1 Adda247 No. 1 APP for Banking & SSC Preparation Website:store.adda247.com

Size: px
Start display at page:

Download "1 Adda247 No. 1 APP for Banking & SSC Preparation Website:store.adda247.com"

Transcription

1 1 Adda247 No. 1 APP for Banking & SSC Preparation

2 Q1. When you visit certain website, spyware may be automatically downloaded. This is called: (a) Logic bomb (b) Drive-by download (c) Virus (d) Drive-in download (e) Spooling Q2. Which of the following is basically a multiport repeater? (a) Hub (b) Bridge (c) Router (d) VLAN (e) Repeater Q3. How a 3NF relation is split into 4NF? (a) By removing overlapping composite key (b) By splitting into relations which do not have more than one independent multivalued dependency (c) By removing multivalued dependency (d) By putting dependent non-key attribute in a separate table. Q4. Which of the following is not a Data Definition Language Statement? (a) Delete (b) Create (c) Drop (d) Alter (e) Truncate Q5. Which keyword must be used here to rename the field name? Select name instructor name, course id from instructor, teaches where instructor.id= teaches.id; (a) From (b) Rename (c) As (d) Join (e) Like 2 Adda247 No. 1 APP for Banking & SSC Preparation

3 Q6. What is page stealing in operating system? (a) is a sign of an efficient system (b) is taking page frames from other working sets (c) should be the tuning goal (d) is taking larger disk spaces for pages paged out Q7. What is the file extension of compiled java program? (a) (.class) (b) (.java) (c) (.css) (d) (.html) (e) (.javcc) Q8. Which one of these popular windows feature is not include in window 8? (a) Desktop (b) Office Assistant Paperclip (c) Wallpaper (d) Start Button (e) Internet Explorer Q9. Which of the following addressing mode, the operand is available in the instruction itself? (a) Direct addressing (b) Immediate addressing (c) Implied addressing (d) Indirect addressing Q10. What is linker in an operating system? (a) is the same a loader (b) is required to create a load module (c) user source code as input (d) is always used before programs are executed (e) All of the above Q11. Which HTML tag is used to make a bulleted list with numbers? (a) <dl> (b) <ol> (c) <list> (d) <ul> (e) <p> 3 Adda247 No. 1 APP for Banking & SSC Preparation

4 Q12. Which statement is used to terminate a statement sequence? (a) Break (b) Switch (c) Continue (d) Wait (e) Truncate Q13. Which type of cyber-attack involves, hackers taking control of a computer system and blocking access of its work until a certain amount of money is paid? (a) Trojan horse (b) Encryption (c) Pirated software (d) Ransomware (e) Shareware Q14. The time for the actual data transfer after receiving the request for data from secondary storage is referred to as the disk s. (a) Transfer time (b) Movement time (c) Access time (d) Data input time (e) Throughput Q15. Which technique is used to send more than one call over a single line is (a) Digital transmission (b) Infrared transmission (c) Streaming (d) Multiplexing (e) Demultiplexing Q16. Which of the following defines the syntax of a programming language? (a) Token (b) Pattern (c) Context-Free Grammar (d) Source (e) Both (a) and (b) 4 Adda247 No. 1 APP for Banking & SSC Preparation

5 Q17. What will be the result of given code? #include<stdio.h> int main() { printf(5+"not Good"); } (a) Not (b) Good (c) ood (d) Not G (e) Error Q18. What is the process of defining a method in terms of itself that is a method that calls itself? (a) Polymorphism (b) Abstraction (c) Encapsulation (d) Recursion (e) Polymorphism Q19. An assembler that runs on one machine but produces machine code for another machine is called (a) Simulator (b) Emulator (c) Cross assembler (d) Boot-strap loader (e) Programmer Q20. Which of these keywords can be used to prevent Method overriding? (a) Static (b) Constant (c) Protected (d) Final (e) Catch Q21. Which virus hides from operating system and antivirus by changing its direction? (a) Stealth (b) Macro (c) Resident (d) Logic Bomb (e) Ransomware 5 Adda247 No. 1 APP for Banking & SSC Preparation

6 Q22. Which page replacement policy sometimes leads more page faults, when size of the memory is increased? (a) FIFO (b) LRU (c) Optimal page replacement (d) No such policy exists (e) Both (b) and (c) Q23. What is thrashing? (a) Reduces page I/O (b) Decreases the degree of multiprogramming (c) Implies excessive page I/O (d) Improves the system performance (e) Useful in page replacement algorithm Q24. Which feature in Object Oriented Programming allows reusing code? (a) Polymorphism (b) Inheritance (c) Encapsulation (d) Data hiding (e) Abstraction Q25. Congestion Control is done by which layer? (a) Data link layer (b) Network layer (c) Transport layer (d) Application layer (e) Session layer Q26. Brouter works at which layer of OSI Model. (a) Network layer (b) Data link layer (c) Physical layer (d) Application layer (e) Both (a) and (b) Q27. which of the following indicated by double line in ER diagram? (a) Total participation (b) Multiple participation (c) Cardinality (d) Entity (e) Partial participation 6 Adda247 No. 1 APP for Banking & SSC Preparation

