SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
New Page 1                                                   Page 1 of 4




 ******************************GSSL********* I SUPPOSE****

 1) YOU SHOULD LEARN POINTERS(they may ask in I.W)
 2)****SHOULD LEARN C++(this is very very IMP,Based
 on this only I got job.One more thing is
 CLASS,INHERATENCI&POLYMORPHISM is sufficient)
 3)YOU SHOULD PREPARE ONE FEM PROJECT AND TELL THEM
 THAT AS YOUR OWN WORK(This will increase chance
 to 99%)
 EASI-TECH
 WRITTEN TEST PATTERN
 --------------------
 1] C TEST 10Q 20MINUITS
 2]F E M TEST 19Q 20MINUITS
 3]APTITUDE TEST 15Q 20MINUITS
 -----------------------------
 F E M TEST
 ----------
 1)WHO USED THE TERM FINITE ELEMENT FOR THE FIRST TIME?
 a)
 b)
 c) CLOUGH
 2)DERIVE THE JACOBIEN |J| FOR BEAM ELEMENT WITH STRAIN
 ENERGY?
 (ANS:PROMLEM IS NOT CORRECT PLEASE DO NOT ATTEMPT)
 3)FOR AN ELEMENT SIGMA Ni=1,WHICH TYPE OF ELEMENT IT IS?
 a)
 b)NATURAL CO-ORDINATE
 (ANS 100% CORRECT)
 4)TIMOSHENKO BEAM ELEMENT THEORY TO CONSIDER -- - - -?
 a)
 b)
 c)SHEAR DEFORMATION
 5)SHEAR LOCKING - - - - ?
 (ANS IS VERY STIFF 'K')
 6)MEMBRANE LOCKING
 (ANS IS ARCH ELEMENT)
 7)Ex(epsiolan x)=dU/dX,Ey=dV/dY,r(X,Y)=?(gama(x,y)=?)
 (ANS IS dU/dY+dV/dX )
 8)K=integral B(TRANSPOSE)*D*B FOR LARGE DEFORMATION
 WHICH MATRIX WILL GET EFFECTED?
 (ANS IS D matrix )100%correct
 9)FOR PLANE STRAIN f(Ex,Ey,Ez,r(x,y) ) - - -
 (ANS IS Ez=0)
 10)SERENDIPITY ELEMENT IS
 (ANS 8 NODED ELEMENT)
 (The element which is having nodes only on boundary is
 called SERENDIPITY element)
 11)IF THE ROTATION OF ELEMENT AND THE DISPLACEMENT ABOUT
 N-A IS SAME THEN THE ORDER OF CONTINUITY
 (ANS IS C1)




file://E:freshersaptitude testsggssl.htm                    7/30/03
New Page 1                                                                   Page 2 of 4



 12)FRONTAL THEORY IS APPLIED FOR
 (Please refer any fem book)
 13)MINDLINS THEORY IS APPLIED FOR
 c) this is the answer(Both Co&C1problems)
 14)X=SigmaNi*Xi,U=sigmaNi*Ui WHICH TYPE OF ELEMENT
 (Refer book)
 15)BEAM SUBJECTED TO UDL FIND THE MOMENTS AT THE
 2 NODES
 16)Integral B(Transpose)*sigma(here sigma means stress)*dV
 REPRESENTS?
 (ANS IS INTERNAL LOAD VECTOR)
 17)Integral ET(epsiolan transpose)*sigma*dV
 P=strain displacement vector
 Q=stress-strain deformation
 Find [K]
 (ANS [K]=[P]T(p transpose)*[Q]*[P] )
 18)
 19)


 REMEMBER ORDER MAY NOT BE CORRECT


 APTITUDE TEST
 1)33 1/3 of 101 + 296 is
 (ans 1200) check
 2)0.625= ? (ans 27/40)
 3)One ship goes along the stream direction 28 km and in opposite
 direction 13 km in 5 hrs for each direction.What is the velocity
 of stream?
 (ans 1.5 kmph)
 4)Cubic root of 3375=?
 (ans 15)
 5)2020201-565656=?
 (ans 1454545)
 6)CHAIRS PROBLEM
 5 chairs=9 tables,12 tables = 7 stools likethat- - -
 (ans is 80Rs)
 7)One clock ringes 7 O'clock in 7 sec.In how many seconds it will
 ring 10 O'clock.
 (ans 10.5 sec)
 8)One watch is showing 30 past 3 .What is the angle between minutes &
 hours hand?
 (ans 75 degrees)
 9)The average of 4 consecutive even numbers is 27. What is the largest
 number?
 (ans 30)
 10) 25 stations ,24 stations are inbetween- - - - -
 how many tickets should be required.
 (ans 25*24=600)PUZZLES TO PUZZLE YOU "S.DEVI"PROB 24
 11)One ball was dropped from 8ft height and every time it goes half
 of the height. How much distance it will travell before coming to
 rest.




file://E:freshersaptitude testsggssl.htm                                    7/30/03
New Page 1                                                            Page 3 of 4



 (ans 24 approximately)
 12)Two trains are travelline at equilateral .Train A is travelling
 in the direction of earths spin.Other train B is travelling in
 opposite direction of earths spin.Which trains wheels will wear
 first?and why?
 (ans TRAIN B .Because of less centrifugal force.)




