youmake@career: July 2013

Joint CAMPUS Recruitment Drive by BETA SOFT SYSTEMS 30JULY'13 AT SETH JAI PARKASH MUKAND LAL INSTITUTE OF TECHNOLOGY(JMIT), RADAUR, HARYANA ON.

JOINT CAMPUS RECRUITMENT DRIVE BY BETA SOFT SYSTEMS AT SETH JAI PARKASH MUKAND LAL INSTITUTE OF TECHNOLOGY(JMIT),RADAUR, HARYANA ON 30TH JULY 2013.


Eligibility :  
  • GRADUATES(ALL STREAMS)/Diploma Holders(ALL STREAMS)
  • B.E/B.Tech and MBA 2013 batch
  • Undergraduate and Graduate in any field.
  • Excellent communications skills.

Cluster wireless Fresher Opening Chennai for Software Developer/Tester


Job Role: Software Developer/Tester

Job Type : Full Time

Job Location: Chennai

Eligibility: BE/BTech/MTech Graduates

Experience: (0 - 2) years

Salary: INR 4,00,000 - 5,50,000 PA

Industry Type: IT Software

Aspire Systems Hiring 2013 Passout Freshers|B.E/B.Tech/MCA| Bangalore, Pune

Aspire Systems Hiring 2013 Passout Freshers|B.E/B.Tech/MCA| Bangalore, Pune

Company Name : Aspire Systems India

Eligibility: 
 B.E / B.Tech / MCA,

Department :Computer Science / Information Technology (Other departments not eligible),

Year Of Passing : 2013 Only,

Percentage : Should have 70% & above in B.E / B.Tech / MCA.

Experience : Freshers

Amdocs Interview for Fresher in Bangalore| IT Software| 2013 Batch| BE/B.Tech(CSE,ECE,IT)/MCA

Amdocs Interview for Fresher in Bangalore| IT Software| 2013 Batch| BE/B.Tech(CSE,ECE,IT)/MCA



Amdocs Interviews will be conducted on 3rd August 2013 in Bangalore/Bangaluru 
Job Type  : Full Time

Job Role : IT Software - QA & Testing

Eligibility :
Should be a

BE/B.Tech (Information Technology/Computer Science/Electronics and Telecommunication) OR MCA ONLY
Year of passing degree July 2013 passing batch ONLY
Percentage criteria - 60% ( Aggregate till the recent result ) & above throughout academics (10th, 12th & Graduation/MCA) 

RPSC Programmer Exam Date 06-09-13 |Sample Question Paper| Admit Card| Syllabus| Result| Exam 2013

RPSC Programmer Exam Date 06-09-13 |Sample Question Paper| Admit Card| Syllabus| Result| Exam 2013


RPSC(Rajasthan Public Service Commision) Programmer Date is now announced Officially. The date of Exam is 06-09-13.

The date for RPSC(Rajasthan Public Service Commision) Programmer date is now announced. The date of Exam is 06-09-13. The Exam is divided in two sessions. The papers are Programmer I and Programmer II.

You can check the the sample paper of both paper here. Click here to see.

You can check your admit card on RPSC web site rpsc.rajasthan.gov.in.


Now you can start preparing for RPSC(Rajasthan Public Service Commision) Programmer from now because we all are waiting for the date. 

About RPSC :
Rajasthan Public Serce Commission has had a glorious past of nearly 50 years. During 1923, the Lee Commission had recommended setting up of a Central Public Service Commission in India, but it did not give much thought to the need of establishing similar commissions in provinces. It was left largely to the discretion of provincial Governments to recruit and exercise control over their Services, as they thought proper.

At the time of formation of Rajasthan, the institution of Public Service Commission existed in only three of the twenty-two covenanting states viz. Jaipur, Jodhpur and Bikaner.

The successor administration after the merger of the princely states promulgated an ordinance on 16th August,1949 establishing the Rajasthan Public Service Commission Ajmer. It was published in Raj. Gazette at 20th August,1949 and it came into effect from this date. It provided for the abolition of the PSCs or other institution performing duties in the nature of those of a PSC in the constituent states. The ordinance also provided inter-alia, for the composition of the Commission, the staff and the functions of the Commission.

Dell Hiring Software Development Engineer BE/BTech/ME/MTech(Freshers/Experience) Graduates On July 2013 at Bangalore

Dell Hiring Software Development Engineer BE/BTech/ME/MTech(Freshers/Experience) Graduates On July 2013 at Bangalore

Company Name: Dell

Job Location: Bangalore/Bangaluru

Job Role: Software Development Engineer

Job Experience: Freshers, 0-1 Year

Job Eligibility: BE/BTech/ME/MTech

Job Summary:


Knowledge Required:
  • Strong knowledge in .NET framework
  • Programming experience in C++, C# and ASP .Net
  • Database (SQL/Oracle)
  • knowledge on Web Services
Nice to have
  • Good knowledge in OOPS concepts and design patterns
  • Knowledge in LINQ
Common Requirements:
  • Good communications Skills (written and oral)
  • Good team player
  • Ability to function with geographically dispersed teams
  • Self driven (aspiration to grow/improve)
  • Position will be based in Bangalore-INDIA
  • Educational background in "Computer Software", "Information Technology" or related fields. Desirable to have candidates with engineering background.
  • Candidates from product development company
Company Website: www.dell.com

AIIMS, BHUBANESHWAR | Lastest News | APPOINTMENT | Counselling| Result |Admit Card

APPOINTMENT for AIIMS, BHUBANESHWAR | Lastest News | APPOINTMENT | Counselling| Result |Admit Card |Contractual/Deputation/ Transfer/ Direct Recruitment



Online applications are invited for filling up to the following colleges and Nursing and Hospital Services at the All India Institutes of Medical Sciences, Bhubaneswar on Contractual/Deputation/ Transfer/ Direct Recruitment.


