* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Operating System Question Bank Q1 : What is Operating System
Survey
Document related concepts
Transcript
Operating System Question Bank Q1 : What is Operating System? Operating systems control the functions performed by a computer. For example, the operating system on your computer controls the input from the keyboard and mouse to your computer, the opening and closing of programs, the transfer of information to a printer, the organization of the files on your computer, and the screen display. Q2: What is a desktop? When you start your computer, the first thing you see is the desktop. The desktop is your work area. Q3: How do I shut down my computer? To shut down your computer: 1. Click the Start button. The Start menu will appear. 2. Click Turn Off Computer. The Turn Off Computer dialog box will appear. 3. Click the Turn Off icon. Your computer will shut down. Q4: What is Standby mode? When your computer is in the Standby mode, your computer consumes less electricity, but is ready for immediate use. However, if the computer loses electrical power while in the standby mode, any information you have not saved will be lost. Q5: What is Windows Explorer? Windows Explorer is a place where you can view the drives on your computer and manipulate the folders and files. Using Windows Explorer, you can cut, copy, paste, rename, and delete folders and files. Q6: What is the Most Recently Used Document list? As you work, Windows XP tracks the last 15 files you used. It lists these files on the Most Recently Used Document list. To view the Most Recently Used Document list: 1. Click the Start button. 2. Highlight Documents. The most recently used documents will display. To open a file listed on the Most Recently Used Document list, click the file name. Q7: How do I rename an item on the Start menu or on a Program menu? To rename an item on the Start menu or on a Program menu: 1. Highlight the item. 2. Right-click the item. 3. Click Rename. The Rename dialog box will appear. 4. Type the new name in the New Name field. 5. Click OK. Q8: How can you check the IP address of your computer ? IPCONFIG /ALL Q9: What is a Heat Sink ? A component designed to lower the temperature of an electronic device by dissipating heat into the surrounding air. All modern CPUs require a heat sink. Some also require a fan. A heat sink without a fan is called a passive heat sink; a heat sink with a fan is called an active heat sink. Heat sinks are generally made of an aluminium alloy and often have fins. Q10: What is the difference between SATA and PATA Hard-Disk Drives? Serial ATA and Parallel ATA are both specialized interface and data transfer devices, that are used in computers to connect peripheral storage devices. Both serve the same purpose of data transfer but differ in their basic technology, speed of performance and therefore their niche applications these days. Q11: What are Plug & Play devices ? They are pieces of computer hardware that already have the software for them in you system. simply put, you just have to plug it in and you computer does the rest. Q12: What is the difference between a Serial and a Parallel Port ? Basically a serial port sends and receives data 1 'bit' at a time over a single wire, while a parallel port sends the data a 'byte' at a time over several wires simultaneously. Q13: What do you know about the PING Command ? Pinging is a command which tells you if the connection between your computer and a particular domain is working correctly. Eg : C:\Administrator\>Ping 192.168.1.100 or Ping server.domain.com Q14: What is the difference between language and technology? Language means it can follows some instructions, based on those instructions we need to develop a technology. Technology is for develop some particular software, where language provides communication between these software's. Q15: What is the difference between win XP and win 7/8? First of all graphic difference and then XP support IP Ver. 4 only and window 7 support IP Ver. 4 and 6 both. Q16: What is process migration? It is the transfer of sufficient amount of the state of process from one machine to the target machine. Information Technology Question Bank 1. What are turnaround time and response time? Turnaround time is the interval between the submission of a job and its completion. Response time is the interval between submission of a request, and the first response to that request. 2. What are rings in Windows NT? Windows NT uses protection mechanism called rings provides by the process to implement separation between the user mode and kernel mode. 3. When is a system in safe state? The set of dispatchable processes is in a safe state if there exists at least one temporal order in which all processes can be run to completion without resulting in a deadlock. 4. What is Multiple Access? If the physical links are shared by more than two nodes, it is said to be Multiple Access. 5. What is a node? A network can consist of two or more computers directly connected by some physical medium such as coaxial cable or optical fiber. Such a physical medium is called as Links and the computer it connects is called as Nodes. 6. What is Multimedia? A Multimedia Application is an Application which uses a collection of multiple media sources e.g. text, graphics, images, sound/audio, animation and/or video. 7. What are input devices and output devices of a computer? An input device, such as a computer keyboard or mouse, can send information (input) to the computer, but it cannot receive information (output) from the computer. An output device, such as a computer monitor or printer, can receive information (output) from the computer, but it cannot send information (input) to the computer. 8. Define Information technology (IT)? Information Technology refers to anything related to computing technology, such as networking, hardware, software, the Internet, or the people that work with these technologies. 9. Define Pointing Devices A pointer represents a small symbol on the screen.It usually represents on the screen in Graphical User Interface(GUI).Various Pointing Devices are MOUSE, JOYSTICK etc. 10. Differentiate Impact and Non impact Printer? An impact printer prints characters and graphics on the paper with strikes of hammer on a ribbon and the paper e.g.DOT MATRIX PRINTER. NON IMPACT PRINTER prints the output on paper without striking against the ribbon and the paper. 11. What is the difference between a copy and a scan? Scan results in an image of your document being sent to your computer whereas copy puts an image of your original on paper. 12. Differentiate Spyware vs. Malware. Spyware and Malware both are software programs which are harmful. Both infect the computer and steal the data by gaining access to the computer system. Spyware is software that aids in gathering information about a person or organization without their knowledge and that may send such information to another entity without the consumer’s consent, or that asserts control over a computer without the consumer’s knowledge. Malware is software used or created by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. 13. What do you mean by Gopher? A system that pre-dates the World Wide Web for organizing and displaying files on Internet servers. A Gopher server presents its contents as a hierarchically structured list of files. With the ascendance of the Web, many gopher databases were converted to Web sites which can be more easily accessed via Web search engines. 14. What is Extranet? An extranet is a private network that uses Internet technology and the public telecommunication system to securely share part of a business's information or operations with suppliers, vendors, partners, customers, or other businesses. 15. What are System Utilities? System utilities are the core software functions that allow you to manage your computer in ways that you would find it inconceivable to be without. System utilities may be already included in your computer or downloaded from the Internet. 16. What do you mean by Proxy server? In computer networks, a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. 17. What do you mean by WAIS? WAIS (Wide Area Information Servers) is an Internet system in which specialized subject databases are created at multiple server locations, kept track of by a directory of servers at one location, and made accessible for searching by users with WAIS client programs. 18. What is Virtual Reports? Virtual Reports is a free, secure, web-hosted online reporting system that let’s you take control of your transaction reporting. Merchants can access their account information 24 hours a day, 7 days a week. 19. What is an Assembler? An assembler is a program that takes basic computer instructions and converts them into a pattern of bits that the computer's processor can use to perform its basic operations. Some people call these instructions assembler language and others use the term assembly language. 20. What is Cache Memory? Cache (pronounced cash) memory is extremely fast memory that is built into a computer’s central processing unit (CPU), or located next to it on a separate chip. The CPU uses cache memory to store instructions that are repeatedly required to run programs, improving overall system speed. 