1 Adda247 No. 1 APP for Banking & SSC Preparation Website: bankersadda.com sscadda.com store.adda247.com

Size: px
Start display at page:

Download "1 Adda247 No. 1 APP for Banking & SSC Preparation Website: bankersadda.com sscadda.com store.adda247.com"

Transcription

1 1 Adda247 No. 1 APP for Banking & SSC Preparation

2 Q1. Which TCP/IP transport layer protocol is faster? (a) ICMP-because it is connection-oriented (b) TCP-because it is connected-oriented (c) UDP-because it is connection-less (d) IP-because it is connection-less Q2. In OSI Model which layer is responsible for Encryption & Decryption of data? (a) Physical (b) Data Link (c) Presentation (d) Session (e) Application Q3. IP address is belongs to which class? (a) A (b) B (c) C (d) D (e) E Q4. Which of the following is a single communication channel that is shared by all the users on the network? (a) Point-to-Point (b) Broadcast Network (c) Protocol (d) PAN Q5. Which type of network consists set of switches connected by physical links? (a) Circuit Switched Network (b) Datagram Network (c) Virtual Circuit Network (d) All of these Q6. What are the three types of addresses in IPV6? (a) Class A, Class B, Class C (b) Unicast, anycast, multicast (c) Unicast, datacast, multicast (d) Unicast, dualcast, multicast 2 Adda247 No. 1 APP for Banking & SSC Preparation

3 Q7. Which of the following is commonly used between hosts on the Internet to exchange routing information? (a) HTTP (b) EGP (c) UDP (d) SMTP (e) IGP Q8. Which of the following layer is Network Support layer? (a) Session layer (b) Presentation layer (c) Application layer (d) Both (b) and (c) (e) Data Link Layer Q9. Which of the following service is responsible for changing the source IP address of a packet to the IP address of the public interface on the router. (a) NAT (b) SMTP (c) DHCP (d) HTTP (e) UDP Q10. Which of the following protocol uses both TCP and UDP? (a) HTTP (b) SMTP (c) TELNET (d) DNS (e) FTP Q11. In which protocol, the sender sends one frame and then waits for an acknowledgement before proceeding? (a) Sliding window (b) Stop and wait (c) Frame buffer (d) IP (e) Routing Protocol Q12. What is true about the MAC address? (a) Used to identify networks (b) Defined at the Network layer (c) Unique for every networked device in the world (d) Identical to the IP address (e) All are true 3 Adda247 No. 1 APP for Banking & SSC Preparation

4 Q13. Which of the following protocol is used for securing connections between network application clients and servers over an insecure network? (a) SSL (b) BGP (c) UDP (d) HTTP (e) IGP Q14. Which protocol is used to sending mail? (a) HTTP (b) IMAP (c) SMTP (d) IP (e) ICMP Q15. An accountant office has four employees. They have four computers and two printers. What kind of network would you suggest they install? (a) Client server network (b) Peer-to peer network (c) Intranet (d) MAN (e) None of the above Q16. In which clause tuple variables are define in SQL? (a) Like clause (b) Group BY clause (c) Where clause (d) From clause (e) All of the above Q17. Which of the following allows you to specify multiple values in a WHERE clause? (a) Between (b) In (c) Like (d) Joins (e) Insert Q18. Which transaction property ensure that multiple transactions can occur concurrently without leading to inconsistency of database state? (a) Consistency (b) Isolation (c) Durability (d) Atomicity (e) Not any property ensures the transaction independency 4 Adda247 No. 1 APP for Banking & SSC Preparation

5 Q19. Which of the following allows to create complex entities from existing entities and relationships? (a) Specialization (b) Generalization (c) Aggregation (d) Inheritance (e) Encapsulation Q20. which of the following is a view of the database that appears to an application program? (a) Tuple (b) Instance (c) Subschema (d) Relation (e) Virtual Table Q21. 'REVOKE' command is used in which category of SQL statement? (a) DCL (b) TCL (c) DML (d) DDL Q22. Which clause is used to specify condition while retrieving data from table in SQL? (a) WHERE (b) LIKE (c) HAVING (d) Group By (e) Select Q23. Derived attribute in E-R Diagram represented by: (a) Rectangle (b) Diamond (c) Ellipse (d) Double Ellipse (e) Dashed Ellipse Q24. Which of the following type of anomalies are not found in relational database? (a) Insertion Anomalies (b) Deletion Anomalies (c) Update Anomalies (d) Create Anomalies 5 Adda247 No. 1 APP for Banking & SSC Preparation

6 Q25. Which normal form is considered suitable for design a normal relational database? (a) 1 NF (b) 2 NF (c) 3 NF (d) 4 NF (e) 5 NF Q26. How can you return all the records from a table named "Student" sorted descending by "FirstName", in SQL? (a) SELECT * FROM Student ORDER BY FirstName DESC (b) SELECT * FROM Student SORT BY 'FirstName'DESC (c) SELECT * FROM Student ORDER FirstName DESC (d) SELECT * FROM Student SORT 'FirstName'DESC (e) SELECT ALL FROM Student ORDER FirstName DESC Q27. The ability to modify the internal schema without causing any change to the external schema: (a) Physical data independence (b) Logical data independence (c) External data independence (d) Both Physical and External data independence Q28. Which key is representing relationship between tables? (a) Primary Key (b) Secondary Key (c) Foreign Key (d) None of these (e) All of these Q29. Which level of database architecture representing total view of database? (a) Conceptual view (b) Internal view (c) External view (d) Physical view Q30. Which operator is used to select values within a range? (a) BETWEEN (b) RANGE (c) WITHIN (d) JOINS (e) UNION 6 Adda247 No. 1 APP for Banking & SSC Preparation

7 Q31. Which of the following is used to transfer data intended for a peripheral device into a disk so that it can be transmitted to the peripheral device at a more suitable time or in bulk? (a) Virtual programming (b) Multi programming (c) Caching (d) Multitasking (e) Spooling Q32. What are the ways of dealing with deadlock? (a) Deadlock prevention (b) Deadlock recovery (c) Deadlock detection (d) All of the above (e) Deadlock breakup. Q33. What is Multiprogramming system? (a) it is easier to develop than single programming systems (b) it executes each job faster (c) it executes more jobs in the same time (d) it is used only on large main frame computers Q34. A direct Memory Access (DMA) transfer implies: (a) Direct transfer of data between memory and accumulator (b) Direct transfer of data between memory and I/O devise without the use of microprocessor (c) Transfer of data exclusively within microprocessor registers (d) A fast transfer of data between microprocessor and I/O devices Q35. What is use of "touch" command in Linux? (a) create a file (b) remove a file (c) Show the manual page (d) Show home directory (e) Copy files Q36. Which of the following is the time interval between the submission and completion of job? (a) Waiting time (b) Turnaround time (c) Throughput (d) Response time (e) Seek time 7 Adda247 No. 1 APP for Banking & SSC Preparation