 OK HARI 3 MORE QUES ARE THERE.I HOPE YOU CAN SOLVE EASILY.
 NOW I have only 3 C ques. I am sendins them in immediate
 mail. Any whey I will try to send remaining 7 C ques
 before 20th.



 C QUESTIONS:WHAT IS THE OUT PUT FOR FOLLOWING PROGRAMMS
 1)main()
 {
 char a[2];
 *a[0]=7;
 *a[1]=5;
 printf("%d",&a[1]-a)
 ANS:
 ans may be 1.(illegal initialization)
 2)
 #include<stdio.h>
 main(){
 char a[]="hellow";
 char *b="hellow";
 char c[5]="hellow";
 printf("%s %s %s ",a,b,c);
 printf(" ",sizeof(a),sizeof(b),sizeof(c));
 }
 (ans is hellow,hellow,hellow
 6,2,5 )
 3)
 #include<stdio.h>
 main()

 float value=10.00;
 printf("%g %0.2g %0.4g %f",value,value,value,value)
 }
 (ans is 10,10,10,10.000000)
 4)
 #include<stdio.h>
 void function1;
 int i-value=100;
 main()
 {
 i-value=50;
 function1;




file://E:freshersaptitude testsggssl.htm                             7/30/03
New Page 1                                                  Page 4 of 4



 printf("i-value in the function=",i-value);
 printf("i-value after the function=",i-value);
 }
 printf("i-value at the end of main=",i-value);
 functioni()
 i-value=25;


 THIS IS ROUGH IDEA OF THE PROGRAM
 ANS ARE
 1)i-value in the function=25;
 2)i-value after the function=50;
 3)i-value at the end of the main=100;

 5)
 main()
 {
 funct(int n);
 {
 switch(n)
 case1:
 m=2;
 break;
 case2:
 m=5;
 break;
 case3:
 m=7;
 break;
 default:
 m=0;
 }
 THIS IS ROUGH IDEA:
 (ANS:Out put is m=0)

 REMAINING 5 PROGRAMS SOME WHAT LARGE AND COMPLICATED.




file://E:freshersaptitude testsggssl.htm                   7/30/03

Contenu connexe

Tendances

Tarea De Scilab By Sebastian Vasquez
Tarea De Scilab By Sebastian VasquezTarea De Scilab By Sebastian Vasquez
Tarea De Scilab By Sebastian VasquezSebastian Vasquez
 
Linked list int_data_fdata
Linked list int_data_fdataLinked list int_data_fdata
Linked list int_data_fdataSamsil Arefin
 
Minimum cost maximum flow
Minimum cost maximum flowMinimum cost maximum flow
Minimum cost maximum flowSaruarChowdhury
 
Lesson 5 Nov 3
Lesson 5 Nov 3Lesson 5 Nov 3
Lesson 5 Nov 3ingroy
 
Intermediate Macroeconomics
Intermediate MacroeconomicsIntermediate Macroeconomics
Intermediate MacroeconomicsLaurel Ayuyao
 
Butterfly Counting in Bipartite Networks
Butterfly Counting in Bipartite NetworksButterfly Counting in Bipartite Networks
Butterfly Counting in Bipartite NetworksSeyed-Vahid Sanei-Mehri
 
ConfigCrusher: White-Box Performance Analysis for Configurable Systems
ConfigCrusher: White-Box Performance Analysis for Configurable SystemsConfigCrusher: White-Box Performance Analysis for Configurable Systems
ConfigCrusher: White-Box Performance Analysis for Configurable SystemsMiguel Velez
 
Simulador carrera de caballos desarrollado en C++
Simulador carrera de caballos desarrollado en C++Simulador carrera de caballos desarrollado en C++
Simulador carrera de caballos desarrollado en C++Santiago Sarmiento
 
Lecture 7 Derivatives
Lecture 7   DerivativesLecture 7   Derivatives
Lecture 7 Derivativesnjit-ronbrown
 
Quinto Punto Parte B
Quinto Punto Parte BQuinto Punto Parte B
Quinto Punto Parte Bgustavo206
 