21. What do you mean by Multitasking? A multitasking operating system is any type of system that is capable of running more than one program at a time. Most modern operating systems are configured to handle multiple programs simultaneously, with the exception of some privately developed systems that are designed for use in specific business settings. 22. What are Positional and Non Positional number System? A positional notation numeral system in which each position is related to the next by a constant multiplier of that numeral system. For each position that the number is in, in that system has a relative symbol or meaning, and in a way relates to the number directly next to it. The total value of a positional number is the total of the resultant values of all positions. In a non-positional number system, each number in each position does not have to be positional itself. Every system varies by country and it depends on symbols and values set by the people of that country. For example, the Egyptians use Hieroglyphics, and the Greeks use a numeral system. 23. Define Machine code or machine language. Machine code or machine language is a set of instructions executed directly by a computer's central processing unit (CPU). Each instruction performs a very specific task, such as a load, a jump, or an ALU operation on a unit of data in a CPU register or memory. 24. Explain Assembly language. Assembly language is converted into executable machine code by a utility program referred to as an assembler; the conversion process is referred to as assembly, or assembling the code. Assembly language uses a mnemonic to represent each lowlevel machine instruction or operation. 25. Difference Between RAM and ROM. There is one major difference between a ROM and a RAM chip. A ROM chip is nonvolatile storage and does not require a constant source of power to retain information stored on it. When power is lost or turned off, a ROM chip will keep the information stored on it. In contrast, a RAM chip is volatile and requires a constant source of power to retain information. When power is lost or turned off, a RAM chip will lose the information stored on it. C Programming Language Question Bank 1. Where is C programming language used or uses of C language? C language is used to develop system applications that forms major portion of operating systems such as Windows, UNIX and Linux. Operating systems, C compiler and all UNIX application programs are written in C language. Below are some examples of uses of C language. Database systems Graphics packages Word processors Spread sheets Operating system development Compilers and Assemblers Network drivers Interpreters 2. What is the difference between top down approach and bottom up approach in programming languages? Top down approach and bottom up approach are involved in software development. These approaches are not involved in program execution. Structure/procedure oriented programming languages like C programming language follows top down approach. Whereas object oriented programming languages like C++ and Java programming language follows bottom up approach. Top down approach begins with high level design and ends with low level design or development. Whereas, bottom up approach begins with low level design or development and ends with high level design. In top down approach, main() function is written first and all sub functions are called from main function. Then, sub functions are written based on the requirement. Whereas, in bottom up approach, code is developed for modules and then these modules are integrated with main() function. Now-a-days, both approaches are combined together and followed in modern software design. 3. What do you mean by by programming language and give some examples? Programming language is nothing but a language designed to communicate to machines through instructions and commands. Normally machines are computers. Programs are written using some programming languages to control the behavior of machines/computers and to make them to perform required tasks. Programming language example: Assembly language, C language, C++ language, Java, C#, .NET, Python etc. 4. List the characteristics of C language? Reliability Portability Flexibility Interactivity Modularity Efficiency and Effectiveness 5. What is embedded C? Embedded C is the extension of C programming language. Embedded C is used to develop micro controller based applications. Embedded C includes features not available in normal C like fixed-point arithmetic, named address spaces, and basic I/O hardware addressing. Cell phones, MP3 players are some example for embedded systems in which embedded C is used to program and control these devices. 6. Which level is C language belonging to? C language is belonging to middle level language. C language behaves as a bridge between machine level (low level) languages and high level languages. C language is more user friendly than machine level languages. And, C language does not support all the concepts that high level languages offer. So, C programming language is called as middle level language. 7. Differentiate structured oriented, object oriented and non-structure oriented programming language? Structured oriented programming language – In this type of language, large programs are divided into small programs called functions. Prime focus is on functions and procedures that operate on data Data moves freely around the systems from one function to another Program structure follows “Top Down Approach” Example: C, Pascal, ALGOL and Modula-2 Object oriented programming language – In this type of language, programs are divided into objects Prime focus is on the data that is being operated and not on the functions or procedures Data is hidden and cannot be accessed by external functions Program structure follows “Bottom UP Approach” Example: C++, JAVA and C# (C sharp) Non-structure oriented programming language – There is no specific structure for programming this language. Example: BASIC, COBOL, FORTRAN 8. Differentiate between assembler, compiler and interpreter? Assembler is a program that converts assembly level language (low level language) into machine level language. Compiler compiles entire C source code into machine code. Whereas, interpreters converts source code into intermediate code and then this intermediate code is executed line by line. 9. Define printf() and scanf() ? printf() is an inbuilt library function in C which is available in C library by default. This function is declared and related macros are defined in “stdio.h” header file. printf() function is used to print the “character, string, float, integer, octal and hexadecimal values” onto the output screen. scanf() function is an inbuilt library function in C which is available in C library by default. This function is declared and related macros are defined in “stdio.h” header file. scanf() function is used to read character, string, numeric data from keyboard. 10. What is the use of main() function in C? main() function is the function from where execution of any C program begins. So, main() function is mandatory for any C program. 11. List all the sections that a C program may/must have? There are many sections in a C program structure. They are, Documentation section Link Section Definition Section Global declaration section Function prototype declaration section Main function User defined function section main() function section is the important section in a C program as program execution starts from main() function only in C language. A C program may not have all other sections except main() function. 12. What is IDE stands for? IDE is nothing but Integrated Development Environment. IDE is a tool that provides user interface with compilers to create, compile and execute C programs. Example: Turbo C++, Borland C++ and DevC++. These provide Integrated Development Environment with compiler for both C and C++ programming language. 13. Is C language case sensitive? Yes. C language instructions/commands/functions and everything used in C program are case sensitive. 14. Define data type in C? Data types in C language are defined as the data storage format that a variable can store a data to perform a specific operation. Data types are used to define a variable before to use in a program. Size of variable, constant and array are determined by data types. 15. What is the difference between int , char, float & double data types? Integer data type allows a variable to store numeric values. The storage size of int data type is 2 or 4 or 8 byte. It varies depend upon the processor in the CPU. Character data type allows a variable to store only one character. Storage size of character data type is 1. Float data type allows a variable to store decimal values. Storage size of float data type is 4. This also varies depend upon the processor in the CP. Double data type is also same as float data type which allows up-to 10 digits after decimal. 