Recruitment question paper for McAfee

Jan 4 • Placement • 1228 Views • No Comments on Recruitment question paper for McAfee

Recruitment question paper for McAfee

one puzzle like there are 6 members in a family n they are teacher, student, engineer, lawyer, docter and housewife.
2 is mother of 3 who is a teacher
4 is Grand mother of 3 that is a house wife.
3 is sister of 1
6 is father of 1 that is doctor
and 5 is lawyer father of 6

Q1- who is student
Q2- who is engineer.
Q3- who is a girl in the family.
Q4- sum of the no between 1 to 100 divisible by 2 and 5.
ans 550

Q5- some question were from English series as which will be next
ADEHI …. and is LM
Q6- some were from probability.
as 2 dice are thrown and probabily of coming some more than 8.
some question were from reasoning….

and in last there was technical question from DS, VB and .Net as
1- the size of text box.
2- the size of msg box
3- what operator used to compare two string
4- DIM i, j means … variant i, and variant j

Technical question paper of McAfee(Hyderabad)
1) Unix file allocation strategy

2) Functions return address is stored in

3) http default port

4) Internal fragmenttation occurs due to

5) Virtual memory is implemented in

6) Reliable connection oriented protocol

7) Java generates

8) Java is a

9) Which language is used extensively on internet

10) Unix scheduling policy

11) Framing is concept in

12) Routing is main principle of which layer

13) Fork creates how many child processes and how many parent processes

14) Internet control protocol

15) Dynamic data structures are allocated using which memory

16) Primary key allows which values

17) Normalization avoids

18) Oracle uses which data model

19) Risc architecture uses

20) Pentium processor uses which architecture

21) Which os uses client server technology

22) int,intr, which of the interrupts are highly prioritized

23) Nin mark able interrupt

24) rst 7.5 address

25) Which protocol requires web client and web server

26) Which is the universal gate

27) Demorgan law

28) Identify xor operations

29) Xor equation

30) Context switching stores address in which area

31) Define operating system

32) Stack follows

33) Interrupt checking in an operating system is done during which phase

34) Pointers are not used in which language

35) Object is an

36) Process is a

37) Which of the following instructions are executed by os mov,in , out

38) One problem on cyclic redundancy code

39) C impleamts parameter passing mechanism in

40) In a multi threaded environment each thread maintains a seperate

Tell us Your Queries, Suggestions and Feedback

Your email address will not be published. Required fields are marked *

« »