情報技術・じょうほうぎじゅつ・ITの質問

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What are the different types of CPU registers in a typical operating system design?

- Accumulators - Index Registers - Stack Pointer - General Purpose Registers

Give an example of a Process State

- New State, means a process is being created - Running, means instructions are being executed - Waiting, means a process is waiting for certain conditions or events to occur - Ready, means a process is waiting for an instruction from the main processor - Terminate, means a process is stopped abruptly

Benefits of multithreaded programming

- there is increased responsiveness to the user - resource sharing within the process - economy - utilization of multiprocessing architecture

pros and cons of command line interface

A command line interface allows the user to type in commands that can immediately provide results. Many seasoned computer users are well accustomed to using the command line because they find it quicker and simpler. However, the main problem with a command line interface is that users have to be familiar with the commands, including the switches and parameters that come with it. This is a downside for people who are not fond of memorizing commands.

What is a kernel?

A kernel is the core of every operating system. It connects applications to the actual processing of data. It also manages all communications between software and hardware components to ensure usability and reliability.

What is a socket?

A socket provides a connection between two applications. Each endpoint of a communication is a socket.

What is a thread?

A thread is a lightweight subprocess.It is a separate path of execution. It is called separate path of execution because each thread runs in a separate stack frame. A thread is a basic unit of CPU utilization. In general, a thread is composed of a thread ID, program counter, register set, and the stack.

What are IP classes and how can you identify the IP class of given an IP address?

An IP address has 4 sets (octets) of numbers each with a value up to 255. For Example, the range of the home or commercial connection started primarily between 190 x or 10 x. IP classes are differentiated based on the number of hosts it supports on a single network. If IP classes support more networks then very few IP addresses are available for each network. There are three types of IP classes and are based on the first octet of IP addresses which are classified as Class A, B or C. If the first octet begins with 0 bit then it is of type Class A. Class A type has a range up to 127.x.x.x (except 127.0.0.1). If it starts with bits 10 then it belongs to Class B. Class B having a range from 128.x to 191.x. IP class belongs to Class C if the octet starts with bits 110. Class C has a range from 192.x to 223.x.

What is an assembler?

An assembler acts as a translator for low-level language. Assembly codes written using mnemonic commands are translated by the Assembler into machine language.

What are routers?

Answer: The router is a network device that connects two or more network segments. It is used to transfer information from the source to the destination. Routers send the information in terms of data packets and when these data packets are forwarded from one router to another router then the router reads the network address in the packets and identifies the destination network.

Descibe Banker's Algorithm

Banker's algorithm is one form of deadlock-avoidance in a system. It gets its name from a banking system wherein the bank never allocates available cash in such a way that it can no longer satisfy the needs of all of its customers.

Define various types of Internet connections?

Broadband Connection: This type of connection gives continuous high-speed Internet. In this type, if we log off from the Internet for any reason then there is no need to log in again. For Example, Modems of cables, Fibres, wireless connection, satellite connection, etc. Wi-Fi: It is a wireless Internet connection between the devices. It uses radio waves to connect to the devices or gadgets. WiMAX: It is the most advanced type of Internet connection which is more featured than Wi-Fi. It is nothing but a high-speed and advanced type of broadband connection.

Define Brouter

Brouter or Bridge Router is a device that acts as both a bridge and a router. As a bridge, it forwards data between the networks. And as a router, it routes the data to specified systems within a network.

What is caching?

Caching is the processing of utilizing a region of fast memory for a limited data and process. A cache memory is usually much efficient because of its high access speed.

Explain DHCP

DHCP stands for Dynamic Host Configuration Protocol and it automatically assigns IP addresses to the network devices. It completely removes the process of manual allocation of IP addresses and reduces the errors caused due to this. This entire process is centralized so that the TCP/IP configuration can also be completed from a central location. DHCP has a "pool of IP addresses" from which it allocates the IP address to the network devices. DHCP cannot recognize if any device is configured manually and assigned with the same IP address from the DHCP pool. In this situation, it throws the "IP address conflict" error. DHCP environment requires DHCP servers to set-up the TCP/IP configuration. These servers then assign, release and renew the IP addresses as there might be a chance that network devices can leave the network and some of them can join back to the network.