16. What is the use of sizeof() function in C? sizeof() function is used to find the memory space allocated for each data type in C. 17. What is enum in C? Enumeration is a data type that consists of named integer constants as a list. It start with 0 (zero) by default and value is incremented by 1 for the sequential identifiers in the list. 18. What is void? void is an empty data type that has no value. We use void data type in functions when we don’t want to return any value to the calling function. Example:void sum (int a, int b); – This function won’t return any value to the calling function. 19. What are the types of C tokens? C tokens are the basic buildings blocks in C language which are constructed together to write a C program. Each and every smallest individual unit in a C program are known as C tokens. C tokens are of six types. They are, 1. 2. 3. 4. 5. 6. Keywords Identifiers Constants Strings Special symbols Operators (eg: int, while), (eg: main, total), (eg: 10, 20), (eg: “total”, “hello”), (eg: (), {}), (eg: +, /,-,*) 20. What is identifier in C? Each program elements in a C program are given a name called identifiers. Names given to identify Variables, functions and arrays are examples for identifiers. Example: x is a name given to integer variable in above program 21. What is keyword in C? Keywords are pre-defined words in a C compiler. Each keyword is meant to perform a specific function in a C program. Since keywords are referred names for compiler, they can’t be used as variable name. auto, double, int, struct, break, else, long, switch, case, enum, register, typedef, char, extern, return, union, const, float, short, unsigned, continue, for, signed, void, default, goto, sizeof, volatile, do, , if, static, while 22. What do you mean by constants in C? Constants refer to fixed values. They are also called as literals. C Constants are also like normal variables. But, only difference is, constant values can’t be modified by the program once they are defined. Constants may be belonging to any of the data type. 23. Classify the types of constants in C? Integer constants Real or Floating point constants Octal & Hexadecimal constants Character constants String constants Backslash character constants 24. What is variable in C? C variable is a named location in a memory where a program can manipulate the data. This location is used to hold the value of the variable. The value of the C variable may get change in the program. C variable might be belonging to any of the data type like int, float, char etc. 25. What is the difference between constant and variable in C? Constant values can’t be modified by the program once it is declared. But, variable values can be modified by the program. 26. Can variable name start with numbers? No. Variable names can’t start with numbers as per the variable naming rule. 27. What is the difference between variable declaration and variable definition in C? Variable declaration tells the compiler about data type and size of the variable. Whereas, variable definition allocates memory to the variable Variable can be declared many times in a program. But, definition can happen only one time for a variable in a program. Variable declaration is for assignment of properties and identification to a variable. Whereas, variable definition is for assignments of storage space to a variable 28. What is operator in C? The symbols which are used to perform logical and mathematical operations in a C program are called C operators. These C operators join individual constants and variables to form expressions. Operators, functions, constants and variables are combined together to form expressions. 29. What are the different types of operators in C? C language offers many types of operators. They are, Arithmetic operators Assignment operators Relational operators Logical operators Bit wise operators Conditional operators (ternary operators) Increment/decrement operators Special operators 30. What is the syntax for ternary operator in C? Ternary operator is same as if else control statement in C. Syntax : (Condition? true_value: false_value); Example: (A > 100? 0: 1); 31. What are all decision control statements in C? There are 3 types of decision making control statements in C language. They are, if statements if else statements nested if statements 32.What are all loop control statements in C? Loop control statements in C are used to perform looping operations until the given condition is true. Control comes out of the loop statements once condition becomes false. There are 3 types of loop control statements in C language. They are, for while do-while 33.What is the difference between while and do-while loops in C? While loop is executed only when given condition is true. Whereas, do-while loop is executed for first time irrespective of the condition. After executing while loop for first time, then condition is checked. 34.What is the difference between single equal “=” and double equal “==” operators in C? Single equal is an assignment operator used to assign the values to the variables. But, double equal is relational operator used to compare two variable values whether they are equal are not. 35.What is the difference between pre increment operator and post increment operator in C? Pre increment operator is used to increment variable value by 1 before assigning the value to the variable. Post increment operator is used to increment variable value by 1 after assigning the value to the variable. 36.What is the difference between pre decrement operator and post decrement operator? Pre decrement operator is used to decrement variable value by 1 before assigning the value to the variable. Post decrement operator is used to decrement variable value by 1 after assigning the value to the variable. 37.What is “&” and “*” operators in C? “*” Operator is used as pointer to a variable. Example: * a where * is pointer to the variable a. & operator is used to get the address of the variable. Example: &a will give address of a. 38. What will happen if break statement is not used in switch case in C? Switch case statements are used to execute only specific case statements based on the switch expression. If we do not use break statement at the end of each case, program will execute all consecutive case statements until it finds next break statement or till the end of switch case block. 39. Why is default statement used in switch case in C? Switch case statements are used to execute only specific case statements based on the switch expression. If switch expression does not match with any case, default statements are executed by the program. 40.What is the use of “goto” statement? goto statement is used to transfer the normal flow of a program to the specified label in the program. 41. What value will be assigned to the variable X if a = 10, b = 20, c = 30, d = 40 in below expression? X = a/b+c*d-c; The above arithmetic operation is performed based on the precedence of the operators. In above mentioned expression, c*d will be performed first. Then, a/b, then (c*d)-c, then (a/b) + ((c*d)-c). Please check the operator precedence table to know the priority and associativity of the C operators. Output of the above expression is 1170. 42. What value is assigned to the below variables? int X1 = 13/3; int X2 = 13%3; The value of X1 is 4 The value of X2 is 1 43. What is the difference between auto variable and register variable in C? Storage class of all variables are auto by default unless we specify a variable is register or static or extern in C program. Both auto variable and register variable are local variables. Register variables are stored in register memory. Whereas, auto variables are stored in main CPU memory. Register variables will be accessed very faster than the normal/auto variables since they are stored in register memory rather than main memory. But, only limited variables can be used as register since register size is very low. (16 bits, 32 bits or 64 bits) 44. What is the difference between auto variable and static variable in C? Both auto and static variables are local variables. Static variables can retain the value of the variable between different function calls. But, scope of auto variable is within the function only. It can’t retain the value of the variable between different function calls. 45. How many arguments can be passed to a function in C? Any number of arguments can be passed to a function. There is no limit on this. Function arguments are stored in stack memory rather than heap memory. Stack memory allocation is depending on the operating system. So, any number of arguments can be passed to a function as much as stack has enough memory. Program may crash when stack overflows. 46. What is the difference between exit() and return() in C? exit() is a system call which terminates current process. exit() is not an instruction of C language. Whereas, return() is a C language instruction/statement and it returns from the current function (i.e. provides exit status to calling function and provides control back to the calling function). 47. What is the use of “#define” in C? #define is a pre-processor directive which is used to define constant value. This constant can be any of the basic data types. 