Академический Документы
Профессиональный Документы
Культура Документы
Solutions:
Q1. Voice over Internet Protocol (VoIP), is a technology that allows you to make
voice calls using a broadband Internet connection instead of a regular (or analog)
phone line. Some VoIP services may only allow you to call other people using the
same service, but others may allow you to call anyone who has a telephone
number - including local, long distance
Q2. There are several different types of computer networks. Computer networks can
be characterized by their size as well as their purpose.
Some of the different networks based on size are:
Q3. The SQL DROP command is used to remove an object from the database. If you
drop a table, all the rows in the table is deleted and the table structure is removed
from the database. The DELETE Statement is used to delete rows from a table.
Q4. AES is largely considered impervious to all attacks, with the exception of brute
force, which attempts to decipher messages using all possible combinations in the
128, 192, or 256-bit. RSA is considered an asymmetric algorithm due to its use of
a pair of keys. You’ve got your public key, which is what we use to encrypt our
message, and a private key to decrypt it. Triple DES uses three individual keys
with 56 bits each. The total key length adds up to 168 bits, but experts would
argue that 112-bits in key strength is more like it.
Q5. Software life cycle models describe phases of the software cycle and the order in
which those phases are executed. Each phase produces deliverables required by
the next phase in the life cycle. There are following six phases in every Software
development life cycle model:
Q7. Binary Large Object is a large object data type in the database system. BLOB
could store a large chunk of data, document types and even media files like audio
or video files. BLOB fields allocate space only whenever the content in the field is
utilized. BLOB allocates spaces in Giga Bytes. The VARCHAR data type accepts
character strings, including Unicode, of a variable length is up to the maximum
length specified in the data type declaration. The INTEGER data type accepts
numeric values with an implied scale of zero. It stores any integer value between
the range 2-31 and (231 – 1).
Attempting to assign values outside this range causes an error. The DECIMAL
data type accepts numeric values, for which you may define a precision and a
scale in the data type declaration. The precision is a positive integer that indicates
the number of digits that the number will contain.
Q10. Primary storage typically refers to random access memory (RAM), while
secondary storage refers to the computer's internal hard drive. Pen drive is a
small removable Flash Memory drive which is connected to the usb port.
Q11. The TCP/UDP is a part of the most important protocol hierarchy – The
Transport Layer. There would be no sense for the concept of layered protocols
without the transport layer. This layer provides cost-effective and reliable data
transport from the source computer to the destination computer. Physical layer is
the lowest layer of all. It is responsible for sending bits from one computer to
another. The Network layer adds the concept of routing above the Data Link
layer. The Application layer supplies network services to end-user applications.
Q12. Attributes are represented by ellipse while Entities are represented by means
of rectangles.
The table containing the foreign key is called the child table, and the table
containing the candidate key is called the referenced or parent table.
Q14. Star topology here all of the computers and devices on the network connect to
a central device, thus forming a star. The central device that provides a common
connection point for nodes on the network is called a hub.
Q15. Full - duplex data transmission means that data can be transmitted in both
directions on a signal carrier at the same time. For example, on a local area
network with a technology that has full-duplex transmission, one workstation can
be sending data on the line while another workstation is receiving data. Full-
duplex transmission necessarily implies a bidirectional line.
Q16. The newton (symbol: N) is the International System of Units (SI) derived unit
of force. It is named after Isaac Newton in re. The hertz (symbol: Hz) is the
derived unit of frequency in the International System of Units (SI) and is
defined as one cycle per second. It is named for Heinrich Rudolf Hertz, the first
person to provide conclusive proof of the existence of electromagnetic waves.
Cognition of his work on classical mechanics, specifically Newton's second law of
motion. The watt (symbol: W) is a derived unit of power in the International
System of Units (SI) defined as 1 joule per second and can be used to quantify
the rate of energy transfer.
Q17. IBM (International Business Machines Corporation) is an
American multinational technology company headquartered in Armonk, New
York, United States, with operations in over 170 countries. The company
originated in 1911 as the Computing-Tabulating-Recording Company (CTR) and
was renamed "International Business Machines" in 1924.
IBM manufactures and markets computer hardware, middle ware and software,
and offers hosting and consulting services in areas
Q18. The correct place to write the main function in a program is anywhere in the
program.
Q19. Wired Equivalent Privacy (WEP) is security protocols and security certification
programs developed by the Wi-Fi Alliance to secure wireless computer networks.
Q20. Optical storage devices are; CD-ROM,CD-R,CD-RW, DVD etc. They Stores
data optically & used laser to read/write. It has less storage than hard disk.
