Assessments

 

Top draw inspiration, I suggest taking a look @Steve Yegge’s post about “Getting that Job at Google”- http://steve-yegge.blogspot.in/2008/03/get-that-job-at-google.html

How to Crack Face to Face Interviews?

The major focus area during Face to Face Interviews for any campus recruit is to assess the Soft Skills as well as Technology Fundamentals Skills. Check out few sample assessments to evaluate yourselves with respect to industry benchmarks and improve your knowledge and skills.

Soft Skills

You will receive a bunch of questions similar to the ones below.

Technology Skills – Web Application Engineering

Fundamentals

PHP

1. Which type of translator is used by PHP?

  1. Compiler
  2. Interpreter
  3. IDE
  4. None of the above

2. PHP is a scripting language which is of type _____________.

  1. client-side
  2. server-side
  3. Both of the above
  4. None of the above

3. “% “in PHP is a _____________.

  1. Percentage operator
  2. Division operator
  3. Modulus operator
  4. None of the above

4. $_POST in PHP is a/an _____________.

  1. Associative array
  2. Method
  3. Function
  4. None of the above

5. Character given with fopen function to append data is _____________.

  1. a
  2. w
  3. r
  4. None of the above

Answer: 1 (B), 2 (B), 3 (C), 4 (A), 5 (A)

PHP5

Core Java

1. Which two create an instance of an array? (Choose two.)

  1. int[ ] ia = new int[15];
  2. float fa = new float[20];
  3. char[ ] ca = “Some String”;
  4. Object oa = new float[20];

2. Given below is a programme,

public class ArrayTest {
public static void main(String[ ] args){
float f1[ ], f[ ];
f1 = new float[10];
f = f1;
System.out.println(“f[0] = ” + f[0]);
} }

What is the result?

  1. It prints f2[0] = 0.0
  2. It prints f2[0] = NaN
  3. An error at ‘f2 = f1;’ causes compile to fail.
  4. An error at ‘System.out.println(“f2[0] = ” + f2[0]);’ causes compile to fail.

3. Which two cause a compiler error? (Choose two.)

  1. int[ ] scores = {3, 5, 7};
  2. int [ ][ ] scores = {2,7,6}, {9,3,45};
  3. String cats[ ] = {“Fluffy”, “Spot”, “Zeus”};
  4. boolean results[ ] = new boolean [3] {true, false, true};

4. Which three form part of correct array declarations? (Choose three.)

  1. public int a [ ]
  2. static int [ ] a
  3. public [ ] int a
  4. public final int [ ] a

5. Which two cause a compiler error? (Choose two.)

  1. float[ ] f = new float(3);
  2. float f2[ ] = new float[ ];
  3. float[ ]f1 = new float[3];
  4. float f3[ ] = new float[3];

Answer: 1 (A, D), 2 (A), 3 (B,D), 4 (A,B,D), 5 (A,B)

ASP.Net

1. Which control is not supported by ASP.Net?

  1. TextBox
  2. Drop Down List
  3. Label
  4. DateTimePicker

2. What are the full form of CRUD?

  1. Create, Return, Update, Delete
  2. Create, Return, Update, Drop
  3. Create, Remove, Update, Drop
  4. Create, Retrive, Update, Delete

3. Which Template is used in List View to display data?

  1. DisplayItemTemplate
  2. DataTemplate
  3. ListTemplate
  4. ItemTemplate

4. Where do you set authentication mode in the ASP.NET application?

  1. You can set authentication mode using weB.config file
  2. You can set authentication mode using global.asax file
  3. You can set authentication mode using cookies
  4. You can set authentication mode using Web Service

5. What is the structure of exception handling?

  1. Try, Finally and Catch
  2. Try, Catch and Finally
  3. Catch, Try and Finally
  4. Catch, Finally and Try

Answer: 1 (D), 2 (D), 3 (D), 4 (A), 5 (B)

