Welcome to FresherFunda. Practice through Online tests here.

Saturday, July 30, 2011

NIC Exam 2008 Descriptive paper

Here is the set of descriptive questions asked in NIC Written test 2008.
1. Write short note on
a. De-fragmentation, compression and encryption
b. Open Source, Commercial Software and Freeware
c. Paging and Segmentation
d. SDLC and its stages

a. What do you understand by Complexity of Sorting Algorithms? Explain in the context of various sorting techniques.
b. Write Quick Sort Algorithm using pseudocode and verify
your code by tracing an

a. Explain final, finally, finalise, this and super in Java Context
b. Consider the following stack, where stack is allocated N = 6 memory cells
Describe the stack as the following operations take place:
c. What does chmod, vi and grep do in linux system?

a. What is Object Oriented Programming? Why is Java called portable or platform independent language?
b.Write a program(in Java or C++) to produce fibonacci numbers
F0, Fl given below. Should one use recursion or iteration for the above program and why?
Fn = 0, when n = 0
Fn = 1, when n = 1
Fn = = Fn-l + Fn-2 when n >=2
c. What is the significance of client-side and server-side validations?

a. Let a and b denote positive integers. Suppose a function Q is defined recursively as follows
Q(a,b) = 0, if a < b
Q(a,b) = Q(a-b,b) + 1, if b<=a
(i) Find the value ofQ(2,3) and Q(l4,3)
(ii) What does this function do? Find Q(5861,7).
b. Describe Method Overloading and Method Overriding.
c. Let LIST be a linked list in memory. Write a procedure which finds the number NUM of times a given ITEM occurs in LIST

6. a. Based on type of organization of data, what are different types of DBMS? Give examples of commercially available DBMS's today. b. An organization conducts training programmes (courses) for its own employees. These employees are recognized in the organization by an employee code and are placed in different specialized groups called Divisions headed by HODs (who are also employees). Design a fully normalized database, clearly indicating primary key and foreign key constraints, to store following information:
Employee Name, Employee Code, Designation, Division Name, HOD Name, Course Title (Training Programme Title), Course Start Date, Course Duration etc
Write SQL statementto generate
(i)Division wise (List of all employees in a division) with the HOD Name
(ii)List of courses attended by a particular employee
(iii)List of employees who have attended a particular training programme
c. Describe ACID in the context of DBMS.

Part I       Part II      Part III      Part IV     Part V     Part VI     Part VII

NIC Scientific Officer (Programmer) Previous paper 2008 - Part 6

26. A popular open source DBMS is _____________
Microsoft SQL 

27. An image scanner with______ software can translate a scanned text into text that can be edited.

28. A BIOS routine called ___________ , that runs whenever the system is started to determine the functioning of various parts of the computer system.
POST  setup  Diagnostics  None 

29. 176 in base 8 = _______ in base 16
7E  7D  7C  7B 

30. HTML Tag for bulletted list is ___________________
OL  UL  List  Bullet 

31. L1, L2, L3 are type of __________ memory
RAM  ROM  Cache  None of the above 

Part I       Part II      Part III      Part IV     Part V     Part VI     Part VII

NIC Scientific Officer (Programmer) Previous paper 2008 - Part 5

21. Java's multi-threading system is built upon __________ Class and ______________ interface.
Thread, Interrupt 
Parallel, Interrupt 
Thread, Runnable 
None of the above 

22. The time required by a sector to reach below the read/write head
Seek Time  Rotational Delay or Latency  Transfer time  None 

23. What will be the output of the following code snippet?

try {
int x = 0;
int y = 50/x;
System.out.println("Division by Zero is an error");
catch(ArithmeticException e) {
System.out.println("catch block");
Division by Zero is an error  catch block  Both errors  None 

24. In a select statement ______________ clause restricts the grouped rows that appear in the result.
where  join  having  on 

25. The process of mapping/initialising a disk is called ____________
Booting  Formatting  Keymapping  None of the above 

Part I       Part II      Part III      Part IV     Part V     Part VI     Part VII

Sunday, July 24, 2011

NIC Previous Paper 2008 - Scientific Officer (Programmer) - Part 4

16. An abstract method in Java can be declared as final.
True  False

17. The fields in a C++ program are by default private.
True  False

18. Java allows multiple inheritance directly.
True  False

19. A return code of 0 from a function is interpreted that there are errors during its execution.
True  False

20. When a variable is passed by reference to a procedure, the changes made to the variable are passed back to the calling procedure.
True  False

Part I       Part II      Part III      Part IV     Part V     Part VI     Part VII

