1 Adda247 No. 1 APP for Banking & SSC Preparation Website:store.adda247.com
|
|
- Calvin Singleton
- 5 years ago
- Views:
Transcription
1 1 Adda247 No. 1 APP for Banking & SSC Preparation
2 Q1. When you visit certain website, spyware may be automatically downloaded. This is called: (a) Logic bomb (b) Drive-by download (c) Virus (d) Drive-in download (e) Spooling Q2. Which of the following is basically a multiport repeater? (a) Hub (b) Bridge (c) Router (d) VLAN (e) Repeater Q3. How a 3NF relation is split into 4NF? (a) By removing overlapping composite key (b) By splitting into relations which do not have more than one independent multivalued dependency (c) By removing multivalued dependency (d) By putting dependent non-key attribute in a separate table. Q4. Which of the following is not a Data Definition Language Statement? (a) Delete (b) Create (c) Drop (d) Alter (e) Truncate Q5. Which keyword must be used here to rename the field name? Select name instructor name, course id from instructor, teaches where instructor.id= teaches.id; (a) From (b) Rename (c) As (d) Join (e) Like 2 Adda247 No. 1 APP for Banking & SSC Preparation
3 Q6. What is page stealing in operating system? (a) is a sign of an efficient system (b) is taking page frames from other working sets (c) should be the tuning goal (d) is taking larger disk spaces for pages paged out Q7. What is the file extension of compiled java program? (a) (.class) (b) (.java) (c) (.css) (d) (.html) (e) (.javcc) Q8. Which one of these popular windows feature is not include in window 8? (a) Desktop (b) Office Assistant Paperclip (c) Wallpaper (d) Start Button (e) Internet Explorer Q9. Which of the following addressing mode, the operand is available in the instruction itself? (a) Direct addressing (b) Immediate addressing (c) Implied addressing (d) Indirect addressing Q10. What is linker in an operating system? (a) is the same a loader (b) is required to create a load module (c) user source code as input (d) is always used before programs are executed (e) All of the above Q11. Which HTML tag is used to make a bulleted list with numbers? (a) <dl> (b) <ol> (c) <list> (d) <ul> (e) <p> 3 Adda247 No. 1 APP for Banking & SSC Preparation
4 Q12. Which statement is used to terminate a statement sequence? (a) Break (b) Switch (c) Continue (d) Wait (e) Truncate Q13. Which type of cyber-attack involves, hackers taking control of a computer system and blocking access of its work until a certain amount of money is paid? (a) Trojan horse (b) Encryption (c) Pirated software (d) Ransomware (e) Shareware Q14. The time for the actual data transfer after receiving the request for data from secondary storage is referred to as the disk s. (a) Transfer time (b) Movement time (c) Access time (d) Data input time (e) Throughput Q15. Which technique is used to send more than one call over a single line is (a) Digital transmission (b) Infrared transmission (c) Streaming (d) Multiplexing (e) Demultiplexing Q16. Which of the following defines the syntax of a programming language? (a) Token (b) Pattern (c) Context-Free Grammar (d) Source (e) Both (a) and (b) 4 Adda247 No. 1 APP for Banking & SSC Preparation
5 Q17. What will be the result of given code? #include<stdio.h> int main() { printf(5+"not Good"); } (a) Not (b) Good (c) ood (d) Not G (e) Error Q18. What is the process of defining a method in terms of itself that is a method that calls itself? (a) Polymorphism (b) Abstraction (c) Encapsulation (d) Recursion (e) Polymorphism Q19. An assembler that runs on one machine but produces machine code for another machine is called (a) Simulator (b) Emulator (c) Cross assembler (d) Boot-strap loader (e) Programmer Q20. Which of these keywords can be used to prevent Method overriding? (a) Static (b) Constant (c) Protected (d) Final (e) Catch Q21. Which virus hides from operating system and antivirus by changing its direction? (a) Stealth (b) Macro (c) Resident (d) Logic Bomb (e) Ransomware 5 Adda247 No. 1 APP for Banking & SSC Preparation
6 Q22. Which page replacement policy sometimes leads more page faults, when size of the memory is increased? (a) FIFO (b) LRU (c) Optimal page replacement (d) No such policy exists (e) Both (b) and (c) Q23. What is thrashing? (a) Reduces page I/O (b) Decreases the degree of multiprogramming (c) Implies excessive page I/O (d) Improves the system performance (e) Useful in page replacement algorithm Q24. Which feature in Object Oriented Programming allows reusing code? (a) Polymorphism (b) Inheritance (c) Encapsulation (d) Data hiding (e) Abstraction Q25. Congestion Control is done by which layer? (a) Data link layer (b) Network layer (c) Transport layer (d) Application layer (e) Session layer Q26. Brouter works at which layer of OSI Model. (a) Network layer (b) Data link layer (c) Physical layer (d) Application layer (e) Both (a) and (b) Q27. which of the following indicated by double line in ER diagram? (a) Total participation (b) Multiple participation (c) Cardinality (d) Entity (e) Partial participation 6 Adda247 No. 1 APP for Banking & SSC Preparation