48. What is the syntax for comments in C? The characters or words or anything which are given between “/*” and “*/”, won’t be considered by C compiler for compilation process. These will be ignored by C compiler during compilation. Syntax: /* comments */ 49. Can array subscripts have negative value in C? No. Array subscripts should not have negative value. Always, it should be positive. 50. What are library functions and their use in C language? Can we write our own functions and include them in C library? Library functions in C language are inbuilt functions which are grouped together and placed in a common place called library. The use of library function is to get the predefined output instead of writing our own code to get those outputs. Yes. We can write our own functions and include them in C library. 51. What are the different storage classes in C? The scope and lifetime of a variable or / and function within a C program is defined by storage class. There are four storage classes in C auto - It is the default storage class for all variables and / or functions. register - Allows for defining variables to store in CPU register instead of RAM. Unary operator is not applied for register variable. static – The static storage class allows the updated variable values available for the next time when the function, in which the variable is defined , is invoked for the next time. extern - It allows a global variable to be visible to all the program files / external files 52. Can include files be nested? Yes. Include files can be nested any number of times. As long as you use precautionary measures, you can avoid including the same file twice. In the past, nesting header files was seen as bad programming practice, because it complicates the dependency tracking function of the MAKE program and thus slows down compilation. Many of today’s popular compilers make up for this difficulty by implementing a concept called precompiled headers, in which all headers and associated dependencies are stored in a precompiled state. 53. What is a null pointer? There are times when it’s necessary to have a pointer that doesn’t point to anything. The macro NULL, defined in, has a value that’s guaranteed to be different from any valid pointer. NULL is a literal zero, possibly cast to void* or char*. The null pointer is used in three ways: 1) To stop indirection in a recursive data structure. 2) As an error value. 3) As a sentinel value. 54. What are header files and what are its uses in C programming? Header files are also known as library files. They contain two essential things: the definitions and prototypes of functions being used in a program. Simply put, commands that we use in C programming are actually functions that are defined from within each header files. Each header file contains a set of functions. For example: stdio.h is a header file that contains definition and prototypes of commands like printf and scanf. 55. Write down the equivalent pointer expression for referring the same element a[i][j][k][l] ? a[i] == *(a+i) a[i][j] == *(*(a+i)+j) a[i][j][k] == *(*(*(a+i)+j)+k) a[i][j][k][l] == *(*(*(*(a+i)+j)+k)+l) 56. Difference between const char* p and char const* p In const char* p, the character pointed by ‘p’ is constant, so we can’t change the value of character pointed by p but we can make ‘p’ refer to some other location. In char const* p, the ptr ‘p’ is constant not the character referenced by it, so we can’t make ‘p’ to reference to any other location but we can change the value of the char pointed by ‘p’. 57. When should the register modifier be used? The register modifier hints to the compiler that the variable will be heavily used and should be kept in the CPU’s registers, if possible, so that it can be accessed faster. 58. Why n++ executes faster than n+1? The expression n++ requires a single machine instruction such as INR to carry out the increment operation whereas; n+1 requires more instructions to carry out this operation. 59. Why doesn't the following statement work? char str[ ] = "Hello" ; strcat ( str, '!' ) ; Answer: The string function strcat( ) concatenates strings and not a character. The basic difference between a string and a character is that a string is a collection of characters, represented by an array of characters whereas a character is a single character. To make the above statement work writes the statement as shown below: strcat ( str, "!" ) ; 60. What is the purpose of main( ) function ? The function main( ) invokes other functions within it. It is the first function to be called when the program starts execution. · It is the starting function · It returns an int value to the environment that called the program · Recursive call is allowed for main( ) also. · It is a user-defined function · Program execution ends when the closing brace of the function main( ) is reached. · It has two arguments 1) argument count and 2) argument vector (represents strings passed). · Any user-defined name can also be used as parameters for main( ) instead of argc and argv 61. What will be the output of the following: main() { static int var = 5; printf("%d ",var--); if(var) main(); } Answer: 5 4 3 2 1 Explanation: When static storage class is given, it is initialized once. The change in the value of a static variable is retained even between the function calls. Main is also treated like any other ordinary function, which can be called recursively. 62. main() { char *p; printf("%d %d ",sizeof(*p),sizeof(p)); } Answer: 1 2 Explanation: The sizeof() operator gives the number of bytes taken by its operand. P is a character pointer, which needs one byte for storing its value (a character). Hence sizeof(*p) gives a value of 1. Since it needs two bytes to store the address of the character pointer sizeof(p) gives 2. 63. main() { int i=3; switch(i) { default:printf("zero"); case 1: printf("one"); break; case 2:printf("two"); break; case 3: printf("three"); break; } } Answer: three Explanation: The default case can be placed anywhere inside the loop. It is executed only when all other cases doesn't match. 64. main() { int printf("%d%d%d%d%d%d",i++,i--,++i,--i,i); } Answer: 45545 i=5; Explanation: The arguments in a function call are pushed into the stack from left to right. The evaluation is by popping out from the stack. And the evaluation is from right to left, hence the result. 65. #define square(x) x*x main() { int i; i = 64/square(4); printf("%d",i); } Answer: 64 Explanation: the macro call square(4) will substituted by 4*4 so the expression becomes i = 64/4*4 . Since / and * has equal priority the expression will be evaluated as (64/4)*4 i.e. 16*4 = 64 66. #include <stdio.h> #define a 10 main() { #define a 50 printf("%d",a); } Answer: 50 Explanation: The preprocessor directives can be redefined anywhere in the program. So the most recently assigned value will be taken. 67. What are the auto variables? Where are they stored? The auto variables are stored in the memory of the system. The keyword ‘auto’ is optional. Many of the variables used by the program / application are ‘auto’ variables, being the main memory is faster. These variables are stored in the memory runtime stack. 68. What is a structure? Structure is a collection of heterogeneous (i.e. related data items which can be of different types) held together to a single unit. The data items enclosed within a structure are called its members which may be of data type int, float, char, array etc. 69. What is a pointer? Pointer is a variable that contains address of another variable in the memory. Pointers are quite useful in creation of linked data structures (such as linked lst, trees graphs), managing object allocated memory dynamically, optimize the program to execute faster and use less memory. 70. What are macros? What are its advantages and disadvantages? Macro is a Pre-processor. Major advantage of using the macro is to increase the speed of the execution of the program. Major disadvantage of the macros are: (i) No type checking is performed in macro. This may cause error. (ii) A macro call may cause unexpected results. 71. What is difference between Structure and Unions? (i) In structure every member has its own memory whereas in union its members share the same member space. (ii) In structure, it is possible to initialize all the members at the same time which is not possible in case of union. (iii) A structure requires more space than union(for the same type of members). (iv) In union different interpretations of the same memory space are possible which is not so in case of structures. 72. What are the advantages of using Unions? (i) Efficient use of memory as it does not demand memory space for its all members rather it require memory space for its largest member only. (ii) Same memory space can be interpreted differently for different members of the union. 73. What is the difference between ordinary variable and pointer in C? An ordinary variable is like a container it can hold any value and we can change the value of ordinary variable at a time throughout the program .A pointer is a variable that stores the address of another Variable. 