Technology has advanced to the point where programming has become an essential part of our lives. We use software and applications for communication, entertainment, education, and work, and these are all built on programming languages.

Artificial Intelligence

 Artificial Intelligence(AI) is a branch of Science which deals with helping machines to find solutions of complex problems in a more human like fashion. This generally involves borrowing characteristics from human intelligence, and applying them as algorithms in a computer friendly way. John McCarthy, who coined the term Artificial Intelligence in 1956, defines it as "the science and engineering of making intelligent machines", especially intelligent computer programs. Intelligence is the computational part of the ability to achieve goals in the world. AI is the study of how to make computers do things which, at the moment, people do better. AI is the study and design of intelligent agents, where an intelligent agent is a system that perceives its environment and takes actions that maximize its chances of success.

AI programming languages include LISP, developed in the 1950s, is the early programming language strongly associated with AI. LISP is a functional programming language with procedural extensions. LISP(LISt Processor) was specifically designed for processing heterogeneous lists typically a list of symbols. Features of LISP are run-time type checking, higher order functions(functions that have other functions as parameters), automatic memory management(garbage collection) and an interactive environment. 


 

The second language strongly associated with AI is PROLOG. PROLOG was developed in the 1970s. PROLOG is declarative in nature and has facilities for explicitly limiting the search space.

Object oriented language are a class of languages more recently used for AI programming. Artificial Intelligence is a new electronic machine that stores large amount of information and process it at very high speed to solve problems. It is the science and engineering of making intelligent machines, especially intelligent computer programs. It is related to the similar task of using computers to understand human intelligence. 

Artificial Intelligence has knowledge based primary technique to link, decide and process itself like a human beings. Artificial Intelligence is usually defined as the science of making computer intelligent machine. Artificial Intelligence sometime can some the problem and answer to natural language like English, French and Nepali. The science of making computers that can recognize and react to human language either spoken or written is called Artificial Intelligence. 

Components of AI

  • Learning : Learning is distinguished into a number of different forms. The simplest is trial and error. It is the activity of gaining knowledge or skill by studying, practicing, being taught or experiencing something. It is categorized as Auditory learning.
  • Reasoning : It is the set of process that enables us to provide basis for judgement, making decisions and prediction.
  • Problem Solving : It is the process in which one perceives and tries to arrive at a desired solution from a present situation by taking some path, i.e. process of selecting, the best suitable alternatives out of multiple alternatives to reach the desired goal.
  • Perception : It is the process of acquiring, interpreting, selecting and organizing sensory information. Perception presumes sensing. In human body, perception is aided by sensory organs.
  • Linguistic Intelligence : It is one's ability to use, comprehend, speak and write the verbal and written language. It is important in interpersonal communication.

Applications/uses of AI

AI has been dominant in various fields such as :

  1. Problem Solving : This is the first application of AI. The objective of this particular area is how to implement the procedures of AI to solve the problem of human beings.
  2. Game Planning : AI plays crucial role in game such as chess, tic-tac-toe etc. Those games are played using a well defined set of rules. This makes it easy to generate the search space. These games are represented in computer. Machine can think large number of possible positions based on Heuristics knowledge.
  3. Natural language understanding : The main goal of this problem is we can ask the question to the computer in our own language i.e. computer can receive the particular language and the system gave the response within the same language. We must use to communicate with the computer using language such as English.
  4. Perception : There are three major challenges in the application areas of perception.
  5. Speech recognition : The main goal of this problem is how the computer machine can recognize our speeches. It can be described in two ways : 

                                                         - Discrete speech recognition : Discrete speech recognition means people can interact with the computers in such a way that they can insert time gap in between the two words or sentences. In this recognition computer takes some time for searching. 

                                                         - Continuous speech recognition : Continuous speech recognition means interact with the computer in such a way that we cannot insert time gap between two words or sentences. We can talk continuously with the computer. For this we can increase the speed of computer.

       6. Pattern recognition : The computer can identify the real world object with the help of camera.

       7. Image processing : The goal of image processing is to identify the relation between the parts of image by using camera so that computer can receive visual image. 


Share:

Database Administrator

     In a very general sense, a database administrator is the individual responsible for maintaining the RDBMS system. The DBA has many different responsibilities, but the overall goal of the DBA is to keep the server up at all times and to provide users with access to the required information when they need it. The DBA makes sure that the database is protected and that any chance of data loss is minimized.


 

A DBA can be someone who, from the start, has concentrated in the area of database design and administration. A DBA can be a programmer who, by default or by volunteering, took over the responsibility of maintaining a database server during project development and enjoyed the job so much that he switched. A DBA can be a system administrator who was given the added responsibility of maintaining a database server. DBAs can even come from unrelated fields, such as accounting or the help desk, and switch to Information Systems to become DBAs. A DBA needs the following : 

  • Knowledge of the operating system in which database server is running.
  • Knowledge of Structured Query Language(SQL)
  • Sound database design
  • General Understanding of network architectures(for example, Client/Server, Internet/Intranet, Enterprise)
  • Knowledge about the database Server.

DBA Responsibilities

  • Installing and Upgrading an database Server : The DBA is responsible for installing database Server or Upgrading an existing database Server. In the case of upgrading database Server , the DBA is responsible for ensuring that if the upgrade is not sucessful, the Server can be rolled back to an earlier release until the upgrade issues can be resolved.
  • Monitoring the Database Server's Health and Tuning Accordingly : Monitoring the health of the database Server means making sure that the following is done :                                                         The Server is running with optimal performance.

                                                                   The error log or event log is monitored for database errors.

                                                                    Databases have routine maintenance performed on them, and the overall system has periodic maintenance performed by the system administrator.