8 Q37. What is Optimal Page Replacement algorithm? (a) Replace the page that will not be used for a long time (b) Replace the page that has been used for a long time (c) Replace the Page that has not been used for a long time (d) Replace Page not in memory (e) Used to extract page in main memory Q38. What is effect of thrashing in CPU utilization? (a) Increase CPU utilization (b) Decrease CPU utilization (c) Keeps constant (d) NO effect on CPU Q39. Which of the following is true about compaction in operating system? (a) It is a technique for overcoming fatal error (b) It is a page management technique (c) It helps to solve the problem of fragmentation (d) Allocate the address of physical memory Q40. Banker's Algorithm is used for: (a) Deadlock Detection (b) Deadlock Prevention (c) Deadlock Avoidance (d) Page Scheduling (e) CPU Scheduling Q41. The processes that are residing in main memory and are ready and waiting to execute are kept on a list called: (a) job queue (b) ready queue (c) execution queue (d) process queue (e) priority queue Q42. Which of the following is the time between a command request and the beginning of a response? (a) Throughput (b) Waiting time (c) Response time (d) Turnaround time (e) Beginning time 8 Adda247 No. 1 APP for Banking & SSC Preparation

9 Q43. Which of the following is the condition of mutual exclusion occurrence? (a) It occurs between two disjoint processes that do not interact (b) among processes that share resources (c) among processes that do not use the same resource (d) process holding a resource. Q44. What is Dirty Bit in operating system? (a) page with corrupted data (b) wrong page in the memory (c) page that is modified after being loaded into cache memory (d) page that is less frequently accessed Q45. Which of the following UNIX command is used to remove or delete files? (a) rm (b) mv (c) cp (d) lpr (e) man Q46. Which of the following is not an antivirus? (a) Bitdefender (b) Kaspersky (c) Cobian (d) F-secure (e) Avira Q47. Which of the following is the combination of public and private cloud? (a) Business cloud (b) Space cloud (c) Rackspace cloud (d) Hybrid cloud (e) Commodity cloud Q48. In which debugging technique, when an error has occurred, one needs to start tracing the program backward one step at a time evaluating the values of all variables until the cause of error is found? (a) Cause Elimination (b) Program Slicing (c) Backtracking (d) Brute Force Method 9 Adda247 No. 1 APP for Banking & SSC Preparation

10 Q49. Which of the following maintenance strategies involves performing maintenance before problems occur to avoid breakdowns and disruptions? (a) Perfective Maintenance (b) Corrective Maintenance (c) Adaptive Maintenance (d) Preventive Maintenance (e) Breakdown Maintenance Q50. Which of the following malicious software that can change its code and signature patterns with each iteration? (a) Keylogger (b) Mutation Engine (c) Morris worm (d) Metamorphic Virus (e) Stealth Virus Q51. In which type of SQL join returns all the rows from left table combine with the matching rows of the right table (a) Inner join (b) Left outer join (c) Right outer join (d) Full join (e) Self join Q52. An accountant office has four employees. They have four computers and two printers. What kind of network would you suggest they install? (a) Client server network (b) Peer-to peer network (c) Intranet (d) MAN (e) None of the above Q53. Which of the following is the process of taking control over an existing session between a client and a server? (a) IP spoofing (b) Replay attack (c) Session hijacking (d) WarDriving (e) Backdoor 10 Adda247 No. 1 APP for Banking & SSC Preparation

11 Q54. If different properties and functions of a real-world entity is grouped or embedded into a single element, what is it called in OOP language? (a) Inheritance (b) Polymorphism (c) Abstraction (d) Encapsulation (e) Generalization Q55. Which keyword is used to define a scope where identifiers like variables, functions, classes, etc. are declared in C++? (a) namespace (b) mutable (c) long (d) while (e) int Q56. Which among the following is not a necessary condition for constructors? (a) Its name must be same as that of class (b) It must not have any return type (c) It must contain a definition body (d) It can contain arguments Q57. Which feature works with both Microsoft Explorer and Microsoft Edge and monitors websites, pages, and downloads for known issues? (a) Agent X (b) Blocker (c) Armenia (d) SmartScreen (e) None of there Q58. A free file storage and file sharing service provided by Microsoft when you sign up for a Microsoft account is: (a) OneDrive (b) Google Drive (c) icloud (d) AWS (e) D-cloud Q59. What is the correct HTML for inserting an image? (a) <image src="image.gif" alt="myimage"> (b) <img href="image.gif" alt="myimage"> (c) <img src="image.gif" alt="myimage"> (d) <img alt="myimage">image.gif</img> (e) <img sty= MyImage >img.gif</img> 11 Adda247 No. 1 APP for Banking & SSC Preparation

12 Q60. Which of the following cloud computing service allows user to subscribe to a software application and execute it online, rather than purchasing it to install on in-house computers? (a) IaaS (b) PaaS (c) CaaS (d) SaaS (e) EaaS Q61. Ethernet use which Topology? (a) Bus (b) Star (c) Ring (d) Both (a) and (b) (e) Mesh Q62. Default port for HTTP: (a) 23 (b) 80 (c) 21 (d) 25 (e) 30 Q63. What is the main protocol used to access data on WWW? (a) FTP (b) HTML (c) HTTP (d) SMTP (e) TFTP Q64. What is CIDR (Classless Inter Domain Routing)? (a) It is used in class C Networks (b) It is used in class B Networks (c) It is used in class A Networks (d) All of the above (e) only (b) and (c) Q65. DNS is defining at which layer of TCP/IP model? (a) Internet layer (b) Data link layer (c) Transport layer (d) Application layer (e) Both (a) and (c) 12 Adda247 No. 1 APP for Banking & SSC Preparation

