753

2

An abstract class is a class which does not fully represent an object. Instead, it represents a broad range of different classes of objects. However, this representation extends only to the features that those classes of objects have in common. Thus, an abstract class provides only a partial description of its objects. 19.What is the difference between realloc() and free()? The free subroutine frees a block of memory previously allocated by the malloc subroutine. Undefined results occur if the Pointer parameter is not a valid pointer. If the Pointer parameter is a null value, no action will occur. The realloc subroutine changes the size of the block of memory pointed to by the Pointer parameter to the number of bytes specified by the Size parameter and returns a new pointer to the block. The pointer specified by the Pointer parameter must have been created with the malloc, calloc, or realloc subroutines and not been deallocated with the free or realloc subroutines. Undefined results occur if the Pointer parameter is not a valid pointer. 20.What is the difference between an array and a list? Array is collection of homogeneous elements. List is collection of heterogeneous elements. For Array memory allocated is static and continuous. For List memory allocated is dynamic and Random. Array: User need not have to keep in track of next memory allocation. List: User has to keep in Track of next location where memory is allocated. Array uses direct access of stored members, list uses sequential access for members. 21.What are the differences between structures and arrays? Arrays is a group of similar data types but Structures can be group of different data types 22.What is data structure? A data structure is a way of organizing data that considers not only the items stored, but also their relationship to each other. Advance knowledge about the relationship between data items allows designing of efficient algorithms for the manipulation of data. 23. Can you list out the areas in which data structures are applied extensively? Compiler Design, Operating System, Database Management System, Statistical analysis package, Numerical Analysis, Graphics, Artificial Intelligence, Simulation 24.What are the advantages of inheritance? It permits code reusability. Reusability saves time in program development. It encourages the reuse of proven and debugged high-quality software, thus reducing problem after a system becomes functional. 25. what are the two integrity rules used in DBMS? The two types of integrity rules are referential integrity rules and entity integrity rules. Referential integrity rules dictate that a database does not contain orphan foreign key values. This means that A primary key value cannot be modified if the value is used as a foreign key in a child table. Entity integrity dictates that the primary key value cannot be Null. 26. Tell something about deadlock and how can we prevent dead lock? In an operating system, a deadlock is a situation which occurs when a process enters a waiting state because a resource requested by it is being held by another waiting process, which in turn is waiting for another resource. If a process is

AAA-BRIGHT ACADEMY - 9872474753

3

unable to change its state indefinitely because the resources requested by it are being used by other waiting process, then the system is said to be in a deadlock. Mutual Exclusion: At least one resource must be non-shareable.[1] Only one process can use the resource at any given instant of time. Hold and Wait or Resource Holding: A process is currently holding at least one resource and requesting additional resources which are being held by other processes. No Preemption: The operating system must not de-allocate resources once they have been allocated; they must be released by the holding process voluntarily. Circular Wait: A process must be waiting for a resource which is being held by another process, which in turn is waiting for the first process to release the resource. In general, there is a set of waiting processes, P = {P1, P2, ..., PN}, such that P1 is waiting for a resource held by P2, P2 is waiting for a resource held by P3 and so on till PN is waiting for a resource held by P1.[1][7] Thus prevention of deadlock is possible by ensuring that at least one of the four conditions cannot hold. 27. What is Insertion sort, selection sort, bubble sort( basic differences among the functionality of the three sorts and not the exact algorithms) 28. What is Doubly link list? A doubly linked list is a linked data structure that consists of a set of sequentially linked records called nodes. Each node contains two fields, called links, that are references to the previous and to the next node in the sequence of nodes. The beginning and ending nodes' previous and next links, respectively, point to some kind of terminator, typically a sentinel node or null, to facilitate traversal of the list. If there is only one sentinel node, then the list is circularly linked via the sentinel node. It can be conceptualized as two singly linked lists formed from the same data items, but in opposite sequential orders. 29.What is data abstraction? what are the three levels of data abstraction with Example? Abstraction is the process of recognizing and focusing on important characteristics of a situation or object and leaving/filtering out the un-wanted characteristics of that situation or object. Lets take a person as example and see how that person is abstracted in various situations A doctor sees (abstracts) the person as patient. The doctor is interested in name, height, weight, age, blood group, previous or existing diseases etc of a person An employer sees (abstracts) a person as Employee. The employer is interested in name, age, health, degree of study, work experience etc of a person. Abstraction is the basis for software development. Its through abstraction we define the essential aspects of a system. The process of identifying the abstractions for a given system is called as Modeling (or object modeling). Three levels of data abstraction are: 1. Physical level : how the data is stored physically and where it is stored in database. 2. Logical level : what information or data is stored in the database. eg: Database administrator 3.View level : end users work on view level. if any amendment is made it can be saved by other name. 30.What is command line argument? Getting the arguments from command prompt in c is known as command line arguments. In c main function has three arguments.They are: Argument counter Argument vector Environment vector

AAA-BRIGHT ACADEMY - 9872474753

4

31.Advantages of a macro over a function? Macro gets to see the Compilation environment, so it can expand #defines. It is expanded by the preprocessor. 32.What are the different storage classes in C? Auto,register,static,extern 33.Which header file should you include if you are to develop a function which can accept variable number of arguments? stdarg.h 34.What is cache memory ? Cache Memory is used by the central processing unit of a computer to reduce the average time to access memory. The cache is a smaller, faster memory which stores copies of the data from the most frequently used main memory locations. As long as most memory accesses are cached memory locations, the average latency of memory accesses will be closer to the cache latency than to the latency of main memory. 35.What is debugger? A debugger or debugging tool is a computer program that is used to test and debug other programs 36. Const char *p , char const *p What is the difference between the above two? 1) const char *p - Pointer to a Constant char ('p' isn't modifiable but the pointer is) 2) char const *p - Also pointer to a constant Char However if you had something like: char * const p - This declares 'p' to be a constant pointer to an char. (Char p is modifiable but the pointer isn't) 37. What is Memory Alignment? Data structure alignment is the way data is arranged and accessed in computer memory. It consists of two separate but related issues: data alignment and data structure padding. 38.Explain the difference between 'operator new' and the 'new' operator? The difference between the two is that operator new just allocates raw memory, nothing else. The new operator starts by using operator new to allocate memory, but then it invokes the constructor for the right type of object, so the result is a real live object created in that memory. If that object contains any other objects (either embedded or as base classes) those constructors as invoked as well. 39. Difference between delete and delete[]? The keyword delete is used to destroy the single variable memory created dynamically which is pointed by single pointer variable. Eg: int *r=new(int) the memory pointed by r can be deleted by delete r. delete [] is used to destroy array of memory pointed by single pointer variable. Eg:int *r=new(int a[10]) The memory pointed by r can be deleted by delete []r. 40. What is conversion constructor? A conversion constructor is a single-parameter constructor that is declared without the function specifier 'explicit'. The compiler uses conversion constructors to convert objects from the type of the first parameter to the type of the conversion constructor's class.To define implicit conversions, C++ uses conversion constructors, constructors that accept a single parameter and initialize an object to be a copy of that parameter.

AAA-BRIGHT ACADEMY - 9872474753

5

41.What is a spanning Tree? A spanning tree is a tree associated with a network. All the nodes of the graph appear on the tree once. A minimum spanning tree is a spanning tree organized so that the total edge weight between nodes is minimized. 42. Why should we use data ware housing and how can you extract data for analysis with example? If you want to get information on all the techniques of designing, maintaining, building and retrieving data, Data warehousing is the ideal method. A data warehouse is premeditated and generated for supporting the decision making process within an organization. Here are some of the benefits of a data warehouse: With data warehousing, you can provide a common data model for different interest areas regardless of data's source. In this way, it becomes easier to report and analyze information. o Many inconsistencies are identified and resolved before loading of information in data warehousing. This makes the reporting and analyzing process simpler. o The best part of data warehousing is that the information is under the control of users, so that in case the system gets purged over time, information can be easily and safely stored for longer time period. o Because of being different from operational systems, a data warehouse helps in retrieving data without slowing down the operational system. o Data warehousing enhances the value of operational business applications and customer relationship management systems. o Data warehousing also leads to proper functioning of support system applications like trend reports, exception reports and the actual performance analyzing reports. Data mining is a powerful new technology to extract data for analysis. 43.Explain recursive function & what is the data structures used to perform recursion? a) A recursive function is a function which calls itself. b) The speed of a recursive program is slower because of stack overheads. (This attribute is evident if you run above C program.) c) A recursive function must have recursive conditions, terminating conditions, and recursive expressions. Stack data structure . Because of its LIFO (Last In First Out) property it remembers its caller so knows whom to return when the function has to return. Recursion makes use of system stack for storing the return addresses of the function calls. Every recursive function has its equivalent iterative (non-recursive) function. Even when such equivalent iterative procedures are written, explicit stack is to be used. 44.Differentiate between Complier and Interpreter? An interpreter reads one instruction at a time and carries out the actions implied by that instruction. It does not perform any translation. But a compiler translates the entire instructions 45.What is scope of a variable? Scope refers to the visibility of variables. It is very useful to be able to limit a variable's scope to a single function. In other words, the variable wil have a limited scope 46.What is an interrupt? Interrupt is an asynchronous signal informing a program that an event has occurred. When a program receives an interrupt signal, it takes a specified action. 47.What is user defined exception in Java? The keywords used in java application are try, catch and finally are used in implementing used-defined exceptions. This Exception class inherits all the method from Throwable class.

AAA-BRIGHT ACADEMY - 9872474753

6

48.What is java Applet? Applet is java program that can be embedded into HTML pages. Java applets runs on the java enables web browsers such as mozila and internet explorer. Applet is designed to run remotely on the client browser, so there are some restrictions on it. Applet can't access system resources on the local computer. Applets are used to make the web site more dynamic and entertaining. 49.What do you know about the garbage collector? Garbage collection is the systematic recovery of pooled computer storage that is being used by a program when that program no longer needs the storage. This frees the storage for use by other programs (or processes within a program). It also ensures that a program using increasing amounts of pooled storage does not reach its quota (in which case it may no longer be able to function). Garbage collection is an automatic memory management feature in many modern programming languages, such as Java and languages in the .NET framework. Languages that use garbage collection are often interpreted or run within a virtual machine like the JVM. In each case, the environment that runs the code is also responsible for garbage collection. 50.Write a Binary Search program int binarySearch(int arr[],int size, int item) { int left, right, middle; left = 0; right = size-1;

while(left <= right) { middle = ((left + right)/2);

if(item == arr[middle]) { return(middle); }

if(item > arr[middle]) { left = middle+1; } else { right = middle-1; } } return(-1); }

AAA-BRIGHT ACADEMY - 9872474753

7

51.What are enumerations? An enumeration is a data type, used to declare variable that store list of names. It is act like a database, which will store list of items in the variable. example: enum shapes{triangle, rectangle,... 52.What is static identifier? The static identifier is used for initializing only once, and the value retains during the life time of the program / application. A separate memory is allocated for „static‟ variables. This value can be used between function calls. The default value of an uninitialized static variable is zero. A function can also be defined as a static function, which has the same scope of the static variable. 53.What is Cryptography? Cryptography is the science of enabling secure communications between a sender and one or more recipients. This is achieved by the sender scrambling a message (with a computer program and a secret key) and leaving the recipient to unscramble the message (with the same computer program and a key, which may or may not be the same as the sender's key). There are two types of cryptography: Secret/Symmetric Key Cryptography and Public Key Cryptography 54.What is encryption? Encryption is the transformation of information from readable form into some unreadable form. 55.What is decryption? Decryption is the reverse of encryption; it's the transformation of encrypted data back into some intelligible form. 56.What exactly is a digital signature? Just as a handwritten signature is affixed to a printed letter for verification that the letter originated from its purported sender, digital signature performs the same task for an electronic message. A digital signature is an encrypted version of a message digest, attached together with a message.

COMPUTER SCIENCE – 2 1. What is a System? When a number of elements or components are connected in a sequence to perform a specific function, the group of elements that all constitute a System 2. What is Control System? In a System the output and inputs are interrelated in such a manner that the output quantity or variable is controlled by input quantity, then such a system is called Control System. The output quantity is called controlled variable or response and the input quantity is called command signal or excitation. 3. What are different types of Control Systems? Two major types of Control Systems are 1) Open loop Control System 2) Closed Loop Control Systems Open loop Control Systems:The Open loop Control System is one in which the Output Quantity has no effect on the Input Quantity. No feedback is present from the output quantity to the input quantity for correction. Closed Loop Control System:The Closed loop Control System is one in which the feedback is provided from the Output quantity to the input quantity for the correction so as to maintain the desired output of the system. 4. What is a feedback in Control System? The Feedback in Control System in one in which the output is sampled and proportional signal is fed back to the input for automatic correction of the error ( any change in desired output) for futher processing to get back the desired output. 5. Why Negative Feedback is preffered in the Control System?

AAA-BRIGHT ACADEMY - 9872474753

8

The role of Feedback in control system is to take the sampled output back to the input and compare output signal with input signal for error ( deviation from the desired result). Negative Feedback results in the better stability of the system and rejects any disturbance signals and is less sensitive to the parameter variations. Hence in control systems negative feedback is considered. 6. What is the effect of positive feedback on stability of the system? Positive feedback is not used generally in the control system because it increases the error signal and drives the system to instability. But positive feedbacks are used in minor loop control systems to amplify certain internal signals and parameters 7. What is Latching current? Gate signal is to be applied to the thyristor to trigger the thyristor ON in safe mode. When the thyristor starts conducting the forward current above the minimum value, called Latching current, the gate signal which is applied to trigger the device in no longer require to keep the scr in ON position. 8. What is Holding current ? When scr is conducting current in forward conduction state, scr will return to forward blocking state when the anode current or forward current falls below a low level called Holding current Note: Latching current and Holding current are not same. Latching current is associated with the turn on process of the scr whereas holding current is associated with the turn off process. In general holding current will be slightly lesser than the latching current. 9. Why thyristor is considered as Charge controlled device? During the triggering process of the thyristor from forward blocking state to forward conduction state through the gate signal, by applying the gate signal (voltage between gate and cathode) increases the minority carrier density in the player and thereby facilitate the reverse break over of the junction J2 and thyristor starts conducting. Higher the magnitude of the gate current pulse, lesser is the time required to inject the charge and turning on the scr. By controlling the amount of charge we can control the turning on time of the scr. 10. What are the different losses that occur in thyristor while operating? Different losses that occur are a)Forward conduction losses during conduction of the thyristor b)Loss due to leakage current during forward and reverse blocking. c)Power loss at gate or Gate triggering loss. d)Switching losses at turn-on and turn-off. 11. What is meant by knee point voltage? Knee point voltage is calculated for electrical Current transformers and is very important factor to choose a CT. It is the voltage at which a CT gets saturated.(CT-current transformer). 12. What is reverse power relay? Reverse Power flow relay are used in generating stations's protection. A generating stations is supposed to fed power to the grid and in case generating units are off,there is no generation in the plant then plant may take power from grid. To stop the flow of power from grid to generator we use reverse power relay. 13. What will happen if DC supply is given on the primary of a transformer? Mainly transformer has high inductance and low resistance.In case of DC supply there is no inductance ,only resistance will act in the electrical circuit. So high electrical current will flow through primary side of the transformer.So for this reason coil and insulation will burn out. 14. What is the difference between isolators and electrical circuit breakers? What is bus-bar?

AAA-BRIGHT ACADEMY - 9872474753

9

Isolators are mainly for switching purpose under normal conditions but they cannot operate in fault conditions .Actually they used for isolating the CBs for maintenance. Whereas CB gets activated under fault conditions according to the fault detected.Bus bar is nothing but a junction where the power is getting distributed for independent loads. 15. What are the advantage of free wheeling diode in a Full Wave rectifier? It reduces the harmonics and it also reduces sparking and arching across the mechanical switch so that it reduces the voltage spike seen in a inductive load. 16. Mention the methods for starting an induction motor? The different methods of starting an induction motor: a)DOL:direct online starter b)Star delta starter c)Auto transformer starter d)Resistance starter e)Series reactor starter 17. What is the power factor of an alternator at no load? At no load Synchronous Impedance of the alternator is responsible for creating angle difference. So it should be zero lagging like inductor. 18. What is the function of anti-pumping in circuit breaker? When breaker is close at one time by close push button,the anti pumping contactor prevent re close the breaker by close push button after if it already close. 19. What is stepper motor.what is its uses? Stepper motor is the electrical machine which act upon input pulse applied to it. it is one type of synchronous motor which runs in steps in either direction instead of running in complete cycle.so, in automation parts it is used. 20. There are a Transformer and an induction machine. Those two have the same supply. For which device the load current will be maximum? And why? The motor has max load current compare to that of transformer because the motor consumes real power.. and the transformer is only producing the working flux and its not consuming.. hence the load current in the transformer is because of core loss so it is minimum. 21. What is SF6 Circuit Breaker? SF6 is Sulpher hexa Flouride gas.. if this gas is used as arc quenching medium in a Circuitbreaker means SF6 CB. 22. What is ferrantic effect? Output voltage is greater than the input voltage or receiving end voltage is greater than the sending end voltage. 23. What is meant by insulation voltage in cables? explain it? It is the property of a cable by virtue of it can withstand the applied voltage without rupturing it is known as insulation level of the cable. 24. What is the difference between MCB & MCCB, Where it can be used? MCB is miniature circuit breaker which is thermal operated and use for short circuit protection in small current rating circuit. MCCB moulded case circuit breaker and is thermal operated for over load current and magnetic operation for instant trip in short circuit condition.under voltage and under frequency may be inbuilt. Normally it is used where normal current is more than 100A.

25. Where should the lighting arrestor be placed in distribution lines?

AAA-BRIGHT ACADEMY - 9872474753

10

Near distribution transformers and out going feeders of 11kv and incomming feeder of 33kv and near power transformers in sub-stations. 26. Define IDMT relay? It is an inverse definite minimum time relay.In IDMT relay its operating is inversely proportional and also a characteristic of minimum time after which this relay operates.It is inverse in the sense ,the tripping time will decrease as the magnitude of fault current increase. 27. What are the transformer losses? TRANSFORMER LOSSES - Transformer losses have two sources-copper loss and magnetic loss. Copper losses are caused by the resistance of the wire (I2R). Magnetic losses are caused by eddy currents and hysteresis in the core. Copper loss is a constant after the coil has been wound and therefore a measurable loss. Hysteresis loss is constant for a particular voltage and current. Eddy-current loss, however, is different for each frequency passed through the transformer. 28. what is the full form of KVAR? We know there are three types of power in Electricals as Active, apparent & reactive. So KVAR is stand for ``Kilo Volt Amps with Reactive component. 29. Two bulbs of 100w and 40w respectively connected in series across a 230v supply which bulb will glow bright and why? Since two bulbs are in series they will get equal amount of electrical current but as the supply voltage is constant across the bulb(P=V^2/R).So the resistance of 40W bulb is greater and voltage across 40W is more (V=IR) so 40W bulb will glow brighter. 30. Why temperature rise is conducted in bus bars and isolators? Bus bars and isolators are rated for continuous power flow, that means they carry heavy currents which rises their temperature. so it is necessary to test this devices for temperature rise. 31. What is the difference between synchronous generator & asynchronous generator? In simple, synchronous generator supply's both active and reactive power but asynchronous generator(induction generator) supply's only active power and observe reactive power for magnetizing.This type of generators are used in windmills. 32. What is Automatic Voltage regulator(AVR)? AVR is an abbreviation for Automatic Voltage Regulator.It is important part in Synchronous Generators, it controls theoutput voltage of the generator by controlling its excitation current. Thus it can control the output Reactive Power of the Generator. 33. Difference between a four point starter and three point starter? The shunt connection in four point stater is provided separately form the line where as in three point stater it is connected with line which is the drawback in three point stater 34. Why the capacitors works on ac only? Generally capacitor gives infinite resistance to dc components(i.e., block the dc components). it allows the ac components to pass through. 35. How many types of colling system it transformers? 1. ONAN (oil natural,air natural) 2. ONAF (oil natural,air forced) 3. OFAF (oil forced,air forced) 4. ODWF (oil direct,water forced) 5. OFAN (oil forced,air forced)

AAA-BRIGHT ACADEMY - 9872474753

11

36. Operation carried out in Thermal power stations? The water is obtained in the boiler and the coal is burnt so that steam is obtained this steam is allowed to hit the turbine , the turbine which is coupled with the generator generates the electricity. 37. What is 2 phase motor? A two phase motor is a motor with the the starting winding and the running winding have a phase split. e.g;ac servo motor.where the auxiliary winding and the control winding have a phase split of 90 degree. 38. What is the principle of motor? Whenever a current carrying conductor is placed in an magnetic field it produce turning or twisting movement is called as torque. 39. What is meant by armature reaction? The effect of armature flu to main flux is called armature reaction. The armature flux may support main flux or opposes main flux. 40. What is the difference between synchronous generator & asynchronous generator? In simple, synchronous generator supply's both active and reactive power but asynchronous generator(induction generator) supply's only active power and observe reactive power for magnetizing.This type of generators are used in windmills. 41. Whats is MARX CIRCUIT? It is used with generators for charging a number of capacitor in parallel and discharging them in series.It is used when voltage required for testing is higher than the available. 42. What are the advantages of speed control using thyristor? Advantages : 1. Fast Switching Characterstics than Mosfet, BJT, IGBT 2. Low cost 3. Higher Accurate. 43. What is ACSR cable and where we use it? ACSR means Aluminium conductor steel reinforced, this conductor is used in transmission & distribution. 44. Whats the one main difference between UPS & inverter ? And electrical engineering & electronics engineering ? Uninterrupt power supply is mainly use for short time . means according to ups VA it gives backup. ups is also two types : on line and offline . online ups having high volt and amp for long time backup with with high dc voltage.but ups start with 12v dc with 7 amp. but inverter is startwith 12v,24,dc to 36v dc and 120amp to 180amp battery with long time backup. 45. What will happen when power factor is leading in distribution of power? If their is high power factor, i.e if the power factor is close to one: a)Losses in form of heat will be reduced, b)Cable becomes less bulky and easy to carry, and very cheap to afford, & c)It also reduces over heating of tranformers. 46. What are the advantages of star-delta starter with induction motor? (1). The main advantage of using the star delta starter is reduction of current during the starting of the motor.Starting current is reduced to 3-4 times Of current of Direct online starting.(2). Hence the starting current is reduced , the voltage drops during the starting of motor in systems are reduced.