 

  • Using Storage Properly:  Database Servers enables us to automatically grow the size of your databases and transaction logs, or we can choose to select a fixed size for the database and transaction log. Either way, maintaining the proper use of storage means monitoring space requirements and adding new storage space(disk drives) when required.           

 

  •   Performing Backup and Recovery Duties : Backup and recovery are the DBA's most critical tasks: They include the following aspects :

                                 - Establishing standards and schedules for database backups

                                 - Developing recovery procedures for each database

                                 - Making sure that the backup schedules meet the recovery requirements

  • Managing Database Users and Security : With any database Servers, the DBA works tightly with the network administrator to add network users to the database or the DBA adds user logins. The DBA is also responsible for assigning users to databases and determining the proper security level for each user. Within each database, the DBA is responsible for assigning permissions to the various database objects such as tables, views and stored procedures.
  •   Working with Developers : It is important for the DBA to work closely with the development teams to assist in overall database design, such as creating normalized databases, helping developers tune queries, assigning proper indexes, and aiding developers in the creation of triggers and stored procedures. 
  • Establishing and Enforcing Standards : The DBA should establish naming convention and standards for the database server and databases and make sure that everyone sticks to them.
  • Transferring Data : The DBA is responsible for importing and exporting data to and from the database server.
  • Replicating Data : Database servers have many different replication capabilities such as Merge replication(2-way disconnected replication) and queued replication. Managing and setting up replication topologies is a big undertaking for a DBA because of the complexities involved with properly setting up and maintaining replication.
  • Scheduling Events : The database administrator is responsible for setting up and scheduling various events to aid in performing many tasks such as backups and replication.
  • Providing 24-hour access : The database server must stay up, and the databases must always be protected and online. Be prepared to perform some maintenance and upgrades after hours. Also be prepared to carry that dreaded beeper. If the database server should go down, be ready to get the Server up and running.
  • Learning Constantly : To be a good DBA, you must continue to study and practice your mission critical procedures, such as testing your backups by recovering to a test database. In this business, technology changes very fast, so you must continue learning database server, available client/servers, and database design tools. It is a never ending process.
Share:

Web Browser

   Web browser is the "window to the web" for Internet users around the world. It is a program that enables a user to display and interact with text, images, sound and other information located on a web page of a web site on the World Wide Web. It enables a user to quickly and easily access information provided on the web pages of the web sites by traversing hyperlinks. The two most popular browser are Internet Explorer by Microsoft and Navigator from Netscape. These browsers are used mainly by Windows based computers. Mosaic was a popular browser used by Macintosh users but today the Mac users use the Microsoft Internet Explorer as their default browser.

Web Browser History

The first widely used web browser was NCSA Mosaic. The Mosaic programming team then created the first commercial web browser called Netscape Navigator, later renamed Communicator, then renamed back to just Netscape. The Netscape browser led in user share until Microsoft Internet Explorer took the lead in 1999 due to its distribution advantage. A free open source software version of Netscape was then developed called Mozilla, which was the internal name for the old Netscape browser, and released in 2002. Mozilla has since gained in market share, particularly on non- Windows platforms, largely due to its open source foundation, and in 2004 was released in the quickly popular FireFox version.



Share:

OSI Reference Model

 The Open System Interconnection (OSI) Model is a conceptual and logical layout that defines network communication used by systems open to interconnection and communication with other systems.

The model is broken into seven sub-components, or layers, each of which represents a conceptual collection of services provided to the layers above and below it. The OSI Model also defines a logical network and effectively describes computer packet transfer by using different layer protocols.

The OSI Model may also be referred to as the seven layer OSI Model or the seven layer model. 

The Seven layers of OSI model are :

  1. Physical Layer
  2. Data Link Layer
  3. Network Layer
  4. Transport Layer
  5. Session Layer
  6. Presentation Layer
  7. Application Layer

1. Physical Layer

   The physical layer, the lowest layer of the OSI model, is concerned with the transmission and reception of the  unstructured raw bit stream over a physical medium. It describes the electrical/optical, mechanical, and functional interfaces to the physical medium, and carries the signals for all of the higher layers. 

The functions of physical layer are :

  • Data encoding : modifies the simple digital signal patters(1s and 0s) used by the PC to better accommodate the characteristics of the physical medium, and to aid in bit and frame synchronization. 

It determines :

What signal state represents a binary 1?

How the receiving station knows when a "bit-time" starts ?

 How the receiving station delimits a frame?

Physical medium attachment, accommodating various possibilities in the medium :

Will an external transceiver (MAU) be used to connect to the medium?

How many pins do the connectors have and what is each pin used for?

Transmission technique : determines whether the encoded bits will be transmitted by baseband(digital) or broadband(analog) signaling.

Physical medium transmission : transmits bits as electrical or optical signals appropriate for the physical medium, and determines :

What physical medium options can be used?

How many volts/db should be used to represents a given signal state, using a given physical medium?

 

2. Data Link Layer

The data link layer provides error free transfer of data frames from one node to another over the physical layer, allowing layers above it to assume virtually error free transmission over the link. To do this, the data link layer provides:

  • Link establishment and termination : establishes and terminates the logical link between two nodes.
  • Frame traffic control : tells the transmitting node to "back-off" when no frame buffers are available.
  • Frame sequencing : transmits/receives frames sequentially. 
  • Frame acknowledgement : provides/expects frame acknowledgments. Detects and recovers from errors that occur in the physical layer by retransmitting non acknowledged frames and handling duplicate frame receipt.
  • Frame delimiting : creates and recognizes frame boundaries.
  • Frame error checking : checks received frames for integrity.
  • Media access management : determines when the node "has the right" to use the physical medium.

