Ju Pmscs & Pmit Suggestion
Ju Pmscs & Pmit Suggestion
Ju Pmscs & Pmit Suggestion
1. MCQ
2. SHORT QUESTION
3. IMPORTANT THEORY
4. PREVIOUS QUESTION
PMSCSAdmission Test
Duration: 1.00 hour
Mark Distribution:
MCQ 30 + Short questions 20
Total 50 Marks
(N.B. -->math and english only for PMIT.... not for PMSCS)
Five Major Units of Computers
The five units of a computer perform this same action and behavior of humans. These units are called the five major
units of a computer
1) Input unit
This is a unit that reads data to be processed by computer.
2) Output unit
This is a unit that writes the processing results in a form that can be understood by
humans.
3) Storage unit
This is a unit that records data. There are main memory and auxiliary storage.
5) Control unit
This is a unit that interprets a command and gives instructions to the remaining
four units.
the control unit and the arithmetic and logical unit are collectively referred to as the CPU (Central Processing Unit)
or the processor.
Storage unit
Main memory
This unit can directly exchange data with the control unit and the arithmetic and
logical unit, and it has a volatility characteristic (contents are lost if power supply is
turned off).
Auxiliary storage
This unit stores data that cannot be accommodated in main memory, and it has a
non-volatility characteristic (contents are not lost even if power supply is turned off).
RAM is IC memory where reading and writing of data can be done freely. It is not suitable for storing
data for a long time because it has a property (volatility) where data is cleared when the power is off.
ROM is IC memory that can be used only for reading data. It has a property (non-volatility)
where data is not lost even when the power is off.
• Mask ROM
This is a type of ROM where users cannot write data. This memory is used to store
programs or data in factories, and the information is used only for the purpose of reference.
• PROM (Programmable ROM): This is a type of ROM where user can write information
Only once.
• EEPROM (Electrically EPROM):This is a type of ROM where data can be rewritten after
All or a part of information is electrically erased. It has
Limited life because of deterioration, and the number
Of rewritable times is restricted to a few tens of
Thousands of times to a few million times.
• Flash memory: This is semiconductor memory where data can be rewritten after data is erased in units of blocks
through electrical operations. Flash memory is a type of EEPROM. Therefore, the number of rewritable timesis limited
However, it is used for various applications as a portable and convenient storage medium.
NUMBER SYSTEM
Number systems are the technique to represent numbers in the computer system architecture,
every value that you are saving or getting into/from computer memory has a defined number
system.
A Binary number system has only two digits that are 0 and 1. Every number (value) represents
with 0 and 1 in this number system. The base of binary number system is 2, because it has only
two digits.
Octal number system has only eight (8) digits from 0 to 7. Every number (value) represents with
0,1,2,3,4,5,6 and 7 in this number system. The base of octal number system is 8, because it has
only 8 digits.
Decimal number system has only ten (10) digits from 0 to 9. Every number (value) represents
with 0,1,2,3,4,5,6, 7,8 and 9 in this number system. The base of decimal number system is 10,
because it has only 10 digits.
A Hexadecimal number system has sixteen (16) alphanumeric values from 0 to 9 and A to F.
Every number (value) represents with 0,1,2,3,4,5,6, 7,8,9,A,B,C,D,E and F in this number
system. The base of hexadecimal number system is 16, because it has 16 alphanumeric values.
Here A is 10, B is 11, C is 12, D is 14, E is 15 and F is 16.
CONVERSIONS
DECIMAL TO OTHER
1. DECIMAL TO BINARY
To convert Number system from Decimal Number System to Any Other Base is quite easy;
you have to follow just two steps:
A) Divide the Number (Decimal Number) by the base of target base system (in which you want
to convert the number: Binary (2), octal (8) and Hexadecimal (16)).
B) Write the remainder from step 1 as a Least Signification Bit (LSB) to Step last as a Most
Significant Bit (MSB).
Binary Number is
(11000000111001)2
2. DECIMAL TO OCTAL
Octal Number is
(30071)8
3. DECIMAL TO HEXADECIMAL
Decimal to Hexadecimal Conversion Result
Example 1
Decimal Number is : (12345)10
Hexadecimal Number is
(3039)16
Example 2
Decimal Number is : (725)10 Hexadecimal Number is
(2D5)16
Convert
10, 11, 12, 13, 14, 15
to its equivalent...
A, B, C, D, E, F
BINARY TO OTHER
A) Multiply the digit with 2(with place value exponent). Eventually add all the multiplication
becomes the Decimal number.
1. BINARY TO DECIMAL
2. BINARY TO OCTAL
An easy way to convert from binary to octal is to group binary digits into sets of three, starting
with the least significant (rightmost) digits.
3. BINARY TO HEXADECIMAL
An equally easy way to convert from binary to hexadecimal is to group binary digits into sets of
four, starting with the least significant (rightmost) digits.
OCTAL TO OTHER
1. OCTAL TO BINARY
Converting from octal to binary is as easy as converting from binary to octal. Simply look up
each octal digit to obtain the equivalent group of three binary digits.
Octal: 0 1 2 3 4 5 6 7
Binary: 000 001 010 011 100 101 110 111
Octal = 3 4 5
Binary = 011 100 101 = 011100101 binary
2. OCTAL TO HEXADECIMAL
When converting from octal to hexadecimal, it is often easier to first convert the octal number
into binary and then from binary into hexadecimal. For example, to convert 345 octal into hex:
Hexadecimal: 0 1 2 3 4 5 6 7
Hexadecimal: 8 9 A B C D E F
Hexadecimal = E 5 = E5 hex
Therefore, through a two-step conversion process, octal 345 equals binary 011100101 equals
hexadecimal E5.
3. OCTAL TO DECIMAL
The conversion can also be performed in the conventional mathematical way, by showing each
digit place as an increasing power of 8.
OR
HEXADECIMAL TO OTHER
1. HEXADECIMAL TO BINARY
Hexadecimal: 0 1 2 3 4 5 6 7
Binary: 0000 0001 0010 0011 0100 0101 0110 0111
Hexadecimal: 8 9 A B C D E F
Binary: 1000 1001 1010 1011 1100 1101 1110 1111
Hexadecimal = A 2 D E
Binary = 1010 0010 1101 1110 = 1010001011011110 binary
2. HEXADECIMAL TO OCTAL
1's complement
The 1's complement of a number is found by changing all 1's to 0's and all 0's to 1's. This is
called as taking complement or 1's complement. Example of 1's Complement is as follows.
Binary Addition
It is a key for binary subtraction, multiplication, division. There are four rules of binary addition.
In fourth case, a binary addition is creating a sum of (1 + 1 = 10) i.e. 0 is written in the given
column and a carry of 1 over to the next column.
Example − Addition
2's complement
The 2's complement of binary number is obtained by adding 1 to the Least Significant Bit (LSB)
of 1's complement of the number.
For example,
For example,
0 0 1 1 1 1 0 1 1 0 = 246(base 10)
Binary Division
For example,
1 borrows
1 0 10 1
- 1 1 0
1 1 0
- 1 1 0
1 1
- 0
1 1 1
- 1 0 1
1 0 1
- 1 0 1
Example − Division
ALU (Arithmetic and Logical Unit) is a unit that performs arithmetic operations and logical
operations. This unit is composed of various circuits.
Logic circuit is a circuit that performs logical operations for logical processing of
instructions by computers. Logical operations refer to arithmetic operations that have only
two truth values of True (1) and False (0).
logical operations:
Truth table where summarizes the relations between input and output of the respective logical
operation.
AND circuit
OR circuit
NOT circuit
NAND circuit
NOR circuit
XOR circuit
logical laws
Algorithm Analysis and Design
Computer Program
Algorithm:
There are various ways of writing an algorithm. Going to explain 3 ways of writing an algorithm.
In English
As a pseudocode
As a Flowchart
English
It is a form of English often used in functional or system specifications and it looks a bit
like programming statements but does not have a compiler readable syntax.
Pseudocode
The pseudocode has an advantage of being easily converted into any programming
language. This way of writing algorithm is most acceptable and most widely used. In
order to write a pseudocode, one must be familiar with the conventions of writing it.
{
statements
}
case {
:< condition 1 >: < statement 1 >
.....
.....
.....
:< condition n >: < statement n >
:default: < statement n+1 >
}
repeat
statements
until< condition >
Read
23. The name of the algorithm is < name > and the arguments are
stored in the < parameter list >
Flowchart
.
English language Pseudo code Flowchart
. end procedure
Analysis of Algorithms
Time complexity :To have an estimate about how much time an algorithm may take to finish,
or in other words, to analyze its running time .
Counting Operations
◼ Knowing the number of operations required by the algorithm, we can state that
◼ Algorithm X takes 2n2 + 100n operations to solve problem of size n
◼ If the time t needed for one operation is known, then we can state
◼ Algorithm X takes (2n2 + 100n)t time units
Asymptotic Analysis:
• Express runtime as a function of the input size n (i.e., f(n)) in order to understand
how f(n) grows with n
• and count only the most significant term of f(n) and ignore everything else
(because those won’t affect running time much for very large values of n).
• Thus the running times (also called time complexity) of the programs of the
previous slide becomes:
• f(N)= c1N ≈ N*(some constant)
• g(N) = (c1+c2+c3)N+(c1+c2) ≈ N*(some constant)
• Thus both these functions grows linearly with N and as such both have the same
running time (specifically, linear running time). We say that both of them are O(N)
functions, which means that, the running time of each of these algorithms is a
constant multiple of N (we ignore the value of the constant).
• We compare running times of different functions in an asymptotic manner (i.e.,
we check if f(n) > g(n) for very large values of n). That’s why, the task of
computing time complexity (of an algorithm) is also called asymptotic analysis.
Asymptotic Notations
What is O(n2)?
The set of all functions that grow slower than or in the same order as n2..
Divide and Conquer
Recursive in structure
Divide the problem into independent sub-problems that are similar to the original but
smaller in size
Conquer the sub-problems by solving them recursively. If they are small enough, just
solve them in a straightforward manner.
This can be done by reducing the problem until it reaches the base case, which is the
solution.
Combine the solutions of the sub-problems to create a solution to the original problem
Example:
Merge Sort
Sorting Problem: Sort a sequence of n elements into non-decreasing order.
Divide: Divide the n-element sequence to be sorted into two subsequences of n/2
elements each
Combine: Merge the two sorted subsequences to produce the sorted answer.
Quicksort
Heaps A complete binary tree
Min-heap
Each of the elements contains a value that is less than or equal to the value of each of its children
Max-heap
Each of the elements contains a value that is greater than or equal to the value of each of its children
Bubble sort is a sorting algorithm that compares adjacent elements. If the magnitude relation
is reverse, it exchanges the elements to correct the relation. This operation is performed in
sequence from the first element. The name “bubble sort” was chosen because the action of
gradually moving the maximum value (or the minimum value) in the rear direction resembles
32 bits
A.
128 bytes
B.
64 bits
C.
128 bits
D.
Answer: Option D
Explanation:
An IPv6 address is 128 bits long.
2. What flavor of Network Address Translation can be used to have one IP address allow many
users to connect to the global Internet?
A. NAT
B. Static
C. Dynamic
D. PAT
Answer: Option D
Explanation:
Port Address Translation (PAT) allows a one-to-many approach to network address translation.
B. 2 and 4
2
C. 3 and 4
D. 1 and 2
Answer: Option A
Explanation:
Standard and extended access control lists (ACLs) are used to configure security on a router.
C. config mem
D. wr mem
Answer: Option B
Explanation:
The command to back up the configuration on a router is copy running-config startup-
config.
5. You have 10 users plugged into a hub running 10Mbps half-duplex. There is a server
connected to the switch running 10Mbps half-duplex as well. How much bandwidth does each
host have to the server?
A. 100 kbps
B. 1 Mbps
C. 2 Mbps
D. 10 Mbps
Answer: Option D
Explanation:
Each device has 10 Mbps to the server.
B. B
C. G
D. N
Answer: Option C
Explanation:
IEEE 802.11B is 2.4GHz, but with a maximum of only 11Mbps. IEEE 802.11G is in the
2.4GHz range, with a top speed of 54Mbps.
3
7. Which of the following is the valid host range for the subnet on which the IP
address 192.168.168.188 255.255.255.192 resides?
A. 192.168.168.129-190
B. 192.168.168.129-191
C. 192.168.168.128-190
D. 192.168.168.128-192
Answer: Option A
Explanation:
256 - 192 = 64. 64 + 64 = 128. 128 + 64 = 192. The subnet is 128, the broadcast address is
191, and the valid host range is the numbers in between, or 129-190.
9. What protocol does PPP use to identify the Network layer protocol?
A. NCP
B. ISDN
C. HDLC
D. LCP
Answer: Option A
Explanation:
Network Control Protocol is used to help identify the Network layer protocol used in the packet.
10. Which of the following commands will allow you to set your Telnet password on a Cisco router?
A. line telnet 0 4
B. line aux 0 4
C. line vty 0 4
D. line con 0
Answer: Option C
4
Explanation:
The command line vty 0 4 places you in a prompt that will allow you to set or change
your Telnet password.
B. TCP
C. UDP
D. ARP
Answer: Option C
Explanation:
User Datagram Protocol is a connection network service at the Transport layer, and DHCP
uses this connectionless service.
12. Which command is used to determine if an IP access list is enabled on a particular interface?
A. show access-lists
B. show interface
C. show ip interface
B. Physical layer
D. Application layer
Answer: Option B
Explanation:
Hubs regenerate electrical signals, which are specified at the Physical layer.
14. What does the passive command provide to dynamic routing protocols?
A. Stops an interface from sending or receiving periodic dynamic updates.
B. Stops an interface from sending periodic dynamic updates but not from receiving updates.
5
C. Stops the router from receiving any dynamic updates.
15. Which protocol is used to send a destination network unknown message back to
originating hosts?
A. TCP
B. ARP
C. ICMP
D. BootP
Answer: Option C
Explanation:
ICMP is the protocol at the Network layer that is used to send messages back to an
originating router.