Derivative Flashcards Final
Derivative Flashcards FinalDerivative Flashcards Final
Derivative Flashcards Finaljadunn
 
グラム行列のスパース近似を用いた生成的モーメントマッチングネットに基づく音声合成の検討
グラム行列のスパース近似を用いた生成的モーメントマッチングネットに基づく音声合成の検討グラム行列のスパース近似を用いた生成的モーメントマッチングネットに基づく音声合成の検討
グラム行列のスパース近似を用いた生成的モーメントマッチングネットに基づく音声合成の検討Tomoki Koriyama
 

Tendances (20)

week-5x
week-5xweek-5x
week-5x
 
bitman.c
bitman.cbitman.c
bitman.c
 
Tarea De Scilab By Sebastian Vasquez
Tarea De Scilab By Sebastian VasquezTarea De Scilab By Sebastian Vasquez
Tarea De Scilab By Sebastian Vasquez
 
Semi vae memo (2)
Semi vae memo (2)Semi vae memo (2)
Semi vae memo (2)
 
Lambda calculus
Lambda calculusLambda calculus
Lambda calculus
 
Linked list int_data_fdata
Linked list int_data_fdataLinked list int_data_fdata
Linked list int_data_fdata
 
Minimum cost maximum flow
Minimum cost maximum flowMinimum cost maximum flow
Minimum cost maximum flow
 
Lesson 5 Nov 3
Lesson 5 Nov 3Lesson 5 Nov 3
Lesson 5 Nov 3
 
Intermediate Macroeconomics
Intermediate MacroeconomicsIntermediate Macroeconomics
Intermediate Macroeconomics
 
Butterfly Counting in Bipartite Networks
Butterfly Counting in Bipartite NetworksButterfly Counting in Bipartite Networks
Butterfly Counting in Bipartite Networks
 
ConfigCrusher: White-Box Performance Analysis for Configurable Systems
ConfigCrusher: White-Box Performance Analysis for Configurable SystemsConfigCrusher: White-Box Performance Analysis for Configurable Systems
ConfigCrusher: White-Box Performance Analysis for Configurable Systems
 
Maximum flow
Maximum flowMaximum flow
Maximum flow
 
Simulador carrera de caballos desarrollado en C++
Simulador carrera de caballos desarrollado en C++Simulador carrera de caballos desarrollado en C++
Simulador carrera de caballos desarrollado en C++
 
Lecture 7 Derivatives
Lecture 7   DerivativesLecture 7   Derivatives
Lecture 7 Derivatives
 
Recursion in C
Recursion in CRecursion in C
Recursion in C
 
Quinto Punto Parte B
Quinto Punto Parte BQuinto Punto Parte B
Quinto Punto Parte B
 
Derivative Flashcards Final
Derivative Flashcards FinalDerivative Flashcards Final
Derivative Flashcards Final
 
Calculus III
Calculus IIICalculus III
Calculus III
 
グラム行列のスパース近似を用いた生成的モーメントマッチングネットに基づく音声合成の検討
グラム行列のスパース近似を用いた生成的モーメントマッチングネットに基づく音声合成の検討グラム行列のスパース近似を用いた生成的モーメントマッチングネットに基づく音声合成の検討
グラム行列のスパース近似を用いた生成的モーメントマッチングネットに基づく音声合成の検討
 
Faisal
FaisalFaisal
Faisal
 

En vedette

Conjugacions verbals
Conjugacions verbalsConjugacions verbals
Conjugacions verbalsAinoaim
 
MAGNET 2011 Summit - Social Media: 5000bc to 2016 - Clay McDaniel
MAGNET 2011 Summit - Social Media: 5000bc to 2016 - Clay McDanielMAGNET 2011 Summit - Social Media: 5000bc to 2016 - Clay McDaniel
MAGNET 2011 Summit - Social Media: 5000bc to 2016 - Clay McDanielMediabrands Social
 
Pu Dag 8 [2]
Pu Dag 8 [2]Pu Dag 8 [2]
Pu Dag 8 [2]moozemuis
 
Magento Update Meeting
Magento Update MeetingMagento Update Meeting
Magento Update MeetingGuido X Jansen
 
Spring Creek Group Social Media Non-Profit Summit 2-24-2011
Spring Creek Group Social Media Non-Profit Summit 2-24-2011Spring Creek Group Social Media Non-Profit Summit 2-24-2011
Spring Creek Group Social Media Non-Profit Summit 2-24-2011Mediabrands Social
 
Mobile learning hv 11613
Mobile learning hv 11613Mobile learning hv 11613
Mobile learning hv 11613Nell Eckersley
 
