Tuesday, July 22, 2014

Device Drivers

What are Device drivers? How are device drivers updated?
 Answer:-

Device drivers  are specialized programs that allow device such as mouse, printer, scanner or keyboard to communicate with the rest of the computer system.

Every device, such as a mouse or printer , that is connected to a computer system, has a special program associated with it. This program , called a device driver or simply a driver, works with the operating system to allow communication between the device and the rest of the computer system.
Each time the computer system is started, the operating system loads all the device drivers into memory.

Whenever a new device is added to a computer system, a new device driver must be installed before the device can be used .
Windows supplies hundreds of different device drivers with its system software. If a particular device driver is not included , the product's manufacturer will supply one.
Many time these drivers are available directly form manufacturer's website.

You probably never think abut the drivers in your computer.
However when your computer behaves unpredictably , you find updating your drivers solves your problems.
Windows makes it easy to update the drivers on your computer using Windows Update.

Sunday, July 20, 2014

Process States and Transitions

List containing complete set of process states:
1. The process is executing in user mode.
2. The process is executing in kernel mode.
3. The process is not executing but is ready to run as soon as the kernel schedules it.
4. The process is sleeping and resides in main memory .
5. The process is ready to run , but swapper (process 0) must swap the process into main memory before the kernel can schedule it to execute.
6. The process is sleeping, and the swapper has swapped the process to secondary storage to make room for other processes in main memory.
7. The process is returning from the kernel to user mode ,but the kernel preemprts it and does a context switch to schedule another process.The distinction between this state and state 3 (ready to run) will be brought out shortly.
8. The process is newly created and is in a transition state ; the process exists, but it is not ready to run , nor is it sleeping . This state  is the start for all processes except process 0.
9. The process executed the exit system call and is in the zombie state. The process no longer exists , but it leaves a record containing an exit code and some timing statistics for its parent process to collect .The zombie state is the final state of a process.

Buffer

Definition :-
The kernel could read and write directly to and from the disk for all file system accesses,but system response time and throughput would be poor because of the slow disk transfer rate . The kernel therefore attempts to minimize frequency of disk access by keeping a pool  of internal data buffers,called the buffer cache which contains the data in recently used disk blocks.

A buffer contains two parts:
a memory array that contains data from the disk and
a buffer header that identifies the buffer.

The status of buffer is a combination of the following conditions:
1. The buffer is  currently locked.
2. The buffer contains valid data 
3. The kernel must write the buffer contents to disk before reassigning the buffer this condition is known as "delayed-write"
4. The kernel is currently reading or writing the contents of the buffer to disk.
5. A process is currently waiting for the buffer to become free

Structure of the buffer pool:
The kernel caches data in the buffer pool according to a least recently used algorithm .
The kernel maintains a free list of buffers that preserves the last recently used order.
The free list is a doubly linked circular list of buffers with a dummy buffer header that marks its beginning and end .
Kernel organizes the buffer into separate queues, hashed as a function of the device and block number.

Five typical scenarios the kernel may follow in getblk to allocate a buffer for a disk block
1. The kernel finds the block on its hash queue, and its buffer is free.
2. The kernel cannot find the block on the hash queue,so it allocates a buffer from the free list .
3. The kernel cannot find the block on the hash queue and in attempting to allocate a buffer from the free list ,finds a buffer on the free list that has been marked "delayed write." The kernel must write the "delayed write" buffer to disk and allocate another buffer.
4. The kernel cannot find the block on the hash queue , and the free list of buffers is empty.
5. The kernel finds the block on the hash queue , but its buffer is currently busy.


 

Monday, July 14, 2014

Solve and Test Arithmetic questions

Solve and Test Arithmetic questions




Q 1. The  base of a  triangular field is three times its altitude.If the cost of cultivating the field at Rs.24 per hectare be Rs.324, find its base and height.

Ans. Height = 300m , base= 900m



Q 2. The average monthly expenditure of a family was Rs.4,050 during first 3 months, Rs. 4,260 during next 4 month and Rs.4,346 during last 5 month of the year. If the total saving during the year be Rs.8,720, find the average monthly income.