3. Network Layer : 

The network layer controls the operation of the subnet, deciding which physical path the data should take based on network conditions, priority of service, and other factors. It provides :

  • Routing : routes frames among networks.
  • Subnet traffic control : routers (network layer intermediate systems) can instruct a sending station to "throttle back" its frame transmission when the router's buffer fills up.
  • Frame fragmentation : If it determines that a downstream router's maximum transmMission unit (MTU) size is less than the frame size, a router can fragment a frame for transmission and re-assembly at the destination station.
  • Logical-physical address mapping : translates logical addresses, or names, into physical addresses.
  • Subnet usage accounting : has accounting functions to keep track of frames forwarded by subnet intermediate systems, to produce billing information.

In the network layer and the layers below, peer protocols exist between a node and its immediate neighbor, but the neighbor may be a node through which data is routed, not the destination station. The source and the destination stations may be separated by many intermediate systems.

4. Transport Layer : The transport layer ensures that messages are delivered error free, in sequence, and with no losses or duplication. It relieves the higher layer protocols from any concern with the transfer of data between them and their peers. 

The size and complexity of a transport protocol depends on the type of service it can get from the network layer. For a reliable network layer with virtual circuit capability, a minimal transport layer is required. If the network layer is unreliable and/or only supports datagrams, the transport protocol should include extensive error detection and recovery. The transport layer provides :

  • Message segmentation : accepts a message from the (session) layer above it, splits the message in smaller units (if not already small enough), and passes the smaller units down to the network layer. The transport layer at the destination station reassembles the message. 
  • Message acknowledgement : provides reliable end-to-end message delivery with acknowledgements.
  • Message traffic control : tells the transmitting station to "back-off" when no message buffers are available.
  • Session Multiplexing : multiplexes several message streams, or sessions onto one logical link and keeps track of which messages belong to which sessions.5.

Typically, the transport layer can accept relatively large messages, but there are strict message size limits imposed by the network(or lower) layer. Consequently, the transport layer must break up the messages into smaller units, or frames, prepending a header to each frame. 

5. Session Layer :

The session layer allows session establishment between processes running on different stations. It provides :

  • Session establishment, maintenance and termination : allows two application processes on different machines to establish, use and terminate a connection, called a session.
  • Session support : performs the functions that allow these processes to communicate over the network, performing security, name recognition, logging and so on.

6. Presentation Layer :

The presentation layer formats the data to be presented to the application layer. It can be viewed as the translator for the network. This layer may translate data from a format used by the application layer into a common format at the sending station, then translate the common format to a format known to the application layer at the receiving station.

The presentation layer provides :

  • Character code translation : for example, ASCII to EBCDIC.
  • Data conversion : bit order, CR-CR/LF, integer-floating point, and so on.
  • Data compression : reduces the number of bits that need to be transmitted on the network.
  • Data encryption : encrypt data for security purposes. For example, password encryption.

7. Application Layer 

The application layer serves as the window for users and application processes to access network services. This layer contains a variety of commonly needed functions.

  • Resource sharing and device redirection.
  • Remote file access.
  • Remote printer access
  • Inter-process communication.
  • Network management.
  • Directory services
  • Electronic messaging(such as mail)
  • Network virtual terminals

 

 

 

Share:

What is URL ?

 A URL is the address of a file(resource) accessible on the internet. The type of resource depends on the internet application protocol. URLs represent the standardized addressing scheme for internet resources, and help the user to locate the resource by indicating exactly where they are. Every resource available in the web has a unique URL. 

URL consists of letters, number and punctuation. The URL defines the four things: method, host computer, port and path. 

  • Method is the protocol used to retrieve the document. E.g. http.
  • The host is the computer where the information is located.
  • Port is optional and contains the port number of server. It is inserted between host and path and separated from host by colon(:).
  • Path is the pathname of the file where the information is located.
Examples of URLs are :
           http://www.yahoo.com
           ftp://ftp.xyz.com



Share:

Quantum Computing

 The field of quantum computing arose during the 1980s. It was found that specific computational issues could be handled more effectively with quantum calculations than with their traditional partners.

Quantum computing has the ability to filter through immense quantities of conceivable outcomes and concentrate possible answers for complex issues and difficulties. Where traditional PCs store data as pieces with either 0s or 1s, quantum PCs use qubits. Qubits convey data in a quantum express that draws in 0 and 1 in a complex manner.

Such gigantic computing potential and the projected market size for its utilization stand out enough to be noticed of the absolute most unmistakable organizations. These incorporate IBM, Microsoft, Google, D-Waves Frameworks, Alibaba, Nokia, Intel, Airbus, HP, Toshiba, Mitsubishi, SK Telecom, NEC, Raytheon, Lockheed Martin, Rigetti, Biogen, Volkswagen, and Amgen.



Quantum computing could contribute enormously to the fields of safety, finance, military undertakings and insight, drug plan and disclosure, aviation planning, utilities (atomic combination), polymer configuration, AI, man-made reasoning (simulated intelligence), Large Information search, and advanced assembling.

Quantum PCs could be utilized to work on the solid sharing of data. Or on the other hand to further develop radars and their capacity to recognize rockets and airplane. One more region where quantum computing is supposed to help is the climate and keeping water clean with compound sensors.

Here are a few expected advantages of quantum computing:

        Monetary establishments might have the option to utilize quantum computing to plan more successful and effective venture portfolios for retail and institutional clients. They could zero in on making better exchanging test systems and further develop misrepresentation discovery.

        The medical services industry could utilize quantum registering to foster new medications and hereditarily designated clinical consideration. It could likewise control further developed DNA research.

        For more grounded web-based security, quantum computing can assist with planning better information encryption and ways of involving light motions toward distinguish gatecrashers in the framework.

        Quantum computing can be utilized to plan more effective, more secure airplane and traffic arranging frameworks.

Share:

Necessity of Digital Trust !!!

