# Microsoft Algorithms and Programming Paper 2014

Posted on :01-02-2016 (Algorithm And Programming) Set -1:-Algorithms and ProgrammingQ1. Given a rectangular (cuboidal for the puritans) cake with a rectangular piece removed (any size or orientation), how would you cut the remainder of the cake into two equal halves with one straight cut of a knife ?Q2. Youre given an array containing both positive […]

# Microsoft Technical Question paper

Posted on :01-02-2016 Q1. If you are on a boat and you throw out a suitcase, Will the level of water increase.Q2. Print an integer using only putchar. Try doing it without using extra storage.Q3. Write C code for (a) deleting an element from a linked list (b) traversing a linked listQ4. What are various […]

# Microsoft Technical Questions on 29th January 2012

Posted on :01-02-2016 MICROSOFT PAPER ON 29th JANUARY at Ohio College of Technological Studies:-Q1) Coldest planet: PlutoQ2) INS Shivali is the first:Q3) Which one of the following was NOT indegineously developed?Prithvi/Akash/AgniQ4) Full form of SARSQ5) Anthrax is a :Virus/Bacteria/…/…Q6) Dakshina Gangothri is:Gangas origin/Indian camp @ antartica/…/…Q7) Which of the following is a chemical weapon:Mustard Gas/Marsh […]

# Microsoft Paper on 5th september 2008

Posted on :01-02-2016 Q1. Find the output of the following program segment#includechar *c[]={ENTNG, NST, AMAZI, FIBRE};char** cp[]={c+3, c+2, c+1, c};char ***cpp= cp;void main() {printf(%s, **++cpp);printf(%s, *–*++cpp+3);printf(%s ,*cpp[-2]+3);printf(%s,cpp[-1][-1]+1);         }Q2. Write a function delete(struct node** Head) to delete the linked list node by node by de allocating them from the memory and at the […]

# Microsoft Databases Questions-2nd August 2006, Warangal

Posted on :01-02-2016 Networks and Security:-Q1. How do you use RSA for both authentication and secrecy?Q2. What is ARP and how does it work?Q3. Whats the difference between a switch and a router?Q4. Name some routing protocols? (RIP,OSPF etc..)Q5. How do you do authentication with message digest(MD5)? (Usually MD is used for finding tampering of data)Q6. […]