Some Placement Trend Statistics 2003 04
Some  Placement  Trend  Statistics 2003   04Some  Placement  Trend  Statistics 2003   04
Some Placement Trend Statistics 2003 04ncct
 
Java Abs U Portal Education Grid
Java Abs   U Portal   Education GridJava Abs   U Portal   Education Grid
Java Abs U Portal Education Gridncct
 
Java Abs Java Productivity Creator & Analyzer
Java Abs   Java Productivity Creator & AnalyzerJava Abs   Java Productivity Creator & Analyzer
Java Abs Java Productivity Creator & Analyzerncct
 
Java Abs Dynamic Server Replication
Java Abs   Dynamic Server ReplicationJava Abs   Dynamic Server Replication
Java Abs Dynamic Server Replicationncct
 
Java Abs Scalable Wireless Ad Hoc Network Simulation Using
Java Abs   Scalable Wireless Ad Hoc Network Simulation UsingJava Abs   Scalable Wireless Ad Hoc Network Simulation Using
Java Abs Scalable Wireless Ad Hoc Network Simulation Usingncct
 
Student Projects
Student ProjectsStudent Projects
Student Projectsncct
 
Human Resource Information System
Human Resource Information SystemHuman Resource Information System
Human Resource Information Systemncct
 
Ncct Ieee Software Abstract Collection Volume 1 50+ Abst
Ncct   Ieee Software Abstract Collection Volume 1   50+ AbstNcct   Ieee Software Abstract Collection Volume 1   50+ Abst
Ncct Ieee Software Abstract Collection Volume 1 50+ Abstncct
 

En vedette (15)

Conjugacions verbals
Conjugacions verbalsConjugacions verbals
Conjugacions verbals
 
MAGNET 2011 Summit - Social Media: 5000bc to 2016 - Clay McDaniel
MAGNET 2011 Summit - Social Media: 5000bc to 2016 - Clay McDanielMAGNET 2011 Summit - Social Media: 5000bc to 2016 - Clay McDaniel
MAGNET 2011 Summit - Social Media: 5000bc to 2016 - Clay McDaniel
 
Pu Dag 8 [2]
Pu Dag 8 [2]Pu Dag 8 [2]
Pu Dag 8 [2]
 
Magento Update Meeting
Magento Update MeetingMagento Update Meeting
Magento Update Meeting
 
Spring Creek Group Social Media Non-Profit Summit 2-24-2011
Spring Creek Group Social Media Non-Profit Summit 2-24-2011Spring Creek Group Social Media Non-Profit Summit 2-24-2011
Spring Creek Group Social Media Non-Profit Summit 2-24-2011
 
Mobile learning hv 11613
Mobile learning hv 11613Mobile learning hv 11613
Mobile learning hv 11613
 
Template23c
Template23cTemplate23c
Template23c
 
Some Placement Trend Statistics 2003 04
Some  Placement  Trend  Statistics 2003   04Some  Placement  Trend  Statistics 2003   04
Some Placement Trend Statistics 2003 04
 
Java Abs U Portal Education Grid
Java Abs   U Portal   Education GridJava Abs   U Portal   Education Grid
Java Abs U Portal Education Grid
 
Java Abs Java Productivity Creator & Analyzer
Java Abs   Java Productivity Creator & AnalyzerJava Abs   Java Productivity Creator & Analyzer
Java Abs Java Productivity Creator & Analyzer
 
Java Abs Dynamic Server Replication
Java Abs   Dynamic Server ReplicationJava Abs   Dynamic Server Replication
Java Abs Dynamic Server Replication
 
Java Abs Scalable Wireless Ad Hoc Network Simulation Using
Java Abs   Scalable Wireless Ad Hoc Network Simulation UsingJava Abs   Scalable Wireless Ad Hoc Network Simulation Using
Java Abs Scalable Wireless Ad Hoc Network Simulation Using
 
Student Projects
Student ProjectsStudent Projects
Student Projects
 
Human Resource Information System
Human Resource Information SystemHuman Resource Information System
Human Resource Information System
 
Ncct Ieee Software Abstract Collection Volume 1 50+ Abst
Ncct   Ieee Software Abstract Collection Volume 1   50+ AbstNcct   Ieee Software Abstract Collection Volume 1   50+ Abst
Ncct Ieee Software Abstract Collection Volume 1 50+ Abst
 

Similaire à Gssl

Ee693 sept2014quizgt1
Ee693 sept2014quizgt1Ee693 sept2014quizgt1
Ee693 sept2014quizgt1Gopi Saiteja
 
Ip 5 discrete mathematics
Ip 5 discrete mathematicsIp 5 discrete mathematics
Ip 5 discrete mathematicsMark Simon
 