In how many ways the data is represented and what are they?

Data transmitted through the networks' comes in different ways like text, audio, video, images, numbers, etc. Audio: It is nothing but the continuous sound which is different from text and numbers. Video: Continuous visual images or a combination of images. Images: Every image is divided into pixels. And the pixels are represented using bits. Pixels may vary in size based on image resolution. Numbers: These are converted into binary numbers and are represented using bits. Text: Text is also represented as bits.

What leads to a deadlock situation in a system?

Deadlock situations occur when four conditions occur simultaneously in a system: Mutual exclusion; Hold and Wait; No preemption; and Circular wait.

What is demand paging?

Demand paging is referred when not all of a process's pages are in the RAM, then the OS brings the missing(and required) pages from the disk into the RAM.

What are device drivers?

Device drivers provide a standard means of representing I/O devices that maybe manufactured by different companies. This prevents conflicts whenever such devices are incorporated in a systems unit.

What is Direct Access Method?

Direct Access method is based on a disk model of a file, such that it is viewed as a numbered sequence of blocks or records. It allows arbitrary blocks to be read or written. Direct access is advantageous when accessing large amounts of information.

What is DNS?

Domain Name Server (DNS), in a non-professional language and we can call it an Internet's phone book. All the public IP addresses and their hostnames are stored in the DNS and later it translates into a corresponding IP address. For a human being, it is easy to remember and recognize the domain name, however, the computer is a machine that does not understand the human language and they only understand the language of IP addresses for data transfer. There is a "Central Registry" where all the domain names are stored and it gets updated on a periodic basis. All Internet service providers and different host companies usually interact with this central registry to get the updated DNS details. For Example, When you type a website www.softwaretestinghelp.com, then your Internet service provider looks for the DNS associated with this domain name and translates this website command into a machine language - IP address - 151.144.210.59 (note that, this is the imaginary IP address and not the actual IP for the given website) so that you will get redirected to the appropriate destination.

How does swapping result in better memory management?

During regular intervals that are set by the operating system, processes can be copied from main memory to a backing store, and then copied back later. Swapping allows more operations to be run that can fit into memory at one time.

What is the meaning of "export" command in Ubuntu?

Export is a command in Bash shell language. When you try to set a variable, it is visible or exported to any subprocess started from that instance of bash. The variable will not exist in the sub-process without the export command.

What is FCFS

FCFS stands for First-come, first-served. It is one type of scheduling algorithm. In this scheme, the process that requests the CPU first is allocated the CPU first. Implementation is managed by a FIFO queue.

What is a Firewall?

Firewall is a network security system that is used to protect computer networks from unauthorized access. It prevents malicious access from outside to the computer network. A firewall can also be built to grant limited access to outside users. The firewall consists of a hardware device, software program or a combined configuration of both. All the messages that route through the firewall are examined by specific security criteria and the messages which meet the criteria are successfully traversed through the network or else those messages are blocked. Firewalls can be installed just like any other computer software and later can be customized as per the need and have some control over the access and security features. " Windows Firewall" is an inbuilt Microsoft Windows application that comes along with the operating system. This "Windows Firewall" also helps to prevent viruses, worms, etc.

What is a Proxy Server and how do they protect the computer network?

For data transmission, IP addresses are required and even DNS uses IP addresses to route to the correct website. It means without the knowledge of correct and actual IP addresses it is not possible to identify the physical location of the network. Proxy servers prevent external users who are unauthorized to access such IP addresses of the internal network. It makes the computer network virtually invisible to external users. Proxy Server also maintains the list of blacklisted websites so that the internal user is automatically prevented from getting easily infected by viruses, worms, etc.