Drupal

1. What does this mean 5.x-1.0-dev?

  1. A nightly development snapshot (“-dev”) of a stable release (major revision 1) of a module compatible with any version of Drupal core 5.*.
  2. A nightly development snapshot (“-dev”) of a stable release (major revision 1) of a module compatible with any version of Drupal core 5.0
  3. A nightly development snapshot (“-dev”) of a stable release (major revision 1) of a module compatible with any version of Drupal core 5
  4. A nightly development snapshot (“-dev”) of a stable release (major revision 1) of a module compatible with any version of Drupal core 5 and higher

2. Which file is extracted and should be changed after the TAR file extraction at first?

  1. Settings.php
  2. Change default.settings.php to settings.php
  3. None of the above
  4. Both A and B

3. CHMOD is used for?

  1. Permission changes
  2. Cron Job setup
  3. Cron Modification
  4. Daemon Job Setup

4. What does <? echo count (“143”) ?> print out?

  1. 3
  2. False
  3. Null
  4. 0

5. How many types of users are there in Drupal?

  1. Admin, Anonymous user, Authenticated User
  2. Super User, Admin, Anonymous user, Authenticated User, Database User
  3. Admin, Anonymous user, Authenticated User
  4. Database User

Answer: 1 (A), 2 (D), 3 (A), 4 (D), 5 (B)

Software Testing

1. Analyze the following highly simplified procedure:

  1. Ask: “What type of ticket do you require, single or return?”
    IF the customer wants, return”
    Ask: “What rate, Standard or Cheap-day?”
    IF the customer replies, Cheap-day”
    Say: “That will be £11:20”
    ELSE
    Say: “That will be £19:50”
    ENDIF
    ELSE
    Say: “That will be £9:75”
    ENDIF

Now decide the minimum number of tests that are needed to ensure that all the questions have been asked, all combinations have occurred and all replies given.

  1. 3
  2. 4
  3. 5
  4. 6

2. Which of the following characterizes the cost of faults?

  1. They are cheapest to find in the early development phases and the most expensive to fix in the latest test phases.
  2. They are easiest to find during system testing but the most expensive to fix then.
  3. Faults are cheapest to find in the early development phases but the most expensive to fix then.
  4. Although faults are most expensive to find during early development phases, they are cheapest to fix then.

3. What is the main difference between a walkthrough and an inspection?

  1. An inspection is lead by the author, whilst a walkthrough is lead by a trained moderator.
  2. An inspection has a trained leader, whilst a walkthrough has no leader.
  3. Authors are not present during inspections, whilst they are during walkthroughs.
  4. A walkthrough is lead by the author, whilst an inspection is lead by a trained moderator.

4. The process starting with the terminal modules is called

  1. Top-down integration
  2. Bottom-up integration
  3. None of the above
  4. Module integration

5. How much testing is enough

  1. This question is impossible to answer
  2. The answer depends on the risks for your industry, contract and special requirements
  3. The answer depends on the maturity of your developers
  4. The answer should be standardized for the software development industry

Answer: 1 (A), 2 (A), 3 (D), 4 (B), 5 (B)

HTML Designer

1. XHTML standard came before HTML 4.0

  1. True
  2. False
  3. Can not say
  4. None

2. XHTML standard came before HTML 5.0

  1. True
  2. False
  3. Can not say
  4. None

3. All elements should have a closing tag

  1. True
  2. False
  3. Can not say
  4. None

4. meta attribute is used in body element

  1. True
  2. False
  3. Can not say
  4. None

5. <title> tag is used to give headings of body elements

  1. True
  2. False
  3. Can not say
  4. None

Answer: 1 (B), 2 (A), 3 (B), 4 (B), 5 (B)

iPhone

1. Xcode is a/an ____________.

  1. Compiler
  2. IDE
  3. Interpreter
  4. None of the above

2. Bonjour is an component of ____________.

  1. Media
  2. Core OS
  3. Core Services
  4. None of the above

3. “.xib” extension files define ____________.