7 Q28.Which clause is used to specify condition while retrieving data from table in SQL? (a) WHERE (b) LIKE (c) HAVING (d) Group By (e) Order By Q29. Which of the following is the correct syntax of UPDATE Command? (a) UPDATE table_name where condition SET column_name = <value>; (b) UPDATE table_name SET column_name = <value> WHERE <condition>; (c) UPDATE table table_name set column_name = <value> WHERE <condition>; (d) UPDATE IN table_name WHERE condition set column_name = <value>; (e) UPDATE from table_name where condition set column_name =<value>; Q30. What is the condition of page fault in operating system? (a) the page is corrupted by application software (b) the page is in main memory (c) the page is not in main memory (d) the tries to divide a number by 0 (e) When operating system not booted properly Q31. Which of the following is used to translates internet domain and host names to IP address? (a) DNS (b) Routing Information Protocol (c) Network Time Protocol (d) Internet Relay chat (e) Router 7 Adda247 No. 1 APP for Banking & SSC Preparation

8 Q32. Which of the following error occurs when software tries to access protected memory? (a) Segmentation Fault (b) Display time Error (c) IO Error (d) Runtime Error (e) Page fault Q33. Which of the following is not proper state of transaction? (a) Partially aborted (b) Partially committed (c) Aborted (d) Committed (e) Active Q is use in which technology. (a) Wireless LAN (b) ARPANET (c) ETHERNET (d) BITNET Q35. Which of the following algorithms solves the all pair shortest path problem? (a) Diskstra s algorithm (b) Floyd s algorithm (c) Prims algorithm (d) Warshall s algorithm Q36. A switch uses which type of address of machine to transfer data? (a) MAC (b) IP (c) Header (d) a & b Q37. Which command is use for sorting the table? (a) Like (b) Distinct (c) Group By (d) Order By 8 Adda247 No. 1 APP for Banking & SSC Preparation

9 Q38. What is data integrity? (a) It is the data contained in the database that is non- redundant. (b) It is the data contained in the database that is accurate and consistent. (c) It is the data contained in the database that is secured (d) It is the data contained in the database that is shared Q39. Which tracking program records every keystroke you make on the computer? (a) Key logger (b) efollow (c) ITrack/ULead (d) Stalking software Q40. Which of the following is the smallest unit of storage in oracle database? (a) Control file (b) Datafile (c) Data Block (d) Segment Q41. If requirements are easily understandable and defined then which model is best suited? (a) Spiral model (b) Waterfall model (c) Prototyping model (d) Incremental model Q42. A server farm is an example of (a) Server clustering (b) Redundant servers (c) Multiple servers (d) Server fault tolerance Q43. Which of the following is also known as PC Program Counter. (a) Instruction pointer (b) Memory pointer (c) Data counter (d) File pointer 9 Adda247 No. 1 APP for Banking & SSC Preparation

10 Q44. Which C++ oops feature is related to re-usability? (a) Encapsulation (b) Inheritance (c) Abstraction (d) Polymorphism Q45. Which of the following is a technique of improving the priority of process waiting in Queue for CPU allocation? (a) Aging (b) Starvation (c) Revocation (d) Relocation Q46. OLAP applications are widely used by (a) RDBMS (b) JAVA (c) Data Mining Technique (d) Operating System (e) Web server Q47. Which one of the following is a cryptographic protocol used to secure HTTP connection? (a) stream control transmission protocol (SCTP) (b) transport layer security (TSL) (c) explicit congestion notification (ECN) (d) resource reservation protocol Q48. IP Address belong to (a) Class A (b) Class B (c) Class C (d) Class D (e) Class E Q49. What is the port number of Post Office Protocol (POP3)? (a) 119 (b) 23 (c) 25 (d) 110 (e) Adda247 No. 1 APP for Banking & SSC Preparation

11 Q50. Which HTTP message shows " Service Unavailable"? (a) 400 (b) 401 (c) 500 (d) 503 (e) 404 Q51. Proxy firewall sometimes known as: (a) Packet filtering firewalls (b) Circuit-level gateways (c) Stateful inspection firewalls (d) Application-level gateways (e) Next-gen firewalls Q52. Which of the following is a malicious program that enable administrator level to a computer or computer network? (a) Micro virus (b) Logic bombs (c) Rootkit (d) Spyware (e) Keyloggers Q53. What is the main protocol used to access data on WWW? (a) FTP (b) HTML (c) HTTP (d) SMTP (e) TFTP Q54. Which UNIX command allows you to move and rename files? (a) cd (b) mv (c) cp (d) rm (e) Is Q55. What is the solution to starvation in priority scheduling? (a) Raising Interrupts (b) Predicting next CPU burst (c) Aging (d) Adjusting the value of time quantum 11 Adda247 No. 1 APP for Banking & SSC Preparation

12 Q56. With SQL, how can you insert a new record into the "Persons" table? (a) INSERT ('Swati', 'Purohit') INTO Persons (b) INSERT VALUES ('Swati', 'Purohit') INTO Persons (c) INSERT INTO Persons VALUES ('Swati', 'Purohit') (d) INSERT ( Swati, Purohit ) VALUES INTO Person (e) INSERT ( Swati, Purohit ) IN Person Q57. Which of the following operation is used if we are interested in only certain columns of a table? (a) PROJECTION (b) SELECTION (c) UNION (d) JOIN (e) FROM Q58. Which cloud computing service provided by Microsoft? (a) Azure (b) Elastic (c) Smart (d) Grid (e) Web service Q59. SRS in software engineering stand for: (a) System recourses Specification (b) System Recursive specification (c) System requirement specification (d) Software requirement specification Q60. Which level of database architecture is representing total view of database? (a) Conceptual view (b) Internal view (c) External view (d) Physical view (e) Relational View 12 Adda247 No. 1 APP for Banking & SSC Preparation