B. Every 2 seconds
C. Every 10 minutes
D. Every 30 seconds
Answer: Option B
Explanation:
Every 2 seconds, BPDUs are sent out from all active bridge ports by default.
17. How many broadcast domains are created when you segment a network with a 12-port switch?
A. 1
B. 2
C. 5
D. 12
Answer: Option A
Explanation:
By default, switches break up collision domains but are one large broadcast domain.
6
18. What does the command routerA(config)#line cons 0 allow you to perform next?
A. Set the Telnet password.
B. show access-lists
C. show ip interface
D. show interface
Answer: Option B
Explanation:
To see the contents of all access lists, use the show access-lists command.
20.
Which class of IP address has the most host addresses available by default?
A. A
B. B
C. C
D. A and B
Answer: Option A
Explanation:
Class A addressing provides 24 bits for host addressing.
21. In a network with dozens of switches, how many root bridges would you have?
A. 1
B. 2
C. 5
D. 12
Answer: Option A
Explanation:
You should have only one root bridge per network.
7
22. What PPP protocol provides dynamic addressing, authentication, and multilink?
A. NCP
B. HDLC
C. LCP
D. X.25
Answer: Option C
Explanation:
Link Control Protocol in the PPP stack provides dynamic addressing, authentication,
and multilink.
24. If your router is facilitating a CSU/DSU, which of the following commands do you need to use
to provide the router with a 64000bps serial link?
A. RouterA(config)#bandwidth 64
B. RouterA(config-if)#bandwidth 64000
C. RouterA(config-if)#clock rate 64
8
B. VLANs only work if you have a complete Cisco switched internetwork. No off-brand
switches are allowed.
C. You should not have more than 10 switches in the same VTP domain.
Answer: Option D
Explanation:
Switches do not propagate VLAN information by default; you must configure the VTP domain.
VLAN Trunking Protocol (VTP) is used to propagate VLAN information across a trunk link.
Answer: Option C
Explanation:
VLANs break up broadcast domains at layer 2
Answer: Option C
Explanation:
The primary reason the OSI model was created was so that different networks could
inter-operate.
9
28. How many collision domains are created when you segment a network with a 12-port switch?
A. 1
B. 2
C. 5
D. 12
Answer: Option D
Explanation:
Layer 2 switching creates individual collision domains.
29. What command will display the line, protocol, DLCI, and LMI information of an interface?
A. sh pvc
B. show interface
D. show run
Answer: Option B
Explanation:
The show interface command shows the line, protocol, DLCI, and LMI information of
an interface.
B. ARP
C. ICMP
D. BootP
10
Answer: Option C
Explanation:
ICMP is the protocol at the Network layer that is used to send echo requests and replies.
C. config net
Answer: Option D
Explanation:
The copy tftp flash command places a new file in flash memory, which is the
default location for the Cisco IOS in Cisco routers.
32. If you wanted to delete the configuration stored in NVRAM, what would you type?
A. erase startup
B. erase nvram
C. delete nvram
D. erase running
Answer: Option A
Explanation:
The command erase startup-config deletes the configuration stored in NVRAM.
11
A. 1 and 2
B. 3 and 4
C. 1 only
D. 2 only
Answer: Option B
Explanation:
VTP is not right because it has nothing to do with trunking except that it sends VLAN
information across a trunk link. 802.1Q and ISL are used to configure trunking on a port.
12
1.Physical Layer
The physical layer defines the electrical and physical specifications of the
data connection. It defines the relationship between a device and a physical
transmission medium (for example, an electrical cable, an optical fiber cable,
or a radio frequency link). This includes the layout of pins, voltages, line
impedance, cable specifications.
3: Network Layer
The network layer provides the functional and procedural means of
transferring variable length data sequences (called datagrams) from one
node to another connected in "different networks". A network is a medium to
13
which many nodes can be connected, on which every node has an address
and which permits nodes connected to it to transfer messages to other
nodes connected to it by merely providing the content of a message and the
address of the destination node and letting the network find the way to
deliver the message to the destination node, possibly routing it through
intermediate nodes.
4: Transport Layer
The transport layer provides the functional and procedural means of
transferring variable-length data sequences from a source to a destination
host via one or more networks, while maintaining the quality of service
functions.
An example of a transport-layer protocol in the standard Internet stack is
Transmission Control Protocol (TCP), usually built on top of the Internet
Protocol (IP).
The transport layer controls the reliability of a given link through flow
control, segmentation/desegmentation, and error control. Some protocols
are state- and connection-oriented.
5: Session Layer
The session layer controls the dialogues (connections) between computers.
It establishes, manages and terminates the connections between the local
and remote application. It provides for full-duplex, half-duplex,
or simplex operation, and establishes check pointing, adjournment,
termination, and restart procedures. The OSI model made this layer
responsible for graceful close of sessions, which is a property of the
Transmission Control Protocol, and also for session check pointing and
recovery, which is not usually used in the Internet Protocol Suite. The
session layer is commonly implemented explicitly in application
environments that use remote procedure calls.
14
7: Application Layer
The application layer is the OSI layer closest to the end user, which means
both the OSI application layer and the user interact directly with the
software application. This layer interacts with software applications that
implement a communicating component. Such application programs fall
outside the scope of the OSI model. Application-layer functions typically
include identifying communication partners, determining resource
availability, and synchronizing communication.
our Layers of TCP/IP model, Comparison and Difference between TCP/IP and
OSI models
15
terminology is applied to TCP/IP. The following figure compares the TCP/IP
and OSI network models.
Application layer is the top most layer of four layer TCP/IP model.
Application layer is present on the top of the Transport layer. Application
layer defines TCP/IP application protocols and how host programs interface
with Transport layer services to use the network.
Application layer includes all the higher-level protocols like DNS (Domain
Naming System), HTTP (Hypertext Transfer Protocol), Telnet, SSH, FTP (File
Transfer Protocol), TFTP (Trivial File Transfer Protocol), SNMP (Simple
Network Management Protocol), SMTP (Simple Mail Transfer Protocol) ,
DHCP (Dynamic Host Configuration Protocol), X Windows, RDP (Remote
Desktop Protocol) etc.
Transport Layer is the third layer of the four layer TCP/IP model. The
position of the Transport layer is between Application layer and Internet
layer. The purpose of Transport layer is to permit devices on the source and
destination hosts to carry on a conversation. Transport layer defines the
level of service and status of the connection used when transporting data.
Internet Layer is the second layer of the four layer TCP/IP model. The
position of Internet layer is between Network Access Layer and Transport
layer. Internet layer pack data into data packets known as IP datagrams,
which contain source and destination address (logical address or IP address)
information that is used to forward the datagrams between hosts and across
networks. The Internet layer is also responsible for routing of IP datagrams.
Network Access Layer is the first layer of the four layer TCP/IP model.
Network Access Layer defines details of how data is physically sent through
the network, including how bits are electrically or optically signaled by
hardware devices that interface directly with a network medium, such as
coaxial cable, optical fiber, or twisted pair copper wire.
The protocols included in Network Access Layer are Ethernet, Token Ring,
FDDI, X.25, Frame Relay etc.
The most popular LAN architecture among those listed above is Ethernet.
Ethernet uses an Access Method called CSMA/CD (Carrier Sense Multiple
Access/Collision Detection) to access the media, when Ethernet operates in a
shared media. An Access Method determines how a host will place data on
the medium.
IN CSMA/CD Access Method, every host has equal access to the medium and
can place data on the wire when the wire is free from network traffic. When
a host wants to place data on the wire, it will check the wire to find whether
another host is already using the medium.
100B-T—100BASE-T
100B-TX—100BASE-TX
100BVG—100BASE-VG
286—Intel 80286 processor
2B1Q—2 Binary 1 Quaternary
2FA—Two-factor authentication
2GL—Second-Generation Programming Language
2NF—Second Normal Form
3GL—Third-Generation Programming Language
17
BCNF—Boyce–Codd normal form
CDE—Common Desktop Environment
CDFS—Compact Disk File System
CDMA—Code Division Multiple Access
CDN—Content Delivery Network
CDP—Cisco Discovery Protocol
CDP—Continuous Data Protection
CD-R—CD-Recordable
CD-ROM—CD Read-Only Memory
CMO—Current Mode of Operation
CSP—Cloud Service Provider
DFS—Distributed File System
DGD—Dworkin's Game Driver
DHCP—Dynamic Host Configuration Protocol
DHTML—Dynamic Hypertext Markup Language
DIF—Data Integrity Field
FIFO—First In First Out
ICMP—Internet Control Message Protocol
IPv4—Internet Protocol version 4
IPv6—Internet Protocol version 6
PaaS—Platform as a Service
PAN—Personal Area Network
PaaS—Platform as a Service
PAN—Personal Area Network
WiMAX—Worldwide Interoperability for Microwave Access
WiMAX—Worldwide Interoperability for Microwave Access
18
What is layer?
Layer is a completely logical partition of PDU (protocol data unit) process.
That define how the information is travel form one computer to other over
the network.
What is TCP/IP?
It is combination of two protocols TCP and IP. It is used for reliable data
transfer.
What is operating system?
An operating system (sometimes abbreviated as "OS") is the program
that, after being initially loaded into the computer by a boot program,
manages all the other programs in a computer. It provides a platform to
application software.
What is package software?
The collection of mostly used software released in package Form Company.
For Example Ms-Office that contain word, power point, Excel, etc.
19
What is 802.3?
IEEE 802.3 is a collection of IEEE standards defining the physical layer and
the media access control (MAC) of the data link layer of wired Ethernet.
Physical connections are made between nodes and infrastructure devices
hubs, switches and routers by various types of copper or fiber cable.
Full form of ping.
PING stand for Packet Internet Grouper
What are the minimum requirements for xp installation?
64MB RAM
1.5GB free HDD space
233MHz minimum processor.
What are 10Base2, 10Base5 and 10BaseT Ethernet LANs?
10Base2— An Ethernet term meaning a maximum transfer rate of 10
Megabits per second that uses baseband signaling, with a contiguous cable
segment length of 100 meters and a maximum of 2 segments. 10Base5—
An Ethernet term meaning a maximum transfer rate of 10 Megabits per
second that uses baseband signaling, with 5 continuous
segments not exceeding 100 meters per segment. 10BaseT—An Ethernet
term meaning a maximum transfer rate of 10 Megabits per second that uses
baseband signaling and twisted pair cabling.
A fully specified passive open has the server waiting for a connection
from a specific client.
Types of Networks: LAN, WAN, WLAN, MAN, SAN, PAN, EPN & VPN
20
There are several different types of computer networks. Computer
networks can be characterized by their size as well as their purpose.
The size of a network can be expressed by the geographic area they occupy
and the number of computers that are part of the network. Networks can
cover anything from a handful of devices within a single room to millions of
devices spread across the entire globe.
Some of the different networks based on size are:
21
• Upload a photo from your cell phone to your desktop computer.
• Watch movies from an online streaming service to your TV.
If this sounds familiar to you, you likely have a PAN in your house
without having called it by its name.
22
Wide Area Network
A wide area network, or WAN, occupies a very large area, such as an
entire country or the entire world. A WAN can contain multiple smaller
networks, such as LANs or MANs. The Internet is the best-known example of
a public WAN.
Private Networks
One of the benefits of networks like PAN and LAN is that they can be kept
entirely private by restricting some communications to the connections
within the network. This means that those communications never go over
the Internet.
For example, using a LAN, an employee is able to establish a fast and secure
connection to a company database without encryption since none of the
communications between the employee's computer and the database on the
server leave the LAN. But, what happens if the same employee wants to use
the database from a remote location? What you need is a private network.
One approach to a private network is to build an enterprise private
network, or EPN. An EPN is a computer network that is entirely controlled
by one organization, and it is used to connect multiple locations.
Historically, telecommunications companies, like AT&T, operated their own
network, separate from the public Internet. EPNs are still fairly common in
certain sectors where security is of the highest concern. For example, a
number of health facilities may establish their own network between
multiple sites to have full control over the confidentiality of patient records.
Subnetting
Variable Length Subnet Mask (VLSM)
Supernetting
23
Classless Inter-Domain Routing (CIDR)
Subnetting
24
1. Your router has the following IP address on Ethernet0: 172.16.2.1/23. Which of the following can be
valid host IDs on the LAN interface attached to the router?
172.16.1.100
172.16.1.198
172.16.2.255
172.16.3.0
A. 1 only
B. 2 and 3 only
C. 3 and 4 only
Answer: Option C
Explanation:
The router's IP address on the E0 interface is 172.16.2.1/23, which is 255.255.254.0. This makes the third
octet a block size of 2. The router's interface is in the 2.0 subnet, and the broadcast address is 3.255
because the next subnet is 4.0. The valid host range is 2.1 through 3.254. The router is using the first valid
host address in the range.
B. 2 and 4
C. 1, 2 and 4
D. 2, 3 and 4
Answer: Option B
Explanation:
The mask 255.255.254.0 (/23) used with a Class A address means that there are 15 subnet bits and 9 host
bits. The block size in the third octet is 2 (256 - 254). So this makes the subnets in the interesting octet 0, 2,
4, 6, etc., all the way to 254. The host 10.16.3.65 is in the 2.0 subnet. The next subnet is 4.0, so the
broadcast address for the 2.0 subnet is 3.255. The valid host addresses are 2.1 through 3.254.
25
3. A network administrator is connecting hosts A and B directly through their Ethernet interfaces, as shown in
the illustration. Ping attempts between the hosts are unsuccessful. What can be done to provide connectivity
between the hosts?
B
2 only
.
C
3 and 4 only
.
D
1 and 5 only
.
2 and 5 only
Answer: Option D
Explanation:
First, if you have two hosts directly connected, as shown in the graphic, then you need a crossover
cable. A straight-through cable won't work. Second, the hosts have different masks, which puts them
in different subnets. The easy solution is just to set both masks to 255.255.255.0 (/24).
4. What is the maximum number of IP addresses that can be assigned to hosts on a local subnet
that uses the 255.255.255.224 subnet mask?
E A. 14
.
B. 15
C. 16
D. 30
Answer: Option D
Explanation:
A /27 (255.255.255.224) is 3 bits on and 5 bits off. This provides 8 subnets, each with 30 hosts.
