This section includes 7 InterviewSolutions, each offering curated multiple-choice questions to sharpen your Current Affairs knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
What Is Traffic Shaping? |
|
Answer» ONE of the main causes of congestion is that traffic is often busy. If hosts COULD be made to transmit at a uniform rate, congestion would be less common. Another open LOOP METHOD to help manage congestion is forcing the packet to be TRANSMITTED at a more predictable rate. This is called traffic shaping. One of the main causes of congestion is that traffic is often busy. If hosts could be made to transmit at a uniform rate, congestion would be less common. Another open loop method to help manage congestion is forcing the packet to be transmitted at a more predictable rate. This is called traffic shaping. |
|
| 2. |
What Is Multicast Routing? |
|
Answer» SENDING a MESSAGE to a group is called multicasting, and its ROUTING algorithm is called multicast routing. Sending a message to a group is called multicasting, and its routing algorithm is called multicast routing. |
|
| 3. |
What Is Region? |
|
Answer» When hierarchical routing is used, the routers are divided into what we CALL REGIONS, with each router knowing all the details about how to route PACKETS to destinations within its own region, but knowing nothing about the INTERNAL structure of other regions. When hierarchical routing is used, the routers are divided into what we call regions, with each router knowing all the details about how to route packets to destinations within its own region, but knowing nothing about the internal structure of other regions. |
|
| 4. |
What Is The Difference Between Interior And Exterior Neighbour Gateways? |
|
Answer» Interior gateways CONNECT LANs of one ORGANIZATION, whereas EXTERIOR gateways connect the organization to the OUTSIDE WORLD. Interior gateways connect LANs of one organization, whereas exterior gateways connect the organization to the outside world. |
|
| 5. |
What Protocol Is Used By Dns Name Servers? |
|
Answer» DNS uses UDP for communication between SERVERS. It is a better choice than TCP because of the IMPROVED speed a connectionless protocol offers. Of course, transmission reliability suffers with UDP. DNS uses UDP for communication between servers. It is a better choice than TCP because of the improved speed a connectionless protocol offers. Of course, transmission reliability suffers with UDP. |
|
| 6. |
What Is A Dns Resource Record? |
|
Answer» DNS resource record is an entry in a name SERVER's database. There are several types of resource RECORDS used, including name-to-address RESOLUTION information. Resource records are MAINTAINED as ASCII FILES. DNS resource record is an entry in a name server's database. There are several types of resource records used, including name-to-address resolution information. Resource records are maintained as ASCII files. |
|
| 7. |
Bootp Helps A Disk Less Workstation Boot. How Does It Get A Message To The Network Looking For Its Ip Address And The Location Of Its Operating System Boot Files? |
|
Answer» BOOTP sends a UDP message with a subnet work broadcast address and waits for a reply from a SERVER that gives it the IP address. The same message might contain the name of the machine that has the boot files on it. If the boot IMAGE LOCATION is not specified, the workstation sends ANOTHER UDP message to query the server. BOOTP sends a UDP message with a subnet work broadcast address and waits for a reply from a server that gives it the IP address. The same message might contain the name of the machine that has the boot files on it. If the boot image location is not specified, the workstation sends another UDP message to query the server. |
|
| 8. |
What Is Packet Filter? |
|
Answer» PACKET filter is a standard router equipped with some extra FUNCTIONALITY. The extra functionality ALLOWS every incoming or outgoing packet to be inspected. PACKETS MEETING some criterion are forwarded normally. Those that fail the test are dropped. Packet filter is a standard router equipped with some extra functionality. The extra functionality allows every incoming or outgoing packet to be inspected. Packets meeting some criterion are forwarded normally. Those that fail the test are dropped. |
|
| 9. |
What Are The Three Type Of Routing Tables And What Are The Advantages And Disadvantages Of These? |
|
Answer» The three types of routing TABLES are fixed, dynamic, and fixed central.
The three types of routing tables are fixed, dynamic, and fixed central. |
|
| 10. |
What Is The Hello Protocol Used For? |
|
Answer» The HELLO PROTOCOL uses time instead of distance to determine optimal ROUTING. It is an alternative to the Routing INFORMATION Protocol. The HELLO protocol uses time instead of distance to determine optimal routing. It is an alternative to the Routing Information Protocol. |
|
| 11. |
Describe Various Network Type? |
|
Answer» Local Area NETWORKS Local area networks (LANs) are used to connect networking devices that are in a very close geographic area, such as a floor of a building, a building itself, or a campus environment.
DISADVANTAGE of SANs is their cost.