13 13 Adda247 No. 1 APP for Banking & SSC Preparation

IBPS SO Examination 2013 IT Officer Professional Knowledge Question Paper

IBPS SO Examination 2013 IT Officer Professional Knowledge Question Paper IBPS SO Examination 2013 IT Officer Professional Knowledge Question Paper 1. The tracks on a disk which can be accused without repositioning the R/W heads is (A) Surface (B) Cylinder (C) Cluster 2. Which

More information

COMPUTER MCQs. 1. DOS floppy disk does not have 1) a boot record 2) a file allocation table 3) a root directory

COMPUTER MCQs. 1. DOS floppy disk does not have 1) a boot record 2) a file allocation table 3) a root directory COMPUTER MCQs 1. DOS floppy disk does not have 1) a boot record 2) a file allocation table 3) a root directory 4)virtual memory 5) None of the above 2. The component is used by the data analyst to create

More information

1 Adda247 No. 1 APP for Banking & SSC Preparation Website: bankersadda.com sscadda.com store.adda247.com

1 Adda247 No. 1 APP for Banking & SSC Preparation Website: bankersadda.com sscadda.com store.adda247.com 1 Adda247 No. 1 APP for Banking & SSC Preparation Q1. Which TCP/IP transport layer protocol is faster? (a) ICMP-because it is connection-oriented (b) TCP-because it is connected-oriented (c) UDP-because

More information

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS) Course Outline Network+ Duration: 5 days (30 hours) Learning Objectives: Install and configure a network card Define the concepts of network layers Understand and implement the TCP/IP protocol Install

More information

Syllabus for Computer Science General Part I

Syllabus for Computer Science General Part I Distribution of Questions: Part I Q1. (Compulsory: 20 marks). Any ten questions to be answered out of fifteen questions, each carrying two marks (Group A 3 questions, Group B, Group C and Group D 4 questions

More information

B. the address of the data is supplied by the users C. there is no need for an address i.e. the data is used as an address

B. the address of the data is supplied by the users C. there is no need for an address i.e. the data is used as an address 1. The part of machine level instruction, which tells the central processor what has to be done, is A. Operation code B. Address C. Locator D. Flip-Flop 2. Which of the following refers to the associative

More information

CIS 21 Final Study Guide. Final covers ch. 1-20, except for 17. Need to know:

CIS 21 Final Study Guide. Final covers ch. 1-20, except for 17. Need to know: CIS 21 Final Study Guide Final covers ch. 1-20, except for 17. Need to know: I. Amdahl's Law II. Moore s Law III. Processes and Threading A. What is a process? B. What is a thread? C. Modes (kernel mode,

More information

Copyleft 2005, Binnur Kurt. Objectives

Copyleft 2005, Binnur Kurt. Objectives 1 ing Fundamentals Copyleft 2005, Binnur Kurt Objectives Define basic networking terms Describe some commonly used network applications Describe the main purposes and functions of computer networking Describe

More information

Cisco Cisco Certified Network Associate (CCNA)

Cisco Cisco Certified Network Associate (CCNA) Cisco 200-125 Cisco Certified Network Associate (CCNA) http://killexams.com/pass4sure/exam-detail/200-125 Question: 769 Refer to exhibit: Which destination addresses will be used by Host A to send data

More information

QUESTION BANK EVEN SEMESTER

QUESTION BANK EVEN SEMESTER Fatima Michael College of Engineering and Technology DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING QUESTION BANK EVEN SEMESTER SUB CODE & NAME: EC2352 COMPUTER NETWORKS YEAR / SEM: III / VI Staff

More information

CHEME OF EXAMINATION FOR B.Sc. (COMPUTER SCIENCE) SEMESTER SYSTEM (Regular Course) w.e.f Scheme for B.Sc.-III.

CHEME OF EXAMINATION FOR B.Sc. (COMPUTER SCIENCE) SEMESTER SYSTEM (Regular Course) w.e.f Scheme for B.Sc.-III. CHEME OF EXAMINATION FOR B.Sc. (COMPUTER SCIENCE) SEMESTER SYSTEM (Regular Course) w.e.f. 2015-16 Scheme for B.Sc.-III Semester-V Sr. No. Paper Internal Assessment External Marks Exam Duration 1 Paper-I

More information

Assignment - 1 Chap. 1 Wired LAN s

Assignment - 1 Chap. 1 Wired LAN s Assignment - 1 Chap. 1 Wired LAN s 1. (1 Mark) 1. Draw the frame format of Ethernet. 2. What is unicast, multicast and broadcast address? 3. State the purpose of CRC field. 2. (5 Marks) 1. Explain how

More information

Introduction to Networks

Introduction to Networks Introduction to Networks Khaled Harras School of Computer Science Carnegie Mellon University 15-349 Computer and Network Security Fall 2012 Some material borrowed from Hui Zhang and Adrian Perrig 1 Early

More information

SLO Presentation. Cerritos College. CIS Date: 09/13/2018

SLO Presentation. Cerritos College. CIS Date: 09/13/2018 CIS Date: 09/13/2018 SCIENCE, ENGINEERING & MATH CIS CIS--Transfer Student apply principles of physics to solve a variety of programming problems. Students describe the role of assembly language programming

More information

QUESTION BANK UNIT-I

QUESTION BANK UNIT-I DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK Subject Code: CS1302 Subject Name: Computer Networks Year/ Sem: III / V UNIT-I 1. What is multicast? What is the difference between unicast and multicast?