47. Why Delta Star Transformers are used for Lighting Loads?

AAA-BRIGHT ACADEMY - 9872474753

12

For lighting loads, neutral conductor is must and hence the secondary must be star winding. and this lighting load is always unbalanced in all three phases. To minimize the current unbalance in the primary we use delta winding in the primary. So delta / star transformer is used for lighting loads. 48. Why computer humming sound occurred in HT transmission line? This computer humming sound is coming due to ionization (breakdown of air into charged particles) of air around transmission conductor. This effect is called as Corona effect, and it is considered as power loss. 49. What is rated speed? At the time of motor taking normal current (rated current)the speed of the motor is called rated speed. It is a speed at which any system take small current and give maximum efficiency. 50. If one lamp connects between two phases it will glow or not? If the voltage between the two phase is equal to the lamp voltage then the lamp will glow. When the voltage difference is big it will damage the lamp and when the difference is smaller the lamp will glow depending on the type of lamp

COMPUTER SCIENCE – 3 1.What is data structure? A data structure is a way of organizing data that considers not only the items stored, but also their relationship to each other. Advance knowledge about the relationship between data items allows designing of efficient algorithms for the manipulation of data. 2.Minimum number of queues needed to implement the priority queue? Two. One queue is used for actual storing of data and another for storing priorities. 3.What are the notations used in Evaluation of Arithmetic Expressions using prefix and postfix forms? Polish and Reverse Polish notations. 4.List out few of the Application of tree data-structure? i)The manipulation of Arithmetic expression ii)Symbol Table construction iii)Syntax analysis. 5.What is the type of the algorithm used in solving the 8 Queens problem? Backtracking 6.In RDBMS, what is the efficient data structure used in the internal storage representation? B+ tree. Because in B+ tree, all the data is stored only in leaf nodes, that makes searching easier. This corresponds to the records that shall be stored in leaf nodes. 7. What is a spanning Tree? A spanning tree is a tree associated with a network. All the nodes of the graph appear on the tree once. A minimum spanning tree is a spanning tree organized so that the total edge weight between nodes is minimized. 8. List out the areas in which data structures are applied extensively? Compiler Design, Operating System, Database Management System, Statistical analysis package, Numerical Analysis, Graphics, Artificial Intelligence, Simulation 9. Translate infix expression into its equivalent post fix expression: (A-B)*(D/E) (A-B)*(D/E) = [AB-]*[DE/] = AB-DE/*

10. What are priority queues?

AAA-BRIGHT ACADEMY - 9872474753

13

A priority queue is a collection of elements such that each element has been assigned a priority. 11. What is a string? A sequential array of characters is called a string. 12. What is Brute Force algorithm? Algorithm used to search the contents by comparing each element of array is called Brute Force algorithm. 13. What are the limitations of arrays? i)Arrays are of fixed size. ii)Data elements are stored in continuous memory locations which may not be available always. iii)Adding and removing of elements is problematic because of shifting the locations. 14. How can you overcome the limitations of arrays? Limitations of arrays can be solved by using the linked list. 15. What is a linked list? Linked list is a data structure which store same kind of data elements but not in continuous memory locations and size is not fixed. The linked lists are related logically. 16. What is a node? The data element of a linked list is called a node. 17. What does node consist of? Node consists of two fields:data field to store the element and link field to store the address of the next node. 18. What is a queue ? A Queue is a sequential organization of data. A queue is a first in first out type of data structure. An element is inserted at the last position and an element is always taken out from the first position. 19. What are the types of Collision Resolution Techniques and the methods used in each of the type? Open addressing (closed hashing),The methods used include:Overflow block Closed addressing (open hashing),The methods used include:Linked list,Binary tree 20. What are the methods available in storing sequential files ? Straight merging, Natural merging, Polyphase sort, Distribution of Initial runs. 21. Mention some of the problem solving strategies? The most widely strategies are listed below i)Divide and conquer ii)Binary doubling strategy iii)Dynamic programming 22. What is divide and conquer method? The basic idea is to divide the problem into several sub problems beyond which cannot be further subdivided. Then solve the sub problems efficiently and join then together to get the solution for the main problem. 23. What is the need for the header? Header of the linked list is the first element in the list and it stores the number of elements in the list. It points to the first data element of the list. 24. Define leaf? In a directed tree any node which has out degree o is called a terminal node or a leaf. 25. What are the applications of binary tree? Binary tree is used in data processing. 26. What are the different types of traversing?

AAA-BRIGHT ACADEMY - 9872474753

14

The different types of traversing are i)Pre-order traversal-yields prefix from of expression. ii)In-order traversal-yields infix form of expression. iii)Post-order traversal-yields postfix from of expression. 27. Define pre-order traversal? i)Process the root node ii)Process the left subtree iii)Process the right subtree 28. Define post-order traversal? i)Process the left subtree ii)Process the right subtree iii)Process the root node 29. Define in -order traversal? i)Process the left subtree ii)Process the root node iii)Process the right subtree 30. What is meant by sorting? Ordering the data in an increasing or decreasing fashion according to some relationship among the data item is called sorting. 31. What's the major distinction in between Storage structure and file structure and how? The expression of an specific data structure inside memory of a computer system is termed storage structure in contrast to a storage structure expression in auxiliary memory is normally known as a file structure. 32. Stack can be described as a pointer. Explain? Because stack will contain a head pointer which will always point to the top of the Stack.All Stack Operations are done using Head Pointer. Hence Stack ca be Described as a Pointer 33. What do you mean by: Syntax Error, Logical Error, Run time Error? Syntax Error-Syntax Error is due to lack of knowledge in a specific language. It is due to somebody does not know how to use the features of a language.We can know the errors at the time of compilation. logical Error-It is due to the poor understanding of the requirement or problem. Run time Error-The exceptions like divide a number by 0,overflow and underflow comes under this. 34. What is mean by d-queue? D-queue stands for double ended queue. It is a abstract data structure that implements a queue for which elements can be added to front or rear and the elements can be removed from the rear or front. It is also called head-tail linked list 35. What is AVL tree? Avl tree is self binary tree in which balancing factor lie between the -1 to 1.It is also known as self balancing tree. 36. what is binary tree? Binary tree is a tree which has maximum no. of childrens either 0 or 1 or 2. i.e., there is at the most 2 branches in every node. 37. What is the difference between a stack and a Queue? Stack – Represents the collection of elements in Last In First Out order. Operations includes testing null stack, finding the top element in the stack, removal of top most element and adding elements on the top of the stack. Queue - Represents the collection of elements in First In First Out order.Operations include testing null queue, finding

AAA-BRIGHT ACADEMY - 9872474753

15

the next element, removal of elements and inserting the elements from the queue. Insertion of elements is at the end of the queue.Deletion of elements is from the beginning of the queue 38. What actions are performed when a function is called? i)arguments are passed ii)local variables are allocated and initialized iii)transferring control to the function 39. What is precision? Precision refers the accuracy of the decimal portion of a value. Precision is the number of digits allowed after the decimal point. 40. What do you mean by overflow and underflow? When new data is to be inserted into the data structure but there is no available space i.e.free storage list is empty this situation is called overflow.When we want to delete data from a data structure that is empty this situation is called underflow.

COMPUTER SCIENCE – 4 1. Define the concept of an algorithm. An algorithm is any well-defined computational procedure that takes some value (or set of values) as input and produces some value (or set of values) as output. In short, it can be seen as a sequence of computational steps that transform the input into the output. 2.What are the arguments present in pattern matching algorithms? These are the following arguments which are present in pattern matching Algorithms. 1) Subject, 2) Pattern 3) Cursor 4) MATCH_STR 5) REPLACE_STR 6) REPLACE_FLAG 3. Explain the function SUB in algorithmic notation? In the algorithmic notation rather than using special marker symbols, generally people use the cursor position plus a substring length to isolate a substring. The name of the function is SUB. SUB returns a value the sub string of SUBJECT that is specified by the parameters i and j and an assumed value of j. 4. In Algorithmic context how would you define book keeping operations? Usually when a user wants to estimate time he isolates the specific function and brands it as active operation. The other operations in the algorithm, the assignments, the manipulations of the index and the accessing of a value in the vector, occur no more often than the addition of vector values. These operations are collectively called as “book keeping operations”. 5. Define and describe an iterative process with general steps of flow chart? There are four parts in the iterative process they are Initialization: -The decision parameter is used to determine when to exit from the loop. Decision: -The decision parameter is used to determine whether to remain in the loop or not. Computation: - The required computation is performed in this part.

AAA-BRIGHT ACADEMY - 9872474753

16

Update: - The decision parameter is updated and a transfer to the next iteration results. 6. State recursion and its different types? Recursion is the name given to the technique of defining a set or a process in terms of itself. There are essentially two types of recursion. The first type concerns recursively defined function and the second type of recursion is the recursive use of a procedure. 7. Define and state the importance of sub algorithm in computation and its relation ship with main algorithm? A sub algorithm is an independent component of an algorithm and for this reason is defined separately from the main algorithm. The purpose of a sub algorithm is to perform some computation when required, under control of the main algorithm. This computation may be performed on zero or more parameters passed by the calling routine. 8. Name any three skills which are very important in order to work with generating functions. The three most important skills which are used extensively while working with generating functions are 1)Manipulate summation expressions and their indices. 2)Solve algebraic equations and manipulate algebraic expressions, including partial function decompositions. 3)Identify sequences with their generating functions 9. What is the general strategy for Markov Algorithm? The general strategy in a Markov Algorithm is to take as input a string x and, through a number of steps in the algorithm, transform x to an output string y. this transformation process is generally performed in computers for text editing or program compilation. 10. Define string in an algorithmic notation and an example to support it? In the algorithmic notation, a string is expressed as any sequence of characters enclosed in single quote marks. 11. How to find median of a BST? Find the no. of elements on the left side. If it is n-1 the root is the median. If it is more than n-1, then it has already been found in the left subtree. Else it should be in the right subtree 12. What is Diffie-Hellman? It is a method by which a key can be securely shared by two users without any actual exchange. 13. What is the goal of the shortest distance algorithm? The goal is completely fill the distance array so that for each vertex v, the value of distance[v] is the weight of the shortest path from start to v. 14. Explain the depth of recursion? This is another recursion procedure which is the number of times the procedure is called recursively in the process of enlarging a given argument or arguments. Usually this quantity is not obvious except in the case of extremely simple recursive functions, such as FACTORIAL (N), for which the depth is N. 15. Explain about the algorithm ORD_WORDS? This algorithm constructs the vectors TITLE, KEYWORD and T_INDEX. 16. Which are the sorting algorithms categories? Sorting algorithms can be divided into five categories: a) insertion sorts b) exchange sorts c) selection sorts

AAA-BRIGHT ACADEMY - 9872474753

17

d) merge sorts e) distribution sorts 17.Define a brute-force algorithm. Give a short example. A brute force algorithm is a type of algorithm that proceeds in a simple and obvious way, but requires a huge number of steps to complete. As an example, if you want to find out the factors of a given number N, using this sort of algorithm will require to get one by one all the possible number combinations. 18. What is a greedy algorithm? Give examples of problems solved using greedy algorithms. A greedy algorithm is any algorithm that makes the local optimal choice at each stage with the hope of finding the global optimum. A classical problem which can be solved using a greedy strategy is the traveling salesman problem. Another problems that can be solved using greedy algorithms are the graph coloring problem and all the NP-complete problems. 19. What is a backtracking algorithm? Provide several examples. It is an algorithm that considers systematically all possible outcomes for each decision. Examples of backtracking algorithms are the eight queens problem or generating permutations of a given sequence. 20. What is the difference between a backtracking algorithm and a brute-force one? Due to the fact that a backtracking algorithm takes all the possible outcomes for a decision, it is similar from this point of view with the brute force algorithm. The difference consists in the fact that sometimes a backtracking algorithm can detect that an exhaustive search is unnecessary and, therefore, it can perform much better. 21. Describe divide and conquer paradigm. When a problem is solved using a divide and conquer algorithm, it is subdivided into one or more subproblems which are all similar to the original problem in such a way that each of the subproblems can be solved independently. In the end, the solutions to the subproblems are combined in order to obtain the solution to the original problem. 22. Describe on short an insertion sorting algorithm. An algorithm that sorts by insertion takes the initial, unsorted sequence and computes a series of sorted sequences using the following rules: a) the first sequence in the series is the empty sequence b) given a sequence S(i) in the series, for 0<=i<="" p="" style="box-sizing: border-box;"> 23. Which are the advantages provided by insertion sort? Insertion sort provides several advantages: a) simple implementation b) efficient for small data sets c) adaptive - efficient for data sets that are already substantially sorted: the time complexity is O(n + d), where d is the number of inversions d) more efficient in practice than most other simple quadratic, i.e. O(n2) algorithms such as selection sort or bubble sort; the best case (nearly sorted input) is O(n) e) stable - does not change the relative order of elements with equal keys f) in-place - only requires a constant amount O( 1) of additional memory space g) online - can sort a list as it receives it 24. Shortly describe the quicksort algorithm. In quicksort, the steps performed are the following: a) pick an element, called a pivot, from the list b) reorder the list so that all elements with values less than the pivot come before the pivot, while all elements with values greater than the pivot come after it (equal values can go either way)

AAA-BRIGHT ACADEMY - 9872474753

18

c) recursively sort the sub-list of lesser elements and the sub-list of greater elements 25. What is the difference between selection and insertion sorting? In insertion sorting elements are added to the sorted sequence in an arbitrary order. In selection sorting, the elements are added to the sorted sequence in order so they are always added at one end. 26. What is merge sorting? Merging is the sorting algorithm which combines two or more sorted sequences into a single sorted sequence. It is a divide and conquer algorithm, an O(n log n) comparison-based sorting algorithm. Most implementations produce a stable sort, meaning that the implementation preserves the input order of equal elements in the sorted output. 27. Which are the main steps of a merge sorting algorithm? Sorting by merging is a recursive, divide-and-conquer strategy. The basic steps to perform are the following: a) divide the sequence into two sequences of length b) recursively sort each of the two subsequences c) merge the sorted subsequences to obtain the final result 28. Provide a short description of binary search algorithm. Binary search algorithm always chooses the middle of the remaining search space, discarding one half or the other, again depending on the comparison between the key value found at the estimated position and the key value sought. The remaining search space is reduced to the part before or after the estimated position. 29. What is the linear search algorithm? Linear search is a method for finding a particular value in a list which consists of checking every one of its elements, one at a time and in sequence, until the desired one is found. It is the simplest search algorithm, a special case of brute-force search. Its worst case cost is proportional to the number of elements in the list; and so is its expected cost, if all list elements are equally likely to be searched for. Therefore, if the list has more than a few elements, other methods (such as binary search or hashing) may be much more efficient. 30. What is best-first search algorithm? It is a search algorithm that considers the estimated best partial solution next. This is typically implemented with priority queues. 31. What is Huffman coding? In computer science and information theory, Huffman coding is an entropy encoding algorithm used for lossless data compression. The term refers to the use of a variable-length code table for encoding a source symbol (such as a character in a file) where the variable-length code table has been derived in a particular way based on the estimated probability of occurrence for each possible value of the source symbol.

COMPUTER SCIENCE – 5 1. What is database? A database is a collection of information that is organized. So that it can easily be accessed, managed, and updated. 2. What is DBMS? DBMS stands for Database Management System. It is a collection of programs that enables user to create and maintain a database. 3. What is a Database system? The database and DBMS software together is called as Database system. 4. What are the advantages of DBMS? I. Redundancy is controlled.

AAA-BRIGHT ACADEMY - 9872474753

19

II. Providing multiple user interfaces. III. Providing backup and recovery IV. Unauthorized access is restricted. V. Enforcing integrity constraints. 5. What is normalization? It is a process of analysing the given relation schemas based on their Functional Dependencies (FDs) and primary key to achieve the properties (1).Minimizing redundancy, (2). Minimizing insertion, deletion and update anomalies. 6. What is Data Model? A collection of conceptual tools for describing data, data relationships data semantics and constraints. 7. What is E-R model? This data model is based on real world that consists of basic objects called entities and of relationship among these objects. Entities are described in a database by a set of attributes. 8. What is Object Oriented model? This model is based on collection of objects. An object contains values stored in instance variables with in the object. An object also contains bodies of code that operate on the object. These bodies of code are called methods. Objects that contain same types of values and the same methods are grouped together into classes. 9. What is an Entity? An entity is a thing or object of importance about which data must be captured. 10. What is DDL (Data Definition Language)? A data base schema is specifies by a set of definitions expressed by a special language called DDL. 11. What is DML (Data Manipulation Language)? This language that enable user to access or manipulate data as organised by appropriate data model. Procedural DML or Low level: DML requires a user to specify what data are needed and how to get those data. Non-Procedural DML or High level: DML requires a user to specify what data are needed without specifying how to get those data 12. What is DML Compiler? It translates DML statements in a query language into low-level instruction that the query evaluation engine can understand. 13. What is Query evaluation engine? It executes low-level instruction generated by compiler. 14. What is Functional Dependency? Functional Dependency is the starting point of normalization. Functional Dependency exists when a relation between two attributes allows you to uniquely determine the corresponding attributes value. 15. What is 1 NF (Normal Form)? The first normal form or 1NF is the first and the simplest type of normalization that can be implemented in a database. The main aims of 1NF are to: 1. Eliminate duplicative columns from the same table. 2. Create separate tables for each group of related data and identify each row with a unique column (the primary key). 16. What is Fully Functional dependency? A functional dependency X Y is full functional dependency if removal of any attribute A from X means that the dependency does not hold any more. 17. What is 2NF?

AAA-BRIGHT ACADEMY - 9872474753

20

A relation schema R is in 2NF if it is in 1NF and every non-prime attribute A in R is fully functionally dependent on primary key. 18. What is 3NF? A relation is in third normal form if it is in Second Normal Form and there are no functional (transitive) dependencies between two (or more) non-primary key attributes. 19. What is BCNF (Boyce-Codd Normal Form)? A table is in Boyce-Codd normal form (BCNF) if and only if it is in 3NF and every determinant is a candidate key. 20. What is 4NF? Fourth normal form requires that a table be BCNF and contain no multi-valued dependencies. 21. What is 5NF? A table is in fifth normal form (5NF) or Project-Join Normal Form (PJNF) if it is in 4NF and it cannot have a lossless decomposition into any number of smaller tables. 22. What is a query? A query with respect to DBMS relates to user commands that are used to interact with a data base. 23. What is meant by query optimization? The phase that identifies an efficient execution plan for evaluating a query that has the least estimated cost is referred to as query optimization. 24. What is an attribute? It is a particular property, which describes the entity. 25. What is RDBMS? Relational Data Base Management Systems (RDBMS) are database management systems that maintain data records and indices in tables. 26. What’s difference between DBMS and RDBMS? DBMS provides a systematic and organized way of storing, managing and retrieving from collection of logically related information. RDBMS also provides what DBMS provides but above that it provides relationship integrity. 27. What is SQL? SQL stands for Structured Query Language. SQL is an ANSI (American National Standards Institute) standard computer language for accessing and manipulating database systems. SQL statements are used to retrieve and update data in a database. 28. What is Stored Procedure? A stored procedure is a named group of SQL statements that have been previously created and stored in the server database. 29. What is a view? A view may be a subset of the database or it may contain virtual data that is derived from the database files but is not explicitly stored. 30. What is Trigger? A trigger is a SQL procedure that initiates an action when an event (INSERT, DELETE or UPDATE) occurs. 31. What is Index? An index is a physical structure containing pointers to the data. 32. What is extension and intension? Extension -It is the number of tuples present in a table at any instance. This is time dependent. Intension -It is a constant value that gives the name, structure of table and the constraints laid on it.

AAA-BRIGHT ACADEMY - 9872474753

21

33. What do you mean by atomicity and aggregation? Atomicity-Atomicity states that database modifications must follow an “all or nothing” rule. Each transaction is said to be “atomic.” If one part of the transaction fails, the entire transaction fails. Aggregation - A feature of the entity relationship model that allows a relationship set to participate in another relationship set. This is indicated on an ER diagram by drawing a dashed box around the aggregation. 34. What is RDBMS KERNEL? Two important pieces of RDBMS architecture are the kernel, which is the software, and the data dictionary, which consists of the system- level data structures used by the kernel to manage the database. 35. Name the sub-systems of a RDBMS? I/O, Security, Language Processing, Process Control, Storage Management, Logging and Recovery, Distribution Control, Transaction Control, Memory Management, Lock Management. 36. How do you communicate with an RDBMS? You communicate with an RDBMS using Structured Query Language (SQL) 37. Disadvantage in File Processing System? ·

Data redundancy & inconsistency.

·

Difficult in accessing data.

·

Data isolation.

·

Data integrity.

·

Concurrent access is not possible.

·

Security Problems.

38. What is VDL (View Definition Language)? It specifies user views and their mappings to the conceptual schema. 39. What is SDL (Storage Definition Language)? This language is to specify the internal schema. This language may Specify the mapping between two schemas. 40. Describe concurrency control? Concurrency control is the process managing simultaneous operations against a database so that database integrity is no compromised. There are two approaches to concurrency control. The pessimistic approach involves locking and the optimistic approach involves versioning. 41. Describe the difference between homogeneous and heterogeneous distributed database? A homogenous database is one that uses the same DBMS at each node. A heterogeneous database is one that may have a different DBMS at each node. 42. What is a distributed database? A distributed database is a single logical database that is spread across more than one node or locations that are all connected via some communication link. 43. Explain the difference between two and three-tier architectures? Three-tier architecture includes a client and two server layers. The application code is stored on the application server and the database is stored on the database server. A two-tier architecture includes a client and one server layer. The database is stored on the database server.