Does it matter if this mask is used with a Class A, B, or C network address? Not at all. The number
26
of host bits would never change.
5. You need to subnet a network that has 5 subnets, each with at least 16 hosts. Which classful
subnet mask would you use?
A. 255.255.255.192
B. 255.255.255.224
C. 255.255.255.240
D. 255.255.255.248
Answer: Option B
Explanation:
You need 5 subnets, each with at least 16 hosts. The mask 255.255.255.240 provides 16 subnets
with 14 hosts-this will not work. The mask 255.255.255.224 provides 8 subnets, each with 30
hosts. This is the best answer.
6. You have a network that needs 29 subnets while maximizing the number of host addresses
available on each subnet. How many bits must you borrow from the host field to provide the
correct subnet mask?
A. 2
B. 3
C. 4
D. 5
Answer: Option D
Explanation:
A 240 mask is 4 subnet bits and provides 16 subnets, each with 14 hosts. We need more subnets,
so let's add subnet bits. One more subnet bit would be a 248 mask. This provides 5 subnet bits
(32 subnets) with 3 host bits (6 hosts per subnet). This is the best answer.
B. 172.16.0.0
C. 172.16.96.0
D. 172.16.255.0
Answer: Option A
27
Explanation:
A /25 mask is 255.255.255.128. Used with a Class B network, the third and fourth octets are used for
subnetting with a total of 9 subnet bits, 8 bits in the third octet and 1 bit in the fourth octet. Since there
is only 1 bit in the fourth octet, the bit is either off or on-which is a value of 0 or
128. The host in the question is in the 0 subnet, which has a broadcast address of 127 since
128 is the next subnet.
8. You have an interface on a router with the IP address of 192.168.192.10/29. Including the router
interface, how many hosts can have IP addresses on the LAN attached to the router interface?
A. 6
B. 8
C. 30
D. 32
Answer: Option A
Explanation:
A /29 (255.255.255.248), regardless of the class of address, has only 3 host bits. Six hosts
is the maximum number of hosts on this LAN, including the router interface.
B. 172.16.48.0
C. 172.16.64.0
D. 172.16.0.0
Answer: Option C
Explanation:
A /21 is 255.255.248.0, which means we have a block size of 8 in the third octet, so we just
count by 8 until we reach 66. The subnet in this question is 64.0. The next subnet is 72.0, so
the broadcast address of the 64 subnet is 71.255.
10. The network address of 172.16.0.0/19 provides how many subnets and hosts?
A. 7 subnets, 30 hosts each
28
D. 7 subnets, 2,046 hosts each
Answer: Option B
Explanation:
A CIDR address of /19 is 255.255.224.0. This is a Class B address, so that is only 3 subnet
bits, but it provides 13 host bits, or 8 subnets, each with 8,190 hosts.
11. You need to configure a server that is on the subnet 192.168.19.24/29. The router has the
first available host address. Which of the following should you assign to the server?
A. 192.168.19.0 255.255.255.0
B. 192.168.19.33 255.255.255.240
C. 192.168.19.26 255.255.255.248
D. 192.168.19.31 255.255.255.248
Answer: Option C
Explanation:
A /29 is 255.255.255.248, which is a block size of 8 in the fourth octet. The subnets are 0, 8,
16, 24, 32, 40, etc. 192.168.19.24 is the 24 subnet, and since 32 is the next subnet, the
broadcast address for the 24 subnet is 31. 192.168.19.26 is the only correct answer.
12. You have an interface on a router with the IP address of 192.168.192.10/29. What is
the broadcast address the hosts will use on this LAN?
A. 192.168.192.15
B. 192.168.192.31
C. 192.168.192.63
D. 192.168.192.127
Answer: Option A
Explanation:
A /29 (255.255.255.248) has a block size of 8 in the fourth octet. This means the subnets are
0, 8, 16, 24, etc. 10 is in the 8 subnet. The next subnet is 16, so 15 is the broadcast address.
13. You have a network with a subnet of 172.16.17.0/22. Which is the valid host address?
A. 172.16.17.1 255.255.255.252
B. 172.16.0.1 255.255.240.0
C. 172.16.20.1 255.255.254.0
29
D. 172.16.18.255 255.255.252.0
Answer: Option D
Explanation:
A Class B network ID with a /22 mask is 255.255.252.0, with a block size of 4 in the third octet. The
network address in the question is in subnet 172.16.16.0 with a broadcast address of
172.16.19.255. Only option E even has the correct subnet mask listed, and 172.16.18.255 is
a valid host.
14. On a VLSM network, which mask should you use on point-to-point WAN links in order to
reduce the waste of IP addresses?
A. /27
B. /28
C. /29
D. /30
Answer: Option D
Explanation:
A point-to-point link uses only two hosts. A /30, or 255.255.255.252, mask provides two
hosts per subnet.
15. To test the IP stack on your local host, which IP address would you ping?
A. 127.0.0.0
B. 1.0.0.127
C. 127.0.0.1
D. 127.0.0.255
Answer: Option C
Explanation:
To test the local stack on your host, ping the loopback interface of 127.0.0.1.
16. If a host on a network has the address 172.16.45.14/30, what is the subnetwork this
host belongs to?
A. 172.16.45.0
B. 172.16.45.4
C. 172.16.45.8
30
D. 172.16.45.12
Answer: Option D
Explanation:
A /30, regardless of the class of address, has a 252 in the fourth octet. This means we have a block
size of 4 and our subnets are 0, 4, 8, 12, 16, etc. Address 14 is obviously in the 12 subnet.
17. Using the following illustration, what would be the IP address of E0 if you were using the eighth
subnet? The network ID is 192.168.10.0/28 and you need to use the last available IP address
in the range. The zero subnet should not be considered valid for this question.
A. 192.168.10.142
B. 192.168.10.66
C. 192.168.100.254
D. 192.168.10.143
E. 192.168.10.126
Answer: Option A
Explanation:
A /28 is a 255.255.255.240 mask. Let's count to the ninth subnet (we need to find the
broadcast address of the eighth subnet, so we need to count to the ninth subnet). Starting at
16 (remember, the question stated that we will not use subnet zero, so we start at 16, not 0),
16, 32, 48, 64, 80, 96, 112, 128, 144. The eighth subnet is 128 and the next subnet is 144, so
our broadcast address of the 128 subnet is 143. This makes the host range 129-142. 142 is the
last valid host.
Which configuration command must be in effect to allow the use of 8 subnets if the Class C
subnet mask is 255.255.255.224?
31
A. Router(config)#ip classless
B. Router(config)#no ip classful
C. Router(config)#ip unnumbered
D. Router(config)#ip subnet-zero
Answer: Option D
Explanation:
A Class C subnet mask of 255.255.255.224 is 3 bits on and 5 bits off (11100000) and provides 8
subnets, each with 30 hosts. However, if the command ip subnet-zero is not used, then only
6 subnets would be available for use.
19. Using the illustration from the previous question, what would be the IP address of S0 if you were
using the first subnet? The network ID is 192.168.10.0/28 and you need to use the last available IP
address in the range. Again, the zero subnet should not be considered valid for this question.
A. 192.168.10.24
B. 192.168.10.62
C. 192.168.10.30
D. 192.168.10.127
Answer: Option C
Explanation:
A /28 is a 255.255.255.240 mask. The first subnet is 16 (remember that the question stated
not to use subnet zero) and the next subnet is 32, so our broadcast address is 31. This makes
our host range 17-30. 30 is the last valid host.
20. What is the subnetwork address for a host with the IP address 200.10.5.68/28?
A. 200.10.5.56
B. 200.10.5.32
C. 200.10.5.64
D. 200.10.5.0
Answer: Option C
Explanation:
This is a pretty simple question. A /28 is 255.255.255.240, which means that our block size is
16 in the fourth octet. 0, 16, 32, 48, 64, 80, etc. The host is in the 64 subnet.
32
Classless Inter-Domain Routing
CIDR (Classless Inter-Domain Routing, sometimes called supernetting) is a
way to allow more flexible allocation of Internet Protocol (IP) addresses
than was possible with the original system of IP address classes. As a
result, the number of available Internet addresses was greatly increased,
which along with widespread use of network address translation (NAT), has
significantly extended the useful life of IPv4.
Ans: It is the exchange of data between two devices via some form of
transmission medium such as wire cable. The communicating system must be part
of a communication system made up of a combination of hardware and
software.The effectiveness of a data communication system depends on three
fundamental characteristics: delivery, accuracy and timeliness.
2.What is simplex?
Ans: It is the mode of communication between two devices in which flow of data is
unidirectional. i.e. one can transmit and other can receive. E.g. keyboard and monitor.
3.What is half-duplex?
Ans: It is the mode of communication between two devices in which flow of data is
33
bidirectional but not at the same time. ie each station can transmit and receive but not
at the same time. E.g walkie-talkies are half-duplex system.
Ans: It is the mode of communication between two devices in which flow of data is
bidirectional and it occurs simultaneously. Here signals going in either direction
share the capacity of the link. E.g. telephone
5.What is a network?
Ans: It is a strategy in which services provided by the network reside at multiple sites.
Ans:It provides a dedicated link between two devices. The entire capacity of the link
is reserved for transmission between the two devices e.g. when we change the TV
channels by remote control we establish a point to point connection between remote
control and TV control system.
Ans: In multipoint connection more than two specific devices share a single link.
Here the capacity of the channel is shared either separately or temporally.
9.What is a topology?
34
Ans: Topology of a network is defined as the geometric representation of the
relationship of all the links and linking devices (node) to one another.Four basic
topologies are star, bus, ring and mesh. Star – Here each device has a dedicated point
to point link only to a central controller called hub.
Bus -It is multipoint. One long cable acts as a backbone to link all the devices in
the network.
Ring -Here each device has a dedicated point to point connection only with the two
devices on either side of it. Mesh -Here every device has a dedicated point to point
link to every other device.
101.Define internet?
12.What is a protocol?
Ans: It is a set of rules that governs data communication. A protocol defines what
is communicated, how it is communicated, and when it is communicated. The key
elements of protocol are syntax, semantics and timing.
Data link- It organizes bits into frames. It provides hop to hop delivery.
Transport-It provides reliable process to process message delivery and error recovery.
35
Application-It allows ti access to network resources.
Ans: Multiplexing is the process of dividing a link, the phycal medium, into logical
channels for better efficiency. Here medium is not changed but it has several
channels instead of one.
15.What is switching?
Ans: Analog signals can have an infinite number of values in a range but digital
signal can have only a limited number of values.
18.Define bandwidth?
Ans: The range of frequencies that a medium can pass is called bandwidth. It is
the difference between the highest and lowest frequencies that the medium can
satisfactorily pass.
Ans: Data rate ie.how fast we can send data depends upon i) Bandwidth available ii)
The levels of signals we can use iii) The quality of the channel (level of noise)
36
20.Define bit rate and bit interval?
Ans: Digital signals are aperiodic.so instead of using period and frequency we use
bit interval and bit rate respectively.Bit interval is the time required to send one
single bit.Bit rate is the number of bit intervals per second.
Ans: For a noiseless channel, the Nyquist bit rate formula defines the
theoretical maximum bit rate
Bitrate=2* Bandwidth*log2L
Where Bandwidth is the bandwidth of the channel L is the number of signal level
used to represent the data Bitrate is the bit rate in bits per second.
22.What is sampling?
Ans: Pulse code Modulation modifies pulses created by PAM to create a completely digital
signal. For this PCM first quantizes the PAM pulse. Quantization is the method of
assigning integral values in a specific tange to sampled instances.PCM is made up of
37
four separate processes: PAM, quantization, binary encoding and line encoding.
Ans: According to this theorem, the sampling rate must be at least 2 times the
highest frequency of the original signal.
Ans: It is a serial mode of transmission.In this mode of transmission, bits are sent in
a continuous stream without start and stop bit and without gaps between bytes.
Regrouping the bits into meaningful bytes is the responsibility of the receiver.
30.What is FDM?
38
Ans: In frequency division multiplexing each signal modulates a different carrier
frequency. The modulated carrier combines to form a new signal that is then sent
across the link. Here multiplexers modulate and combine the signal while
demultiplexers decompose and demodulate. Guard bands keep the modulating
signal from overlapping and interfering with one another.
31.What is TDM ?
Ans: In TDM digital signals from n devices are interleaved with one another, forming
a frame of data. Framing bits allow the TDM multiplexer to synchronize properly.
Ans: The media which provides a conduct from one device to another is called a
guided media. These include twisted pair cable, coaxial cable, and fiber-optic cable.
Ans: Twisted pair cable consists of two insulated cupper wires twisted together. It is used
in telephone line for voice and data communications. Coaxial cable has the following
layers: a metallic rod-shaped inner conductor, an insulator covering the rod, a metallic
outer conductor (shield), an insulator covering the shield, and a plastic cover.Coaxial cable
can carry signals of higher frequency ranges than twisted-pair cable. Coaxial cable is used
in cable TV networks and Ethernet LANs.Fiber-optic cables are composed of a glass or
plastic inner core surrounded by cladding, all encased in an outer jacket.Fiber-optic cables
carry data signals in the form of light. The signal is propagated along the inner core by
reflection. Its features are noise resistance, low
39
attenuation, and high bandwidth capabilities. It is used in backbone networks, cable
TV nerworks, and fast Ethernet networks.
Ans: Errors can be categorized as a single-bit error or burst error. A single bit error
has one bit error per data unit. A burst error has two or more bits errors per data unit.
Ans: Redundancy is the concept of sending extra bits for use in error detection.
Three common redundancy methods are parity check, cyclic redundancy check
(CRC), and checksum.
Ans: In parity check, a parity bit is added to every data unit so that the total number of 1s
is even (or odd for odd parity).Simple parity check can detect all single bit errors. It can
detect burst errors only if the total number of errors in each data unit is odd.In two
40
dimensional parity checks, a block of bits is divided into rows and a redundant row
of bits is added to the whole block.