Ans. Rs. 4,970



Q 3. The student in three classes are in the ratios 2:3:5. If 20 students are increased in each class ,the ratios changes to 4:5:7. What is the total number of student before the increase?

Ans. 100



Q 4. A papaya tree was planted 2 year ago. It increase at the rate of 20% every year . If  at present , the height of the tree is 540 cm, What was it when the tree was planted?

Ans. 375 cm



Q 5. The sum of the ages of a father and son is 45 year. Five year ago , the product of their ages was 4 times the  father's age at that time.Find the present ages of the father and son.

Ans. Father's age i.s 36 year and son 's age is 9 years



Q 6. A man sold an article for Rs.161, gaining 1/6th of his outlay. Find the cost price of the article.

Ans. Rs. 138



Q 7. Divide Rs.560 among A,Band C so that A may get half as much as C and B may get half as much as C.

Ans. A's shave =Rs. 140, B's shave =Rs. 140, C 's shave= Rs.280



Q 8. If in a long division sum ,the dividend is 380606 and the successive remainders from the first to the last are 434,125 and 413,find the divisor.

Ans. 843



Q 9. In a hostel there were some students.Average expenditure on their meal was Rs.60.10 more students joined and the expenses increased by Rs.350 ,but average reduced by Rs. 5 .How many students were in the hostel originally?

Ans. 40



Q 10. A grocer purchased 80 kg of rice at RS .13.50 per kg and mixed it with 120 kg available at Rs. 16 per kg.At what rate per kg should he sell the mixture to have a gain of 20 per cent?

Ans. Rs 18 per kg


Saturday, July 12, 2014

Solved General knowledge questions and answers

General Knowledge Questions :-





1) What should be the minimum interval between two successive blood donations?
A) 6 weeks
B) 3 months
C) 6 months
D) 8 months

Ans::- B) 3 months



2) Food is mainly digested in-
A) Liver
B) Large intestine
C) Small intestine
D) Mouth
 

Ans::- C) Small intestine



3) The large cell in the human body is -
A) Nerve Cell
B) Muscle Cell
C) Liver Cell
D) Kidney Cell

Ans::- A) Nerve Cell




4) Which of the following is a flightless bird?
A) Emu
B) Hen
C) Swan
D) None of these

Ans::- A) Emu



5) Meningitis is a disease which affects the -
A) Kidneys
B) Liver 
C) Heart
D) Brain

Ans::- D) Brain



6) Which of the following is a vector quantity?
A) Force
B) Momentum
C) Energy
D) Temperature

Ans ::- A) Force



7) The three famous Buddhist sites Ratnagiri ,Lalitgiri and Udaigiri  are located in which of the following States?
A) Bihar
B) Maharashtra
C) U.P.
D) Orissa

Ans:: - Orissa



8) Who among the following earned the title of a 'Liberator'?
A) Chandragupta Vikramaditya 
B) Ashoka
C) Chandragupta Maurya
D) Alexander

Ans::- C) Chandragupta Maurya



9) The strategy of  'Divide and Rule' was adopted by whom?
A) Lord Curzon
B) lord  Wellesley 
C) Lord  Minto 
D) Lord  Canning

Ans:: - C) Lord Minto



10) Delhi became the Capital of India in -
A) 1910
B) 1911
C) 1916
D) 1923


Ans ::- B) 1911



11) The first President of independent India was -
A) Dr. Rajendra Prasad
B) M.K.Gandhi
C) Dr. S.Radhakrishnan
D) J.L.Nehru

Ans::- A) Dr. Rajendra Prasad



12) Who was the first European to translate the Bhagwad Gita into English?