13 Q66. Three-way hand shake method used in which of the following? (a) Connection establishment (b) Connection termination (c) Connection release (d) Path finding (e) packet forwarding Q67. In which type of switching technique whole message are transmitted at a time from source to destination? (a) Packet switching (b) Circuit switching (c) Message switching (d) Data switching (e) Key switching Q68. Which of the following protocol is used for remote terminal connection service? (a) TELNET (b) FTP (c) RARP (d) UDP (e) SMTP Q69. Circuit Switching takes place at which layer? (a) Transport layer (b) Application layer (c) Presentation layer (d) Physical layer (e) Data link layer Q70. SIP, DHCP and DNS are which layer protocol of OSI model? (a) Presentation layer (b) Transport layer (c) Application layer (d) Session layer (e) Network layer Q71. Which of the following is protocol data units of layer 2? (a) Bits (b) segments (c) Packets (d) Frames (e) Data 13 Adda247 No. 1 APP for Banking & SSC Preparation

14 Q72. Which of the following are the two mode of IP security? (a) Certificate and tunnel (b) Certificate and transport (c) Transport and tunnel (d) Security and phases (e) Encryption and security Q73. Which of the following OSI model layer is used for logical addressing? (a) Transport Layer (b) Application Layer (c) Network Layer (d) Session Layer (e) Physical Layer Q74. What is BGP in networking? (a) Balanced Gateway Protocol (b) Border Gateway Protocol (c) Broadband Gateway Protocol (d) Balanced Goal Protocol (e) Balanced Gate Protocol Q75. Default subnet mask of Class C IP address is: (a) (b) (c) (d) Q76. Which level of testing is evaluating the software/system compatibly with the business requirements? (a) Integration testing (b) System testing (c) Acceptance testing (d) Unit Testing (e) Evaluation Testing Q77. What is UML (Uniform Modeling Language)? (a) Designing technique (b) Testing technique (c) Maintenance technique (d) Delivery Technique (e) Debugging Technique 14 Adda247 No. 1 APP for Banking & SSC Preparation

15 Q78. Which of the following software development model is also referred as Linear Sequential Model? (a) Spiral Model (b) Iterative Model (c) Waterfall Model (d) Incremental Model (e) V-Model Q79. Which is not a software life cycle model? (a) Waterfall model (b) Spiral model (c) Prototyping model (d) Capability maturity model (e) V-model Q80. Acceptance tests are normally conducted by the: (a) developer (b) end users (c) test team (d) systems engineers Q81. What are the qualities of good software? (a) Reliability (b) Correctness (c) Efficiency (d) Portability (e) All of the above Q82. If user participation is available, which model is to be chosen? (a) Waterfall (b) Iterative enhancement model (c) Spiral model (d) RAD model (e) V-model Q83. In which debugging technique, when an error has occurred, one needs to start tracing the program backward one step at a time evaluating the values of all variables until the cause of error is found? (a) Cause Elimination (b) Program Slicing (c) Backtracking (d) Brute Force Method 15 Adda247 No. 1 APP for Banking & SSC Preparation

16 Q84. Which of the following maintenance strategies involves performing maintenance before problems occur to avoid breakdowns and disruptions? (a) Perfective Maintenance (b) Corrective Maintenance (c) Adaptive Maintenance (d) Preventive Maintenance (e) Breakdown Maintenance Q85. Which phase is not available in software life cycle? (a) Coding (b) Testing (c) Maintenance (d) Abstraction (e) None of the above Q86. Which of the following is testing is also known as clear box testing? (a) White box testing (b) Black box testing (c) Grey box testing (d) Behavioral testing Q87. Alpha testing is done by: (a) Customer (b) Tester (c) Developer (d) All of the above (e) Only (a) and (b) Q88. Which one is the most important feature of spiral model? (a) Quality management (b) Risk management (c) Performance management (d) Efficiency management (e) Cost management Q89. Which process is the examination and alteration of a system to reconstitute it in a new form? (a) Software reengineering (b) Software reverse engineering (c) Software forward engineering (d) Software testing (e) Software costing 16 Adda247 No. 1 APP for Banking & SSC Preparation

17 Q90. Regression testing in primarily related to which type of testing? (a) Functional testing (b) Data flow testing (c) Development testing (d) Maintenance testing Q91. Which of the following is used to obtain information about a professor with name pankaj? (a) (b) (c) (d) (e) Q92. How can you change "Tripathi" into "Purohit" in the "LastName" column in the Persons table? (a) MODIFY Persons SET LastName='Tripathi' INTO LastName='Purohit (b) MODIFY Persons SET LastName='Purohit' WHERE LastName='Tripathi' (c) UPDATE Persons SET LastName='Tripathi' INTO LastName='Purohit' (d) UPDATE Persons SET LastName='Purohit' WHERE LastName='Tripathi' (e) CREATE Person SET LastName= Purohit WHERE LastName= Tripathi Q93. In which type of SQL join returns all the rows from left table combine with the matching rows of the right table? (a) Inner join (b) Left outer join (c) Right outer join (d) Full join (e) Self join Q94. In E-R Diagram, total participation in entities is represented by which of the following shape? (a) Double Rectangle (b) Eclipse (c) Diamond (d) Double line (e) Double eclipse Q95. Which SQL operator allows you to specify multiple values in a WHERE clause? (a) Between (b) Select (c) Joins (d) In (e) Like 17 Adda247 No. 1 APP for Banking & SSC Preparation

18 Q96. In SQL server, indexes are organized as: (a) List (b) Array (c) Queue (d) B-tree (e) Stack Q97. Which of the following is a condition created within a database or data storage technology in which the same piece of data is stored in two separate places? (a) Data Enumeration (b) Data Iteration (c) Data Concurrency (d) Data Redundancy (e) Data Sufficiency Q98. What does the SYSDATE function Contain: (a) Only Current Date (b) Only Current Time (c) Both Current Date and Current Time (d) Only Hours of Time (e) Only month Q99. By which of the following statements, we can undo all the updates performed on the transaction? (a) Undo (b) Commit (c) Rollback (d) Replace (e) Reverse Q100. What is OLTP? (a) Operating Limit Transaction Processing (b) Operation Line Transaction Processing (c) On-line Transaction Processing (d) Online Termination processing (e) Operation Line Termination Processing Q101. Which of the following is not a DDL command? (a) CREATE (b) ALTER (c) DROP (d) UPDATE (e) TRUNCATE Q102. Checkpoints are a part of which of the following measures? (a) Recovery measure (b) Security measure (c) Concurrency measure (d) Authorized measure (e) Design measures 18 Adda247 No. 1 APP for Banking & SSC Preparation