Ans: The hamming code is an error correction method using redundant bits. The
number of bits is a function of the length of the data bits. In hamming code for a data
unit of m bits, we use the formula 2r >= m+r+1 to determine the number of redundant
bits needed. By rearranging the order of bit transmission of the data units, the
hamming code can correct burst errors.
Ans: It is the regulation of sender’s data rate so that the receiver buffer doesn’t
become overwhelmed.i.e. flow control refers to a set of procedures used to restrict the
amount of data that the sender can send before waiting for acknowledgement.
43.What is HDLC?
Ans: It is a bit oriented data link protocol designed to support both half duplex and
full duplex communication over point to point and multi point links.HDLC is
characterized by their station type,configuration and their response modes.
Ans: Authentication means validating the identity of a user who needs to access a set
41
of resources. It is of two types i)Password Authentication Protocol(PAP) ii)Challenge
Handshake Authentication Protocol(CHAP) PAP is a two step process. The user
sends a authentication identification and a password. The system determines the
validity of the Information sent.CHAP is a three step process. The system sends a
value to the user. The user manipulates the value and sends the result. The system
Verifies the result.
Ans: To reduce the possibility of collision CSMA method was developed. In CSMA
each station first listen to the medium (Or check the state of the medium) before
sending. It can’t eliminate collision.
48.What is IP address?
Ans: The internet address (IP address) is 32bits that uniquely and universally defines
a host or router on the internet. The portion of the IP address that identifies the
network is called netid. The portion of the IP address that identifies the host or router
on the network is called hostid.
42
49.What do you mean by subnetting?
Ans: Subnetting divides one large network into several smaller ones. It adds
an intermediate level of hierarchy in IP addressing.
Ans: The advantages of fiber optics cable over twisted pair cable are Noise
resistance-As they use light so external noise is not a factor. Less signal attenuation-
fiber optics transmission distance is significantly greater than that of other guided
media.Higher bandwidth-It can support higher bandwidth.
51.What is Firewalls?
52.What is Repeaters ?
53.Define IP ?
43
Ans: In client server model ,the client runs a program to request a service and the
server runs a program to provide the service.These two programs communicate
with each other. One server program can provide services to many client programs.
Ans: Each computer attached to TCP/IP must possesses the following information
• Its IP addesss • Its subnet mask • The IP addesss of the router. • The Ip address of
the name server.
Ans: Domain Name System (DNS )is a client server application that identifies
each host on the internet with a unique user friendly name.
57.What is TELNET ?
Ans: When a user logs into a local time-sharing system ,it is called local login. When
a user wants to access an application program or utility located on a remote machine,he
or she performs remote login.
44
Terminal(NVT) character set.Via this interface TELNET translates characters (data
or command) that come from local terminal into NVT form and delivers them to the
network.
Ans: The TCP/IP protocol that supports electronic mail on the internet is called
Simple Mail Transfer Protocol.SMTP provides for mail exchange between users on the
same or different computer and supports Sending a single message to one or more
recipient Sending message that include text, voice,video,or graphics.Sending message
to users on network outside the internet.
Ans: It is the main protocol used to access data on the World Wide Web .the
protocol transfers data in the form of plain text,hypertext,audio,video,and so on. It is
so called because its efficiency allows its use in a hypertext environment where there
are rapid jumps from one document to another. 100.What is URL ? Ans: It is a
standard for specifying any kind of information on the World Wide Web.
Ans: World Wide Web is a repository of information spread all over the world and
linked together.It is a unique combination of flexibility,portability,and user-friendly
features .The World Wide Web today is a distributed client-server service,in which
a client using a browser can access a service using a server.The service provided is
distributed over many locations called web sites.
63.What is HTML ?
45
64.Difference between Internet, Intranet and Extranet ?
Internet is a network which is for public, world where intranet and extranet is a network
for private use,
internet is a network where anybody can access, from around the world, but in intranet
and extranet we add some privacy so only allowed people can access.
They are completely different standards. you may have seen 802.11 somewhere. this is the
standard for Wifi, while Wimax is 802.16. Wifi is more of a local wireless network technology,
where the longest ranges are around 300 ft. with the newest iteration(802.11n) you can get
speeds of up to 300Mbps. To contrast, Wimax has a much larger range(tests have gone over
30 miles), but also has a much lower max speed, which is currently theoretically up to 40
Mbps, however most real world tests only get around 10Mbps. since they are different
46
Database Management System:
1. A report generator is used to
A. update files
C. data entry
Answer: Option B
Explanation:
No answer description available for this question.
B. Relational
C. Network
D. Chain
Answer: Option D
Explanation:
No answer description available for this question
47
A. database design
C. performance monitoring
D. user coordination
Answer: Option E
Explanation:
No answer description available for this question.
B. Sort
C. Look-up
Answer: Option C
Explanation:
No answer description available for this question.
5. Each of data files has a _____ that describe the way the data is stored in the file.
A. File structure
B. Records
C. Fields
D. Database
Answer: Option A
Explanation:
No answer description available for this question.
48
6. After you _____ a record, many data management the environments require you to issue
a command to save the changes you made.
A. Delete
B. Update
C. Sort key
D. Index
Answer: Option B
Explanation:
No answer description available for this question.
7. What is the language used by most of the DBMSs for helping their users to access data?
A. High level language
B. Query language
C. SQL
D. 4GL
Answer: Option B
Explanation:
No answer description available for this question.
B. language
C. spelling
D. width
Answer: Option D
Explanation:
49
No answer description available for this question.
9. In SQL, which command is used to make permanent changes made by statements issue
since the beginning of a transaction?
A. ZIP
B. PACK
C. COMMIT
D. SAVE
Answer: Option C
Explanation:
No answer description available for this question.
10. Periodically adding, changing and deleting file records is called file
A. Updating
B. upgrading
C. restructuring
D. renewing
Answer: Option A
Explanation:
No answer description available for this question.
50
Answer: Option B
Explanation:
No answer description available for this question.
Answer: Option D
Explanation:
No answer description available for this question.
B. CHANGE USER
C. ALTER TRIGGER
Answer: Option C
Explanation:
No answer description available for this question
14. If the record management system allows you to edit values before they are recorded on
disk, you can
A. correct spelling changes before they are recorded
51
E. None of the above
Answer: Option A
Explanation:
No answer description available for this question
15. The relational model uses some unfamiliar terminology. A tuple is equivalent to a:
A. record
B. field
C. file
D. data base
E. data item
Answer: Option A
Explanation:
No answer description available for this question.
16. The files stored on a secondary stage device are composed of a hierarchy of data. What does
a record in a file contain?
A. Bits
B. Characters
C. Data field
D. Schema
Answer: Option C
Explanation:
No answer description available for this question.
17. Which command is used to remove an index from the database in SQL?
A. DELETE INDEX
B. DROP INDEX
C. REMOVE INDEX
52
D. ROLL BACK INDEX
Answer: Option B
Explanation:No answer description available for this question.
18. An-owner-member set in the CODASYL specifications may have
A. only one owner but many owner occurrences
C. more than one member but only one occurrence per member
Answer: Option A
Explanation:
No answer description available for this question
19. What is the name given to the database management system which is able to handle full
text data, image data, audio and video?
A. Full media
B. Graphics media
C. Multimedia
D. Hypertext
Answer: Option C
Explanation:
No answer description available for this question.
B. Network schema
C. Relational schema
53
D. All of the above
Answer: Option A
Explanation:No answer description available for this question.
21. A database management system
A. allows simultaneous access to multiple files
Answer: Option D
Explanation:
No answer description available for this question.
22. Which of the following hardware components is the most important to the operation of
a database management system?
A. high-resolution video display
B. printer
D. plotter
E. mouse
Answer: Option C
Explanation:
No answer description available for this question.
23. The PROJECT command will create new table that has
A. more fields than the original table
54
D. all the fields of master table
Answer: Option E
Explanation:No answer description available for this question.
24. To have a file hold a list, it is necessary to
A. identify the records in the list
B. identify the name, width and type of the fields of each record.
Answer: Option D
Explanation:
No answer description available for this question.
Answer: Option D
Explanation:
No answer description available for this question.
26. In a _____ a parent record type can be linked to one or more "child" record types, but a
child record type can have only one parent.
A. Network database
B. Relational database
55
C. Distributed database
D. Hierarchical database
Answer: Option D
Explanation:No answer description available for this question.
27. Which two files are used during operation of the DBMS?
A. query language and utilities
Answer: Option C
Explanation:
No answer description available for this question.
28. When using a database management system, the first thing that you must do is to
A. create a database file
Answer: Option C
Explanation:
No answer description available for this question.
56
A. restricts the structure to a one-to-many relationship
B. 4th Dimension
C. FoxPro
D. Reflex
Answer: Option D
Explanation:
No answer description available for this question.
31. Which command is used to remove a table from the database in SQL?
A. DELETE TABLE
B. DROP TABLE
C. ERASE TABLE
D. UNATTACH TABLE
Answer: Option B
Explanation:
57
No answer description available for this question.
B. Log file
C. Master file
D. Update file
Answer: Option C
Explanation:
No answer description available for this question.
Answer: Option A
Explanation:
No answer description available for this question.
58
D. All of the above
Answer: Option C
Explanation:No answer description available for this question.
C. It is conceptually simple
Answer: Option B
Explanation:
No answer description available for this question.
C. grant system privileges, roles, and object privileges to uses and roles
Answer: Option C
Explanation:
No answer description available for this question.
59
B. database
C. data file
D. data record
Answer: Option B
Explanation:
No answer description available for this question.
B. tree
C. chain
D. relational
Answer: Option B
Explanation:
No answer description available for this question.
Answer: Option C
Explanation:
60
No answer description available for this question.
40. In SQL, which command(s) is(are) used to enable/disable all triggers on a table?
A. ALTER TRIGGERS
B. ALTER TABLE
Answer: Option B
Explanation:
No answer description available for this question.
Answer: Option B
Explanation:
No answer description available for this question.
C. create them
61
D. access them
Answer: Option B
Explanation:No answer description available for this question.
43. A list consists of last names, first names, addresses, and pin codes if all people in the list
have the same last and the same pin code, a useful key would be
A. the pin code
C. a compound key consisting of the first name and the last name
Answer: Option C
Explanation:
No answer description available for this question.
B. ADD ROW
C. INSERT
D. APPEND
Answer: Option C
Explanation:
No answer description available for this question.
62
A. file
B. field
C. data
D. batch
Answer: Option A
Explanation:
No answer description available for this question.
46.If you want to group the records in the abc database, you could use the Jobcode as the _____.
A. Delete
B. Update
C. Sort Key
D. Index
Answer: Option C
Explanation:
No answer description available for this question.
47. The Management Information system (MIS) structure with one main computer system is called a
A. hierarchical MIS structure
63
E. None of the above
Answer: Option C
Explanation:
No answer description available for this question.
Answer: Option B
Explanation:
No answer description available for this question.
B. privacy invasion
Answer: Option B
Explanation:
No answer description available for this question.
64
B. Look-up
C. Modify
Answer: Option A
Explanation:
No answer description available for this question.
B. INSERT COLUMN
C. MODIFY TABLE
D. ALTER TABLE
Answer: Option D
B. ALTER DATABASE
C. ALTER TABLE
D. MODIFY TRIGGER
Answer: Option A
65
B. Domains
C. Queries
Answer: Option B
B. INSERT
C. BROWSE
D. APPEND
Answer: Option A
55.What name is given to the collection of facts, items of information or data which are related
in some way?
A. Database
B. Directory information
C. Information tree
D. Information provider
Answer: Option A
66
B. each user can access every sub¬schema
Answer: Option A
57.Which of the following command(s) is(are) used to recompile a stored procedure in SQL?
A. COMPILE PROCEDURE
B. ALTER PROCEDURE
Answer: Option B
58.Internal auditors should review data system design before they are
A. developed
B. implemented
C. modified
Answer: Option D
59. A _____ means that one record in a particular record type may be related to more than
one record of another record type.
A. One-to-one relationship
67
B. One-to-many relationship
C. Many-to-one relationship
B. DEFINE TABLE
C. MODIFY TABLE
Answer: Option A
B. MODIFY TABLE
C. ALTER TABLE
Answer: Option C
68
A. to add/rename data files
D. to begin/end a backup
Answer: Option E
63.The language used in application programs to request data from the DBMS is referred to as the
A. DML
B. DDL
C. query language
Answer: Option A
64.A database management system might consist of application programs and a software
package called
A. FORTRAN
B. AUTOFLOW
C. BPL
D. TOTAL
Answer: Option C
69
65.An audit trail
A. is used to make back-up copies
Answer: Option B
B. two users of the DBMS are interacting with different files at the same time
Answer: Option A
Answer: Option C
70
68.The on-line, softcopy display a customer's charge account to respond to an inquiry is
an examples of a
A. forecasting report
B. exception report
D. on demand report
Answer: Option D
69.In SQL, which command(s) is(are) used to create a synonym for a schema object?
A. CREATE SCHEMA
B. CREATE SYNONYM
C. CREATE SAME
Answer: Option B
70.If you want your database to include methods, you should use a _____ database.
A. Network
B. Distributed
C. Hierarchical
D. Object-Oriented
71
E. None of the above
71.In SQL, which of the following is not a data Manipulation Language Commands?
A. DELETE
B. SELECT
C. UPDATE
D. CREATE
B. treelike structure
D. records
Answer: Option B
73.A computer file contains several records. What does each record contain?
A. Bytes
B. Words
C. Fields
D. Database
72
E. None of the above
Answer: Option C
C. to recompile a table
D. to create a trigger
Answer: Option B
75.A ____ Contains the smallest unit of meaningful data, so you might call it the
basic building block for a data file.
A. File structure
B. Records
C. Fields
D. Database
Answer: Option C
B. processing functions
C. access control
73
D. All of the above
Answer: Option B
B. MK USER
C. CREATE USER
Answer: Option C
B. you look at each form sequentially until you see the one you want
C. you type the key in an entry line, and the correct form is displayed
Answer: Option A
79.A _____ means that one record in a particular record type is related to only one record of another
record type.