A) William Jones
B) Charles Wilkins
C) James Prinsep
D) Sir Alexander Cunningham

Ans:: -B) Charles Wilkins



13. The  population of which of the following is maximum on  the earth
A) Reptiles
B) Fishes
C) Birds
D) Beetles

Ans. B) Fishes




14. Which of the following is the largest living mammal?
A) Giraffe
B) White elephant
C) Rhinoceros
D) Blue Whale

Ans. D) Blue Whale



15. Which first is given by a herb?
A) Mango
B) Banana
C) Apple
D) Jack-  fruit

Ans. D) Jack- fruit



16. Which of  the following is hereditary?
A) Dysentery
B) Tuberculosis
C) Haemophilia
D) Cancer


Ans. C) Haemophilia



17. Which of the following is knows as the jain Temple City?
A) Gimar
B) Rajagriha
C) Varanasi
D) Ilahabad


Ans. A) Gimar



18. Who was the first King  to conquer Malwa,Gujarat and Maharashtra?
A) Skandagupta
B) Samudragupta
C) Chandragupta Maurya
D) Harshavardhan 

Ans. C) Chandragupta Maurya




19. The slogan 'Inquilab Zindabhad' was raised by whom?
A) Lokmanya Tilak
B) Veer Savarkar
C) Chandrashekar Azad
D) Bhagat Singh

Ans. D) Bhagat Singh




20. The Muslim League started demanding a separate nation for the Muslims from which year?
A) 1919
B) 1925
C) 1929
D) 1940


Ans. D) 1940



21. When did the British Parliament pass the Indian Independence Bill  ?
A) 20th February, 1947
B) 24th March, 1947
C) 1st July, 1947
D) 14th August,1947


Ans. C) 1st July,1947



22. Who among the following has the final power to maintain order within the House of People?
A) Marshal of the People
B) Prime Minister
C) Speaker
D) Chief of Security Staff


Ans. C) Speaker



23. Which is laughing gas?
a) Carbon dioxide
b) Sulphur dioxide
c) Carbon monoxide
d) Nitrous  oxide

Ans. d) Nitrous  oxide




24. Detergents used for cleaning clothes and utensils contains-
a) Nitrates
b) Bicarbonates
c) Sulphonates
d) Bismutnates

Ans. c) Sulphonates




25. Floppy disc in a computer system is-
a) Compiler
b) Core memory
c) Software
d) Device for storage and retrieving data

Ans. d) Device for storage and retrieving data




26. The tooth with there roots is-
a) Molar
b) Pre- Molar
c) Incisor
d) Canine

Ans. a) Molar




27. Bamboo is a-
a) Grass
b) Herb
c) Shrub
d) Tree


Ans. a) Grass



28. Which of the following cannot be controlled by vaccination?
a) Small pox
b) Diabetes
c) Polio
d) Whooping cough

Ans. b) Diabetes




29. Which of the following terms is used for several individuals of a species living together in a locality?
a) Biosphere
b) Ecosystem
c) Bio- community
d) Population

Ans. c) Bio- community




30. Raman effect is associated with characteristics of-a) Heat
b) Light
c) Electricity
d) Magnetism

Ans. b) Light



31. Which of the following is known as the queen of  spices?
a) Coriander
b) Cardamom
c) Fenugreek
d) Chillies

Ans. b) Cardamom




32. The Peacock throne was made for -
a) Jahangir
b) Akbar
c) Shahjehan
d) Aurangzeb

Ans. c) Shahjehan




33. Which of the following was built  by Akbar?
a) Agra fort
b) Fort of Daulatabad
c) Red fort
d) Fort of Ahmednagar

Ans. a) Agra fort




34. Ramayan refers to-
a) Satyuga
b) Tretayuga
c) Dwaparyuga
d) Kalyuga

Ans. b) Tretayuga




35. Who is regarded as the greatest law giver of  ancient India?
a) Kautilya
b) Manu
c) Panini
d) Patanjali

Ans. b) Manu




36. When did the Indian National Congress ask for the 'Dominion Status'?
a) 1908
b) 1929
c) 1942
d) 1947

Ans. a) 1908




37. The first woman's university in India was founded by-
a) Gandhiji
b) J.K.Kumarappa
c) Dhondo Keshave Karve
d) Rani Ahilya Devi

Ans. c) Dhondo Keshave Karve



Wednesday, July 9, 2014

Full forms

Full Forms ::-




Write full form of  :