S.noName of the POSTPay Scale(in RS)Grade Pay(in RS)Pay BandNo. of POSTMode of RECRUITMENTRESERVATION

OBC|SC|ST|UR
1Staff Nurse Gr-II(Sister Grade-II)9300-34800/-4600/-2150Direct40 | 22 | 11 | 77
2Staff Nurse Gr-I(Sister Grade-I-Nursing Sister)9300-34800/-4800/-250Direct13 | 7 | 3 | 27
3Assistant Nursing Superintendent15600-39100/-5400/-315Contractual/Deputation4 | 2 | 1 | 8
4Deputy Nursing Suprintendent15600-39100/-5400/-305Contractual/Deputation1 | - | - | 4

*The no of posts is tentative and is liable to change, based on the Institute's requirements.

Eligibility : 
All instruction and eligibility criteria available on official website. Click here to know more.

Application Fees (Non – Refundable)
General/OBC Category : Rs.500/-
SC/ST category : Rs.200/-
The application fee should be submitted as Demand Draft in favour of “AIIMS, Bhubaneswar” 

payable at Bhubaneswar along with the hard copy of application.

Selection Methodology for Direct Recruitment:
Written Tests for Staff Nurse Grade I & Staff Nurse Grade II
The Centre(s) for Written tests will be at Bhubaneswar ONLY
i. Duration: 90 minutes 
ii. Maximum Marks: 80 
iii. Objective type / Multiple Choice 
Questions. 
iv. No negative marking. 

How to Apply :
Online Application shall open at the official website of AIIMS, Bhubaneshwar www.aiimsbhubaneshwar.edu.in. 
Candidates are requested to fill in the form, take a print out nad submit it by speed post/registered post only to The Administrative Officer, AIIMS, Sijua, PO-Dumudma, Bhubaneshawar-751019.

Last Date : for receipt of completed online application along with printed copy and the required application fees is 07-08-2013, 5:00pm. 

About :
 AIIMS Bhubaneswar is one of the six AIIMS like apex healthcare institutes being established by the Ministry of Health & Family Welfare, Government of India under the Pradhan Mantri Swasthya Suraksha Yojna (PMSSY). Attaining self sufficiency in graduate and postgraduate medical education and training the PMSSY planned to set up 6 new AIIMS like institutions in under served areas of the country, With the aim of correcting regional imbalances in quality tertiary level healthcare in the country, and
   These institutions are being established by an Act of Parliament on the lines of the original All India Institute of Medical Sciences in New Delhi which imparts both undergraduate and postgraduate medical education in all its branches and related fields, along with nursing and paramedical training. to bring together in one place educational facilities of the highest order for the training of personnel in all branches of health care activity.

IBPS CWE(Common Written Exam) PO/MT III EXAM 2013-14:Notification Apply Online| Offline

IBPS 2013-14 Notification
IBPS CWE(Common Written Exam) PO/MT III EXAM 2013-14:Notification


Eligibility : Candidates must have 60% in graduate relaxation for reserved categories. 

Age : The candidate should not born earlier than 02 July 1985 and not later than 01 July 1993.

Application Fee :
officer (Scale I,II & III)
-Rs. 100/- for SC/ST/PWD candidates.
-Rs. 600/- for all others

Office Assistant( Multipurpose)
-Rs. 100/- for SC/ST/PWD candidates.
-Rs. 600/- for all others

How to Apply :

  • Open the official website of ibps www.ibps.in/,
  • then, click on the option "Click here to Apply ONLINE for CWE-PO/Management Trainees(CWE-PO/MT-III)",
  • Fill the Application form, 
  • Upload your signature and photograph,
  • Download the form,
Selection Processor :
  • Written Test 
  • Interview
The Candidates will get selected on the basis of their performance in written examination and interview. The candidate who qualify the written examination will be called for the interview.  After clearing second round, the candidates will receive their appointment letters.

Important Dates:
Date of Closure of Application : 25 July 2013
Date of Closure for Editing the Application : 27 July 2013
Last Date for Printing the Application : 09 Aug 2013

Online Payment : 04 July 2013 to 25 July 2013 
Offline Payment(through CBS Challan) : 06 July 2013 to 30 July 2013 


About IBPS
he magnificence of IBPS has stood over 40 years. Today, IBPS has become a body providing integrated end to end solutions for human resource management of client organizations. Working on international testing models like the ETS model, the Institute conducts a wide spectrum of activities in personnel selection both for promotion within and recruitment and selection from outside the organization. The Institute is equipped with its very own fleet of qualified personnel - people from the banking and insurance industry, psychology, information technology and educational measurement who have specialized in the testing process. Its various verticals include Client Relations, Design and Analysis, Research and Development, Processing and Technology Operations and Support Services.  It has state-of-the-art printing facility that is capable of printing over 100 thousand data booklets and answer sheets per day. It also has its own technology infrastructure for data ware house and processing.

Cognizant Hiring Fresher/Experience BE/B.Tech for Programmer Analyst

Cognizant Hiring Fresher/Experience BE/B.Tech for Programmer Analyst 


Job Type  : Full Time

Job Role : Programmer Analyst


Qualifications : 

  • B.Tech/BE, Bachelor’s degree in Engineering Fresher/Exp, 
  • Science graduates with 0-4 years of experience.

Job Description : 



  •  Involved in testing, coding, debugging.
  •  Responsible for delivery of assigned work, under a module lead or team lead supervision.
  •  Needs to understand technology and quality processes within Cognizant.

Skills Required :
  • Applies design specifications techniques under supervision of the module leader / Project Lead.
  • Working knowledge of the technical platforms of the project.
Location : Bangalore 

Salary : Best in Industry


About :
Cognizant (NASDAQ: CTSH) is the fastest-growing global IT services and business process outsourcing solutions provider, headquartered in Teaneck, N.J. Cognizant’s single-minded passion is to dedicate our global technology and innovation know-how, our industry expertise and worldwide resources to working together with clients to make their businesses stronger.

Today with over 50 delivery centers worldwide and over 111,000 employees as of March 31, 2011, Cognizant is a member of the NASDAQ-100, the S&P 500, the Forbes Global 1000, and the Fortune 500, and is ranked among the top performing and fastest growing companies in the world.