09 a1ec01 c programming and data structures
09 a1ec01 c programming and data structures09 a1ec01 c programming and data structures
09 a1ec01 c programming and data structuresjntuworld
 
ENGINEERING SYSTEM DYNAMICS-TAKE HOME ASSIGNMENT 2018
ENGINEERING SYSTEM DYNAMICS-TAKE HOME ASSIGNMENT 2018ENGINEERING SYSTEM DYNAMICS-TAKE HOME ASSIGNMENT 2018
ENGINEERING SYSTEM DYNAMICS-TAKE HOME ASSIGNMENT 2018musadoto
 
Discrete Math IP4 - Automata Theory
Discrete Math IP4 - Automata TheoryDiscrete Math IP4 - Automata Theory
Discrete Math IP4 - Automata TheoryMark Simon
 
Introduction to Neural Networks and Deep Learning from Scratch
Introduction to Neural Networks and Deep Learning from ScratchIntroduction to Neural Networks and Deep Learning from Scratch
Introduction to Neural Networks and Deep Learning from ScratchAhmed BESBES
 
C++11 - A Change in Style - v2.0
C++11 - A Change in Style - v2.0C++11 - A Change in Style - v2.0
C++11 - A Change in Style - v2.0Yaser Zhian
 
Ee693 sept2014quiz1
Ee693 sept2014quiz1Ee693 sept2014quiz1
Ee693 sept2014quiz1Gopi Saiteja
 
Monadologie
MonadologieMonadologie
Monadologieleague
 
MATHEMATICAL MODELING OF COMPLEX REDUNDANT SYSTEM UNDER HEAD-OF-LINE REPAIR
MATHEMATICAL MODELING OF COMPLEX REDUNDANT SYSTEM UNDER HEAD-OF-LINE REPAIRMATHEMATICAL MODELING OF COMPLEX REDUNDANT SYSTEM UNDER HEAD-OF-LINE REPAIR
MATHEMATICAL MODELING OF COMPLEX REDUNDANT SYSTEM UNDER HEAD-OF-LINE REPAIREditor IJMTER
 
Lecture#6 functions in c++
Lecture#6 functions in c++Lecture#6 functions in c++
Lecture#6 functions in c++NUST Stuff
 

Similaire à Gssl (20)

Ee693 sept2014quizgt1
Ee693 sept2014quizgt1Ee693 sept2014quizgt1
Ee693 sept2014quizgt1
 
Cs101 endsem 2014
Cs101 endsem 2014Cs101 endsem 2014
Cs101 endsem 2014
 
Ip 5 discrete mathematics
Ip 5 discrete mathematicsIp 5 discrete mathematics
Ip 5 discrete mathematics
 
09 a1ec01 c programming and data structures
09 a1ec01 c programming and data structures09 a1ec01 c programming and data structures
09 a1ec01 c programming and data structures
 
Computational Assignment Help
Computational Assignment HelpComputational Assignment Help
Computational Assignment Help
 
ENGINEERING SYSTEM DYNAMICS-TAKE HOME ASSIGNMENT 2018
ENGINEERING SYSTEM DYNAMICS-TAKE HOME ASSIGNMENT 2018ENGINEERING SYSTEM DYNAMICS-TAKE HOME ASSIGNMENT 2018
ENGINEERING SYSTEM DYNAMICS-TAKE HOME ASSIGNMENT 2018
 
Qp cdsi18-math
Qp cdsi18-mathQp cdsi18-math
Qp cdsi18-math
 
Discrete Math IP4 - Automata Theory
Discrete Math IP4 - Automata TheoryDiscrete Math IP4 - Automata Theory
Discrete Math IP4 - Automata Theory
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.ppt
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.ppt
 
Introduction to Neural Networks and Deep Learning from Scratch
Introduction to Neural Networks and Deep Learning from ScratchIntroduction to Neural Networks and Deep Learning from Scratch
Introduction to Neural Networks and Deep Learning from Scratch
 
C++11 - A Change in Style - v2.0
C++11 - A Change in Style - v2.0C++11 - A Change in Style - v2.0
C++11 - A Change in Style - v2.0
 
Ee693 sept2014quiz1
Ee693 sept2014quiz1Ee693 sept2014quiz1
Ee693 sept2014quiz1
 
Monadologie
MonadologieMonadologie
Monadologie
 
E 2017 1
E 2017 1E 2017 1
E 2017 1
 
MATHEMATICAL MODELING OF COMPLEX REDUNDANT SYSTEM UNDER HEAD-OF-LINE REPAIR
MATHEMATICAL MODELING OF COMPLEX REDUNDANT SYSTEM UNDER HEAD-OF-LINE REPAIRMATHEMATICAL MODELING OF COMPLEX REDUNDANT SYSTEM UNDER HEAD-OF-LINE REPAIR
MATHEMATICAL MODELING OF COMPLEX REDUNDANT SYSTEM UNDER HEAD-OF-LINE REPAIR
 