  1. superclass method
  2. init method
  3. UI
  4. None of the above

4. In utility applications, every “.xib” file is represented by ____________.

  1. View and view controller
  2. View and Icon
  3. View and Image
  4. None of the above

5. In table view, insertion of a cell in a particular location is done by ___________.

  1. tableView:cellForRowAtIndexPath: event
  2. tableView:cellForCellAtIndexPath: event
  3. tableView:cellForInsertAtIndexPath: event
  4. None of the above

Answer:1 (B), 2 (B), 3 (C), 4 (A), 5 (A)

J2ME

1. Eclipse is an ____________.

  1. Compiler
  2. IDE
  3. Interpreter
  4. None of the above

2. The Application Descriptor file has an extension of _______________.

  1. adf
  2. jad
  3. jdf
  4. None of the above

3. Which interface denotes different types of List by constant?

  1. Select
  2. Option
  3. Choice
  4. None of the above

4. Which class of Game API provides methods for animation and key polling?

  1. GameCanvas
  2. GameRender
  3. GamePoll
  4. None of the above

5. The Game API in the javax.microedition.lcdui.game package is composed of how many classes?

  1. Five
  2. Four
  3. Three
  4. None of the above

Answer: 1 (B), 2 (B), 3 (C), 4 (A), 5 (A)

MongoDB

1. MongoDB is _________________.

  1. Object-oriented DBMS
  2. Document-oriented DBMS
  3. Relational DBMS
  4. None of the above

2. MongoDB is a schema-less design.

  1. True
  2. False

3. JSON stands for _________________.

  1. JavaScript Object Naming
  2. JavaScript Object Notice
  3. JavaScript Object Notation
  4. None of the above

4. ‘mongoimport’ command is used for _________________.

  1. Batch data insertion
  2. Multiple command import
  3. Multiple command insertion
  4. None of the above

5. ‘$set’ sets the value of _________________.

  1. Key
  2. Code block
  3. Name/value pair
  4. None of the above

Answer: 1 (B), 2 (A), 3 (C), 4 (A), 5 (A)

Facebook Apps

1. RSS means _______________.

  1. Readable SAX Synchronization
  2. Really Simple Syndication
  3. Rapid Secured Syndication
  4. None of the above

2. Authorization used by facebook is _________________.

  1. LDAP
  2. OAuth
  3. Kerberos
  4. None of the above

3. In facebook, users of your page are informed of new data by ______________

  1. Link status
  2. Page updates
  3. Counter Notifications
  4. None of the above

4. JSON stands for ___________.

  1. Javascript Object Notation
  2. Javascript Object Namespace
  3. Javascript Object Native
  4. None of the above

5. The method used by facebook graph API to access data is ____________.

  1. FB.api
  2. FB.access
  3. FB.api.access
  4. None of the above

Answer: 1 (B), 2 (B), 3 (C), 4 (A), 5 (A)

Twitter Apps

1. RSS means _______________.

  1. Readable SAX Synchronization
  2. Really Simple Syndication
  3. Rapid Secured Syndication
  4. None of the above

2. Authorization used by twitter is _________________.

  1. LDAP
  2. OAuth
  3. Kerberos
  4. None of the above

3. In twitter, the simplest type of twitter application is ______________

  1. Client-server application
  2. Mashup
  3. Widget
  4. None of the above

4. JSON stands for ___________.

  1. Javascript Object Notation
  2. Javascript Object Namespace
  3. Javascript Object Native
  4. None of the above

5.The request method used by twitter for access to user details data is ______________.

  1. GET
  2. PUT
  3. ACCESS
  4. None of the above

Answer: 1 (B), 2 (B), 3 (C), 4 (A), 5 (A)

PL SQL

1. SQL expands to _____________.

  1. Simplified Query Language
  2. Structured Query Language
  3. Specific Query Language
  4. None of the above

2. CLOB is usually used to store ______________.

  1. Video
  2. Text Data
  3. Audio
  4. None of the above

3. ODBC means _______________.

  1. Open Discrete Connectivity
  2. Open Database Connection
  3. Open Database Connectivity
  4. None of the above

4. The LN function is ____________.

  1. Built-in function
  2. RPC call name
  3. Named pipe call
  4. None of the above

5. The INSTEAD OF trigger acts on _________.

  1. View
  2. Table
  3. Database
  4. None of the above

Answer: 1 (B), 2 (B), 3 (C), 4 (A), 5 (A)