BHU Counselling for B.Sc Nursing Entrance Examination 22 July 2013

Counselling for B.Sc Nursing Entrance Examination 2013


Counselling for B.Sc Nursing Entrance Examination 2013 ( held on 19 May 2013) is scheduled on 22 July 2013. The Counselling is in the office of the Director, Institute of Medical Sciences, BHU at 11 am onwards.

The following candidates are requested to appear before admission committee.


Category Rank of provisionally selected candidatesRank of Waitlisted Candidates
General1 to 3031 to 120
OBC1 to 1617 to 64
SC1 to 910 to 36
ST1 to 506 to 13


The Admission to the courses should be fulfill the eligibility criteria and the verification of the documents/marksheet.

YOU NEED TO BRING AT THE TIME COUNSELLING :

Admit Card, and the original certificates and Mark sheets of:
  1. 10th 
  2. +2
  3. two xerox copy of all marksheets
  4. 4 passport size photo
  5. Character certificate
  6. Transfer and migration certificates
  7. Provisonal  Admit card of B.Sc Nursing Entrance Examination 2013
OBC Candidates have recent copy of cast certificate.
and you are advice to bring 5000/- to cover fee and hostel at the time of counselling.

About BHU :

Banaras Hindu University (commonly referred to as BHU) is a public central university located in Varanasi, Uttar Pradesh. Established in 1916 by Pandit Madan Mohan Malaviya. 
The Banaras Hindu University Library system was established from a collection donated by Prof. P.K. Telang in the memory of his father Justice Kashinath Trimbak Telang in 1917. 
The University is making its mark at the national and international levels in a number of frontier areas of Science, Social Science, Technology, Medicine and Agriculture etc. The collection was housed in the Telang Hall of the Central Hindu College, Kamachha.
BHU is organised into 4 institutes and 14 faculties (streams) and more than 140 departments. Total student enrolment at the university exceeds 20,000, and includes students from over 34 nations. It has over 60 hostels for resident students.


Related Post :



UET/PET Exam 2013 More Information | UGC/NET Exam 2013

UGC Jobs for NET/SET/Ph.D Qualified Candidates| Call letter| Admit Card

You can find UGC Jobs for NET/SET/Ph.D Qualified Candidates. All Jobs Available for UGC NET/SET/Ph.D Qualified Candidates.


The academic job portal is a new initiative taken by the UGC(University Grant Commission which helps NET/SET/ph.D qualified candidates to bring their academics profile attention of universities/colleges and other employers with the ultimates aim to get them a suitable job.
To get register for these jobs mention below you have apply for it on UGC website. First of all you have to register their and then you can apply for it online. The portal provide you all latest jobs available on UCG. 

The Latest Jobs are available on UGC: 

Assistant Professor - 15
Associate Professor - 3
Author - 2
Center Manager - 1 
DBT Project base Posts - 1 
IP Lead - 1 
Lecturer - 3 
Librarian - 1 
Principal - 3 
Professor - 2 
Programmer Executive and Transmission Executive -1 
Project Fellow - 3 
Project Fellow for UGC Major Research Project -1 
Provost -1 
Research Associate -1 

Click here to Apply for all these jobs available for NET/SET/Ph.D Qualified Candidates. The number of seats also provided here so you need apply as soon as possible for all the jobs of UGC NET/SET/Ph.D Qualified Candidates. You can also check you name click here

RPSC Programmer Sample Question Paper| Admit Card| Syllabus| Result| Exam 2013

RPSC Sample Question Paper Preview 2012 for Programmer Post 2013

  • Question Paper Name: Programmer 1 - 2011
  • Creation Date: 2012-04-14 18:57:45.0
  • Cut Off: 0
  • Duration: 120
  • Status: Sealed

Programmer - I

Question id : 85183     (Correct + 1.0 , Wrong - 0.33) 
Consider a database table T containing two columns X and Y each of type integer. After the creation of the table, one record (X= 1, Y=l) is inserted in the table.
  Let MX and MY denote the respective maximum values of X and Y among all records in the table at any point in time. Using MX and MY, new records are inserted  in  the  table  128  times  with  X  and  Y  values  being  MX+1,  2*MY+1 respectively. It may be noted that each time after the insertion, values of MX and MY change.
  What will be the output of the following SQL query after the steps mentioned above are carried out?
  SELECT Y FROM T WHERE X=7;

1. 127
2. 255
3. 129
4. 257
Question id : 85184     (Correct + 1.0 , Wrong - 0.33) 
Database table by name Loan_Records is given below.

Borrower     Bank_Manager    Loan_ Amount

Ramesh       Sunderajan      10000.00
Suresh       Ramgopal        5000.00
Mahesh       Sunderajan      7000.00

What is the output of the following SQL query?

SELECT count(*)    FROM(  (SELECT Borrower. Bank_Manager FROM Loan_Records) AS S NATURAL JOIN   (SELECT Bank_Manager, Loan_Amount FROM Loan_Records) AS T );

1. 3
2. 9
3. 5
4. 6
Question id : 85185     (Correct + 1.0 , Wrong - 0.33) 
Consider a relational table with a single record for each registered student with the following attributes.
  1.  Registration_Number: Unique registration number for each registered student
  2.  UID: Unique Identity number, unique at the national level for each citizen
  3.  BankAccount_Number: Unique account number at the bank. A student can have multiple accounts or joint accounts. This attributes stores the primary account number
  4.  Name: Name of the Student
  5.  Hostel_Room: Room number of the hostel 

  Which of the following options is INCORRECT? 