Matlab Nn Intro
Matlab Nn IntroMatlab Nn Intro
Matlab Nn Intro
 
7th Semester (June; July-2014) Mechanical Engineering Question Paper
7th Semester (June; July-2014) Mechanical Engineering Question Paper7th Semester (June; July-2014) Mechanical Engineering Question Paper
7th Semester (June; July-2014) Mechanical Engineering Question Paper
 
Java exercise1
Java exercise1Java exercise1
Java exercise1
 
Lecture#6 functions in c++
Lecture#6 functions in c++Lecture#6 functions in c++
Lecture#6 functions in c++
 

Plus de ncct

Biomedical Wearable Device For Remote Monitoring Ofphysiological Signals
Biomedical Wearable Device For Remote Monitoring Ofphysiological SignalsBiomedical Wearable Device For Remote Monitoring Ofphysiological Signals
Biomedical Wearable Device For Remote Monitoring Ofphysiological Signalsncct
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detectionncct
 
Self Repairing Tree Topology Enabling Content Based Routing In Local Area Ne...
Self Repairing Tree Topology Enabling  Content Based Routing In Local Area Ne...Self Repairing Tree Topology Enabling  Content Based Routing In Local Area Ne...
Self Repairing Tree Topology Enabling Content Based Routing In Local Area Ne...ncct
 
Cockpit White Box
Cockpit White BoxCockpit White Box
Cockpit White Boxncct
 
Rail Track Inspector
Rail Track InspectorRail Track Inspector
Rail Track Inspectorncct
 
Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...
Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...
Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...ncct
 
Bot Robo Tanker Sound Detector
Bot Robo  Tanker  Sound DetectorBot Robo  Tanker  Sound Detector
Bot Robo Tanker Sound Detectorncct
 
Distance Protection
Distance ProtectionDistance Protection
Distance Protectionncct
 
Bluetooth Jammer
Bluetooth  JammerBluetooth  Jammer
Bluetooth Jammerncct
 
Crypkit 1
Crypkit 1Crypkit 1
Crypkit 1ncct
 
I E E E 2009 Java Projects
I E E E 2009  Java  ProjectsI E E E 2009  Java  Projects
I E E E 2009 Java Projectsncct
 
B E Projects M C A Projects B
B E  Projects  M C A  Projects  BB E  Projects  M C A  Projects  B
B E Projects M C A Projects Bncct
 
J2 E E Projects, I E E E Projects 2009
J2 E E  Projects,  I E E E  Projects 2009J2 E E  Projects,  I E E E  Projects 2009
J2 E E Projects, I E E E Projects 2009ncct
 
J2 M E Projects, I E E E Projects 2009
J2 M E  Projects,  I E E E  Projects 2009J2 M E  Projects,  I E E E  Projects 2009
J2 M E Projects, I E E E Projects 2009ncct
 
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...
Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...ncct
 
B E M E Projects M C A Projects B
B E  M E  Projects  M C A  Projects  BB E  M E  Projects  M C A  Projects  B
B E M E Projects M C A Projects Bncct
 
I E E E 2009 Java Projects, I E E E 2009 A S P
I E E E 2009  Java  Projects,  I E E E 2009  A S PI E E E 2009  Java  Projects,  I E E E 2009  A S P
I E E E 2009 Java Projects, I E E E 2009 A S Pncct
 
Advantages Of Software Projects N C C T
Advantages Of  Software  Projects  N C C TAdvantages Of  Software  Projects  N C C T
Advantages Of Software Projects N C C Tncct
 
Engineering Projects
Engineering  ProjectsEngineering  Projects
Engineering Projectsncct
 
Software Projects Java Projects Mobile Computing
Software  Projects  Java  Projects  Mobile  ComputingSoftware  Projects  Java  Projects  Mobile  Computing
Software Projects Java Projects Mobile Computingncct
 

Plus de ncct (20)

Biomedical Wearable Device For Remote Monitoring Ofphysiological Signals
Biomedical Wearable Device For Remote Monitoring Ofphysiological SignalsBiomedical Wearable Device For Remote Monitoring Ofphysiological Signals
Biomedical Wearable Device For Remote Monitoring Ofphysiological Signals
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detection
 
Self Repairing Tree Topology Enabling Content Based Routing In Local Area Ne...
Self Repairing Tree Topology Enabling  Content Based Routing In Local Area Ne...Self Repairing Tree Topology Enabling  Content Based Routing In Local Area Ne...
Self Repairing Tree Topology Enabling Content Based Routing In Local Area Ne...
 