We live in a Digital world. Things come at you at the speed of light, figuratively obviously. This speed is hailed as one of the greatest advantages of the beginning of the Digital age. Taking a gander at mankind's set of experiences, digitization is all still an exceptionally late turn of events. One thing that has remained consistent all through mankind's set of experiences is the requirement for trust. Be that as it may, the idea of 'trust' signifies altogether different things in the actual world when contrasted with the advanced world.



Trust is the main key for the progress of any business, be it advanced or simple. Laying out trust is the initial step for any connection. As of late, the lines among Digital and physical have gradually been meeting up, and thusly, the meaning of trust has additionally advanced to measure up to our new assumptions. Thus, Digital Trust is an idea that empowers clients and entrepreneurs the same, to complete exchanges in a way that is secure, and moral for all gatherings included.

Digital Trust is a vital piece of the extending worldwide economy which is turning out to be increasingly more dependent on network, information use, and new innovations. To be reliable, innovation should be secure as well as capably utilized. There is an absence of understanding in regards to these two viewpoints that have prompted individuals being dubious of digitization. Absence of safety, straightforwardness, moral inquiries, and so on are causing a development in the doubt of Digital advancements.

All around the world, there isn't any settlement on what Digital trust precisely implies. There is likewise an unmistakable absence of direction to guarantee that individuals can cooperate to revamp Digital trust. Another region that is missing is an evaluation supported by information, of what really drives advanced trust among individuals and innovation.

General thoughts regarding trust are not sufficiently adaptable to fulfill the needs of trust Digital associations. Digital Trust is consequently a modifying of the system of conventional thoughts of trust to fulfill the needs vital for advanced organizations.

Your clients' thought process of you, as a brand and business has never been however significant as it seems to be currently. Business connections are not generally centered around a trade of just labor and products, yet in addition the conviction that their own data is free from any potential harm. All that from overseeing funds to medical checkups all occur with several ticks. The Internet is over-burden with similar administrations presented by a huge number of individuals. Thusly, purchasers are moving more towards trusting 'individuals like me' as opposed to a particular association.

 

As of now, Digital Trust covers six key regions, protection, security, character, consistency, risk alleviation and information honesty.

           Protection: This guarantees to your clients that you can do any exchanges or information moves without bringing a look into their own information for longer than needed.

           Security: This would be an organization's ability to ensure that there is definitely no danger to the information of any of the gatherings engaged with the transcanction.

           Character: Our web-based presence doesn't do a lot to stow away our "genuine" personality. Way of life as an element of Digital trust implies that clients are furnished with obscurity except if expressed unequivocally by them.

           Consistency: An organization's capacity to utilize existing information to foresee any dangers that might come to pass for them, and make broad arrangements in the event of a "consider the possibility that" situation. This shows their clients that an organization with foreknowledge is an organization that can be relied upon.

           Risk Relief: To have the option to comprehend and design out a method for limiting the effect of questionable occasions gets the endorsement of current and expected clients. A client will be more able to share their information when they realize that all potential dangers have been represented.

           Information Honesty: To keep your clients' trust, you should protect their information most importantly. Information Uprightness is to guarantee that every one of the information you have is finished and precise, and furthermore that it is being put away and dealt with properly.


Share:

What is Digital Rape ?

Digital Rape has made a buzz the nation over. So there may be hypothesis that the term Digital prefixed to the word 'Rape' is connected to the Digital world. Not withstanding, Digital Rape doesn't have anything to do with contraptions like PCs, telephones, workstations or Meta-possessed stages. The word is gotten from the English word 'digit', whose exacting significance is number and number.

Moreover, the word additionally implies finger or toes. The expression 'Digital Rape' is sexually impartial and is appropriate to a wide range of casualties and wrongdoers. The assault casualties are additionally partitioned into two classifications: majors and minors. According to Segment 375 of the POCSO Act, there are two sorts of perpetuators who perpetrate violations - - minor advanced attackers and major Digital Rapists. Individuals who carry out this sort of wrongdoing are accused of a measure of Rs 50,000 under Segments 5 and 6 of the POCSO Act.



According to Segment 3 of the POCSO Act, Any individual who focuses on embedding, to any degree, any item or a piece of the body, not being the penis, into the vagina, the urethra or rear-end of the kid or causes the youngster to do as such with him or some other individual is considered as penetrative rape. Regulations considering Digital Rape happened after 2012. Till then, Digital Rape was not referenced in the Indian Correctional code(IPC). Already, it went under the arrangement of attack rather than assault.

Share:

Web Technology

1. Which of the following is not JavaScript Data Types?

a. Undefined

b. Number

c. Boolean

d. Float

ans ---> Float


2. Inside which HTML element do we put the JavaScript?

a. <script>

b. <head>

c. <meta>

d. <style>


ans---> <script>


3. Predict Output:

nm="Fruit";

m=nm.length;

switch(m){

case 2: document.write("two");

            break;

case 3: document.write("three");

            break;

case 4: document.write("four");

            break;

case 5: document.write("five");

            break;

case 6: document.write("six");

            break;

case 7: document.write("seven");

            break;

}


a. four

b. five

c. 5

d. 4


ans ---> five


4. >>> in JavaScript is known as 

a. bitwise shift right operator

b. bitwise shift left operator

c. input operator

d. output operator


ans ----> bitwise shift right operator


5. Which of the following function of Array object adds one or more elements to the front of an array and returns the new length of the Array?

a. unshift()

b. sort()

c.splice()

d. toString()


ans--> unshift()


