Jahangirnagar IT Admission Guide
Jahangirnagar IT Admission Guide
ADMISSION TEST
Jahangirnagar
University PMSCS &
PMIT SUGGESTION
WITH PREVIOUS
QUESTION
SOLUTION
FOR SPRING 2018
Page Content
1
Networking Basics - Networking Basics
32
A.
bits
128
B.
bytes
64
C.
bits
128
D.
bits
Answer: Option D
Explanation:
An IPv6 address is 128 bits long.
2. What flavor of Network Address Translation can be used to have one IP address allow many
users to connect to the global Internet?
A. NAT
B. Static
C. Dynamic
D. PAT
Answer: Option D
Explanation:
Port Address Translation (PAT) allows a one-to-many approach to network address translation.
3. What are the two main types of access control lists (ACLs)?
1. Standard
2. IEEE
3. Extended
4. Specialized
A. 1 and 3
B. 2 and 4
2
C. 3 and 4
D. 1 and 2
Answer: Option A
Explanation:
Standard and extended access control lists (ACLs) are used to configure security on a router.
C. config mem
D. wr mem
Answer: Option B
Explanation:
The command to back up the configuration on a router is copy running-config startup-
config.
5. You have 10 users plugged into a hub running 10Mbps half-duplex. There is a server connected
to the switch running 10Mbps half-duplex as well. How much bandwidth does each host have to
the server?
A. 100 kbps
B. 1 Mbps
C. 2 Mbps
D. 10 Mbps
Answer: Option D
Explanation:
Each device has 10 Mbps to the server.
B. B
C. G
D. N
Answer: Option C
Explanation:
IEEE 802.11B is 2.4GHz, but with a maximum of only 11Mbps. IEEE 802.11G is in the 2.4GHz
range, with a top speed of 54Mbps.
3
7. Which of the following is the valid host range for the subnet on which the IP address
192.168.168.188 255.255.255.192 resides?
A. 192.168.168.129-190
B. 192.168.168.129-191
C. 192.168.168.128-190
D. 192.168.168.128-192
Answer: Option A
Explanation:
256 - 192 = 64. 64 + 64 = 128. 128 + 64 = 192. The subnet is 128, the broadcast address is 191,
and the valid host range is the numbers in between, or 129-190.
9. What protocol does PPP use to identify the Network layer protocol?
A. NCP
B. ISDN
C. HDLC
D. LCP
Answer: Option A
Explanation:
Network Control Protocol is used to help identify the Network layer protocol used in the packet.
10. Which of the following commands will allow you to set your Telnet password on a Cisco router?
A. line telnet 0 4
B. line aux 0 4
C. line vty 0 4
D. line con 0
Answer: Option C
4
Explanation:
The command line vty 0 4 places you in a prompt that will allow you to set or change your
Telnet password.
B. TCP
C. UDP
D. ARP
Answer: Option C
Explanation:
User Datagram Protocol is a connection network service at the Transport layer, and DHCP uses
this connectionless service.
12. Which command is used to determine if an IP access list is enabled on a particular interface?
A. show access-lists
B. show interface
C. show ip interface
B. Physical layer
D. Application layer
Answer: Option B
Explanation:
Hubs regenerate electrical signals, which are specified at the Physical layer.
14. What does the passive command provide to dynamic routing protocols?
A. Stops an interface from sending or receiving periodic dynamic updates.
B. Stops an interface from sending periodic dynamic updates but not from receiving updates.
5
C. Stops the router from receiving any dynamic updates.
15. Which protocol is used to send a destination network unknown message back to originating
hosts?
A. TCP
B. ARP
C. ICMP
D. BootP
Answer: Option C
Explanation:
ICMP is the protocol at the Network layer that is used to send messages back to an originating
router.
B. Every 2 seconds
C. Every 10 minutes
D. Every 30 seconds
Answer: Option B
Explanation:
Every 2 seconds, BPDUs are sent out from all active bridge ports by default.
17. How many broadcast domains are created when you segment a network with a 12-port switch?
A. 1
B. 2
C. 5
D. 12
Answer: Option A
Explanation:
By default, switches break up collision domains but are one large broadcast domain.
6
18. What does the command routerA(config)#line cons 0 allow you to perform next?
A. Set the Telnet password.
B. show access-lists
C. show ip interface
D. show interface
Answer: Option B
Explanation:
To see the contents of all access lists, use the show access-lists command.
20.
Which class of IP address has the most host addresses available by default?
A. A
B. B
C. C
D. A and B
Answer: Option A
Explanation:
Class A addressing provides 24 bits for host addressing.
21. In a network with dozens of switches, how many root bridges would you have?
A. 1
B. 2
C. 5
D. 12
Answer: Option A
Explanation:
You should have only one root bridge per network.
7
22. What PPP protocol provides dynamic addressing, authentication, and multilink?
A. NCP
B. HDLC
C. LCP
D. X.25
Answer: Option C
Explanation:
Link Control Protocol in the PPP stack provides dynamic addressing, authentication, and
multilink.
24. If your router is facilitating a CSU/DSU, which of the following commands do you need to use to
provide the router with a 64000bps serial link?
A. RouterA(config)#bandwidth 64
B. RouterA(config-if)#bandwidth 64000
C. RouterA(config-if)#clock rate 64
8
VLANs only work if you have a complete Cisco switched internetwork. No off-brand
B.
switches are allowed.
C. You should not have more than 10 switches in the same VTP domain.
Answer: Option D
Explanation:
Switches do not propagate VLAN information by default; you must configure the VTP domain.
VLAN Trunking Protocol (VTP) is used to propagate VLAN information across a trunk link.
Answer: Option C
Explanation:
VLANs break up broadcast domains at layer 2
Answer: Option C
Explanation:
The primary reason the OSI model was created was so that different networks could inter-
operate.
9
28. How many collision domains are created when you segment a network with a 12-port switch?
A. 1
B. 2
C. 5
D. 12
Answer: Option D
Explanation:
Layer 2 switching creates individual collision domains.
29. What command will display the line, protocol, DLCI, and LMI information of an interface?
A. sh pvc
B. show interface
D. show run
Answer: Option B
Explanation:
The show interface command shows the line, protocol, DLCI, and LMI information of an
interface.
B. ARP
C. ICMP
D. BootP
10
Answer: Option C
Explanation:
ICMP is the protocol at the Network layer that is used to send echo requests and replies.
C. config net
Answer: Option D
Explanation:
The copy tftp flash command places a new file in flash memory, which is the default
location for the Cisco IOS in Cisco routers.
32. If you wanted to delete the configuration stored in NVRAM, what would you type?
A. erase startup
B. erase nvram
C. delete nvram
D. erase running
Answer: Option A
Explanation:
The command erase startup-config deletes the configuration stored in NVRAM.
11
A. 1 and 2
B. 3 and 4
C. 1 only
D. 2 only
Answer: Option B
Explanation:
VTP is not right because it has nothing to do with trunking except that it sends VLAN information
across a trunk link. 802.1Q and ISL are used to configure trunking on a port.
12
1.Physical Layer
The physical layer defines the electrical and physical specifications of the
data connection. It defines the relationship between a device and a
physical transmission medium (for example, an electrical cable, an optical
fiber cable, or a radio frequency link). This includes the layout
of pins, voltages, line impedance, cable specifications.
3: Network Layer
The network layer provides the functional and procedural means of
transferring variable length data sequences (called datagrams) from one
node to another connected in "different networks". A network is a medium to
13
which many nodes can be connected, on which every node has
an address and which permits nodes connected to it to transfer messages to
other nodes connected to it by merely providing the content of a message
and the address of the destination node and letting the network find the way
to deliver the message to the destination node, possibly routing it through
intermediate nodes.