74. How are pointer variables initialized? Pointer variable are initialized by one of the following two ways - Static memory allocation - Dynamic memory allocation 75. What is modular programming? If a program is large, it is subdivided into a number of smaller programs that are called modules or subprograms. If a complex problem is solved using more modules, this approach is known as modular programming 76. Where do global, static, local, register variables and C Program instructions get stored? Global, static, local: In main memory Register variable: In registers C program: In main memory. 77. Why are all header files not declared in every C program? Declaring all header files in every program would lead to increase in the overall file size and load of the program. It is not a good programming. The choice header files that you want to declare in the program depends on the commands/functions you want to use in the program. Each header file contains different commands and functions. So we use only the files relevant to our program. 78. Define Operator, Operand, and Expression in 'C'? Operators are symbols which take one or more operands or expressions and perform arithmetic or logical computations. Operands are variables or expressions which are used in operators to evaluate the expression. Combination of operands and operators form an expression. 79. Predict the output or error enum colors {BLACK,BLUE,GREEN} main() { printf("%d..%d..%d",BLACK,BLUE,GREEN); return(1); } Answer: 0..1..2 Explanation: enum assigns numbers starting from 0, if not explicitly defined. 80. What are the four types of scope in c? Block scope. Function scope. File scope. Program scope. 81. What is nested structure? A structure is a collection of one or more variables, possibly of different data types, grouped together under a single name for convenient handling. Structures can contain other structures as members; in other words, structures can nest. 82. What is difference between declaration and definition? During declaration we just specify the type and no memory is allocated to the variable. But during the definition an initial value is assigned and memory is allocated to the variable. 83. Differentiate between #include<...> and #include "..." #include<...> means that the directories other than the current one will be searched for the header file. #include "..." means that the current directory will be searched for the header file before any other directories. 84. What is self referential structure? A self-referential structure is one of the data structures which refer to the pointer to (points) to another structure of the same type. 85. What are the uses of a pointer? (i) It is used to access array elements (ii) It is used for dynamic memory allocation. (iii) It is used in Call by reference (iv) It is used in data structures like trees, graph, linked list etc. 86. What does *p++ do? What does it point to? *p++ increments p. It returns the value pointed to by p before incrementation. 87. What are enumerations? They are a list of named integer-valued constants. Example: enum color { black , orange=4,yellow, green, blue, violet };This declaration defines the symbols “black”, “orange”, “yellow”, etc. to have the values “1,” “4,” “5,” … etc. The difference between an enumeration and a macro is that the enum actually declares a type, and therefore can be type checked. 88. Are pointers integer? No, pointers are not integers. A pointer is an address. It is a positive number. 89. What is static memory allocation? Compiler allocates memory space for a declared variable. By using the address of operator, the reserved address is obtained and this address is assigned to a pointer variable. This way of assigning pointer value to a pointer variable at compilation time is known as static memory allocation. 90. What is dynamic memory allocation? A dynamic memory allocation uses functions such as malloc() or calloc() to get memory dynamically. If these functions are used to get memory dynamically and the values returned by these function are assigned to pointer variables, such a way of allocating memory at run time is known as dynamic memory allocation. 91. List out differences between structures and arrays The following are the differences between structures and arrays: - Array elements are homogeneous. Structure elements are of different data type. - Array allocates static memory and uses index / subscript for accessing elements of the array. Structures allocate dynamic memory and uses (.) operator for accessing the member of a structure. - Array is a pointer to the first element of it. Structure is not a pointer - Array element access takes less time in comparison with structures. 92. What is FILE? FILE is a predefined data type. It is defined in stdio.h file. 93. What is a file? A file is a region of storage in hard disks or in auxiliary storage devices. It contains bytes of information .It is not a data type. 94. What is wrong with this statement? myName = “Vansh”; We cannot use the = sign to assign values to a string variable. Instead, use the strcpy function. The correct statement would be: strcpy(myName, “Vansh”); 95. How do you determine the length of a string value that was stored in a variable? To get the length of a string value, use the function strlen(). For example, if we have a variable named Name, we can get the length of the stored string value by using this statement: I = strlen(Name); the variable I will now have the character length of the string value. 96. What is the difference between text files and binary files? Text files contain data that can easily be understood by humans. It includes letters, numbers and other characters. On the other hand, binary files contain 1s and 0s that only computers can interpret. 97. What are merits and demerits of array in c? Merits: (a) We can easily access each element of array. (b) Not necessity to declare too many variables. (c) Array elements are stored in continuous memory location. Demerits: (a) Wastage of memory space. We cannot change size of array at the run time. (b) It can store only similar type of data. 98. What are pre-processor directives? Pre-processor directives are placed at the beginning of a C program. They begin with # symbol. This is the place, where library files are specified depending on the functions to be used in the program. Pre-processor directives are also used for declaration of constants. 99. Is it possible to pass an entire structure to functions? Yes, it is possible to pass an entire structure to a function in a call by method style. Some programmers prefer to declare the structure globally, and then pass a variable of that structure type to a function. It helps in maintaining the consistency and uniformity in terms of argument type. 100. How do you access the values within an array? Arrays contain a number of elements, depending on the size you assigned it during variable declaration. Each element is assigned a number from 0 to number of elements-1. To assign or retrieve the value of a particular element, refer to the element number. For example: if we have a declaration that says “int marks[6];”, then we have 6 accessible elements, namely: marks[0], marks[1], marks[2], marks[3], marks[4] and marks[5]. Software Engineering Question Bank 1. What is computer software? Computer software is a complete package, which includes software program, its documentation and user guide on how to use the software. 2. Can you differentiate computer software and computer program? A computer program is piece of programming code which performs a well defined task where as software includes programming code, its documentation and user guide. 3. What is software engineering? Software engineering is an engineering branch associated with software system development. 4. When you know programming, what is the need to learn software engineering concepts? A person who knows how to build a wall may not be good at building an entire house. Likewise, a person who can write programs may not have knowledge of other concepts of Software Engineering. The software engineering concepts guide programmers on how to assess requirements of end user, design the algorithms before actual coding starts, create programs by coding, testing the code and its documentation. 5. What is software process or Software Development Life Cycle (SDLC)? Software Development Life Cycle, or software process is the systematic development of software by following every stage in the development process namely, Requirement Gathering, System Analysis, Design, Coding, Testing, Maintenance and Documentation in that order. 6. What are SDLC models available? There are several SDLC models available such as Waterfall Model, Iterative Model, Spiral model, V-model and Big-bang Model etc. 7. What are various phases of SDLC? The generic phases of SDLC are: Requirement Gathering, System Analysis and Design, Coding, Testing and implementation. The phases depend upon the model we choose to develop software. 