A. One-to-one relationship
B. One-to-many relationship
C. Many-to-one relationship
74
D. Many-to-many relationship
Answer: Option A
80.A _____ database does not use pointers or physical links, but instead finds related records by
examining the contents of fields.
A. Network
B. Hierarchical
C. Relational
D. Object-Oriented
Answer: Option C
81.In SQL, which command(s) is(are) used to redefine an index's future storage allocation
A. ALTER INDEX
B. REDEFINE INDEX
C. MODIFY INDEX
D. DO INDEX
Answer: Option A
C. data redundancy
75
D. program dependence
Answer: Option E
83.With respect to data input, the most accurate description of batch control is
A. dividing documents to be entered into batches
C. comparing to a pre-calculated figure the total of a data item summed across a batch records put
into the system
Answer: Option C
84.The model for a _____ resembles the hierarchical model in many respects.
A. Network database
B. Relational database
C. Distributed database
D. Hierarchical database
Answer: Option A
85.A set of programs that handle a firm's data base responsibilities is called a
A. Data Base Management System (DBMS)
76
B. Data Base Processing System (DBPS)
Answer: Option D
86.In any hierarchy of data organization, the smallest entity to be processed as a single unit is called
A. data field
B. data record
C. data file
D. Database
B. middle management
C. lower management
Answer: Option A
77
A. handwritten list
C. a business form
Answer: Option D
B. Prompts
C. Data
Answer: Option D
90.Which of the following contains a complete record of all activity that affected the contents of
a database during a certain period of time?
A. report writer
B. query language
D. transaction log
Answer: Option D
78
91.Two files may be joined into a third file if
A. they have a row in common
C. they have no records with the same value in the common field
Answer: Option B
B. a multiprocessing environment
Answer: Option D
B. separate files
C. data base
D. data-base administrator
79
E. None of the above
Answer: Option B
94.The way a particular application views the data from the data base that the application uses is a :
A. Module
B. relational model
C. Schema
D. subschema
B. Data
C. Fields
D. Database
80
E. None of the above
Answer: Option C
B. Records
C. databases
D. file system
Answer: Option C
99.In SQL, which command is used to select data in rows and column from one or more tables?
A. CHOOSE
B. SELECT
C. LIST
D. BROWSE
81
E. None of the above
Answer: Option B
C. record relationships
Answer: Option D
Theory part:
1.What is database?
A database is a logically coherent collection of data with some inherent meaning, representing some
aspect of real world and which is designed, built and populated with data for a specific purpose.
2.What is DBMS?
It is a collection of programs that enables user to create and maintain a database. In other words it
is general-purpose software that provides the users with the processes of defining, constructing
and manipulating the database for various applications.
Redundancy is controlled.
Unauthorised access is restricted.
Providing multiple user interfaces.
Enforcing integrity constraints.
Providing backup and recovery.
82
Difficult in accessing data.
Data isolation.
Data integrity.
Concurrent access is not possible.
Security Problems.
Extension: It is the number of tuples present in a table at any instance. This is time dependent.
Intension: It is a constant value that gives the name, structure of table and the constraints laid on it.
System R was designed and developed over a period of 1974-79 at IBM San Jose Research
Center. It is a prototype and its purpose was to demonstrate that it is possible to build a
Relational System that can be used in a real life environment to solve real life problems, with
performance at least comparable to that of existing system.
Its two subsystems are
Research Storage
System Relational Data System.
10.How is the data structure of System R different from the relational structure?
Data independence means that "the application is independent of the storage structure and
access strategy of data". In other words, The ability to modify the schema definition in one level
should not affect the schema definition in the next higher level.
83
Two types of Data Independence:
Physical Data Independence: Modification in physical level should not affect the logical level.
Logical Data Independence: Modification in logical level should affect the view level.
NOTE: Logical Data Independence is more difficult to achieve
A view may be thought of as a virtual table, that is, a table that does not really exist in its own right
but is instead derived from one or more underlying base table. In other words, there is no stored
file that direct represents the view instead a definition of view is stored in data dictionary.
Growth and restructuring of base tables is not reflected in views. Thus the view can insulate
users from the effects of restructuring and growth in the database. Hence accounts for logical
data independence.
A collection of conceptual tools for describing data, data relationships data semantics
and constraints.
This data model is based on real world that consists of basic objects called entities and of
relationship among these objects. Entities are described in a database by a set of attributes.
This model is based on collection of objects. An object contains values stored in instance variables
with in the object. An object also contains bodies of code that operate on the object. These bodies
of code are called methods. Objects that contain same types of values and the same methods are
grouped together into classes.
16.What is an Entity?
84
An entity set may not have sufficient attributes to form a primary key, and its primary key
compromises of its partial key and primary key of its parent entity, then it is said to be Weak Entity
set.
20.What is an attribute?
A relation Schema denoted by R(A1, A2, ..., An) is made up of the relation name R and the list
of attributes Ai that it contains. A relation is defined as a set of tuples. Let r be the relation which
contains set tuples (t1, t2, t3, ..., tn). Each tuple is an ordered list of n-values t=(v1,v2, ..., vn).
23.What is Relationship?
Relationship type defines a set of associations or a relationship set among a given set of
entity types.
A data base schema is specifies by a set of definitions expressed by a special language called DDL.
85
29.What is SDL (Storage Definition Language)?
This language is to specify the internal schema. This language may specify the mapping
between two schemas.
The storage structures and access methods used by database system are specified by a set
of definition in a special type of DDL called data storage-definition language.
This language that enable user to access or manipulate data as organised by appropriate
data model.
Procedural DML or Low level: DML requires a user to specify what data are needed and how
to get those data.
Non-Procedural DML or High level: DML requires a user to specify what data are needed
without specifying how to get those data.
It translates DML statements in a query language into low-level instruction that the query
evaluation engine can understand.
The High level or Non-procedural DML can specify and retrieve many records in a single
DML statement. This retrieve of a record is said to be Set-at-a-time or Set-oriented.
It is procedural query language. It consists of a set of operations that take one or two relations
as input and produce a new relation.
86
37. What is normalization?
It is a process of analysing the given relation schemas based on their Functional
Dependencies (FDs) and primary key to achieve the properties
(1).Minimizing redundancy, (2). Minimizing insertion, deletion and update anomalies.
41 What is 2NF?
A relation schema R is in 2NF if it is in 1NF and every non-prime attribute A in R is fully functionally
dependent on primary key.
44.What is 4NF?
A relation schema R is said to be in 4NF if for every Multivalued dependency X Y that holds over
R, one of following is true.
1.) X is subset or equal to (or) XY = R.
2.) X is a super key.
87
45.What is a query?
A query with respect to DBMS relates to user commands that are used to interact with a data base.
The query language can be classified into data definition language and data manipulation language.
47.Are the resulting relations of PRODUCT and JOIN operation the same?
No.
PRODUCT: Concatenation of every row in one relation with every row in another.
JOIN: Concatenation of rows from one relation and related rows from another.
A database trigger is a PL/SQL block that can defined to automatically execute for insert,
update, and delete statements against a table. The trigger can e defined to execute once for the
entire statement or once for every row that is inserted, updated, or deleted. For any one table,
there are twelve events for which you can define database triggers. A database trigger can call
database procedures that are also written in PL/SQL.
It is a program module, which is responsible for fetching data from disk storage into main
memory and deciding what data to be cache in memory.
It is a program module, which ensures that database, remains in a consistent state despite
system failures and concurrent transaction execution proceeds without conflicting.
It is a program module, which manages the allocation of space on disk storage and data
structure used to represent information stored on a disk.
88
Data Structure
1 - In a min-heap:
Answer : A
Explanation
In a min heap, parents always have lesser or equal values than that of their
childs.
A - queue
B - tree
C - list
D - stack
Answer : D
Explanation
Stack uses LIFO method which is good for checking matching paranthesis.
89
3 - Minimum number of queues required for priority queue implementation?
A-5
B-4
C-3
D-2
Answer : D
Explanation
Minimum number of queues required for priority queue implementation is two.
One for storing actual data and one for storing priorities.
A-n
B-n-1
C-n+1
D - 2n
Answer : A
Explanation
To make a graph cyclic, the number of edges should be at least equal to
vertices in the graph.
5 - An algorithm is
Answer : C
90
Explanation:An algorithm is a step by step procedure to solve
a computer problem.
A - Selection Sort
B - Bubble Sort
C - Merge Sort
D - Insertion Sort
Answer : A
Explanation
Except selection sort, all other soring algorithms are stable.
A - expression parsing
B - recursion
C - resource allocation
Answer : C
Explanation
Queues can be used for limited resource allocation. For other operations,
stacks are used.
B - recursive approach
C - B but not A
D - Both A & B
91
Answer : D
Explanation
The recursive approach of tower of hanoi uses divide and conquer method.
A - e-n+1
B - n-e+1
C - n+e-1
D - e-n-1
Answer : A
Explanation
We can remove maximum e-n+1 edges to get a spanning tree from complete
graph. Any more deletion of edges will lead the graph to be disconnected.
Answer : C
Explanation
A stable sorting algorithm like bubble sort, does not change the sequence of
appearance of similar element in the sorted list.
A - Ο(n2)
92
B - Ο(nlog n)
C - Ο(n3)
D - Ο(n)
Answer : D
Explanation
In the worst case, binary search will be left or right intended, making it
compare all the n values.
A - 2k − 1
B - 2k+1 − 1
C - 2k-1 + 1
D - 2k − 1
Answer : B
Explanation
If the root node is at height 0, then a binary tree can have at max 2k+1 − 1
nodes.
A - true
B - false
Answer : A
Explanation
A linked-list is dynamic structure, it can shrink and expand as required by the
program.
93
A - 2n - 1
B-n
C-n+1
D-n-1
Answer : D
Explanation
In a simple graph, a vertex can have edge to maximum n - 1 vertices.
A - Bubble Sort
B - Merge Sort
C - Insertion Sort
Answer : B
Explanation
Only Merge sort requires extra space.
16 - The number of binary trees with 3 nodes which when traversed in post
order gives the sequence A,B,C is ?
A-3
B-4
C-5
D-6
Answer : C
Explanation
Five binary trees (of 3 nodes) are possible.
94
A - Base case
B - Average case
C - Worst case
D - NULL case
Answer : A
Explanation
Θ represents average case. Ο represents worst case and Ω represents base
case.
A - Tower of Hanoi
B - Fibonacci Series
Answer : A
Explanation
Tower of hanoi has the highest run time complexity
Answer : A
Explanation
BST does not care about complete binary tree properties.
95
20 - Which of the following algorithm does not divide the list −
A - linear search
B - binary search
C - merge sort
D - quick sort
Answer : A
Explanation
Linear search, seaches the desired element in the target list in a sequential
manner, without breaking it in any way.
Theory part:
1.What is the difference between a stack and a Queue?
Data structure is a way of defining, storing & retriving of data in a structural &
systemetic way. A data structure may contain different type of data items.
3.What is a linked-list?
A linked-list is a list of data-items connected with links i.e. pointers or
references. Most modern high-level programming language does not provide
the feature of directly accessing memory location, therefore, linked-list are
not supported in them or available in form of inbuilt functions.
96
4.What is stack?
In data-structure, stack is an Abstract Data Type (ADT) used to store and
retrieve values in Last In First Out method.
Stacks follows LIFO method and addition and retrieval of a data item takes
only Ο(n) time. Stacks are used where we need to access data in the reverse
order or their arrival. Stacks are used commonly in recursive function calls,
expression parsing, depth first traversal of graphs etc.
As queues follows FIFO method, they are used when we need to work on
data-items in exact sequence of their arrival. Every operating system
maintains queues of various processes. Priority queues and breadth first
traversal of graphs are some examples of queues.
97
9.What is binary search?
A binary search works only on sorted lists or arrays. This search selects the middle
which splits the entire list into two parts. First the middle is compared.
This search first compares the target value to the mid of the list. If it is not found, then
it takes decision on whether.
See the below image of a binary search tree, and traverse it using all available methods −
98
14.What is a minimum spanning tree (MST) ?
In a weighted graph, a minimum spanning tree is a spanning tree that has minimum weight that
all other spanning trees of the same graph.
18.What is hashing?
Hashing is a technique to convert a range of key values into a range of indexes of an array. By
using hash tables, we can create an associative data storage where data index can be find by
providing its key values.
Postfix Notation − a b + c d + *
Expand HCMOS?
High-density n- type Complimentary Metal Oxide Silicon field effect transistor.
What is an interrupt?
Interrupt is a signal send by external device to the processor so as to request the processor to perform a
particular work.
Expand DMA?
Direct Memory Access
What is NV-RAM?
Nonvolatile Read Access Memory, also called Flash memory.
What is a flag?
Flag is a flip-flop used to store the information about the status of a processor and the status of the
instruction executed most recently
Which interrupts are generally used for critical events? Non-Maskable interrupts are used in critical
events. Such as Power failure, Emergency, Shut off etc.
d. All of above
Once text has been cut to the clipboard, you can .....that text into another
document a. Paste
b. Copy
c. Transfer
d. None of the above
What is the function of radio button?
a. To select multiple option
b. To select single option
c. To select all option
d. All of above
The Banker's algorithm is used
a. to rectify deadlock
b. to detect deadlock c.
to prevent deadlock d.
to slove deadlock
The primary purpose of an operating system is:
a. To make the most efficient use of the computer
hardware b. To allow people to use the computer,
c. To keep systems programmers employed
d. To make computers easier to use
The primary purpose of an operating system is a ...
a. To make the most efficient use of computer
hardware b. To allow people to use the computer
c. To keep system programmer employed
d. To make computer easier to use
You can use print manage window
a. To check status of files in the print queue
b. To cancel the print job
c. To interrupt printing
d. All of the above
11 – d 12 – d 13 – a 14 – d 15 – d 16 – d 17 – d 18 – c 19 – c 20 – b
21 – a 22 – a 23 – a 24 – d 25 – a 26 – b 27 – a 28 – d 29 – b 30 – c
31 – a 32 – c 33 – d 34 – b 35 – b 36 – d 37 – a 38 – d 39 – a 40 – c
41 – b 42 – d 43 – c 44 – b 45 – a 46 – a 47 – a 48 – c 49 – c 50 - c
51 – c 52 – d 53 – a 54 – a 55 – a 56 – b 57 – c 58 – a 59 – a 60 – d
Answer:a
Explanation:None.