4: Transport Layer
The transport layer provides the functional and procedural means of
transferring variable-length data sequences from a source to a destination
host via one or more networks, while maintaining the quality of service
functions.
An example of a transport-layer protocol in the standard Internet stack
is Transmission Control Protocol (TCP), usually built on top of the Internet
Protocol (IP).
The transport layer controls the reliability of a given link through flow
control, segmentation/desegmentation, and error control. Some protocols
are state- and connection-oriented.
5: Session Layer
The session layer controls the dialogues (connections) between computers.
It establishes, manages and terminates the connections between the local
and remote application. It provides for full-duplex, half-duplex,
or simplex operation, and establishes check pointing, adjournment,
termination, and restart procedures. The OSI model made this layer
responsible for graceful close of sessions, which is a property of
the Transmission Control Protocol, and also for session check pointing and
recovery, which is not usually used in the Internet Protocol Suite. The
session layer is commonly implemented explicitly in application
environments that use remote procedure calls.
14
7: Application Layer
The application layer is the OSI layer closest to the end user, which means
both the OSI application layer and the user interact directly with the
software application. This layer interacts with software applications that
implement a communicating component. Such application programs fall
outside the scope of the OSI model. Application-layer functions typically
include identifying communication partners, determining resource
availability, and synchronizing communication.
our Layers of TCP/IP model, Comparison and Difference between TCP/IP and
OSI models
15
terminology is applied to TCP/IP. The following figure compares the TCP/IP
and OSI network models.
Application layer is the top most layer of four layer TCP/IP model.
Application layer is present on the top of the Transport layer. Application
layer defines TCP/IP application protocols and how host programs interface
with Transport layer services to use the network.
Application layer includes all the higher-level protocols like DNS (Domain
Naming System), HTTP (Hypertext Transfer Protocol), Telnet, SSH, FTP (File
Transfer Protocol), TFTP (Trivial File Transfer Protocol), SNMP (Simple
Network Management Protocol), SMTP (Simple Mail Transfer
Protocol) , DHCP (Dynamic Host Configuration Protocol), X Windows, RDP
(Remote Desktop Protocol) etc.
Transport Layer is the third layer of the four layer TCP/IP model. The
position of the Transport layer is between Application layer and Internet
layer. The purpose of Transport layer is to permit devices on the source and
destination hosts to carry on a conversation. Transport layer defines the
level of service and status of the connection used when transporting data.
Internet Layer is the second layer of the four layer TCP/IP model. The
position of Internet layer is between Network Access Layer and Transport
layer. Internet layer pack data into data packets known as IP datagrams,
which contain source and destination address (logical address or IP address)
information that is used to forward the datagrams between hosts and across
networks. The Internet layer is also responsible for routing of IP datagrams.
Network Access Layer is the first layer of the four layer TCP/IP
model. Network Access Layer defines details of how data is physically sent
through the network, including how bits are electrically or optically signaled
by hardware devices that interface directly with a network medium, such as
coaxial cable, optical fiber, or twisted pair copper wire.
The most popular LAN architecture among those listed above is Ethernet.
Ethernet uses an Access Method called CSMA/CD (Carrier Sense Multiple
Access/Collision Detection) to access the media, when Ethernet operates in
a shared media. An Access Method determines how a host will place data on
the medium.
IN CSMA/CD Access Method, every host has equal access to the medium and
can place data on the wire when the wire is free from network traffic. When
a host wants to place data on the wire, it will check the wire to find whether
another host is already using the medium.
100B-T—100BASE-T
100B-TX—100BASE-TX
100BVG—100BASE-VG
286—Intel 80286 processor
2B1Q—2 Binary 1 Quaternary
2FA—Two-factor authentication
2GL—Second-Generation Programming Language
2NF—Second Normal Form
3GL—Third-Generation Programming Language
17
BCNF—Boyce–Codd normal form
CDE—Common Desktop Environment
CDFS—Compact Disk File System
CDMA—Code Division Multiple Access
CDN—Content Delivery Network
CDP—Cisco Discovery Protocol
CDP—Continuous Data Protection
CD-R—CD-Recordable
CD-ROM—CD Read-Only Memory
CMO—Current Mode of Operation
CSP—Cloud Service Provider
DFS—Distributed File System
DGD—Dworkin's Game Driver
DHCP—Dynamic Host Configuration Protocol
DHTML—Dynamic Hypertext Markup Language
DIF—Data Integrity Field
FIFO—First In First Out
ICMP—Internet Control Message Protocol
IPv4—Internet Protocol version 4
IPv6—Internet Protocol version 6
PaaS—Platform as a Service
PAN—Personal Area Network
PaaS—Platform as a Service
PAN—Personal Area Network
WiMAX—Worldwide Interoperability for Microwave Access
WiMAX—Worldwide Interoperability for Microwave Access
18
What is layer?
Layer is a completely logical partition of PDU (protocol data unit) process.
That define how the information is travel form one computer to other over
the network.
What is TCP/IP?
It is combination of two protocols TCP and IP. It is used for reliable data
transfer.
What is operating system?
An operating system (sometimes abbreviated as "OS") is the program
that, after being initially loaded into the computer by a boot program,
manages all the other programs in a computer. It provides a platform to
application software.
What is package software?
The collection of mostly used software released in package Form Company.
For Example Ms-Office that contain word, power point, Excel, etc.
19
What is 802.3?
IEEE 802.3 is a collection of IEEE standards defining the physical layer and
the media access control (MAC) of the data link layer of wired Ethernet.
Physical connections are made between nodes and infrastructure devices
hubs, switches and routers by various types of copper or fiber cable.
Full form of ping.
PING stand for Packet Internet Grouper
What are the minimum requirements for xp installation?
64MB RAM
1.5GB free HDD space
233MHz minimum processor.
What are 10Base2, 10Base5 and 10BaseT Ethernet LANs?
10Base2— An Ethernet term meaning a maximum transfer rate of 10
Megabits per second that uses baseband signaling, with a contiguous cable
segment length of 100 meters and a maximum of 2 segments.
10Base5—An Ethernet term meaning a maximum transfer rate of 10
Megabits per second that uses baseband signaling, with 5 continuous
segments not exceeding 100 meters per segment.
10BaseT—An Ethernet term meaning a maximum transfer rate of 10
Megabits per second that uses baseband signaling and twisted pair cabling.
A fully specified passive open has the server waiting for a connection
from a specific client.
Types of Networks: LAN, WAN, WLAN, MAN, SAN, PAN, EPN & VPN
20
There are several different types of computer networks. Computer networks
can be characterized by their size as well as their purpose.
The size of a network can be expressed by the geographic area they occupy
and the number of computers that are part of the network. Networks can
cover anything from a handful of devices within a single room to millions of
devices spread across the entire globe.
Some of the different networks based on size are:
Send a document to the printer in the office upstairs while you are
sitting on the couch with your laptop.
21
Upload a photo from your cell phone to your desktop computer.
Watch movies from an online streaming service to your TV.
If this sounds familiar to you, you likely have a PAN in your house without
having called it by its name.
22
Wide Area Network
A wide area network, or WAN, occupies a very large area, such as an
entire country or the entire world. A WAN can contain multiple smaller
networks, such as LANs or MANs. The Internet is the best-known example of
a public WAN.
Private Networks
One of the benefits of networks like PAN and LAN is that they can be kept
entirely private by restricting some communications to the connections
within the network. This means that those communications never go over
the Internet.