8. Which SDLC model is the best? SDLC Models are adopted as per requirements of development process. It may very software-to-software to ensuring which model is suitable. We can select the best SDLC model if following answers are satisfied Is SDLC suitable for selected technology to implement the software ? Is SDLC appropriate for client’s requirements and priorities ? Is SDLC model suitable for size and complexity of the software ? Is the SDLC model suitable for type of projects and engineering we do ? Is the SDLC appropriate for the geographically co-located or dispersed developers ? 9. What is software project management? Software project management is process of managing all activities like time, cost and quality management involved in software development. 10. Who is software project manager? A software project manager is a person who undertakes the responsibility of carrying out the software project. 11. What does software project manager do? Software project manager is engaged with software management activities. He is responsible for project planning, monitoring the progress, communication among stakeholders, managing risks and resources, smooth execution of development and delivering the project within time, cost and quality contraints. 12. What is software scope? Software scope is a well-defined boundary, which encompasses all the activities that are done to develop and deliver the software product. The software scope clearly defines all functionalities and artifacts to be delivered as a part of the software. The scope identifies what the product will do and what it will not do, what the end product will contain and what it will not contain. 13. What is project estimation? It is a process to estimate various aspects of software product in order to calculate the cost of development in terms of efforts, time and resources. This estimation can be derived from past experience, by consulting experts or by using pre-defined formulas. 14. How can we derive the size of software product? Size of software product can be calculated using either of two methods Counting the lines of delivered code Counting delivered function points 15. What are function points? Function points are the various features provided by the software product. It is considered as a unit of measurement for software size. 16. What are software project estimation techniques available? There are many estimation techniques available.The most widely used are Decomposition technique (Counting Lines of Code and Function Points) Empirical technique (Putnam and COCOMO). 17. What is baseline? Baseline is a measurement that defines completeness of a phase. After all activities associated with a particular phase are accomplished, the phase is complete and acts as a baseline for next phase. 18. What is Software configuration management? Software Configuration management is a process of tracking and controlling the changes in software in terms of the requirements, design, functions and development of the product. 19. What is change control? Change control is function of configuration management, which ensures that all changes made to software system are consistent and made as per organizational rules and regulations. 20. How can you measure project execution? We can measure project execution by means of Activity Monitoring, Status Reports and Milestone Checklists. 21. Mention some project management tools. There are various project management tools used as per the requirements of software project and organization policies. They include Gantt Chart, PERT Chart, Resource Histogram, Critical Path Analysis, Status Reports, Milestone Checklists etc. 22. What are software requirements? Software requirements are functional description of proposed software system. Requirements are assumed to be the description of target system, its functionalities and features. Requirements convey the expectations of users from the system. 23. What is feasibility study? It is a measure to assess how practical and beneficial the software project development will be for an organization. The software analyzer conducts a thorough study to understand economic, technical and operational feasibility of the project. Economic - Resource transportation, cost for training, cost of additional utilities and tools and overall estimation of costs and benefits of the project. Technical - Is it possible to develop this system ? Assessing suitability of machine(s) and operating system(s) on which software will execute, existing developers’ knowledge and skills, training, utilities or tools for project. Operational - Can the organization adjust smoothly to the changes done as per the demand of project ? Is the problem worth solving ? 24. How can you gather requirements? Requirements can be gathered from users via interviews, surveys, task analysis, brainstorming, domain analysis, prototyping, studying existing usable version of software, and by observation. 25. What is SRS? SRS or Software Requirement Specification is a document produced at the time of requirement gathering process. It can be also seen as a process of refining requirements and documenting them. 26. What are functional requirements? Functional requirements are functional features and specifications expected by users from the proposed software product. 27. What are non-functional requirements? Non-functional requirements are implicit and are related to security, performance, look and feel of user interface, interoperability, cost etc. 28. What is software measure? Software Measures can be understood as a process of quantifying and symbolizing various attributes and aspects of software. 29. What is software metric? Software Metrics provide measures for various aspects of software process and software product. They are divided into – Requirement metrics : Length requirements, completeness Product metrics :Lines of Code, Object oriented metrics, design and test metrics Process metrics: Evaluate and track budget, schedule, human resource. 30. What is modularization? Modularization is a technique to divide a software system into multiple discreet modules, which are expected to carry out task(s) independently. 31. What is concurrency and how it is achieved in software? Concurrency is the tendency of events or actions to happen simultaneously. In software, when two or more processes execute simultaneously, they are called concurrent processes. Example While you initiate print command and printing starts, you can open a new application. Concurrency, is implemented by splitting the software into multiple independent units of execution namely processes and threads, and executing them in parallel. 32. What is cohesion? Cohesion is a measure that defines the degree of intra-dependability among the elements of the module. 33. What is coupling? Coupling is a measure that defines the level of inter-dependability among modules of a program. 34. Mentions some software analysis & design tools? These can be: DFDs (Data Flow Diagrams), Structured Charts, Structured English, Data Dictionary, HIPO (Hierarchical Input Process Output) diagrams, ER (Entity Relationship) Diagrams and Decision tables. 35.What is level-0 DFD? Highest abstraction level DFD is known as Level 0 DFD also called a context level DFD, which depicts the entire information system as one diagram concealing all the underlying details. 36. What is the difference between structured English and Pseudo Code? Structured English is native English language used to write the structure of a program module by using programming language keywords, whereas, Pseudo Code is more close to programming language and uses native English language words or sentences to write parts of code. 37. What is data dictionary? Data dictionary is referred to as meta-data. Meaning, it is a repository of data about data. Data dictionary is used to organize the names and their references used in system such as objects and files along with their naming conventions. 38. What is structured design? Structured design is a conceptualization of problem into several well-organized elements of solution. It is concern with the solution design and based on ‘divide and conquer’ strategy. 39. What is the difference between function oriented and object oriented design? Function-oriented design is comprised of many smaller sub-systems known as functions. Each function is capable of performing significant task in the system. Object oriented design works around the real world objects (entities), their classes (categories) and methods operating on objects (functions). 40.Briefly define top-down and bottom-up design model. Top-down model starts with generalized view of system and decomposes it to more specific ones, whereas bottom-up model starts with most specific and basic components first and keeps composing the components to get higher level of abstraction. 41. What is the basis of Halstead’s complexity measure? Halstead’s complexity measure depends up on the actual implementation of the program and it considers tokens used in the program as basis of measure. 42. Mention the formula to calculate Cyclomatic complexity of a program? Cyclomatic complexity uses graph theory’s formula: V(G) = e – n + 2 43. What is functional programming? Functional programming is style of programming language, which uses the concepts of mathematical function. It provides means of computation as mathematical functions, which produces results irrespective of program state. 