Amazon Technical question Paper 2010

Amazon Technical question Paper 2010Amazon Technical question Paper 2010.

Amazon Technical question Paper 2010 Placement Papers.

Amazon Job 2010 Placement Technical question paper with answers Amazon 2010 Technical question with solution you can download it in FREE, if Amazon  2010 test paper in text or pdf for Amazon 2010 Answer Keys you can download Amazon for fresher  MBA/ B.Tech / M.Tech 2010 page also just Go to menu bar, Click on File->then Save.

Amazon Campus 2010 exam recruitment Technical question paper Free Download PDF is available in www.oldquestionpapers.net which has been provided by many students Amazon Placement paper for 2010 paper is available for all the students in FREE and also Amazon Placement Technical question paper for fresher  B.Tech MCA 2010 fully solved Amazon 2010 with answer keys and solution.

Amazon Technical question Paper 2010

You can get daily updates on Amazon Campus 2010 from www.oldquestionpapers.net here you can also check similar links for other related study materials on Amazon Here Amazon  Placement Technical question bank 2010.

 

The worst case time complexity of  AVL tree is better in comparison to  binary search tree for
(A) Search and Insert Operations
(B) Search and Delete Operations
(C) Insert and Delete Operations
(D) Search, Insert and Delete
Operations

The GSM network is divided into the following three major systems :
(A) SS, BSS, OSS
(B) BSS, BSC, MSC
(C) CELL, BSC, OSS
(D) SS, CELL, MSC

The ‘C’ language is
(A) Context free language
(B) Context sensitive language
(C) Regular language
(D) None of the above

The Mobile Application Protocol  (MAP) typically runs on top of which  protocol ?
(A) SNMP (Simple Network  Management Protocol)
(B) SMTP (Simple Mail Transfer  Protocol)
(C) SS7 (Signalling System 7)
(D) HTTP (Hyper Text Transfer  Protocol)

If a packet arrive with an M-bit value  is ‘l’ and a fragmentation offset value  ‘0’, then it is ______ fragment.
(A) First
(B) Middle
(C) Last
(D) All of the above

The number of bit strings of length  eight that will either start with a 1 bit  or end with two bits 00 shall be
(A) 32
(B) 64
(C) 128
(D) 160

In compiler design ‘reducing the  strength’ refers to
(A) reducing the range of values of  input variables.
(B) code optimization using cheaper  machine instructions.
(C) reducing efficiency of program.
(D) None of the above

 

In DML, RECONNCT command  cannot be used with  
(A) OPTIONAL Set
(B) FIXED Set
(C) MANDATOR Set
(D) All of the above

Coaxial cables are categorized by  Radio Government rating are adapted  for specialized functions. Category RG-59 with impedance 75  used for
(A) Cable TV
(B) Ethernet
(C) Thin Ethernet
(D) Thick Ethernet

 T is a graph with n vertices. T is connected and has exactly n-i edges, then is a tree
(B) T contains no cycles
(C) Every pairs of vertices in T is connected by exactly one path All of these

 Data members and member function of a class by default is receptively
(A) private and public (B) public
(C) public and private (D) private

 Function over loading done at
(A) Runtime (B) Compile time
(C) Linking time (D) Switching from function to function

 A schema describes
(A) data elements (B) records and files
(C) record relationship (D) all of the above

 A locked file can be:
(A) accessed by only one user
(B) modified by users with the correct password
(C) is used to hide sensitive information
(D) both (B) and (C)

 Similar Pages…

See Also……