For example, using a LAN, an employee is able to establish a fast and secure
connection to a company database without encryption since none of the
communications between the employee's computer and the database on the
server leave the LAN. But, what happens if the same employee wants to use
the database from a remote location? What you need is a private network.
One approach to a private network is to build an enterprise private
network, or EPN. An EPN is a computer network that is entirely controlled
by one organization, and it is used to connect multiple locations. Historically,
telecommunications companies, like AT&T, operated their own network,
separate from the public Internet. EPNs are still fairly common in certain
sectors where security is of the highest concern. For example, a number of
health facilities may establish their own network between multiple sites to
have full control over the confidentiality of patient records.
Subnetting
Variable Length Subnet Mask (VLSM)
Supernetting
23
Classless Inter-Domain Routing (CIDR)
Subnetting
24
1. Your router has the following IP address on Ethernet0: 172.16.2.1/23. Which of the following can be valid
host IDs on the LAN interface attached to the router?
1. 172.16.1.100
2. 172.16.1.198
3. 172.16.2.255
4. 172.16.3.0
A. 1 only
B. 2 and 3 only
C. 3 and 4 only
Answer: Option C
Explanation:
The router's IP address on the E0 interface is 172.16.2.1/23, which is 255.255.254.0. This makes the third
octet a block size of 2. The router's interface is in the 2.0 subnet, and the broadcast address is 3.255
because the next subnet is 4.0. The valid host range is 2.1 through 3.254. The router is using the first valid
host address in the range.
B. 2 and 4
C. 1, 2 and 4
D. 2, 3 and 4
Answer: Option B
Explanation:
The mask 255.255.254.0 (/23) used with a Class A address means that there are 15 subnet bits and 9 host
bits. The block size in the third octet is 2 (256 - 254). So this makes the subnets in the interesting octet 0, 2,
4, 6, etc., all the way to 254. The host 10.16.3.65 is in the 2.0 subnet. The next subnet is 4.0, so the
broadcast address for the 2.0 subnet is 3.255. The valid host addresses are 2.1 through 3.254.
25
3. A network administrator is connecting hosts A and B directly through their Ethernet interfaces, as shown in
the illustration. Ping attempts between the hosts are unsuccessful. What can be done to provide connectivity
between the hosts?
B
2 only
.
C
3 and 4 only
.
D
1 and 5 only
.
2 and 5 only
Answer: Option D
Explanation:
First, if you have two hosts directly connected, as shown in the graphic, then you need a crossover
cable. A straight-through cable won't work. Second, the hosts have different masks, which puts them
in different subnets. The easy solution is just to set both masks to 255.255.255.0 (/24).
4. What is the maximum number of IP addresses that can be assigned to hosts on a local subnet that
uses the 255.255.255.224 subnet mask?
E A. 14
.
B. 15
C. 16
D. 30
Answer: Option D
Explanation:
A /27 (255.255.255.224) is 3 bits on and 5 bits off. This provides 8 subnets, each with 30 hosts.
Does it matter if this mask is used with a Class A, B, or C network address? Not at all. The number
26
of host bits would never change.
5. You need to subnet a network that has 5 subnets, each with at least 16 hosts. Which classful subnet
mask would you use?
A. 255.255.255.192
B. 255.255.255.224
C. 255.255.255.240
D. 255.255.255.248
Answer: Option B
Explanation:
You need 5 subnets, each with at least 16 hosts. The mask 255.255.255.240 provides 16 subnets
with 14 hosts-this will not work. The mask 255.255.255.224 provides 8 subnets, each with 30 hosts.
This is the best answer.
6. You have a network that needs 29 subnets while maximizing the number of host addresses
available on each subnet. How many bits must you borrow from the host field to provide the correct
subnet mask?
A. 2
B. 3
C. 4
D. 5
Answer: Option D
Explanation:
A 240 mask is 4 subnet bits and provides 16 subnets, each with 14 hosts. We need more subnets,
so let's add subnet bits. One more subnet bit would be a 248 mask. This provides 5 subnet bits (32
subnets) with 3 host bits (6 hosts per subnet). This is the best answer.
B. 172.16.0.0
C. 172.16.96.0
D. 172.16.255.0
Answer: Option A
27
Explanation:
A /25 mask is 255.255.255.128. Used with a Class B network, the third and fourth octets are
used for subnetting with a total of 9 subnet bits, 8 bits in the third octet and 1 bit in the fourth
octet. Since there is only 1 bit in the fourth octet, the bit is either off or on-which is a value of 0 or
128. The host in the question is in the 0 subnet, which has a broadcast address of 127 since
128 is the next subnet.
8. You have an interface on a router with the IP address of 192.168.192.10/29. Including the router
interface, how many hosts can have IP addresses on the LAN attached to the router interface?
A. 6
B. 8
C. 30
D. 32
Answer: Option A
Explanation:
A /29 (255.255.255.248), regardless of the class of address, has only 3 host bits. Six hosts is
the maximum number of hosts on this LAN, including the router interface.
B. 172.16.48.0
C. 172.16.64.0
D. 172.16.0.0
Answer: Option C
Explanation:
A /21 is 255.255.248.0, which means we have a block size of 8 in the third octet, so we just
count by 8 until we reach 66. The subnet in this question is 64.0. The next subnet is 72.0, so the
broadcast address of the 64 subnet is 71.255.
10. The network address of 172.16.0.0/19 provides how many subnets and hosts?
A. 7 subnets, 30 hosts each
28
D. 7 subnets, 2,046 hosts each
Answer: Option B
Explanation:
A CIDR address of /19 is 255.255.224.0. This is a Class B address, so that is only 3 subnet bits,
but it provides 13 host bits, or 8 subnets, each with 8,190 hosts.
11. You need to configure a server that is on the subnet 192.168.19.24/29. The router has the first
available host address. Which of the following should you assign to the server?
A. 192.168.19.0 255.255.255.0
B. 192.168.19.33 255.255.255.240
C. 192.168.19.26 255.255.255.248
D. 192.168.19.31 255.255.255.248
Answer: Option C
Explanation:
A /29 is 255.255.255.248, which is a block size of 8 in the fourth octet. The subnets are 0, 8, 16,
24, 32, 40, etc. 192.168.19.24 is the 24 subnet, and since 32 is the next subnet, the broadcast
address for the 24 subnet is 31. 192.168.19.26 is the only correct answer.
12. You have an interface on a router with the IP address of 192.168.192.10/29. What is the
broadcast address the hosts will use on this LAN?
A. 192.168.192.15
B. 192.168.192.31
C. 192.168.192.63
D. 192.168.192.127
Answer: Option A
Explanation:
A /29 (255.255.255.248) has a block size of 8 in the fourth octet. This means the subnets are 0,
8, 16, 24, etc. 10 is in the 8 subnet. The next subnet is 16, so 15 is the broadcast address.
13. You have a network with a subnet of 172.16.17.0/22. Which is the valid host address?
A. 172.16.17.1 255.255.255.252
B. 172.16.0.1 255.255.240.0
C. 172.16.20.1 255.255.254.0
29
D. 172.16.18.255 255.255.252.0
Answer: Option D
Explanation:
A Class B network ID with a /22 mask is 255.255.252.0, with a block size of 4 in the third octet.
The network address in the question is in subnet 172.16.16.0 with a broadcast address of
172.16.19.255. Only option E even has the correct subnet mask listed, and 172.16.18.255 is a
valid host.
14. On a VLSM network, which mask should you use on point-to-point WAN links in order to reduce
the waste of IP addresses?