1. BankAccount_Number is a candidate key 
2. Registration_Number can be a primary key 
3. UID is a candidate key if all students are from the same country 
4. If S is a superkey such that S UID is NULL then S UID  ∩ ∪ is also a superkey
Question id : 85186     (Correct + 1.0 , Wrong - 0.33) 
The concept of locking cannot be used to solve the problem of

1. Lost update
2. Uncommitted Dependency
3. Incosistent Data
4. Deadlock
Question id : 85187     (Correct + 1.0 , Wrong - 0.33) 

Designing physical model of DBMS requires information on

(i)   Data volume
(ii)  Frequency of access to data
(iii) Programming language used
(iv)  Secondary memory characteristics

1. i, ii  
2. i, ii, iii 
3. i, ii, iii, iv
4. i, ii, iv 
Question id : 85188     (Correct + 1.0 , Wrong - 0.33) 
In, Transaction, In ACIT properties A stands for

1. Atomicity
2. Acidity
3. Alphabetically
4. None of the above
Question id : 85189     (Correct + 1.0 , Wrong - 0.33) 
Relational calculus is a

1. Procedural language. 
2. Non- Procedural language.
3. Data definition language. 
4. High level language.
Question id : 85190     (Correct + 1.0 , Wrong - 0.33) 
Cartesian product in relational algebra is

1. a Unary operator. 
2. a Binary operator.
3. a Ternary operator. 
4. not defined.
Question id : 85191     (Correct + 1.0 , Wrong - 0.33) 
DML is provided for

1. Description of logical structure of database.
2. Addition of new structures in the database system.
3. Manipulation & processing of database
4. Definition of physical structure of database system.
Question id : 85192     (Correct + 1.0 , Wrong - 0.33) 
Architecture of the database can be viewed as

1. two levels.  
2. four levels.
3. three levels. 
4. one level.
Question id : 85193     (Correct + 1.0 , Wrong - 0.33) 
An entity set that does not have sufficient attributes to form a primary key is a

1. strong entity set. 
2. weak entity set.
3. simple entity set. 
4. primary entity set.
Question id : 85194     (Correct + 1.0 , Wrong - 0.33) 
The way a particular application views the data from the database that the application uses is a

1. module.
2. relational model.
3. schema. 
4. sub schema.
Question id : 85195     (Correct + 1.0 , Wrong - 0.33) 
Assume transaction A holds a shared lock R, If transaction B also requests for a shared lock on R.

1. It will result in a deadlock situation
2. It will immediately be granted
3. It will immediately be rejected
4. It will be granted as soon as released by A
Question id : 85196     (Correct + 1.0 , Wrong - 0.33) 
A schedule S of n transactions is serializable if it is equivalent to some

1. Serial schedule of same n transactions
2. Non Serial schedule of same n transactions
3. Serial schedule of different n transactions
4. Non Serial schedule of different n transactions
Question id : 85197     (Correct + 1.0 , Wrong - 0.33) 
The method in which records are physically stored in a specified order according to a key
field in each record is

1. hash.
2. direct.
3. sequential. 
4. all of the above.
Question id : 85198     (Correct + 1.0 , Wrong - 0.33) 
Normalization of database is essential to
  (i)  avoid accidental deletion of requi red data when some data is deleted
  (ii)  eliminate inconsistencies when a data item is modified in the database
  (iii)  allows storage of data in a computer’s disk
  (iv)  use a database management system

1. i and iii  
2. i and ii 
3. ii and iii  
4. ii and iv 
Question id : 85199     (Correct + 1.0 , Wrong - 0.33) 
AS' clause is used in SQL for

1. Selection Operation
2. Rename Operation
3. Join Operation
4. Projection Operation
Question id : 85200     (Correct + 1.0 , Wrong - 0.33) 
A relation is said to be in 2 NF if 
  (i)  it is in 1 NF
 (ii) non-key attributes dependent on key attribute
  (iii)  non-key attributes a re independent of one another
  (iv)  if it has a composite key, no no n-key attribute should be dependent on part of the composite key

1. i, ii, iii 
2. i and ii  
3. i, ii, iv  
4. i, iv  
Question id : 85201     (Correct + 1.0 , Wrong - 0.33) 
A relation is said to be in 3 NF if  
  (i)  it is in 2 NF
  (ii)  non-key attributes are independent of one another
  (iii)  key attribute is not dependent on part of a composite key
  (iv)  has no multi-valued dependency

1. i and iii  
2. i and iv   
3. i and ii  
4. ii and iv 
Question id : 85202     (Correct + 1.0 , Wrong - 0.33) 
Given the following relation
   Student (roll no , name, course no, course  max. marks, year of study, address)
    The corresponding 3 NF relations are 

1. student (roll no , name, year of study, address)        course (course no , course max. marks) 
2. student ( roll no, name, year of study, address)       student (roll no , course no )
      course (course no , course max. marks) 

3. student (roll no , name, address)       year (roll no , year of study)
      course (course no , course max. marks) 

4. student (roll no , name, address)       course (course no , course max. marks, year of study) 
Question id : 85203     (Correct + 1.0 , Wrong - 0.33) 
A 3 NF relation is converted to BCNF by

1. removing composite keys 
2. removing multivalued dependencies 
3. dependent attributes of overlapping composite keys are put in a separate relation 
4. dependent non-key attributes  are put in a separate table 
Question id : 85204     (Correct + 1.0 , Wrong - 0.33) 
Given the relation 
Supplier(s_id, p_order, s_name, qty)
Given that there is a unique s_name fo r each s_id and that s_id, p_order is a
composite key, find the correct statement among the following:
  (i)  this relation is a BCNF     (ii)  this is 3 NF relation
  (iii)  this is a 2 NF relation   (iv)  this is a 1 NF relation

1. i and ii  
2. ii and iii
3. i and iv  
4. i and iii 
Question id : 85205     (Correct + 1.0 , Wrong - 0.33) 
Fourth normal form (4 NF) relations are needed when

1. there are multivalued dependencies between attributes in composite key 
2. there are more than one composite key 
3. there are two or more  overlapping composite keys 
4. there are multivalued dependency between non-key attributes 
Question id : 85206     (Correct + 1.0 , Wrong - 0.33) 
A relation project guidance 
  Project Guidance(professor, project, student no . st-name, dept)
   A professor can give many projects to many students
   A project will have many students
   A project may be guided by many professors
   The 4 NF relation corresponding to this are 

1. Prof_Project (professor, st_name, dept)
                  Proj_stud (project, student no.) 

2. Prof_stud (professor, student no )
                 Proj_stud (project, student no )
                 Student (student no , st_name, dept) 

3. Student (student no , st_name, dept)
                Professor(professor, project) 

4. Professor( professor, project , dept)
               Student (student no , st_name, dept) 
Question id : 85207     (Correct + 1.0 , Wrong - 0.33) 
Data integrity in a file based system may be lost because

1. the same variable may have  different values in different files 
2. files are duplicated 
3. unnecessary data is stored in files 
4. redundant data is stored in files 
Question id : 85208     (Correct + 1.0 , Wrong - 0.33) 
A subschema expresses

1. the logical view.
2. the physical view.
3. the external view. 
4. all of the above.
Question id : 85209     (Correct + 1.0 , Wrong - 0.33) 
Which one of the following statements is false?