Local Area Networks Local area networks (LANs) are used to connect networking devices that are in a very close geographic area, such as a floor of a building, a building itself, or a campus environment. Disadvantage of SANs is their cost.
|
|
| 12. |
What Is Subnet Mask? |
|
Answer» It is a term that makes distinguish between network address and host address in IP address. SUBNET MASK value 0 defines host PARTITION in IP address and value 1 – 255 defines Network address. It is a term that makes distinguish between network address and host address in IP address. Subnet mask value 0 defines host partition in IP address and value 1 – 255 defines Network address. |
|
| 13. |
What Is Subnet? |
|
Answer» A generic term for SECTION of a LARGE networks usually SEPARATED by a bridge or ROUTER. A generic term for section of a large networks usually separated by a bridge or router. |
|
| 14. |
What Do You Meant By "triple X" In Networks? |
|
Answer» The function of PAD (Packet Assembler Disassembler) is described in a document known as X.3. The standard PROTOCOL has been defined between the TERMINAL and the PAD, called X.28; another standard protocol EXISTS between hte PAD and the network, called X.29. Together, these THREE recommendations are often called "TRIPLE X". The function of PAD (Packet Assembler Disassembler) is described in a document known as X.3. The standard protocol has been defined between the terminal and the PAD, called X.28; another standard protocol exists between hte PAD and the network, called X.29. Together, these three recommendations are often called "triple X". |
|
| 15. |
What Is Frame Relay, In Which Layer It Comes? |
|
Answer» FRAME RELAY is a PACKET SWITCHING technology. It will OPERATE in the data link layer. Frame relay is a packet switching technology. It will operate in the data link layer. |
|
| 16. |
What Is Terminal Emulation, In Which Layer It Comes? |
|
Answer» Telnet is ALSO CALLED as terminal emulation. It BELONGS to APPLICATION LAYER. Telnet is also called as terminal emulation. It belongs to application layer. |
|
| 17. |
What Is Beaconing? |
|
Answer» The PROCESS that ALLOWS a network to self-repair networks PROBLEMS. The stations on the network NOTIFY the other stations on the ring when they are not receiving the transmissions. Beaconing is used in TOKEN ring and FDDI networks. The process that allows a network to self-repair networks problems. The stations on the network notify the other stations on the ring when they are not receiving the transmissions. Beaconing is used in Token ring and FDDI networks. |
|
| 18. |
What Is Netbios And Netbeui? |
|
Answer» NETBIOS is a programming interface that allows I/O REQUESTS to be sent to and received from a remote computer and it hides the networking hardware from applications. NETBIOS is a programming interface that allows I/O requests to be sent to and received from a remote computer and it hides the networking hardware from applications. |
|
| 19. |
What Is Cladding? |
|
Answer» A LAYER of a GLASS surrounding the CENTER fiber of glass INSIDE a fiber-optic cable. A layer of a glass surrounding the center fiber of glass inside a fiber-optic cable. |
|
| 20. |
How Will You Check Ip Address Without Using Network Place? |
|
Answer» START ==> RUN ==> COMMAND ==>IPCONFIG Start ==> Run ==> Command ==>ipconfig |
|
| 21. |
What Is Full Form Of C.m.o.s? |
|
Answer» COMPLEMENTARY METAL OXIDE SEMICONDUCTOR Complementary metal oxide semiconductor |
|
| 22. |
What Is Size Of Swap? |
|
Answer» It’s the hard disk space that is used as RAM for fast processing. In window it’s known as virtual MEMORY and could be SET as per retirement via this path It’s the hard disk space that is used as RAM for fast processing. In window it’s known as virtual memory and could be set as per retirement via this path |
|
| 23. |
In Which Partition Linux Is Installed? |
|
Answer» LINUX doesn’t SUPPORT windows file system that contain partition SCHEME. It (Linux) has its own file system known as ext2, and ext3. it will INSTALL only on it.In linux file system it will install on / (root) partition. Linux doesn’t support windows file system that contain partition scheme. It (Linux) has its own file system known as ext2, and ext3. it will install only on it.In linux file system it will install on / (root) partition. |
|
| 24. |
Which Are The Bootable Files Of 98 And Xp? |
|
Answer» In windows98 it is command.com In windows98 it is command.com |
|
| 25. |
What Is Proxy Server? |
|
Answer» Most LARGE businesses, ORGANIZATIONS, and universities these days use a proxy SERVER. This is a server that all COMPUTERS on the local network have to go through before accessing information on the Internet. By using a proxy server, an organization can improve the network performance and filter what users connected to the network can access. Most large businesses, organizations, and universities these days use a proxy server. This is a server that all computers on the local network have to go through before accessing information on the Internet. By using a proxy server, an organization can improve the network performance and filter what users connected to the network can access. |
|
| 26. |
What Is Map Drive? |
|
Answer» A SPECIAL FEATURE that will map NETWORK resource to my COMPUTER. A special feature that will map network resource to my computer. |
|
| 27. |
How Will You Test Lan Card? |
|
Answer» PING 127.0.0.1 Ping 127.0.0.1 |
|
| 29. |
What Are The Perquisites To Configure Server? |
|
Answer» •LAN CARD should be connected: •LAN card should be connected: |
|
| 30. |
What Is Mac Address? |
|
Answer» It is the 48 bit hardware ADDRESS of LAN card. MAC address is usually stored in ROM on the network ADAPTER card and it is unique. It is the 48 bit hardware address of LAN card. MAC address is usually stored in ROM on the network adapter card and it is unique. |
|
| 31. |
What Is Client/server? |
|