7 Q28.Which clause is used to specify condition while retrieving data from table in SQL? (a) WHERE (b) LIKE (c) HAVING (d) Group By (e) Order By Q29. Which of the following is the correct syntax of UPDATE Command? (a) UPDATE table_name where condition SET column_name = <value>; (b) UPDATE table_name SET column_name = <value> WHERE <condition>; (c) UPDATE table table_name set column_name = <value> WHERE <condition>; (d) UPDATE IN table_name WHERE condition set column_name = <value>; (e) UPDATE from table_name where condition set column_name =<value>; Q30. What is the condition of page fault in operating system? (a) the page is corrupted by application software (b) the page is in main memory (c) the page is not in main memory (d) the tries to divide a number by 0 (e) When operating system not booted properly Q31. Which of the following is used to translates internet domain and host names to IP address? (a) DNS (b) Routing Information Protocol (c) Network Time Protocol (d) Internet Relay chat (e) Router 7 Adda247 No. 1 APP for Banking & SSC Preparation
8 Q32. Which of the following error occurs when software tries to access protected memory? (a) Segmentation Fault (b) Display time Error (c) IO Error (d) Runtime Error (e) Page fault Q33. Which of the following is not proper state of transaction? (a) Partially aborted (b) Partially committed (c) Aborted (d) Committed (e) Active Q is use in which technology. (a) Wireless LAN (b) ARPANET (c) ETHERNET (d) BITNET Q35. Which of the following algorithms solves the all pair shortest path problem? (a) Diskstra s algorithm (b) Floyd s algorithm (c) Prims algorithm (d) Warshall s algorithm Q36. A switch uses which type of address of machine to transfer data? (a) MAC (b) IP (c) Header (d) a & b Q37. Which command is use for sorting the table? (a) Like (b) Distinct (c) Group By (d) Order By 8 Adda247 No. 1 APP for Banking & SSC Preparation
9 Q38. What is data integrity? (a) It is the data contained in the database that is non- redundant. (b) It is the data contained in the database that is accurate and consistent. (c) It is the data contained in the database that is secured (d) It is the data contained in the database that is shared Q39. Which tracking program records every keystroke you make on the computer? (a) Key logger (b) efollow (c) ITrack/ULead (d) Stalking software Q40. Which of the following is the smallest unit of storage in oracle database? (a) Control file (b) Datafile (c) Data Block (d) Segment Q41. If requirements are easily understandable and defined then which model is best suited? (a) Spiral model (b) Waterfall model (c) Prototyping model (d) Incremental model Q42. A server farm is an example of (a) Server clustering (b) Redundant servers (c) Multiple servers (d) Server fault tolerance Q43. Which of the following is also known as PC Program Counter. (a) Instruction pointer (b) Memory pointer (c) Data counter (d) File pointer 9 Adda247 No. 1 APP for Banking & SSC Preparation
10 Q44. Which C++ oops feature is related to re-usability? (a) Encapsulation (b) Inheritance (c) Abstraction (d) Polymorphism Q45. Which of the following is a technique of improving the priority of process waiting in Queue for CPU allocation? (a) Aging (b) Starvation (c) Revocation (d) Relocation Q46. OLAP applications are widely used by (a) RDBMS (b) JAVA (c) Data Mining Technique (d) Operating System (e) Web server Q47. Which one of the following is a cryptographic protocol used to secure HTTP connection? (a) stream control transmission protocol (SCTP) (b) transport layer security (TSL) (c) explicit congestion notification (ECN) (d) resource reservation protocol Q48. IP Address belong to (a) Class A (b) Class B (c) Class C (d) Class D (e) Class E Q49. What is the port number of Post Office Protocol (POP3)? (a) 119 (b) 23 (c) 25 (d) 110 (e) Adda247 No. 1 APP for Banking & SSC Preparation