Cockpit White Box
Cockpit White BoxCockpit White Box
Cockpit White Box
 
Rail Track Inspector
Rail Track InspectorRail Track Inspector
Rail Track Inspector
 
Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...
Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...
Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...
 
Bot Robo Tanker Sound Detector
Bot Robo  Tanker  Sound DetectorBot Robo  Tanker  Sound Detector
Bot Robo Tanker Sound Detector
 
Distance Protection
Distance ProtectionDistance Protection
Distance Protection
 
Bluetooth Jammer
Bluetooth  JammerBluetooth  Jammer
Bluetooth Jammer
 
Crypkit 1
Crypkit 1Crypkit 1
Crypkit 1
 
I E E E 2009 Java Projects
I E E E 2009  Java  ProjectsI E E E 2009  Java  Projects
I E E E 2009 Java Projects
 
B E Projects M C A Projects B
B E  Projects  M C A  Projects  BB E  Projects  M C A  Projects  B
B E Projects M C A Projects B
 
J2 E E Projects, I E E E Projects 2009
J2 E E  Projects,  I E E E  Projects 2009J2 E E  Projects,  I E E E  Projects 2009
J2 E E Projects, I E E E Projects 2009
 
J2 M E Projects, I E E E Projects 2009
J2 M E  Projects,  I E E E  Projects 2009J2 M E  Projects,  I E E E  Projects 2009
J2 M E Projects, I E E E Projects 2009
 
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...
Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...
 
B E M E Projects M C A Projects B
B E  M E  Projects  M C A  Projects  BB E  M E  Projects  M C A  Projects  B
B E M E Projects M C A Projects B
 
I E E E 2009 Java Projects, I E E E 2009 A S P
I E E E 2009  Java  Projects,  I E E E 2009  A S PI E E E 2009  Java  Projects,  I E E E 2009  A S P
I E E E 2009 Java Projects, I E E E 2009 A S P
 
Advantages Of Software Projects N C C T
Advantages Of  Software  Projects  N C C TAdvantages Of  Software  Projects  N C C T
Advantages Of Software Projects N C C T
 
Engineering Projects
Engineering  ProjectsEngineering  Projects
Engineering Projects
 
Software Projects Java Projects Mobile Computing
Software  Projects  Java  Projects  Mobile  ComputingSoftware  Projects  Java  Projects  Mobile  Computing
Software Projects Java Projects Mobile Computing
 

Dernier

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Dernier (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Gssl