44. Briefly describe the three types of SQL commands?

AAA-BRIGHT ACADEMY - 9872474753

22

Data definition language commands are used to create, alter, and drop tables. Data manipulation commands are used to insert, modify, update, and query data in the database. Data control language commands help the DBA to control the database. 45. List some of the properties of a relation? Relations in a database have a unique name and no multivalued attributes exist. Each row is unique and each attribute within a relation has a unique name. The sequence of both columns and rows is irrelevant. 46. Explain the differences between an intranet and an extranet? An Internet database is accessible by everyone who has access to a Web site. An intranet database limits access to only people within a given organization. 47. What is SQL Deadlock? Deadlock is a unique situation in a multi user system that causes two or more users to wait indefinitely for a locked resource. 48. What is a Catalog? A catalog is a table that contains the information such as structure of each file, the type and storage format of each data item and various constraints on the data .The information stored in the catalog is called Metadata. 49. What is data ware housing & OLAP? Data warehousing and OLAP (online analytical processing) systems are the techniques used in many companies to extract and analyze useful information from very large databases for decision making . 50. Describe the three levels of data abstraction? Physical level: The lowest level of abstraction describes how data are stored. Logical level: The next higher level of abstraction, describes what data are stored in database and what relationship among those data. View level: The highest level of abstraction describes only part of entire database. 51. What is Data Independence? Data independence means that the application is independent of the storage structure and access strategy of data. 52. How many types of relationship exist in database designing? There are three major relationship models:One-to-one One-to-many Many-to-many 53. What is order by clause? ORDER BY clause helps to sort the data in either ascending order to descending 54. What is the use of DBCC commands? DBCC stands for database consistency checker. We use these commands to check the consistency of the databases, i.e., maintenance, validation task and status checks. 55. What is Collation? Collation refers to a set of rules that determine how data is sorted and compared. 56. What is difference between DELETE & TRUNCATE commands? Delete command removes the rows from a table based on the condition that we provide with a WHERE clause. Truncate will actually remove all the rows from a table and there will be no data in the table after we run the truncate command.

57. What is Hashing technique?

AAA-BRIGHT ACADEMY - 9872474753

23

This is a primary file organization technique that provides very fast access to records on certain search conditions. 58. What is a transaction? A transaction is a logical unit of database processing that includes one or more database access operations. 59. What are the different phases of Transaction? Analysis phase Redo phase Undo phase 60. What is “transparent dbms”? It is one, which keeps its physical structure hidden from user. 61. What are the primitive operations common to all record management System? Addition, deletion and modification. 62. Explain the differences between structured data and unstructured data. Structured data are facts concerning objects and events. The most important structured data are numeric, character, and dates. Structured data are stored in tabular form. Unstructured data are multimedia data such as documents, photographs, maps, images, sound, and video clips. Unstructured data are most commonly found on Web servers and Web-enabled databases. 63. What are the major functions of the database administrator? Managing database structure, controlling concurrent processing, managing processing rights and responsibilities, developing database security, providing for database recovery, managing the DBMS and maintaining the data repository. 64. What is a dependency graph? A dependency graph is a diagram that is used to portray the connections between database elements. 65. Explain the difference between an exclusive lock and a shared lock? An exclusive lock prohibits other users from reading the locked resource; a shared lock allows other users to read the locked resource, but they cannot update it. 66. Explain the "paradigm mismatch" between SQL and application programming languages. SQL statements return a set of rows, while an application program works on one row at a time. To resolve this mismatch the results of SQL statements are processed as pseudofiles, using a cursor or pointer to specify which row is being processed. 67. Name four applications for triggers. (1)Providing default values, (2) enforcing data constraints, (3) Updating views and (4) enforcing referential integrity 68. What are the advantages of using stored procedures? The advantages of stored procedures are (1) greater security, (2) decreased network traffic, (3) the fact that SQL can be optimized and (4) code sharing which leads to less work, standardized processing, and specialization among developers. 69. Explain the difference between attributes and identifiers. Entities have attributes. Attributes are properties that describe the entity's characteristics. Entity instances have identifiers. Identifiers are attributes that name, or identify, entity instances.

70. What is Enterprise Resource Planning (ERP), and what kind of a database is used in an ERP application?

AAA-BRIGHT ACADEMY - 9872474753

24

Enterprise Resource Planning (ERP) is an information system used in manufacturing companies and includes sales, inventory, production planning, purchasing and other business functions. An ERP system typically uses a multiuser database. 71. Describe the difference between embedded and dynamic SQL? Embedded SQL is the process of including hard coded SQL statements. These statements do not change unless the source code is modified. Dynamic SQL is the process of generating SQL on the fly.The statements generated do not have to be the same each time. 72. Explain a join between tables A join allows tables to be linked to other tables when a relationship between the tables exists. The relationships are established by using a common column in the tables and often uses the primary/foreign key relationship. 73. Describe a subquery. A subquery is a query that is composed of two queries. The first query (inner query) is within the WHERE clause of the other query (outer query). 74. Compare a hierarchical and network database model? The hierarchical model is a top-down structure where each parent may have many children but each child can have only one parent. This model supports one-to-one and one-to-many relationships. The network model can be much more flexible than the hierarchical model since each parent can have multiple children but each child can also have multiple parents. This model supports one-to-one, one-to-many, and many-to-many relationships. 75. Explain the difference between a dynamic and materialized view. A dynamic view may be created every time that a specific view is requested by a user. A materialized view is created and or updated infrequently and it must be synchronized with its associated base table(s). 76. Explain what needs to happen to convert a relation to third normal form. First you must verify that a relation is in both first normal form and second normal form. If the relation is not, you must convert into second normal form. After a relation is in second normal form, you must remove all transitive dependencies. 77. Describe the four types of indexes? A unique primary index is unique and is used to find and store a row. A nonunique primary index is not unique and is used to find a row but also where to store a row (based on its unique primary index). A unique secondary index is unique for each row and used to find table rows. A nonunique secondary index is not unique and used to find table rows. 78. Explain minimum and maximum cardinality? Minimum cardinality is the minimum number of instances of an entity that can be associated with each instance of another entity. Maximum cardinality is the maximum number of instances of an entity that can be associated with each instance of another entity. 79. What is deadlock? How can it be avoided? How can it be resolved once it occurs? Deadlock occurs when two transactions are each waiting on a resource that the other transaction holds. Deadlock can be prevented by requiring transactions to acquire all locks at the same time; once it occurs, the only way to cure it is to abort one of the transactions and back out of partially completed work. 80. Explain what we mean by an ACID transaction. An ACID transaction is one that is atomic, consistent, isolated, and durable. Durable means that database changes are permanent. Consistency can mean either statement level or transaction level consistency. With transaction level consistency, a transaction may not see its own changes.Atomic means it is performed as a unit.

AAA-BRIGHT ACADEMY - 9872474753

25

81. Under what conditions should indexes be used? Indexes can be created to enforce uniqueness, to facilitate sorting, and to enable fast retrieval by column values. A good candidate for an index is a column that is frequently used with equal conditions in WHERE clauses. 82. What is difference between SQL and SQL SERVER? SQL is a language that provides an interface to RDBMS, developed by IBM. SQL SERVER is a RDBMS just like Oracle, DB2. 83. What is Specialization? It is the process of defining a set of subclasses of an entity type where each subclass contain all the attributes and relationships of the parent entity and may have additional attributes and relationships which are specific to itself. 84. What is generalization? It is the process of finding common attributes and relations of a number of entities and defining a common super class for them. 85. What is meant by Proactive, Retroactive and Simultaneous Update? Proactive Update: The updates that are applied to database before it becomes effective in real world. Retroactive Update: The updates that are applied to database after it becomes effective in real world. Simultaneous Update: The updates that are applied to database at the same time when it becomes effective in real world. 86. What is RAID Technology? Redundant array of inexpensive (or independent) disks. The main goal of raid technology is to even out the widely different rates of performance improvement of disks against those in memory and microprocessor. Raid technology employs the technique of data striping to achieve higher transfer rates. 87. What are serial, non serial schedule? A schedule S is serial if, for every transaction T participating in the schedule, all the operations of T is executed consecutively in the schedule, otherwise, the schedule is called non-serial schedule. 88. What are conflict serializable schedules? A schedule S of n transactions is serializable if it is equivalent to some serial schedule of the same n transactions. 89. What is view serializable? A schedule is said to be view serializable if it is view equivalent with some serial schedule. 90. What is a foreign key? A key of a relation schema is called as a foreign key if it is the primary key of some other relation to which it is related to. 91. What are the disadvantages of using a dbms? 1) High initial investments in h/w, s/w, and training. 2) Generality that a DBMS provides for defining and processing data. 3) Overhead for providing security, concurrency control, recovery, and integrity functions. 92. What is Lossless join property? It guarantees that the spurious tuple generation does not occur with respect to relation schemas after decomposition. 93. What is a Phantom Deadlock? In distributed deadlock detection, the delay in propagating local information might cause the deadlock detection algorithms to identify deadlocks that do not really exist. Such situations are called phantom deadlocks and they lead to unnecessary aborts.

AAA-BRIGHT ACADEMY - 9872474753

26

94. What is a checkpoint and When does it occur? A Checkpoint is like a snapshot of the DBMS state. By taking checkpoints, the DBMS can reduce the amount of work to be done during restart in the event of subsequent crashes. 95. What is schema? The description of a data base is called the database schema , which is specified during database design and is not expected to change frequently . A displayed schema is called schema diagram .We call each object in the schema as schema construct.

COMPUTER SCIENCE – 6 1.Difference between C and C++? a) C follows the procedural programming paradigm while C++ is a multi-paradigm language (procedural as well as object oriented) In case of C, importance is given to the steps or procedure of the program while C++ focuses on the data rather than the process. Also, it is easier to implement/edit the code in case of C++ for the same reason. b) In case of C, the data is not secured while the data is secured (hidden) in C++ This difference is due to specific OOP features like Data Hiding which are not present in C. c) C is a low-level language while C++ is a middle-level language C is regarded as a low-level language (difficult interpretation & less user friendly) while C++ has features of both lowlevel (concentration on what's going on in the machine hardware) & high-level languages (concentration on the program itself) & hence is regarded as a middle-level language. d) C uses the top-down approach while C++ uses the bottom-up approach In case of C, the program is formulated step by step, each step is processed into detail while in C++, the base elements are first formulated which then are linked together to give rise to larger systems. e) C is function-driven while C++ is object-driven Functions are the building blocks of a C program while objects are building blocks of a C++ program. f) C++ supports function overloading while C does not Overloading means two functions having the same name in the same program. This can be done only in C++ with the help of Polymorphism (an OOP feature) g) We can use functions inside structures in C++ but not in C. In case of C++, functions can be used inside a structure while structures cannot contain functions in C. h) The NAMESPACE feature in C++ is absent in case of C C++ uses NAMESPACE which avoid name collisions. For instance, two students enrolled in the same university cannot have the same roll number while two students in different universities might have the same roll number. The universities are two different namespace & hence contain the same roll number (identifier) but the same university (one namespace) cannot have two students with the same roll number (identifier) i) The standard input & output functions differ in the two languages C uses scanf & printf while C++ uses cin>> & cout<< as their respective input & output functions j) C++ allows the use of reference variables while C does not Reference variables allow two variable names to point to the same memory location. We cannot use these variables in C programming. k) C++ supports Exception Handling while C does not.

AAA-BRIGHT ACADEMY - 9872474753

27

C does not support it "formally" but it can always be implemented by other methods. Though you don't have the framework to throw & catch exceptions as in C++. 2.What is null pointer? When referring to computer memory, a null pointer is a command used to direct a software program or operating system to an empty location in the computer memory. Commonly, the null pointer is used to denote the end of a memory search or processing event. In computer programming, a null pointer is a pointer that does not point to any object or function. A nil pointer is a false value. For example, 1 > 2 is a nil statement. In the programming language C, NULL is an available command that can be used, where nil is an available command used in the Pascal programming language. 3.What are the 4 basics of OOP? Abstraction, Inheritance, Encapsulation, and Polymorphism. 4.What you mean by Object Relational DBMS? An object-relational database (ORD), or object-relational database management system (ORDBMS), is a database management system (DBMS) similar to a relational database, but with an object-oriented database model: objects, classes and inheritance are directly supported in database schemas and in the query language. In addition, just as with proper relational systems, it supports extension of the data model with custom data-types and methods. 5.Structural difference between bitmap and b-tree index ? Btree It is made of branch nodes and leaf nodes. Branch nodes holds prefix key value along with the link to the leaf node. The leaf node in turn contains the indexed value and rowed. Bitmap It simply consists of bits for every single distinct value. It uses a string of bits to quickly locate rows in a table. Used to index low cardinality columns. 6.what is database Schema? The formal definition of database schema is a set of formulas (sentences) called integrity constraints imposed on a database. 7.what are the different levels of database schema? Conceptual schema- a map of concepts and their relationships. Logical schema- a map of entities and their attributes and relations Physical schema- a particular implementation of a logical schema Schema object- Oracle database object 8.what is difference between foreign key and reference key ? Reference Key is the primary key that is referenced in the other table (linked via the other tables Foreign Key). Foreign Key is how you link the second table to the primary tables Primary Key (or Reference Key). 9.Tell me about DSN? A Data Source Name (DSN) is the logical name that is used by Open Database Connectivity (ODBC) to refer to the drive and other information that is required to access data. The name is used by Internet Information Services (IIS) for a connection to an ODBC data source, such as a Microsoft SQL Server database. 10.ifference between Clustered index and non clustered index ? Clustered Index Only one per table Faster to read than non clustered as data is physically stored in index order

AAA-BRIGHT ACADEMY - 9872474753

28

Non Clustered Index Can be used many times per table Quicker for insert and update operations than a clustered index 11.What is WPF and WCF? WPF/WCF application, need in .NET 3.0 Framework. This application will cover the following concepts: WCF(Windows Communication Foundation) The new service orientated attributes The use of interfaces The use of callbacks Asynchronous delegates Creating the proxy WPF( Windows Presentation Foundation ) Styles Templates Animations Databinding Multithreading a WPF application 12.What is the difference between an EXE and a DLL? The term EXE is a shortened version of the word executable as it identifies the file as a program. On the other hand, DLL stands for Dynamic Link Library, which commonly contains functions and procedures that can be used by other programs. 10.Scenarios in which web application should be used and desktop application should be used? 13.Tell how to check whether a linked list is circular. Create two pointers, each set to the start of the list. Update each as follows: while (pointer1) { pointer1 = pointer1->next; pointer2 = pointer2->next; if (pointer2) pointer2=pointer2->next; if (pointer1 == pointer2) { print ("circular\n"); } } 14.How can u increase the heap size in the memory? If heap size set too low then you will get "out of memory" errors. If you set it too high then your system will hang or you will suffer poor performance because parts of the jvm will be swapped in and out of memory. A rule of thumb is that you should not set this parameter larger than about 80% of your free physical memory. On Windows XP machines you can determine your free physical memory from the Performance tab of the Task Manager application. Boosting the heap size parameter will allow you to read in larger file-based projects. It will also improve the performance of the database back-end since more memory is available for caching.In Java Set the maximum heap size, using the -Xmx command-line option, to a value that allows the application to run with 70% occupancy of the Java heap.The Java heap occupancy often varies over time as the load applied to the application varies. For applications where occupancy varies, set the maximum Java heap size so that there is 70% occupancy at the highest point, and set the minimum heap size, using the -Xms command line option, so that the Java heap is 40% occupied at its lowest memory usage. If these

AAA-BRIGHT ACADEMY - 9872474753

29

values are set, the Java memory management algortihms can modify the heap size over time according to the application load, while maintaining usage in the optimal area of between 40% and 70% occupancy. 15.Why is it difficult to store linked list in an array? Both Arrays and Linked List can be used to store linear data of similar types. Linked list provide dynamic size while the size of array is fixed, So we must know the upper limit on the number of elements in advance. Linked lists have following drawbacks: 1) Random access is not allowed. We have to access elements sequentially starting from the first node. So we cannot do binary search with linked lists. 2) Extra memory space for a pointer is required with each element of the list. 3) Arrays have better cache locality that can make a pretty big difference in performance. 16.Different types of keys in SQL? The different types of Keys in sql server are, A candidate key acts as a unique key. A unique key can be a Primary key. A candidate key can be a single column or combination of columns. Multiple candidate keys are allowed in a table. Primary Key To uniquely identify a row, Primary key is used. A table allows only one Primary key A Primary key can be a single column or combination of columns. Foreign Key A foreign key in a table is a key which refer another table‟s primary key . A primary key can be referred by multiple foreign keys from other tables. It is not required for a primary key to be the reference of any foreign keys. The interesting part is that a foreign key can refer back to the same table but to a different column. This kind of foreign key is known as “selfreferencing foreign key”. 17.Explain about Joins, Views, Normalization, Triggers? The JOIN keyword is used in an SQL statement to query data from two or more tables, based on a relationship between certain columns in these tables. Tables in a database are often related to each other with keys. A view is a virtual table.A view contains rows and columns, just like a real table. The fields in a view are fields from one or more real tables in the database. You can add SQL functions, WHERE, and JOIN statements to a view and present the data as if the data were coming from one single table. Normalization is the process of efficiently organizing data in a database. There are two goals of the normalization process: eliminating redundant data (for example, storing the same data in more than one table) and ensuring data dependencies make sense (only storing related data in a table). Both of these are worthy goals as they reduce the amount of space a database consumes and ensure that data is logically stored. First Normal Form (1NF) sets the very basic rules for an organized database: Eliminate duplicative columns from the same table. Create separate tables for each group of related data and identify each row with a unique column or set of columns (the primary key). Second Normal Form (2NF)

AAA-BRIGHT ACADEMY - 9872474753

30

further addresses the concept of removing duplicative data: Meet all the requirements of the first normal form. Remove subsets of data that apply to multiple rows of a table and place them in separate tables. Create relationships between these new tables and their predecessors through the use of foreign keys. Third Normal Form (3NF) Meet all the requirements of the second normal form. Remove columns that are not dependent upon the primary key. Boyce-Codd Normal Form (BCNF or 3.5NF) It also referred to as the "third and half (3.5) normal form", adds one more requirement: Meet all the requirements of the third normal form. Every determinant must be a candidate key. Fourth Normal Form (4NF) Meet all the requirements of the third normal form. A relation is in 4NF if it has no multi-valued dependencies. Remember, these normalization guidelines are cumulative. For a database to be in 2NF, it must first fulfill all the criteria of a 1NF database. In a DBMS, a trigger is a SQL procedure that initiates an action (i.e., fires an action) when an event (INSERT, DELETE or UPDATE) occurs. Since triggers are event-driven specialized procedures, they are stored in and managed by the DBMS. A trigger cannot be called or executed; the DBMS automatically fires the trigger as a result of a data modification to the associated table. Triggers are used to maintain the referential integrity of data by changing the data in a systematic fashion. Each trigger is attached to a single, specified table in the database. 18.what is the difference between socket and session? The Socket is a Combination of Ip address and Port Number (in pairs) Session is a Logical Connectivity between the source and destination 19.What is a default gateway? In organizational systems a gateway is a node that routes the traffic from a workstation to another network segment. The default gateway commonly connects the internal networks and the outside network (Internet). In such a situation, the gateway node could also act as a proxy server and a firewall. The gateway is also associated with both a router, which uses headers and forwarding tables to determine where packets are sent, and a switch, which provides the actual path for the packet in and out of the gateway. 20.Given an array of 1s and 0s arrange the 1s together and 0s together in a single scan of the array. Optimize the boundary conditions. void main() { int A[10]={'0','1','0','1','0','0','0','1','0','1','0','0'}; int x=0,y=A.length-1; while(x
AAA-BRIGHT ACADEMY - 9872474753

31

A[x]=0,A[y]=1; } getch() } 21.Define Data Abstraction. What is its importance? Abstraction is the process of recognizing and focusing on important characteristics of a situation or object and leaving/filtering out the un-wanted characteristics of that situation or object. Abstraction is the basis for software development. Its through abstraction we define the essential aspects of a system. The process of identifying the abstractions for a given system is called as Modeling (or object modeling). Three levels of data abstraction are: 1. Physical level : how the data is stored physically and where it is stored in database. 2. Logical level : what information or data is stored in the database. eg: Database administrator 3.View level : end users work on view level. if any amendment is made it can be saved by other name. 22.Write a program to swap two numbers without using a temporary variable. void swap(int &i, int &j) { i=i+j; j=i-j; i=i-j; } 23.Memory Allocation in C/C++ calloc() allocates a memory area, the length will be the product of its parameters(it has two parameters). calloc fills the memory with ZERO's and returns a pointer to first byte. If it fails to locate enough space it returns a NULL pointer. malloc() allocates a memory area, length will be value entered as parameter.(it has one parameter). It does not initializes memory area free() used to free the allocated memory(allocated through calloc and malloc), in other words, this used release the allocated memory new also used to allocate memory on heap and initialize the memory using constructor delete also used release memory allocated by new operator 24.Write output of the program? int i=10; printf("%d%d%d",i,++i,i++); Answer = 10 12 12 25.what is virtual function and pure virtual function? Virtual function:-To achieve polymorphism, function in base class is declared as virtual , By declare virtual we make base class pointer to execute function of any derived class depends on content of pointer (any derived class address). Pure Virtual Function :-This is function used in base class, and its defination has to be provide in derived class, In other pure virtual function has not defination in base it defined as : virtual void fun()=0; This means that this function not going to do anything, In case of pure virtual funtion derived function has to implement pure virtual function or redeclare it as pure virtual function

AAA-BRIGHT ACADEMY - 9872474753

32

COMPUTER SCIENCE – 7 1. Who is the father of PHP ? Rasmus Lerdorf is known as the father of PHP. 2. What is the difference between $name and $$name? $name is variable where as $$name is reference variable like $name=sonia and $$name=singh so $sonia value is singh. 3. What are the method available in form submitting? GET and POST 4.How can we get the browser properties using PHP? 5. What Is a Session? A session is a logical object created by the PHP engine to allow you to preserve data across subsequent HTTP requests. Sessions are commonly used to store temporary data to allow multiple PHP pages to offer a complete functional transaction for the same visitor. 6. How can we register the variables into a session? 7. How many ways we can pass the variable through the navigation between the pages? Register the variable into the session Pass the variable as a cookie Pass the variable as part of the URL 8. How can we know the total number of elements of Array? sizeof($array_var) count($array_var) 9. How can we create a database using php? mysql_create_db(); 10. What is the functionality of the function strstr and stristr? strstr() returns part of a given string from the first occurrence of a given substring to the end of the string. For example:strstr("[email protected]","@") will return "@example.com". stristr() is idential to strstr() except that it is case insensitive. 11. What are encryption functions in PHP? CRYPT(), MD5() 12. How to store the uploaded file to the final location? move_uploaded_file( string filename, string destination) 13. Explain mysql_error(). The mysql_error() message will tell us what was wrong with our query, similar to the message we would receive at the MySQL console.