A. /27
B. /28
C. /29
D. /30
Answer: Option D
Explanation:
A point-to-point link uses only two hosts. A /30, or 255.255.255.252, mask provides two hosts
per subnet.
15. To test the IP stack on your local host, which IP address would you ping?
A. 127.0.0.0
B. 1.0.0.127
C. 127.0.0.1
D. 127.0.0.255
Answer: Option C
Explanation:
To test the local stack on your host, ping the loopback interface of 127.0.0.1.
16. If a host on a network has the address 172.16.45.14/30, what is the subnetwork this host
belongs to?
A. 172.16.45.0
B. 172.16.45.4
C. 172.16.45.8
30
D. 172.16.45.12
Answer: Option D
Explanation:
A /30, regardless of the class of address, has a 252 in the fourth octet. This means we have a
block size of 4 and our subnets are 0, 4, 8, 12, 16, etc. Address 14 is obviously in the 12 subnet.
17. Using the following illustration, what would be the IP address of E0 if you were using the eighth
subnet? The network ID is 192.168.10.0/28 and you need to use the last available IP address in
the range. The zero subnet should not be considered valid for this question.
A. 192.168.10.142
B. 192.168.10.66
C. 192.168.100.254
D. 192.168.10.143
E. 192.168.10.126
Answer: Option A
Explanation:
A /28 is a 255.255.255.240 mask. Let's count to the ninth subnet (we need to find the broadcast
address of the eighth subnet, so we need to count to the ninth subnet). Starting at 16
(remember, the question stated that we will not use subnet zero, so we start at 16, not 0), 16,
32, 48, 64, 80, 96, 112, 128, 144. The eighth subnet is 128 and the next subnet is 144, so our
broadcast address of the 128 subnet is 143. This makes the host range 129-142. 142 is the last
valid host.
Which configuration command must be in effect to allow the use of 8 subnets if the Class C subnet
mask is 255.255.255.224?
31
A. Router(config)#ip classless
B. Router(config)#no ip classful
C. Router(config)#ip unnumbered
D. Router(config)#ip subnet-zero
Answer: Option D
Explanation:
A Class C subnet mask of 255.255.255.224 is 3 bits on and 5 bits off (11100000) and provides 8
subnets, each with 30 hosts. However, if the command ip subnet-zero is not used, then only 6
subnets would be available for use.
19. Using the illustration from the previous question, what would be the IP address of S0 if you were
using the first subnet? The network ID is 192.168.10.0/28 and you need to use the last available
IP address in the range. Again, the zero subnet should not be considered valid for this question.
A. 192.168.10.24
B. 192.168.10.62
C. 192.168.10.30
D. 192.168.10.127
Answer: Option C
Explanation:
A /28 is a 255.255.255.240 mask. The first subnet is 16 (remember that the question stated not
to use subnet zero) and the next subnet is 32, so our broadcast address is 31. This makes our
host range 17-30. 30 is the last valid host.
20. What is the subnetwork address for a host with the IP address 200.10.5.68/28?
A. 200.10.5.56
B. 200.10.5.32
C. 200.10.5.64
D. 200.10.5.0
Answer: Option C
Explanation:
This is a pretty simple question. A /28 is 255.255.255.240, which means that our block size is 16
in the fourth octet. 0, 16, 32, 48, 64, 80, etc. The host is in the 64 subnet.
32
Classless Inter-Domain Routing
CIDR (Classless Inter-Domain Routing, sometimes called supernetting) is a
way to allow more flexible allocation of Internet Protocol (IP) addresses than
was possible with the original system of IP address classes. As a result, the
number of available Internet addresses was greatly increased, which along
with widespread use of network address translation (NAT), has significantly
extended the useful life of IPv4.
Ans: It is the exchange of data between two devices via some form of transmission
medium such as wire cable. The communicating system must be part of a
communication system made up of a combination of hardware and software.The
effectiveness of a data communication system depends on three fundamental
characteristics: delivery, accuracy and timeliness.
2.What is simplex?
Ans: It is the mode of communication between two devices in which flow of data is
unidirectional. i.e. one can transmit and other can receive. E.g. keyboard and monitor.
3.What is half-duplex?
Ans: It is the mode of communication between two devices in which flow of data is
33
bidirectional but not at the same time. ie each station can transmit and receive but not at
the same time. E.g walkie-talkies are half-duplex system.
Ans: It is the mode of communication between two devices in which flow of data is
bidirectional and it occurs simultaneously. Here signals going in either direction share
the capacity of the link. E.g. telephone
5.What is a network?
Ans: It is a strategy in which services provided by the network reside at multiple sites.
Ans:It provides a dedicated link between two devices. The entire capacity of the link is
reserved for transmission between the two devices e.g. when we change the TV
channels by remote control we establish a point to point connection between remote
control and TV control system.
Ans: In multipoint connection more than two specific devices share a single link. Here
the capacity of the channel is shared either separately or temporally.
9.What is a topology?
34
Ans: Topology of a network is defined as the geometric representation of the
relationship of all the links and linking devices (node) to one another.Four basic
topologies are star, bus, ring and mesh. Star – Here each device has a dedicated point to
point link only to a central controller called hub.
Bus -It is multipoint. One long cable acts as a backbone to link all the devices in the
network.
Ring -Here each device has a dedicated point to point connection only with the two
devices on either side of it. Mesh -Here every device has a dedicated point to point link
to every other device.
101.Define internet?
12.What is a protocol?
Ans: It is a set of rules that governs data communication. A protocol defines what is
communicated, how it is communicated, and when it is communicated. The key
elements of protocol are syntax, semantics and timing.
Ans: Physical- It transmits raw bits over a medium. It provides mechanical and
electrical specification.
Data link- It organizes bits into frames. It provides hop to hop delivery.
Transport-It provides reliable process to process message delivery and error recovery.
35
Application-It allows ti access to network resources.
Ans: Multiplexing is the process of dividing a link, the phycal medium, into logical
channels for better efficiency. Here medium is not changed but it has several channels
instead of one.
15.What is switching?
Ans: Analog signals can have an infinite number of values in a range but digital signal
can have only a limited number of values.
18.Define bandwidth?
Ans: The range of frequencies that a medium can pass is called bandwidth. It is the
difference between the highest and lowest frequencies that the medium can
satisfactorily pass.
Ans: Data rate ie.how fast we can send data depends upon i) Bandwidth available ii)
The levels of signals we can use iii) The quality of the channel (level of noise)
36
20.Define bit rate and bit interval?
Ans: Digital signals are aperiodic.so instead of using period and frequency we use bit
interval and bit rate respectively.Bit interval is the time required to send one single
bit.Bit rate is the number of bit intervals per second.
Ans: For a noiseless channel, the Nyquist bit rate formula defines the theoretical
maximum bit rate
Bitrate=2* Bandwidth*log2L
Where Bandwidth is the bandwidth of the channel L is the number of signal level used
to represent the data Bitrate is the bit rate in bits per second.
22.What is sampling?
Ans: It is an analog to digital conversion method which takes analog signals, samples
it and generates a series of pulse based on the results of the sampling. It is not used in
data communication because the series of pulses generated still of any amplitude. To
modify it we use pulse code modulation.
Ans: Pulse code Modulation modifies pulses created by PAM to create a completely
digital signal. For this PCM first quantizes the PAM pulse. Quantization is the method
of assigning integral values in a specific tange to sampled instances.PCM is made up of
37
four separate processes: PAM, quantization, binary encoding and line encoding.
Ans: According to this theorem, the sampling rate must be at least 2 times the highest
frequency of the original signal.