AGP ::- Accelerated Graphics Port

AI  ::- Artificial Intelligence

ALU  ::- Arithmetic Logic  Unit

AOL ::- American Online

ARPANET  ::- Advanced Research Project Agency Network

ASCII   ::-American Standard Code for Information Interchange

ATM  ::- Automated Teller Machine

B2B  ::- Business To Business

B2C  ::- Business To Consumer

C2C  ::- Consumer To Consumer

CCTV  (camera)::- Closed-Circuit Television (camera)

CD ::- Compact Disc

CERN  ::-  Center for European Nuclear Research

CISC  ::- Complex Instruction Set Computer

CMOS   ::- Complementary Metal Oxide Semiconductor

CPU   ::- Central Processing Unit

CRT  ::- Cathode Ray Tube

DBMS  ::- Database Management System

DNS  ::- Domain Name System

DSL  ::- Digital Subscriber Line

DVD  ::- Digital Versatile (or Video ) Disc

EBCDIC   ::- Extended Binary Coded Decimal Interchange Code

E-Mail ::-  Electronic mail

FTP  ::- File Transfer Protocol

HDTV  ::-  High Definition Tele Vision

HPSB  ::- High Performance Serial Bus

HTML  ::- Hyper Text Markup Language

HTTP ::- Hyper Text Transfer Protocol

IP  ::-   Internet Protocol

IRC  ::- Internet Relay Chat

ISA  ::- Industry Standard Architecture

ISP  ::- Internet Service Provider

IT ::- Information Technology

LAN  ::- Local Area Network

LCD  ::-  Liquid Crystal Display

MAN  ::- Metropolitan Area Network 

MICR  ::- Magnetic  Ink  Character Recognition

NIC  ::- Network Interface Card

NOS   ::- Network operating System

OCR  ::- Optical Character Recognition

OLE  ::- Object Linking and Embedding

OMR  ::- Optical Mark Recognition 

PC  ::-  Personal Computer

PCI  ::-  Peripheral Component Interconnect

PCMCIA  ::- Personal Computer Memory Card International Association

PDA  ::- Personal Digital Assistant

RAID  ::- Redundant Arrays of Inexpensive Disks

RAM  ::- Random Access Memory

RISC  ::- Reduced Instruction Set Computer

ROM  ::- Read Only Memory

SQL  ::- Structured Query Language

SVGA  ::- Super Video Graphics Array

SXGA  ::- Super Extended Graphics Array

 TCP ::- Transmission Control Protocol

TFT  ::- Thin Film Transistor

TV  ::-   Tele Vision

UPC ::-  Universal Product Code

URL  ::- Uniform Resource Locators

USB ::-  Universal Serial Bus

UXGA  ::- Ultra Extended Graphics Array 

VR  ::- Virtual Reality

VRML  ::- Virtual Reality Modeling Language

WAN  ::- Wide Area Network

WWW ::- World Wide Web 

XGA   ::-  Extended Graphics Array 

Tuesday, July 8, 2014

Technical Exam preparation Qs

1. What is the decimal equivalent to the hexadecimal number E6D3?
A. 59019
B. 59091
C. 59136
D. 59093
Answer::-B.

2. Convert the decimal number 2989 to hex.
A. FDD1
B. BAD
C. TED
D. CAD
Answer::- B.

3. MAC address are _________ bits in length.
A. 12
B. 24
C. 48
D. 64
Answer::- C.

4. Where does the MAC address reside?
A. Transceiver
B. Computer BIOS
C. NIC
D. CMOS
Answer::- C.

5. Which of the following statements best describes communication between two devices on a LAN?
A. The source device encapsulates data in a frame with the MAC address of the destination device, and then transmits it. Everyone on the LAN sees it, but the devices with non-matching addresses otherwise ignore the frame.
B. The source encapsulates the data and places a destination MAC address in the frame. It puts the frame on the LAN, where only the device with the matching address can check the address field.
C. The destination device encapsulates data in a frame with the MAC address of the source device, puts it on the LAN, and the device with the matching address removes the frame.
D. Each device on the LAN receives the frame and passes it up to the computer, where software decides whether to keep or to discard the frame.
Answer::-A.

