Aditya College of Engineering
Valasapalle ,Madanapalle.
Department of Computer Science & Engineering
Technical Written Test
1. Which of the designation you
are more interested in the
software field.
(a) Tester
(b)
Analyst
(c) Developer
(d) Designer
2. Which programming language
you prefer the most.
(a) C
(b)Java (c).Net
(d)
PASCAL
3. What type of applications you
are interested to develop
(a) Android
(b) Web based
(c) Multimedia
(d)
Online
4. If you get offer as a tester in
the software field but you are
interest in developing , what
the decision you take.
5.
6.
7. What is your opinion on a
software Industry.
8.
9.
10.
11.
In your view, what is your
excepted time (in days) to
complete a given project.
12.
13.
14.
Why do we declare main()
method as static in java.
15.
16.
17.
What are the different
steps in SDLC.
18.
19.
20.
21.
Difference
between
validation and verification.
22.
23.
24.
25.
In
the
method
call
Math.sqrt() ,Math is a class
,then sqrt() is a what type of
method.
26.
27.
28.
In java ,what is the name
used to save a program.
29.
30.
What is the difference
between
final,finally
and
finalize in java.
31.
32.
33.
34.
35.
Consider the following
statement
36.
class B
implements A
37.
What is A in the above
code.
38.
39.
40.
In
multithreading
,
processor executes multiple
threads simultaneously. Is the
statement true or false.
41.
42.
Consider the following
pseudocode.
43.
algorithm grade()
44.
{
45.
input three subject
marks
46.
calculate average
47.
if
average>=75
write
distinction
48.
else if average>=60
write
first
class
49.
else if average>=50
write second
class
50.
else if average>=35
write
third
class
51.
else write fail
52.
}
53.
Does
the
above
pseudocode finds the grade of
a student correctly. Justify
54.
55.
56.
57.
Which is the long lasting
phase of SDLC.
58.
59.
60.
61.
Consider the following C
Code
62.
void main()
63.
{
64.
int k=2;
65.
if(!k)
66.
printf(even);
67.
else
68.
print(odd);
69.
}
70.
What is the output of the
above code.
71.
72.
73.
What is the worst case of
deletion in a linear array.
74.
75.
Which algorithm design
technique is suitable to identify
whether a counterfeit coin is
present in a group of 20 coins.
76.
77.
78.
Write a sql query to
identify the maximum salary
of
an
employee
whose
designation is clerk.
79.
80.
81.
82.
What are ACID properties.
83.
84.
What is the
between primary
unique key.
difference
key and
85.
86.
87.
88.
89.
90.
91.
92.
What is recursion.
What are TCL commands.
93.
94.
Write an algorithm for
finding
prime
numbers
between 20 to 50.
95.
96.
97.
98.
99.
100.
101.
102.
103.
104.
105.