Ans: It is a serial mode of transmission.In this mode of transmission, bits are sent in a
continuous stream without start and stop bit and without gaps between bytes.
Regrouping the bits into meaningful bytes is the responsibility of the receiver.
30.What is FDM?
38
Ans: In frequency division multiplexing each signal modulates a different carrier
frequency. The modulated carrier combines to form a new signal that is then sent
across the link. Here multiplexers modulate and combine the signal while
demultiplexers decompose and demodulate. Guard bands keep the modulating signal
from overlapping and interfering with one another.
31.What is TDM ?
Ans: In TDM digital signals from n devices are interleaved with one another, forming a
frame of data. Framing bits allow the TDM multiplexer to synchronize properly.
Ans: The transmission media is broadly categorized into two types i)Guided
media(wired) i)Unguided media(wireless)
Ans: The media which provides a conduct from one device to another is called a
guided media. These include twisted pair cable, coaxial cable, and fiber-optic cable.
Ans: Twisted pair cable consists of two insulated cupper wires twisted together. It is
used in telephone line for voice and data communications. Coaxial cable has the
following layers: a metallic rod-shaped inner conductor, an insulator covering the rod,
a metallic outer conductor (shield), an insulator covering the shield, and a plastic
cover.Coaxial cable can carry signals of higher frequency ranges than twisted-pair
cable. Coaxial cable is used in cable TV networks and Ethernet LANs.Fiber-optic
cables are composed of a glass or plastic inner core surrounded by cladding, all encased
in an outer jacket.Fiber-optic cables carry data signals in the form of light. The signal is
propagated along the inner core by reflection. Its features are noise resistance, low
39
attenuation, and high bandwidth capabilities. It is used in backbone networks, cable TV
nerworks, and fast Ethernet networks.
Ans: Errors can be categorized as a single-bit error or burst error. A single bit error has
one bit error per data unit. A burst error has two or more bits errors per data unit.
Ans: Redundancy is the concept of sending extra bits for use in error detection. Three
common redundancy methods are parity check, cyclic redundancy check (CRC), and
checksum.
Ans: In parity check, a parity bit is added to every data unit so that the total number of
1s is even (or odd for odd parity).Simple parity check can detect all single bit errors. It
can detect burst errors only if the total number of errors in each data unit is odd.In two
40
dimensional parity checks, a block of bits is divided into rows and a redundant row of
bits is added to the whole block.
Ans: C RC appends a sequence of redundant bits derived from binary division to the
data unit. The divisor in the CRC generator is often represented as an algebraic
polynomial.
Ans: The hamming code is an error correction method using redundant bits. The
number of bits is a function of the length of the data bits. In hamming code for a data
unit of m bits, we use the formula 2r >= m+r+1 to determine the number of redundant
bits needed. By rearranging the order of bit transmission of the data units, the hamming
code can correct burst errors.
Ans: It is the regulation of sender’s data rate so that the receiver buffer doesn’t become
overwhelmed.i.e. flow control refers to a set of procedures used to restrict the amount
of data that the sender can send before waiting for acknowledgement.
43.What is HDLC?
Ans: It is a bit oriented data link protocol designed to support both half duplex and full
duplex communication over point to point and multi point links.HDLC is characterized
by their station type,configuration and their response modes.
Ans: Authentication means validating the identity of a user who needs to access a set
41
of resources. It is of two types i)Password Authentication Protocol(PAP) ii)Challenge
Handshake Authentication Protocol(CHAP) PAP is a two step process. The user sends
a authentication identification and a password. The system determines the validity of
the Information sent.CHAP is a three step process. The system sends a value to the
user. The user manipulates the value and sends the result. The system Verifies the
result.
Ans: Network control protocol is a set of protocols to allow the encapsulation of data
coming from network layer protocol that requires the services of PPP.
Ans: To reduce the possibility of collision CSMA method was developed. In CSMA
each station first listen to the medium (Or check the state of the medium) before
sending. It can’t eliminate collision.
48.What is IP address?
Ans: The internet address (IP address) is 32bits that uniquely and universally defines a
host or router on the internet. The portion of the IP address that identifies the network
is called netid. The portion of the IP address that identifies the host or router on the
network is called hostid.
42
49.What do you mean by subnetting?
Ans: Subnetting divides one large network into several smaller ones. It adds an
intermediate level of hierarchy in IP addressing.
Ans: The advantages of fiber optics cable over twisted pair cable are Noise resistance-
As they use light so external noise is not a factor. Less signal attenuation-fiber optics
transmission distance is significantly greater than that of other guided media.Higher
bandwidth-It can support higher bandwidth.
51.What is Firewalls?
52.What is Repeaters ?
53.Define IP ?
43
Ans: In client server model ,the client runs a program to request a service and the
server runs a program to provide the service.These two programs communicate with
each other. One server program can provide services to many client programs.
55.What are the information that a computer attached to a TCP/IP internet must
possesses ?
Ans: Each computer attached to TCP/IP must possesses the following information
• Its IP addesss • Its subnet mask • The IP addesss of the router. • The Ip address of the
name server.
Ans: Domain Name System (DNS )is a client server application that identifies each
host on the internet with a unique user friendly name.
57.What is TELNET ?
Ans: TELNET is a client –server application that allows a user to log on to a remote
machine,giving the user access to the remote system. TELNET is an abbreviation of
terminal Network.
Ans: When a user logs into a local time-sharing system ,it is called local login. When a
user wants to access an application program or utility located on a remote machine,he
or she performs remote login.
44
Terminal(NVT) character set.Via this interface TELNET translates characters (data or
command) that come from local terminal into NVT form and delivers them to the
network.
Ans: The TCP/IP protocol that supports electronic mail on the internet is called Simple
Mail Transfer Protocol.SMTP provides for mail exchange between users on the same
or different computer and supports Sending a single message to one or more recipient
Sending message that include text, voice,video,or graphics.Sending message to users
on network outside the internet.
Ans: It is the main protocol used to access data on the World Wide Web .the protocol
transfers data in the form of plain text,hypertext,audio,video,and so on. It is so called
because its efficiency allows its use in a hypertext environment where there are rapid
jumps from one document to another. 100.What is URL ? Ans: It is a standard for
specifying any kind of information on the World Wide Web.
Ans: World Wide Web is a repository of information spread all over the world and
linked together.It is a unique combination of flexibility,portability,and user-friendly
features .The World Wide Web today is a distributed client-server service,in which a
client using a browser can access a service using a server.The service provided is
distributed over many locations called web sites.
63.What is HTML ?
Ans: Hypertext Markup Language (HTML) is a language for creating static web
pages.
45
64.Difference between Internet, Intranet and Extranet ?
Internet is a network which is for public, world where intranet and extranet is a network for
private use,
internet is a network where anybody can access, from around the world, but in intranet and
extranet we add some privacy so only allowed people can access.
They are completely different standards. you may have seen 802.11 somewhere. this is the
standard for Wifi, while Wimax is 802.16. Wifi is more of a local wireless network technology,
where the longest ranges are around 300 ft. with the newest iteration(802.11n) you can get
speeds of up to 300Mbps. To contrast, Wimax has a much larger range(tests have gone over
30 miles), but also has a much lower max speed, which is currently theoretically up to 40 Mbps,
however most real world tests only get around 10Mbps. since they are different standards, their
signals are not compatible.
46
Database Management System:
1. A report generator is used to
A. update files
C. data entry
Answer: Option B
Explanation:
No answer description available for this question.