AAA-BRIGHT ACADEMY - 9872474753

33

14. What is Constructors and Destructors? CONSTRUCTOR : PHP allows developers to declare constructor methods for classes. Classes which have a constructor method call this method on each newly-created object, so it is suitable for any initialization that the object may need before it is used. DESTRUCTORS : PHP 5 introduces a destructor concept similar to that of other object-oriented languages, such as C++. The destructor method will be called as soon as all references to a particular object are removed or when the object is explicitly destroyed or in any order in shutdown sequence. 15. Explain the visibility of the property or method. The visibility of a property or method must be defined by prefixing the declaration with the keywords public, protected or private. Class members declared public can be accessed everywhere. Members declared protected can be accessed only within the class itself and by inherited and parent classes. Members declared as private may only be accessed by the class that defines the member. 16. What are the differences between Get and post methods. There are some defference between GET and POST method 1. GET Method have some limit like only 2Kb data able to send for request But in POST method unlimited data can we send 2. when we use GET method requested data show in url but Not in POST method so POST method is good for send sensetive request 17. What are the differences between require and include? Both include and require used to include a file but when included file not found Include send Warning where as Require send Fatal Error 18. What is use of header() function in php ? The header() function sends a raw HTTP header to a client.We can use herder() function for redirection of pages. It is important to notice that header() must be called before any actual output is seen. 19. List out the predefined classes in PHP? Directory stdClass __PHP_Incomplete_Class exception php_user_filter 20. What type of inheritance that PHP supports? In PHP an extended class is always dependent on a single base class,that is, multiple inheritance is not supported. Classes are extended using the keyword 'extends'. 21. How can we encrypt the username and password using php? You can encrypt a password with the following Mysql>SET PASSWORD=PASSWORD("Password"); We can encode data using base64_encode($string) and can decode using base64_decode($string);

22. What is the difference between explode and split? Split function splits string into array by regular expression. Explode splits a string into array by string. For Example:explode(" and", "India and Pakistan and Srilanka");

AAA-BRIGHT ACADEMY - 9872474753

34

split(" :", "India : Pakistan : Srilanka"); Both of these functions will return an array that contains India, Pakistan, and Srilanka. 23. How do you define a constant? Constants in PHP are defined using define() directive, like define("MYCONSTANT", 100); 24. How do you pass a variable by value in PHP? Just like in C++, put an ampersand in front of it, like $a = &$b; 25. What does a special set of tags do in PHP? The output is displayed directly to the browser. 26. How do you call a constructor for a parent class? parent::constructor($value) 27. What’s the special meaning of __sleep and __wakeup? __sleep returns the array of all the variables than need to be saved, while __wakeup retrieves them. 28. What is the difference between PHP and JavaScript? javascript is a client side scripting language, so javascript can make popups and other things happens on someone‘s PC. While PHP is server side scripting language so it does every stuff with the server. 29. What is the difference between the functions unlink and unset? unlink() deletes the given file from the file system. unset() makes a variable undefined. 30. How many ways can we get the value of current session id? session_id() returns the session id for the current session. 31. What are default session time and path? default session time in PHP is 1440 seconds or 24 minutes Default session save path id temporary folder /tmp 32. for image work which library? we will need to compile PHP with the GD library of image functions for this to work. GD and PHP may also require other libraries, depending on which image formats you want to work with. 33. How can we get second of the current time using date function? 34. What are the Formatting and Printing Strings available in PHP? printf()-

Displays a formatted string

sprintf()-Saves a formatted string in a variable fprintf()

-Prints a formatted string to a file

number_format()-Formats numbers as strings 35. How can we find the number of rows in a result set using PHP? $result = mysql_query($sql, $db_link); $num_rows = mysql_num_rows($result); echo "$num_rows rows found";

COMPUTER SCIENCE – 8 1.What is JVM?

AAA-BRIGHT ACADEMY - 9872474753

35

The Java interpreter along with the runtime environment required to run the Java application in called as Java virtual machine(JVM) 2. What is the most important feature of Java? Java is a platform independent language. 3. What do you mean by platform independence? Platform independence means that we can write and compile the java code in one platform (eg Windows) and can execute the class in any other supported platform eg (Linux,Solaris,etc). 4. What is the difference between a JDK and a JVM? JDK is Java Development Kit which is for development purpose and it includes execution environment also. But JVM is purely a run time environment and hence you will not be able to compile your source files using a JVM. 5. What is the base class of all classes? java.lang.Object 6. What are the access modifiers in Java? There are 3 access modifiers. Public, protected and private, and the default one if no identifier is specified is called friendly, but programmer cannot specify the friendly identifier explicitly. 7. What is are packages? A package is a collection of related classes and interfaces providing access protection and namespace management. 8. What is meant by Inheritance and what are its advantages? Inheritance is the process of inheriting all the features from a class. The advantages of inheritance are reusability of code and accessibility of variables and methods of the super class by subclasses. 9. What is the difference between superclass and subclass? A super class is a class that is inherited whereas sub class is a class that does the inheriting. 10. What is an abstract class? An abstract class is a class designed with implementation gaps for subclasses to fill in and is deliberately incomplete. 11. What are the states associated in the thread? Thread contains ready, running, waiting and dead states. 12. What is synchronization? Synchronization is the mechanism that ensures that only one thread is accessed the resources at a time. 13. What is deadlock? When two threads are waiting each other and can‘t precede the program is said to be deadlock. 14. What is an applet? Applet is a dynamic and interactive program that runs inside a web page displayed by a java capable browser 15. What is the lifecycle of an applet? init() method - Can be called when an applet is first loaded start() method - Can be called each time an applet is started. paint() method - Can be called when the applet is minimized or maximized. stop() method - Can be used when the browser moves off the applet‘s page. destroy() method - Can be called when the browser is finished with the applet.

16. How do you set security in applets? using setSecurityManager() method 17. What is a layout manager and what are different types of layout managers available in java AWT?

AAA-BRIGHT ACADEMY - 9872474753

36

A layout manager is an object that is used to organize components in a container. The different layouts are available are FlowLayout, BorderLayout, CardLayout, GridLayout and GridBagLayout 18. What is JDBC? JDBC is a set of Java API for executing SQL statements. This API consists of a set of classes and interfaces to enable programs to write pure Java Database applications. 19. What are drivers available? -a) JDBC-ODBC Bridge driver b) Native API Partly-Java driver c) JDBC-Net Pure Java driver d) Native-Protocol Pure Java driver 20. What is stored procedure? Stored procedure is a group of SQL statements that forms a logical unit and performs a particular task. Stored Procedures are used to encapsulate a set of operations or queries to execute on database. Stored procedures can be compiled and executed with different parameters and results and may have any combination of input/output parameters. 21. What is the Java API? The Java API is a large collection of ready-made software components that provide many useful capabilities, such as graphical user interface (GUI) widgets. 22. Why there are no global variables in Java? Global variables are globally accessible. Java does not support globally accessible variables due to following reasons: 1)The global variables breaks the referential transparency 2)Global variables creates collisions in namespace. 23. What are Encapsulation, Inheritance and Polymorphism? Encapsulation is the mechanism that binds together code and data it manipulates and keeps both safe from outside interference and misuse. Inheritance is the process by which one object acquires the properties of another object. Polymorphism is the feature that allows one interface to be used for general class actions. 24. What is the use of bin and lib in JDK? Bin contains all tools such as javac, appletviewer, awt tool, etc., whereas lib contains API and all packages. 25. What is method overloading and method overriding? Method overloading: When a method in a class having the same method name with different arguments is said to be method overloading. Method overriding : When a method in a class having the same method name with same arguments is said to be method overriding. 26. What is the difference between this() and super()? this() can be used to invoke a constructor of the same class whereas super() can be used to invoke a super class constructor. 27. What is Domain Naming Service(DNS)? It is very difficult to remember a set of numbers(IP address) to connect to the Internet. The Domain Naming Service(DNS) is used to overcome this problem. It maps one particular IP address to a string of characters. For example, www. mascom. com implies com is the domain name reserved for US commercial sites, moscom is the name of the company and www is the name of the specific computer, which is mascom‘s server.

28. What is URL? URL stands for Uniform Resource Locator and it points to resource files on the Internet. URL has four components: http://www. address. com:80/index.html, where http - protocol name, address - IP address or host name, 80 - port

AAA-BRIGHT ACADEMY - 9872474753

37

number and index.html - file path. 29. What is RMI and steps involved in developing an RMI object? Remote Method Invocation (RMI) allows java object that executes on one machine and to invoke the method of a Java object to execute on another machine. The steps involved in developing an RMI object are: a) Define the interfaces b) Implementing these interfaces c) Compile the interfaces and their implementations with the java compiler d) Compile the server implementation with RMI compiler e) Run the RMI registry f) Run the application. 30. What is RMI architecture? RMI architecture consists of four layers and each layer performs specific functions: a) Application layer - contains the actual object definition. b) Proxy layer - consists of stub and skeleton. c) Remote Reference layer - gets the stream of bytes from the transport layer and sends it to the proxy layer. d) Transportation layer - responsible for handling the actual machine-to-machine communication. 31. What is a Java Bean? A Java Bean is a software component that has been designed to be reusable in a variety of different environments. 32. What are checked exceptions? Checked exception are those which the Java compiler forces you to catch. e.g. IOException are checked Exceptions. 33. What are runtime exceptions? Runtime exceptions are those exceptions that are thrown at runtime because of either wrong input data or because of wrong business logic etc. These are not checked by the compiler at compile time. 34. What is the difference between error and an exception? An error is an irrecoverable condition occurring at runtime. Such as OutOfMemory error. These JVM errors and you can not repair them at runtime. While exceptions are conditions that occur because of bad input etc. e.g. FileNotFoundException will be thrown if the specified file does not exist. Or a NullPointerException will take place if you try using a null reference. In most of the cases it is possible to recover from an exception (probably by giving user a feedback for entering proper values etc.). 35. What is the purpose of finalization? The purpose of finalization is to give an unreachable object the opportunity to perform any cleanup processing before the object is garbage collected. For example, closing a opened file, closing a opened database Connection. 36. What is the difference between yielding and sleeping? When a task invokes its yield() method, it returns to the ready state. When a task invokes its sleep() method, it returns to the waiting state. 37. What is the difference between preemptive scheduling and time slicing? Under preemptive scheduling, the highest priority task executes until it enters the waiting or dead states or a higher priority task comes into existence. Under time slicing, a task executes for a predefined slice of time and then reenters the pool of ready tasks. The scheduler then determines which task should execute next, based on priority and other factors. 38. What is mutable object and immutable object? If a object value is changeable then we can call it as Mutable object. (Ex., StringBuffer, …) If you are not allowed to change the value of an object, it is immutable object. (Ex., String, Integer, Float, …)

39. What is the purpose of Void class? The Void class is an uninstantiable placeholder class to hold a reference to the Class object representing the primitive Java type void.

AAA-BRIGHT ACADEMY - 9872474753

38

40. What is JIT and its use? Really, just a very fast compiler… In this incarnation, pretty much a one-pass compiler — no offline computations. So you can‘t look at the whole method, rank the expressions according to which ones are re-used the most, and then generate code. In theory terms, it‘s an on-line problem. 41. What is nested class? If all the methods of a inner class is static then it is a nested class. 42. What is HashMap and Map? Map is Interface and Hashmap is class that implements that. 43. What are different types of access modifiers? public: Any thing declared as public can be accessed from anywhere. private: Any thing declared as private can‘t be seen outside of its class. protected: Any thing declared as protected can be accessed by classes in the same package and subclasses in the other packages. default modifier : Can be accessed only to classes in the same package. 44. What is the difference between Reader/Writer and InputStream/Output Stream? The Reader/Writer class is character-oriented and the InputStream/OutputStream class is byte-oriented. 45. What is servlet? Servlets are modules that extend request/response-oriented servers, such as java-enabled web servers. For example, a servlet might be responsible for taking data in an HTML order-entry form and applying the business logic used to update a company‘s order database. 46. What is Constructor? A constructor is a special method whose task is to initialize the object of its class. It is special because its name is the same as the class name. They do not have return types, not even void and therefore they cannot return values. They cannot be inherited, though a derived class can call the base class constructor. Constructor is invoked whenever an object of its associated class is created. 47. What is an Iterator ? The Iterator interface is used to step through the elements of a Collection. Iterators let you process each element of a Collection. Iterators are a generic way to go through all the elements of a Collection no matter how it is organized. Iterator is an Interface implemented a different way for every Collection. 48. What is the List interface? The List interface provides support for ordered collections of objects. Lists may contain duplicate elements. 49. What is memory leak? A memory leak is where an unreferenced object that will never be used again still hangs around in memory and doesnt get garbage collected. 50. What is the difference between the prefix and postfix forms of the ++ operator? The prefix form performs the increment operation and returns the value of the increment operation. The postfix form returns the current value all of the expression and then performs the increment operation on that value.

51. What is the difference between a constructor and a method? A constructor is a member function of a class that is used to create objects of that class. It has the same name as the class itself, has no return type, and is invoked using the new operator.

AAA-BRIGHT ACADEMY - 9872474753

39

A method is an ordinary member function of a class. It has its own name, a return type (which may be void), and is invoked using the dot operator. 52. What will happen to the Exception object after exception handling? Exception object will be garbage collected. 53. Difference between static and dynamic class loading. Static class loading: The process of loading a class using new operator is called static class loading. Dynamic class loading: The process of loading a class at runtime is called dynamic class loading. Dynamic class loading can be done by using Class.forName(….).newInstance(). 54. Explain the Common use of EJB The EJBs can be used to incorporate business logic in a web-centric application. The EJBs can be used to integrate business processes in Business-to-business (B2B) e-commerce applications.In Enterprise Application Integration applications, EJBs can be used to house processing and mapping between different applications. 55. What is JSP? JSP is a technology that returns dynamic content to the Web client using HTML, XML and JAVA elements. JSP page looks like a HTML page but is a servlet. It contains Presentation logic and business logic of a web application. 56. What is the purpose of apache tomcat? Apache server is a standalone server that is used to test servlets and create JSP pages. It is free and open source that is integrated in the Apache web server. It is fast, reliable server to configure the applications but it is hard to install. It is a servlet container that includes tools to configure and manage the server to run the applications. It can also be configured by editing XML configuration files. 57. Where pragma is used? Pragma is used inside the servlets in the header with a certain value. The value is of no-cache that tells that a servlets is acting as a proxy and it has to forward request. Pragma directives allow the compiler to use machine and operating system features while keeping the overall functionality with the Java language. These are different for different compilers. 58. Briefly explain daemon thread. Daemon thread is a low priority thread which runs in the background performs garbage collection operation for the java runtime system. 59. What is a native method? A native method is a method that is implemented in a language other than Java. 60. Explain different way of using thread? A Java thread could be implemented by using Runnable interface or by extending the Thread class. The Runnable is more advantageous, when you are going for multiple inheritance. 61. What are the two major components of JDBC? One implementation interface for database manufacturers, the other implementation interface for application and applet writers.

62. What kind of thread is the Garbage collector thread? It is a daemon thread.

AAA-BRIGHT ACADEMY - 9872474753

40

63. What are the different ways to handle exceptions? There are two ways to handle exceptions, 1. By wrapping the desired code in a try block followed by a catch block to catch the exceptions. and 2. List the desired exceptions in the throws clause of the method and let the caller of the method handle those exceptions. 64. How many objects are created in the following piece of code? MyClass c1, c2, c3; c1 = new MyClass (); c3 = new MyClass (); Answer: Only 2 objects are created, c1 and c3. The reference c2 is only declared and not initialized. 65.What is UNICODE? Unicode is used for internal representation of characters and strings and it uses 16 bits to represent each other.

COMPUTER SCIENCE – 9 1. Explain the concept of Reentrancy? It is a useful, memory-saving technique for multiprogrammed timesharing systems. A Reentrant Procedure is one in which multiple users can share a single copy of a program during the same period. Reentrancy has 2 key aspects: The program code cannot modify itself, and the local data for each user process must be stored separately. Thus, the permanent part is the code, and the temporary part is the pointer back to the calling program and local variables used by that program. Each execution instance is called activation. It executes the code in the permanent part, but has its own copy of local variables/parameters. The temporary part associated with each activation is the activation record. Generally, the activation record is kept on the stack. Note: A reentrant procedure can be interrupted and called by an interrupting program, and still execute correctly on returning to the procedure. 2. Explain Belady's Anomaly? Also called FIFO anomaly. Usually, on increasing the number of frames allocated to a process virtual memory, the process execution is faster, because fewer page faults occur. Sometimes, the reverse happens, i.e., the execution time increases even when more frames are allocated to the process. This is Belady's Anomaly. This is true for certain page reference patterns. 3. What is a binary semaphore? What is its use? A binary semaphore is one, which takes only 0 and 1 as values. They are used to implement mutual exclusion and synchronize concurrent processes. 4. What is thrashing? It is a phenomenon in virtual memory schemes when the processor spends most of its time swapping pages, rather than executing instructions. This is due to an inordinate number of page faults. 5. List the Coffman's conditions that lead to a deadlock. 1. Mutual Exclusion: Only one process may use a critical resource at a time. 2. Hold & Wait: A process may be allocated some resources while waiting for others. 3. No Pre-emption: No resource can be forcible removed from a process holding it. 4. Circular Wait: A closed chain of processes exist such that each process holds at least one resource needed by another process in the chain. 6. What are short, long and medium-term scheduling?

AAA-BRIGHT ACADEMY - 9872474753

41

Long term scheduler determines which programs are admitted to the system for processing. It controls the degree of multiprogramming. Once admitted, a job becomes a process. Medium term scheduling is part of the swapping function. This relates to processes that are in a blocked or suspended state. They are swapped out of real-memory until they are ready to execute. The swapping-in decision is based on memory-management criteria. Short term scheduler, also know as a dispatcher executes most frequently, and makes the finest-grained decision of which process should execute next. This scheduler is invoked whenever an event occurs. It may lead to interruption of one process by preemption.  What are turnaround time and response time? Turnaround time is the interval between the submission of a job and its completion. Response time is the interval between submission of a request, and the first response to that request.  What are the typical elements of a process image? User data: Modifiable part of user space. May include program data, user stack area, and programs that may be modified. User program: The instructions to be executed. System Stack: Each process has one or more LIFO stacks associated with it. Used to store parameters and calling addresses for procedure and system calls. Process control Block (PCB): Info needed by the OS to control processes.  What is the Translation Lookaside Buffer (TLB)? In a cached system, the base addresses of the last few referenced pages is maintained in registers called the TLB that aids in faster lookup. TLB contains those page-table entries that have been most recently used. Normally, each virtual memory reference causes 2 physical memory accesses- one to fetch appropriate page-table entry, and one to fetch the desired data. Using TLB in-between, this is reduced to just one physical memory access in cases of TLB-hit.  What is the resident set and working set of a process? Resident set is that portion of the process image that is actually in real-memory at a particular instant. Working set is that subset of resident set that is actually needed for execution. (Relate this to the variable-window size method for swapping techniques.)  When is a system in safe state? The set of dispatchable processes is in a safe state if there exists at least one temporal order in which all processes can be run to completion without resulting in a deadlock.  What is cycle stealing? We encounter cycle stealing in the context of Direct Memory Access (DMA). Either the DMA controller can use the data bus when the CPU does not need it, or it may force the CPU to temporarily suspend operation. The latter technique is called cycle stealing. Note that cycle stealing can be done only at specific break points in an instruction cycle. 13.

What is meant by arm-stickiness?

If one or a few processes have a high access rate to data on one track of a storage disk, then they may monopolize the device by repeated requests to that track. This generally happens with most common device scheduling algorithms (LIFO, SSTF, C-SCAN, etc). High-density multisurface disks are more likely to be affected by this than low density ones.

14.

What are the stipulations of C2 level security?

C2 level security provides for: 1. Discretionary Access Control 2. Identification and Authentication

AAA-BRIGHT ACADEMY - 9872474753

42

3. Auditing 4. Resource reuse 15.

What is busy waiting?

The repeated execution of a loop of code while waiting for an event to occur is called busy-waiting. The CPU is not engaged in any real productive activity during this period, and the process does not progress toward completion. 16.

Explain the popular multiprocessor thread-scheduling strategies.

1. Load Sharing: Processes are not assigned to a particular processor. A global queue of threads is maintained. Each processor, when idle, selects a thread from this queue. Note that load balancing refers to a scheme where work is allocated to processors on a more permanent basis. 2. Gang Scheduling: A set of related threads is scheduled to run on a set of processors at the same time, on a 1-to-1 basis. Closely related threads / processes may be scheduled this way to reduce synchronization blocking, and minimize process switching. Group scheduling predated this strategy. 3. Dedicated processor assignment: Provides implicit scheduling defined by assignment of threads to processors. For the duration of program execution, each program is allocated a set of processors equal in number to the number of threads in the program. Processors are chosen from the available pool. 4. Dynamic scheduling: The number of thread in a program can be altered during the course of execution. 17.

When does the condition 'rendezvous' arise?

In message passing, it is the condition in which, both, the sender and receiver are blocked until the message is delivered. 18.

What is a trap and trapdoor?

Trapdoor is a secret undocumented entry point into a program used to grant access without normal methods of access authentication. A trap is a software interrupt, usually the result of an error condition.

ELECTRONICS – 1 1. What is Electronic? The study and use of electrical devices that operate by controlling the flow of electrons or other electrically charged particles. 2. What is communication? Communication means transferring a signal from the transmitter which passes through a medium then the output is obtained at the receiver. (or)communication says as transferring of message from one place to another place called communication. 3. Different types of communications? Explain. Analog and digital communication. As a technology, analog is the process of taking an audio or video signal (the human voice) and translating it into electronic pulses. Digital on the other hand is breaking the signal into a binary format where the audio or video data is represented by a series of "1"s and "0"s. Digital signals are immune to noise, quality of transmission and reception is good, components used in digital communication can be produced with high precision and power consumption is also very less when compared with analog signals. 4. What is sampling? The process of obtaining a set of samples from a continuous function of time x(t) is referred to as sampling. 5. State sampling theorem. It states that, while taking the samples of a continuous signal, it has to be taken care that the sampling rate is equal to or greater than twice the cut off frequency and the minimum sampling rate is known as the Nyquist rate. 6. What is cut-off frequency? The frequency at which the response is -3dB with respect to the maximum response.