11 Q50. Which HTTP message shows " Service Unavailable"? (a) 400 (b) 401 (c) 500 (d) 503 (e) 404 Q51. Proxy firewall sometimes known as: (a) Packet filtering firewalls (b) Circuit-level gateways (c) Stateful inspection firewalls (d) Application-level gateways (e) Next-gen firewalls Q52. Which of the following is a malicious program that enable administrator level to a computer or computer network? (a) Micro virus (b) Logic bombs (c) Rootkit (d) Spyware (e) Keyloggers Q53. What is the main protocol used to access data on WWW? (a) FTP (b) HTML (c) HTTP (d) SMTP (e) TFTP Q54. Which UNIX command allows you to move and rename files? (a) cd (b) mv (c) cp (d) rm (e) Is Q55. What is the solution to starvation in priority scheduling? (a) Raising Interrupts (b) Predicting next CPU burst (c) Aging (d) Adjusting the value of time quantum 11 Adda247 No. 1 APP for Banking & SSC Preparation
12 Q56. With SQL, how can you insert a new record into the "Persons" table? (a) INSERT ('Swati', 'Purohit') INTO Persons (b) INSERT VALUES ('Swati', 'Purohit') INTO Persons (c) INSERT INTO Persons VALUES ('Swati', 'Purohit') (d) INSERT ( Swati, Purohit ) VALUES INTO Person (e) INSERT ( Swati, Purohit ) IN Person Q57. Which of the following operation is used if we are interested in only certain columns of a table? (a) PROJECTION (b) SELECTION (c) UNION (d) JOIN (e) FROM Q58. Which cloud computing service provided by Microsoft? (a) Azure (b) Elastic (c) Smart (d) Grid (e) Web service Q59. SRS in software engineering stand for: (a) System recourses Specification (b) System Recursive specification (c) System requirement specification (d) Software requirement specification Q60. Which level of database architecture is representing total view of database? (a) Conceptual view (b) Internal view (c) External view (d) Physical view (e) Relational View 12 Adda247 No. 1 APP for Banking & SSC Preparation
13 13 Adda247 No. 1 APP for Banking & SSC Preparation
IBPS SO Examination 2013 IT Officer Professional Knowledge Question Paper
IBPS SO Examination 2013 IT Officer Professional Knowledge Question Paper 1. The tracks on a disk which can be accused without repositioning the R/W heads is (A) Surface (B) Cylinder (C) Cluster 2. Which
More informationCOMPUTER MCQs. 1. DOS floppy disk does not have 1) a boot record 2) a file allocation table 3) a root directory
COMPUTER MCQs 1. DOS floppy disk does not have 1) a boot record 2) a file allocation table 3) a root directory 4)virtual memory 5) None of the above 2. The component is used by the data analyst to create
More information1 Adda247 No. 1 APP for Banking & SSC Preparation Website: bankersadda.com sscadda.com store.adda247.com
1 Adda247 No. 1 APP for Banking & SSC Preparation Q1. Which TCP/IP transport layer protocol is faster? (a) ICMP-because it is connection-oriented (b) TCP-because it is connected-oriented (c) UDP-because
More informationIdentify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)
Course Outline Network+ Duration: 5 days (30 hours) Learning Objectives: Install and configure a network card Define the concepts of network layers Understand and implement the TCP/IP protocol Install
More informationSyllabus for Computer Science General Part I
Distribution of Questions: Part I Q1. (Compulsory: 20 marks). Any ten questions to be answered out of fifteen questions, each carrying two marks (Group A 3 questions, Group B, Group C and Group D 4 questions
More informationB. the address of the data is supplied by the users C. there is no need for an address i.e. the data is used as an address
1. The part of machine level instruction, which tells the central processor what has to be done, is A. Operation code B. Address C. Locator D. Flip-Flop 2. Which of the following refers to the associative
More informationCIS 21 Final Study Guide. Final covers ch. 1-20, except for 17. Need to know:
CIS 21 Final Study Guide Final covers ch. 1-20, except for 17. Need to know: I. Amdahl's Law II. Moore s Law III. Processes and Threading A. What is a process? B. What is a thread? C. Modes (kernel mode,
More informationCopyleft 2005, Binnur Kurt. Objectives
1 ing Fundamentals Copyleft 2005, Binnur Kurt Objectives Define basic networking terms Describe some commonly used network applications Describe the main purposes and functions of computer networking Describe
More informationCisco Cisco Certified Network Associate (CCNA)
Cisco 200-125 Cisco Certified Network Associate (CCNA) http://killexams.com/pass4sure/exam-detail/200-125 Question: 769 Refer to exhibit: Which destination addresses will be used by Host A to send data
More informationQUESTION BANK EVEN SEMESTER
Fatima Michael College of Engineering and Technology DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING QUESTION BANK EVEN SEMESTER SUB CODE & NAME: EC2352 COMPUTER NETWORKS YEAR / SEM: III / VI Staff
More informationCHEME OF EXAMINATION FOR B.Sc. (COMPUTER SCIENCE) SEMESTER SYSTEM (Regular Course) w.e.f Scheme for B.Sc.-III.