1. The data dictionary is normally maintained by the database administrator.
2. Data elements in the database can be modified by changing the data dictionary.
3. The data dictionary contains the name and description of each data element.
4. The data dictionary is a tool used exclusively by the database administrator.
Question id : 85210     (Correct + 1.0 , Wrong - 0.33) 
Data independence means

1. data is defined separately and not included in programs.
2. programs are not dependent on the physical attributes of data.
3. programs are not dependent on the logical attributes of data.
4. both (B) and (C).
Question id : 85211     (Correct + 1.0 , Wrong - 0.33) 
SET concept is used in :

1. Network Model
2. Hierarchical Model
3. Relational Model
4. None of these
Question id : 85212     (Correct + 1.0 , Wrong - 0.33) 
In two phase locking protocol

1. All unlocking operation precede the first lock operation
2. All locking operation precede the first lock operation
3. Locking and unlocking takes place simultaneously
4. None of the above
Question id : 85213     (Correct + 1.0 , Wrong - 0.33) 
Transaction timestamp is

1. Not unique for each transaction
2. Larger for older transaction
3. Unique identifier assigned for each transaction
4. None of the above
Question id : 85214     (Correct + 1.0 , Wrong - 0.33) 
Which of the following operation is used if we are interested in only certain columns of a
table?

1. PROJECTION
2. SELECTION
3. UNION
4. JOIN
Question id : 85215     (Correct + 1.0 , Wrong - 0.33) 
Which operation sets LOCK (X) to 0

1. unlock_item(X)
2. lock_item(X)
3. dlock(X)
4. all of the above
Question id : 85216     (Correct + 1.0 , Wrong - 0.33) 
Which database level is closest to the users?

1. External 
2. Internal
3. Physical 
4. Conceptual
Question id : 85217     (Correct + 1.0 , Wrong - 0.33) 
Which of the operations constitute a basic set of operations for manipulating relational data?

1. Predicate calculus 
2. Relational calculus
3. Relational algebra 
4. None of the above
Question id : 85218     (Correct + 1.0 , Wrong - 0.33) 
A data dictionary is a special file that contains:

1. The name of all fields in all files.
2. The width of all fields in all files.
3. The data type of all fields in all files.
4. All of the above.
Question id : 85219     (Correct + 1.0 , Wrong - 0.33) 
The physical location of a record is determined by a mathematical formula that transforms
a file key into a record location is :

1. B-Tree File 
2. Hashed File
3. Indexed File 
4. Sequential file.
Question id : 85220     (Correct + 1.0 , Wrong - 0.33) 
If the complete execution of transactions takes the database from one consistent state to the other, then that property of the transaction is called

1. Isolation
2. Durability
3. Consistency preservation
4. None of the above
Question id : 85221     (Correct + 1.0 , Wrong - 0.33) 
Consider the join of a relation R with relation S. If R has m tuples and S has n tuples,
then the maximum size of join is:

1. mn
2. m+n
3. (m+n)/2 
4. 2(m+n)
Question id : 85222     (Correct + 1.0 , Wrong - 0.33) 
The natural join is equal to :

1. Cartesian Product
2. Combination of Union and Cartesian product
3. Combination of selection and Cartesian product
4. Combination of projection and Cartesian product
Question id : 85223     (Correct + 1.0 , Wrong - 0.33) 
Which one is the correct answer for following statements
I.   A binary lock can have three states.
II.  Shadow paging is a recovery technique in databases.

1. I- True, II- False
2. I- True, II- True
3. I- False, II- False
4. I- False, II- True
Question id : 85224     (Correct + 1.0 , Wrong - 0.33) 
_________ is a virtual table that draws its data from the result of an SQL SELECT statement.

1. View
2. Synonym
3. Sequence
4. Transaction
Question id : 85225     (Correct + 1.0 , Wrong - 0.33) 
A set of possible data values is called

1. Attribute.
2. Degree.
3. Tuple.
4. Domain.
Question id : 85226     (Correct + 1.0 , Wrong - 0.33) 
Time stamp can be generated by

1. Counter
2. Current date/time
3. both
4. None of the above
Question id : 85227     (Correct + 1.0 , Wrong - 0.33) 
A layer-4 firewall (a device that can look at all protocol headers up to the transport layer) CANNOT

1. Block entire HTTP traffic during 9:00AM and 5:00PM
2. Block all ICMP traffic
3. Stop incoming traffic from a specific IP address but allow outgoing traffic  to the same IP address
4. Block TCP traffic from a specific user on a multi-user system during 9:00 AM and 5:00PM
Question id : 85228     (Correct + 1.0 , Wrong - 0.33) 
Consider different activities related to email.
M1: Send an email from a mail client to a mail server
M2: Download an email from mailbox server to a mail client
M3: Checking email in a web browser
Which is the application level protocol used in each activity?

1. M1:HTTP  M2:SMTP  M3:POP
2. M1:SMTP  M2:FTP  M3:HTTP
3. M1: SMTP M2: POP M3:HTTP
4. M1:POP  M2:SMTP  MM3:IMAP
Question id : 85229     (Correct + 1.0 , Wrong - 0.33) 
Why are port numbers included in the TCP header of a segment?