More information

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A 5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI 635 854. NAME OF THE STAFF : R.ANBARASAN DESIGNATION & DEPARTMENT : AP/CSE SUBJECT CODE : CS 6551 SUBJECT NAME : COMPUTER NETWORKS UNIT I FUNDAMENTALS

More information

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks.

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks. Chapter 4: Networking and the 4.1 Network Fundamentals 4.2 The 4.3 The World Wide Web 4.4 Protocols 4.5 Security Network Classifications Scope Local area network (LAN) Metropolitan area (MAN) Wide area

More information

Wired internetworking devices. Unit objectives Differentiate between basic internetworking devices Identify specialized internetworking devices

Wired internetworking devices. Unit objectives Differentiate between basic internetworking devices Identify specialized internetworking devices Wired internetworking devices Unit objectives Differentiate between basic internetworking devices Identify specialized internetworking devices Topic A Topic A: Basic internetworking devices Topic B: Specialized

More information

Networks Fall This exam consists of 10 problems on the following 13 pages.

Networks Fall This exam consists of 10 problems on the following 13 pages. CSCI 466 Final Networks Fall 2011 Name: This exam consists of 10 problems on the following 13 pages. You may use your two- sided hand- written 8 ½ x 11 note sheet during the exam and a calculator. No other

More information

CS3600 SYSTEMS AND NETWORKS

CS3600 SYSTEMS AND NETWORKS CS3600 SYSTEMS AND NETWORKS NORTHEASTERN UNIVERSITY Lecture 17: Internet architecture Prof. Alan Mislove (amislove@ccs.neu.edu) Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion

More information

KINGS COLLEGE OF ENGINEERING

KINGS COLLEGE OF ENGINEERING KINGS COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY ACADEMIC YEAR 2011-2012 / ODD SEMESTER QUESTION BANK SUB.CODE / NAME YEAR / SEM : CS1302 COMPUTER NETWORKS : III / V UNIT I DATA COMMUNICATION

More information

1. What is a network protocol and why are protocols needed when two machines communicate? 2 marks

1. What is a network protocol and why are protocols needed when two machines communicate? 2 marks Topic1: Common Network Protocols 1. What is a network protocol and why are protocols needed when two machines communicate? 2. Describe the function of each of the following protocols: a. SMTP b. HTTP c.

More information

Chapter 11: It s a Network. Introduction to Networking

Chapter 11: It s a Network. Introduction to Networking Chapter 11: It s a Network Introduction to Networking Small Network Topologies Typical Small Network Topology IT Essentials v5.0 2 Device Selection for a Small Network Factors to be considered when selecting

More information

Department Curriculum and Assessment Outline

Department Curriculum and Assessment Outline Department: Computing Year Group: 7 Teaching, learning and assessment during the course: (Weeks, half terms) Think like a computer scientist Shapes, patterns, algorithms and animation Understand the web.

More information

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples.

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples. About the Tutorial Internet Protocol version 4 (IPv4) is the fourth version in the development of the Internet Protocol (IP) and the first version of the protocol to be widely deployed. IPv4 is described

More information

1 Adda247 No. 1 APP for Banking & SSC Preparation Website: bankersadda.com sscadda.com store.adda247.com

1 Adda247 No. 1 APP for Banking & SSC Preparation Website: bankersadda.com sscadda.com store.adda247.com 1 Adda247 No. 1 APP for Banking & SSC Preparation Solutions S1. Ans.(c) Sol. UDP is faster because it is connectionless and need not wait for connection setup and acknowledgement. S2. Ans.(c) Sol. presentation

More information

Name of the Assistant/ Associate Professor:Annu Saini Class and Section:BCA 1 st sem Subject:Computer and Programming Fundamentals July 2018

Name of the Assistant/ Associate Professor:Annu Saini Class and Section:BCA 1 st sem Subject:Computer and Programming Fundamentals July 2018 Class and Section:BCA 1 st sem Subject:Computer and Programming Fundamentals July 2018 Ist week Day 1 IInd week Day 1 3rd week Day 1 Introduction to computers Definition and characteristics of computer

More information

SQL Interview Questions

SQL Interview Questions SQL Interview Questions SQL stands for Structured Query Language. It is used as a programming language for querying Relational Database Management Systems. In this tutorial, we shall go through the basic

More information

SESSION M12-S12 INTERNAL ASSIGNMENT

SESSION M12-S12 INTERNAL ASSIGNMENT MASTER OF COMPUTER APPLICATIONS RELATIONAL DATABASE MENAGEMENT SYSTEM PAPER CODE: MCA-401 SECTION-A Answer the following questions in around 100 words. 1. What are the differences between simple and composite

More information

Previous Year Questions

Previous Year Questions Previous Year Questions KVS PGT Computer Science 2017 1. Which of the following most accurately describes "multiple inheritances? A. When two classes inherit from each other. B. When a child class has

More information

Syllabus for the Trade of COMPUTER OPERATOR AND PROGRAMMING ASSISTANT Under Craftsmen training Scheme. Week No. Trade Practical Trade Theory

Syllabus for the Trade of COMPUTER OPERATOR AND PROGRAMMING ASSISTANT Under Craftsmen training Scheme. Week No. Trade Practical Trade Theory Job Roles: After completion of the course the trainees shall be qualified for one or more of the following job roles: 1. Office Automation. 2. Smart Accounting. 3. Web design and maintenance. 4. Computer