A DNS client is
called a) DNS updater
b) DNS resolver
c) DNS handler
d) none of the mentioned
View Answer
Answer:b
Explanation:None.
Servers handle requests for other domains
a) directly
b) by contacting remote DNS
server c) it is not possible
d) none of the mentioned
View Answer
Answer:b
Explanation:None.
DNS database contains
a) name server records
b) hostname-to-address
records c) hostname aliases
d) all of the mentioned
View Answer
Answer:d
Explanation:None.
advertisements
If a server has no clue about where to find the address for a hostname
then a) server asks to the root server
b) server asks to its adjcent
server c) request is not processed
d) none of the mentioned
View Answer Answer:a
Explanation:None.
Which one of the following allows client to update their DNS entry as their IP address
change? a) dynamic DNS
b) mail transfer agent
c) authoritative name
server d) none of the
mentioned View Answer
Answer:a
Explanation:None.
Wildcard domain names start with label
a) @
b) *
c) &
d) #
View Answer
Answer:b
Explanation:None.
The right to use a domain name is delegated by domain name registers which are accredited by
a) internet architecture board
b) internet society
c) internet research task force
d) internet corporation for assigned names and
numbers View Answer
Answer:d
Explanation:None.
advertisements
Answer:c
Explanation:None.
A piece of icon or image on a web page associated with another webpage is called
a) url
b) hyperlink
c) plugin
d) none of the mentioned
View Answer
Answer:b
Explanation:None.
2. Dynamic web page
is same every time whenever it displays
generates on demand by a program or a request from browser
both (a) and (b)
none of the mentioned
View Answer
Answer:b
Explanation:None.
3. What is a web browser?
a program that can display a web page
a program used to view html documents
it enables user to access the resources of internet
all of the mentioned
View Answer
Answer:d
Explanation:None.
4. Common gateway interface is used to
generate executable files from web content by web server
generate web pages
stream videos
none of the mentioned
View Answer
Answer:a
Explanation:None.
advertisements
Answer:a
Explanation:None.
Which one of the following is not used to generate dynamic web
pages? a) PHP
b) ASP.NET
c) JSP
d) none of the mentioned
View Answer
Answer:d
Explanation:None.
An alternative of javascript on windows platform
is a) VBScript
b) ASP.NET
c) JSP
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
Computer Networks Questions & Answers – HTTP & FTP
Multiple object can be sent over a TCP connection between client and server
in a) persistent HTTP
b) nonpersistent HTTP
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
HTTP is ________ protocol.
a) application layer
b) transport layer
c) network layer
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
In the network HTTP resources are located
by a) uniform resource identifier
unique resource locator
unique resource identifier
none of the mentioned
View Answer
Answer:a
Explanation:None.
HTTP client requests by establishing a __________ connection to a particular port on the server.
a) user datagram protocol
b) transmission control protocol
c) broader gateway protocol
d) none of the mentioned
View Answer
Answer:b
Explanation:None.
advertisements
5. In HTTP pipelining
multiple HTTP requests are sent on a single TCP connection without waiting for the corresponding responses
multiple HTTP requests can not be sent on a single TCP connection
multiple HTTP requests are sent in a queue on a single TCP connection
none of the mentioned
Answer:b
Explanation:None.
In FTP protocol, client contacts server using ____ as the transport
protocol. a) transmission control protocol
b) user datagram protocol
c) datagram congestion control protocol
d) stream control transmission protocol
View Answer
Answer:a
Explanation:None.
In which mode FTP, the client initiates both the control and data
connections. a) active mode
b) passive mode c)
both (a) and (b)
d) none of the mentioned
View Answer
Answer:b
Explanation:None.
advertisements
The file transfer protocol is built
on a) data centric architecture
b) service oriented architecture
c) client server architecture d)
none of the mentioned View
Answer
Answer:c
Explanation:None.
In file transfer protocol, data transfer can be done in
a) stream mode
b) block mode
c) compressed mode d)
all of the mentioned
View Answer
Answer:d
Explanation:None.
Computer Networks Questions & Answers – Ethernet
Answer:a
Explanation:None.
What is stat frame delimeter (SFD) in ethernet frame?
a) 10101010
b) 10101011
c) 00000000
d) 11111111
View Answer
Answer:b
Explanation:None.
MAC address is of
1) 24 bits b)
36 bits c) 42
bits d) 48 bits
View Answer
Answer:d
Explanation:None.
4. What is autonegotiation?
a procedure by which two connected devices choose common transmission parameters
a security algorithm
a routing algorithm
none of the mentioned
View Answer
Answer:a
Explanation:None.
advertisements
Answer:a
Explanation:None.
High speed ethernet works
on a) coaxial cable
b) twisted pair cable
c) optical fiber
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
The maximum size of payload field in ethernet frame is
a) 1000 bytes
b) 1200 bytes
c) 1300 bytes
d) 1500 bytes
View Answer
Answer:d
Explanation:None.
advertisements
Answer:b
Explanation:None.
Computer Networks Questions & Answers – Wireless LAN
Answer:a
Explanation:None.
In wireless ad-hoc network
a) access point is not required
b) access point is must
c) nodes are not required
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
Which multiple access technique is used by IEEE 802.11 standard for wireless
LAN? a) CDMA
b) CSMA/CA
c) ALOHA
d) none of the mentioned
View Answer
Answer:b
Explanation:None.
4. In wireless distribution system
multiple access point are inter-connected with each other
there is no access point
only one access point exists
none of the mentioned
View Answer
Answer:a
Explanation:None.
advertisements
Explanation:In infrastructure mode WNIC needs access point but in ad-hoc mode access point is not required.
In wireless network an extended service set is a set of
a) connected basic service sets
all stations
all access points
none of the mentioned
View Answer
Answer:a
Explanation:None.
Mostly ________ is used in wireless
LAN. a) time division multiplexing
b) orthogonal frequency division multiplexing
c) space division multiplexing
d) none of the mentioned
View Answer
Answer:b
Explanation:None.
Which one of the following event is not possible in wireless
LAN. a) collision detection
b) Acknowledgement of data frames
c) multi-mode data transmission
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
advertisements
Answer:a
Explanation:None.
Computer Networks Questions & Answers – WiMAX
Answer:c
Explanation:None.
3. WiMAX uses the
orthogonal frequency division multiplexing
time division multiplexing
space division multiplexing
all of the mentioned
View Answer
Answer:a
Explanation:None.
Which one of the following modulation scheme is supported by WiMAX?
a) binary phase shift keying modulation
b) quadrature phase shift keying modulation
c) quadrature amplitude modulation
d) all of the mentioned
View Answer
Answer:d
Explanation:None.
advertisements
Answer:c
Explanation:None.
WiMAX provides
a) VoIP services
b) IPTV services
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
Devices that provide the connectivity to a WiMAX network are known as
a) subscriber stations
b) base stations
c) gateway
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
advertisements
Answer:b
Explanation:None.
Computer Networks Questions & Answers – Bluetooth
Answer:a
Explanation:Piconet is the basic unit of bluetooth system having a master node and upto seven active slave nodes.
In a piconet, there can be up to _____ parked nodes in the net.
a) 63
b) 127 c) 255
d) 511 View
Answer
Answer:c
Explanation:None.
Bluetooth is the wireless technology for
a) local area network
personal area network
both (a) and (b)
none of the mentioned
View Answer
Answer:b
Explanation:None.
4. Bluetooth uses
frequency hoping spread spectrum
orthogonal frequency division multiplexing
time division multiplexing
none of the mentioned
View Answer
Answer:a
Explanation:None.
advertisements
Unauthorised access of information from a wireless device through a bluetooth connection is called
a) bluemaking
b) bluesnarfing
c) bluestring
d) none of the mentioned
View Answer Answer:b
Explanation:None.
Answer:a
Explanation:None.
In the piconet of bluetooth one master device
a) can not be slave
b) can be slave in another piconet
c) can be slave in the same
piconet d) none of the mentioned
View Answer
Answer:b
Explanation:None.
Bluetooth transceiver devices operate in ______
band. a) 2.4 GHz ISM
b) 2.5 GHz ISM
c) 2.6 GHz ISM
d) 2.7 GHz ISM
View Answer
Answer:a
Explanation:None.
advertisements
9. The bluetooth supports
point-to-point connections
point-to-multipoint connection
both (a) and (b)
none of the mentioned
Answer:a
Explanation:None.
Computer Networks Questions & Answers – ATM & Frame Relay
Answer:b
Explanation:None.
To join the internet, the computer has to be connected to
a a) internet architecture board
b) internet society
c) internet service provider
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
Internet access by transmitting digital data over the wires of a local telephone network is provided
by a) leased line
b) digital subscriber
line c) digital signal line
d) none of the mentioned
View Answer
Answer:b
Explanation:None.
ISP exchanges internet traffic between their networks
by a) internet exchange point
b) subscriber end point
ISP end point
none of the mentioned
View Answer
Answer:a
Explanation:None.
advertisements
Answer:c
Explanation:None.
Internet works on
a) packet switching
b) circuit switching
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
Which one of the following is not an application layer protocol used in internet?
a) remote procedure call
b) internet relay chat
c) resource reservation protocol
d) none of the mentioned View
Answer
Answer:c
Explanation:None.
advertisements
Answer:d
Explanation:None.
Explanation:None.
Computer Networks Questions & Answers – Cryptography
Answer:a
Explanation:None.
In asymmetric key cryptography, the private key is kept by
a) sender
b) receiver
c) sender and receiver
d) all the connected devices to the network
View Answer
Answer:b
Explanation:None.
Which one of the following algorithm is not used in asymmetric-key
cryptography? a) RSA algorithm
b) diffie-hellman algorithm
c) electronic code book algorithm
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
In cryptography, the order of the letters in a message is rearranged by
a) transpositional ciphers
b) substitution ciphers
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
advertisements
6. Cryptanalysis is used
to find some insecurity in a cryptographic scheme
to increase the speed
to encrypt the data
none of the mentioned
View Answer
Answer:a
Explanation:None.
Which one of the following is a cryptographic protocol used to secure HTTP connection?
a) stream control transmission protocol (SCTP)
b) transport layer security (TSL)
c) explicit congestion notification
(ECN) d) resource reservation protocol
View Answer
Answer:b
Explanation:None.
Voice privacy in GSM cellular telephone protocol is provided
by a) A5/2 cipher
b) b5/4 cipher
c) b5/6 cipher
d) b5/8 cipher
View Answer
Answer:a
Explanation:None
advertisements
Answer:a
Explanation:None.
Computer Networks Questions & Answers – Security In The Internet
This set of Computer Networks Questions & Answers focuses on “Network Attacks”.
The attackers a network of compromised devices known
as a) Internet
b) Botnet c)
Telnet d) D-
net View
Answer
Answer: b
Explanation: None.
Which of the following is a form of DoS attack ?
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned
View Answer
Answer: d
Explanation: None.
The DoS attack is which the attacker establishes a large number of half-open or fully open TCP connections at the
target host
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned
View Answer
Answer: c
Explanation: None.
advertisements
4)The DoS attack is which the attacker sends deluge of packets to the targeted host
Vulnerability attack
Bandwidth flooding
Connection flooding
All of the
mentioned View
Answer Answer: b
Explanation: None.
5) Packet sniffers involve
Active receiver
Passive receiver
Both of the mentioned
None of the
mentioned View Answer
Answer: b
Explanation: They donot inject packets into the channel.
Sniffers can be deployed
in a) Wired environment
b) WiFi
c) Ethernet LAN
d) All of the mentioned
View Answer
Answer: d
Explanation: None.
advertisements
This section of our 1000+ Computer Networks MCQs focuses on DHCP Protocol.
DHCP (dynamic host configuration protocol) provides _____ to the
client. a) IP address
b) MAC address
c) url
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
DHCP is used for
a) IPv6
b) IPv4
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
3. The DHCP server
maintains a database of available IP addresses
maintains the information about client configuration parameters
grants a IP address when receives a request from a client
all of the mentioned
View Answer
Answer:d
Explanation:None.
IP assigned for a client by DHCP server
is a) for a limited period
b) for unlimited period
c) not time dependent d)
none of the mentioned
View Answer
Answer:a
Explanation:None.
advertisements
DHCP uses UDP port ____ for sending data to the server.
a) 66
b) 67
c) 68
d) 69
View Answer
Answer:b
Explanation:None.
The DHCP server can provide the _______ of the IP addresses.
a) dynamic allocation
b) automatic allocation
c) static allocation
d) all of the mentioned
View Answer
Answer:d
Explanation:None.
DHCP client and servers on the same subnet communicate
via a) UDP broadcast
b) UDP unicast c)
TCP broadcast d)
TCP unicast
View Answer
Answer:a
Explanation:None.
After obtaining the IP address, to prevent the IP conflict the client may
use a) internet relay chat
b) broader gateway protocol
c) address resolution
protocol d) none of the
mentioned View Answer
Answer:c
Explanation:None.
advertisements
If DHCP snooping is configured on a LAN switch, then clients having specific ______ can access the
network. a) MAC address
b) IP address
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
Computer Networks Questions & Answers – SSH
This section of our 1000+ Computer Networks MCQs focuses on SSH Protocol.
Secure shell (SSH) network protocol is used
for a) secure data communication
b) remote command-line
login c) remote command
execution d) all of the
mentioned View Answer
Answer:d
Explanation:None.
2. SSH can be used in only
unix-like operating systems
windows
both (a) and (b)
none of the mentioned
View Answer
Answer:c
Explanation:None.
SSH uses _______ to authenticate the remote computer.
a) public-key cryptography
b) private-key cryptography
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
Which standard TCP port is assigned for contacting SSH
servers? a) port 21
b) port 22 c)
port 23 d)
port 24 View
Answer
Answer:b
Explanation:None.
advertisements
Which one of the following protocol can be used for login to a shell on a remote host except
SSH? a) telnet
b) rlogin
c) both (a) and (b)
d) none of the mentioned
View Answer Answer:c
Answer:d
Explanation:None.