What is fragmentation?

Fragmentation is memory wasted. It can be internal if we are dealing with systems that have fixed-sized allocation units, or external if we are dealing with systems that have variable-sized allocation units.

What is GUI?

GUI is short for Graphical User Interface. It provides users with an interface wherein actions can be performed by interacting with icons and graphical symbols. People find it easier to interact with the computer when in a GUI especially when using the mouse. Instead of having to remember and type commands, users click on buttons to perform a process.

What is HTTP and what port does it use?

HTTP is HyperText Transfer Protocol and it is responsible for web content. Many web pages are using HTTP to transmit the web content and allow the display and navigation of HyperText. It is the primary protocol and port used here is TCP port 80.

What is HTTPs and what port does it use?

HTTPs is a Secure HTTP. HTTPs is used for secure communication over a computer network. HTTPs provides authentication of websites that prevents unwanted attacks. In bi-directional communication, the HTTPs protocol encrypts the communication so that the tampering of the data gets avoided. With the help of an SSL certificate, it verifies if the requested server connection is a valid connection or not. HTTPs use TCP with port 443.

Hub (in switch and router comparison)

Hub is least expensive, least intelligent and least complicated of the three.It broadcast all data to every port which may cause serious security and reliability concern In a Network, Hub is a common connection point for devices connected to the network. Hub contains multiple ports and is used to connect segments of LAN

What is the purpose of an I/O status information?

I/O status information provides information about which I/O devices are to be allocated for a particular process. It also shows which files are opened, and other I/O device state.

What is the full form of IDEA?

IDEA stands for International Data Encryption Algorithm.

What is meant by 127.0.0.1 and localhost?

IP address 127.0.0.1, is reserved for loopback or localhost connections. These networks are usually reserved for the biggest customers or some of the original members of the Internet. To identify any connection issue, the initial step is to ping the server and check if it is responding. If there is no response from the server then there are various causes like the network is down or the cable needs to be replaced or the network card is not in good condition. 127.0.0.1 is a loopback connection on the Network Interface Card (NIC) and if you are able to ping this server successfully, then it means that the hardware is in a good shape and condition. 127.0.0.1 and localhost are the same things in most of the computer network functioning.

Explain what is Unity in Ubuntu? How can you add new entries to the launcher?

In Ubuntu, Unity is the default graphical shell. On the left side of the Ubuntu, it introduces the launcher and Dash to start programs. In order to add new entries to the launcher, you can create a file name like .desktop and then drag the file on the launcher.

What is time-sharing system?

In a Time-sharing system, the CPU executes multiple jobs by switching among them, also known as multitasking. This process happens so fast that users can interact with each program while it is running.

What is Data Encapsulation?

In a computer network, to enable data transmission from one computer to another, the network devices send messages in the form of packets. These packets are then added with the IP header by the OSI reference model layer. The Data Link Layer encapsulates each packet in a frame that contains the hardware address of the source and the destination computer. If a destination computer is on the remote network then the frames are routed through a gateway or router to the destination computer.

What is asymmetric clustering?

In asymmetric clustering, a machine is in a state known as hot standby mode where it does nothing but to monitor the active server. That machine takes the active server's role should the server fails.

Define Piggybacking?

In data transmission, if the sender sends any data frame to the receiver then the receiver should send the acknowledgment to the sender. The receiver will temporarily delay (waits for the network layer to send the next data packet) the acknowledgment and hooks it to the next outgoing data frame, this process is called Piggybacking.

Differentiate internal commands from external commands.

Internal commands are built-in commands that are already part of the operating system. External commands are separate file programs that are stored in a separate folder or directory.

What are interrupts?

Interrupts are part of a hardware mechanism that sends a notification to the CPU when it wants to gain access to a particular resource. An interrupt handler receives this interrupt signal and "tells" the processor to take action based on the interrupt request.