AAA-BRIGHT ACADEMY - 9872474753

43

7. What is pass band? Passband is the range of frequencies or wavelengths that can pass through a filter without being attenuated. 8. What is stop band? A stopband is a band of frequencies, between specified limits, in which a circuit, such as a filter or telephone circuit, does not let signals through, or the attenuation is above the required stopband attenuation level. 9. Explain RF? Radio frequency (RF) is a frequency or rate of oscillation within the range of about 3 Hz to 300 GHz. This range corresponds to frequency of alternating current electrical signals used to produce and detect radio waves. Since most of this range is beyond the vibration rate that most mechanical systems can respond to, RF usually refers to oscillations in electrical circuits or electromagnetic radiation. 10. What is modulation? And where it is utilized? Modulation is the process of varying some characteristic of a periodic wave with an external signals. Radio communication superimposes this information bearing signal onto a carrier signal. These high frequency carrier signals can be transmitted over the air easily and are capable of travelling long distances. The characteristics (amplitude, frequency, or phase) of the carrier signal are varied in accordance with the information bearing signal. Modulation is utilized to send an information bearing signal over long distances. 11. What is demodulation? Demodulation is the act of removing the modulation from an analog signal to get the original baseband signal back. Demodulating is necessary because the receiver system receives a modulated signal with specific characteristics and it needs to turn it to base-band. 12. Name the modulation techniques. For Analog modulation--AM, SSB, FM, PM and SM Digital modulation--OOK, FSK, ASK, Psk, QAM, MSK, CPM, PPM, TCM, OFDM 13. Explain AM and FM. AM-Amplitude modulation is a type of modulation where the amplitude of the carrier signal is varied in accordance with the information bearing signal. FM-Frequency modulation is a type of modulation where the frequency of the carrier signal is varied in accordance with the information bearing signal. 14. Where do we use AM and FM? AM is used for video signals for example TV. Ranges from 535 to 1705 kHz. FM is used for audio signals for example Radio. Ranges from 88 to 108 MHz. 15. What is a base station? Base station is a radio receiver/transmitter that serves as the hub of the local wireless network, and may also be the gateway between a wired network and the wireless network. 16. How many satellites are required to cover the earth? 3 satellites are required to cover the entire earth, which is placed at 120 degree to each other. The life span of the satellite is about 15 years. 17. What is a repeater? A repeater is an electronic device that receives a signal and retransmits it at a higher level and/or higher power, or onto the other side of an obstruction, so that the signal can cover longer distances without degradation. 18. What is an Amplifier? An electronic device or electrical circuit that is used to boost (amplify) the power, voltage or current of an applied signal. 19. Example for negative feedback and positive feedback? Example for –ve feedback is ---Amplifiers And for +ve feedback is – Oscillators 20. What is Oscillator?

AAA-BRIGHT ACADEMY - 9872474753

44

An oscillator is a circuit that creates a waveform output from a direct current input. The two main types of oscillator are harmonic and relaxation. The harmonic oscillators have smooth curved waveforms, while relaxation oscillators have waveforms with sharp changes. 21. What is an Integrated Circuit? An integrated circuit (IC), also called a microchip, is an electronic circuit etched onto a silicon chip. Their main advantages are low cost, low power, high performance, and very small size. 22. What is crosstalk? Crosstalk is a form of interference caused by signals in nearby conductors. The most common example is hearing an unwanted conversation on the telephone. Crosstalk can also occur in radios, televisions, networking equipment, and even electric guitars. 23. What is resistor? A resistor is a two-terminal electronic component that opposes an electric current by producing a voltage drop between its terminals in proportion to the current, that is, in accordance with Ohm's law: V = IR. 25. What is inductor? An inductor is a passive electrical device employed in electrical circuits for its property of inductance. An inductor can take many forms. 26. What is conductor? A substance, body, or device that readily conducts heat, electricity, sound, etc. Copper is a good conductor of electricity. 27. What is a semi conductor? A semiconductor is a solid material that has electrical conductivity in between that of a conductor and that of an insulator(An Insulator is a material that resists the flow of electric current. It is an object intended to support or separate electrical conductors without passing current through itself); it can vary over that wide range either permanently or dynamically. 28. What is diode? In electronics, a diode is a two-terminal device. Diodes have two active electrodes between which the signal of interest may flow, and most are used for their unidirectional current property. 29. What is transistor? In electronics, a transistor is a semiconductor device commonly used to amplify or switch electronic signals. The transistor is the fundamental building block of computers, and all other modern electronic devices. Some transistors are packaged individually but most are found in integrated circuits 30. What is op-amp? An operational amplifier, often called an op-amp , is a DC-coupled high-gain electronic voltage amplifier with differential inputs[1] and, usually, a single output. Typically the output of the op-amp is controlled either by negative feedback, which largely determines the magnitude of its output voltage gain, or by positive feedback, which facilitates regenerative gain and oscillation. 31. What is a feedback? Feedback is a process whereby some proportion of the output signal of a system is passed (fed back) to the input. This is often used to control the dynamic behaviour of the system. 32. Advantages of negative feedback over positive feedback. Much attention has been given by researchers to negative feedback processes, because negative feedback processes lead systems towards equilibrium states. Positive feedback reinforces a given tendency of a system and can lead a system away from equilibrium states, possibly causing quite unexpected results. 33. What is Barkhausen criteria? Barkhausen criteria, without which you will not know which conditions, are to be satisfied for oscillations. “Oscillations will not be sustained if, at the oscillator frequency, the magnitude of the product of the transfer gain of the amplifier and the magnitude of the feedback factor of the feedback network ( the magnitude of the loop gain ) are less than unity”. The condition of unity loop gain -A? = 1 is called the Barkhausen criterion. This condition implies that A?= 1and that the phase of - A? is zero.

AAA-BRIGHT ACADEMY - 9872474753

45

34. What is CDMA, TDMA, FDMA? Code division multiple access (CDMA) is a channel access method utilized by various radio communication technologies. CDMA employs spread-spectrum technology and a special coding scheme (where each transmitter is assigned a code) to allow multiple users to be multiplexed over the same physical channel. By contrast, time division multiple access (TDMA) divides access by time, while frequency-division multiple access (FDMA) divides it by frequency. An analogy to the problem of multiple access is a room (channel) in which people wish to communicate with each other. To avoid confusion, people could take turns speaking (time division), speak at different pitches (frequency division), or speak in different directions (spatial division). In CDMA, they would speak different languages. People speaking the same language can understand each other, but not other people. Similarly, in radio CDMA, each group of users is given a shared code. Many codes occupy the same channel, but only users associated with a particular code can understand each other. 35. explain different types of feedback Types of feedback: Negative feedback: This tends to reduce output (but in amplifiers, stabilizes and linearizes operation). Negative feedback feeds part of a system's output, inverted, into the system's input; generally with the result that fluctuations are attenuated. Positive feedback: This tends to increase output. Positive feedback, sometimes referred to as "cumulative causation", is a feedback loop system in which the system responds to perturbation (A perturbation means a system, is an alteration of function, induced by external or internal mechanisms) in the same direction as the perturbation. In contrast, a system that responds to the perturbation in the opposite direction is called a negative feedback system. Bipolar feedback: which can either increase or decrease output. 36. What are the main divisions of power system? The generating system,transmission system,and distribution system 37. What is Instrumentation Amplifier (IA) and what are all the advantages? An instrumentation amplifier is a differential op-amp circuit providing high input impedances with ease of gain adjustment by varying a single resistor. 38. What is meant by impedance diagram. The equivalent circuit of all the components of the power system are drawn and they are interconnected is called impedance diagram. 39. What is the need for load flow study. The load flow study of a power system is essential to decide the best operation existing system and for planning the future expansion of the system. It is also essential for designing the power system. 40. What is the need for base values? The components of power system may operate at different voltage and power levels. It will be convenient for analysis of power system if the voltage, power, current ratings of the components of the power system is expressed with referance to a common value called base value.

ELECTRONICS – 2 1. Define Network? A network is a set of devices connected by physical media links. A network is recursively is a connection of two or more nodes by a physical link or two or more networks connected by one or more nodes. 2. What is the criteria to check the network reliability? A network Reliability is measured on following factors. a) Downtime: The time it takes to recover. b) Failure Frequency: The frequency when it fails to work the way it is intended. 3. What do you mean by Bandwidth? Every Signal has a limit of its upper range and lower range of frequency of signal it can carry. This range of limit of network between its upper frequency and lower frequency is termed as Bandwidth. 4. What is a Link?

AAA-BRIGHT ACADEMY - 9872474753

46

At the lowest level, a network can consist of two or more computers directly connected by some physical medium such as coaxial cable or optical fiber. Such a physical medium is called as Link. 5. What is a node? A network can consist of two or more computers directly connected by some physical medium such as coaxial cable or optical fiber. Such a physical medium is called as Links and the computer it connects is called as Nodes. 6. What is a gateway or Router? A node that is connected to two or more networks is commonly called as router or Gateway. It generally forwards message from one network to another. 7. What is DNS? DNS stands for Domain Name System. It is a Naming System for all the resources over Internet which includes Physical nodes and Applications. DNS is a way to locate to a resource easily over a network and serves to be an essential component necessary for the working of Internet. 8. What is point-point link? If the physical links are limited to a pair of nodes it is said to be point-point link. 9. What is DHCP scope? A scope is a range, or pool, of IP addresses that can be leased to DHCP clients on a given subnet. 10. What is FQDN? An FQDN contains (fully qualified domain name) both the hostname and a domain name. It uniquely identifies a host within a DNS hierarchy 11. What is the DNS forwarder? DNS servers often must communicate with DNS servers outside of the local network. A forwarder is an entry that is used when a DNS server receives DNS queries that it cannot resolve locally. It then forwards those requests to external DNS servers for resolution. 12. Give a brief description of PAN, LAN, HAN, SAN, CAN, MAN, WAN, GAN. a) PAN (Personal Area Network) It is a connection of Computer and Devices that are close to a person VIZ., Computer, Telephones, Fax, Printers, etc. Range Limit – 10 meters. b) LAN (Local Area Network) LAN is the connection of Computers and Devices over a small Geographical Location – Office, School, Hospital, etc. A LAN can be connected to WAN using a gateway (Router). c) HAN (House Area Network) HAN is LAN of Home which connects to homely devices ranging from a few personal computers, phone, fax and printers. d) SAN (Storage Area Network) SAN is the connection of various storage devices which seems local to a computer. e) CAN (Campus Area Network) CAN is the connection of devices, printers, phones and accessories within a campus which Links to other departments of the organization within the same campus. f) MAN (Metropolitan Area Network) MAN is the connection of loads of devices which spans to Large cities over a wide Geographical Area. g) WAN ( Wide Area Network) WAN connects devices, phones, printers, scanners, etc over a very wide geographical location which may range to connect cities, countries and ever continents. h) GAN (Global Area Network) GAN connects mobiles across the globe using satellites. 13. What is POP3?

AAA-BRIGHT ACADEMY - 9872474753

47

POP3 stands for Post Office Protocol Version3 (Current Version). POP is a protocol which listens on port 110 and is responsible for accessing the mail service on a client machine. POP3 works in two modes such as Delete Mode and Keep Mode. a) Delete Mode: A mail is deleted from the mailbox after successful retrieval. b) Keep Mode: The Mail remains Intact in the mailbox after successful retrieval. 14. How would you recommend we support our mobile workers? Look for answers that talk about bandwidth availability, user experience, and traffic security. It‟s also interesting to see if candidates ask what sort of applications mobile workers use and then tailor their answers to reflect the way the network will be used. 15. What’s your experience of configuration management? This question probes candidates' thoughts and experiences of the structure and governance that surrounds networking. You want someone with deep technical knowledge and domain experience, but also someone who isn‟t a maverick who will make changes without following the proper protocols. 16. What do you mean by MAC address? Does it has some link or something in common to Mac OS of Apple? MAC stands for Media Access Control. It is the address of the device identified at Media Access Control Layer of Network Architecture. Similar to IP address MAC address is unique address, i.e., no two device can have same MAC address. MAC address is stored at the Read Only Memory (ROM) of the device. MAC Address and Mac OS are two different things and it should not be confused with each other. Mac OS is a POSIX standard Operating System Developed upon FreeBSD used by Apple devices. That‟s all for now. We will be coming up with another articles on Networking series every now and then. Till then, don‟t forget to provide us with your valuable feedback in the comment section below. 17. How will check ip address on 98? Start ==> Run ==> command ==> winipcfg How will you make partition after installing windows? My computer ==> right click ==> manage ==> disk management ==> select free space ==> right click ==> New partition 18. What is IP? It's a unique 32 bits software address of a node in a network. 19. What is private IP? Three ranges of IP addresses have been reserved for private address and they are not valid for use on the Internet. If you want to access internet with these address you must have to use proxy server or NAT server (on normal cases the role of proxy server is played by your ISP.).If you do decide to implement a private IP address range, you can use IP addresses from any of the following classes: Class A : 10.0.0.0 10.255.255.255 Class B : 172.16.0.0 172.31.255.255 Class C : 192.168.0.0 192.168.255.255 20. What is public IP address? A public IP address is an address leased from an ISP that allows or enables direct Internet communication. 21. What's the benefit of subnetting? 1. Reduce the size of the routing tables. 2. Reduce network traffic. Broadcast traffic can be isolated within a single logical network. 3. Provide a way to secure network traffic by isolating it from the rest of the network. 22. What are the differences between static IP addressing and dynamic IP addressing? With static IP addressing, a computer (or other device) is configured to always use the same IP address. With dynamic addressing, the IP address can change periodically and is managed by a centralized network service. 23. What is APIPA? Automatic private IP addressing (APIPA) is a feature mainly found in Microsoft operating systems. APIPA enables clients to still communicate with other computers on the same network segment until an IP address can be obtained from a

AAA-BRIGHT ACADEMY - 9872474753

48

DHCP server, allowing the machine to fully participate on the network. The range of these IP address are the 169.254.0.1 to 169.254.255.254 with a default Class B subnet mask of 255.255.0.0. 24. What are the LMHOSTS files? The LMHOSTS file is a static method of resolving NetBIOS names to IP addresses in the same way that the HOSTS file is a static method of resolving domain names into IP addresses. An LMHOSTS file is a text file that maps NetBIOS names to IP addresses; it must be manually configured and updated. 25. When were OSI model developed and why its standard called 802.XX and so on? OSI model was developed in February1980 that why these also known as 802.XX Standard (Note : 80 means ----> 1980, 2means ----> February) 26. What is Full form of ADS? Active Directory Structure 27. How will you register and activate windows? If you have not activated windows XP, you can do so at any time by clicking the windows Activation icon in the system tray to initiate activation. Once you have activated windows XP, this icon disappears from the system tray. For registration Start ==> Run ==> regwiz /r 28. Where do we use cross and standard cable? Computer to computer ==> cross Switch/hub to switch/hub ==>cross Computer to switch/hub ==>standard 29. What is RAID? A method for providing fault tolerance by using multiple hard disk drives. 30. What is NETBIOS and NETBEUI? NETBIOS is a programming interface that allows I/O requests to be sent to and received from a remote computer and it hides the networking hardware from applications. NETBEUI is NetBIOS extended user interface. A transport protocol designed by Microsoft and IBM for the use on small subnets. 31. What is redirector? Redirector is software that intercepts file or prints I/O requests and translates them into network requests. This comes under presentation layer. 32. What is Beaconing? The process that allows a network to self-repair networks problems. The stations on the network notify the other stations on the ring when they are not receiving the transmissions. Beaconing is used in Token ring and FDDI networks. 33. How will enable sound service in 2003? By default this service remain disable to enable this service Start -------->administrative tools ---------> service -----------> windows audio ----------> start up type -------->automatic 34. How will enable CD burning service in 2003? By default this service remain disable to enable this service Start --------> administrative tools --------> service -------->IMAPI CD burning com service --------> start up type --------> automatic 35. What types of network do you have experience with? This should be one of the first things you ask. It might be critical to you that the candidate has prior experience with the type of network model you use, but even candidates that don't could be good fits, assuming they are willing to learn and have other critical skills. In fact, candidates with lots of experience on networks very similar to yours could be too set in their ways to adapt to the way your business does things. 36. What can you tell me about the OSI Reference Model?

AAA-BRIGHT ACADEMY - 9872474753

49

The OSI Reference Model provides a framework for discussing network design and operations. It groups communication functions into 7 logical layers, each one building on the next. This question will demonstrate whether candidates have the theoretical knowledge to back up their practical skills. 37. What are the use of cross and standard cables? Where do you find their usages? A Network cable may be crossover as well as straight. Both of these cables have different wires arrangement in them, which serves to fulfill different purpose. a) Area of application of Straight cable 1. Computer to Switch 2. Computer to Hub 3. Computer to Modem 4. Router to Switch b) Ares of application of Crossover cable 1. Computer to Computer 2. Switch to Switch 3. Hub to Hub 38. What monitoring tools or approaches do you rate? You can extend this to ask about what tools candidates have used in other jobs. Hopefully they will be able to give you a range of products and techniques, and the rationale for their favorites. This can tell you about the depth of their experience and also whether their choices of tools are a good fit for your architecture. 39. Describe 802.3 standards 1. IEEE 802

: LAN/MAN

2. IEEE 802.1 : Standards for LAN/MAN bridging and management and remote media access control bridging. 3. IEEE 802.2 : Standards for Logical Link Control (LLC) standards for connectivity. 4. IEEE 802.3 : Ethernet Standards for Carrier Sense Multiple Access with Collision Detection (CSMA/CD). 5. IEEE 802.4 : Standards for token passing bus access. 6. IEEE 802.5 : Standards for token ring access and for communications between LANs and MANs 7. IEEE 802.6 : Standards for information exchange between systems. 8. IEEE 802.7 : Standards for broadband LAN cabling. 9. IEEE 802.8 : Fiber optic connection. 10.

IEEE 802.9 : Standards for integrated services, like voice and data.

11.

IEEE 802.10 : Standards for LAN/MAN security implementations.

12.

IEEE 802.11 : Wireless Networking – "WiFi".

13.

IEEE 802.12 : Standards for demand priority access method.

14.

IEEE 802.14 : Standards for cable television broadband communications.

15.

IEEE 802.15.1 : Bluetooth

16.

IEEE 802.15.4 : Wireless Sensor/Control Networks – "ZigBee"

17.

IEEE 802.16

: Wireless Networking – "WiMAX"

40. What is virtual path? Along any transmission path from a given source to a given destination, a group of virtual circuits can be grouped together into what is called path.

AAA-BRIGHT ACADEMY - 9872474753

50

41. What is virtual channel? Virtual channel is normally a connection from one source to one destination, although multicast connections are also permitted. The other name for virtual channel is virtual circuit. 42. What is logical link control? One of two sublayers of the data link layer of OSI reference model, as defined by the IEEE 802 standard. This sublayer is responsible for maintaining the link between computers when they are sending data across the physical network connection. 43. Why should you care about the OSI Reference Model? It provides a framework for discussing network operations and design. 44. What is the difference between routable and non- routable protocols? Routable protocols can work with a router and can be used to build large networks. Non-Routable protocols are designed to work on small, local networks and cannot be used with a router 45. What is MAU? In token Ring , hub is called Multistation Access Unit(MAU). 46. Explain 5-4-3 rule In a Ethernet network, between any two points on the network, there can be no more than five network segments or four repeaters, and of those five segments only three of segments can be populated. 47. What is the difference between TFTP and FTP application layer protocols? The Trivial File Transfer Protocol (TFTP) allows a local host to obtain files from a remote host but does not provide reliability or security. It uses the fundamental packet delivery services offered by UDP. The File Transfer Protocol (FTP) is the standard mechanism provided by TCP / IP for copying a file from one host to another. It uses the services offered by TCP and so is reliable and secure. It establishes two connections (virtual circuits) between the hosts, one for data transfer and another for control information. 48. What is the minimum and maximum length of the header in the TCP segment and IP datagram? The header should have a minimum length of 20 bytes and can have a maximum length of 60 bytes. 49. What is difference between ARP and RARP? The address resolution protocol (ARP) is used to associate the 32 bit IP address with the 48 bit physical address, used by a host or a router to find the physical address of another host on its network by sending a ARP query packet that includes the IP address of the receiver. The reverse address resolution protocol (RARP) allows a host to discover its Internet address when it knows only its physical address. 50. What is ICMP? ICMP is Internet Control Message Protocol, a network layer protocol of the TCP/IP suite used by hosts and gateways to send notification of datagram problems back to the sender. It uses the echo test / reply to test whether a destination is reachable and responding. It also handles both control and error messages. 51. What is terminal emulation, in which layer it comes? Telnet is also called as terminal emulation. It belongs to application layer. 52. What is frame relay, in which layer it comes? Frame relay is a packet switching technology. It will operate in the data link layer. 53. What do you meant by "triple X" in Networks? The function of PAD (Packet Assembler Disassembler) is described in a document known as X.3. The standard protocol has been defined between the terminal and the PAD, called X.28; another standard protocol exists between hte PAD and the network, called X.29. Together, these three recommendations are often called "triple X". 54. What is SAP? Series of interface points that allow other computers to communicate with the other layers of network protocol stack. 55. What is subnet?

AAA-BRIGHT ACADEMY - 9872474753

51

A generic term for section of a large networks usually separated by a bridge or router. 56. What is subnet mask? It is a term that makes distinguish between network address and host address in IP address. Subnet mask value 0 defines host partition in IP address and value 1 – 255 defines Network address. 57. What is backbone network? A backbone network is a centralized infrastructure that is designed to distribute different routes and data to various networks. It also handles management of bandwidth and various channels. 58. What is anonymous FTP? Anonymous FTP is a way of granting user access to files in public servers. Users that are allowed access to data in these servers do not need to identify themselves, but instead log in as an anonymous guest. 59. What is subnet mask? A subnet mask is combined with an IP address in order to identify two parts: the extended network address and the host address. Like an IP address, a subnet mask is made up of 32 bits. 60. What is the maximum length allowed for a UTP cable? A single segment of UTP cable has an allowable length of 90 to 100 meters. This limitation can be overcome by using repeaters and switches. 61. What is data encapsulation? Data encapsulation is the process of breaking down information into smaller manageable chunks before it is transmitted across the network. It is also in this process that the source and destination addresses are attached into the headers, along with parity checks. 62. Describe Network Topology Network Topology refers to the layout of a computer network. It shows how devices and cables are physically laid out, as well as how they connect to one another. 63. What is VPN? VPN means Virtual Private Network, a technology that allows a secure tunnel to be created across a network such as the Internet. For example, VPNs allow you to establish a secure dial-up connection to a remote server. 64. Briefly describe NAT. NAT is Network Address Translation. This is a protocol that provides a way for multiple computers on a common network to share single connection to the Internet. 65. How does a network topology affect your decision in setting up a network? Network topology dictates what media you must use to interconnect devices. It also serves as basis on what materials, connector and terminations that is applicable for the setup. 66. What is RIP? RIP, short for Routing Information Protocol is used by routers to send data from one network to another. It efficiently manages routing data by broadcasting its routing table to all other routers within the network. It determines the network distance in units of hops. 67. What are different ways of securing a computer network? There are several ways to do this. Install reliable and updated anti-virus program on all computers. Make sure firewalls are setup and configured properly. User authentication will also help a lot. All of these combined would make a highly secured network. 68. What is NIC? NIC is short for Network Interface Card. This is a peripheral card that is attached to a PC in order to connect to a network. Every NIC has its own MAC address that identifies the PC on the network. 69. What is the importance of the OSI Physical Layer? The physical layer does the conversion from data bits to electrical signal, and vice versa. This is where network devices and cable types are considered and setup. 70. How many layers are there under TCP/IP?