More information

5. (a) What is secondary storage? How does it differ from a primary storage? (b) Explain the functions of (i) cache memory (ii) Register

5. (a) What is secondary storage? How does it differ from a primary storage? (b) Explain the functions of (i) cache memory (ii) Register General Concepts 1. (a) What are combinational circuits? (b) Perform the following: (i) Convert (0.5625) 10 = ( ) 2 (ii) (010010) 2 (100011) 2 = ( ) 2 2. (a) Using truth table prove that A B= A+ B (b)

More information

KENDRIYA VIDYALAYA SANGATHAN. Regional Office Delhi Split-up Syllabus Session Subject:-Computer Science Subject Code:-083

KENDRIYA VIDYALAYA SANGATHAN. Regional Office Delhi Split-up Syllabus Session Subject:-Computer Science Subject Code:-083 KENDRIYA VIDYALAYA SANGATHAN Regional Office Delhi Split-up Syllabus Session-2017-18 Subject:-Computer Science Subject Code:-083 COMPUTER SCIENCE (083)-Theory CLASS XII Unit wise Weightage of Marks Duration:3

More information

CTS2134 Introduction to Networking. Module 09: Network Management

CTS2134 Introduction to Networking. Module 09: Network Management CTS2134 Introduction to Networking Module 09: Network Management Documentation Facts Good documentation: Ensures that users can find the information they need when making decisions or troubleshooting problems

More information

Network Architecture Models

Network Architecture Models School of Business Eastern Illinois University Network Architecture Models (September 8, 2009) Abdou Illia, Fall 2009 Learning Objectives 2 Discuss the OSI reference Model Discuss the Internet Model Compare

More information

OSI Model. Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK

OSI Model. Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK OSI Model Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK What is OSI Model? Open Systems Interconnection Reference Model Developed in 1984 by the International Standards

More information

Chapter 4 The Internet

Chapter 4 The Internet Chapter 4 The Internet Dr. Farzana Rahman Assistant Professor Department of Computer Science James Madison University Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3

More information

B.Sc. (Hons.) Computer Science with Network Security B.Eng. (Hons) Telecommunications B.Sc. (Hons) Business Information Systems

B.Sc. (Hons.) Computer Science with Network Security B.Eng. (Hons) Telecommunications B.Sc. (Hons) Business Information Systems B.Sc. (Hons.) Computer Science with Network Security B.Eng. (Hons) Telecommunications B.Sc. (Hons) Business Information Systems Bridge BTEL/PT BCNS/14/FT BIS/14/FT BTEL/14/FT Examinations for 2014-2015

More information

M.C.A. DEGREE EXAMINATION, DEC First Year. Time : 03 Hours Maximum Marks : 75

M.C.A. DEGREE EXAMINATION, DEC First Year. Time : 03 Hours Maximum Marks : 75 (DMCA 101) M.C.A. DEGREE EXAMINATION, DEC. - 2012 First Year Paper - I : INFORMATION TECHNOLOGY Time : 03 Hours Maximum Marks : 75 Section - A Answer any Three of the following (3 15 = 45) 1) Define the

More information

Module 2 Overview of Computer Networks

Module 2 Overview of Computer Networks Module 2 Overview of Computer Networks Networks and Communication Give me names of all employees Who earn more than $00,000 ISP intranet backbone satellite link desktop computer: server: network link:

More information

Module 2 Overview of. Computer Networks

Module 2 Overview of. Computer Networks Module Overview of Networks and Communication Give me names of all employees Who earn more than $00,000 ISP intranet backbone satellite link desktop computer: server: network link: CS454/654 - Issues How

More information

Lecture 3 Protocol Stacks and Layering

Lecture 3 Protocol Stacks and Layering Lecture 3 Protocol Stacks and ing Hui Zhang School of Computer Science Carnegie Mellon University 15-441 Networking, Fall 2007 http://www.cs.cmu.edu/~srini/15-441/f07/ 1 What is a Communication Network?

More information

QUESTION BANK ENGINEERS ACADEMY. Computer Networks Computer Network Basics Segentation is done in. 12. Session layer is used for

QUESTION BANK ENGINEERS ACADEMY. Computer Networks Computer Network Basics Segentation is done in. 12. Session layer is used for Computer Networks Computer Network Basics 1 QUESTION BANK 1. Segentation is done in (a) transport layer (c) data link layer 2. Network layer activities are: (d) physical layer (a) logical addressing (b)

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

Defining Networks with the OSI Model. Module 2

Defining Networks with the OSI Model. Module 2 Defining Networks with the OSI Model Module 2 Objectives Skills Concepts Objective Domain Description Objective Domain Number Understanding OSI Basics Defining the Communications Subnetwork Defining the

More information

Erasable Programmable Read-Only Memory (EPROM) Electrically Erasable Programmable Read-Only Memory (EEPROM) CMOS 2.2.