Answer» Clients and Servers are separate logical entities that WORK together over a network to ACCOMPLISH a TASK. Many systems with very different architectures that are connected together are also called Client/Server. Clients and Servers are separate logical entities that work together over a network to accomplish a task. Many systems with very different architectures that are connected together are also called Client/Server. |
|
| 32. |
Explain Hidden Shares. How Do They Work? |
|
Answer» Hidden or ADMINISTRATIVE shares are share names with a dollar sign ($) APPENDED to their names. Administrative shares are usually created automatically for the root of each drive letter. They do not display in the NETWORK browse list. Hidden or administrative shares are share names with a dollar sign ($) appended to their names. Administrative shares are usually created automatically for the root of each drive letter. They do not display in the network browse list. |
|
| 33. |
What Is Tcp/ip? |
|
Answer» It is commonly known as TCP/IP, because its most important protocols, the TRANSMISSION Control PROTOCOL (TCP) and the INTERNET Protocol (IP), were the FIRST NETWORKING protocols defined in this standard. It is commonly known as TCP/IP, because its most important protocols, the Transmission Control Protocol (TCP) and the Internet Protocol (IP), were the first networking protocols defined in this standard. |
|
| 34. |
What Is A Layer? |
|
Answer» Layer is a completely logical PARTITION of PDU (protocol data UNIT) process. That define how the information travels from one COMPUTER to another over the NETWORK. Layer is a completely logical partition of PDU (protocol data unit) process. That define how the information travels from one computer to another over the network. |
|
| 35. |
What Are The Difference Between Hub And Switch? |
|
Answer» Hub is a layer 1 DEVICE. It will out the signal from all of its PORT except the ONE from where It’s INSERT. It is unable to detect the collision. It works on single collision and a single broadcast domain. Switch is layer 2 device. It maintains a CAM table that store the MAC address of devices attached to its port. CAM table is used to MAKE the forwarding decision. It works on per port collision and single broadcast domain. Hub is a layer 1 device. It will out the signal from all of its port except the one from where It’s insert. It is unable to detect the collision. It works on single collision and a single broadcast domain. Switch is layer 2 device. It maintains a CAM table that store the MAC address of devices attached to its port. CAM table is used to make the forwarding decision. It works on per port collision and single broadcast domain. |
|
| 36. |
What Is Ip? |
|
Answer» An INTERNET Protocol ADDRESS (IP address) is a numerical LABEL assigned to each device (e.g., COMPUTER, printer) participating in a computer network that uses the Internet Protocol for communication. An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication. |
|
| 37. |
Describe Attenuation, Distortion, And Noise In Brief? |
Answer»
FORMULA: Where PI and P2 are the variable and the powers of a signal at points 1 and 2, respectively.
This noise may corrupt the signal.Thermal noise is produced due to the random motion of electrons in a wire which creates an extra signal not originally sent by the transmitter. Induced noise comes from sources such as motors and other electronic appliances. These devices act as a sending antenna, and the transmission medium ACTS as the receiving antenna. Crosstalk is the effect of one wire on the other. Impulse noise comes from power lines, lightning etc. Formula: Where PI and P2 are the variable and the powers of a signal at points 1 and 2, respectively. This noise may corrupt the signal.Thermal noise is produced due to the random motion of electrons in a wire which creates an extra signal not originally sent by the transmitter. Induced noise comes from sources such as motors and other electronic appliances. These devices act as a sending antenna, and the transmission medium acts as the receiving antenna. Crosstalk is the effect of one wire on the other. Impulse noise comes from power lines, lightning etc. |
|
| 38. |
Define Fully Qualified Domain Name And Partially Qualified Domain Name |
|
Answer» In hierarchical namespace, NAMES are DEFINED in an invertedtree STRUCTURE with the root at the top. The tree can have only 128 levels: level 0 (root) to level 127. Each node in the tree has a label, which is a string with a maximum of 63 characters. The root label is a null string (EMPTY string). In this tree, all the labels have a different name, which GUARANTEE the uniqueness of the domain names. A full domain name is a sequence of labels separated by dots (.). The domain names are always read from the node up to the root. In hierarchical namespace, names are defined in an invertedtree structure with the root at the top. The tree can have only 128 levels: level 0 (root) to level 127. Each node in the tree has a label, which is a string with a maximum of 63 characters. The root label is a null string (empty string). In this tree, all the labels have a different name, which guarantee the uniqueness of the domain names. A full domain name is a sequence of labels separated by dots (.). The domain names are always read from the node up to the root. |
|
| 39. |
What Are The Difference Between Domain And Work Group? |
|
Answer» Find the difference between domain and workgroup: Find the difference between domain and workgroup: |
|
| 40. |
Describe Domain Name System |
|
Answer» There are TWO types of client/server programs: There are two types of client/server programs: |
|
| 41. |
What Are The Layers Of The Osi Reference Model? |
|
Answer» There are 7 OSI layers: There are 7 OSI layers: |
|
| 42. |
What Is A Node And Links? |
|
Answer» In a network the devices at different ENDPOINT LOCATED at a different location are CALLED nodes and the physical communication medium they USING is called links. In a network the devices at different endpoint located at a different location are called nodes and the physical communication medium they using is called links. |
|