AAA-BRIGHT ACADEMY - 9872474753

52

There are four layers: the Network Layer, Internet Layer, Transport Layer and Application Layer. 1. How many numbers of addresses are usable for addressing in a Class C network? a. 256 b. 255 c. 254 d. 258 Answer: c. 254 The number of addresses usable for addressing specific hosts in each network is always 2 power N - 2 (where N is the number of rest field bits, and the subtraction of 2 adjusts for the use of the all-bits-zero host portion for network address and the all-bits-one host portion as a broadcast address. Thus, for a Class C address with 8 bits available in the host field, the number of hosts is 254 Class A 0.0.0.0 - 127.255.255.255 Class B 128.0.0.0 - 191.255.255.255 Class C 192.0.0.0 - 223.255.255.255 Class D 224.0.0.0 - 239.255.255.255 Class E 240.0.0.0 - 247.255.255.255 2. How are the data units at Application layer is called? a. Message b. Datagram c. User Datagram d. Signals Answer:a.Message The data unit created at the application layer is called a message, at the transport layer the data unit created is called either a segment or an user datagram, at the network layer the data unit created is called the datagram, at the data link layer the datagram is encapsulated in to a frame and finally transmitted as signals along the transmission media 3. What protocol is used by DNS name servers? Justify. a. TCP b. SNMP c. UDP d. It can use any routing protocol Answer:c. UDP DNS uses UDP for communication between servers. It is a better choice than TCP because of the improved speed a connectionless protocol offers. Of course, transmission reliability suffers with UDP 4. Which of the following is used to direct a packet inside an internal networks? a. Routers b. Modem c. Gateway d None of the above Answer: a.Routers Routers are machines that direct a packet through the maze of networks that stand between its source and destination. Normally a router is used for internal networks while a gateway acts a door for the packet to reach the „outside‟ of the internal network

ELECTRICAL INTERVIEW QUESTIONS FROM AC & DC MOTOR PRINCIPLE AND WORKING what is the principle of motor?

AAA-BRIGHT ACADEMY - 9872474753

53

Whenever a current carrying conductor is placed in an magnetic field it produce turning or twisting movement is called as torque. Types of dc generator? DC Generators are classified into two types 1)separatly excited DC generator 2)self excited DC generator, which is further classified into; 1)series 2)shunt and 3)compound(which is further classified into cumulative and differential). Which motor has high Starting Torque and Staring current DC motor, Induction motor or Synchronous motor? DC Series motor has high starting torque. We can not start the Induction motor and Synchronous motors on load, but can not start the DC series motor without load. Define stepper motor. What is the use of stepper motor? The motor which work or act on the applied input pulse in it, is called as stepper motor. This stepper motor is under the category of synchronous motor, which often does not fully depend of complete cycle. It likes to works in either direction related to steps. for this purpose it mainly used in automation parts. What is 2 phase motor? A two phase motor is a motor with the the starting winding and the running winding have a phase split. e.g;ac servo motor.where the auxiliary winding and the control winding have a phase split of 90 degree. Which type of A.C motor is used in the fan (ceiling fan, exhaust fan, padestal fan, bracket fan etc) which are find in the houses ? Its Single Phase induction motor which mostly squirrel cage rotor and are capacitor start capacitor run. Give two basic speed control scheme of DC shunt motor? 1. By using flux control method:in this method a rheostat is connected across the field winding to control the field current.so by changing the current the flux produced by the field winding can be changed, and since speed is inversely proportional to flux speed can be controlled 2.armature control method:in this method a rheostat is connected across armature winding by varying the resistance the value of resistive drop(IaRa) can be varied, and since speed is directly proportional to Eb-IaRathe speed can be controlled. Difference between a four point starter and three point starter? The shunt connection in four point starter is provided separately form the line where as in three point starter it is connected with line which is the drawback in three point starter. What is the difference between synchronous generator & asynchronous generator? In simple, synchronous generator supply's both active and reactive power but asynchronous generator(induction generator) supply's only active power and observe reactive power for magnetizing. This type of generators are used in windmills. Why syn. generators are used for the production of electricity? Synchronous machines have capability to work on different power factor (or say different imaginary power varying the field EMF. Hence syn. generators r used for the production of electricity. Why is the starting current high in a DC motor? In DC motors, Voltage equation is V=Eb-IaRa (V = Terminal voltage, Eb = Back emf in Motor, Ia = Armature current,Ra = Aramture resistance). At starting, Eb is zero. Therefore, V=IaRa, Ia = V/Ra ,where Ra is very less like 0.01ohm.i.e, Ia will become enormously increased. What are the advantages of star-delta starter with induction motor? The main advantage of using the star delta starter is reduction of current during the starting of the motor. Starting current is reduced to 3-4 times Of current of Direct online starting.(2). Hence the starting current is reduced , the voltage drops during the starting of motor in systems are reduced.

AAA-BRIGHT ACADEMY - 9872474753

54

Why series motor cannot be started on no-load? Series motor cannot be started without load because of high starting torque. Series motor are used in Trains, Crane etc. Mention the methods for starting an induction motor? The different methods of starting an induction motor DOL:direct online starter Star delta starter Auto transformer starter Resistance starter Series reactor starter What are Motor Generator Sets and explain the different ways the motor generator set can be used ? Motor Generator Sets are a combination of an electrical generator and an engine mounted together to form a single piece of equipment. Motor generator set is also referred to as a genset, or more commonly, a generator The motor generator set can used in the following different ways: 1.Alternating current (AC) to direct current (DC) 2.DC to AC 3.DC at one voltage to DC at another voltage 4.AC at one frequency to AC at another harmonically-related frequency Which type of motor is used in trains, what is the rating of supply used explain Working principal? Dc series is in the trains to get high starting torque while starting of the trains and operating voltage is 1500v dc. What are the Application of DC Motors in Thermal Power Plant? In thermal power plants dc motors are employed for certain control and critical emergency operations which are supplied by dedicated batteries. DC motors operate as backup drives for normal ac drive systems when ac power supply to the plant is lost. In thermal power plant, the dc motors finds applications for performing control functions such as Turbine governor motor Governor limit setting Motor operated rheostats Emergency lubrication for the turbines (main, boiler feed pumps) Generator (H2 oil seal). DC motor operated valves DC motors employed in thermal plants are classified in to two types based on the type of application. DC motors carrying out Control function Dc motors carrying out Emergency function Control functions:This category consists of the turbine governor motor, governor limiting setting, motor operated rheostats, etc. These motors are small, about 1/8 hp or less. They are operated quite infrequently for short duration. Emergency functions:This category consists of turbine-generator emergency (lubrication) bearing oil pumps and emergency seal oil pumps. Such pumps may also be provided for steam turbine drives of feedwater pumps, fans, and other large loads. The lack of lubrication during a shutdown without ac power will ruin the linings of the bearings and damage the shaft. Hydrogen seal oil pump is provided to prevent the escaping of hydrogen (for large turbine-generators hydrogen cooling is provided for efficient cooling) from the casing by providing a tight seal with high pressure oil What are the Advantages & Disadvantages of Synchronous motors?

AAA-BRIGHT ACADEMY - 9872474753

55

Advantage or Merits: One of the major advantage of using synchronous motor is the ability to control the power factor. An over excited synchronous motor can have leading power factor and can be operated in parallel to induction motors and other lagging power factor loads thereby improving the system power factor. In synchronous motor the speed remains constant irrespective of the loads. This characteristics helps in industrial drives where constant speed is required irrespective of the load it is driving. It also useful when the motor is required to drive another alternator to supply at a different frequency as in frequency changes. Synchronous motors can be constructed with wider air gaps than induction motors which makes these motors mechanically more stable. In synchronous motors electro-magnetic power varies linearly with the voltage. Synchronous motors usually operate with higher efficiencies ( more than 90%) especially in low speed and unity power factor applications compared to induction motors Disadvantages or Demerits: Synchronous motors requires dc excitation which must be supplied from external sources. Synchronous motors are inherently not self starting motors and needs some arrangement for its starting and synchronizing. The cost per kW output is generally higher than that of induction motors. These motors cannot be used for variable speed applications as there is no possibility of speed adjustment unless the incoming supply frequency is adjusted (Variable Frequency Drives). Synchronous motors cannot be started on load. Its starting torque is zero. These motors have tendency to hunt. When loading on the synchronous motor increases beyond its capability, the synchronism between rotor and stator rotating magnetic field is lost and motor comes to halt. Collector rings and brushes are required resulting in increase in maintenance. Synchronous motors cannot be useful for applications requiring frequent starting or high starting torques required. Electrical questions from semoconductor, power diodes, transistor, thristor, MOSFET and IGBTS, bridge coverter etc.... What are the different operation regions of the SCR? SCR or thyristor will have three regions of operations based on the mode in which the device is connected in the circuit. Reverse blocking region: When the cathode of the thyristor is made positive with respect to the anode and no gate signal is applied. In this region scr exhibits the reverse blocking characteristics similar to diode. Forward blocking region: In this region the anode of the thyristor is made positive with respect to the cathode and no gate signal is applied to the thyristor. A small leakage current flow in this mode of operation of the thyristor Forward conduction region: when the forward voltage applied between the anode and cathode increases at particular break over voltage avalanche breakdown takes place and thyristor starts conducting current in forward direction. By this type of triggering the device damages the scr. Hence a gate signal is applied before the forward break over voltage to trigger the scr.

What is Latching current? Gate signal is to be applied to the thyristor to trigger the thyristor ON in safe mode. When the thyristor starts conducting the forward current above the minimum value, called Latching current, the gate signal which is applied to trigger the device in no longer require to keep the scr in ON position.

AAA-BRIGHT ACADEMY - 9872474753

56

What is Holding current ? When scr is conducting current in forward conduction state, scr will return to forward blocking state when the anode current or forward current falls below a low level called Holding current Note: Latching current and Holding current are not same. Latching current is associated with the turn on process of the scr whereas holding current is associated with the turn off process. In general holding current will be slightly lesser than the latching current. Why thyristor is considered as Charge controlled device? During the triggering process of the thyristor from forward blocking state to forward conduction state through the gate signal, by applying the gate signal (voltage between gate and cathode) increases the minority carrier density in the p-layer and thereby facilitate the reverse break over of the junction J2 and thyristor starts conducting. Higher the magnitude of the gate current pulse, lesser is the time required to inject the charge and turning on the scr. By controlling the amount of charge we can control the turning on time of the scr. What is the relation between the gate signal and forward break over voltage (VBO)? Thyristor can be triggered by increasing the forward voltage between anode and cathode, at forward break over voltage thyristor starts conducting. However this process may damage the thyristor, so thyristor is advices to trigger on through the gate pulse. When a gate signal is applied thyristor turns on before reaching the break over voltage. Forward voltage at which the thyristor triggers on depends on the magnitude of the gate current. Higher is the gate current lower is the forward break over voltage What are the different losses that occur in thyristor while operating? Different losses that occur are Forward conduction losses during conduction of the thyristor Loss due to leakage current during forward and reverse blocking. Power loss at gate or Gate triggering loss. Switching losses at turn-on and turn-off. What are the advantages of speed control using thyristor? Advantages : 1. Fast Switching Characteristics than MOSFET, BJT, IGBT 2. Low cost 3. Higher Accurate. What happens if i connect a capacitor to a generator load? Connecting a capacitor across a generator always improves powerfactor, but it will help depends up on the engine capacity of the alternator, other wise the alternator will be over loaded due to the extra watts consumed due to the improvement on pf. Secondly, don't connect a capacitor across an alternator while it is picking up or without any other load. Why the capacitors works on ac only? Generally capacitor gives infinite resistance to dc components (i.e., block the dc components). it allows the ac components to pass through.

Explain the working principal of the circuit breaker? Circuit Breaker is one which makes or breaks the circuit. It has two contacts namely fixed contact & moving contact under normal condition the moving contact comes in contact with fixed contact thereby forming the closed contact for the flow of current. During abnormal & faulty conditions (when current exceeds the rated value) an arc is produced between the fixed

AAA-BRIGHT ACADEMY - 9872474753

57

& moving contacts & thereby it forms the open circuit Arc is extinguished by the Arc Quenching media like air, oil, vacuum etc. What is the difference between Isolator and Circuit Breaker? Isolator is a off load device which is used for isolating the downstream circuits from upstream circuits for the reason of any maintenance on downstream circuits. it is manually operated and does not contain any solenoid unlike circuit breaker. it should not be operated while it is having load. first the load on it must be made zero and then it can safely operated. its specification only rated current is given. But circuit breaker is onload automatic device used for breaking the circuit in case of abnormal conditions like short circuit, overload etc., it is having three specification 1 is rated current and 2 is short circuit breaking capacity and 3 is instantaneous tripping current. What is the difference between earth resistance and earth electrode resistance? Only one of the terminals is evident in the earth resistance. In order to find the second terminal we should recourse to its definition: Earth Resistance is the resistance existing between the electrically accessible part of a buried electrode and another point of the earth, which is far away. The resistance of the electrode has the following components: (A) the resistance of the metal and that of the connection to it. (B) the contact resistance of the surrounding earth to the electrode. What is use of lockout relay in ht voltage? A lock-out relay is generally placed in line before or after the e-stop switch so the power can be shut off at one central location. This relay is powered by the same electrical source as the control power and is operated by a key lock switch. The relay itself may have up to 24 contact points within the unit itself. This allows the control power for multiple machines to be locked out by the turn of a single key switch. What is the power factor of an alternator at no load? At no load Synchronous Impedance of the alternator is responsible for creating angle difference. So it should be zero lagging like inductor. How to determine capacitor tolerance codes? In electronic circuits, the capacitor tolerance can be determined by a code that appears on the casing. The code is a letter that often follows a three-digit number (such as 130Z).The first two are the 1st and 2nd significant digits and the third is a multiplier code. Most of the time the last digit tells you how many zeros to write after the first two digits and these are read as Pico-Farads. Why most of analog o/p devices having o/p range 4 to 20 mA and not 0 to 20 mA? 4-20 mA is a standard range used to indicate measured values for any process. The reason that 4ma is chosen instead of 0 mA is for fail safe operation .For example- a pressure instrument gives output 4mA to indicate 0 psi, up to 20 mA to indicate 100 psi, or full scale. Due to any problem in instrument (i.e) broken wire, its output reduces to 0 mA. So if range is 0-20 mA then we can differentiate whether it is due to broken wire or due to 0 psi. Two bulbs of 100w and 40w respectively connected in series across a 230v supply which bulb will glow bright and why? Since two bulbs are in series they will get equal amount of electrical current but as the supply voltage is constant across the bulb(P=V^2/R).So the resistance of 40W bulb is greater and voltage across 40W is more (V=IR) so 40W bulb will glow brighter. What is meant by knee point voltage? Knee point voltage is calculated for electrical Current transformers and is very important factor to choose a CT. It is the voltage at which a CT gets saturated.(CT-current transformer).

AAA-BRIGHT ACADEMY - 9872474753

58

What is reverse power relay? Reverse Power flow relay are used in generating station's protection. A generating stations is supposed to fed power to the grid and in case generating units are off,there is no generation in the plant then plant may take power from grid. To stop the flow of power from grid to generator we use reverse power relay. What are the advantage of free wheeling diode in a Full Wave rectifier? It reduces the harmonics and it also reduces sparking and arching across the mechanical switch so that it reduces the voltage spike seen in a inductive load what is the full form of KVAR? We know there are three types of power in Electrical as Active, apparent & reactive. So KVAR is stand for ``Kilo Volt Amps with Reactive component. 1. What is a System? When a number of elements or components are connected in a sequence to perform a specific function, the group of elements that all constitute a System 2. What is Control System? In a System the output and inputs are interrelated in such a manner that the output quantity or variable is controlled by input quantity, then such a system is called Control System. The output quantity is called controlled variable or response and the input quantity is called command signal or excitation. 3. What are different types of Control Systems? Two major types of Control Systems are 1) Open loop Control System 2) Closed Loop Control Systems Open loop Control Systems:The Open loop Control System is one in which the Output Quantity has no effect on the Input Quantity. No feedback is present from the output quantity to the input quantity for correction. Closed Loop Control System:The Closed loop Control System is one in which the feedback is provided from the Output quantity to the input quantity for the correction so as to maintain the desired output of the system. 4. What is a feedback in Control System? The Feedback in Control System in one in which the output is sampled and proportional signal is fed back to the input for automatic correction of the error ( any change in desired output) for futher processing to get back the desired output. 5. Why Negative Feedback is preffered in the Control System? The role of Feedback in control system is to take the sampled output back to the input and compare output signal with input signal for error ( deviation from the desired result). Negative Feedback results in the better stability of the system and rejects any disturbance signals and is less sensitive to the parameter variations. Hence in control systems negative feedback is considered. 6. What is the effect of positive feedback on stability of the system? Positive feedback is not used generally in the control system because it increases the error signal and drives the system to instability. But positive feedbacks are used in minor loop control systems to amplify certain internal signals and parameters 7. What is Latching current? Gate signal is to be applied to the thyristor to trigger the thyristor ON in safe mode. When the thyristor starts conducting the forward current above the minimum value, called Latching current, the gate signal which is applied to trigger the device in no longer require to keep the scr in ON position. 8. What is Holding current ? When scr is conducting current in forward conduction state, scr will return to forward blocking state when the anode current or forward current falls below a low level called Holding current Note: Latching current and Holding current are not same. Latching current is associated with the turn on process of the scr

AAA-BRIGHT ACADEMY - 9872474753

59

whereas holding current is associated with the turn off process. In general holding current will be slightly lesser than the latching current. 9. Why thyristor is considered as Charge controlled device? During the triggering process of the thyristor from forward blocking state to forward conduction state through the gate signal, by applying the gate signal (voltage between gate and cathode) increases the minority carrier density in the p-layer and thereby facilitate the reverse break over of the junction J2 and thyristor starts conducting. Higher the magnitude of the gate current pulse, lesser is the time required to inject the charge and turning on the scr. By controlling the amount of charge we can control the turning on time of the scr. 10. What are the different losses that occur in thyristor while operating? Different losses that occur are a)Forward conduction losses during conduction of the thyristor b)Loss due to leakage current during forward and reverse blocking. c)Power loss at gate or Gate triggering loss. d)Switching losses at turn-on and turn-off. 11. What is meant by knee point voltage? Knee point voltage is calculated for electrical Current transformers and is very important factor to choose a CT. It is the voltage at which a CT gets saturated.(CT-current transformer). 12. What is reverse power relay? Reverse Power flow relay are used in generating stations's protection. A generating stations is supposed to fed power to the grid and in case generating units are off,there is no generation in the plant then plant may take power from grid. To stop the flow of power from grid to generator we use reverse power relay. 13. What will happen if DC supply is given on the primary of a transformer? Mainly transformer has high inductance and low resistance.In case of DC supply there is no inductance ,only resistance will act in the electrical circuit. So high electrical current will flow through primary side of the transformer.So for this reason coil and insulation will burn out. 14. What is the difference between isolators and electrical circuit breakers? What is bus-bar? Isolators are mainly for switching purpose under normal conditions but they cannot operate in fault conditions .Actually they used for isolating the CBs for maintenance. Whereas CB gets activated under fault conditions according to the fault detected.Bus bar is nothing but a junction where the power is getting distributed for independent loads. 15. What are the advantage of free wheeling diode in a Full Wave rectifier? It reduces the harmonics and it also reduces sparking and arching across the mechanical switch so that it reduces the voltage spike seen in a inductive load. 16. Mention the methods for starting an induction motor? The different methods of starting an induction motor: a)DOL:direct online starter b)Star delta starter c)Auto transformer starter d)Resistance starter e)Series reactor starter 17. What is the power factor of an alternator at no load?

AAA-BRIGHT ACADEMY - 9872474753

60

At no load Synchronous Impedance of the alternator is responsible for creating angle difference. So it should be zero lagging like inductor. 18. What is the function of anti-pumping in circuit breaker? When breaker is close at one time by close push button,the anti pumping contactor prevent re close the breaker by close push button after if it already close. 19. What is stepper motor.what is its uses? Stepper motor is the electrical machine which act upon input pulse applied to it. it is one type of synchronous motor which runs in steps in either direction instead of running in complete cycle.so, in automation parts it is used. 20. There are a Transformer and an induction machine. Those two have the same supply. For which device the load current will be maximum? And why? The motor has max load current compare to that of transformer because the motor consumes real power.. and the transformer is only producing the working flux and its not consuming.. hence the load current in the transformer is because of core loss so it is minimum. 21. What is SF6 Circuit Breaker? SF6 is Sulpher hexa Flouride gas.. if this gas is used as arc quenching medium in a Circuitbreaker means SF6 CB. 22. What is ferrantic effect? Output voltage is greater than the input voltage or receiving end voltage is greater than the sending end voltage. 23. What is meant by insulation voltage in cables? explain it? It is the property of a cable by virtue of it can withstand the applied voltage without rupturing it is known as insulation level of the cable. 24. What is the difference between MCB & MCCB, Where it can be used? MCB is miniature circuit breaker which is thermal operated and use for short circuit protection in small current rating circuit. MCCB moulded case circuit breaker and is thermal operated for over load current and magnetic operation for instant trip in short circuit condition.under voltage and under frequency may be inbuilt. Normally it is used where normal current is more than 100A. 25. Where should the lighting arrestor be placed in distribution lines? Near distribution transformers and out going feeders of 11kv and incomming feeder of 33kv and near power transformers in sub-stations. 26. Define IDMT relay? It is an inverse definite minimum time relay.In IDMT relay its operating is inversely proportional and also a characteristic of minimum time after which this relay operates.It is inverse in the sense ,the tripping time will decrease as the magnitude of fault current increase. 27. What are the transformer losses? TRANSFORMER LOSSES - Transformer losses have two sources-copper loss and magnetic loss. Copper losses are caused by the resistance of the wire (I2R). Magnetic losses are caused by eddy currents and hysteresis in the core. Copper loss is a constant after the coil has been wound and therefore a measurable loss. Hysteresis loss is constant for a particular voltage and current. Eddy-current loss, however, is different for each frequency passed through the transformer. 28. what is the full form of KVAR? We know there are three types of power in Electricals as Active, apparent & reactive. So KVAR is stand for ``Kilo Volt Amps with Reactive component. 29. Two bulbs of 100w and 40w respectively connected in series across a 230v supply which bulb will glow bright and why?