6. Which are the functions associated with framing?
A. Identifies which computers are communicating with one another
B. Signals when communication between individual computers begins and when it ends
C. Flags corrupted frames
D. All of the above
Answer::-D.

7. How does a computer on a LAN detect an error in a frame?
A. It sends a copy of the frame back to the sender for verification.
B. It checks the destination address to verify that the frame was really intended for them.
C. It compares an FCS in the frame to one that the computer calculates from the contents of the frame.
D. It calculates a checksum from the data in the frame, and then sends it back to the source for verification.
Answer::- C.

8. Which best describes a CSMA/CD network?
A. One node's transmission traverses the entire network and is received and examined by every node.
B. Signals are sent directly to the destination if the source knows both the MAC and IP addresses.
C. One node's transmission goes to the nearest router, which sends it directly to the destination.
D. Signals are always sent in broadcast mode.
Answer::- A.

9. Which best describes broadcasting?
A. Sending a single frame to many stations at the same time
B. Sending a single frame to all routers to simultaneously update their routing tables
C. Sending a single frame to all routers at the same time
D. Sending a single frame to all hubs and bridges at the same time
Answer::- A.

10. A half-duplex circuit means
A. Only one side can talk at a time
B. The signal strength is cut in half
C. The signal strength is doubled
D. Two hosts can talk simultaneously
Answer::-A.

11. Attenuation means
A. Travel
B. Delay
C. A signal losing strength over distance
D. Loss of signal due to EMI
Answer::-C.

12. Which of the following is an external source of electrical impulses that can attack the quality of electrical signals on a cable?
A. EMI caused by electrical motors
B. RFI caused by electrical motors
C. Impedance caused by radio systems
D. EMI caused by lightning
Answer::- A.

13. What is the primary cause of crosstalk?
A. Cable wires that are too large in diameter
B. Too much noise in a cable's data signal
C. Electrical motors and lighting
D. Electrical signals from other wires in a cable
Answer::-D.

14. Which of the following describes cancellation?
A. Wires in the same circuit cancel each other's electrical current flow.
B. Cancellation is a commonly used technique to protect the wire from undesirable interference.
C. The magnetic fields from one cable run cancel magnetic fields of another cable run.
D. External magnetic fields cancel the fields inside network cabling.
Answer::- B.

15. What is it called when two bits from two different communicating computers are on a shared medium at the same time?
A. Latency
B. Dispersion
C. Collision
D. Obstruction
Answer::-C.

16. Reflection does not occur with what kind of signals?
A. Electrical
B. Radio waves
C. Microwaves
D. None of the above
Answer::- D.

17. __________ means to convert binary data into a form that can travel on a physical communications link.
A. Encoding
B. Decoding
C. Encrypting
D. Decrypting
Answer::- A.

18. Which of the following is the correct order for the network layers?
A. 1: Physical 2: Data Link 3: Transport 4. Network 5: Presentation 6: Session 7: Application
B. 1: Physical 2: Data Link 3: Network 4: Transport 5: Session 6: Presentation 7: Application
C. 1: Physical 2: Data Link 3: Network 4: Session 5: Transport 6: Application 7: Presentation
D. 1: Physical 2: Network 3: Session 4: Data Link 5: Transport 6: Application 7: Presentation
Ans::- B.

19. Which layer of the OSI model handles error detection, network topology, and medium access?
A. The physical layer
B. The data link layer
C. The transport layer
D. The network layer
Ans::- B.

20. Which layer of the OSI model establishes, maintains, and manages sessions between applications?
A. The transport layer
B. The session layer
C. The presentation layer
D. The application layer
Answer::-B.

21. Which best describes the function of the presentation layer?
A. It provides data representation and code formatting.
B. It handles error notification, network topology, and flow control.
C. It provides network services to user applications.
D. It provides electrical, mechanical, procedural, and functional means for activating and maintaining the link between systems.
Answer::-A.

22. Which layer of the OSI model provides network services to user applications?
A. The transport layer
B. The session layer
C. The presentation layer
D. The application layer
Answer::-D.