44. Differentiate validation and verification? Validation checks if the product is made as per user requirements whereas verification checks if proper steps are followed to develop the product. Validation confirms the right product and verification confirms if the product is built in a right way. 45. What is black-box and white-box testing? Black-box testing checks if the desired outputs are produced when valid input values are given. It does not verify the actual implementation of the program. White-box testing not only checks for desired and valid output when valid input is provided but also it checks if the code is implemented correctly. Criteria Knowledge of software program, design and structure essential Knowledge of Software Implementation essential Who conducts this test on software baseline reference for tester Black Box Testing White Box Testing No Yes No Yes Software Employee Testing Software Developer Requirements Design and specifications structure details 46. Quality assurance vs. Quality Control? Quality Assurance monitors to check if proper process is followed while software developing the software. Quality Control deals with maintaining the quality of software product. 47. What are various types of software maintenance? Maintenance types are: corrective, adaptive, perfective and preventive. Corrective Removing errors spotted by users Adaptive tackling the changes in the hardware and software environment where the software works Perfective maintenance implementing changes in existing or new requirements of user Preventive maintenance taking appropriate measures to avoid future problems 48. What is software re-engineering? Software re-engineering is process to upgrade the technology on which the software is built without changing the functionality of the software. This is done in order to keep the software tuned with the latest technology. 49. What are CASE tools? CASE stands for Computer Aided Software Engineering. CASE tools are set of automated software application programs, which are used to support, accelerate and smoothen the SDLC activities. Computer Network Question Bank 1. Define Network? A network is a set of devices connected by physical media links. A network is recursively is a connection of two or more nodes by a physical link or two or more networks connected by one or more nodes. 2. What is a node? A network can consist of two or more computers directly connected by some physical medium such as coaxial cable or optical fiber. Such a physical medium is called as Links and the computer it connects is called as Nodes. 3. What is a gateway or Router? A node that is connected to two or more networks is commonly called as router or Gateway. It generally forwards message from one network to another. 4. What do you mean by Multiple Access? If the physical links are shared by more than two nodes, it is said to be Multiple Access. 5. List the advantages of Distributed Processing? a. Security/Encapsulation b. Distributed database c. Faster Problem solving d. Security through redundancy e. Collaborative Processing 6. Point the criteria necessary for an effective and efficient network? a. Performance It can be measured in many ways, including transmit time and response time. b. Reliability It is measured by frequency of failure, the time it takes a link to recover from a failure, and the network's robustness. c. Security Security issues includes protecting data from unauthorized access and virues. 7. Name the factors that affect the performance of the network? a. Number of Users b. Type of transmission medium c. Hardware d. Software 8. List the factors that affect the reliability of the network? a. Frequency of failure b. Recovery time of a network after a failure 9. Define Protocol? A protocol is a set of rules that govern all aspects of information communication. 10. What are the key elements of protocols? The key elements of protocols are a. Syntax It refers to the structure or format of the data, that is the order in which they are presented. b. Semantics It refers to the meaning of each section of bits. c. Timing Timing refers to two characteristics: When data should be sent and how fast they can be sent. 11. What are the key design issues of a computer Network? a. Connectivity b. Cost-effective Resource Sharing c. Support for common Services d. Performance 12. Define Bandwidth and Latency? Network performance is measured in Bandwidth (throughput) and Latency (Delay). Bandwidth of a network is given by the number of bits that can be transmitted over the network in a certain period of time. Latency corresponds to how long it t5akes a message to travel from one end off a network to the other. It is strictly measured in terms of time. 13. Define Routing? The process of determining systematically hoe to forward messages toward the destination nodes based on its address is called routing. 14. What is a peer-peer process? The processes on each machine that communicate at a given layer are called peer-peer process. 15. Define semantic gap? Defining a useful channel involves both understanding the applications requirements and recognizing the limitations of the underlying technology. The gap between what applications expects and what the underlying technology can provide is called semantic gap. 16. What is Round Trip Time? The duration of time it takes to send a message from one end of a network to the other and back, is called RTT. 17. Define the terms Uni casting , Multi casting and Broadcasting? When the message is sent from a source to a single destination node, it is called Unicasting. The message is sent to some subset of other nodes, it is called Multicasting. If the message is sent to all the m nodes in the network it is called Broadcasting. 18. What is Multiplexing? Multiplexing is the set of techniques that allows the simultaneous transmission of multiple signals across a single data link. 19. Name the categories of Multiplexing? a. Frequency Division Multiplexing (FDM) b. Time Division Multiplexing (TDM) i. Synchronous TDM ii. ASynchronous TDM Or Statistical TDM. c. Wave Division Multiplexing (WDM) 20. Define FDM, WDM, TDM. FDM is an analog technique that can be applied when the bandwidth of a link is greater than the combined bandwidths of the signals to be transmitted. WDM is conceptually the same as FDM, except that the multiplexing and demultiplexing involve light signals transmitted through fiber optics channel. TDM is a digital process that can be applied when the data rate capacity of the transmission medium is greater than the data rate required by the sending and receiving devices. 21. What is Synchronous TDM ? In STDM, the multiplexer allocates exactly the same time slot to each device at all times, whether or not a device has anything to transmit. 22. List the layers of OSI Reference Model. a. Physical Layer b. Data Link Layer c. Network Layer d. Transport Layer e. Session Layer f. Presentation Layer g. Application Layer 23. Which layers are network support layers? a. Physical Layer b. Data link Layer and c. Network Layers 24. Which layers are user support layers? a. Session Layer b. Presentation Layer and c. Application Layer 25. Write the various concerns of the Physical Layer? Physical layer coordinates the functions required to transmit a bit stream over a physical medium. a. Physical characteristics of interfaces and media b. Representation of bits c. Data rate d. Synchronization of bits e. Line configuration f. Physical topology g. Transmission mode 26. List the various responsibilities of Data Link Layer? The Data Link Layer transforms the physical layer, a raw transmission facility, to a reliable link and is responsible for node-node delivery. a. Framing b. Physical Addressing c. Flow Control d. Error Control e. Access Control 27. What are the responsibilities of Network Layer? The Network Layer is responsible for the source-to-destination delivery of packet possibly across multiple networks (links). a. Logical Addressing b. Routing 28. Write the various responsibilities of Transport Layer? The Transport Layer is responsible for source-to-destination delivery of the entire message. a. Service-point Addressing b. Segmentation and reassembly c. Connection Control d. Flow Control e. Error Control 29. Discuss the responsibilities of Session Layer? The Session layer is the network dialog Controller. It establishes, maintains and synchronizes the interaction between the communicating systems. a. Dialog control b. Synchronization 30. What are the responsibilities of Presentation Layer? The Presentation layer is concerned with the syntax and semantics of the information exchanged between two systems. a. Translation b. Encryption c. Compression 31. What are the categories of Transmission media? a. Guided Media i. Twisted - Pair cable 1. Shielded TP 2. Unshielded TP ii. Coaxial Cable iii. Fiber-optic cable b. Unguided Media i. Terrestrial microwave ii. Satellite Communication 32. What are the types of errors? a. Single-Bit error In a single-bit error, only one bit in the data unit has changed b. Burst Error A Burst error means that two or more bits in the data have changed. 