  • 1. New Page 1 Page 1 of 4 ******************************GSSL********* I SUPPOSE**** 1) YOU SHOULD LEARN POINTERS(they may ask in I.W) 2)****SHOULD LEARN C++(this is very very IMP,Based on this only I got job.One more thing is CLASS,INHERATENCI&POLYMORPHISM is sufficient) 3)YOU SHOULD PREPARE ONE FEM PROJECT AND TELL THEM THAT AS YOUR OWN WORK(This will increase chance to 99%) EASI-TECH WRITTEN TEST PATTERN -------------------- 1] C TEST 10Q 20MINUITS 2]F E M TEST 19Q 20MINUITS 3]APTITUDE TEST 15Q 20MINUITS ----------------------------- F E M TEST ---------- 1)WHO USED THE TERM FINITE ELEMENT FOR THE FIRST TIME? a) b) c) CLOUGH 2)DERIVE THE JACOBIEN |J| FOR BEAM ELEMENT WITH STRAIN ENERGY? (ANS:PROMLEM IS NOT CORRECT PLEASE DO NOT ATTEMPT) 3)FOR AN ELEMENT SIGMA Ni=1,WHICH TYPE OF ELEMENT IT IS? a) b)NATURAL CO-ORDINATE (ANS 100% CORRECT) 4)TIMOSHENKO BEAM ELEMENT THEORY TO CONSIDER -- - - -? a) b) c)SHEAR DEFORMATION 5)SHEAR LOCKING - - - - ? (ANS IS VERY STIFF 'K') 6)MEMBRANE LOCKING (ANS IS ARCH ELEMENT) 7)Ex(epsiolan x)=dU/dX,Ey=dV/dY,r(X,Y)=?(gama(x,y)=?) (ANS IS dU/dY+dV/dX ) 8)K=integral B(TRANSPOSE)*D*B FOR LARGE DEFORMATION WHICH MATRIX WILL GET EFFECTED? (ANS IS D matrix )100%correct 9)FOR PLANE STRAIN f(Ex,Ey,Ez,r(x,y) ) - - - (ANS IS Ez=0) 10)SERENDIPITY ELEMENT IS (ANS 8 NODED ELEMENT) (The element which is having nodes only on boundary is called SERENDIPITY element) 11)IF THE ROTATION OF ELEMENT AND THE DISPLACEMENT ABOUT N-A IS SAME THEN THE ORDER OF CONTINUITY (ANS IS C1) file://E:freshersaptitude testsggssl.htm 7/30/03
  • 2. New Page 1 Page 2 of 4 12)FRONTAL THEORY IS APPLIED FOR (Please refer any fem book) 13)MINDLINS THEORY IS APPLIED FOR c) this is the answer(Both Co&C1problems) 14)X=SigmaNi*Xi,U=sigmaNi*Ui WHICH TYPE OF ELEMENT (Refer book) 15)BEAM SUBJECTED TO UDL FIND THE MOMENTS AT THE 2 NODES 16)Integral B(Transpose)*sigma(here sigma means stress)*dV REPRESENTS? (ANS IS INTERNAL LOAD VECTOR) 17)Integral ET(epsiolan transpose)*sigma*dV P=strain displacement vector Q=stress-strain deformation Find [K] (ANS [K]=[P]T(p transpose)*[Q]*[P] ) 18) 19) REMEMBER ORDER MAY NOT BE CORRECT APTITUDE TEST 1)33 1/3 of 101 + 296 is (ans 1200) check 2)0.625= ? (ans 27/40) 3)One ship goes along the stream direction 28 km and in opposite direction 13 km in 5 hrs for each direction.What is the velocity of stream? (ans 1.5 kmph) 4)Cubic root of 3375=? (ans 15) 5)2020201-565656=? (ans 1454545) 6)CHAIRS PROBLEM 5 chairs=9 tables,12 tables = 7 stools likethat- - - (ans is 80Rs) 7)One clock ringes 7 O'clock in 7 sec.In how many seconds it will ring 10 O'clock. (ans 10.5 sec) 8)One watch is showing 30 past 3 .What is the angle between minutes & hours hand? (ans 75 degrees) 9)The average of 4 consecutive even numbers is 27. What is the largest number? (ans 30) 10) 25 stations ,24 stations are inbetween- - - - - how many tickets should be required. (ans 25*24=600)PUZZLES TO PUZZLE YOU "S.DEVI"PROB 24 11)One ball was dropped from 8ft height and every time it goes half of the height. How much distance it will travell before coming to rest. file://E:freshersaptitude testsggssl.htm 7/30/03
  • 3. New Page 1 Page 3 of 4 (ans 24 approximately) 12)Two trains are travelline at equilateral .Train A is travelling in the direction of earths spin.Other train B is travelling in opposite direction of earths spin.Which trains wheels will wear first?and why? (ans TRAIN B .Because of less centrifugal force.) OK HARI 3 MORE QUES ARE THERE.I HOPE YOU CAN SOLVE EASILY. NOW I have only 3 C ques. I am sendins them in immediate mail. Any whey I will try to send remaining 7 C ques before 20th. C QUESTIONS:WHAT IS THE OUT PUT FOR FOLLOWING PROGRAMMS 1)main() { char a[2]; *a[0]=7; *a[1]=5; printf("%d",&a[1]-a) ANS: ans may be 1.(illegal initialization) 2) #include<stdio.h> main(){ char a[]="hellow"; char *b="hellow"; char c[5]="hellow"; printf("%s %s %s ",a,b,c); printf(" ",sizeof(a),sizeof(b),sizeof(c)); } (ans is hellow,hellow,hellow 6,2,5 ) 3) #include<stdio.h> main() float value=10.00; printf("%g %0.2g %0.4g %f",value,value,value,value) } (ans is 10,10,10,10.000000) 4) #include<stdio.h> void function1; int i-value=100; main() { i-value=50; function1; file://E:freshersaptitude testsggssl.htm 7/30/03
  • 4. New Page 1 Page 4 of 4 printf("i-value in the function=",i-value); printf("i-value after the function=",i-value); } printf("i-value at the end of main=",i-value); functioni() i-value=25; THIS IS ROUGH IDEA OF THE PROGRAM ANS ARE 1)i-value in the function=25; 2)i-value after the function=50; 3)i-value at the end of the main=100; 5) main() { funct(int n); { switch(n) case1: m=2; break; case2: m=5; break; case3: m=7; break; default: m=0; } THIS IS ROUGH IDEA: (ANS:Out put is m=0) REMAINING 5 PROGRAMS SOME WHAT LARGE AND COMPLICATED. file://E:freshersaptitude testsggssl.htm 7/30/03