23. Which layer offers provisions for data expedition, class of service, and exception reporting?
A. Session
B. Presentation
C. Network
D. Data link
Answer::-A.

24. Which of the following statements regarding encapsulation is untrue?
A. Encapsulation allows computers to communicate data.
B. If one computer wants to send data to another computer, the data first must be packaged by a process called encapsulation.
C. Encapsulation occurs at one layer.
D. Encapsulation wraps data with the necessary protocol information before network transit.
Answer::- C.

25. Which of the following correctly describes the five conversion steps of data encapsulation when one computer sends an e-mail message to another computer?
A. Data, segments, packets, frames, bits
B. Bits, frames, packers, segments, data
C. Packets, segments, data, bits, frames
D. Segments, packets, frames, bits, data
Answer::- A.

26. An e-mail message is sent from Host A to Host B on a LAN. To send this message, the data must be encapsulated. Which of the following best describes the first step of data encapsulation?
A. Alphanumeric characters are converted into data.
B. The message is segmented into easily transportable chunks.
C. A network header is added to the message (source and destination addresses).
D. The message is converted into binary format.
Answer::- A.

27. An e-mail message is sent from Host A to Host B on a LAN. Before you can send this message, the data must be encapsulated. Which of the following best describes what happens after a packet is constructed?
A. The packet is transmitted along the medium.
B. The packet is put into a frame.
C. The packet is segmented into frames.
D. The packet is converted to binary format.
Answer::- B.

28. An e-mail message is sent from Host A to Host B on a LAN. Before you can send this message, the data must be encapsulated. Which of the following best describes what happens after the e-mail message's alphanumeric characters are converted into data?
A. The data is converted into binary format.
B. A network header is added to the data.
C. The data is segmented into smaller chunks.
D. The data is put into a frame.
Answer::- C.

29. Which best describes a datagram?
A. A message sent to the source to confirm the receipt of uncorrupted data
B. A binary representation of routing information
C. A data packet less than 100 bytes in size
D. A network layer packet
Answer::- D.

30. Which of the following layers of the OSI model is not present in the TCP/IP protocol stack?
A. Transport
B. Network
C. Internet
D. Data link
Answer::- D.

More Questions with ans to solve

1. A router is an OSI Layer __________device.
A. 1
B. 5
C. 3
D. 4

Ans:-C


2. What do routers connect?
A. Bridges and repeaters
B. Bridges and hubs
C. Two or more networks
D. Hubs and nodes

Ans:- C.


3. What does a router route?
A. Layer 1 bits
B. Layer 2 frames
C. Layer 3 packets
D. Layer 4 segments

Ans:- C.

4. To construct a simple LAN of four computers, you connect them with a _________ ?
A. Cross-connect cable
B. Serial line
C. Hub
D. Router

Ans. C.



5. What is the maximum cable length for STP (without a repeater, and so on)?
A. 100 ft
B. 100 m
C. 150 ft
D. 1000 in

Ans: - B.


6. How many pairs of wires make up a UTP cable?
A. 2
B. 4
C. 6
D. 8

Ans::- B.

7. Which connector does UTP use?
A. STP
B. BNC
C. RJ-45
D. RJ-69

Ans::- C.


8. What is an advantage that coaxial cable has over STP or UTP?
A. It is capable of achieving 10-100 Mbps.
B. it is inexpensive.
C. It can run longer distances unboosted.
D. None of the above.

Ans::- C.


9. A more compact version of coaxial cable is known as
A. Thinnet
B. BNC
C. STP
D. UTP

Ans::- A.

10. A _________ fiber optic cable allows multiple streams of LED-generated light.
A. Multimode
B. Multi-channel
C. Multiphase
D. None of the above

Ans::- A.

11. What is the importance of the EIA/TIA standards?
A. They provide a framework for the implementation of the OST reference model.
B. They provide guidelines for NIC manufacturers to follow to ensure compatibility.
C. They provide the minimum media requirements for multi-product and multi-vendor environments.
D. None of the above.

Ans::- C.