Erasable Programmable Read-Only Memory (EPROM) Electrically Erasable Programmable Read-Only Memory (EEPROM) CMOS 2.2. Day - 1 1. INTRODUCTION 1.1 What is Security? 1.2 What is Cyber Security? 1.3 What is Information Security? 1.4 What are the Layers of Security? 1.5 What are the Classification of Security? 1.6 What are

More information

ก ก Information Technology II

ก ก Information Technology II ก ก 202103 Information Technology II ก ก ก ก ก (LAN), ก LAN, ก ก (LAN) ก ก ก LAN ก LAN ก LAN Topology Bus LAN Star LAN Ring LAN Wireless LAN Wireless LAN Wireless ก (LAN) ก ก ก LAN ก LAN WAN ก Random Access

More information

Data about data is database Select correct option: True False Partially True None of the Above

Data about data is database Select correct option: True False Partially True None of the Above Within a table, each primary key value. is a minimal super key is always the first field in each table must be numeric must be unique Foreign Key is A field in a table that matches a key field in another

More information

SPLIT-UP SYLLABUS ----CHENNAI REGION COMPUTER SCIENCE (Code: 083) Class-XII Academic Session

SPLIT-UP SYLLABUS ----CHENNAI REGION COMPUTER SCIENCE (Code: 083) Class-XII Academic Session SPLIT-UP SYLLABUS ----CHENNAI REGION COMPUTER SCIENCE (Code: 083) Class-XII Academic Session 2008-09 Sr.No. Duration Number of Working Days From To Topic to be Covered Nos. of Periods required CAL/TAL

More information

Computer Networks. Dr. Abdel Ilah ALshbatat Dept. of Communication and Computer Engineering Faculty of Engineering Tafila Technical University

Computer Networks. Dr. Abdel Ilah ALshbatat Dept. of Communication and Computer Engineering Faculty of Engineering Tafila Technical University Computer Networks Dr. Abdel Ilah ALshbatat Dept. of Communication and Computer Engineering Faculty of Engineering Tafila Technical University 1 Lecture 0 Course Information Title: Computer Networks 2 Course

More information

Computer Communication & Networks / Data Communication & Computer Networks Week # 03

Computer Communication & Networks / Data Communication & Computer Networks Week # 03 Computer Communication & Networks / Data Communication & Computer Networks Week # 03 M.Nadeem Akhtar CS & IT Department The University of Lahore Email: nadeem.akhtar@cs.uol.edu.pk URL-https://sites.google.com/site/nadeemuolcsccn/home

More information

KENDRIYA VIDYALAYA SANGATHAN

KENDRIYA VIDYALAYA SANGATHAN KENDRIYA VIDYALAYA SANGATHAN JAMMU REGION Winter Stations CLASS: XII SESSION: 2016-17 SPLIT-UP SYLLABUS Computer Science MONTH PORTION TO BE COVERED THEORY PRACTICAL April May-June 2016 UNIT-1 REVIEW:

More information

Hands-On TCP/IP Networking

Hands-On TCP/IP Networking Hands-On Course Description In this Hands-On TCP/IP course, the student will work on a live TCP/IP network, reinforcing the discussed subject material. TCP/IP is the communications protocol suite on which

More information

Introduction... xiii Chapter 1: Introduction to Computer Networks and Internet Computer Networks Uses of Computer Networks...

Introduction... xiii Chapter 1: Introduction to Computer Networks and Internet Computer Networks Uses of Computer Networks... Table of Contents Introduction... xiii Chapter 1: Introduction to Computer Networks and Internet... 1 1.1 Computer Networks... 1 1.1.1 Advantages of Computer Networks... 2 1.1.2 Disadvantages of Computer

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

IT JARGON BUSTERS NETWORKING TERMS

IT JARGON BUSTERS NETWORKING TERMS IT JARGON BUSTERS NETWORKING TERMS WAN Wide Area The WAN is associated with connections over a large area. In most circumstances this is referred to as the Internet connection you will have at home or

More information

Lecture-4. TCP/IP-Overview:

Lecture-4. TCP/IP-Overview: Lecture-4 TCP/IP-Overview: The history goes back to ARPANET a research network sponsored by DoD US Govt. It eventually connected hundreds of universities and govt installations, using leased telephone

More information

CHAPTER 18 INTERNET PROTOCOLS ANSWERS TO QUESTIONS

CHAPTER 18 INTERNET PROTOCOLS ANSWERS TO QUESTIONS CHAPTER 18 INTERNET PROTOCOLS ANSWERS TO QUESTIONS 18.1 (1) The communications network may only accept blocks of data up to a certain size. (2) Error control may be more efficient with a smaller PDU size.

More information

Technology in Action

Technology in Action Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses 1 Peer-to-Peer Networks Nodes communicate with each other Peers Share peripheral

More information

INFORMATION TECHNOLOGY COURSE OBJECTIVE AND OUTCOME

INFORMATION TECHNOLOGY COURSE OBJECTIVE AND OUTCOME INFORMATION TECHNOLOGY COURSE OBJECTIVE AND OUTCOME CO-1 Programming fundamental using C The purpose of this course is to introduce to students to the field of programming using C language. The students

More information

CS1302-COMPUTER NETWORKS UNIT I -DATA COMMUNICATION PART A

CS1302-COMPUTER NETWORKS UNIT I -DATA COMMUNICATION PART A SHRI ANGALAMMAN COLLEGE OF ENGINEERING & TECHNOLOGY (An ISO 9001:2008 Certified Institution) SIRUGANOOR,TRICHY-621105. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CS1302-COMPUTER NETWORKS Year/Sem:

More information

Objectives. Connecting with Computer Science 2

Objectives. Connecting with Computer Science 2 Objectives Learn what the Internet really is Become familiar with the architecture of the Internet Become familiar with Internet-related protocols Understand how the TCP/IP protocols relate to the Internet

More information

Peer entities. Protocol Layering. Protocols. Example

Peer entities. Protocol Layering. Protocols. Example Peer entities Protocol Layering An Engineering Approach to Computer Networking Customer A and B are peers Postal worker A and B are peers Protocols A protocol is a set of rules and formats that govern