CHEME OF EXAMINATION FOR B.Sc. (COMPUTER SCIENCE) SEMESTER SYSTEM (Regular Course) w.e.f. 2015-16 Scheme for B.Sc.-III Semester-V Sr. No. Paper Internal Assessment External Marks Exam Duration 1 Paper-I
More informationAssignment - 1 Chap. 1 Wired LAN s
Assignment - 1 Chap. 1 Wired LAN s 1. (1 Mark) 1. Draw the frame format of Ethernet. 2. What is unicast, multicast and broadcast address? 3. State the purpose of CRC field. 2. (5 Marks) 1. Explain how
More informationIntroduction to Networks
Introduction to Networks Khaled Harras School of Computer Science Carnegie Mellon University 15-349 Computer and Network Security Fall 2012 Some material borrowed from Hui Zhang and Adrian Perrig 1 Early
More informationSLO Presentation. Cerritos College. CIS Date: 09/13/2018
CIS Date: 09/13/2018 SCIENCE, ENGINEERING & MATH CIS CIS--Transfer Student apply principles of physics to solve a variety of programming problems. Students describe the role of assembly language programming
More informationQUESTION BANK UNIT-I
DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK Subject Code: CS1302 Subject Name: Computer Networks Year/ Sem: III / V UNIT-I 1. What is multicast? What is the difference between unicast and multicast?
More information5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A
5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI 635 854. NAME OF THE STAFF : R.ANBARASAN DESIGNATION & DEPARTMENT : AP/CSE SUBJECT CODE : CS 6551 SUBJECT NAME : COMPUTER NETWORKS UNIT I FUNDAMENTALS
More informationChapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks.
Chapter 4: Networking and the 4.1 Network Fundamentals 4.2 The 4.3 The World Wide Web 4.4 Protocols 4.5 Security Network Classifications Scope Local area network (LAN) Metropolitan area (MAN) Wide area
More informationWired internetworking devices. Unit objectives Differentiate between basic internetworking devices Identify specialized internetworking devices
Wired internetworking devices Unit objectives Differentiate between basic internetworking devices Identify specialized internetworking devices Topic A Topic A: Basic internetworking devices Topic B: Specialized
More informationNetworks Fall This exam consists of 10 problems on the following 13 pages.
CSCI 466 Final Networks Fall 2011 Name: This exam consists of 10 problems on the following 13 pages. You may use your two- sided hand- written 8 ½ x 11 note sheet during the exam and a calculator. No other
More informationCS3600 SYSTEMS AND NETWORKS
CS3600 SYSTEMS AND NETWORKS NORTHEASTERN UNIVERSITY Lecture 17: Internet architecture Prof. Alan Mislove (amislove@ccs.neu.edu) Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion
More informationKINGS COLLEGE OF ENGINEERING
KINGS COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY ACADEMIC YEAR 2011-2012 / ODD SEMESTER QUESTION BANK SUB.CODE / NAME YEAR / SEM : CS1302 COMPUTER NETWORKS : III / V UNIT I DATA COMMUNICATION
More information1. What is a network protocol and why are protocols needed when two machines communicate? 2 marks
Topic1: Common Network Protocols 1. What is a network protocol and why are protocols needed when two machines communicate? 2. Describe the function of each of the following protocols: a. SMTP b. HTTP c.
More informationChapter 11: It s a Network. Introduction to Networking
Chapter 11: It s a Network Introduction to Networking Small Network Topologies Typical Small Network Topology IT Essentials v5.0 2 Device Selection for a Small Network Factors to be considered when selecting
More informationDepartment Curriculum and Assessment Outline
Department: Computing Year Group: 7 Teaching, learning and assessment during the course: (Weeks, half terms) Think like a computer scientist Shapes, patterns, algorithms and animation Understand the web.
More informationThis tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples.