SSH-2 does not
contain a) transport layer
b) user authentication
layer c) physical layer
d) connection layer
View Answer
Answer:c
Explanation:None.
Which one of the following feature was present in SSH protocol, version 1?
a) password changing
b) periodic replacement of session keys
c) support for public-key certificates d)
none of the mentioned
View Answer
Answer:d
Explanation:None.
advertisements
Answer:d
Explanation:None.
Computer Networks Questions & Answers – SMTP
Answer: c
Explanation: None.
3) Expansion of SMTP is
Simple Mail Transfer Protocol
Simple Message Transfer Protocol
Simple Mail Transmission Protocol
Simple Message Transmission
Protocol View Answer
Answer: a
Explanation: None.
In SMTP, the command to write recievers mail adress is written with this
command a) SEND TO
b) RCPT TO
c) MAIL TO
d) None of the
mentioned View Answer
Answer: b
Explanation: None.
The underlying Transport layer protocol used by SMTP
is a) TCP
b) UDP
c) Either a or b
d) None of the
mentioned View Answer
Answer: a
Explanation: None.
advertisements
Answer: a
Explanation: None.
9) A session may include
Zero or more SMTP transactions
Exactly one SMTP transactions
Always more than one SMTP transactions
Number of SMTP transactions cant be
determined View Answer
Answer: a
Explanation: None.
Example of user agents for e-
mail a) Microsoft Outlook
b) Apple
Mail c)
d) All of the mentioned
View Answer
Answer: d
Explanation: None.
advertisements
When the sender and the receiver of an email are on different systems, we need only ______
. a) One MTA
b) Two UAs
c) Two UAs and one pair of MTAs
d) Two UAs and two pairs of
MTAs View Answer
Answer: d
Explanation: None.
User agent does not support this
Composing messages
Reading messages
Replying messages
All of the mentioned
View Answer
Answer: d
Explanation: None.
Computer Networks Questions & Answers – RPC
Answer: a
Explanation: Error reporting is handled by ICMP.
Which of the following field in IPv4 datagram is not related to fragmentation?
a) Flags
b) Offset
c) TOS
d) Identifier
View Answer
Answer: c
Explanation: TOS-type of service identifies the type of packets.
The TTL field has value 10. How many routers (max) can process this
datagram? a) 11
b) 5
c) 10
d) 1
View Answer
Answer: c
Explanation: TTL field is decremented by one each time the datagram is processed by a router.
advertisements
If the value in protocol field is 17, the transport layer protocol used is
____. a) TCP
b) UDP
c) Either of the
mentioned d) None of the
mentioned View Answer
Answer: b
Explanation: For TCP it is 6.
The data field can carry which of the following?
TCP segemnt
UDP segment
ICMP messages
None of the
mentioned View Answer
Answer: c
Explanation: Data field usually has tranaport layer segment, but it can also carry ICMP messages.
What should be the flag value to indicate the last
fragment? a) 0
b) 1
c) TTl value
d) None of the mentioned
View Answer
Answer: a
Explanation: flag=0 indicates that it is the last fragment.
Which of these is not applicable for IP
protocol? a) is connectionless
b) offer reliable service
c) offer unreliable service
d) None of the mentioned
View Answer
Answer: b
Explanation: Ip offers unreliable service.
advertisements
Answer: a
Explanation: offset field specifies where the fragment fits in the original datagram.
Computer Networks Questions & Answers – IPv6
Answer: b
Explanation: An IPv6 address is 128 bits long.
The header length of an IPv6 datagram is
_____. a) 10bytes
b) 25bytes c)
30bytes d)
40bytes View
Answer
Answer: d
Explanation: IPv6 datagram has fixed header length of 40bytes, which results is faster processing of the
datagram.
In the IPv6 header,the traffic class field is similar to which field in the IPv4
header? a) Fragmentation field
b) Fast-switching
c) ToS field
d) Option field
View Answer
Answer: c
Explanation: This field enables to have different types of IP datagram.
IPv6 doesnot use ______ type of address
a) Broadcast
b) Multicast
c) Anycast
d) None of the
mentioned View Answer
Answer: a
Explanation: Broadcast has been eliminated in IPv6.
advertisements
Answer: a
Explanation: The Hop limit value is decremented by one by a router when the datagram is forwaded by
the router. When the value becomes zero the datagram is discarded.
7. Dual-stack approach refers to
Implementing Ipv4 with 2 stacks
Implementing Ipv6 with 2 stacks
Node has both IPv4 and IPv6 support
None of the mentioned
View Answer
Answer: c
Explanation: dual-stack is one of the approach used to support IPv6 in already existing systems.
Suppose two IPv6 nodes want to interoperate using IPv6 datagrams but are connected to each other by
intervening IPv4 routers. The best solution here is
a) use dual-stack approach
b) Tunneling
c) No solution
d) Replace the system
View Answer
Answer: b
Explanation: The IPv4 routers can form a tuunel.
advertisements
Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented by
bits a) 96 to 127
b) 0 to 63 c)
80 to 95 d) 64
to 79 View
Answer
Answer: a
Explanation: Bits 96 to 127 in the datagram represents obfuscated 1Pv4 address.
The _____ states that a foreign key must either match a primary key value in another relation or it
must be null.
(a) entity integrity rule
(b) referential integrity constraint
(c) action assertion
(d) composite attribute
(e) None of these
An applet __________
is an interpreted program that runs on the client
tracks the number of visitors to a Website
is a compiled program that usually runs on the client
collects data from visitors to a Website
None of these
A _____ sometimes called a boot sector virus, executes when a computer boots up because it resides in
the boot sector of a floppy disk or the master boot record of a hard disk.
(a) system virus
(b) Trojan horse virus
(c) file virus
(d) macro virus
(e) None of these
Which error detection method uses one's complement arithmetic?
(a) Simply parity check
(b) Checksum
(c) Two-dimensional parity check
(d) CRC
(e) None of these
A result of a computer virus can not lead to ___.
Disk Crash
Mother Board Crash
Corruption of program
Deletion of files
None of these
The network interface card of LAN is related to following layer of OSI Model-
(a) Transport
(b) Network
(c) Data Link
(d) Physical
(e) All of these
Which of the following does not describe a data warehouse?
Subject-oriented
Integrated
Time-variant
Updateable
None of these
8. Which of the following is true ?
Logical design is software-dependent
In a distributed database, database is stored in one physical location
Conceptual design translates the logical design into internal model
Logical design is software independent
None of these
9. A range check _____
ensures that only the correct data type is entered into a field
verifies that all required data is present
determines whether a number is within a specified limit
tests if the data in two or more associated fields is logical
None of these
The total set of interlinked hypertext documents worldwide is-
(a) HTTP
Browser
WWW
B2B
None of these
With the object-oriented (OO) approach, an object encapsulates, or_____.a programmer.
(a) carries out, the details of an object for
(b) hides, the details of an object from
(c) reveals, the details of an object to
(d) extends, the details of an object beyond
(e) None of these
Every computer connected to an intranet or extranet must have a distinct_____
firewall
proxy server
IP address
domain name
None of these
A table of bits in which each row represents the distinct values of a key?
(a) Join index
(b) Bitmap index
(c) B + Tree
(d) Hierarchical index
(e) None of these
The degree of detail that should be incorporated into a database depends on what?
(a) Data integrity
(b) The type of database
(c) The user's perspective
(d) The business practices and policies
(e) None of these
The ___.converts digital signals to analog signals for the purpose of transmitting data over telephone
lines.
(a) Modem
(b) Router
(c) Gateway
(d) Bridge
(e) All of these
Before a package can be used in a java program it must be___.
executed
referenced
imported
declared
None of these
Choose the correct way to indicate that a line in a C++ program is a comment line, that is, a line the
will not be executed as an instruction___.
(a) begin the line with a # sign
(b) begin the line with double slashes (/ /)
(c) begin and end the line with double hyphens (-_-)
(d) indent the line
(e) None of these
Programming language built into user programs such as Word and Excel are known as____
4GLs
macro languages
object-oriented languages
visual programming languages
None of these
Firewalls are used to protect against___.
(a) Unauthorized Attacks
(b) Virus Attacks
(c) Data Driven Attacks
(d) Fire Attacks
(e) All of these
This is a standard way for a Web server to pass a Web user's request to an application program
and to receive data back to forward to the user-
(a) Interrupt request
(b) Forward DNS lookup
(c) Data-Link layer
(d) File Transfer Protocol
(e) Common gateway interface
Three SQL, DDL, CREATE commands are__.
Schema, Base and Table
Base, Table and Schema
Key, Base and Table
Schema, Table and View
None of these
Data are ________ in client/server computing.
(a) never sent to the client machine
(b) sent in very large sections to save processing time
sent only upon the client's request
sent in complete copies for the client to filter and sort
sent from the client to the server for processing
Which of the following will not eliminates the ambiguities of a null value?
(a) Define the attribute as required
(b) Define subtypes
(c) Define each attribute as having an initial value that is recognized as blank
(d) Define supertypes
(e) None of these
The____directory is mandatory for every disk.
Root
Base
Sub
Case
None of these
This is a group of servers that share work and may be able to back each other up if one server fails.
(a) Channel bank
(b) Cluster
(c) Tiger team
(d) Serverless backup
(e) Logical unit
Answers -
1-a 14-b
2-c 15-a
3-e 16-c
4-b 17-b
5-b 18-c
6-e 19-a
7-d 20-e
8-a 21-d
9-c 22-c
10-c 23-d
11-b 24-a
12-c 25-b
13-a
Written part:
Q-1.What is Unicode?
Ans: Unicode is an entirely new idea in setting up binary codes for text or script characters. Officially
called the Unicode Worldwide Character Standard, it is a system for "the interchange, processing, and
display of the written texts of the diverse languages of the modern world." It also supports many classical
and historical texts in a number of languages.
Currently, the Unicode standard contains 34,168 distinct coded characters derived from 24 supported
language scripts. These characters cover the principal written languages of the world.
Let’s compute the standard deviation for the set of numbers from 1 to 10. That is, consider the following
set of values: {1, 2, 3, 4, 5, 6, 7, 8, 9, 10}.
This set has a mean of 5.5, which we can determine either with the formula for arithmetic mean or the
balance concept, discussed above.
The deviations from the mean of each number and those deviations squared are:
After the squaring operation, we arrive at a figure for the sum of the squared deviations, which we can
divide by N to get the variance. Since N is 10, the variance is
In other words, 8.25 is the average of the squared deviations.
Finally, to get the standard deviation, we take the square root of the variance.
so the standard deviation is roughly 2.87. On the GMAT, we would not be expected to make that last
calculation on our noteboards; we might be asked to estimate it by noting that that the square root of 8.25
is a little less than the square root of 9, which is 3.
=2FA
5. Application Layer
6. Transport Layer
7. Internet Layer
sin(x)=x−x3/3!+x5/5!−x7/7!.
7.what do u expect after complete PMSCS program.
TRY yrself
8.1213=6
1415=10
7314=32
6513=24
9.write difference between database scema and instanace
Department of Computer Science and Engineering
Jahangirnagar University
PMSCS Program
Admission Test Fall-2016
1. A card is drawn form a pack of 52 cards .The probability of getting a queen of club or a king of heart is:
7. In C if a function does not explicity specify a return type.it is assumed to return an …….. by default.
a. char b. float c. Void d. integer
8. Datagram is related with ……………… service and virtual circuit is related to………………..service.
a. both are connectionless b. Connectionless and connection oriented.
c. connection oreiented and connectionless d. None
8. In C programming what will be a value of x?
Printf(“x=%d/n”,(number<0)?-
1;(number===0?)0;1); a. 1 b. -1 c. 0 d. None
8. Concurrent access to share data may result in data:
a. recovery b. inconsistency c. repositiory d. consistency
9. A constructor is called whwnever:
a. an object is used b. an object is declared c. a class is declared d. a class is used
9. If the probability of sending successful data packetis 80% ,what will be the probability of succesfull delivery if
a packet is sent twice?
a. 64% b. 96% c. 100% d. 80%
12. The automatic execution of some SQL statements can be started automatically due to any change to a database
relation can be caused by
a. View b. None c. Assertion d. Trigger
11. A girl introduced a boy as the son of the daughter the father of her uncle.the boy is girls….
a. Brother b. Uncle c. Son d. Nephew
E. Frames from one LAN can be transmitted to another LAN via the
device. a. modem b. repeater c. bridge d. router
F. Which number should be come next in this series: 10, 17, 26, 37, 7
a. 56 b. 46 c. 50 d. 52
Passive Attacks
A passive attack involves someone listening in on telecommunications exchanges or passively recording computer
activity. An example of the former is an attacker sniffing network traffic using a protocol analyzer or some other
packet capturing software. The attacker finds a way to plug into the network and begins capturing traffic for later
analysis. Other attackers rely on keyloggers, usually as a Trojan horse in a "free download," to record keystrokes
such as user IDs and passwords. The goal, regardless of the method, is just to listen and record the data passing
through. The passive attack itself is not harmful, per se, but the information gathered during the session could be
extremely damaging.
Active Attack
Active attacks on computers involve using information gathered during a passive attack, such as user IDs and
passwords, or an outright attack using technological “blunt instruments.” Such instruments include password
crackers, denial-of-service attacks, email phishing attacks, worms and other malware attacks. In an active attack, the
attacker is out to bring a website down, steal information or even destroy computing equipment. As network
administrators install defenses against existing attack tools, hackers develop more sophisticated tools and the game
of technology leapfrog continues.
Find the number of way to select a 4 member comitee with 2 men and 2 women.
Ans: 2 men can be chosen from the 6 men in c(6,2) ways.and the 2 women can be chosen from the 4 women c(4,2)
ways.Thus by the product rule:
N=(6/2)(4/2)
=(6.5/2.1).(4.3/2.1)
=15(6)
=90
Referential integrity is a relational database concept, which states that table relationships must always be consistent.