1. To indicate the correct router interface that should be used to forward a segment
2. To identify which switch ports should receive or forward the segment
3. To determine which Layer 3 protocol should be used to encapsulate the data
4. To enable a receiving host to forward the data to the appropriate application
Question id : 85230     (Correct + 1.0 , Wrong - 0.33) 
What is the purpose of the preamble in an Ethernet frame?

1. is used as a padding for data 
2. is used for timing synchronization
3. is used to identify the source address
4. is used to identify the destination address
Question id : 85231     (Correct + 1.0 , Wrong - 0.33) 
Which is the protocol among the following that is used for translating from physical address to Internet address?

1. ICMP
2. ARP
3. IGRP
4. RARP
Question id : 85232     (Correct + 1.0 , Wrong - 0.33) 
One of the header fields in an IP datagram is the Time to Live (TTL)field. Which of the following statements best explains the need for this field?

1. It can be used to prioritize packets
2. It can be used to reduce delays
3. It can be used to optimize throughput
4. It can be used to prevent packet looping
Question id : 85233     (Correct + 1.0 , Wrong - 0.33) 
Which one of the following is not a client server application?

1. Internet Chat
2. Web browsing
3. E-mail
4. Ping
Question id : 85234     (Correct + 1.0 , Wrong - 0.33) 
Suppose computers A and B have IP addresses 10.105.1.113 and 10.105.1.91 respectively and they both use the same net mask N. Which of the values of N given below should not be used if A and B should belong to the same network?

1. 255.255.255.0
2. 255.255.255.128
3. 255.255.255.192
4. 255.255.255.224
Question id : 85235     (Correct + 1.0 , Wrong - 0.33) 
While opening a TCP connection, the initial sequence number is to be derived using a time-of-day (ToD) clock that keeps running even when the host is down.  The low order 32 bits of the counter of the ToD clock is to be used for the initial sequence numbers. The clock counters increments once per millisecond. The maximum packet lifetime is given to be 64s.  Which one of the choices given below is closest to the minimum permissible rate at which sequence numbers used for packets of a connection can increase?

1. 0.015/s 
2. 0.064/s 
3. 0.135/s
4. 0.327/s
Question id : 85236     (Correct + 1.0 , Wrong - 0.33) 
Let G(x) be the generator polynomial used for CRC checking. What is the condition that should be satisfied by G(x) to detect odd number of bits in error?

1. G(x) contains more than two terms 
2. G(x) does not divide 1+xk, for any k not exceeding the frame length 
3. 1+x is a factor of G(x) 
4. G(x) has an odd number of terms.
Question id : 85237     (Correct + 1.0 , Wrong - 0.33) 
A computer on a 10Mbps network is regulated by a token bucket. The token bucket is filled at a rate of 2Mbps. It is initially filled to capacity with 16Megabits. What is the maximum duration for which the computer can transmit at the full 10Mbps?

1. 1.6 seconds 
2. 2 seconds 
3. 5 seconds 
4. 8 seconds
Question id : 85238     (Correct + 1.0 , Wrong - 0.33) 
In Ethernet when Manchester encoding is used, the bit rate is:

1. Half the baud rate
2. Twice the baud rate
3. Same as the baud rate
4. None of the above
Question id : 85239     (Correct + 1.0 , Wrong - 0.33) 
There are n stations in a slotted LAN. Each station attempts to transmit with a probability p in each time slot. What is the probability that ONLY one station transmits in a given time slot?

1. np(1-p)n-1
2. (1-p)n-1
3. p(1-p)n-1
4. 1-(1-p)n-1
Question id : 85240     (Correct + 1.0 , Wrong - 0.33) 
. In a token ring network the transmission speed is  107 bps and the propagation speed is 200 meters/ms. The 1-bit delay in this network is equivalent to:

1. 500 meters of cable. 
2. 200 meters of cable.
3. 20 meters of cable. 
4. 50 meters of cable.
Question id : 85241     (Correct + 1.0 , Wrong - 0.33) 
The address of a class B host is to be split into subnets with a 6-bit subnet number. What is the maximum number of subnets and the maximum number of hosts in each subnet?

1. 62 subnets and 262142 hosts. 
2. 64 subnets and 262142 hosts.
3. 62 subnets and 1022 hosts. 
4. 64 subnets and 1024 hosts.
Question id : 85242     (Correct + 1.0 , Wrong - 0.33) 
Station A uses 32 byte packets to transmit messages to Station B using a sliding window protocol. The round trip delay between A and B is 80 milliseconds and the bottleneck bandwidth on the path between A and B is 128 kbps. What is the optimal window size that A should use?

1. 20
2. 40
3. 160
4. 320
Question id : 85243     (Correct + 1.0 , Wrong - 0.33) 
Two computers C1 and C2 are configured as follows. C1 has IP address 203.197.2.53 and netmask 255.255.128.0. C2 has IP address 203.197.75.201 and netmask 255.255.192.0. which one of the following statements is true?

1. C1 and C2 both assume they are on the same network
2. C2 assumes C1 is on same network, but C1 assumes C2 is on a different network
3. C1 assumes C2 is on same network, but C2 assumes C1 is on a different network
4. C1 and C2 both assume they are on different networks.
Question id : 85244     (Correct + 1.0 , Wrong - 0.33) 
Station A needs to send a message consisting of 9 packets to Station B using a sliding window (window size 3) and go-back-n error control strategy. All packets are ready and immediately available for transmission. If every 5th packet that A transmits gets lost (but no acks from B ever get lost), then what is the number of packets that A will transmit for sending the message to B?

1. 12
2. 14
3. 16
4. 18
Question id : 85245     (Correct + 1.0 , Wrong - 0.33) 
ATM breaks all traffic into 53-Byte cells because

1. 53-Byte cells are the ideal size for the voice communication
2. 53-Byte cells are the ideal size for data communication
3. 53-Byte cells are the ideal size for circuit switching
4. 53-Byte cells are the compromised size for both voice and data communication
Question id : 85246     (Correct + 1.0 , Wrong - 0.33) 
Why is Frame Relay's throughput lower than that of ATM?