More information

COMPUTER TECHNIQUE. ( Vocational Stream ) Paper : V. ( Computer Network ) ( Theory )

COMPUTER TECHNIQUE. ( Vocational Stream ) Paper : V. ( Computer Network ) ( Theory ) Total No. of Printed Pages 12 HS/XII/V/CT/Paper V/14 2 0 1 4 COMPUTER TECHNIQUE ( Vocational Stream ) Paper : V ( Computer Network ) ( Theory ) Full Marks : 100 Time : 3 hours The figures in the margin

More information

The Bhopal School of Social Sciences, Bhopal

The Bhopal School of Social Sciences, Bhopal Marking scheme for M.Sc. (Computer Science) II Sem. Semester II Paper Title of the paper Theory CCE Total I Data Structure & Algorithms 70 30 100 II Operating System 70 30 100 III Computer Networks with

More information

1 Adda247 No. 1 APP for Banking & SSC Preparation Website:store.adda247.com

1 Adda247 No. 1 APP for Banking & SSC Preparation Website:store.adda247.com 1 Adda247 No. 1 APP for Banking & SSC Preparation Q1. Transmission control protocol is: (a) connection oriented protocol (b) uses a three way handshake to establish a connection (c) receives data from

More information

Question Bank BCA-T111: Computer Fundamentals 1. What is Computer? Why is it also known as a data processor? 2. What is data processing?

Question Bank BCA-T111: Computer Fundamentals 1. What is Computer? Why is it also known as a data processor? 2. What is data processing? Question Bank BCA-T111: Computer Fundamentals 1. What is Computer? Why is it also known as a data processor? 2. What is data processing? Differenciate between data and information. Whis is more useful

More information

Dr. Babasaheb Ambedkar Open University

Dr. Babasaheb Ambedkar Open University Enrollment Number : Dr. Babasaheb Ambedkar Open University Term End Examination January - 2015 Course : BCA Numerical Code: 0065 Subject Code : BCA 301 Numerical Code: 0530 Subject : Introduction to Computer

More information

Introduction to Networking

Introduction to Networking Introduction to Networking Chapters 1 and 2 Outline Computer Network Fundamentals Defining a Network Networks Defined by Geography Networks Defined by Topology Networks Defined by Resource Location OSI

More information

Network Fundamentals. Chapter 7: Networking and Security 4. Network Fundamentals. Network Architecture

Network Fundamentals. Chapter 7: Networking and Security 4. Network Fundamentals. Network Architecture Network Fundamentals Chapter 7: Networking and Security CS10001 Computer Literacy Network Two or more computers connected by hardware or software so that they can communicate with each other Nodes Devices

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

1: Review Of Semester Provide an overview of encapsulation.

1: Review Of Semester Provide an overview of encapsulation. 1: Review Of Semester 1 1.1.1.1. Provide an overview of encapsulation. Networking evolves to support current and future applications. By dividing and organizing the networking tasks into separate layers/functions,

More information

Chapter 2 SOFTWARE CONCEPTS

Chapter 2 SOFTWARE CONCEPTS Page1 Chapter 2 SOFTWARE CONCEPTS Software Software is a program or set of programs that govern the operation of a computer system and make the hardware run. These are the components of the computer system

More information

Ethical Hacking and Prevention

Ethical Hacking and Prevention Ethical Hacking and Prevention This course is mapped to the popular Ethical Hacking and Prevention Certification Exam from US-Council. This course is meant for those professionals who are looking for comprehensive

More information

Introduction to Computer Science. William Hsu Department of Computer Science and Engineering National Taiwan Ocean University

Introduction to Computer Science. William Hsu Department of Computer Science and Engineering National Taiwan Ocean University Introduction to Computer Science William Hsu Department of Computer Science and Engineering National Taiwan Ocean University Chapter 4: Networking and the Internet No one owns the Internet, and only one

More information

2c. Content of Computer systems (Component 01)

2c. Content of Computer systems (Component 01) c. Content of Computer systems (Component 01) This component will introduce learners to the internal workings of the Central Processing Unit (CPU), the exchange of data and will also look at software development,

More information

Chapter 2 Network Models 2.1

Chapter 2 Network Models 2.1 Chapter 2 Network Models 2.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 2-1 LAYERED TASKS We use the concept of layers in our daily life. As an example,

More information

KENDRIYA VIDYALAYA SANGATHAN

KENDRIYA VIDYALAYA SANGATHAN KENDRIYA VIDYALAYA SANGATHAN JAMMU REGION CLASS: XII SESSION: - 17 SPLIT-UP SYLLABUS COMPUTER SCIENCE MONTH PORTION TO BE COVERED THEORY PRACTICAL April-May UNIT-1 REVIEW: C++ covered In Class - XI, Object

More information

Since ESE GATE PSUs ELECTRICAL ENGINEERING COMPUTER FUNDAMENTALS. Volume - 1 : Study Material with Classroom Practice Questions

Since ESE GATE PSUs ELECTRICAL ENGINEERING COMPUTER FUNDAMENTALS. Volume - 1 : Study Material with Classroom Practice Questions Since 20 ESE GATE PSUs ELECTRICAL ENGINEERING COMPUTER FUNDAMENTALS Volume - : Study Material with Classroom Practice Questions Computer Fundamentals (Solutions for Classroom Practice Questions). Number