B. Relational
C. Network
D. Chain
Answer: Option D
Explanation:
No answer description available for this question
47
A. database design
C. performance monitoring
D. user coordination
Answer: Option E
Explanation:
No answer description available for this question.
B. Sort
C. Look-up
Answer: Option C
Explanation:
No answer description available for this question.
5. Each of data files has a _____ that describe the way the data is stored in the file.
A. File structure
B. Records
C. Fields
D. Database
Answer: Option A
Explanation:
No answer description available for this question.
48
6. After you _____ a record, many data management the environments require you to issue a
command to save the changes you made.
A. Delete
B. Update
C. Sort key
D. Index
Answer: Option B
Explanation:
No answer description available for this question.
7. What is the language used by most of the DBMSs for helping their users to access data?
A. High level language
B. Query language
C. SQL
D. 4GL
Answer: Option B
Explanation:
No answer description available for this question.
B. language
C. spelling
D. width
Answer: Option D
Explanation:
49
No answer description available for this question.
9. In SQL, which command is used to make permanent changes made by statements issue since
the beginning of a transaction?
A. ZIP
B. PACK
C. COMMIT
D. SAVE
Answer: Option C
Explanation:
No answer description available for this question.
10. Periodically adding, changing and deleting file records is called file
A. Updating
B. upgrading
C. restructuring
D. renewing
Answer: Option A
Explanation:
No answer description available for this question.
50
Answer: Option B
Explanation:
No answer description available for this question.
Answer: Option D
Explanation:
No answer description available for this question.
B. CHANGE USER
C. ALTER TRIGGER
Answer: Option C
Explanation:
No answer description available for this question
14. If the record management system allows you to edit values before they are recorded on disk,
you can
A. correct spelling changes before they are recorded
51
E. None of the above
Answer: Option A
Explanation:
No answer description available for this question
15. The relational model uses some unfamiliar terminology. A tuple is equivalent to a:
A. record
B. field
C. file
D. data base
E. data item
Answer: Option A
Explanation:
No answer description available for this question.
16. The files stored on a secondary stage device are composed of a hierarchy of data. What does a
record in a file contain?
A. Bits
B. Characters
C. Data field
D. Schema
Answer: Option C
Explanation:
No answer description available for this question.
17. Which command is used to remove an index from the database in SQL?
A. DELETE INDEX
B. DROP INDEX
C. REMOVE INDEX
52
D. ROLL BACK INDEX
Answer: Option B
Explanation:No answer description available for this question.
18. An-owner-member set in the CODASYL specifications may have
A. only one owner but many owner occurrences
C. more than one member but only one occurrence per member
Answer: Option A
Explanation:
No answer description available for this question
19. What is the name given to the database management system which is able to handle full text
data, image data, audio and video?
A. Full media
B. Graphics media
C. Multimedia
D. Hypertext
Answer: Option C
Explanation:
No answer description available for this question.
B. Network schema
C. Relational schema
53
D. All of the above
Answer: Option A
Explanation:No answer description available for this question.
21. A database management system
A. allows simultaneous access to multiple files
Answer: Option D
Explanation:
No answer description available for this question.
22. Which of the following hardware components is the most important to the operation of a
database management system?
A. high-resolution video display
B. printer
D. plotter
E. mouse
Answer: Option C
Explanation:
No answer description available for this question.
23. The PROJECT command will create new table that has
A. more fields than the original table
54
D. all the fields of master table
Answer: Option E
Explanation:No answer description available for this question.
24. To have a file hold a list, it is necessary to
A. identify the records in the list
B. identify the name, width and type of the fields of each record.
Answer: Option D
Explanation:
No answer description available for this question.
Answer: Option D
Explanation:
No answer description available for this question.
26. In a _____ a parent record type can be linked to one or more "child" record types, but a child
record type can have only one parent.
A. Network database
B. Relational database
55
C. Distributed database
D. Hierarchical database
Answer: Option D
Explanation:No answer description available for this question.
27. Which two files are used during operation of the DBMS?
A. query language and utilities
Answer: Option C
Explanation:
No answer description available for this question.
28. When using a database management system, the first thing that you must do is to
A. create a database file
Answer: Option C
Explanation:
No answer description available for this question.
56
A. restricts the structure to a one-to-many relationship
Answer: Option B
Explanation:No answer description available for this question.
B. 4th Dimension
C. FoxPro
D. Reflex
Answer: Option D
Explanation:
No answer description available for this question.
31. Which command is used to remove a table from the database in SQL?
A. DELETE TABLE
B. DROP TABLE
C. ERASE TABLE
D. UNATTACH TABLE
Answer: Option B
Explanation:
57
No answer description available for this question.
32. A large computer information system maintains many different computer files.
Which amongst them is called a perpetual file?
A. Specialized file
B. Log file
C. Master file
D. Update file
Answer: Option C
Explanation:
No answer description available for this question.
Answer: Option A
Explanation:
No answer description available for this question.
58
D. All of the above
Answer: Option C
Explanation:No answer description available for this question.
C. It is conceptually simple
Answer: Option B
Explanation:
No answer description available for this question.
C. grant system privileges, roles, and object privileges to uses and roles
Answer: Option C
Explanation:
No answer description available for this question.
59
B. database
C. data file
D. data record
Answer: Option B
Explanation:
No answer description available for this question.
B. tree
C. chain
D. relational
Answer: Option B
Explanation:
No answer description available for this question.
Answer: Option C
Explanation:
60
No answer description available for this question.
40. In SQL, which command(s) is(are) used to enable/disable all triggers on a table?
A. ALTER TRIGGERS
B. ALTER TABLE
Answer: Option B
Explanation:
No answer description available for this question.
Answer: Option B
Explanation:
No answer description available for this question.
C. create them
61
D. access them
Answer: Option B
Explanation:No answer description available for this question.
43. A list consists of last names, first names, addresses, and pin codes if all people in the list have
the same last and the same pin code, a useful key would be
A. the pin code
C. a compound key consisting of the first name and the last name
Answer: Option C
Explanation:
No answer description available for this question.
B. ADD ROW
C. INSERT
D. APPEND
Answer: Option C
Explanation:
No answer description available for this question.
62
A. file
B. field
C. data
D. batch
Answer: Option A
Explanation:
No answer description available for this question.
46.If you want to group the records in the abc database, you could use the Jobcode as the _____.
A. Delete
B. Update
C. Sort Key
D. Index
Answer: Option C
Explanation:
No answer description available for this question.
47. The Management Information system (MIS) structure with one main computer system is called a
A. hierarchical MIS structure
63
E. None of the above
Answer: Option C
Explanation:
No answer description available for this question.
Answer: Option B
Explanation:
No answer description available for this question.
B. privacy invasion
Answer: Option B
Explanation:
No answer description available for this question.
64
B. Look-up
C. Modify
Answer: Option A
Explanation:
No answer description available for this question.
B. INSERT COLUMN
C. MODIFY TABLE
D. ALTER TABLE
Answer: Option D
B. ALTER DATABASE
C. ALTER TABLE
D. MODIFY TRIGGER
Answer: Option A
65
B. Domains
C. Queries
Answer: Option B
B. INSERT
C. BROWSE
D. APPEND
Answer: Option A
55.What name is given to the collection of facts, items of information or data which are related in
some way?
A. Database
B. Directory information
C. Information tree
D. Information provider
Answer: Option A
66
B. each user can access every sub¬schema
Answer: Option A
57.Which of the following command(s) is(are) used to recompile a stored procedure in SQL?