About the Tutorial Internet Protocol version 4 (IPv4) is the fourth version in the development of the Internet Protocol (IP) and the first version of the protocol to be widely deployed. IPv4 is described
More information1 Adda247 No. 1 APP for Banking & SSC Preparation Website: bankersadda.com sscadda.com store.adda247.com
1 Adda247 No. 1 APP for Banking & SSC Preparation Solutions S1. Ans.(c) Sol. UDP is faster because it is connectionless and need not wait for connection setup and acknowledgement. S2. Ans.(c) Sol. presentation
More informationName of the Assistant/ Associate Professor:Annu Saini Class and Section:BCA 1 st sem Subject:Computer and Programming Fundamentals July 2018
Class and Section:BCA 1 st sem Subject:Computer and Programming Fundamentals July 2018 Ist week Day 1 IInd week Day 1 3rd week Day 1 Introduction to computers Definition and characteristics of computer
More informationSQL Interview Questions
SQL Interview Questions SQL stands for Structured Query Language. It is used as a programming language for querying Relational Database Management Systems. In this tutorial, we shall go through the basic
More informationSESSION M12-S12 INTERNAL ASSIGNMENT
MASTER OF COMPUTER APPLICATIONS RELATIONAL DATABASE MENAGEMENT SYSTEM PAPER CODE: MCA-401 SECTION-A Answer the following questions in around 100 words. 1. What are the differences between simple and composite
More informationPrevious Year Questions
Previous Year Questions KVS PGT Computer Science 2017 1. Which of the following most accurately describes "multiple inheritances? A. When two classes inherit from each other. B. When a child class has
More informationSyllabus for the Trade of COMPUTER OPERATOR AND PROGRAMMING ASSISTANT Under Craftsmen training Scheme. Week No. Trade Practical Trade Theory
Job Roles: After completion of the course the trainees shall be qualified for one or more of the following job roles: 1. Office Automation. 2. Smart Accounting. 3. Web design and maintenance. 4. Computer
More information5. (a) What is secondary storage? How does it differ from a primary storage? (b) Explain the functions of (i) cache memory (ii) Register
General Concepts 1. (a) What are combinational circuits? (b) Perform the following: (i) Convert (0.5625) 10 = ( ) 2 (ii) (010010) 2 (100011) 2 = ( ) 2 2. (a) Using truth table prove that A B= A+ B (b)
More informationKENDRIYA VIDYALAYA SANGATHAN. Regional Office Delhi Split-up Syllabus Session Subject:-Computer Science Subject Code:-083
KENDRIYA VIDYALAYA SANGATHAN Regional Office Delhi Split-up Syllabus Session-2017-18 Subject:-Computer Science Subject Code:-083 COMPUTER SCIENCE (083)-Theory CLASS XII Unit wise Weightage of Marks Duration:3
More informationCTS2134 Introduction to Networking. Module 09: Network Management
CTS2134 Introduction to Networking Module 09: Network Management Documentation Facts Good documentation: Ensures that users can find the information they need when making decisions or troubleshooting problems
More informationNetwork Architecture Models
School of Business Eastern Illinois University Network Architecture Models (September 8, 2009) Abdou Illia, Fall 2009 Learning Objectives 2 Discuss the OSI reference Model Discuss the Internet Model Compare
More informationOSI Model. Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK
OSI Model Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK What is OSI Model? Open Systems Interconnection Reference Model Developed in 1984 by the International Standards
More informationChapter 4 The Internet
Chapter 4 The Internet Dr. Farzana Rahman Assistant Professor Department of Computer Science James Madison University Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3
More informationB.Sc. (Hons.) Computer Science with Network Security B.Eng. (Hons) Telecommunications B.Sc. (Hons) Business Information Systems
B.Sc. (Hons.) Computer Science with Network Security B.Eng. (Hons) Telecommunications B.Sc. (Hons) Business Information Systems Bridge BTEL/PT BCNS/14/FT BIS/14/FT BTEL/14/FT Examinations for 2014-2015
More informationM.C.A. DEGREE EXAMINATION, DEC First Year. Time : 03 Hours Maximum Marks : 75
(DMCA 101) M.C.A. DEGREE EXAMINATION, DEC. - 2012 First Year Paper - I : INFORMATION TECHNOLOGY Time : 03 Hours Maximum Marks : 75 Section - A Answer any Three of the following (3 15 = 45) 1) Define the
More informationModule 2 Overview of Computer Networks
Module 2 Overview of Computer Networks Networks and Communication Give me names of all employees Who earn more than $00,000 ISP intranet backbone satellite link desktop computer: server: network link:
More informationModule 2 Overview of. Computer Networks
Module Overview of Networks and Communication Give me names of all employees Who earn more than $00,000 ISP intranet backbone satellite link desktop computer: server: network link: CS454/654 - Issues How
More informationLecture 3 Protocol Stacks and Layering
Lecture 3 Protocol Stacks and ing Hui Zhang School of Computer Science Carnegie Mellon University 15-441 Networking, Fall 2007 http://www.cs.cmu.edu/~srini/15-441/f07/ 1 What is a Communication Network?
More informationQUESTION BANK ENGINEERS ACADEMY. Computer Networks Computer Network Basics Segentation is done in. 12. Session layer is used for
Computer Networks Computer Network Basics 1 QUESTION BANK 1. Segentation is done in (a) transport layer (c) data link layer 2. Network layer activities are: (d) physical layer (a) logical addressing (b)
More informationNeed For Protocol Architecture
Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared
More informationNeed For Protocol Architecture
Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared
More informationDefining Networks with the OSI Model. Module 2
Defining Networks with the OSI Model Module 2 Objectives Skills Concepts Objective Domain Description Objective Domain Number Understanding OSI Basics Defining the Communications Subnetwork Defining the
More informationErasable Programmable Read-Only Memory (EPROM) Electrically Erasable Programmable Read-Only Memory (EEPROM) CMOS 2.2.