6. Which of the following also known as Conditional Expression :

a. Switch statement

b. If-then-else statement

c. Alternative to if-else

d. immediate if


ans---> Alternative to if-else


7. Predict Output of ;

parseInt("010000")/10

a. 1000

b. 01000

c. 010000

d. 100000


ans--> 1000


8. In the JavaScript, which of the following is not considered as an error :


a. Syntax error

b. Missing Semicolons

c. Division by Zero

d. Missing of Bracket


ans---> Division by Zero


9. var eg="Exam is Over"

              document.write(eg.substring(2,10))

a. Exam is

b. am is O

c. am is Ov

d. xam is O


ans---> am is Ov


10. In JavaScript, what will be used for calling the function definition expression :

a. Function prototype

b. Function Literal

c. Function calling

d. Function declaration


ans---> Function literal


11. The "new Animal()", is a kind of ..................... expression

a. Object Creation Expression

b. Primary Expression

c. Invocation Expression

d. Constructor Calling Expression


ans---> Object Creation Expression


Share:

Data Communication and Networking

 1. The ...................is the path through data transmit.

      a. Protocol

      b. Medium

      c. Sender

      d. None of the above

ans--> Medium

2. The information to be transmitted in data communication system is called ..............

a. Protocol

b. Medium

c. Communication

d. Message

ans--->  Message

3. Radio broadcast system is an example of ................... transmission

a. Simplex

b. Half Duplex

c. Full Duplex

d. None of the above

ans---> Simplex

4. Communication between computer and monitor is .............transmission

a. Simplex

b. Full Duplex

c. Half Duplex

d. None of the above

ans----> Simplex

5. Walkie-Talkie communication is an example of ............transmission.

a. Simplex

b. Half Duplex

c. Full Duplex

d. None of the above

ans----> Half Duplex

6. .................transmission mode in which data can transmit in both direction at the same time

a. Simplex

b. Half Duplex

c. Full Duplex

d. None of the above

ans----> Full Duplex

7. Transmission mode in which capacity of transmission medium is shared all the time is ................

a. Simplex

b. Half Duplex

c. Full Duplex

d. None of the above

ans----> Full Duplex

8. Computer network within building, campus or nearby building is .........

a. LAN

b. MAN

c. WAN

d. PAN

ans-----> LAN

9. Computer network that span countries, continent or the whole world is 

a. LAN

b. MAN

c. WAN

d. PAN

ans----> WAN

10. Transmission medium that provides the physical conduct from one device to another is 

a. Guided

b. Unguided

c. Both A and B

d. None of the above

ans---> Guided

11. Wireless medium is also called ........medium.

a. Guided

b. Unguided

c. Unbounded

d. Both B and C

ans---> Both B and C

12. Transmission medium in which signal transmit in the form of light is .................

a. Twisted Pair Cable

b. Communication satellite

c. Coaxial Cable

d. Fiber Optic Cable

ans---> Fiber Optic Cable

13. .........cable can transmit data in higher rate than .......cable

a. Twisted  pair, coaxial

b. Coaxial; Fiber Optic

c. Coaxial;Twisted pair

d. Fiber Optic cable

ans--> Coaxial;Twisted Pair

14. .............media transmit the signal without using physical conductor.

a. Bounded

b. Unbounded

c. Unguided

d. Both B and C

ans---> Both B and C

15. The OSI model consists of ............ layers

a. 3

b. 5

c. 7

d. 9

ans---> 7

16. The .............layer is closest to transmission medium.

a. Physical

b. Data Link

c. Transport

d. Network

ans-->Physical

17. The end to end delivery of the entire message is the responsibility of ............ layer.

a. Data Link

b. Network

c. Transport

d. Network

ans---> Transport

18. The ......layer enables the user to across network.

a. Presentation

b. Session

c. Network.

d. Application

ans-----> Application

19. In fiber optics, the signal source is ..................

a. Radio Waves

b. Infrared waves

c. Light Waves

d. Very low frequency waves

ans----> Light Waves

20. Geosynchronous satellite complete one orbit in 

a. 1 hour

b. 1 day

c. 1 month

d. 1 year

ans----> 1 year

21. .......is a type of transmission impairment in which outside source such as crosstalk corrupts the signal.

a. Attenuation

b. Noise

c. Distortion

d. Decibel

ans----> Noise

22. ................is a loss of signal's energy due to resistance of the medium.

a. Attenuation

b. Noise

c. Distortion

d. Decibel

ans---->  Attenuation

23. ...............topology that use multipoint connection.

a. Star

b. Bus

c. Ring

d. Mesh

ans---> Bus

24. .........topology require hub or central controller.

a. Star

b. Bus

c. Ring

d. Mesh

ans---->  Star

25. Mesh topology with 6 node require.....cables.

a. 6

b. 10

c. 12

d. 15

ans---> 15

26. Topology that uses point to point connection

a. Star

b. Mesh

c. Ring

d. All of the above

ans---> All of the above

27. Size of IP address in IPv4 is ..............

a. 4 Bytes

b. 8 Bytes

c. 16 Bytes

d. None of the above

ans---> None of the above

28. Size of IP address in IPv4 is .......

a. 32 Bits

b. 64 Bits

c. 128 Bits

d. None of the above

ans---> 128 Bits

29. Size of subnet mask is 

a. 32 Bits

b. 64 Bits

c. 128 Bits

d. None of the above

ans---> 32 Bits

30. Size of MAC address is 

a. 32 Bits

b. 48 Bits

c. 64 Bits

d. 128 Bits

ans----> 48 Bits

31. Private LAN/MAN of an organization that is accessible to organizational users only is ....

a. Internet

b. Extranet

c. Intranet

d. All of the above

ans---> Intranet

32. Which one is remote login tool

a. LogMeIn

b. Team Viewer

c. SplashTop

d. All of the above

ans---> Team Viewer

33. .........regenerate an incoming signal before retransmitting it

a. HUB

b. Modem

c. Repeater

d. Router

ans----> Repeater

34. Wi-Fi uses...............gigahertz radio bands.

a. 2.4

b. 5

c. Both A and B

d. None of the above

ans----> Both A and B

35. ...................command Verifies IP level connectivity to another TCP/IP computer by sending Internet Control Message Protocol(ICMP) echo Request messages.