12. For the horizontal cabling component, TIA/EIA-568A requires a minimum of how many connectors at each work area?
A. 1
B. 2
C. 4
D. 6

Ans::- B.

13. What does the twisting of the wires do in a CAT-5 cable?
A. It makes it thinner.
B. It makes it less expensive.
C. It reduces noise problems.
D. It allows six pairs to fit in the space of four pairs.

Ans::- C.

14. The standard 10BaseT cable is Category ___________
A. 3
B. 4
C. 5
D. 6

Ans::- C.

15. The network area within which data packets originate and collide is called a ____________?
A. Collision domain
B. Network domain
C. Collision segment
D. Network segment

Ans::- A.

16. Using repeaters __________ the collision domain.
A. Reduces
B. Has no effect on
C. Extends
D. None of the above

Ans::- C.

17. The process of installing complex networking devices that break up the domains by using bridges, switches, and routers is known as:
A. Sectioning
B. Segmentation
C. Collision Domain Reduction
D. None of the above

Ans::- B.

18. What physical topology has all its nodes connected directly to one link, and has no other connections between nodes?
A. Linear bus
B. Star
C. Ring
D. None of the above

Ans::- A.

19. What type of numbering system is characterized by 0’s and 1’s?
A. Base 4
B. Base 10
C. Binary
D. Hexadecimal

Ans::- C.

20. What is the decimal number 151 in binary?
A. 10100111
B. 10010111
C. 10101011
D. 10010011

Ans::- B.

21. What is the binary number 11011010 in decimal?
A. 186
B. 202
C. 222
D. 218

Ans::- D.

22. What best describes how much information can flow from one place to another in a given amount of time?
A. Mbps
B. Transfer-rate
C. Reliability
D. Bandwidth

Ans::- D.

23. Bandwidth is described in _____________.
A. Bytes per second
B. Bits per second
C. Megabits per millisecond
D. Centimeters

Ans::- B.

24. What term is used to describe the rated throughput capacity of a given network medium or protocol?
A. TCP/IP
B. Ethernet
C. Bandwidth
D. Routing protocol

Ans::- C.

25. At its most basic level, computer data consist of _________.
A. Bits
B. Bytes
C. Packets
D. None of the above

Ans::- A.

26. Which of the following is not a form of cable media?
A. Coaxial cables
B. Optical fibers
C. Category 5 UTP
D. None of the above

Ans::- D.

27. A protocol is not __________.
A. A set of rules
B. An agreement
C. A connection layer
D. A definitive outline

Ans::- C.

28. Which of the following best describes topology?
A. A connection of computers, printers, and other devices for the purpose of communications
B. The physical arrangement of network nodes and media within an enterprise networking structure
C. A network type that prevents collisions of data packets
D. A method for filtering network traffic to reduce the chance of bottlenecks and slowdowns

Ans::- B.

29. Which of the following best describes a star topology?
A. A LAN topology in which a central hub is connected by vertical cabling to other hubs that are dependent on it
B. A LAN topology in which transmissions from network stations propagate the length of the medium and are received by all other stations
C. A LAN topology in which endpoints on a network are connected to a common central point
D. A LAN topology in which central points on a network are connected to a common central switch by linear links

Ans::- C.

30. Which of the following best describes a node?
A. An endpoint of a network connection or a junction common to two or more lines in a network that serve as control points
B. An application that establishes, manages, and terminates sessions between devices and manages data exchange between presentation layer entities
C. An application that synchronizes cooperating devices and establishes agreement on procedures for error recovery and control of data integrity
D. All of the above

Ans::- A.

File Organization

FILE ORGANIZATION:

It refers to the way of arranging the records in a file which can be accessed in a faster way.
The criteria considered in choosing a file organization are:
1) Fast access to single record or collection of related records.
2) Easy record adding/ update/ removal without disrupting.
3) Storage efficiency
4) Redundancy as a warranty against data corruption.

The files are generally viewed as
• Logical File organization: The groups of fields which are combined to form logical
record, which can perform different operations on the file.
• Physical file organization: The data which is stored in the form of records can be
placed in any storage devices, main memory, secondary memory etc.