19 Q103. Which of the following concepts is applicable with respect of 2 NF? (a) Full functional dependency (b) Partial dependency (c) Transitive dependency (d) None- transitive dependency Q104. How to convert weak entity set to strong entity set? (a) Using aggregation (b) Adding appropriate attributes (c) Using generalization (d) Normalization Q105. The ability to modify the internal schema without causing any change to the external scheme: (a) Physical data independence (b) Logical data independence (c) External data independence (d) Both Physical and External data independence Q106. Which feature in Object Oriented Programming allows reusing code? (a) Polymorphism (b) Inheritance (c) Encapsulation (d) Data hiding (e) Recursion Q107. What would be the worst run time complexity of queue and dequeue operations, if queue is implemented using arrays? (a) O(n), O(n) (b) O(n), O(1) (c) O(1), O(n) (d) O(1), O(1) Q108. What is the work of compiler? (a) A program that programs into memory and prepares them for execution (b) A program that automates the translation of assembly language into machine language (c) Program that accepts a program written in a high-level language and produces an object program (d) A program that appears to execute a source program as if it were machine language (e) A program that translates a high- level program line-by-line to machine language. 19 Adda247 No. 1 APP for Banking & SSC Preparation

20 Q109. By which statement you can force immediate termination of a loop, by passing the conditional expression and any remaining code in the body of the loop. (a) Break (b) Continue (c) Terminate (d) Loop Close (e) Return Q110. Which of the following tag is used to link the URL? (a) <a> (b) <style> (c) <link> (d) <hyperlink> (e) <b> Q111. Which of the following is an online cloud storage service from Microsoft? (a) MicroDrive (b) OneDrive (c) CloudDrive (d) WindowsDrive Q112. Which of the following sorting algorithm is best if a list is already sorted? (a) Insertion sort (b) Quick Sort (c) Merge Sort (d) Heap sort (e) Bubble Sort Q113. Which of the following HTTP error message shows when server is currently unavailable? (a) 503 (b) 404 (c) 406 (d) 400 (e) 202 Q114. Which of the following phase produce intermediate representations of the source program in compiler design? (a) Lexical Analyzer (b) Syntax Analyzer (c) Semantic Analyzer (d) Intermediate code generator (e) Machine Independent code optimiser 20 Adda247 No. 1 APP for Banking & SSC Preparation

21 Q115. Which of the following register holds the address of memory where CPU wants to read or write data. (a) I/O address register (b) Memory buffer register (c) Memory address register (d) Program counter (e) Flag register Q116. What is FPGA? (a) Field Programmable Gate Array (b) Forward Programmable Gate Array (c) Forward Parallel Gate Array (d) Field Parallel Gate Array (e) Field Parallel Game Array Q117. Which data structure is used to implement priority queue? (a) Array (b) List (c) Heap (d) All of the mentioned (e) Only (b) and (c) Q118. An assembler that runs on one machine but produces machine code for another machine is called: (a) Simulator (b) Emulator (c) Cross assembler (d) Boot-strap loader (e) Native code compiler Q119. Amazon Web Services is which type of cloud computing distribution model? (a) Software as a service (b) Platform as a service (c) Infrastructure as a service (d) Communication as a service Q120. Which of the following is java web server? (a) Apache Tomcat (b) Jetty (c) Resin (d) Oracle iplanet (e) All of the above 21 Adda247 No. 1 APP for Banking & SSC Preparation

1 Adda247 No. 1 APP for Banking & SSC Preparation Website: bankersadda.com sscadda.com store.adda247.com

1 Adda247 No. 1 APP for Banking & SSC Preparation Website: bankersadda.com sscadda.com store.adda247.com 1 Adda247 No. 1 APP for Banking & SSC Preparation Solutions S1. Ans.(c) Sol. UDP is faster because it is connectionless and need not wait for connection setup and acknowledgement. S2. Ans.(c) Sol. presentation

More information

1 Adda247 No. 1 APP for Banking & SSC Preparation Website:store.adda247.com

1 Adda247 No. 1 APP for Banking & SSC Preparation Website:store.adda247.com 1 Adda247 No. 1 APP for Banking & SSC Preparation Q1. When you visit certain website, spyware may be automatically downloaded. This is called: (a) Logic bomb (b) Drive-by download (c) Virus (d) Drive-in

More information

IBPS SO Examination 2013 IT Officer Professional Knowledge Question Paper

IBPS SO Examination 2013 IT Officer Professional Knowledge Question Paper IBPS SO Examination 2013 IT Officer Professional Knowledge Question Paper 1. The tracks on a disk which can be accused without repositioning the R/W heads is (A) Surface (B) Cylinder (C) Cluster 2. Which

More information

COMPUTER MCQs. 1. DOS floppy disk does not have 1) a boot record 2) a file allocation table 3) a root directory

COMPUTER MCQs. 1. DOS floppy disk does not have 1) a boot record 2) a file allocation table 3) a root directory COMPUTER MCQs 1. DOS floppy disk does not have 1) a boot record 2) a file allocation table 3) a root directory 4)virtual memory 5) None of the above 2. The component is used by the data analyst to create

More information

ROYAL INSTITUTE OF INFORMATION & MANAGEMENT

ROYAL INSTITUTE OF INFORMATION & MANAGEMENT ROYAL INSTITUTE OF INFORMATION & MANAGEMENT BASICS NETWORKING CHAPTER 1 Networking Basics to Networking Advantages of Networking Types of Network 1 Local Area Network (LAN) LAN features Basic LAN components

More information

Hands-On TCP/IP Networking

Hands-On TCP/IP Networking Hands-On Course Description In this Hands-On TCP/IP course, the student will work on a live TCP/IP network, reinforcing the discussed subject material. TCP/IP is the communications protocol suite on which

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1 Interconnecting Networks with TCP/IP 2000, Cisco Systems, Inc. 8-1 Objectives Upon completion of this chapter you will be able to perform the following tasks: Identify the IP protocol stack, its protocol

More information

Introduction to TCP/IP

Introduction to TCP/IP Introduction to TCP/IP Properties and characteristics of TCP/IP IPv4 IPv6 Public vs private vs APIPA/link local Static vs dynamic Client-side DNS settings Client-side DHCP Subnet mask vs CIDR Gateway TCP/IP

More information

Copyleft 2005, Binnur Kurt. Objectives

Copyleft 2005, Binnur Kurt. Objectives 1 ing Fundamentals Copyleft 2005, Binnur Kurt Objectives Define basic networking terms Describe some commonly used network applications Describe the main purposes and functions of computer networking Describe

More information

Chapter 8. Network Troubleshooting. Part II

Chapter 8. Network Troubleshooting. Part II Chapter 8 Network Troubleshooting Part II CCNA4-1 Chapter 8-2 Network Troubleshooting Review of WAN Communications CCNA4-2 Chapter 8-2 WAN Communications Function at the lower three layers of the OSI model.