A. COMPILE PROCEDURE
B. ALTER PROCEDURE
Answer: Option B
58.Internal auditors should review data system design before they are
A. developed
B. implemented
C. modified
Answer: Option D
59. A _____ means that one record in a particular record type may be related to more than one
record of another record type.
A. One-to-one relationship
67
B. One-to-many relationship
C. Many-to-one relationship
Answer: Option B
B. DEFINE TABLE
C. MODIFY TABLE
Answer: Option A
B. MODIFY TABLE
C. ALTER TABLE
Answer: Option C
68
A. to add/rename data files
D. to begin/end a backup
Answer: Option E
63.The language used in application programs to request data from the DBMS is referred to as the
A. DML
B. DDL
C. query language
Answer: Option A
64.A database management system might consist of application programs and a software package
called
A. FORTRAN
B. AUTOFLOW
C. BPL
D. TOTAL
Answer: Option C
69
65.An audit trail
A. is used to make back-up copies
Answer: Option B
B. two users of the DBMS are interacting with different files at the same time
Answer: Option A
Answer: Option C
70
68.The on-line, softcopy display a customer's charge account to respond to an inquiry is an
examples of a
A. forecasting report
B. exception report
D. on demand report
Answer: Option D
69.In SQL, which command(s) is(are) used to create a synonym for a schema object?
A. CREATE SCHEMA
B. CREATE SYNONYM
C. CREATE SAME
Answer: Option B
70.If you want your database to include methods, you should use a _____ database.
A. Network
B. Distributed
C. Hierarchical
D. Object-Oriented
71
E. None of the above
Answer: Option D
71.In SQL, which of the following is not a data Manipulation Language Commands?
A. DELETE
B. SELECT
C. UPDATE
D. CREATE
Answer: Option D
B. treelike structure
D. records
Answer: Option B
73.A computer file contains several records. What does each record contain?
A. Bytes
B. Words
C. Fields
D. Database
72
E. None of the above
Answer: Option C
C. to recompile a table
D. to create a trigger
Answer: Option B
75.A ____ Contains the smallest unit of meaningful data, so you might call it the
basic building block for a data file.
A. File structure
B. Records
C. Fields
D. Database
Answer: Option C
B. processing functions
C. access control
73
D. All of the above
Answer: Option B
B. MK USER
C. CREATE USER
Answer: Option C
B. you look at each form sequentially until you see the one you want
C. you type the key in an entry line, and the correct form is displayed
Answer: Option A
79.A _____ means that one record in a particular record type is related to only one record of another
record type.
A. One-to-one relationship
B. One-to-many relationship
C. Many-to-one relationship
74
D. Many-to-many relationship
Answer: Option A
80.A _____ database does not use pointers or physical links, but instead finds related records by
examining the contents of fields.
A. Network
B. Hierarchical
C. Relational
D. Object-Oriented
Answer: Option C
81.In SQL, which command(s) is(are) used to redefine an index's future storage allocation
A. ALTER INDEX
B. REDEFINE INDEX
C. MODIFY INDEX
D. DO INDEX
Answer: Option A
C. data redundancy
75
D. program dependence
Answer: Option E
83.With respect to data input, the most accurate description of batch control is
A. dividing documents to be entered into batches
comparing to a pre-calculated figure the total of a data item summed across a batch records
C.
put into the system
Answer: Option C
84.The model for a _____ resembles the hierarchical model in many respects.
A. Network database
B. Relational database
C. Distributed database
D. Hierarchical database
Answer: Option A
85.A set of programs that handle a firm's data base responsibilities is called a
A. Data Base Management System (DBMS)
76
B. Data Base Processing System (DBPS)
Answer: Option D
86.In any hierarchy of data organization, the smallest entity to be processed as a single unit is called
A. data field
B. data record
C. data file
D. Database
Answer: Option A
B. middle management
C. lower management
Answer: Option A
77
A. handwritten list
C. a business form
Answer: Option D
B. Prompts
C. Data
Answer: Option D
90.Which of the following contains a complete record of all activity that affected the contents of a
database during a certain period of time?
A. report writer
B. query language
D. transaction log
Answer: Option D
78
91.Two files may be joined into a third file if
A. they have a row in common
C. they have no records with the same value in the common field
Answer: Option B
B. a multiprocessing environment
Answer: Option D
B. separate files
C. data base
D. data-base administrator
79
E. None of the above
Answer: Option B
94.The way a particular application views the data from the data base that the application uses is a :
A. Module
B. relational model
C. Schema
D. subschema
Answer: Option D
Answer: Option C
B. Data
C. Fields
D. Database
80
E. None of the above
Answer: Option C
B. Records
C. databases
D. file system
Answer: Option C
Answer: Option C
99.In SQL, which command is used to select data in rows and column from one or more tables?
A. CHOOSE
B. SELECT
C. LIST
D. BROWSE
81
E. None of the above
Answer: Option B
C. record relationships
Answer: Option D
Theory part:
1.What is database?
A database is a logically coherent collection of data with some inherent meaning, representing some
aspect of real world and which is designed, built and populated with data for a specific purpose.
1. 2.What is DBMS?
It is a collection of programs that enables user to create and maintain a database. In other words it
is general-purpose software that provides the users with the processes of defining, constructing and
manipulating the database for various applications.
1. Redundancy is controlled.
2. Unauthorised access is restricted.
3. Providing multiple user interfaces.
4. Enforcing integrity constraints.
5. Providing backup and recovery.
82
2. Difficult in accessing data.
3. Data isolation.
4. Data integrity.
5. Concurrent access is not possible.
6. Security Problems.
4.
3.
1. Extension: It is the number of tuples present in a table at any instance. This is time dependent.
2. Intension: It is a constant value that gives the name, structure of table and the constraints laid on it.
3.
System R was designed and developed over a period of 1974-79 at IBM San Jose Research
Center. It is a prototype and its purpose was to demonstrate that it is possible to build a Relational
System that can be used in a real life environment to solve real life problems, with performance at
least comparable to that of existing system.
Its two subsystems are
1. Research Storage
2. System Relational Data System.
3.
10. 10.How is the data structure of System R different from the relational structure?
5.
Data independence means that "the application is independent of the storage structure and access
strategy of data". In other words, The ability to modify the schema definition in one level should not
affect the schema definition in the next higher level.
83
Two types of Data Independence:
1. Physical Data Independence: Modification in physical level should not affect the logical level.
2. Logical Data Independence: Modification in logical level should affect the view level.
NOTE: Logical Data Independence is more difficult to achieve
A view may be thought of as a virtual table, that is, a table that does not really exist in its own right
but is instead derived from one or more underlying base table. In other words, there is no stored file
that direct represents the view instead a definition of view is stored in data dictionary.
Growth and restructuring of base tables is not reflected in views. Thus the view can insulate users
from the effects of restructuring and growth in the database. Hence accounts for logical data
independence.
A collection of conceptual tools for describing data, data relationships data semantics and
constraints.
This data model is based on real world that consists of basic objects called entities and of
relationship among these objects. Entities are described in a database by a set of attributes.
This model is based on collection of objects. An object contains values stored in instance variables
with in the object. An object also contains bodies of code that operate on the object. These bodies of
code are called methods. Objects that contain same types of values and the same methods are
grouped together into classes.
84
An entity set may not have sufficient attributes to form a primary key, and its primary key
compromises of its partial key and primary key of its parent entity, then it is said to be Weak Entity
set.
20.
A relation Schema denoted by R(A1, A2, ..., An) is made up of the relation name R and the list of
attributes Ai that it contains. A relation is defined as a set of tuples. Let r be the relation which
contains set tuples (t1, t2, t3, ..., tn). Each tuple is an ordered list of n-values t=(v1,v2, ..., vn).