Types of File Organization:
I) Sequential Access File Organization
II) Direct Access File Organization
III) Index Sequential Access File Organization


I) Sequential Access File Organization:

1) All records are stored in a sequential order.
2) That is, the records are arranged in the ascending or descending order of a key field.
3) Eg: a) In a student information system, the file would contain roll number, name, division, marks
obtained in the examination.
b) In a payroll application, the records are stored with employee number as a
key field.
4) To locate a particular record in such file organization, we have to start searching
from the beginning of the file until it is found in the file.
5) It is time consuming process.
6) Normally created and maintained on magnetic tapes. Eg: Audio Cassettes.
7) There is no need for any storage space identification

Advantages:
1) Simple to understand
2) Easier to organize, maintain
3) Economical
4) Error in files remain localized

Disadvantages:
1) Entire file has to be processed
2) Transactions must be sorted in a particular sequence before processing
3) Time consuming searching
4) High data redundancy
5) Random enquiries are not possible to handle


II) Direct Access File Organization (Random Access or relative file organization).:

1) Also known as Random Access or relative file organization.
2) Records are stored in Direct Access Storage Device(DASD). Such as magnetic disk(Hard disks).
3) For direct access, the file is viewed as numbered sequence of blocks or records.
4) These blocks or records are taken as key for accessing the desired information randomly.
5) It allows arbitrary (random) blocks to be read or written.
6) It is useful for immediate access to large amount of information. They are often used in accessing
large databases.
7) This technique is called as hashing

Advantages:
1) Immediate Access of the desired records.
2) No sorting of the records is required.
3) Faster updating of several files.
4) Helps in online transaction processing system like online reservation systems.

Disadvantages:
1) Data may be accidentally erased or over-written unless special precautions are taken
2) Backup facility is needed
3) Expensive- hard disks are needed to store the records, it is expensive
4) Less efficient as compared to sequential file organization in the use of storage space
5) Only one key is used
6) Cannot be accessed sequentially


III) Index Sequential access file organization(ISAM)

1) This file organization is a synthesis of the above two file organizations.
2) It combines the positive features of both the sequential and direct access file organizations.
3) Here records are stored randomly on a direct access device such as magnetic disk by a primary key.
Hence, we can access data either sequentially or randomly using the index. The index is stored in a
file and read into memory when the file is opened.
4) It may have multiple keys. These keys can be alphanumeric
5) The key upon which the data records are ordered is called the primary key.
6) Other keys are called alternate keys

Advantages:
1) Multilpe keys – are also alphanumeric in nature
2) Both sequential and random access is possible
3) Accessing of records is fast, if the index table is properly organized

Disadvantages:

1) More storage space is needed because of the presence of Index
2) Less efficient in the use of storage space as compared to other file organizations
3) It requires special software, i.e expensive.

Call by value and Call by refrence

Explain call by value and call by reference with example.

Call by value-
When a function call is given, a relationship is established between actual and formal parameters.
A temporary storage is created for formal parameters to store the data(actual parameters) received
as input from calling function. This process of data transfer from actual parameter to formal
parameters is known as call by value.

Ex: void main()
{ int a=20,b=30,x;
int f1(int,int);
-----
x=f1(a,b);
-----
getch( );
}
int f1(int p, int q)
{
p=p+p;
q=q+q;
return(p+q);
}

Call by reference-
When a function is called, the address of variables are passed on to the
called function. The parameters receiving the address should be pointer variables. This
concept of sending the address of data from calling function to pointer variables in the
called function is known as call by reference.

Ex: viod main()
{
int a=10,b=15,c=20;
------
X=f1(&a,&b,&c);
------
getch();
}
int f1(int *p1, int  *p2, int  *p3)
{
*p1=*p1+10;
*p2=*p2+5;
}

Featured posts

Happy Independence Day August 15th

 Here's a message for India's Independence Day (August 15th): "शुभ स्वतंत्रता दिवस! आजादी की 79वीं वर्षगांठ पर, आइए हम अपने देश...

Popular posts