a. IPconfig

b. Ping

c. Both A and B

d. None of the above

ans---> Ping

36. .......................command is used to display the basic TCP/IP configuration for all adapters.

a. IPconfig

b. Ping

c. Both A and B

d. None of the above

ans--->IPconfig

Share:

Database Management System

 1. It is better to use DBMS than a file when there are 

                    a. Multiple users wish to access the data

                    b. Stringent real time requirements 

                    c. Complex relationships among data

                    d. All of the above

      ans =>   Multiple users wish to access the data


2. DBMS is type of ....................software.

                   a. Application software

                   b. System Software

                   c. General Software

                   d. Both a and c.

ans => System Software

 

3. To which of the following term DBA referred ?

                    a. Data bank administrator

                    b. Data Administrator

                    c. Database Administrator

                    d. None of the above

 

ans => Database Administrator

 

4.  Duplication of data in database is known as 

                     a. Data Integrity

                     b. Data redundancy

                     c. Data inconsistency

                     d. None of the above

        ans => Data redundancy

 

5. Which of the following enables us to view data from a table based on a specific criterion?

                      a. Form

                      b. Macro

                      c. Query

                      d. Report

     ans=> Query

 

6. Which of the following is used to establish an association between related tables?

                        a. Line

                        b. Primary Key

                        c. Relationship

                        d. Records

 ans=> Relationship

 

7. Which key is used to uniquely identify each record in database?

                        a. Unique Key

                        b. Primary Key

                        c. Key Record

                        d. Field Name

ans=> Primary Key

 

8.   Which forms simplifies and ensures that there are minimal data aggregates and repetitive groups:

                         a. 1NF

                         b. 2NF

                         c. 3NF

                         d. All of the mentioned

ans=> 3NF

 

9. A database language concerned with the definition of the whole database structure and schema is 

                        a. DCL(Data Control Language)

                        b. DML(Data Manipulation Language)

                        c. DDL(Data Definition Language)

                        d. All of the above

ans=> DDL(Data Definition Language)

 

10.  Which of the following is not a database model?

                        a. Object Oriented Database Model

                        b. Network Database Model

                        c. Relational Database Model

                        d. Waterfall Database Model

  ans=>  Waterfall Database Model

 

11. The overall description of a database is called....................

                        a. Data Integrity

                        b. Database Schema

                        c. Data Definition

                        d. Data Manipulation

 ans=>Database Schema

 

12. Which of the following is not a DDL statement?

                        a. CREATE

                        b. SELECT

                        c. ALTER

                        d. DROP

ans=>  SELECT

 

13. Which of the following is not a DML statement?

                        a. CREATE

                        b. SELECT

                        c. INSERT

                        d. DELETE

ans=> CREATE

 

14. In a relational model, relations are termed as 

                        a. Tuples

                        b. Attributes

                        c. Tables

                        d.  Rows

ans=> Tables

 

15. In Hierarchical Model records are organized as 

                           a. Table

                           b. List

                           c. Links

                           d. Tree

ans=> Tree

 

16. What is used for database security?

                            a. Data encryption

                            b. Password

                            c. Finger print

                            d. All of the above

ans=> All of the above

 

17. Prevention of access to the database by unauthorized.

                            a. Integrity

                            b. Security

                            c. Productivity

                            d. Reliability

ans=>  Security

 

18. SQL stands for..............

                            a. Simple Query Language

                            b. Structured Quarter Language

                            c. Structure Question Language

                            d. Structured Query Language

ans=> Structured Query Language

 

19. Number of Tuples in Relation is called..............

                            a. Degree

                            b. Attribute

                            c. Cardinality

                            d. Vertex

   ans=>Cardinality

 

20. What is the advantage of distributed database over centralized database?

                            a. Software cost

                            b. Software complexity

                            c. Slow response

                            d. Modular growth

   ans=> Modular growth

 

21. Which one of the following refers to the copies of the same data occupying the memory space at  multiple places.

                              a. Data Repository

                              b. Data Inconsistency

                              c. Data Mining

                              d. Data Redundancy

   ans=> Data Redundancy         

 

Share:

2. Choose the correct answer from the given alternatives:

 a. The unique address of a webpage on the internet is called

        i. URL                ii. Browser

        iii. Protocol         iv. HTTP


            ans: URL


b. Which is the protocol used in internet?

        i. TCP/IP                ii. FTP

       iii. ICP                    iv. ISP

                    ans: TCP/IP

c. Which one of the following is internet service?

        i. Chat                ii. E-commerce

       iii. E-mail            iv. All of the above

                    ans: All of the above

d. Which of the following allows the user to surf and interact with a web-page?

        i. Website                ii. Browser

        iii. Webpage            iv. Web Server

                        ans: Browser

e. The ARPAnet was developed by 

        i. ANSI                ii. DARPA

        iii. POPA            iv. None of them

                        ans :  None of them

f. Which is the correct email ID?

        i. Yahoo@ramesh            ii. ramesh@yahoo.com

        iii. @ramesh.yahoo.com            iii. None of the above

     

                    ans: ramesh@yahoo.com

g. Which device is necessary to operate Internet?

        i. CD-ROM                ii. ISP

        iii. Modem                 iv. All of the above

                        ans: Modem

h. Which is web-browser software?

        i. Windows 2007                    ii. Internet explorer

       iii. Windows NT                    iv. All of the above

                            ans: Internet Explorer

i. Which is not related to Internet?

      i. ISP                            ii. TCP/IP

     iii. WWW                    iv. UPS

                      ans: UPS    

Share:

Fill in the blanks :

        a. Internet is also known as network of Network

        b. Mozilla Firefox is an application program.

        c. Instant Messaging is an online textual communication with each other in real time.

        d. FTP is a protocol used to upload and download information.

        e. The process of copying and storing data, files, programs, etc. from Internet server to user's  

            computer is known as downloading.