Day - 1 1. INTRODUCTION 1.1 What is Security? 1.2 What is Cyber Security? 1.3 What is Information Security? 1.4 What are the Layers of Security? 1.5 What are the Classification of Security? 1.6 What are
More informationก ก Information Technology II
ก ก 202103 Information Technology II ก ก ก ก ก (LAN), ก LAN, ก ก (LAN) ก ก ก LAN ก LAN ก LAN Topology Bus LAN Star LAN Ring LAN Wireless LAN Wireless LAN Wireless ก (LAN) ก ก ก LAN ก LAN WAN ก Random Access
More informationData about data is database Select correct option: True False Partially True None of the Above
Within a table, each primary key value. is a minimal super key is always the first field in each table must be numeric must be unique Foreign Key is A field in a table that matches a key field in another
More informationSPLIT-UP SYLLABUS ----CHENNAI REGION COMPUTER SCIENCE (Code: 083) Class-XII Academic Session
SPLIT-UP SYLLABUS ----CHENNAI REGION COMPUTER SCIENCE (Code: 083) Class-XII Academic Session 2008-09 Sr.No. Duration Number of Working Days From To Topic to be Covered Nos. of Periods required CAL/TAL
More informationComputer Networks. Dr. Abdel Ilah ALshbatat Dept. of Communication and Computer Engineering Faculty of Engineering Tafila Technical University
Computer Networks Dr. Abdel Ilah ALshbatat Dept. of Communication and Computer Engineering Faculty of Engineering Tafila Technical University 1 Lecture 0 Course Information Title: Computer Networks 2 Course
More informationComputer Communication & Networks / Data Communication & Computer Networks Week # 03
Computer Communication & Networks / Data Communication & Computer Networks Week # 03 M.Nadeem Akhtar CS & IT Department The University of Lahore Email: nadeem.akhtar@cs.uol.edu.pk URL-https://sites.google.com/site/nadeemuolcsccn/home
More informationKENDRIYA VIDYALAYA SANGATHAN
KENDRIYA VIDYALAYA SANGATHAN JAMMU REGION Winter Stations CLASS: XII SESSION: 2016-17 SPLIT-UP SYLLABUS Computer Science MONTH PORTION TO BE COVERED THEORY PRACTICAL April May-June 2016 UNIT-1 REVIEW:
More informationHands-On TCP/IP Networking
Hands-On Course Description In this Hands-On TCP/IP course, the student will work on a live TCP/IP network, reinforcing the discussed subject material. TCP/IP is the communications protocol suite on which
More informationIntroduction... xiii Chapter 1: Introduction to Computer Networks and Internet Computer Networks Uses of Computer Networks...
Table of Contents Introduction... xiii Chapter 1: Introduction to Computer Networks and Internet... 1 1.1 Computer Networks... 1 1.1.1 Advantages of Computer Networks... 2 1.1.2 Disadvantages of Computer
More informationNetworking interview questions
Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected
More informationIT JARGON BUSTERS NETWORKING TERMS
IT JARGON BUSTERS NETWORKING TERMS WAN Wide Area The WAN is associated with connections over a large area. In most circumstances this is referred to as the Internet connection you will have at home or
More informationLecture-4. TCP/IP-Overview:
Lecture-4 TCP/IP-Overview: The history goes back to ARPANET a research network sponsored by DoD US Govt. It eventually connected hundreds of universities and govt installations, using leased telephone
More informationCHAPTER 18 INTERNET PROTOCOLS ANSWERS TO QUESTIONS
CHAPTER 18 INTERNET PROTOCOLS ANSWERS TO QUESTIONS 18.1 (1) The communications network may only accept blocks of data up to a certain size. (2) Error control may be more efficient with a smaller PDU size.