What are Ipconfig and Ifconfig?

Ipconfig stands for Internet Protocol Configuration and this command is used on Microsoft Windows to view and configure the network interface. The command Ipconfig is useful for displaying all TCP/IP network summary information currently available on a network. It also helps to modify the DHCP protocol and DNS setting. Ifconfig (Interface Configuration) is a command that is used on Linux, Mac, and UNIX operating systems. It is used to configure, control the TCP/IP network interface parameters from CLI i.e. Command Line Interface. It allows you to see the IP addresses of these network interfaces.

Explain why Ubuntu is safe and not affected by viruses?

It does not support malicious e-mails and contents, and before any e-mail is opened by users it will go through many security checks Ubuntu uses Linux, which is a super secure O.S system Unlike other O.S, countless Linux users can see the code at any time and can fix the problem if there is any Malware and viruses are coded to take advantage of the weakness in Windows

What is plumbing/piping?

It is the process of using the output of one program as an input to another. For example, instead of sending the listing of a folder or drive to the main screen, it can be piped and sent to a file, or sent to the printer to produce a hard copy.

Explain the purpose of using a libaio package in Ubuntu?

Libaio is Linux Kernel Asynchronous I/O (A/O). A/O allows even a single application thread to overlap I/O operations with other processing, by providing an interface for submitting one or more I/O requests in one system call without waiting for completion. And a separate interface to reap completed I/O operations associated with a given completion group

main difference between logical from physical address space

Logical address refers to the address that is generated by the CPU. On the other hand, physical address refers to the address that is seen by the memory unit.

What is multitasking?

Multitasking is the process within an operating system that allows the user to run several applications at the same time. However, only one application is active at a time for user interaction, although some applications can run "behind the scene".

What is NIC?

NIC stands for Network Interface Card. It is also known as Network Adapter or Ethernet Card. It is in the form of an add-in card and is installed on a computer so that the computer can be connected to a network. Each NIC has a MAC address which helps in identifying the computer on a network.

What is NOS?

NOS is short for Network Operating System. It is a specialized software that will allow a computer to communicate with other devices over the network, including file/folder sharing.

Name the different types of network topologies and brief their advantages?

Network Topology is nothing but the physical or logical way in which the devices (like nodes, links, and computers) of a network are arranged. Physical Topology means the actual place where the elements of a network are located. Logical Topology deals with the flow of data over the networks. A link is used to connect more than two devices of a network. And more than two links located nearby form a topology. a) Bus Topology: In Bus Topology, all the devices of the network are connected to a common cable (also called as the backbone). As the devices are connected to a single cable, it is also termed as Linear Bus Topology. The advantage of bus topology is that it can be installed easily. And the disadvantage is that if the backbone cable breaks then the whole network will be down. b) Star Topology: In Star Topology, there is a central controller or hub to which every node or device is connected through a cable. In this topology, the devices are not linked to each other. If a device needs to communicate with the other, then it has to send the signal or data to the central hub. And then the hub sends the same data to the destination device. The advantage of the star topology is that if a link breaks then only that particular link is affected. The whole network remains undisturbed. The main disadvantage of the star topology is that all the devices of the network are dependent on a single point (hub). If the central hub gets failed, then the whole network gets down. c) Ring Topology: In Ring Topology, each device of the network is connected to two other devices on either side which in turn forms a loop. Data or Signal in ring topology flow only in a single direction from one device to another and reaches the destination node. The advantage of ring topology is that it can be installed easily. Adding or deleting devices to the network is also easy. The main disadvantage of ring topology is the data flows only in one direction. And a break at a node in the network can affect the whole network. d) Mesh Topology: In a Mesh Topology, each device of the network is connected to all other devices of the network. Mesh Topology uses Routing and Flooding techniques for data transmission. The advantage of mesh topology is if one link breaks then it does not affect the whole network. And the disadvantage is, huge cabling is required and it is expensive.