Share:

Write the fullform of the following abbrevations:

 a. LAN : Local Area Network

b. MAN : Metropolitan Area Network

c. WAN : Wide Area Network

d. Wi-Fi : Wireless Fidelity

e. NIC: Network Interface Card

f. VoIP : Voice Over Internet Protocol

g. UTP : Unshielded Twisted Pair

h. Modem : Modulator Demodulator

i. PPP : Point to Point Protocol

j. NOS: Network Operating System

k. SMTP : Simple Mail Transfer Protocol

l. IMAP : Internet Message Access Protocol

m. NNTP : Network News Transfer Protocol

n. NetBEUI: Network Bios extended User Interface

o. NCP : Network Control Protocol

p. BNC: British Naval Connector/Bayonet Naur Connector

q. GPS :   Global Positioning System

r. MAC:  Media Access Control

p. OFDM : Orthogonal Frequency Division Multiplexing

q. STP : Shielded Twisted Pair

r. SMTP : Simple Mail Transfer Protocol

s. FTP : File Transger Protocol

t. HTTP : HyperText Transfer Protocol

u. POP : Post Office Protocol

v. IPX/SPX : Internetwork Packet eXchange/Sequence Packet eXchange

w. Mbps : Mega bits per second


Share:

Write appropriate technical terms for the following statements:

 a. The mode of transmission in which communication takes place from both the sides simultaneously.

                      ans : Full Duplex mode of Communication

b. A computer network limited within a room .

                      ans: PAN(Personal Area Network)

c. The interconnection between two or more computers through physical and logical components to share resources.

                      ans:Computer Networks

d. The set of rules and procedures that makes the communication possible among different computers in network.

                       ans: Protocols

e. The computer that acts as the central authority on a network.

                      ans: Server

f. The computer on which user runs applications.

                     ans: Client

g. The amount of data that can be transmitted through communication channels in a fixed time period.

                      ans: Bandwidth

h. A network which is extended beyond the boundary of countries.

                       ans: Wide Area Network(WAN)

i. A device with multiple ports that joins multiple computers together.

                        ans: Switch

j. The software which controls and manages all the operation in computer network.

                         ans: Network Operating System(NOS)

k. The computer that controls and coordinates all the activities of the entire computer in a network.

                        ans:  Server Computer

l. The physical interface between cabling and network node.

                        ans: Network Topology

m. The topology in which all the computers are connected by a common distribution channel.

                        ans: Bus Topology

n. The device which accepts weak signals regenerates them and sends them back on their way.

                        ans: Repeater

o. The topology in which all the computers are connected to each other in a closed circular loop.

                        ans: Ring Topology

p. A communication media which use light to carry a data signal through the cable.

                        ans: Fibre Optic Cable

q. The physical layout or cabling structure of computer on Local Area Network.

                        ans: Network Topologies.

 r. The device that connects communications media with network devices.

                        ans: Media Connectors

s. An intelligent device that connects two different networks by setting best network traffics.

                        ans: Switch

t. The device which connects similar networks having same protocols.

                        ans: Router

 

Share:

Answer the following questions:


 a. What is communication? From which word is it derived?

       ans : Communications is the exchange of information between two or more things, such as people, devices, governments, organizations, or businesses. In digital communication, data is exchanged between two or more computing devices. This data communication (datacom) occurs over a communication medium, such as a telephone line, fiber optic cable, or wireless radio signal. The collection of digital devices and their connection media is a computer network and is what allows devices to "talk" to each other.

The word communication is derived from communis (Latin) which means common. Communis is noun word, which means common, communiality or sharing. Similarly, communicare is a verb, which means 'make something common'.  


 b. What is data transmission mode? List different types of data transmission modes.

       ans : Data communication is the transmission of electronic data and information between two points, either via an analogue(electrical) signal or digital (binary) signal.

The different types of data transmission modes are :

            i. Simplex mode of data transmission

            ii. Half Duplex mode of data transmission

            iii. Full Duplex mode of data transmission

 

c. List the elements of data communication.

        ans : The basic elements of data communication are :

            i. Sender

            ii. Medium

            iii. Receiver and 

            iv. Protocol


d. Distinguish between simplex and duplex mode of communication.

 

Simplex Mode of data communication

 

  • In Simplex mode, the communication is unidirectional, i.e., the data flow in one direction.
  • A device can only send the data but cannot receive it or it can receive the data but cannot send the data.
  • This transmission mode is not very popular as mainly communications require the two-way exchange of data. The simplex mode is used in the business field as in sales that do not require any corresponding reply.
  • The radio station is a simplex channel as it transmits the signal to the listeners but never allows them to transmit back.
  • Keyboard and Monitor are the examples of the simplex mode as a keyboard can only accept the data from the user and monitor can only be used to display the data on the screen.
  • The main advantage of the simplex mode is that the full capacity of the communication channel can be utilized during transmission.

 

Full Duplex Mode of data communication

  • In Full duplex mode, the communication is bi-directional, i.e., the data flow in both the directions.
  • Both the stations can send and receive the message simultaneously.
  • Full-duplex mode has two simplex channels. One channel has traffic moving in one direction, and another channel has traffic flowing in the opposite direction.
  • The Full-duplex mode is the fastest mode of communication between devices.
  • The most common example of the full-duplex mode is a telephone network. When two people are communicating with each other by a telephone line, both can talk and listen at the same time.