More information

Chapter 2. Switch Concepts and Configuration. Part II

Chapter 2. Switch Concepts and Configuration. Part II Chapter 2 Switch Concepts and Configuration Part II CCNA3-1 Chapter 2-2 Switch Concepts and Configuration Configuring Switch Security MAC Address Flooding Passwords Spoofing Attacks Console Security Tools

More information

Chapter 4: Networking and the Internet

Chapter 4: Networking and the Internet Chapter 4: Networking and the Internet 2015 Pearson Education Limited 2015 Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World Wide Web 4.4 Internet Protocols

More information

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Network Models The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding and developing computer-to-computer communication

More information

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based s 1 Need For Protocol Architecture data exchange can involve complex procedures better if task broken into subtasks

More information

STUDY NOTES UNIT 1 - INTRODUCTION TO OBJECT ORIENTED PROGRAMMING

STUDY NOTES UNIT 1 - INTRODUCTION TO OBJECT ORIENTED PROGRAMMING OBJECT ORIENTED PROGRAMMING STUDY NOTES UNIT 1 - INTRODUCTION TO OBJECT ORIENTED PROGRAMMING 1. Object Oriented Programming Paradigms 2. Comparison of Programming Paradigms 3. Basic Object Oriented Programming

More information

CompTIA Network+ Course

CompTIA Network+ Course CompTIA Network+ Course Duration: 5 Days Course Delivery: Classroom Language: English Target Audience Comprehensive approach to both preparing a student for CompTIA's Network+ exam and developing proficiency

More information

Data Communication & Computer Networks MCQ S

Data Communication & Computer Networks MCQ S Data Communication & Computer Networks MCQ S 1. The translates internet domain and host names to IP address. a) domain name system b) routing information protocol c) network time protocol d) internet relay

More information

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure

More information

Networks Hardware Components

Networks Hardware Components Lec. 5 Networks Hardware Components Dr. Eng. Samy Elmokadem Chapter 8 10/12/2017 1 internetworking devices used in backbone networks After studying this Chapter you should: Know which internetworking devices

More information

Chapter 4: Networking and the Internet. Figure 4.1 Network topologies. Network Classifications. Protocols. (continued)

Chapter 4: Networking and the Internet. Figure 4.1 Network topologies. Network Classifications. Protocols. (continued) Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World

More information

Chapter 4: Networking and the Internet

Chapter 4: Networking and the Internet Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Copyright 2012 Pearson Education, Inc. Chapter 4: Networking and the Internet 4.1 Network Fundamentals

More information

BRA BIHAR UNIVERSITY, MUZAFFARPUR DIRECTORATE OF DISTANCE EDUCATION

BRA BIHAR UNIVERSITY, MUZAFFARPUR DIRECTORATE OF DISTANCE EDUCATION BSCIT/3 RD /BIT13-OOPS with Java Q. 1. What do you mean by Java Virtual Machine? Q. 2. Define Bytecode. Write different features of Java. Q. 3. How do you compile and execute a Java program? Q. 4. Discuss

More information

Internetwork Basic. Possible causes of LAN traffic congestion are

Internetwork Basic. Possible causes of LAN traffic congestion are Internetworking 1 C H A P T E R 2 Internetworking Basics Internetworking Model The OSI Reference Model Ethernet Networking Wireless Networking Data Encapsulation Topic 3 1 Internetwork Basic 4 Possible

More information

Introduction to TCP/IP

Introduction to TCP/IP Introduction to TCP/IP Properties and characteristics of TCP/IP IPv4 IPv6 Public vs private vs APIPA/link local Static vs dynamic Client-side DNS settings Client-side DHCP Subnet mask vs CIDR Gateway TCP/IP

More information

Darshan Institute of Engineering & Technology for Diploma Studies

Darshan Institute of Engineering & Technology for Diploma Studies 1. Explain different network devices in detail. Or Explain NIC (Network Interface Card) in detail. Network interface cards are add on cards as hardware cards on the motherboard. This is additional hardware

More information

Area Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low

Area Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low Chapter 15 Networking Concepts 1. Define networking. It is the interconnection of independent computing devices for sharing of information over shared medium. 2. What is the need for networking? / What

More information

ADMINISTRATIVE MANAGEMENT COLLEGE

ADMINISTRATIVE MANAGEMENT COLLEGE First Semester ADMINISTRATIVE MANAGEMENT COLLEGE BACHELOR OF COMPUTER APPLICATION COURSE OUTCOME (CO) Problem solving techniques Using C CO 1: Understand the basic concepts of programming, software and

More information

Motivation For Networking. Information access Interaction among cooperative application programs Resource sharing

Motivation For Networking. Information access Interaction among cooperative application programs Resource sharing Motivation For Networking Information access Interaction among cooperative application programs Resource sharing CS422 -- PART 1 13 2003 Practical Results E-mail File transfer/access Web browsing Remote

More information

Next Steps Spring 2011 Lecture #18. Multi-hop Networks. Network Reliability. Have: digital point-to-point. Want: many interconnected points

Next Steps Spring 2011 Lecture #18. Multi-hop Networks. Network Reliability. Have: digital point-to-point. Want: many interconnected points Next Steps Have: digital point-to-point We ve worked on link signaling, reliability, sharing Want: many interconnected points 6.02 Spring 2011 Lecture #18 multi-hop networks: design criteria network topologies

More information

Chapter 11: Networks

Chapter 11: Networks Chapter 11: Networks Devices in a Small Network Small Network A small network can comprise a few users, one router, one switch. A Typical Small Network Topology looks like this: Device Selection Factors

More information