More information

Introduction to Computer Science. William Hsu Department of Computer Science and Engineering National Taiwan Ocean University

Introduction to Computer Science. William Hsu Department of Computer Science and Engineering National Taiwan Ocean University Introduction to Computer Science William Hsu Department of Computer Science and Engineering National Taiwan Ocean University Chapter 4: Networking and the Internet No one owns the Internet, and only one

More information

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

Dr. Babasaheb Ambedkar Open University

Dr. Babasaheb Ambedkar Open University Enrollment Number : Dr. Babasaheb Ambedkar Open University Term End Examination January - 2015 Course : BCA Numerical Code: 0065 Subject Code : BCA 301 Numerical Code: 0530 Subject : Introduction to Computer

More information

Syllabus for Computer Science General Part I

Syllabus for Computer Science General Part I Distribution of Questions: Part I Q1. (Compulsory: 20 marks). Any ten questions to be answered out of fifteen questions, each carrying two marks (Group A 3 questions, Group B, Group C and Group D 4 questions

More information

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12 TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group

More information

Chapter 4 The Internet

Chapter 4 The Internet Chapter 4 The Internet Dr. Farzana Rahman Assistant Professor Department of Computer Science James Madison University Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3

More information

Introduction to Networking

Introduction to Networking Introduction to Networking Chapters 1 and 2 Outline Computer Network Fundamentals Defining a Network Networks Defined by Geography Networks Defined by Topology Networks Defined by Resource Location OSI

More information

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS) Course Outline Network+ Duration: 5 days (30 hours) Learning Objectives: Install and configure a network card Define the concepts of network layers Understand and implement the TCP/IP protocol Install

More information

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6 RMIT University Data Communication and Net-Centric Computing COSC 1111/2061 Internetworking IPv4, IPv6 Technology Slide 1 Lecture Overview During this lecture, we will understand The principles of Internetworking

More information

Solved MCQ of Computer networking. Set-1

Solved MCQ of Computer networking. Set-1 Solved MCQ of Computer networking Set-1 1. The computer network is A) Network computer with cable B) Network computer without cable C) Both of the above D) None of the above 2. FDDI used which type of

More information

Chapter 7. Local Area Network Communications Protocols

Chapter 7. Local Area Network Communications Protocols Chapter 7 Local Area Network Communications Protocols The Network Layer The third layer of the OSI Model is the network layer. The network layer is concerned with providing a means for hosts to communicate

More information

Assignment - 1 Chap. 1 Wired LAN s

Assignment - 1 Chap. 1 Wired LAN s Assignment - 1 Chap. 1 Wired LAN s 1. (1 Mark) 1. Draw the frame format of Ethernet. 2. What is unicast, multicast and broadcast address? 3. State the purpose of CRC field. 2. (5 Marks) 1. Explain how

More information

Acknowledgments. Part One - Introduction to the TCP/IP Protocol

Acknowledgments. Part One - Introduction to the TCP/IP Protocol Illustrated TCP/IP by Matthew G. Naugle Wiley Computer Publishing, John Wiley & Sons, Inc. ISBN: 0471196568 Pub Date: 11/01/98 Acknowledgments Part One - Introduction to the TCP/IP Protocol Chapter 1 -

More information

Chapter 4: Networking and the Internet

Chapter 4: Networking and the Internet Chapter 4: Networking and the Internet 2015 Pearson Education Limited 2015 Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World Wide Web 4.4 Internet Protocols

More information

Chapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0

Chapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0 Chapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0 CCNET v6 10 Chapter 10 - Sections & Objectives 10.1 Application Layer Protocols Explain the operation of the application

More information

SYLLABUS. osmania university CHAPTER - 3 : MEDIUM ACCESS CONTROL (MAC) SUBLAYER Standards, Bluetooth, Bridges and Routers.

SYLLABUS. osmania university CHAPTER - 3 : MEDIUM ACCESS CONTROL (MAC) SUBLAYER Standards, Bluetooth, Bridges and Routers. Contents i SYLLABUS osmania university UNIT - I CHAPTER - 1 : INTRODUCTION Data Communication, Network Topologies : LAN, WAN, MAN, Types : Bus, Star, Ring, Hybrid, Line Configurations, Reference Models

More information

a. It will output It s NOT Rover b. Class Main should be changed to the following (bold characters show the changes)

a. It will output It s NOT Rover b. Class Main should be changed to the following (bold characters show the changes) May 2015 Computing Advanced Paper 1 Question 1 a. It will output It s NOT Rover b. Class Main should be changed to the following (bold characters show the changes) public class Main public static void

More information

II B.Sc(IT) [ BATCH] IV SEMESTER CORE: RELATIONAL DATABASE MANAGEMENT SYSTEM - 412A Multiple Choice Questions.

II B.Sc(IT) [ BATCH] IV SEMESTER CORE: RELATIONAL DATABASE MANAGEMENT SYSTEM - 412A Multiple Choice Questions. Dr.G.R.Damodaran College of Science (Autonomous, affiliated to the Bharathiar University, recognized by the UGC)Re-accredited at the 'A' Grade Level by the NAAC and ISO 9001:2008 Certified CRISL rated

More information

Chapter 4: Networking and the Internet. Figure 4.1 Network topologies. Network Classifications. Protocols. (continued)

Chapter 4: Networking and the Internet. Figure 4.1 Network topologies. Network Classifications. Protocols. (continued) Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World

More information

Chapter 4: Networking and the Internet

Chapter 4: Networking and the Internet Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Copyright 2012 Pearson Education, Inc. Chapter 4: Networking and the Internet 4.1 Network Fundamentals

More information

University of Southern California EE450: Introduction to Computer Networks

University of Southern California EE450: Introduction to Computer Networks University of Southern California EE450: Introduction to Computer Networks Catalog Description Network architectures; Layered protocols, Network service interface; Local Networks; long-haul Networks; Internal

More information

Lecture-4. TCP/IP-Overview:

Lecture-4. TCP/IP-Overview: Lecture-4 TCP/IP-Overview: The history goes back to ARPANET a research network sponsored by DoD US Govt. It eventually connected hundreds of universities and govt installations, using leased telephone

More information

Lecture 3. The Network Layer (cont d) Network Layer 1-1

Lecture 3. The Network Layer (cont d) Network Layer 1-1 Lecture 3 The Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router? Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets

More information

Jianhui Zhang, Ph.D., Associate Prof. College of Computer Science and Technology, Hangzhou Dianzi Univ.