In other words, any foreign key field must agree with the primary key that is referenced by the foreign key. Thus,
any primary key field changes must be applied to all foreign keys, or not at all. The same restriction also applies to
foreign keys in that any updates (but not necessarily deletions) must be propagated to the primary parent key.
36.let a and b the positive integers and suppose Q is defined recursively as flows Q(a,b)=0 if (a<b),Q(a,b)=Q(a-
b,b)+1 if b<=a
Find Q(12,5)
37.find the number n of distinct permutations that can be formed all the letter of this word.UNUSUAL
N=7!/3!
=840 There are 7 letter of which 3 are U and no other letter is repeated.
while (a<=100) {
a++;
Ans: 172,173
E. Develop an integrative sentence from the following word “Like subjects what do you”
Ans: What subjects do you like?
F. 4 2
22. 2 1
23. Laplacian
24. Isotropic
E. Position
25. This is an IP address 168.212.226.204 which class this address belong to?
A. Class A
B. Class B
C. Class C
D. Class D
26. Creating a new class using one or more existing classes is known as-----------------?
A. Polymorphism
B. Encapsulation
C. Overloading
D. Inheritance
27. A switch is most often used to connect
A. Individual Computer
B. Different LANs
C. Cable segments of a LAN
28. If n and k are positive integers and 8n=2k , What is the value of n/k?
A. ¼
B. ½
C. 1/3
D. 4
29. The scream of a hierarchical database represented using a ------------ diagram.
Ans: tree-structure
30. A trigger is ……………….
A. A special type of table
B. A special type of store procedure, executed when certain events occurs
C. A special type of view
31. Synonym of PROBITY
A. Probability
B. Honesty
C. Peaceful
D. Carelessness
20. Determine the maximum value the slope of the curve y = sin(x)
y = sin(x)
26. The decimal number -34 is expressed in 2’s complement form as:
A 10000110
B 11011001
C 11011110
11011100
27. What will be the next two numbers of the series?
2 5 6 11 9 17 12 23,--,--
Ans : 15, 29
28. What is big O?
Ans: Big O notation is used in Computer Science to describe the performance or complexity of an
algorithm. Big O specifically describes the worst-case scenario, and can be used to describe the execution
time required or the space used (e.g. in memory or on disk) by an algorithm.
E. If a sweater sells for $48 after a 25% markdown, what was its original price?
Ans:
(100-25) = 75% = 75/100 = 0.75
0.75*x = 48
So, x = $64 dollars was the original price of the sweater.
F. Which of the following memory needs refreshing?
SRAM
DRAM
ROM
All of the avobe
G. The amount of time a program takes from when a request was submitted untill the first result is processed.
Waiting time
Response time
Turnaround time
Throughround time
H. What is the following is the subset of {b c d}?
{}
{n}
{1, 2, 3}
{a, b, c}
I. Digital modulation on bit string is sender--------------- layer of OSI
Ans: Physical
Written Part
31. Distinguish between database schema and instance.
Database schema: The term "schema" refers to the organization of data as a blueprint of how the database
is constructed (divided into database tables in the case of relational databases). The formal definition of a
database schema is a set of formulas (sentences) called integrity constraints imposed on a database.
Database Instance: Introduction to the Oracle Database Instance. A database instance is a set of memory
structures that manage database files. A database is a set of physical files on disk created by the CREATE
DATABASE statement. The instance manages its associated data and serves the users of the database.
32. What is the main problem with MAC address based communication over the Internet instead of IP address?
Ans: There are [Media Access Control] MAC addresses available. The only organizational structure of
them is by manufacturer grouping, which is completely useless for routing purposes. Thus, you’d have to be
able to carry around all of the MAC addresses currently on the Internet at any one time. And maintain it.
Broadcast mechanisms are useless at that scale, so now your routing protocols have to carry trillions of
addresses, all of which are under continual flux.
IP addresses are assigned topologically (or should be, if politics didn’t get in the way… grrr…). By
assigning a host an address based on its topological attachment, we can only carry around an abstraction of
the topology in routing protocols.
Data Definition Language (DDL) statements are used to define the database structure or schema. Some
examples:
Data Manipulation Language (DML) statements are used for managing data within schema objects. Some
examples:
34. What is the minimum number of students in a class to be sure that three of them are born in the same month?
Ans: The solution uses a concept known as the Pigeonhole principle. The idea is that if you n items and m
possible containers. If n > m, then at least one container must have two items in it.
So for your question... there are twelve months, so in order to guarantee you have three students in a
"month" container. You need something greater than twelve - the minimum of that would be thirteen.
35. What is WiMAX? Write down the name of OSI model.
WiMAX: WiMAX is a wireless technology put forth by the WiMAX Forum that is one of the technologies
that is being used for 4G networks. It can be used in both point to point and the typical WAN type
configurations that are also used by 2G and 3G mobile network carriers. Its formal name is IEEE standard
802.16
Name of OSI model:
Physical Layer
Datalink Layer
Network Layer
Transport Layer
Session Layer
Presentation Layer
Application Layer
Define the Bandwidth and Latency.
Bandwidth: Bandwidth is also defined as the amount of data that can be transmitted in a fixed amount of
time. For digital devices, the bandwidth is usually expressed in bits per second(bps) or bytes per second.
For analog devices, the bandwidth is expressed in cycles per second, or Hertz (Hz).
Latency: Network latency is an expression of how much time it takes for a packet of data to get from one
designated point to another. In some environments (for example, AT&T), latency is measured by sending a
packet that is returned to the sender; the round-trip time is considered the latency.
Describe your expectation about PMSCS program of the CSE department in five
38. What is the output if you will compile and execute the following C code?
a. void main(){
int i=4,x;
x=++i + ++i + ++i;
printf("%d",x);
}
Output: 21
b. void main()
{
int a=10;
printf("%d %d %d",a,++a,a++);
}
Output: 12 12 10
GM = √(ab) = √(2*8) = 4
Answers:
1.c 2.a 3.b 4.c 5.c 6 7.a 8.a 9.Pita 10. 11.b 12.c 13.b 14.d 15.a
16.c 17 18.b 19.b 20 21.c 22 23 24 25.a 26.b 27.a 28 29.c 30.b
GROUP- A: Put a tick mark ( ) on the correct answer for multiple choice questions (MCQ)
and Fill in the
gaps where applicable. Each question carries 1 (one) point.
This is an IP address 168.212.226.204. On which class
this address belongs to?
(a) Class A (b) Class B (c) Class C (d) Class D
A={4,2,3}. What is the cardinality of set A?
(a) 24 (b) 3 (c) 2 (d) 9
Which one of the following is more near is meaning to the word
“outskirt”?
(a) Dress (b) Boundary (c) Sky (d) None of the above
Who preside the interface between a process and the OS?
Kernel (b) System Calls (c) API (d) Processor
5. In TCP/IP network, the port address is
16-bit (b) 32-bit (c) 64-bit (d) 128-bit
A perfectionist is someone who feels _______ when he makes
even the most minuscule of errors.
(a) hostility (b) indifference (c) vexation (d) condemnation
What is the average of the five angles?
2. 45
3. 72
4. 60
5. 48
E. The perpendicular of the line 2x+3y=4 is
(a) 3x-2y=4 (b) 3x+2y=4 (c) 2x-3y=4 (d) 2x-3y=0
4. In case of fiber-optic cables, which transmission mode is used
for transmission data over long distance?
(a) Infrared (b) Radio (c) Single mode (d) Multimode
5. If you want your conditional to depend on two conditions both
being true, what is the proper notation to put between the two
Boolean statements?
(a) || (b) & (c) | (d) &&
6. The complexity of linear search algorithm is
4 O(n) (b) O(logn) (c) O(n2) (d) O(nlogn)
5. Which of the following data structure is not linear data structure?
(a) Arrays (b) Linked lists
(b) Both of the above (d) None of the above
6. The function of LLC sub-layer of data link layer are:
6. Framing and channel allocation
7. Channel allocation and error control
8. Error control and security
9. Framing and error control
7. What is the type of the image?
013
184 246 12
12 75 90
I
8. RGB (b) Gray Scale (c) Binary (d) NTSC
15. POST means
2 Post Operating System Test (b) Power On Self Test
2 Power On Self Timing (d) None
16. The intersection ( ) operation on two relations/tables returns
9. All records of both tables
10.Only common records
11.Records from the left table/relation only
(d) None
E. IPV6 increases the size of the IP address from
(a) 64 to 132 bits (b) 32 to 128 bits
(c) 64 to 128 bits (d) None
F. We should keep pace _________ time and technology.
(a) in (b) out (c) with (d) none
G. The ___Cache___________ memory is placed between RAM and CPU.
H. Write the equation of a circle with radius r and center is at (0,0).
X2+y2=r2
I. Volatile is most nearly opposite in meaning to
Planning
3-Tier Architecture is most commonly used to build web applications. In this model, the browser acts like a client,
middleware or an application server contains the business logic, and database servers handle data functions. This
approach separates business logic from display and data.So the 3 layers commonly known as:Presentation
Layer(PL/UI),Business Logic Layer(BLL) & Data Access Layer(DAL).
35. Evaluate 0 2ln(e x )dx
How many users are possible from the subnet mask of
255.255.255.224 of class C IP.
Two sides of a triangular field are of the same length 13ft. Third
side is 10’ in length. Find the area of the field in square feet?
A=65 squre feet
If the letter in the word ‘TRIANGLE’ are rearranged at random,
find the probability that the first letter is an A.
Solution:
= 1 · 7 · 6 · 5 · 4 ·3 · 2 ·1 = 1
8·7·6·5·4·3·2·1 8
A.OCR
B. OMR
2. MICR
3. PLOTTER
A. ROM
B. Control Unit
C. ALU
D. RAM
Which of the following methods is involved in data transmission between keyboards and CPU?
Simplex
Duplex
Half Duplex
B. None of them
Database is a---?
Collection of files
B. Collection of data
C. Collection of interrelated data
D. all of them
An entity is a/an--
A.Collection of items in an application
a. Inanimate object in an application
a. District real world item in an application
a. Data structure
A distribute database has which of the following advantage over a centralized database?
1. Software cost
2. Software complexity
3. Slow response
4. Modular growth
Which of the following describes E-commerce?
1. Buying products from each other
2. Buying services from each other
A. Selling services from each other
B. All of above
Rearrange the following letters to make a word and choose the category in which it fits MENMYSINGH.
A.City
B. fruit
C. Bird
D. vegetable
9. The speed of supercomputers genereally measured in….
Ans: GHZ
c. Neumann d. Ada
t=4/5+9%4;
print(%21,1)
}
a. 1.80 b. 1.00 c. 0.00 d. 3.05
Metadata means?
a. Data that describes other data b. unused data
c. data used as metaphor d. frequently accessed data
GROUP B:
31.Short Note:Interpreter
In computer science, an interpreter is a computer program that directly executes, i.e. performs, instructions
written in a programming or scripting language, without previously compiling them into a machine
language program.
Compiler:
A compiler is a special program that processes statements written in a particular programming language
and turns them into machine language or "code" that a computer's processor uses. Typically, a
programmer writes language statements in a language such as Pascal or C one line at a time using an
editor. The file that is created contains what are called the source statements. The programmer then runs
the appropriate language compiler, specifying the name of the file that contains the source statements.
32.what are the function of operating system?
An operating system has three main functions: (1) manage the computer's resources, such as the central
processing unit, memory, disk drives, and printers, (2) establish a user interface, and (3) execute and
provide services for applications software.
33.Write down the basic structure of SQL.
Basic structure of an SQL expression consists of select, from and where clauses.
#include<stdio.h>
Main(){
Int count;
Count=0;
While(count<100){
Count++;
Printf(“hello world?\n”)
}
}
Ans:Using do-while:
#include<stdio.h>
Main(){
Int count=0;
Do{
Printf(“hello world?\n”)
Count++;
}
While(count<100)
}
37.what you will see if you run the following codes.
#include<stdio.h>
Main(){
Int first =15,second=10,sum;
Printf(“enter two integer:”);
Scanf(“%d %d,&first,&second”);
A.Physical
B. Network
2. session
3. None
Which technic is Preferable for huge data transfer between I/O and memory?
B. Islolated I/O
C. Interrupt I/O
D.DMA
X=Y
X=√Y
Y=√X
B. X =Y/2
If the eccentricity of a circle eclipse and parabola are e1,e2,e3 then which one is true?
e1<e2< e3
B. e1> e2> e3
C. e2>e3>e1
D.e1>e3>e2
6. Mr. karim earns X taka in 3 months and expends the same amount in 4 months .How much he saves in a year?
a. He has no savings
b. 3x taka
c. x taka
d. 4x taka
7. Fill in the blank:
Take ---off------ What I say.
a. off
b. up
c. on
d. Down
10. What will be mass of an object traveling with the speed of light?
Ans: To be massless is to travel at the speed of light; to travel slower than the speed of light is to have mass.
11. Expand the term http..
Ans: Hypertext Transfer Protocol.
3 x +3x +3x =?
a. 9x b. 3x +1 c. 93x d. 33x
If p and q are prime numbers, how many divisors does the product p3 q6 have?
a. 9 b. 28 c. 18 d. 12
What social networking website started out as a band promotion service?
a. facebook b. MySpace C. Linkedin d. Twitter
20. which of the following terms does not describe a type of flash drive ?
a. hard drive b. pen drive c. jump drive d. thumb drive
Ans: An object with zero mass must move at the speed of light or it wouldn't exist at all.
Ans: Measure a TV diagonally, from corner to corner, to get a measurement that manufacturers use. You might
think that a 32 inch (81 cm) TV is 32 inches wide, from bottom left to bottom right. Not so. A 32 inch TV is 32
inches (81 cm) from bottom left to top right, or bottom right to top left.
Which one is a volatile memory?
a. RAM b. ROM c. Hard Disk d. CD
If the perimeter of the outer circle is 2ΠR and inner circle is 2ΠR where R>r. Consider the center of two circles
is at the same point .What is the area of the intermediate region?
a. Π(R2 - r2) b. c. 2Πr(R+r) d. Π(R2 + r2)
2Πr(2R+r)
Ans: 41,66,109