1. Frame Relaying have error control (ARQ) functionality but not ATM.
2. ATM does not need to have CRC checking/generation or bit stuffing’s functionality in the packets as in Frame Relay.
3. Frame Relaying needs to do multiplexing of logical channels but not ATM.
4. Although both Frame relay and ATM have frame boundary recognition (flags), ATM doesn’t have bit stuffing as in frame Relaying. 
Question id : 85247     (Correct + 1.0 , Wrong - 0.33) 
Which of the following is not the function of the AAL?

1. Cell header generation.
2. Handling of lost and misinserted cell.
3. Handling of cell delay variation.
4. Segmentation and reassembly of user information. 
Question id : 85248     (Correct + 1.0 , Wrong - 0.33) 
Which of the following is not true about the difference of B-ISDN as compared to ISDN?

1. B-ISDN provides for communication services with very high bit rate requirements such as digital television 
2. B-ISDN uses optical fiber cable whereas ISDN makes us of the existing infrastructure.
3. B-ISDN uses only packet switching whereas ISDN does not perform packet switching. 
4. The bit rate for ISDN is prespecified unlike B-ISDN 
Question id : 85249     (Correct + 1.0 , Wrong - 0.33) 
Which of the following types of channels moves data relatively slowly?

1. Wide band channel
2. Voice band channel
3. Narrow band channel
4. None of the above
Question id : 85250     (Correct + 1.0 , Wrong - 0.33) 
Which of the following statement is correct?

1. Terminal section of a synchronous modem contains the scrambler
2. Receiver section of a synchronous modem contains the scrambler
3. Transmission section of a synchronous modem contains the scrambler
4. Control section of a synchronous modem contains the scrambler
Question id : 85251     (Correct + 1.0 , Wrong - 0.33) 
ATM is said to be a connection oriented technology. What does this mean and why is it necessary?

1. Cells travels through the same path to the receiver. By this, cell do not have to be rearranged.
2. Cells travels through different paths. Therefore cells can reach the receiver faster.
3. A path is reserved exclusively for one user. Arrangement of cells is not necessary 
4. Cells are transmitted using fiber optic cables. Cells would be less susceptible to errors. 
Question id : 85252     (Correct + 1.0 , Wrong - 0.33) 
Which of the following is done in the physical layer of the ATM network?

1. Cell multiplexing and demultiplexing.
2. Generic flow control
3. Transmission frame generation/recovery
4. Monitoring of the user information field for bit errors and possible corrective actions
Question id : 85253     (Correct + 1.0 , Wrong - 0.33) 
How much power (roughly) a light emitting diode can couple into an optical fiber?

1. 100 microwatts
2. 440 microwatts
3. 100 picowatts
4. 10 miliwatts
Question id : 85254     (Correct + 1.0 , Wrong - 0.33) 
Which of the following assertions is FALSE about the Internet Protocol (IP)?

1. It is possible for a computer to have multiple IP addresses
2. IP packets from the same source to the same destination can take different routes in the network
3. IP ensures that a packet is forwarded if it is unable to reach its destination within a given number of hopes
4. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way
Question id : 85255     (Correct + 1.0 , Wrong - 0.33) 
A 2 km long broadcast LAN has 107 bps bandwidth and uses CSMA/CD. The signal travels along the wire at 2 x 108 m/s. What is the minimum packet size that can be used on this network?

1. 50 bytes
2. 100 bytes
3. 200 bytes
4. None of the above
Question id : 85256     (Correct + 1.0 , Wrong - 0.33) 
Host A is sending data to host B over a full duplex link. A and B are using the sliding window protocol for flow control. The send and receive window sizes are 5 packets each. Data packets (sent only from A to B) are all 1000 bytes long and the transmission time for such a packet is 50 micro s. Acknowledgment packets (sent only from B to A) are very small and require negligible transmission time. The propagation delay over the link is 200 micro s.. What is the maximum achievable throughput in this communication?

1. 7.69 x 106 bps
2. 11.11 x 106 bps
3. 12.33 x 106 bps
4. 15.00 x 106 bps
Question id : 85257     (Correct + 1.0 , Wrong - 0.33) 
Which of the following functionalities must be implemented by a transport protocol over and above the network protocol?

1. Recovery from packet losses
2. Detection of duplicate packets
3. Packet delivery in the correct order
4. End to end connectivity
Question id : 85258     (Correct + 1.0 , Wrong - 0.33) 
Which of the following is NOT true with respect to a transparent bridge and a router?

1. Both bridge and router selectively forward data packets
2. A bridge uses IP addresses while a router uses MAC addresses
3. A bridge builds up its routing table by inspecting incoming packets
4. A router can connect between a LAN and a WAN
Question id : 85259     (Correct + 1.0 , Wrong - 0.33) 
How many 8-bit characters can be transmitted per second over a 9600 baud serial communication link using asynchronous mode of transmission with one start bit, eight data bits, and one parity bit?

1. 600
2. 800
3. 876
4. 1200
Question id : 85260     (Correct + 1.0 , Wrong - 0.33) 
A and B are the only two stations on an Ethernet. Each has a steady queue of frames to send. Both A and B attempt to transmit a frame, collide, and A wins the first backoff race. At the end of this successful transmission by A, both A and B attempt to transmit and collide. The probability that A wins the second

1. 0.5
2. 0.625
3. 0.75
4. 1
Question id : 85261     (Correct + 1.0 , Wrong - 0.33) 
Assuming that the packets are correctly delivered, how many bytes, including headers, are delivered to the IP layer at the destination for one application message, in the best case? Consider only data packets.