AAA-BRIGHT ACADEMY - 9872474753

61

Since two bulbs are in series they will get equal amount of electrical current but as the supply voltage is constant across the bulb(P=V^2/R).So the resistance of 40W bulb is greater and voltage across 40W is more (V=IR) so 40W bulb will glow brighter. 30. Why temperature rise is conducted in bus bars and isolators? Bus bars and isolators are rated for continuous power flow, that means they carry heavy currents which rises their temperature. so it is necessary to test this devices for temperature rise. 31. What is the difference between synchronous generator & asynchronous generator? In simple, synchronous generator supply's both active and reactive power but asynchronous generator(induction generator) supply's only active power and observe reactive power for magnetizing.This type of generators are used in windmills. 32. What is Automatic Voltage regulator(AVR)? AVR is an abbreviation for Automatic Voltage Regulator.It is important part in Synchronous Generators, it controls theoutput voltage of the generator by controlling its excitation current. Thus it can control the output Reactive Power of the Generator. 33. Difference between a four point starter and three point starter? The shunt connection in four point stater is provided separately form the line where as in three point stater it is connected with line which is the drawback in three point stater 34. Why the capacitors works on ac only? Generally capacitor gives infinite resistance to dc components(i.e., block the dc components). it allows the ac components to pass through. 35. How many types of colling system it transformers? 1. ONAN (oil natural,air natural) 2. ONAF (oil natural,air forced) 3. OFAF (oil forced,air forced) 4. ODWF (oil direct,water forced) 5. OFAN (oil forced,air forced) 36. Operation carried out in Thermal power stations? The water is obtained in the boiler and the coal is burnt so that steam is obtained this steam is allowed to hit the turbine , the turbine which is coupled with the generator generates the electricity. 37. What is 2 phase motor? A two phase motor is a motor with the the starting winding and the running winding have a phase split. e.g;ac servo motor.where the auxiliary winding and the control winding have a phase split of 90 degree. 38. What is the principle of motor? Whenever a current carrying conductor is placed in an magnetic field it produce turning or twisting movement is called as torque. 39. What is meant by armature reaction? The effect of armature flu to main flux is called armature reaction. The armature flux may support main flux or opposes main flux. 40. What is the difference between synchronous generator & asynchronous generator? In simple, synchronous generator supply's both active and reactive power but asynchronous generator(induction generator) supply's only active power and observe reactive power for magnetizing.This type of generators are used in windmills. 41. Whats is MARX CIRCUIT?

AAA-BRIGHT ACADEMY - 9872474753

62

It is used with generators for charging a number of capacitor in parallel and discharging them in series.It is used when voltage required for testing is higher than the available. 42. What are the advantages of speed control using thyristor? Advantages : 1. Fast Switching Characterstics than Mosfet, BJT, IGBT 2. Low cost 3. Higher Accurate. 43. What is ACSR cable and where we use it? ACSR means Aluminium conductor steel reinforced, this conductor is used in transmission & distribution. 44. Whats the one main difference between UPS & inverter ? And electrical engineering & electronics engineering ? Uninterrupt power supply is mainly use for short time . means according to ups VA it gives backup. ups is also two types : on line and offline . online ups having high volt and amp for long time backup with with high dc voltage.but ups start with 12v dc with 7 amp. but inverter is startwith 12v,24,dc to 36v dc and 120amp to 180amp battery with long time backup. 45. What will happen when power factor is leading in distribution of power? If their is high power factor, i.e if the power factor is close to one: a)Losses in form of heat will be reduced, b)Cable becomes less bulky and easy to carry, and very cheap to afford, & c)It also reduces over heating of tranformers. 46. What are the advantages of star-delta starter with induction motor? (1). The main advantage of using the star delta starter is reduction of current during the starting of the motor.Starting current is reduced to 3-4 times Of current of Direct online starting.(2). Hence the starting current is reduced , the voltage drops during the starting of motor in systems are reduced. 47. Why Delta Star Transformers are used for Lighting Loads? For lighting loads, neutral conductor is must and hence the secondary must be star winding. and this lighting load is always unbalanced in all three phases. To minimize the current unbalance in the primary we use delta winding in the primary. So delta / star transformer is used for lighting loads. 48. Why computer humming sound occurred in HT transmission line? This computer humming sound is coming due to ionization (breakdown of air into charged particles) of air around transmission conductor. This effect is called as Corona effect, and it is considered as power loss. 49. What is rated speed? At the time of motor taking normal current (rated current)the speed of the motor is called rated speed. It is a speed at which any system take small current and give maximum efficiency. 50. If one lamp connects between two phases it will glow or not? If the voltage between the two phase is equal to the lamp voltage then the lamp will glow. When the voltage difference is big it will damage the lamp and when the difference is smaller the lamp will glow depending on the type of lamp.

MECHANIC ENGINEER 1. Explain the second law of thermodynamics.

AAA-BRIGHT ACADEMY - 9872474753

63

The entropy of the universe increases over time and moves towards a maximum value. 2. What kinds of pipes are used for steam lines? Normally galvanized pipes are not used for steam. Mild steel with screwed or welded fittings are the norm. Pressure and temperature are very important factors to be considered in what type of materials to be used. Steam even at low pressures can be extremely dangerous. 3. What is the difference between shear center flexural center of twist and elastic center? The shear center is the centroid of a cross-section. The flexural center is the center of twist, which is the point on a beam that you can add a load without torsion. The elastic center is located at the center of gravity. If the object is homogeneous and symmetrical in both directions of the cross-section then they are all equivalent. 4. What is ferrite? Magnetic iron rock 5. What is the difference between projectile motion and a rocket motion? A projectile has no motor/rocket on it, so all of its momentum is given to it as it is launched. An example of a projectile would be pen that you throw across a room. A rocket or missile does have a motor/rocket on it so it can accelerate itself while moving and so resist other forces such as gravity. 6. What is a cotter joint? These types of joints are used to connect two rods, which are under compressive or tensile stress. The ends of the rods are in the manner of a socket and shaft that fit together and the cotter is driven into a slot that is common to both pieces drawing them tightly together. The tensile strength of the steel is proportionate to the strength needed to offset the stress on the material divided by the number of joints employed. 7. What is the alloy of tin and lead? A tin and lead alloy is commonly called solder. Usually solder is a wire with a rosin core used for soldering. The rosin core acts as a flux. 8. What does F.O.F. stand for in piping design? FOF stands for Face of Flange. A flange has either of the two types of faces: a) Raised face b) Flat face The F.O.F is used to know the accurate dimension of the flange in order to avoid the minute errors in measurement in case of vertical or horizontal pipelines. 9. Explain Otto cycle. Otto cycle can be explained by a pressure volume relationship diagram. It shows the functioning cycle of a four stroke engine. The cycle starts with an intake stroke, closing the intake and moving to the compression stroke, starting of combustion, power stroke, heat exchange stroke where heat is rejected and the exhaust stroke. It was designed by Nicolas Otto, a German engineer. 10. What is gear ratio? It is the ratio of the number of revolutions of the pinion gear to one revolution of the idler gear.

11. What is annealing?

AAA-BRIGHT ACADEMY - 9872474753

64

It is a process of heating a material above the re-crystallization temperature and cooling after a specific time interval. This increases the hardness and strength if the material. 12. What is ductile-brittle transition temperature? It is the temperature below which the tendency of a material to fracture increases rather than forming. Below this temperature the material loses its ductility. It is also called Nil Ductility Temperature. 13. What is a uniformly distributed load? A UDL or uniformly distributed load is a load, which is spread over a beam in such a way that each unit length is loaded to the same extent. 14. What are the differences between pneumatics and hydraulics? a) Working fluid: Pneumatics use air, Hydraulics use Oil b) Power: Pneumatic power less than hydraulic power c) Size: P components are smaller than H components d) Leakage: Leaks in hydraulics cause fluid to be sticking around the components. In pneumatics, air is leaked into the atmosphere. e) Pneumatics obtain power from an air compressor while hydraulics require a pump f) Air is compressible, hydraulic oil is not 15. What is enthalpy? Enthalpy is the heat content of a chemical system. 16. What is a positive displacement pump? A positive displacement pump causes a liquid or gas to move by trapping a fixed amount of fluid or gas and then forcing (displacing) that trapped volume into the discharge pipe. Positive displacement pumps can be further classified as either rotary-type (for example the rotary vane) or lobe pumps similar to oil pumps used in car engines. These pumps give a nonpulsating output or displacement unlike the reciprocating pumps. Hence, they are called positive displacement pumps. 17. Why would you use hydraulics rather than pneumatics? Hydraulics is suitable for higher forces & precise motion than pneumatics. This is because hydraulic systems generally run at significantly higher pressures than pneumatics systems. Movements are more precise (repeatable) because hydraulics uses an incompressible liquid to transfer power whilst pneumatics uses gases. Pneumatic systems have some advantages too. They are usually significantly cheaper than hydraulic systems, can move faster (gas much less viscous than oil) and do not leak oil if they develop a leak. 18. What is isometric drawing? It is a 3-D drawing used by draftsmen, architects etc 19. What are the advantages of gear drive? In general, gear drive is useful for power transmission between two shafts, which are near to each other (at most at 1m distance). In addition, it has maximum efficiency while transmitting power. It is durable compare to other such as belts chain drives etc. You can change the power to speed ratio. Advantages: It is used to get various speeds in different load conditions. It increases fuel efficiency. Increases engine efficiency. Need less power input when operated manually.

20. Which conducts heat faster steel copper or brass?

AAA-BRIGHT ACADEMY - 9872474753

65

Copper conducts heat faster than steel or brass. Any material that is good for conducting heat is also good for electricity in most cases. Wood terrible for transferring heat thus is also insulator for electric. 21. How pipe flanges are electrically insulated? Pipe flanges are protected from corrosion by means of electrolysis, with dielectric flanges. The piping system is electrically insulated by what is called a sacrificial anode. A bag of readily corrodible metal is buried in the ground with a wire running from the pipe to the bag so that the sacrificial anode will corrode first. If any electrical current charges the pipe, it also serves as a ground. 22. What is a Process Flow Diagram? A Process Flow Diagram (or System Flow Diagram) shows the relationships between the major components in the system. It also has basic information concerning the material balance for the process. 23. Where pneumatic system is used? Any system needs redundancy in work needs pneumatics, because the compressor of the pneumatic system has periodical operations (intermittent work, not as hydraulic pump). The compressed air could be accumulated in tanks with high pressures and used even if the compressor failed. 24. Why gas containers are mostly cylindrical in shape? The most efficient shape for withstanding high pressure is a sphere but that would be costly to manufacture. A cylinder with a domed top and a domed bottom (look underneath, the flat base is actually welded around the outside, the bottom of the gas container is actually domed) is a much cheaper shape to manufacture whilst still having good strength to resist the internal gas pressure. 25. How is martensite structure formed in steel? Martensite transformation begins when austenite is cooled below a certain critical temperature, called the matrensite start temperature. As we go below the martensite start temperature, more and more martensite forms and complete transformation occurs only at a temperature called martensire finish temperature. Formation of martensite requires that the austenite phase must be cooled rapidly. 26. What is an ortographic drawing? Orthographic projections are views of a 3D object, showing 3 faces of it. The 3 drawings are aligned so that if the page were folded, it would create part of the shape. It is also called multiview projections. The 3 faces of an object consist of its plan view, front view and side view. There are 2 types of orthographic projection, which are 1st angle projection and 3rd angle projection. 27. What is representative elementary volume? Smallest volume over which measurements can be made that will yield a representative of the whole. 28. Why are LNG pipes curved? LNG pipes are curved because LNG is condensed gas (-164 deg cel) so it can expand the pipes that is what engineers designed the LNG pipes are curve type. 29. What does angular momentum mean? Angular momentum is an expression of an objects mass and rotational speed. Momentum is the velocity of an object times it is mass, or how fast something is moving how much it weigh. Therefore, angular momentum is the objects mass times the angular velocity where angular velocity is how fast something is rotating expressed in terms like revolutions per minute or radians per second or degrees per second.

30. Can you use motor oil in a hydraulic system?

AAA-BRIGHT ACADEMY - 9872474753

66

Hydraulic fluid has to pass a different set of standards than motor oil. Motor oil has tackifiers, lower sulfur content, and other ingredients that could prove harmful to the seals and other components in a hydraulic system. If it is an emergency only should you do it. 31. What causes white smoke in two stroke locomotive engines? That is the engine running too lean (lack of fuel). This condition will lead to overheating and failure of the engine. 32. What is the role of nitrogen in welding? Nitrogen is used to prevent porosity in the welding member by preventing oxygen and air from entering the molten metal during the welding process. Other gases are also used for this purpose such as Argon, Helium, Carbon Dioxide, and the gases given off when the flux burns away during SMAW (stick) welding. 33. What does Green field project mean? Green field projects are those projects, which do not create any environmental nuisance (pollution), follows environmental management system and EIA (environment impact assessment). These projects are usually of big magnitude. 34. Is it the stress that, produces strain or strain produces stress? A Force applied to an object will cause a displacement. Strain is effectively a measure of this displacement (change in length divided by original length). Stress is the Force applied divided by the area it is applied. (E.g. pounds per square inch) Therefore, to answer the question, the applied force produces both “Stress and Strain”. “Stress and Strain” are linked together by various material properties such as Poisson's ratio and Young's Modulus. 35. How does iron ore turn into steel? To make Steel, Iron Ore is refined into iron and all the carbon is burned away using very high heat (Bessemer). A percentage of Carbon (and other trace elements) are added back to make steel. 36. What is knurling? Knurling is a machining process normally carried our on a centre lathe. The act of Knurling creates a raised criss-cross pattern on a smooth round bar that could be used as a handle or something that requires extra grip. 37. What is the mechanical advantage of a double pulley? It only takes half the effort to move an object but twice the distance. 38. What is extrued aluminum? Extrusion is the process where a metal or a metal bar is pulled through a mandrel to elongate it and/or give it a final shape. Extruded Aluminum is a common form of making small aluminum wire, bars or beams and many varieties of small nonstructural, decorative pieces. 39. What is a Newtonian fluid? A Newtonian fluid possesses a linear stress strain relationship curve and it passes through the origin. The fluid properties of a Newtonian fluid do not change when any force acts upon it. 40. What are the points in the stress strain curve for steel? Proportional limit, elastic limit or yield point, ultimate stress and stress at failure.

COMMERCE Bank Interviews are conducted by senior officials in their 50s. They‘ve some misconceptions and stereotypes in their mind. For example: Every engineer is supposed to know about induction coils, AC DC motors, equations of line (irrespective of whether he is civil / mechanical /ECE/ IT engineer.) 1. Every IT person is supposed to know about C/C++ (Even if he has mastered in some other area Java, PHP, SQL.)

AAA-BRIGHT ACADEMY - 9872474753

67

2. Every B.Pharm is supposed to know blockbuster drugs for heart, diabetes, cancer, BP, Ulcer; and Business GK related to pharma companies. (Even if he is not running a medical store.) 3. Every Arts graduate is supposed to know a few things about English literature, Shakespeare, Charles dickens, Old man and sea. (Irrespective of whether he is BA with economics or history or political science!) So, it is better if you prepare a few lines on those topics, rather than enter into argument with the panel that “it was not part of our syllabus.” and run into the danger of stress interview. Standard operating procedure 1. Take out your marksheets of all semesters/years. You must prepare atleast 2-3 minutes worth speech content for each subject listed in there. No need for Ph.D, he‘ll interrupt you within 2-3 minute with some question. 2. They usually confine the grad. Questions to theory portion. So again, don‘t waste lot of time finding current affairs related to your field. Except some really big issues like IT: Prism project, NSA etc., Biotech: GM crops. 3. @IT/Computer/Engineers/Pharma: Instead of going through thick college textbooks, go through GATE guidebooks, mugup the important terms/definition overview from relevant chapters. (Not all chapters.) 4. @Those from minority fields such as architect, aviation engg., physiotherapy etc. As such you willnot get a big list of graduation specific question for ―PO‖ interviews. But if you dig pagalguy.com forums‘ previous IIM GDPI threads, you‘ll find good number of questions. Generic (for all) These apply to all, irrespective of your background: 1. Who was the founder of your college / university? 2. Name a few famous personalities associated with your college/univ.? 3. What is/are special things about the city where you college was located? 4. What do you think about ragging? What should be done to prevent it? 5. What is the use of your degree in Banking sector? 6. What was your favorite subject? 7. Why gap between UG/PG? 8. Why gap after graduation? 9. Why gap between graduation and first job? Now let‘s check some graduation specific questions asked in previous interviews. IT / Computer background 1. Why MT? why not Specialist IT officer? 2. You are from an IT background and doing exceptionally well there. Then why do you want to be a PO? 3. How does information systems help businesses? (need to give real examples) 4. Can you name any special software that is used in Banking Sector? (hint: Finacle by Infosys.) 5. IT principle behind Credit Card, Debit Card, ATM Machine, Electronic Fund transfer, Phone Banking, CBS. 6. Suppose there is severe data loss in bank server, how will you fix it? 7. How can social networking sites be used for promoting banking business? 8. How much volts of power supply is there in a computer? 9. Banking correspondence agents (BCA) use special type of computer- is it online or is it offline? 10. Why not a career in IT? 11. What is computer,expert systems and their applications ,electromagnetic waves,radio waves,microwaves,alpha ,beta,gamma waves?

AAA-BRIGHT ACADEMY - 9872474753

68

12. What is Cloud Computing? What is Hardware? what is GUI? 13. Most preferred computer language in business parlance. th

14. Name 4 operating systems, name three 4 gen computer languages. 15. Different types of ports in a computer? 16. Optical fiber, 2G, 3G, Wifi, Bluetooth etc. and their principles. What is broadband and narrowband and difference between them? 17. What is video conferencing? why is skype? BE/B.Tech related 1. When and how did you get the feeling that you are not interested in engineering line? 2. What was your final year project in BE and what role did you play in the team? 3. Now a days in banking interview the ratio of engineer vs simple graduate is 60:40, can you tell me why? 4. M.E./M.Tech is considered evergreen line. Why don‘t you pursue it? 5. If you join banking sector, don‘t you think your 4 yrs of engineering knowledge will go to waste? 6. What is the difference between AC and DC current? Which current in transformer? 7. You had Professional Communication as a subject in your B-tech? What all u studied in that? how was it helpful? 8. Isotopes and Isomers 9. Explain archenemies principle. 10. Why does the temperature increase after snowfall? 11. Engine related: RPM and CC. Biotech

B.Pharm

1. Name of blockbuster drugs for diabetes in India? 1. How will biotech help a bank?

(same question for all remaining major ailments)

2. Biotech is a sunrise industry, why do you want to join bank?

2. Mechanism behind diabetes, heart attack, cancer etc. major diseases.

3. What is the issue regarding hybrid seeds?

3. Name a few machines used in a drug factory.

4. What are Stem cell technology and Cloning? Are they

4. Business GK related to big Pharma companies and

same thing?

their CEOs.

5. What biodiversity?

5. What do you know about medical tourism? Why is

6. Explain cell theory, DNA model?

India considered an attractive option?

7. What is the role of biotech in vaccines?

6. (if time permits) From current affairs: drug pricing policy, Novartis patent issue.

B.Com / Finance 1. What is balance sheet? What is financial report? What is double entry book keeping? are they same things? 2. Define Accountancy. What are its benefits? 3. What is the difference between Credit and investments? 4. What are the assets and liabilities of a bank? 5. What are the risks of a bank? 6. What is manufacturing accounts? 7. Debt equity ratio analysis.Net profit to turnover ratio. Diversified portfolio

AAA-BRIGHT ACADEMY - 9872474753

69

BBA/MBA/ HR/Marketing related 1. You can easily get job in foreign banks and private banks in India. Why do you want to settle in the low paying public sector banks? 2. Difference between marketing and selling? 3. Motivation theory: What is self-actualization needs 4. What is communication, its barriers. Difference between communication nad effective communication? What are communication gaps? 5. Who is more important speaker or listener? 6. What is marketing? What do you know about consumer behavior? 7. What is brand equity? Arts / Literature 1. What have you read in literature? Name of your favorite author/poet and his famous works and why do you like them? 2. What is a Sonnet? What are its types? 3. What else did Shakespeare write besides Sonnets? Have you read any comedies by Shakespeare, did you like them? 4. Have you read any novel by **xyz famous author**? 5. This year, who won the booker prize, noble literature prize? their famous books. Basic question on Accounts. What is the Personal Income Tax rate? What are Direct and Indirect Taxes? Give examples. Why does a Balance Sheet balance? Is loss an asset or a liability? What are LIFO & FIFO? What are they used for? What are Quick Assets? What is Amortisation? What is Depreciation? What are the different methods of Depreciation? Which method is better and why? Do you know what N.P.V. discounting is? What are Derivatives? What are Options and Futures? What is Operating Ratio? Does dividend reduce profits? What is Trial Balance? Why is Trial Balance used? If ledger postings are computerized, do you require a Trial Balance? What is the highest rate of Depreciation under Income Tax and for what items? Does depreciation reduce profit? What is Current Ratio? What is Working Capital? What is the ideal Current Ratio? Why? What is Negative Working Capital and explain its implications? What is Discretionary Expense? What is Capital and Revenue Expenditure?

AAA-BRIGHT ACADEMY - 9872474753

70

When can Revenue Expenditure be capitalized? Is there any ratio of the expense incurred and cost of asset to capitalize the expense? What are the advantages of Capitalization? If you are an investor, what will you look for before you invest in a company? What would happen if a company pays a lower dividend? Can you draw up a Balance Sheet? What is Fiscal Deficit? What is Budget Deficit? What is Mean / Median? Where does Goodwill appear in a Balance Sheet? Why? Explain Going Concern concept. Explain various costs in cost sheet. What is Contra-entry? What is Country of Origin? Can the captain of the vessel dump the goods in the middle of the sea? What is Sight Draft? What is Capital Account Convertibility? What is Corporate Tax? Is it a direct or indirect tax? What is the elasticity of demand and supply in corporate taxation? What are the differences between companies falling under small and medium sector? What is the difference between Excise Duty and Customs Duty? Can depreciation be on fixed assets only? As depreciation is to fixed assets, what is the same analogous to debtors? How much depreciation would you charge on a building - 5% or 10%? Why? Why is it that one has 30% depreciation on computers and less on buildings? What is Single Entry? Why is it considered inferior to Double Entry? What is Bank Reconciliation Statement?