What is a network?

Network is defined as a set of devices connected to each other using a physical transmission medium. For Example, A computer network is a group of computers connected with each other to communicate and share information and resources like hardware, data, and software. In a network, nodes are used to connect two or more networks.

What is Network Topology?

Network topology is a physical layout of the computer network and it defines how the computers, devices, cables, etc are connected to each other.

A few important terminologies we come across networking concepts?

Network: A set of computers or devices connected together with a communication path to share data. Networking: The design and construction of a network are termed as networking. Link: The physical medium or the communication path through which the devices are connected in a network is called a Link. Node: The devices or the computers connected to the links are named as nodes. Router/Gateway: A device/computer/node that is connected to different networks is termed as a Gateway or Router. The basic difference between these two is that Gateway is used to control the traffic of two contradictory networks whereas the router controls the traffic of similar networks. The router is a switch that processes the signal/traffic using routing protocols. Protocol: A set of instructions or rules or guidelines that are used in establishing communications between computers of a network is called Protocol. Unicasting: When a piece of information or a packet is sent from a particular source to a specified destination then it is called Unicasting. Anycasting: Sending the datagrams from a source to the nearest device among the group of servers that provide the same service as the source is termed as Anycasting. Multicasting: Sending one copy of data from a single sender to multiple clients or receivers (selected clients) of the networks which are in need of such data. Broadcasting: Sending a packet to each device of the network is termed as broadcasting.

Describe the layers of the OSI model

OSI model stands for Open System Interconnection It is a framework that guides the applications on how they can communicate in a network. Physical Layer: Deals with transmission and reception of unstructured data through a physical medium. Data Link Layer: Helps in transferring error-free data frames between nodes. Network Layer: Decides the physical path that should be taken by the data as per the network conditions. Transport Layer: Ensures that the messages are delivered in sequence and without any loss or duplication. Session Layer: Helps in establishing a session between processes of different stations. Presentation Layer: Formats the data as per the need and presents the same to the Application layer. Application Layer: Serves as the mediator between Users and processes of applications.

What factors determine whether a detection-algorithm must be utilized in a deadlock avoidance system?

One is that it depends on how often a deadlock is likely to occur under the implementation of this algorithm. The other has to do with how many processes will be affected by deadlock when this algorithm is applied.

What is the OSI reference model?

Open System Interconnection, the name itself suggests that it is a reference model that defines how applications can communicate with each other over a networking system. It also helps to understand the relationship between networks and defines the process of communication in a network.

Explain the main purpose of an operating system

Operating systems exist for two main purposes. One is that it is designed to make sure a computer system performs well by managing its computational activities. Another is that it provides an environment for the development and execution of programs.

What are overlays?

Overlays are used to enable a process to be larger than the amount of memory allocated to it. The basic idea of this is that only instructions and data that are needed at any given time are kept in memory.

What is the basic function of paging?

Paging is a memory management scheme that permits the physical address space of a process to be noncontiguous. It avoids the considerable problem of having to fit varied sized memory chunks onto the backing store.

Why partitioning and formatting is a prerequisite to installing an operating system?

Partitioning and formatting create a preparatory environment on the drive so that the operating system can be copied and installed properly. This includes allocating space on the drive, designating a drive name, determining and creating the appropriate file system and structure.

What are the different types of a network? Explain each briefly.

Personal Area Network (PAN): It is the smallest and basic network type that is often used at home. It is a connection between the computer and another device such as phone, printer, modem tablets, etc Local Area Network (LAN): LAN is used in small offices and Internet cafes to connect a small group of computers to each other. Usually, they are used to transfer a file or for playing the game in a network. Metropolitan Area Network (MAN): It is a powerful network type than LAN. The area covered by MAN is a small town, city, etc. A huge server is used to cover such a large span of area for connection. Wide Area Network (WAN): It is more complex than LAN and covers a large span of the area typically a large physical distance. The Internet is the largest WAN which is spread across the world. WAN is not owned by any single organization but it has distributed ownership.