More informationTechnology in Action
Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses 1 Peer-to-Peer Networks Nodes communicate with each other Peers Share peripheral
More informationINFORMATION TECHNOLOGY COURSE OBJECTIVE AND OUTCOME
INFORMATION TECHNOLOGY COURSE OBJECTIVE AND OUTCOME CO-1 Programming fundamental using C The purpose of this course is to introduce to students to the field of programming using C language. The students
More informationCS1302-COMPUTER NETWORKS UNIT I -DATA COMMUNICATION PART A
SHRI ANGALAMMAN COLLEGE OF ENGINEERING & TECHNOLOGY (An ISO 9001:2008 Certified Institution) SIRUGANOOR,TRICHY-621105. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CS1302-COMPUTER NETWORKS Year/Sem:
More informationObjectives. Connecting with Computer Science 2
Objectives Learn what the Internet really is Become familiar with the architecture of the Internet Become familiar with Internet-related protocols Understand how the TCP/IP protocols relate to the Internet
More informationPeer entities. Protocol Layering. Protocols. Example
Peer entities Protocol Layering An Engineering Approach to Computer Networking Customer A and B are peers Postal worker A and B are peers Protocols A protocol is a set of rules and formats that govern
More informationCOMPUTER TECHNIQUE. ( Vocational Stream ) Paper : V. ( Computer Network ) ( Theory )
Total No. of Printed Pages 12 HS/XII/V/CT/Paper V/14 2 0 1 4 COMPUTER TECHNIQUE ( Vocational Stream ) Paper : V ( Computer Network ) ( Theory ) Full Marks : 100 Time : 3 hours The figures in the margin
More informationThe Bhopal School of Social Sciences, Bhopal
Marking scheme for M.Sc. (Computer Science) II Sem. Semester II Paper Title of the paper Theory CCE Total I Data Structure & Algorithms 70 30 100 II Operating System 70 30 100 III Computer Networks with
More information1 Adda247 No. 1 APP for Banking & SSC Preparation Website:store.adda247.com
1 Adda247 No. 1 APP for Banking & SSC Preparation Q1. Transmission control protocol is: (a) connection oriented protocol (b) uses a three way handshake to establish a connection (c) receives data from
More informationQuestion Bank BCA-T111: Computer Fundamentals 1. What is Computer? Why is it also known as a data processor? 2. What is data processing?
Question Bank BCA-T111: Computer Fundamentals 1. What is Computer? Why is it also known as a data processor? 2. What is data processing? Differenciate between data and information. Whis is more useful
More informationDr. Babasaheb Ambedkar Open University
Enrollment Number : Dr. Babasaheb Ambedkar Open University Term End Examination January - 2015 Course : BCA Numerical Code: 0065 Subject Code : BCA 301 Numerical Code: 0530 Subject : Introduction to Computer
More informationIntroduction to Networking
Introduction to Networking Chapters 1 and 2 Outline Computer Network Fundamentals Defining a Network Networks Defined by Geography Networks Defined by Topology Networks Defined by Resource Location OSI
More informationNetwork Fundamentals. Chapter 7: Networking and Security 4. Network Fundamentals. Network Architecture
Network Fundamentals Chapter 7: Networking and Security CS10001 Computer Literacy Network Two or more computers connected by hardware or software so that they can communicate with each other Nodes Devices
More informationChapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet
Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties
More information1: Review Of Semester Provide an overview of encapsulation.
1: Review Of Semester 1 1.1.1.1. Provide an overview of encapsulation. Networking evolves to support current and future applications. By dividing and organizing the networking tasks into separate layers/functions,
More informationChapter 2 SOFTWARE CONCEPTS
Page1 Chapter 2 SOFTWARE CONCEPTS Software Software is a program or set of programs that govern the operation of a computer system and make the hardware run. These are the components of the computer system
More informationEthical Hacking and Prevention
Ethical Hacking and Prevention This course is mapped to the popular Ethical Hacking and Prevention Certification Exam from US-Council. This course is meant for those professionals who are looking for comprehensive
More informationIntroduction to Computer Science. William Hsu Department of Computer Science and Engineering National Taiwan Ocean University
Introduction to Computer Science William Hsu Department of Computer Science and Engineering National Taiwan Ocean University Chapter 4: Networking and the Internet No one owns the Internet, and only one
More information2c. Content of Computer systems (Component 01)
c. Content of Computer systems (Component 01) This component will introduce learners to the internal workings of the Central Processing Unit (CPU), the exchange of data and will also look at software development,
More informationChapter 2 Network Models 2.1
Chapter 2 Network Models 2.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 2-1 LAYERED TASKS We use the concept of layers in our daily life. As an example,
More informationKENDRIYA VIDYALAYA SANGATHAN
KENDRIYA VIDYALAYA SANGATHAN JAMMU REGION CLASS: XII SESSION: - 17 SPLIT-UP SYLLABUS COMPUTER SCIENCE MONTH PORTION TO BE COVERED THEORY PRACTICAL April-May UNIT-1 REVIEW: C++ covered In Class - XI, Object
More informationSince ESE GATE PSUs ELECTRICAL ENGINEERING COMPUTER FUNDAMENTALS. Volume - 1 : Study Material with Classroom Practice Questions
Since 20 ESE GATE PSUs ELECTRICAL ENGINEERING COMPUTER FUNDAMENTALS Volume - : Study Material with Classroom Practice Questions Computer Fundamentals (Solutions for Classroom Practice Questions). Number
More informationChapter 2. Switch Concepts and Configuration. Part II
Chapter 2 Switch Concepts and Configuration Part II CCNA3-1 Chapter 2-2 Switch Concepts and Configuration Configuring Switch Security MAC Address Flooding Passwords Spoofing Attacks Console Security Tools
More informationChapter 4: Networking and the Internet
Chapter 4: Networking and the Internet 2015 Pearson Education Limited 2015 Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World Wide Web 4.4 Internet Protocols
More informationThe OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).