Relationship type defines a set of associations or a relationship set among a given set of entity
types.
A data base schema is specifies by a set of definitions expressed by a special language called DDL.
85
30. 29.What is SDL (Storage Definition Language)?
This language is to specify the internal schema. This language may specify the mapping between
two schemas.
The storage structures and access methods used by database system are specified by a set of
definition in a special type of DDL called data storage-definition language.
This language that enable user to access or manipulate data as organised by appropriate data
model.
1. Procedural DML or Low level: DML requires a user to specify what data are needed and how to
get those data.
2. Non-Procedural DML or High level: DML requires a user to specify what data are needed without
specifying how to get those data.
3.
It translates DML statements in a query language into low-level instruction that the query evaluation
engine can understand.
The High level or Non-procedural DML can specify and retrieve many records in a single DML
statement. This retrieve of a record is said to be Set-at-a-time or Set-oriented.
It is procedural query language. It consists of a set of operations that take one or two relations as
input and produce a new relation.
86
37. What is normalization?
It is a process of analysing the given relation schemas based on their Functional Dependencies
(FDs) and primary key to achieve the properties
(1).Minimizing redundancy, (2). Minimizing insertion, deletion and update anomalies.
41 What is 2NF?
A relation schema R is in 2NF if it is in 1NF and every non-prime attribute A in R is fully functionally
dependent on primary key.
44.What is 4NF?
A relation schema R is said to be in 4NF if for every Multivalued dependency X Y that holds over R,
one of following is true.
1.) X is subset or equal to (or) XY = R.
2.) X is a super key.
87
45.What is a query?
A query with respect to DBMS relates to user commands that are used to interact with a data base.
The query language can be classified into data definition language and data manipulation language.
68. 47.Are the resulting relations of PRODUCT and JOIN operation the same?
No.
PRODUCT: Concatenation of every row in one relation with every row in another.
JOIN: Concatenation of rows from one relation and related rows from another.
A database trigger is a PL/SQL block that can defined to automatically execute for insert, update,
and delete statements against a table. The trigger can e defined to execute once for the entire
statement or once for every row that is inserted, updated, or deleted. For any one table, there are
twelve events for which you can define database triggers. A database trigger can call database
procedures that are also written in PL/SQL.
It is a program module, which is responsible for fetching data from disk storage into main memory
and deciding what data to be cache in memory.
It is a program module, which ensures that database, remains in a consistent state despite system
failures and concurrent transaction execution proceeds without conflicting.
It is a program module, which manages the allocation of space on disk storage and data structure
used to represent information stored on a disk.
88
Data Structure
1 - In a min-heap:
Answer : A
Explanation
In a min heap, parents always have lesser or equal values than that of their
childs.
A - queue
B - tree
C - list
D - stack
Answer : D
Explanation
Stack uses LIFO method which is good for checking matching paranthesis.
89
3 - Minimum number of queues required for priority queue implementation?
A-5
B-4
C-3
D-2
Answer : D
Explanation
Minimum number of queues required for priority queue implementation is two.
One for storing actual data and one for storing priorities.
A-n
B-n-1
C-n+1
D - 2n
Answer : A
Explanation
To make a graph cyclic, the number of edges should be at least equal to
vertices in the graph.
5 - An algorithm is
Answer : C
90
Explanation:An algorithm is a step by step procedure to solve a
computer problem.
A - Selection Sort
B - Bubble Sort
C - Merge Sort
D - Insertion Sort
Answer : A
Explanation
Except selection sort, all other soring algorithms are stable.
A - expression parsing
B - recursion
C - resource allocation
Answer : C
Explanation
Queues can be used for limited resource allocation. For other operations,
stacks are used.
B - recursive approach
C - B but not A
D - Both A & B
91
Answer : D
Explanation
The recursive approach of tower of hanoi uses divide and conquer method.
A - e-n+1
B - n-e+1
C - n+e-1
D - e-n-1
Answer : A
Explanation
We can remove maximum e-n+1 edges to get a spanning tree from complete
graph. Any more deletion of edges will lead the graph to be disconnected.
Answer : C
Explanation
A stable sorting algorithm like bubble sort, does not change the sequence of
appearance of similar element in the sorted list.
A - Ο(n2)
92
B - Ο(nlog n)
C - Ο(n3)
D - Ο(n)
Answer : D
Explanation
In the worst case, binary search will be left or right intended, making it
compare all the n values.
A - 2k − 1
B - 2k+1 − 1
C - 2k-1 + 1
D - 2k − 1
Answer : B
Explanation
If the root node is at height 0, then a binary tree can have at max 2 k+1 − 1
nodes.
A - true
B - false
Answer : A
Explanation
A linked-list is dynamic structure, it can shrink and expand as required by the
program.
93
A - 2n - 1
B-n
C-n+1
D-n-1
Answer : D
Explanation
In a simple graph, a vertex can have edge to maximum n - 1 vertices.
A - Bubble Sort
B - Merge Sort
C - Insertion Sort
Answer : B
Explanation
Only Merge sort requires extra space.
16 - The number of binary trees with 3 nodes which when traversed in post
order gives the sequence A,B,C is ?
A-3
B-4
C-5
D-6
Answer : C
Explanation
Five binary trees (of 3 nodes) are possible.
94
A - Base case
B - Average case
C - Worst case
D - NULL case
Answer : A
Explanation
Θ represents average case. Ο represents worst case and Ω represents base
case.
A - Tower of Hanoi
B - Fibonacci Series
Answer : A
Explanation
Tower of hanoi has the highest run time complexity
Answer : A
Explanation
BST does not care about complete binary tree properties.
95
20 - Which of the following algorithm does not divide the list −
A - linear search
B - binary search
C - merge sort
D - quick sort
Answer : A
Explanation
Linear search, seaches the desired element in the target list in a sequential
manner, without breaking it in any way.
Theory part:
1.What is the difference between a stack and a Queue?
Data structure is a way of defining, storing & retriving of data in a structural &
systemetic way. A data structure may contain different type of data items.
3.What is a linked-list?
A linked-list is a list of data-items connected with links i.e. pointers or
references. Most modern high-level programming language does not provide
the feature of directly accessing memory location, therefore, linked-list are
not supported in them or available in form of inbuilt functions.
96
4.What is stack?
In data-structure, stack is an Abstract Data Type (ADT) used to store and
retrieve values in Last In First Out method.
Stacks follows LIFO method and addition and retrieval of a data item takes
only Ο(n) time. Stacks are used where we need to access data in the reverse
order or their arrival. Stacks are used commonly in recursive function calls,
expression parsing, depth first traversal of graphs etc.
As queues follows FIFO method, they are used when we need to work on
data-items in exact sequence of their arrival. Every operating system
maintains queues of various processes. Priority queues and breadth first
traversal of graphs are some examples of queues.
97
9.What is binary search?
A binary search works only on sorted lists or arrays. This search selects the middle
which splits the entire list into two parts. First the middle is compared.
This search first compares the target value to the mid of the list. If it is not found, then
it takes decision on whether.
See the below image of a binary search tree, and traverse it using all available methods −
98
14.What is a minimum spanning tree (MST) ?
In a weighted graph, a minimum spanning tree is a spanning tree that has minimum
weight that all other spanning trees of the same graph.
18.What is hashing?
Hashing is a technique to convert a range of key values into a range of indexes of an
array. By using hash tables, we can create an associative data storage where data index
can be find by providing its key values.
Postfix Notation − a b + c d + *
99
Previous Question of Jahangirnagar University:
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117