What is preemptive multitasking?

Preemptive multitasking allows an operating system to switch between software programs. This, in turn, allows multiple programs to run without necessarily taking complete control over the processor and resulting in system crashes.

enumerate different RAID levels

RAID 0 - Non-redundant striping RAID 1 - Mirrored Disks RAID 2 - Memory-style error-correcting codes RAID 3 - Bit-interleaved Parity RAID 4 - Block-interleaved Parity RAID 5 - Block-interleaved distributed Parity RAID 6 - P+Q Redundancy

What is RR scheduling algorithm?

RR (round-robin) scheduling algorithm is primarily aimed for time-sharing systems. A circular queue is a setup in such a way that the CPU scheduler goes around that queue, allocating CPU to each process for a time interval of up to around 10 to 100 milliseconds.

What are real-time systems?

Real-time systems are used when rigid time requirements have been placed on the operation of a processor. It has well defined and fixed time constraints.

What is RAID?

Redundant Array of Independent Disks. Way of storing the same data in different places on multiple hard disks or solid-state drives to protect data in the case of a drive failure.

What is root partition?

Root partition is where the operating system kernel is located. It also contains other potentially important system files that are mounted during boot time.

What is SMP?

SMP is a short form of Symmetric Multi-Processing. It is the most common type of multiple-processor systems. In this system, each processor runs an identical copy of the operating system, and these copies communicate with one another as needed.

What is SNMP?

SNMP stands for Simple Network Management Protocol. It is a network protocol used for collecting organizing and exchanging information between network devices. SNMP is widely used in network management for configuring network devices like switches, hubs, routers, printers, servers. SNMP consists of the below components: SNMP Manager Managed device SNMP Agent Management Information Base (MIB) SNMP is a part of the TCP/IP suite. There are 3 main versions of SNMP which include SNMPv1, SNMPv2, and SNMPv3.

How are server systems classified?

Server systems can be classified as either computer-server systems or file server systems. In the first case, an interface is made available for clients to send requests to perform an action. In the second case, provisions are available for clients to create, access and update files.

How many types of modes are used in data transferring through networks?

Simplex: Data transferring which takes place only in one direction is called Simplex. In Simplex mode, the data gets transferred either from sender to receiver or from receiver to sender. For Example, Radio signal, the print signal given from computer to printer, etc. Half Duplex: Data transferring can happen in both directions but not at the same time. Alternatively, the data is sent and received. For Example, Browsing through the internet, a user sends the request to the server and later the server processes the request and sends back the web page. Full Duplex: Data transferring happens in both directions that too simultaneously. For Example, Two-lane roads where traffic flows in both directions, communication through telephone, etc.

What is spooling?

Spooling is normally associated with printing. When different applications want to send an output to the printer at the same time, spooling takes all of these print jobs into a disk file and queues them accordingly to the printer.

Switch (in hub and router comparison)

Switches work similarly like Hubs but in a more efficient manner.It creates connections dynamically and provides information only to the requesting port Switch is a device in a network which forwards packets in a network

Best page size when designing an OS?

The best paging size varies from system to system, so there is no single best when it comes to page size. There are different factors to consider in order to come up with a suitable page size, such as page table, paging time, and its effect on the overall efficiency of the operating system.

How would a file name EXAMPLEFILE.TXT appear when viewed under the DOS command console operating in Windows 98?

The filename would appear as EXAMPL~1.TXT . The reason behind this is that filenames under this operating system are limited to 8 characters when working under DOS environment.

Objective of multiprogramming

The main objective of multiprogramming is to have a process running at all times. With this design, CPU utilization is said to be maximized.