Cloud Computing

1. The term API refers to _______________.

  1. Application programmable interface
  2. Application programming interface
  3. Application programming interconnect
  4. None of the above

2. In cloud service model PaaS is based on ________________.

  1. SaaS
  2. IaaS
  3. TaaS
  4. None of the above

3. The term VPN expands to ______________.

  1. Viral private network
  2. Virtual public network
  3. Virtual private network
  4. None of the above

4. The software framework by Google for distributed computing on large data sets is _______________.

  1. Mapreduce
  2. Cassandra
  3. MongoDB
  4. None of the above

5. Apache Hadoop is written in which programming language?

  1. Java
  2. PHP
  3. Python
  4. None of the above

Answer: 1 (B), 2 (B), 3 (C), 4 (A), 5 (A)

HTML5

1. HTML 5.0 is a sequel to ________________.

  1. XHTML 1.0
  2. HTML 4.0
  3. XHTML 1.1
  4. None of the above

2. SVG means _______________.

  1. Scalable Vector Graphics
  2. Scalable Vector Graph
  3. Scaled Vector Graphics
  4. None of the above

3. Canvas in HTML 5.0 is a ___________.

  1. List Element
  2. Element
  3. Styling attribute
  4. None of the above

4. Transformations are applied in HTML 5 by using _____________.

  1. transform
  2. canvas
  3. change
  4. None of the above

5. The rendering engine of firefox is ______________.

  1. Prince
  2. Gecko
  3. Mozilla
  4. None of the above

Answer: 1 (B), 2 (A), 3 (B), 4 (B), 5 (B)

XML 

1. The term SOAP expands to _____________.

  1. A. Simple Object Access Process
  2. Simple Object Access Protocol
  3. Simple Object Accessible Protocol
  4. None of the above

2. The tags in an XML documents are defined by _____________.

  1. Parser
  2. Author
  3. DTD
  4. None of the above

3. The XPath function used to count nodes is _____________.

  1. counting
  2. cnt
  3. count
  4. None of the above

4. An empty element is defined by adding which characters in it’s tag _____________.

  1. EMPTY
  2. NULL
  3. VOID
  4. None of the above

5. RSS stands for _____________.

  1. Really Simple Syndication
  2. Really Simple Synchronization
  3. Rapid Simple Syndication
  4. None of the above

Answer: 1 (B), 2 (B), 3 (C), 4 (A), 5 (A)

Ethical Hacking and Security

1. The term DDoS expands to _______.

  1. Divisive Denial of Service
  2. Distributed Denial of Service
  3. Detailed Denial of Service
  4. None of the above

2. The software Metasploit is used for _______.

  1. Anti-virus
  2. Vulnerability Assessment
  3. Anti-malware
  4. None of the above

3. The term XSS refers to _______.

  1. eXtended Site Scripting
  2. eXtreme Secured Services
  3. Cross site scripting
  4. None of the above

4. The tool OllDbg is used for analyzing code for which operating system _______.

  1. Microsoft Windows
  2. Linux
  3. Macintosh
  4. None of the above

5. The operating system back track is used for _______.

  1. Penetration testing
  2. Virus scanning and removal
  3. Malware scanning and removal
  4. None of the above

Answer: 1 (B), 2 (B), 3 (C), 4 (A), 5 (A)

Network Security

1. The term TLS expands to ________________.

  1. Transport Level Security
  2. Transport Layer Security
  3. Transport Layer Setting
  4. None of the above

2. The cipher in which each letter is replaced by another letter is called _________.

  1. Transposition
  2. Substitution
  3. Hash convert
  4. None of the above

3. The Diffie-Hellman algorithm is used for ____________.

  1. Key deletion
  2. Key generation
  3. Key exchange
  4. None of the above

4. The term S/MIME refers to  ____________.

  1. Secure/Multipurpose Internet Mail Extensions
  2. Secure/Multipurpose Internet Media Extensions
  3. Secure/Multipurpose Internet Multimedia Extensions
  4. None of the above

5. The port used by HTTPS protocol is ____________.

  1. 443
  2. 80
  3. 21
  4. None of the above

Answer: 1 (B), 2 (B), 3 (C), 4 (A), 5 (A)

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s