NIC Scientific Officer (Programmer) Previous Paper 2008 - Part 3

Each statement below is either TRUE or FALSE. Choose the most appropriate one
11. JavaScript is an old version of Java Language.
True  False 

12. Maintenance stage in SDLC precedes Implementation
True  False 

13. Symbian is an operating system.
True  False 

14. Hotswappable hard disks requires systems to be closed and cooled before they can be removed.
True  False 

15. PHP and Perl are examples of spreadsheet packages .
True  False 

Part I       Part II      Part III      Part IV     Part V     Part VI     Part VII

Saturday, July 23, 2011

NIC Scientific Officer (Programmer) Previous paper 2008 - part 1

Question Paper for the post of Scientific Officer Engineer"SB"(Programmer District Informatics Officer)-2008
PART 1(Answer all the questions)

Each question below gives multiple choices of answers. Choose the most appropriate one.

1. A list of items, in which additions and deletions may be made at either end is known as a
Queue  Push-down stack  Deque  None of the above 

2. Reentrant code provides for
Execution of object program instruction segments by more than one process at the same time.  Improved console operations  Multiprocessing  Contiguous areas of memory for storage of program, variables, data, reference, and dynamic process history 

3. Which is not a debugging technique
Core dumps  Traces   Print Statements  Regression Testing 

4. The process of transforming a model into source code is
Reverse Engineering  Forward Engineering  Re-engineering  Re-structuring 

5. The process by which existing processes and methods are replaced by new processes and techniques is
Reverse Engineering  Business Process Re-engineering  Software Process Management  Forward Engineering 

Part I       Part II      Part III      Part IV     Part V     Part VI     Part VII

Solved Paper - NIC Scientific Officer/Engineer-SB (Programmer) 2008 - Part 2

6. init and cron are:
linux processes  DOS processes  Windows processes  None of the above

7. The differences between constructors and destructor in C++ are
constructors can take arguments but destructor can't  constructors can be overloaded but destructor can't be overloaded  both A & B  none of these

8. Use Case is a:
case in case/switch statement in a programming language  a part of use case diagram, a modeling element  special case in legal cases in computer industry  None of the above

is a system variable naming the list of directories required to be searched for finding the commands to be executed  is a path to be followed in finding Critical Path Method in Pert/CPM techniques  is a system variable naming the list of directories required to be searched for finding a class  None of the above

10. When a language has the capability to produce new datatype, it is called
Extensible  Overloaded  Encapsulated  Reprehensible

Part I       Part II      Part III      Part IV     Part V     Part VI     Part VII

National Informatics Centre (NIC) Recruitment - Scientific Officer/Engineer-SB (Programmer) Post

National Informatics Centre (NIC), a premier IT organization of Government of India invites young IT professionals to join its ranks to take up challenging assignment in the domain of e-Governance.

Vacancy Details:

Post - Vacancy - Payscale
Scientific Officer/Engineer-SB (Programmer) - 62 Posts - Rs.33,439/- P.M.(approx)

Important Dates:

Apply Online : 16/07/2011 to 05/08/2011
Last Date for Edit of Online applicatuon : 05/08/2011
Last Date for Reprint of Online applicatuon : 05/08/2011
Eritten or Online Exam : 04/09/2011
Personal Interview Starts from : 17/10/2011

Job Description / Requirements:

Design, development, implementation and maintenance of
software and systems for various Government Departments / Organizations. Technical support
to various areas relating to Data Centre Management, such as System Administration, Database
Administration, Storage Systems Management, Networking, Data Security etc.

Educational Qualification:

(a) B.E./B.Tech/MCA with first class or minimum 60% marks in aggregate or equivalent
and specialization in Computer Science/Computer related areas;
(b) M.Sc in Computer Science with first class or at least 60% marks or equivalent;
(c) Master’s degree in Physics/Maths/Statistics/Operation Research with either Post
Graduate Diploma in Computer Science from a Govt. recognized institution/University
or at least three years of experience in the areas indicated under Job Description is
essential. The Master’s degree and Post Graduate Diploma should be with minimum
60% marks in aggregate or equivalent grade.

Age limit:

18-30 years as on last date of receipt of applications.

Selection Procedure:

The selection will be made on the basis of written or Online test and the Personal Interview.

Application Fee:


Procedure to Apply:

Apply online in NIC website.


Visit the NIC website for complete advertisement and apply application at http://recruitment.nic.in/index.php#

  © Blogger templates Palm by Ourblogtemplates.com 2008

Back to TOP