CIVIL ENGINEERING INTERVIEW 1. What are the causes of building collapse? The PAssage of time is one reason. Buildings also collapse due to weak foundations. Earthquakes, hurricanes and other natural disasters can also damage the structure of the buildings and cause it to collapse. Bombings or demolition of buildings is also other reasons. 2. What are the applications of modulus of elasticity? As the term implies, "Modulus of Elasticity” relates to the elasticity or "flexibility" of a material. The value of modulus of elasticity is very much significant relating to deflection of certain materials used in the construction industry. Take for example the general E value of mild carbon steel is about 200 GPA comPAred to about 70 GPA for aluminum. This simply translate that aluminum is 3 times flexible than steel.

3. How do you measure concrete? Cubic feet, Cubic yards, Cubic Meter 4. Which is stronger solid steel rod or hollow steel pipe?

AAA-BRIGHT ACADEMY - 9872474753

71

On a per pound basis, steel pipe is stronger in bending and is less likely to buckle in axial compression. 5. What is aggregate? Aggregate is the component of a composite material used to resist compressive stress. 6. How do you calculate the power of a centrifugal pump? The input power, that is, the power required to operate the pump should be stated in Hp (horsepower) on the pump's nameplate. It can also be calculated by the 3-phase power equation: P(in Hp) = VI(1.7c) = Rated Voltage x Rated Current x 1.73/ %Efficiency If this is a consumer grade pump that operates on 120Vac, then the equation becomes P = VI, simply multiply the operating voltage, 120 x current (which is the number followed by the letter "A".The output power, which really is not technically power, but rated in Gpm (gallons per minute), or caPAcity should also be on the nameplate. If you have the make, model, and (not necessarily needed) the serial number (also on the nameplate) you could call the manufacturer's customer service dept. As an application engineer, I have contacted countless manufacturers‟, and service dept's for assistance. It is now big deal to them, they will be happy to answer your questions. 7. What is rigging? In sailing, the ropes used to move the sails around so the boat will move in the right direction when the wind blows. 8. What is absolute pressure? Absolute pressure is simply the addition of the observed gage pressure plus the value of the local atmospheric pressure. 9. How do we calculate absolute pressure? Absolute is equal to gauge pressure plus atmospheric. 10. What is Gravity flow? Gravity flow is fluid flowing due to the forces of gravity alone and not to an applied pressure head. In the Bernoulli equation, the pressure term is omitted, and the height and velocity terms are the only ones included. 11. What do you mean by honeycomb in concrete? Some people call it an air pocket in the concrete or a void. It is the exposed course aggregates on surface of concrete without covered by mortar or surrounding the aggregate particles. 12. What is the purpose of the gap in the road on this bridge? Purpose of the gap in the road is to allow the road to exPAnd and contract with temperature changes without causing damage or deformation to the road. 13. What is a projection line? Projection line is the way, in which the earth is shown on a flat piece of Paper. 14. What are moment of inertia and its importance in civil engineering? The moment of inertia measures the opposition any kind of body will have against a certain momentum (along that same axis) trying to rotate that body. 15. What is the absolute pressure scale? Absolute pressure is calculated from a vacuum (0 PSI) and atmospheric pressure is14.7PSIa or 14.7 PSI above a vacuum 1PSI on a tire pressure gauge is called 1PSIg = 15.7PSIa 10PSIg=24.7PSIa 100PSIg=114.7PSIa etc. 16. What is diversion tunnel in a dam? When a dam is to be built, a diversion tunnel is usually bored through solid rock next to the dam site to byPAss the dam construction site. The dam is built while the river flows through the diversion tunnel. 17. How do you maintain water pressure? If you have water pressure and wish to maintain it, do not cause flow in the line, which will reduce pressure due to friction. To keep pressure up, reduce friction by increasing the line size or eliminating some other restriction.

AAA-BRIGHT ACADEMY - 9872474753

72

18. What are some structures that may be subjected to fatigue? Bridges, hydraulic presses, burners trains 19. Why does the pressure increase under soil? Soil pressure increases with depth due to the overburden or self-weight of the soil and due to loads imposed upon the soil. For example, the pressure variation below the depth of soil is linear and the relation is given by pressure = unit wt * depth. As depth increases, there will be a linear increase in the soil pressure. 20. What is the distance between railway tracks? 4 feet, 8 1/2 inches. 1. What happens to Load at yielding ? 2. What is Critical Path in Ms-Project ? 3. where will be the reinforcement of slab placed when there is an inverted beam and the bottom of the beam and slab are at same level ? 4. What is Passive earth pressure ? 5. Which condition will prevail for the design of a swimming pool ? when th e pool is empty or when it is filled ? 6. What will be the effect of over reinforcement ? 7. What is Planning ? 8. What is the comprevsive strength of Brick ? 9. What is the water absorption of first class brick ? 10. Why we provide steel in Concrete ? 11. Define Shear Force and in a structure subjected to gravity loads where will be the shear force ? 12. Which are the Steel tests ? 13. Which are the concrete Tests? 14. Initial & final setting time of concrete? 15. Brick strength is more or concrete block? 16. Why in Pakistan Bricks are used so much? 17. In a cantilever …where will the steel be provided and why? 18. What is Plinth Level and Sill Level? 19. How many bricks are there in 100cft? 20. 28 days compressive strength of concrete in PSI? 21. What is slump Test? 22. How can u check the diameter of steel after the construction? 23. What is specific gravity? 24. How cracks in concrete can be avoided? 25. Types Of DPC and its Thickness used? 26. 28 Days Strength of Concrete (1:2:4)? 27. Strength of brick? 28. what is Brest Wall? 29. what is Brick crushing strength(PSI)? 30. what is Bearing Capacity,How to determine it? 31. How much is the curing time period? 32. How many types of slabs are there & how to design it? 33. How many are the types of joints?

AAA-BRIGHT ACADEMY - 9872474753

73

34. Why joints are provided? 35. How many bricks are there in 100cft? 36. Types Of DPC and its Thickness used? 37. How many bricks are there in 100 cft? 38. Which are the Steel tests ? 39. How much is the cover for slab? 40. What is Packing Factor ? 41. Forces in a Shear Wall are in plane or out of plane ? 42. What is fineness modulus ? and its sieve # ? 43. What is Base Shear ? 44. What is Time period of a building and its relation with frequency ? 45. There are two buildings one taller and one shorter whose time period will be grater and similarly the frequency ? 46. Workability ? 47.Sulphate Resisting Cement ? 48. Special thing in designing a overhead reservoir ? which is different from an ordinary design 49. Maximum %age of Steel in columns and beams ? 50.Types of foundation? How do you measure concrete? Cubic feet, Cubic yards, Cubic Meter Which is stronger solid steel rod or hollow steel pipe? On a per pound basis, steel pipe is stronger in bending and is less likely to buckle in axial compression. What is the tallest man made structure in the world? The tallest man made structure is the KVLY-TV mast which is 2063 feet tall. The worlds tallest man made structure is Burj Dubai which is 800 meter tall. What is braced excavation all about? Excavations are braced to prevent the cave-in of surrounding unstable soil. What is the meaning of soil reinforcement? Soil reinforcement is the act of improving soil strength to enable it support or carry more load. Two common examples are: a) Mixing a soil amendment such as lime into weak clayey soil and re-comPActing to improve soil-bearing caPAcity (often done under the road base in highway construction) b) Installing plastic or composite webbing layers (called geo-grid material) alternating with comPActed soil to produce a stronger sloped soil structure (often done on steep roadway embankments to improve strength and stability) What is aggregate? Aggregate is the component of a composite material used to resist compressive stress. What year was the keystone power plant in Indiana County constructed? 1967 began commercial operation on unit 1. What is the force exerted by the Tacoma narrows bridge? The force exerted to the Tacoma narrows bridge was initially the wind resistance. The wind resistance caused the whole bridge to act as a system with forced vibration with damping. What are the uses of alloys in daily life and how are alloys made? Alloying is not always done to produce a 'superior' material, but to produce materials having a desired requirement in the

AAA-BRIGHT ACADEMY - 9872474753

74

industry or elsewhere. A classic case is of lead solder (containing lead & tin), in which the melting point of the constituent elements are lowered, not necessarily a desirable property. Alloying can be carried out using hot press method (a sheet of material is sandwiched with alloying material), rolling the heated base metal in a drum full of alloying metal powder, using hot spraying, galvanizing (dipping the base in a molten solution of alloying material) etc. Sometimes the alloying material is added in small proportions to the molten base metal (e.g., in production of different types of steel). 10 What is the worlds largest concrete dam? The Grand Coulee Dam is said to be the largest concrete dam. Currently the world's largest concrete dam is the Itaipu Dam, an accomplishment of two neighboring countries, Brazil and Paraguay in South America. Though it is not finished yet, the Three Gorges (or Sandapong) Dam on the Yangtze River in China will take over as the largest upon its completion, which is slated for 2009. What are the main reasons of building collapse? There are several reasons for building collapse. Passage of time is the main reason. Also, weak foundations, natural calamities like earthquakes, hurricanes, etc., are the major reasons for building collapse. Bombing and destruction is also another major reason. State the applications of modulus of elasticity. Modulus of elasticity is related to the flexibility of the material. The value of modulus of elasticity is pretty important in case of deflection of different materials used in building construction. How are the freeway bridges built? The traffic that is likely to go over the bridge at a time is estimated and the cement, rocked with rebar stanchions is placed over the freeway to build a bridge. Off-ramp from freeway to the bridge and on-ramp from the bridge to the freeway are constructed. Cement slabs are used to build a platform. What is the basic difference in absorption, adsorption, and sorption? Absorption refers to the phenomenon where an atom, molecule or ions enter any bulk phase like gas, solid or liquid. Absorption refers to the phenomenon where energy of photon is transferred to other entity. Adsorption is similar to absorption. It refers to the surface rather than a volume. Adsorption takes place when the gas or liquid solute accumulates on the surface of solid. A substance diffuses in liquid or solid to form a solution. Difference between routine maintenance and major maintenance for school facilities: Routine maintenance is handling the minor repairs of the school campus. Major maintenance can be total reconstruction or renovation of the school. What is soil analysis? Soil analysis is the testing of soil to determine the nutritional and elemental composition of soil. It is generally tested for knowing the contents of nitrogen, potassium and phosphorous. State the building codes. These codes are the set of specifications to ensure the safety associated with any building construction. These codes are associated with the height, spacing, and installation of the building. These codes play an important role in vacating the building in case of any emergency situations. From these interview questions, you will get an idea of the questions interviewer can ask you in the civil engineering position interview. Refer to some more sample questions here and revise all the answers carefully. What are the steps involved in the concreting process, explain? The major steps involved in the process of concreting are as follows: 1. Batching

AAA-BRIGHT ACADEMY - 9872474753

75

2. Mixing 3. Transporting and placing of concrete 4. Compacting. > Batching: The process of measurement of the different materials for the making of concrete is known as batching. batching is usually done in two ways: volume batching and weight batching. In case of volume batching the measurement is done in the form of volume whereas in the case of weight batching it is done by the weight. > Mixing: In order to create good concrete the mixing of the materials should be first done in dry condition and after it wet condition. The two general methods of mixing are: hand mixing and machine mixing. > Transportation and placing of concrete: Once the concrete mixture is created it must be transported to its final location. The concrete is placed on form works and should always be dropped on its final location as closely as possible. > Compaction of concrete: When concrete is placed it can have air bubbles entrapped in it which can lead to the reduction of the strength by 30%. In order to reduce the air bubbles the process of compaction is performed. Compaction is generally performed in two ways: by hand or by the use of vibrators. Describe briefly the various methods of concrete curing. Curing is the process of maintaining the moisture and temperature conditions for freshly deployed concrete. This is done for small duration of time to allow the hardening of concrete. The methods that are involved in saving the shrinkage of the concrete includes: (a) Spraying of water: on walls, and columns can be cured by sprinkling water. (b) Wet covering of surface: can be cured by using the surface with wet gunny bags or straw (c) Ponding: the horizontal surfaces including the slab and floors can be cured by stagnating the water. (d) Steam curing: of pre-fabricated concrete units steam can be cured by passing it over the units that are under closed chambers. It allows faster curing process and results in faster recovery. (e) Application of curing compounds: compounds having calcium chloride can be applied on curing surface. This keeps the surface wet for a very long time. What do you understand by “preset” during the installation process of bridge bearings? During the installation of bridge bearings the size of the upper plates is reduced to save the material costs. This process is known as preset. Generally the upper bearing plate comprises of the following components: > Length of bearing > 2 x irreversible movement. > 2 x reversible movement. The bearing initially is placed right in the middle point of the upper bearing plate. No directional effects of irreversible movement is considered. But since the irreversible movement usually takes place in one direction only the displaced direction is placed away from the midpoint. In such cases the length of the upper plate is equal to the length of the length of the bearing + irreversible movement + 2 x reversible movement. Why are steel plates inserted inside bearings in elastomeric bearings? In order to make a elastomeric bearing act/ function as a soft spring it should be made to allow it to bulge laterally and also the stiffness compression can be increased by simply increasing the limiting amount of the lateral bulging. In many cases in order to increase the compression stiffness of the bearing the usage of metal plates is made. Once steel plates are included in the bearings the freedom of the bulge is restricted dramatically, also the deflection of the bearing is reduced as compared to a bearing without the presence of steel plates. The tensile stresses of the bearings are induced into the steel plates. But the presence of the metal plates does not affect the shear stiffness of the bearings. What reinforcements are used in the process of prestressing?

AAA-BRIGHT ACADEMY - 9872474753

76

The major types of reinforcements used in prestressing are: > Spalling Reinforcement: The spalling stresses leads to stress behind the loaded area of the anchor blocks. This results in the breaking off of the surface concrete. The most likely causes of such types of stresses are Poisson`s effects strain interoperability or by the stress trajectory shapes. > Equilibrium reinforcements: This type of reinforcements are required where several anchorages exist where the prestressing loads are applied in a sequential manner. > Bursting Reinforcements: These kinds of stresses occur in cases where the stress trajectories are concave towards the line of action of load. In order to reduce such stresses reinforcements in the form of bursting is required. 6. In the design of bridge arguments what considerations should be made to select the orientation of the wing walls? Some of the most common arrangements of wing walls in cases of bridge arguments are as follows: > Wing walls parallel to abutments: This method is considered to take least amount of time to build and is simple as well. But on the downside this method is not the most economical. The advantage of this type of design being that they cause the least amount of disturbance to the slope embankment. > Wing walls at an angle to abutments: This design method is considered to be the most economical in terms of material cost. > Wing walls perpendicular to abutments: The characteristic of this design is it provides an alignment continuous with the bridge decks lending a support to the parapets. 7. In case if concrete box girder bridges how is the number of cells determined? When the depth of a box girder bridge exceed 1/6th or 1/5th of the bridge width then the design recommended is that of a single cell box girder bridge. But in case the depth of the bridge is lower than 1/6th of the bridge width then a twin-cell or in some cases multiple cell is the preferred choice. One should also note that even in the cases of wider bridges where there depths are comparatively low the number of cells should be minimized. This is so as there is noticeably not much improvement in the transverse load distribution when the number of cells of the box girder is higher than three or more. 8. Under what circumstances should pot bearings be used instead of elastomeric bearings? Pot bearings are preferred over elastomeric bearings in situations where there are chances of high vertical loads in combinations of very large angle of rotations. Elastomeric bearings always require a large bearing surface so that a compression is maintained between the contact surfaces in between the piers and the bearings. This is not possible to maintained in high load and rotation environment. Also the usage of elastomeric bearings leads to the uneven distribution of stress on the piers. This results in some highly induced stresses to be targeted at the piers henceforth damaging them. Due to the above reasons pot bearings are preferred over elastomeric bearings in such cases. 9. Why should pumping be not used in case of concreting works? During the pumping operation the pump exerted pressure must overcome any friction between the pumping pipes and the concrete, also the weight of the concrete and the pressure head when the concrete is placed above the pumps. Since only water is pump able, all the pressure generated is by the water that is present in the concrete. The major problem due to pumping are segregation effects and bleeding. In order to rectify and reduce these effects, generally the proportion of the cement is increased in order to increase the cohesion , which leads to the reduction of segregation and bleeding. Also if a proper selection of the aggregate grading can vastly improve the concrete pump ability. 10. Why should curing not be done by ponding and polythene sheets? The primary purpose of curing is to reduce the heat loss of concrete that is freshly placed to the atmosphere and in order to reduce the temperature gradient across the cross-section of the concrete. Ponding is not preferred for curing as this method of thermal curing is greatly affected by cold winds. In addition to that in ponding large amounts of water is used and

AAA-BRIGHT ACADEMY - 9872474753

77

has to be disposed off from the construction sites. Polythene sheets are used on the basis that it creates an airtight environment around the concrete surface henceforth reducing the chances of evaporation over fresh concrete surfaces. But the usage of polythene can be a drawback as it can be easily blown away by winds and also the water lost by selfdesiccation cannot be replenished.

AAA-BRIGHT ACADEMY - 9872474753

78

PO INTERVIEW.pdf

The way the compiler and linker. handles this is that ... For List memory allocated is dynamic and Random. Array: User need ... Page 3 of 78. PO INTERVIEW.pdf.

1MB Sizes 2 Downloads 243 Views

Recommend Documents

SBI PO & PO - Rural Business Exam 2010 question paper.pdf
SBI PO & PO - Rural Business Exam 2010 question paper.pdf. SBI PO & PO - Rural Business Exam 2010 question paper.pdf. Open. Extract. Open with. Sign In.

PO Box 5466, Aleppo, Syria
Multinational CGIAR project to support agricultural research for development of strategic crops ... Thorough knowledge of all major Microsoft office applications.

PO-3.pdf
Page 1 of 2. Stand 02/ 2000 MULTITESTER I Seite 1. RANGE MAX/MIN VoltSensor HOLD. MM 1-3. V. V. OFF. Hz A. A. °C. °F. Hz. A. MAX. 10A. FUSED. AUTO HOLD. MAX. MIN. nmF. D Bedienungsanleitung. Operating manual. F Notice d'emploi. E Instrucciones de s

PO-19.pdf
327659 SARKAR T BM(I/C),BO,RAIGANJ. NORTH ... PO-19.pdf. PO-19.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying PO-19.pdf. Page 1 of 1.

PO-16.pdf
156508 GEETA MUJU RAINA MANAGER(P&IR),DO,MUMBAI - I. 18. 705271 ... 148751 GARG M K FM,STC,AJMER. 31. .... Displaying PO-16.pdf. Page 1 of 4.

mary po citaz.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. mary po citaz.

PO Box 5466, Aleppo, Syria
audiences through a range of media the on-going successes and impacts of the SARD-SC. Wheat project to ... social media platforms, including Facebook, Twitter, and LinkedIn ... Thorough knowledge of all major Microsoft office applications.

PO-16.pdf
212090 SINGH R K MM,DO,VARANASI. NORTHERN ZONE: ... 559004 BANT PD MM,DO,DHARWAD. 63. 557145 MOHD ... Displaying PO-16.pdf. Page 1 of 4.

sushma PO Orders.pdf
Sign in. Loading… Whoops! There was a problem loading more pages. Whoops! There was a problem previewing this document. Retrying... Download. Connect ...

Metodicheskie-rekomendatsii-po-vnedreniyu-proektnogo ...
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Metodicheskie-rekomendatsii-po-vnedreniyu-proektnogo-upravleniya-v-organah-ispolnitelnoy-vlasti.pdf.

Indian Overseas Bank PO Last.pdf
... apps below to open or edit this item. Indian Overseas Bank PO Last.pdf. Indian Overseas Bank PO Last.pdf. Open. Extract. Open with. Sign In. Main menu.

IBPS PO & MT Recruitment Notification [email protected] ...
Sign in. Page. 1. /. 25. Loading… Page 1 of 25. 1. Institute of Banking Personnel Selection. COMMON RECRUITMENT PROCESS FOR. RECRUITMENT OF ...

SYLLABUS FOR SBI PO EXAM.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. SYLLABUS FOR ...

.ibps po exam centre.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item .ibps po exam ...

IBPS PO Recruitment Notification [email protected] ...
IBPS PO Recruitment Notification [email protected]. IBPS PO Recruitment Notification [email protected]. Open. Extract. Open with. Sign In.

Sciences Po Agnes meeting.pdf
To introduce Ms. Chauveau to a variety of journalism programs at US universities and other. institutions to learn about their curriculum, instructional practices ...

PO-SO Packing List.pdf
a WiFi hotspot to share with your chapter members, this may be helpful during. sessions as well. Cell phones and electronics will only be allowed during specific ...

PO Guide Part-1.pdf
Page 2 of 172. PREFACE. This Post Office Guide Part I contains information on all items of business. transacted in a Post Office. The positions relating to the ...

SYLLABUS FOR SBI PO EXAM.pdf
Permutation and Combination). Subject to Change. Topics Expected no: of Questions Remarks. Puzzles 20 ( 4 sets of 5 questions. each). Will appear for certain ...

USAIRE Student Award 2014 - Sciences Po
Jun 15, 2014 - which will sketch your plan and main elements OF A FINAL ... 2 stages Airbus : Strategy and Marketing Service in Commercial. Service.

Notification-SBI-PO-Posts-Hindi.pdf
g_wXm`HoCÂ_rXdmam|Ho {bEna. 3. 1. rj. 0. {g. m-{g. V. n. ß~. Vyd. aß~©. a. ‡. 2. {. 2. 0. e. 0. 1. j. 1. 6. U. 6. narjm-nyd©‡{ejUHo {bEHm∞bboQaHmoSmCZbmoSHaZm 13-06-2016go narjm-nyd©‡{ejUHmAm`moOZ 20-06-2016go25-06-2016. AO. [aäV-nX [a

SBI PO Recruitment 2018#[email protected]
three phases i.e. Preliminary examination, Main examination and Group Exercise &. Interview. The candidates who are shortlisted after Preliminary examination will have to. appear for Main examination. The candidates shortlisted after the main examina

AKT 9 (po korekcie geralta.pdf
temu, to również chciałam walczyć. Nadal chcę. Pragnę, autentycznie pragnę znaleźć się na. pierwszej linii i ramię w ramię, bok w bok z wami bronić Equestrii.