 

e. Write down the difference between guided and unguided media with example.

      ans : The difference between guided and unguided media is as follows:

f. Define computer Network and justify that, how does it reduces operation cost?

       ans : A computer network is a set of computers sharing resources located on or provided by network nodes. The computers use common communication protocols over digital interconnections to communicate with each other. These interconnections are made up of telecommunication network technologies, based on physically wired, optical, and wireless radio-frequency methods that may be arranged in a variety of network topologies .

Computer Networks can allow businesses to reduce expenses and improve efficiency by sharing data and common equipment, such as printers, among many different computers. At the same time, the network may be connected by cables, telephone lines, infrared beams etc, which is cheaper and helps to reduce the expenses.

 

g. List out any two advantages and disadvantages of computer network.

      ans: Any two advantages of computer network are: 

  1. Faster Problem-solving – 
    Since an extensive procedure is disintegrated into a few littler procedures and each is taken care of by all the associated gadgets, an explicit issue can be settled in lesser time. 
     
  2. Reliability – 
    Reliability implies backing up information. Due to some reason equipment crashes, and so on, the information gets undermined or inaccessible on one PC, another duplicate of similar information is accessible on another workstation for future use, which prompts smooth working and further handling without interruption. 

    Similarly besides its advantages, there are some disadvantages of computer network too. They are:

  1. It lacks robustness – 
    If a PC system’s principal server separates, the whole framework would end up futile. Also, if it has a bridging device or a central linking server that fails, the entire network would also come to a standstill. To manage these issues, gigantic systems ought to have a ground-breaking PC to fill in as a document server to influence setting up and keeping up the system less demanding. 
     
  2. It lacks independence – 
    PC organizing includes a procedure that is worked utilizing PCs, so individuals will depend on a greater amount of PC work, rather than applying an exertion for their jobs that needs to be done. Besides this, they will be subject to the primary document server, which implies that, in the event that it separates, the framework would end up futile, making clients inactive.

 
 h. What is Local Area Network? Write its importance.

    ans : The computer network which is limited to a small area such as a room, a building or a school and connects limited number of computer is called Local Area Network(LAN). We can use a large number of computers in a LAN but it is restricted to a small geographical area. Local Area Networks are limited by distance. In order to keep the signal at a quality transmission level, it must be boosted by repeaters along the way. 

The importance of Local Area Network are :

  • Reduced Costs: LANs  apresent a significant reduction in Local Area Network hardware costs and efficient resource pooling.
  • Increased Storage Capacity: By pooling all data into a central data storage server, the number of storage servers required is decreased and the efficiency of operations is increased.
  • Optimized Flexibility: Data can be accessed by any device from anywhere via Internet connection.
  • Streamlined Communication: Files and messages can be transferred in real time and accessed easily from anywhere on any device.

i. What is Metropolitan Area Network? Write its features.

   ans : The medium sized network that covers the area larger than a LAN but smaller than a WAN is called Metropolitan Area Network. It covers a larger geographical area such as : an university, an entire city, a valley, a district or a zone. This type of network is prepared by connecting several LANs in different locations.

Features of MAN: 

  •  It covers a larger geographical area than LAN and connects larger number of computer.
  • It uses cable or wireless communication media to connect computers.
  • It connects multiple LANs in different locations by using Ethernet technology.
  • It is owned by a single or multiple organizations.
  • It offers a number of network services compatible with bandwidths from 128 kbps to 1 Gbps.

 

j. What is Wide Area Network? Mention its characteristics.

     ans : The communication networks, that spans globally and connects large number of computer around the world is called Wide Area Network. It is the largest network in the world. It is not restricted to a geographical location. The Internet is an example of a WAN. 

The characteristics of WAN are :

  • It is not restricted to a geographical location. It covers whole world.
  • It uses satellite links or microwave system to connect several LANs and MANs.
  • It is owned by multiple organizations.
  • This technology is of high speed and very expensive to setup.
  • Data Transmission in WAN is slower than LANs and WANs.

k. List the different services provided by computer Network.

     ans : Network services are the thing that a network can do. The major networking services are as follows :

         i.  File Services :  This includes file transfer, storage, data migration, file update, synchronization and achieving.

 

        ii. Printing Services : This service produces shared access to valuable printing devices.

 

        iii. Message Services : This service facilitates email, voice mails and coordinate object oriented applications.

 

        iv. Application Services : This services allow to centralize high profile applications to increase performance and scalability(ability).

 

        v. Database Services : This involves coordination of distributed data and replication. 


L.  What is Networking architecture or model? List its types.

      ans: Network architecture describes how the computers on the network interact and communicate with each other. It is the combined form of network topologies and mode of data transmission between the computers in the network.

Generally, network architecture can be classified into two types: 

                                             i. Client-Server network architecture

                                            ii. Peer to Peer network architecture

 

M. What is protocol ? List any four types of common protocols.

         ans : Certain rules are needed for sending and receiving information between the computers in the network. Such rules are called protocols. A protocol is a set of rules that governs data communications. A protocol defines what is communicated, how it is communicated and when it is communicated. 

Some of the common protocols used in the Network are 

                             1. TCP/IP(Transmission Control Protocol/Internet Protocol)

                             2. FTP(File Transfer Protocol)

                             3. HTTP(HyperText Transfer Protocol)

                             4. IMAP(Internet Message Access Protocol)

                             5. NNTP(Network News Transfer Protocol)

                             6. POP(Post Office Protocol)

                             7. SMTP(Simple Mail Transfer Protocol)

                             8. TFTP(Trivial File Transfer Protocol)

                             9. PPP(Point to Point Protocol)

                            10. IPX/SPX(Internetwork Packet eXchange/Sequence Packet eXchange)

                            11. Net BEUI(Network Bios extended User Interface)

 

M.  Sketch and explain about Star Topology.

  

Share:

Translate

Wikipedia

Search results