Jianhui Zhang, Ph.D., Associate Prof. College of Computer Science and Technology, Hangzhou Dianzi Univ. Jianhui Zhang, Ph.D., Associate Prof. College of Computer Science and Technology, Hangzhou Dianzi Univ. Email: jh_zhang@hdu.edu.cn Copyright 2015 Pearson Education, Inc. Chapter 4: Networking and the Internet

More information

TCP/IP Protocol Suite and IP Addressing

TCP/IP Protocol Suite and IP Addressing TCP/IP Protocol Suite and IP Addressing CCNA 1 v3 Module 9 10/11/2005 NESCOT CATC 1 Introduction to TCP/IP U.S. DoD created the TCP/IP model. Provides reliable data transmission to any destination under

More information

Chapter 12 Network Protocols

Chapter 12 Network Protocols Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)

More information

Week. Lecture Topic day (including assignment/test) 1 st 1 st Introduction to Module 1 st. Practical

Week. Lecture Topic day (including assignment/test) 1 st 1 st Introduction to Module 1 st. Practical Name of faculty: Gaurav Gambhir Discipline: Computer Science Semester: 6 th Subject: CSE 304 N - Essentials of Information Technology Lesson Plan Duration: 15 Weeks (from January, 2018 to April, 2018)

More information

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks.

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks. Chapter 4: Networking and the 4.1 Network Fundamentals 4.2 The 4.3 The World Wide Web 4.4 Protocols 4.5 Security Network Classifications Scope Local area network (LAN) Metropolitan area (MAN) Wide area

More information

University of Baghdad College of Science Department of Computer Science األسم الكامل: High Diploma Qualification Exam Date: 13 Aug Time: 3 hrs.

University of Baghdad College of Science Department of Computer Science األسم الكامل: High Diploma Qualification Exam Date: 13 Aug Time: 3 hrs. University of Baghdad College of Science Department of Computer Science األسم الكامل: High Diploma Qualification Exam Date: 13 Aug. 2015 Time: 3 hrs. Notes: Answer All Questions. Answer in English. It

More information

Chapter 4: Networking and the Internet. Copyright 2015 Pearson Education, Inc.

Chapter 4: Networking and the Internet. Copyright 2015 Pearson Education, Inc. Chapter 4: Networking and the Internet Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World Wide Web 4.4 Internet Protocols 4.5 Security 4-2 Network Classifications

More information

m ~~I Rt'6"'lcl ati1j4#11'" ~ silttli71 h1 ~

m ~~I Rt'6'lcl ati1j4#11' ~ silttli71 h1 ~ m ~~I Rt'6"'lcl ati1j4#11'" ~ silttli71 h1 ~ Rt'6q'1"'d~(+1 -,~~oh, ~, ffar. SREE CHITRA TIRUNAL INSTITUTE FOR MEDICAL SCIENCES AND TECHNOLOGY Thlruvananthapuram 695 011, Kerala, India. (An Institute of

More information

QUESTION BANK EVEN SEMESTER

QUESTION BANK EVEN SEMESTER Fatima Michael College of Engineering and Technology DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING QUESTION BANK EVEN SEMESTER SUB CODE & NAME: EC2352 COMPUTER NETWORKS YEAR / SEM: III / VI Staff

More information

QUESTION BANK UNIT-I

QUESTION BANK UNIT-I DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK Subject Code: CS1302 Subject Name: Computer Networks Year/ Sem: III / V UNIT-I 1. What is multicast? What is the difference between unicast and multicast?

More information

Entrance exam - Informatics

Entrance exam - Informatics Entrance exam - Informatics Name and Surname fill in the field Application No. Test Sheet No. 15 Algorithms and data structures 1 Which of the listed data structures is most suitable (w.r.t. time and memory

More information

Application Layer Network Layer

Application Layer Network Layer Application Layer 1. What is job of Application Layer? 2. Which protocol is used at Application Layer? 3. What is DNS? How is works? 4. What protocols used is email? 5. Where to use SMTP protocol? 6. Where

More information

SQL Interview Questions

SQL Interview Questions SQL Interview Questions SQL stands for Structured Query Language. It is used as a programming language for querying Relational Database Management Systems. In this tutorial, we shall go through the basic

More information

EEC-684/584 Computer Networks

EEC-684/584 Computer Networks EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking

More information

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ Networking for Data Acquisition Systems Fabrice Le Goff - 14/02/2018 - ISOTDAQ Outline Generalities The OSI Model Ethernet and Local Area Networks IP and Routing TCP, UDP and Transport Efficiency Networking

More information

Computer Networks (Introduction to TCP/IP Protocols)

Computer Networks (Introduction to TCP/IP Protocols) Network Security(CP33925) Computer Networks (Introduction to TCP/IP Protocols) 부산대학교공과대학정보컴퓨터공학부 Network Type Elements of Protocol OSI Reference Model OSI Layers What we ll learn today 2 Definition of

More information

IP Protocols. ALTTC/Oct

IP Protocols. ALTTC/Oct IP Protocols Internet or IP technology over the years has emerged as the most prominent data communication technology. TCP/IP protocol has become de-facto data comm standard throughout the world. It can

More information

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK SUBJECT NAME: COMPUTER NETWORKS SUBJECT CODE: CST52 UNIT-I 2 MARKS 1. What is Network? 2.

More information

INFORMATION TECHNOLOGY

INFORMATION TECHNOLOGY [DMSIT 01] M.Sc. (Previous) DEGREE EXAMINATION, DEC 2013 First Year INFORMATION TECHNOLOGY Paper I BASICS OF INFORMATION TECHNOLOGY Time : 3 hours Max. Marks : 75 Section A (3x15 = 45) Answer any THREE

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

Data about data is database Select correct option: True False Partially True None of the Above

Data about data is database Select correct option: True False Partially True None of the Above Within a table, each primary key value. is a minimal super key is always the first field in each table must be numeric must be unique Foreign Key is A field in a table that matches a key field in another

More information

Data Communication and Network. Introducing Networks

Data Communication and Network. Introducing Networks Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You can connect

More information

ECE4110 Internetwork Programming. Introduction and Overview

ECE4110 Internetwork Programming. Introduction and Overview ECE4110 Internetwork Programming Introduction and Overview 1 EXAMPLE GENERAL NETWORK ALGORITHM Listen to wire Are signals detected Detect a preamble Yes Read Destination Address No data carrying or noise?