1. 200
2. 220
3. 240
4. 260
Question id : 85262     (Correct + 1.0 , Wrong - 0.33) 
Packets of the same session may be routed through different paths in

1. TCP, but not UDP
2. TCP and UDP
3. UDP, but not TCP
4. Neither TCP, nor UDP
Question id : 85263     (Correct + 1.0 , Wrong - 0.33) 
The address resolution protocol (ARP) is used for

1. Finding the IP address from the DNS
2. Finding the IP address of the default gateway
3. Finding the IP address that corresponds to a MAC address
4. Finding the MAC address that corresponds to an IP address
Question id : 85264     (Correct + 1.0 , Wrong - 0.33) 
maximum window size for data transmission using the selective
reject protocol with n-bit frame sequence numbers is

1. 2n
2. 2n-1
3. 2n - 1
4. 2n-2
Question id : 85265     (Correct + 1.0 , Wrong - 0.33) 
In a network of LANs connected by bridges, packets are sent from one LAN to another through intermediate bridges. Since more than one path may exist between two LANs, packets may have to be routed through multiple bridges. Why is the spanning tree algorithm used for bridge-routing?

1. For shortest path routing between LANs
2. For avoiding loops in the routing paths
3. For fault tolerance
4. For minimizing collisions
Question id : 85266     (Correct + 1.0 , Wrong - 0.33) 
The optical fibre trans-Atlantic cable TAT-14 includes a section from Bude, Cornwall to Tuckerton, New Jersey. Determine the propagation delay if the route length is 6,254 km.

1. 31.27 ms.
2. 3.198 ms
3. 31.98 ms
4. 312.7 ms
Question id : 85267     (Correct + 1.0 , Wrong - 0.33) 
A data link between the head office of a financial organization and one of its branches runs continuously at 2.048 Mbps. Between the hours of 0900 and 1700 it is noted that there are 295 bits received in error. Determine the bit error rate.

1. 2 x 10-7
2. 2 x 10-10 
3. 5 x 10-9
4. 5 x 10-8
Question id : 85268     (Correct + 1.0 , Wrong - 0.33) 
A block of data consisting of 2048 bits is transmitted between two computers interconnected by 450 m of twisted-pair wire. If the transmission rate is 34 kbps determine a, the ratio of propagation delay to transmission delay.

1. 3.76  x  10-6
2. 376 x 10-6
3. 3.76 x  10-3
4. 37.6    x   10-6
Question id : 85269     (Correct + 1.0 , Wrong - 0.33) 
The event that will not cause recalculation of the distance vector is

1. Discovery of a long path to a new destination
2. Discovery that a link to a neighbor has gone down
3. Receive a shorter path to an existing destination
4. Discovery of a longer path to an existing destination
Question id : 85270     (Correct + 1.0 , Wrong - 0.33) 
The protocol data unit (PDU) for the application layer in the Inter stack is

1. Segment
2. Datagram
3. Message
4. Frame
Question id : 85271     (Correct + 1.0 , Wrong - 0.33) 
While transmitting odd-parity coded symbols, the number of zeros in each symbol is

1. Odd
2. Even
3. A and B both
4. Unknown
Question id : 85272     (Correct + 1.0 , Wrong - 0.33) 
Which organization has authority over interstate and international commerce in the communication field?

1. ITU-T
2. IEEE
3. FCC
4. ISOC
Question id : 85273     (Correct + 1.0 , Wrong - 0.33) 
What is common between X.25 Packet switching and Fast Packet Switching

1. In both of them bandwidth is used only when there is something to transmit
2. Both supports high speed data (T1 speed and up)
3. Both supports sharing of the same channel to carry voice, data and video
4. In both of them transmit delays are low enough to handle voice traffic
Question id : 85274     (Correct + 1.0 , Wrong - 0.33) 
Which one is true about ATM and Packet Switching

1. Both ATM and Packet switching have relatively small size cells
2. Packet Switching has no windowing while ATM has
3. Both have fixed length cells
4. ATM has no error detection on data while Packet Switching has
Question id : 85275     (Correct + 1.0 , Wrong - 0.33) 
India's Ambassador to united states of America

1. Mrs. Nirupma Rao
2. Mrs. Anupma Rai
3. Pradeep Kumar
4. Randhiv Singh
Question id : 85276     (Correct + 1.0 , Wrong - 0.33) 
Which of the following is newest Nation of the World?

1. North Sudan
2. South Sudan
3. Sudan
4. Lebnan
Question id : 85277     (Correct + 1.0 , Wrong - 0.33) 
Sauli Niinisto has been recently elected as the President of

1. Sweden
2. Germany
3. Finland
4. Cheli
Question id : 85278     (Correct + 1.0 , Wrong - 0.33) 
Who was the Chief Guest of the India's 63rd Republic Day's celebrations.

1. Sheikh Hasina, Prime Minister of Bangladesh
2. Kamla Persad Bissessor, Prime Minister of Trinidad and Tobago
3. Ma-Ying-jeou. President of Taiwan
4. Mrs. Yingluk Shinawatra, Prime Minister of Thailand
Question id : 85279     (Correct + 1.0 , Wrong - 0.33) 
NRI Kamla Persad Bissessar, Prime Minister of Trinidad and Tobago has her ancestral roots in villages in;

1. Nalanda, Bihar
2. Pushkar, Rajasthan
3. Buxar, Bihar
4. Hissar, Haryana
Question id : 85280     (Correct + 1.0 , Wrong - 0.33) 
A number is smaller than its 4/3 by 17, what is the number ?

1. 51
2. 34
3. 17
4. 68
Question id : 85281     (Correct + 1.0 , Wrong - 0.33) 
All artist are whimsical.
All drug addicts are whimsical.
Some crazy people are drug addict so,

1. Some artist are drug addict.
2. Some artist are not drug addict
3. Some craxy people are whimsical
4. Some crazy people are artist.
Question id : 85282     (Correct + 1.0 , Wrong - 0.33) 
A Cow has 4 legs & a Hen has 2 legs. If there are a total of 60 legs for a group of Cows & Hens than the confirmed number of Cows & Hens in the group are :

1. 10 Cows, 10 Hens.
2. 10 Cows, 15 Hens.
3. 15 Cows, 5 Hens.
4. Data is insufficient to confirm number of Cows & Hens in the group.