33. What is Error Detection? What are its methods? Data can be corrupted during transmission. For reliable communication errors must be deducted and Corrected. Error Detection uses the concept of redundancy, which means adding extra bits for detecting errors at the destination. The common Error Detection methods are a. Vertical Redundancy Check (VRC) b. Longitudinal Redundancy Check (VRC) c. Cyclic Redundancy Check (VRC) d. Checksum 34. Define Redundancy? The concept of including extra information in the transmission solely for the purpose of comparison. This technique is called redundancy. 35. What is VRC? It is the most common and least expensive mechanism for Error Detection. In VRC, a parity bit is added to every data unit so that the total number of 1s becomes even for even parity. It can detect all single-bit errors. It can detect burst errors only if the total number of errors in each data unit is odd. 36. Define LRC? In LRC, a block of bits is divided into rows and a redundant row of bits is added to the whole block. It can detect burst errors. If two bits in one data unit are damaged and bits in exactly the same positions in another data unit are also damaged, the LRC checker will not detect an error. In LRC a redundant data unit follows n data units. 37. What is CRC? CRC, is the most powerful of the redundancy checking techniques, is based on binary division. 38. What do you mean by Checksum? Checksum is used by the higher layer protocols (TCP/IP) for error detection 39. List the steps involved in creating the checksum. a. Divide the data into sections b. Add the sections together using 1's complement arithmetic c. Take the complement of the final sum, this is the checksum. 40. Compare Error Detection and Error Correction: The correction of errors is more difficult than the detection. In error detection, checks only any error has occurred. In error correction, the exact number of bits that are corrupted and location in the message are known. The number of the errors and the size of the message are important factors. 41. What are Code Words? "r" redundant bits are added to each block to make the length n = k + r. The resulting n-bit blocks are called codeword's. 2n - 2k codeword's that are not used. These codeword's are invalid or illegal. 42. What is a Linear Block Code? A linear block code is a code in which the exclusive OR (addition modulo-2) of two valid codeword's creates another valid codeword. 43. Explain Cyclic Codes? Cyclic codes are special linear block codes with one extra property. In a cyclic code, if a codeword is cyclically shifted (rotated), the result is another codeword. 44. Define Encoder? A device or program that uses predefined algorithms to encode, or compress audio or video data for storage or transmission use. A circuit that is used to convert between digital video and analog video. 45. What is Framing? Framing in the data link layer separates a message from one source to a destination, or from other messages to other destinations, by adding a sender address and a destination address. The destination address defines where the packet has to go and the sender address helps the recipient acknowledge the receipt. 46. Define Character Stuffing? In byte stuffing (or character stuffing), a special byte is added to the data section of the frame when there is a character with the same pattern as the flag. The data section is stuffed with an extra byte. This byte is usually called the escape character (ESC), which has a predefined bit pattern. Whenever the receiver encounters the ESC character, it removes it from the data section and treats the next character as data, not a delimiting flag. 47. What is Bit Stuffing? Bit stuffing is the process of adding one extra 0 whenever five consecutive Is follow a 0 in the data, so that the receiver does not mistake the pattern 0111110 for a flag. 48. What is Flow Control? Flow control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. 49. What is Error Control ? Error control is both error detection and error correction. It allows the receiver to inform the sender of any frames lost or damaged in transmission and coordinates the retransmission of those frames by the sender. In the data link layer, the term error control refers primarily to methods of error detection and retransmission. 50. What Automatic Repeat Request (ARQ)? Error control is both error detection and error correction. It allows the receiver to inform the sender of any frames lost or damaged in transmission and coordinates the retransmission of those frames by the sender. In the data link layer, the term error control refers primarily to methods of error detection and retransmission. Error control in the data link layer is often implemented simply: Any time an error is detected in an exchange, specified frames are retransmitted. This process is called automatic repeat request (ARQ). 51. What is Stop-and-Wait Protocol? In Stop and wait protocol, sender sends one frame, waits until it receives confirmation from the receiver (okay to go ahead), and then sends the next frame. 52. Define Pipelining In networking and in other areas, a task is often begun before the previous task has ended. This is known as pipelining. 53. What is Piggy Backing? A technique called piggybacking is used to improve the efficiency of the bidirectional protocols. When a frame is carrying data from A to B, it can also carry control information about arrived (or lost) frames from B; when a frame is carrying data from B to A, it can also carry control information about the arrived (or lost) frames from A. 54. Difference between the communication and transmission. Transmission is a physical movement of information and concern issues like bit polarity, synchronization, clock etc. Communication means the meaning full exchange of information between two communication media. 55. Define SAP? Series of interface points that allow other computers to communicate with the other layers of network protocol stack. 56. What is terminal emulation, in which layer it comes? Telnet is also called as terminal emulation. It belongs to application layer. 57. What is Beaconing? The process that allows a network to self-repair networks problems. The stations on the network notify the other stations on the ring when they are not receiving the transmissions. Beaconing is used in Token ring and FDDI networks. 58. What is NETBIOS and NETBEUI? NETBIOS is a programming interface that allows I/O requests to be sent to and received from a remote computer and it hides the networking hardware from applications. NETBEUI is NetBIOS extended user interface. A transport protocol designed by microsoft and IBM for the use on small subnets. 59. What is RAID? A method for providing fault tolerance by using multiple hard disk drives. 60. How Gateway is different from Routers? A gateway operates at the upper levels of the OSI model and translates information between two completely different network architectures or data formats. 61. What is attenuation? The degeneration of a signal over distance on a network cable is called attenuation. 62. What do you mean by MAC address? The address for a device as it is identified at the Media Access Control (MAC) layer in the network architecture. MAC address is usually stored in ROM on the network adapter card and is unique. 63. Difference between bit rate and baud rate. Bit rate is the number of bits transmitted during one second whereas baud rate refers to the number of signal units per second that are required to represent those bits. baud rate = (bit rate / N) where N is no-of-bits represented by each signal shift. 64. Define Bandwidth? Every line has an upper limit and a lower limit on the frequency of signals it can carry. This limited range is called the bandwidth. 65. What are the different type of networking / internetworking devices? 1. Repeater: Also called a regenerator, it is an electronic device that operates only at physical layer. It receives the signal in the network before it becomes weak, regenerates the original bit pattern and puts the refreshed copy back in to the link. 2. Bridges: These operate both in the physical and data link layers of LANs of same type. They divide a larger network in to smaller segments. They contain logic that allow them to keep the traffic for each segment separate and thus are repeaters that relay a frame only the side of the segment containing the intended recipent and control congestion. 3. Routers: They relay packets among multiple interconnected networks (i.e. LANs of different type). They operate in the physical, data link and network layers. They contain software that enable them to determine which of the several possible paths is the best for a particular transmission. 4. Gateways: They relay packets among networks that have different protocols (e.g. between a LAN and a WAN). They accept a packet formatted for one protocol and convert it to a packet formatted for another protocol before forwarding it. They operate in all seven layers of the OSI model.