More information

CompTIA Network+ Course

CompTIA Network+ Course CompTIA Network+ Course Duration: 5 Days Course Delivery: Classroom Language: English Target Audience Comprehensive approach to both preparing a student for CompTIA's Network+ exam and developing proficiency

More information

CIS 21 Final Study Guide. Final covers ch. 1-20, except for 17. Need to know:

CIS 21 Final Study Guide. Final covers ch. 1-20, except for 17. Need to know: CIS 21 Final Study Guide Final covers ch. 1-20, except for 17. Need to know: I. Amdahl's Law II. Moore s Law III. Processes and Threading A. What is a process? B. What is a thread? C. Modes (kernel mode,

More information

ITEC 3800 Data Communication and Network. Introducing Networks

ITEC 3800 Data Communication and Network. Introducing Networks ITEC 3800 Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You

More information

Section 1.1: Networking Overview

Section 1.1: Networking Overview Section 1.1: Networking Overview This section provides an introduction to networking. Students will become familiar with the following aspects of a network: Components of a network o Computers o Transmission

More information

Chapter 14: Introduction to Networking

Chapter 14: Introduction to Networking Chapter 14: Introduction to Networking Complete CompTIA A+ Guide to PCs, 6e How different networks are wired (or wireless) How to identify common network cables How Ethernet works About the OSI and TCP/IP

More information

Chapter 09 Network Protocols

Chapter 09 Network Protocols Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems

More information

Aeronautical Systems Center

Aeronautical Systems Center Aeronautical Systems Center Internet Protocol (IP) version 6 (converting from version 4) 20 June 2007 Dennis Ludwig ASC/XRAI DSN: 785-7887 Dennis.ludwig@wpafb.af.mil IPv6 Presentation: Objectives 1. To

More information

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols CCNA Exploration Network Fundamentals Chapter 03 Application Functionality and Protocols Updated: 27/04/2008 1 3.1 Applications: The Interface Between Human and Networks Applications provide the means

More information

BVRIT HYDERABAD College of Engineering for Women Department of Information Technology. Hand Out

BVRIT HYDERABAD College of Engineering for Women Department of Information Technology. Hand Out BVRIT HYDERABAD College of Engineering for Women Department of Information Technology Hand Out Subject Name: Prepared by: Computer Networks Dipali Pattanayak,Assistant Professor, IT Year and Sem, Department:

More information

1 Adda247 No. 1 APP for Banking & SSC Preparation Website:store.adda247.com

1 Adda247 No. 1 APP for Banking & SSC Preparation Website:store.adda247.com 1 Adda247 No. 1 APP for Banking & SSC Preparation Q1. Transmission control protocol is: (a) connection oriented protocol (b) uses a three way handshake to establish a connection (c) receives data from

More information

CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols

CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Objectives Functions of the three upper OSI model layers, network services

More information

1. IPv6 is the latest version of the TCP/IP protocol. What are some of the important IPv6 requirements?

1. IPv6 is the latest version of the TCP/IP protocol. What are some of the important IPv6 requirements? 95 Chapter 7 TCP/IP Protocol Suite and IP Addressing This chapter presents an overview of the TCP/IP Protocol Suite. It starts with the history and future of TCP/IP, compares the TCP/IP protocol model

More information

Computer Communication & Networks / Data Communication & Computer Networks Week # 03

Computer Communication & Networks / Data Communication & Computer Networks Week # 03 Computer Communication & Networks / Data Communication & Computer Networks Week # 03 M.Nadeem Akhtar CS & IT Department The University of Lahore Email: nadeem.akhtar@cs.uol.edu.pk URL-https://sites.google.com/site/nadeemuolcsccn/home

More information

SIR C.R.REDDY COLLEGE OF ENGINEERING, ELURU DEPARTMENT OF INFORMATION TECHNOLOGY LESSON PLAN

SIR C.R.REDDY COLLEGE OF ENGINEERING, ELURU DEPARTMENT OF INFORMATION TECHNOLOGY LESSON PLAN SIR C.R.REDDY COLLEGE OF ENGINEERING, ELURU DEPARTMENT OF INFORMATION TECHNOLOGY LESSON PLAN SUBJECT: IT 4.1.2 NETWORK PROTOCOLS CLASS: 4/4 B.Tech., I - SEMESTER, A.Y.2017-18 INSTRUCTOR: Sri N. Prasad

More information

Faculty of Science and IT Course title. Pre-requisite/corequisite

Faculty of Science and IT Course title. Pre-requisite/corequisite Faculty Course number Faculty of Science and IT 022242 Department Course title Computer Science Network Protocols Number of credit hours 3 Pre-requisite/corequisite Computer network Brief course description.

More information

Chapter 1 Introduction

Chapter 1 Introduction Chapter 1 Introduction A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;

More information

20-CS Cyber Defense Overview Fall, Network Basics

20-CS Cyber Defense Overview Fall, Network Basics 20-CS-5155 6055 Cyber Defense Overview Fall, 2017 Network Basics Who Are The Attackers? Hackers: do it for fun or to alert a sysadmin Criminals: do it for monetary gain Malicious insiders: ignores perimeter

More information

E-Commerce. Infrastructure I: Computer Networks

E-Commerce. Infrastructure I: Computer Networks E-Commerce Infrastructure I: Computer Networks Almost all computers today are networked or part of a distributed system. I will provide an overview of networking and a basic description of network technology.

More information

Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS

Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk Date: January 17 th 2006 at 14:00 18:00 SOLUTIONS 1. General (5p) a) Draw the layered

More information

V SEMESTER DIPLOMA EXAMINATION, JANUARY-2013 COMPUTER NETWORKS Time: 3 Hours Max. Marks: 75

V SEMESTER DIPLOMA EXAMINATION, JANUARY-2013 COMPUTER NETWORKS Time: 3 Hours Max. Marks: 75 V SEMESTER DIPLOMA EXAMINATION, JANUARY-2013 COMPUTER NETWORKS Time: 3 Hours Max. Marks: 75 GROUP A : Answer any three questions. (Question No. 1 is compulsory) Q.1 Explain different types of network?