Explain TCP/IP Model

The most widely used and available protocol is TCP/IP i.e. Transmission Control Protocol and Internet Protocol. TCP/IP specifies how data should be packaged, transmitted and routed in their end to end data communication. There are four layers. Application Layer: This is the top layer in the TCP/IP model. It includes processes that use the Transport Layer Protocol to transmit the data to their destination. There are different Application Layer Protocols such as HTTP, FTP, SMTP, SNMP protocols, etc. Transport Layer: It receives the data from the Application Layer which is above the Transport Layer. It acts as a backbone between the host's system connected with each other and it mainly concerns about the transmission of data. TCP and UDP are mainly used as Transport Layer protocols. Network or Internet Layer: This layer sends the packets across the network. Packets mainly contain source & destination IP addresses and actual data to be transmitted. Network Interface Layer: It is the lowest layer of the TCP/IP model. It transfers the packets between different hosts. It includes encapsulation of IP packets into frames, mapping IP addresses to physical hardware devices, etc.

Router (in hub and switch comparison)

The router is smartest and most complicated out of these three. It comes in all shapes and sizes. Routers are similar like little computers dedicated for routing network traffic Routers are located at gateway and forwards data packets

What are the layers in OSI Reference Models? Describe each layer briefly.

The seven layers of OSI Reference Models: a) Physical Layer (Layer 1): It converts data bits into electrical impulses or radio signals. Example: Ethernet. b) Data Link Layer (Layer 2): At the Data Link layer, data packets are encoded and decoded into bits and it provides a node to node data transfer. This layer also detects the errors that occurred at Layer 1. c) Network Layer (Layer 3): This layer transfers variable length data sequence from one node to another node in the same network. This variable-length data sequence is also known as "Datagrams". d) Transport Layer (Layer 4): It transfers data between nodes and also provides acknowledgment of successful data transmission. It keeps track of transmission and sends the segments again if the transmission fails. e) Session Layer (Layer 5): This layer manages and controls the connections between computers. It establishes, coordinates, exchange and terminates the connections between local and remote applications. f) Presentation Layer (Layer 6): It is also called as "Syntax Layer". Layer 6 transforms the data into the form in which the application layer accepts. g) Application Layer (Layer 7): This is the last layer of the OSI Reference Model and is the one that is close to the end-user. Both end-user and application layer interacts with the software application. This layer provides services for email, file transfer, etc.

Explain various types of networks based on their sizes?

The size of the network is defined as the geographic area and the number of computers covered in it. Local Area Network (LAN): A network with a minimum of two computers to a maximum of thousands of computers within an office or a building is termed as LAN. Generally, it works for a single site where people can share resources like printers, data storage, etc. Metropolitan Area Network (MAN): It is larger than LAN and used to connect various LANs across small regions, a city, campus of colleges or universities, etc which in turn forms a bigger network. Wide Area Network (WAN): Multiple LANs and MAN's connected together form a WAN. It covers a wider area like a whole country or world.

What is the difference between the Internet, Intranet, and Extranet?

The terminologies Internet, Intranet, and Extranet are used to define how the applications in the network can be accessed. They use similar TCP/IP technology but differ in terms of access levels for each user inside the network and outside the network. Internet: Applications are accessed by anyone from any location using the web. Intranet: It allows limited access to users in the same organization. Extranet: External users are allowed or provided with access to use the network application of the organization.

Define Round Trip Time

The time taken for a signal to reach the destination and travel back to the sender with the acknowledgment is termed as Round Trip Time (RTT). It is also called Round Trip Delay (RTD).

What is a folder in Ubuntu?

There is no concept of Folder in Ubuntu. Everything included in your hardware is a FILE.

When does Thrashing occur?

Thrashing refers to an instance of high paging activity. This happens when it is spending more time paging instead of executing.

Differentiate Communication and Transmission

Through Transmission the data gets transferred from source to destination (only one way). It is treated as the physical movement of data. Communication means the process of sending and receiving data between two media (data is transferred between source and destination in both ways).