Network Models The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding and developing computer-to-computer communication
More informationData and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications
Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based s 1 Need For Protocol Architecture data exchange can involve complex procedures better if task broken into subtasks
More informationSTUDY NOTES UNIT 1 - INTRODUCTION TO OBJECT ORIENTED PROGRAMMING
OBJECT ORIENTED PROGRAMMING STUDY NOTES UNIT 1 - INTRODUCTION TO OBJECT ORIENTED PROGRAMMING 1. Object Oriented Programming Paradigms 2. Comparison of Programming Paradigms 3. Basic Object Oriented Programming
More informationCompTIA Network+ Course
CompTIA Network+ Course Duration: 5 Days Course Delivery: Classroom Language: English Target Audience Comprehensive approach to both preparing a student for CompTIA's Network+ exam and developing proficiency
More informationData Communication & Computer Networks MCQ S
Data Communication & Computer Networks MCQ S 1. The translates internet domain and host names to IP address. a) domain name system b) routing information protocol c) network time protocol d) internet relay
More informationFundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,
Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure
More informationNetworks Hardware Components
Lec. 5 Networks Hardware Components Dr. Eng. Samy Elmokadem Chapter 8 10/12/2017 1 internetworking devices used in backbone networks After studying this Chapter you should: Know which internetworking devices
More informationChapter 4: Networking and the Internet. Figure 4.1 Network topologies. Network Classifications. Protocols. (continued)
Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World
More informationChapter 4: Networking and the Internet
Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Copyright 2012 Pearson Education, Inc. Chapter 4: Networking and the Internet 4.1 Network Fundamentals
More informationBRA BIHAR UNIVERSITY, MUZAFFARPUR DIRECTORATE OF DISTANCE EDUCATION
BSCIT/3 RD /BIT13-OOPS with Java Q. 1. What do you mean by Java Virtual Machine? Q. 2. Define Bytecode. Write different features of Java. Q. 3. How do you compile and execute a Java program? Q. 4. Discuss
More informationInternetwork Basic. Possible causes of LAN traffic congestion are
Internetworking 1 C H A P T E R 2 Internetworking Basics Internetworking Model The OSI Reference Model Ethernet Networking Wireless Networking Data Encapsulation Topic 3 1 Internetwork Basic 4 Possible
More informationIntroduction to TCP/IP
Introduction to TCP/IP Properties and characteristics of TCP/IP IPv4 IPv6 Public vs private vs APIPA/link local Static vs dynamic Client-side DNS settings Client-side DHCP Subnet mask vs CIDR Gateway TCP/IP
More informationDarshan Institute of Engineering & Technology for Diploma Studies
1. Explain different network devices in detail. Or Explain NIC (Network Interface Card) in detail. Network interface cards are add on cards as hardware cards on the motherboard. This is additional hardware
More informationArea Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low
Chapter 15 Networking Concepts 1. Define networking. It is the interconnection of independent computing devices for sharing of information over shared medium. 2. What is the need for networking? / What
More informationADMINISTRATIVE MANAGEMENT COLLEGE
First Semester ADMINISTRATIVE MANAGEMENT COLLEGE BACHELOR OF COMPUTER APPLICATION COURSE OUTCOME (CO) Problem solving techniques Using C CO 1: Understand the basic concepts of programming, software and
More informationMotivation For Networking. Information access Interaction among cooperative application programs Resource sharing
Motivation For Networking Information access Interaction among cooperative application programs Resource sharing CS422 -- PART 1 13 2003 Practical Results E-mail File transfer/access Web browsing Remote
More informationNext Steps Spring 2011 Lecture #18. Multi-hop Networks. Network Reliability. Have: digital point-to-point. Want: many interconnected points
Next Steps Have: digital point-to-point We ve worked on link signaling, reliability, sharing Want: many interconnected points 6.02 Spring 2011 Lecture #18 multi-hop networks: design criteria network topologies
More informationChapter 11: Networks
Chapter 11: Networks Devices in a Small Network Small Network A small network can comprise a few users, one router, one switch. A Typical Small Network Topology looks like this: Device Selection Factors
More information