More information

CS610 Computer Network Final Term Papers Solved MCQs with reference by Virtualians Social Network

CS610 Computer Network Final Term Papers Solved MCQs with reference by Virtualians Social Network CS610 Computer Network Final Term Papers Solved MCQs with reference by Virtualians Social Network Question No: 1( M a r k s: 1 ) A ---------- Relies on the hardware manufacturer to assign a unique physical

More information

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided. 223 Chapter 19 Inter mediate TCP The Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols was developed as part of the research that the Defense Advanced Research Projects Agency

More information

(Computer Science & Engineering)

(Computer Science & Engineering) (Computer Science & Engineering) 1. The number of equivalence relations of the set { 1, 2, 3, 4} is a) 1 b) 16 c) 12 d) none of these 2. Cordiality of the set in {a, b, c}, {a,, d}, {, { }, { { } } } a)

More information

TCP/IP THE TCP/IP ARCHITECTURE

TCP/IP THE TCP/IP ARCHITECTURE TCP/IP-1 The Internet Protocol (IP) enables communications across a vast and heterogeneous collection of networks that are based on different technologies. Any host computer that is connected to the Internet

More information

B. the address of the data is supplied by the users C. there is no need for an address i.e. the data is used as an address

B. the address of the data is supplied by the users C. there is no need for an address i.e. the data is used as an address 1. The part of machine level instruction, which tells the central processor what has to be done, is A. Operation code B. Address C. Locator D. Flip-Flop 2. Which of the following refers to the associative

More information

Lecture 8. Network Layer (cont d) Network Layer 1-1

Lecture 8. Network Layer (cont d) Network Layer 1-1 Lecture 8 Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets Network

More information

Cisco Interconnecting Cisco Networking Devices Part 1.

Cisco Interconnecting Cisco Networking Devices Part 1. Cisco 100-105 Interconnecting Cisco Networking Devices Part 1 http://killexams.com/pass4sure/exam-detail/100-105 Question: 323 Refer to the exhibit. SwitchA receives the frame with the addressing shown.

More information

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322 1 Local & Metropolitan Area Networks ACOE322 Lecture 5 TCP/IP Protocol suite and IP addressing 1 0. INTRODUCTION We shall cover in this topic: 1. The relation of TCP/IP with internet and OSI model 2. Internet

More information

Networking 101 By: Stefan Jagroop

Networking 101 By: Stefan Jagroop Networking 101 By: Stefan Jagroop The Internet The Internet is governed by a series of protocols that form the rules for how communications should happen The Internet is a network of networks. There is

More information

MODULE: NETWORKS MODULE CODE: CAN1102C. Duration: 2 Hours 15 Mins. Instructions to Candidates:

MODULE: NETWORKS MODULE CODE: CAN1102C. Duration: 2 Hours 15 Mins. Instructions to Candidates: BSc.(Hons) Computer Science with Network Security BEng (Hons) Telecommunications Cohort: BCNS/17B/FT Examinations for 2017-2018 / Semester 2 Resit Examinations for BCNS/15A/FT, BTEL/15B/FT & BTEL/16B/FT

More information

DATA COMMUNICATION AND NETWORKS

DATA COMMUNICATION AND NETWORKS DATA COMMUNICATION AND NETWORKS A/L Guide TERAN SUBASINGHE Data Communication What is data communication? Data Communication is a process of exchanging data or information between two or more devices along

More information

«Computer Science» Requirements for applicants by Innopolis University

«Computer Science» Requirements for applicants by Innopolis University «Computer Science» Requirements for applicants by Innopolis University Contents Architecture and Organization... 2 Digital Logic and Digital Systems... 2 Machine Level Representation of Data... 2 Assembly

More information

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N CompTIA Network+ (Exam N10-007) Course Description: CompTIA Network+ is the first certification IT professionals specializing in network administration and support should earn. Network+ is aimed at IT

More information

Configuring NAT for High Availability

Configuring NAT for High Availability Configuring NAT for High Availability Last Updated: December 18, 2011 This module contains procedures for configuring Network Address Translation (NAT) to support the increasing need for highly resilient

More information

Network Protocols - Revision

Network Protocols - Revision Network Protocols - Revision Luke Anderson luke@lukeanderson.com.au 18 th May 2018 University Of Sydney Overview 1. The Layers 1.1 OSI Model 1.2 Layer 1: Physical 1.3 Layer 2: Data Link MAC Addresses 1.4

More information

JAIPUR NATIONAL UNIVERSITY, JAIPUR

JAIPUR NATIONAL UNIVERSITY, JAIPUR Paper Code: MCA - 101 Paper Title: Fundamental of Computer Master of Computer Application (MCA) (i) Differentiate between data and information. Which is more useful to the people and why? (ii) Explain

More information

M.C.A. DEGREE EXAMINATION, DEC First Year. Time : 03 Hours Maximum Marks : 75

M.C.A. DEGREE EXAMINATION, DEC First Year. Time : 03 Hours Maximum Marks : 75 (DMCA 101) M.C.A. DEGREE EXAMINATION, DEC. - 2012 First Year Paper - I : INFORMATION TECHNOLOGY Time : 03 Hours Maximum Marks : 75 Section - A Answer any Three of the following (3 15 = 45) 1) Define the

More information

Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE

Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE COURSE TITLE ROUTING AND SWITCHING FUNDAMENTALS COURSE DURATION 16 Hour(s) of Self-Paced Interactive Training COURSE OVERVIEW In the

More information

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Network Models The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding and developing computer-to-computer communication

More information

General Important Protocols for Examination of IA Examination 2018

General Important Protocols for Examination of IA Examination 2018 Protocol General Important Protocols for Examination of IA Examination 2018 DNS - Domain Name System - translates network address (such as IP addresses) into terms understood by humans (such as Domain

More information

Selected Sections of Applied Informatics

Selected Sections of Applied Informatics Selected Sections of Applied Informatics M.Sc. Marcin Koniak koniakm@wt.pw.edu.pl http://www2.wt.pw.edu.pl/~a.czerepicki Based on lecture: Dr inż. Andrzej Czerepicki a.czerepicki@wt.pw.edu.pl 2018 Lecture

More information

OSI Model. Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK

OSI Model. Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK OSI Model Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK What is OSI Model? Open Systems Interconnection Reference Model Developed in 1984 by the International Standards

More information