What is the use of behavior tab in Ubuntu?

Through behaviors tab, you can make many changes on the appearance of the desktop Auto-hide the launcher: You can use this option to reveal the launcher when moving the pointer to the defined hot spot. Enable workspaces: By checking this option, you can enable workspace Add show desktop icon to the launcher: This option is used to display the desktop icon on the launcher

Explain how to access Terminal?

To access terminal, you have to go under Application Menu -> Accessories -> Terminal.

Explain how you can reset Unity Configuration?

To reset the unity configuration the simplest way to do is to hit open a Terminal or hit Atl-F2 and run the command # unity -reset

Explain the characteristics of networking?

Topology: This deals with how the computers or nodes are arranged in the network. The computers are arranged physically or logically. Protocols: Deals with the process of how computers communicate with one another. Medium: This is nothing but the medium used by computers for communication.

What is a node?

Two or more computers are connected directly by an optical fiber or any other cable. A node is a point where a connection is established. It is a network component that is used to send, receive and forward the electronic information. A device connected to a network is also termed as Node. Let's consider that in a network there are 2 computers, 2 printers, and a server are connected, then we can say that there are five nodes on the network.

When designing the file structure for an operating system, what attributes are considered?

Typically, the different attributes for a file structure are naming, identifier, supported file types, and location for the files, size, and level of protection.

What are the primary functions of VFS?

VFS, or Virtual File System, separate file system generic operations from their implementation by defining a clean VFS interface. It is based on a file-representation structure known as vnode, which contains a numerical designator needed to support network file systems.

What is a VPN?

VPN is the Virtual Private Network and is built on the Internet as a private wide area network. Internet-based VPNs are less expensive and can be connected from anywhere in the world. VPNs are used to connect offices remotely and are less expensive when compared to WAN connections. VPNs are used for secure transactions and confidential data can be transferred between multiple offices. VPN keeps company information secure against any potential intrusion. Given below are the 3 types of VPN's: Access VPN: Access VPN's provide connectivity to mobile users and telecommuters. It is an alternative option for dial-up connections or ISDN connections. It provides low-cost solutions and a wide range of connectivity. Intranet VPN: They are useful for connecting remote offices using shared infrastructure with the same policy as a private network. Extranet VPN: Using shared infrastructure over an intranet, suppliers, customers, and partners are connected using dedicated connections.

What is virtual memory?

Virtual memory is a memory management technique for letting processes execute outside of memory. This is very useful especially is an executing program cannot fit in the physical memory.

Define Static IP and Dynamic IP

When a device or computer is assigned a specified IP address then it is named as Static IP. It is assigned by the Internet Service Provider as a permanent address. Dynamic IP is the temporary IP address assigned by the network to a computing device. Dynamic IP is automatically assigned by the server to the network device.

What are the advantages of a multiprocessor system?

With an increased number of processors, there is a considerable increase in throughput. It can also save more money because they can share resources. Finally, overall reliability is increased as well.

How does dynamic loading aid in better memory space utilization?

With dynamic loading, a routine is not loaded until it is called. This method is especially useful when large amounts of code are needed in order to handle infrequently occurring cases such as error routines.

Under DOS, what command will you type when you want to list down the files in a directory, and at the same time pause after every screen output? a) dir /w b) dir /p c) dir /s d) dir /w /p

d) dir /w /p


Ensembles d'études connexes

Microsoft Office Specialist - Office 2016

View Set

dh32, ch. 2 Properties of Materials

View Set

UNCW SABA 379 FINAL EXAM Spring 2019

View Set

BSC 227 Strait Chapter 3 Histology part 2

View Set

Chapter 33 Post-Class Assignment Part II: Aggregate Demand and Aggregate Supply

View Set

ASE A1 - Practice Test (Section E) Documen term 2 set 8

View Set