Q21. GIF is used for simple web graphics with limited colors. GIF always reduced to
256 colors, making for fast-loading visuals. Thats why it is used in graphic format
for web
UPDATE table_name
WHERE condition;
Q25. An ODMR (on-demand mail relay) is a SMTP extension that allows e-mail to
be relayed to the recipients after they have been authenticated. It uses the
extended SMTP command ATRN, similar to the ETRN command but available
for dynamically assigned IP addresses.
Q27. Using Topological Sort, we can find single source shortest paths in O(V+E)
time which is the most efficient algorithm. Topological sorting for Directed
Acyclic Graph (DAG) is a linear ordering of vertices such that for every directed
edge uv, vertex u comes before v in the ordering. Topological Sorting for a graph
is not possible if the graph is not a DAG.
Q29. The reflected binary code (RBC), also known as Gray code after Frank Gray, is
a binary numeral system where two successive values differ in only one bit. The
reflected binary code was originally designed to prevent spurious output
from electromechanical switches. Today, Gray codes are widely used to
facilitate error correction in digital communications such as digital terrestrial
television and some cable TV systems.
Q30. Optical character recognition (also optical character reader, OCR) is the
mechanical or electronic conversion of images of typed, handwritten or printed
text into machine-encoded text, whether from a scanned document, a photo of a
document, a scene-photo or from subtitle text superimposed on an image (for
example from a television broadcast).
Q31. A stack is an abstract data type that serves as a collection of elements, with two
principal operations: push, which adds an element to the collection, and pop,
which removes the most recently added element that was not yet removed. The
order in which elements come off a stack gives rise to its alternative name, LIFO
(for last in, first out).
Q33. Viruses propagates by inserting a copy of itself into and becoming part of
another program, Worms are similar to viruses in that they replicate functional
copies of themselves and can cause the same type of damage but Trojans do not
reproduce by infecting other files nor do they self-replicate.
Q34. It is not suitable for those projects where requirements are at a moderate to
high risk of changing. In this model, there are high amounts of risk and
uncertainty.
Q35. Transport layer aggregates data from different applications into a single
stream before passing it to the network layer.
Q37. UDP is a connectionless protocol, which is used for its low overhead and high
speed. The User Datagram Protocol (UDP) is one of the core members of
the Internet protocol suite.
Q42. HTTP and FTP are both file transfer protocols and have many common
characteristics. They both run on top of TCP, the Internet's connection-oriented,
reliable data transfer Protocol. The most striking difference is that FTP uses two
parallel TCP connections to transfer a file, a control connection and a data
connection.
Q44. A bridge is a connecting device that operates in the physical and data link
layers of the Internet model. A bridge is a computer networking device that
creates a single aggregate network from multiple communication
networks or network segments.
Q45. Private members of a base class are never accessible to a derived class. A base
class's private members are never accessible directly from a derived class, but can
be accessed through calls to the public and protected members of the base class.
Q46. A struct is the same as a class except that cannot be used in inheritance
hierarchy. There is no inheritance for structs as there is for classes. A struct
cannot inherit from another struct or class, and it cannot be the base of a class.
Q48. In OSI network architecture, the dialogue control and token management are
the responsibilities of Session layer. The session layer is layer 5. The session
layer provides the mechanism for opening, closing and managing a
session between end-user application processes, i.e., a semi-permanent dialogue.
Q49. When you start up the computer the boot up storage at which the BIOS
versions manufacturer and data are displayed on the monitor is called Power on
self-test (POST). POST (Power-On Self-Test) is the diagnostic testing sequence
that a computer's basic input/output system (or "starting program") runs to
determine if the computer keyboard, random access memory, disk drives, and
other hardware are working correctly.
Q50. Inverse page table is a high speed cache used to hold recently referenced page
table entries a part of paged virtual memory. Inverted page table scheme uses a
page table that contains an entry for each physical frame, not for each logical
page. This ensures that the table occupies a fixed fraction of memory. The size is
proportional to physical memory, not the virtual address space.
Q53. The word polymorphism means the ability to take many forms. In OOPs
polymorphism refers to a programming language's ability to process objects
differently depending on their data type or class. More specifically, it is the ability
to redefine methods for derived classes.
Q54. A pure virtual function is defined only in derived class. A virtual
function or virtual method is an inheritable
and overridable function or method for which dynamic dispatch is facilitated. A
pure virtual function is implemented by classes which are derived from an
Abstract class.
Q55. TLB is a high speed cache used to hold recently referenced page table entries a
part of paged virtual memory. Inverted page table scheme uses a page table that
contains an entry for each physical frame, not for each logical page. This ensures
that the table occupies a fixed fraction of memory. The size is proportional to
physical memory, not the virtual address space.