Professional Documents
Culture Documents
3) You can use the tab key to move a cursor across the screen, indent a paragraph.
5) Storage that retains its data after the power is turned off is referred to as non-volatile storage.
8) A syntax contains specific rules and words that express the logical steps of an algorithm.
10) Virtual memory is memory on the hard disk that the CPU uses as an extended RAM.
11) Computers use the binary number system to store data and perform calculations.
13) To move to the beginning of a line of text, press the home key.
14) When sending an e-mail, the subject lines describe the contents of the message.
15) Tables, paragraphs and indexes work with when formatting text in word.
17) The operating system tells the computer how to use its components.
18) When cutting and pasting, the item cut is temporarily stored in clipboard.
19) The blinking symbol on the computer screen is called the cursor.
20) Magnetic tape is not practical for applications where data must be quickly recalled
because tape is a sequential
because tape is a sequential access medium.
21) Rows and columns are used to organize data in a spread sheet.
22) When you are working on documentation on PC, the document temporarily stored
in flash memory.
1)The method of communication in which transmission takes place in both directions, but only one direction at a time is
called Half Duplex
2)Error detection at the data link level is achieved by Cyclic Redundancy Code
5)Start and stop bits are used in serial communication for synchronisation
8)The Residual Error Rate measures the number of lost or garbled messages as a fraction of the total sent in the sampling
period.
9)In session layer, during data transfer, the data stream responsible for the “control” purpose (i.e control of the session
layer itself) is Capability Data
10)The Network topology that supports bi-directional links between each possible node is Mesh.
14)Correct method for full duplex mode of communication is: Both stations can transmit and receive data at the same
time.
17)Time required for a message to travel from one device to another is known as:Transit time
18)If one link fails, only that link is affected. All other links remain active. Which topology does this? – Star Topology
21)Twisted pair wires, coaxial cable, optical fiber cables are the examples of: Wired Media
23) Guided Media VS unguided media.Guided media is guided one.example- twisted pair cable,fibre optical wire,copper
wire.
Unguided :- Here information is transmitted by sending electromagnetic signals through free space and hence the name
unguided media, as the signals are not guided in any specific direction or inside any specific medium
24)Switching at the network layer in the Internet uses the datagram approach to:Packet Switching
25) IPV4 is also known as a connectionless protocol for a packet-switching network that uses the Datagram approach
1)The Open Systems Interconnection (OSI) model is a reference tool for understanding data communications between any
two networked systems. It divides the communications processes into seven layers. Each layer both performs specific
functions to support the layers above it and offers services to the layers below it. The three lowest layers focus on passing
traffic through the network to an end system. The top four layers come
into play in the end system to complete the process.
An Overview of OSI model
or Please Don Not Touch Superman Private Area (naughty one :P)
3)
4)
7)In a LAN environment, Category 5e UTP (Unshielded Twisted Pair) cable is generally used for the physical layer
for individual device connections. Fiber optic cabling is often used for the physical layer in a vertical or riser
backbone link. The IEEE, EIA/TIA, ANSI, and other similar standards bodies developed standards for this layer.
Note: The Physical Layer of the OSI model is only part of a LAN (Local Area Network).
12)Initially, software manufacturers, such as Novell, developed proprietary layer 3 addressing. However, the networking
industry has evolved to the point that it requires a common layer 3 addressing system. The Internet
Protocol (IP) addresses make networks easier to both set up and connect with one another. The Internet uses
IP addressing to provide connectivity to millions of networks around the world.
13)To make it easier to manage the network and control the flow of packets, many organizations separate their
network layer addressing into smaller parts known as subnets. Routers use the network or subnet portion of
the IP addressing to route traffic between different networks. Each router must be configured specifically for
the networks or subnets that will be connected to its interfaces.
14)Routers communicate with one another using routing protocols, such as Routing Information Protocol (RIP)
and Open version of Shortest Path First (OSPF), to learn of other networks that are present and to calculate the
best way to reach each network based on a variety of criteria (such as the path with the fewest routers).
Routers and other networked systems make these routing decisions at the network layer.
15)When passing packets between different networks, it may become necessary to adjust their outbound size to
one that is compatible with the layer 2 protocol that is being used. The network layer accomplishes this via a
process known as fragmentation. A router’s network layer is usually responsible for doing the fragmentation.
All reassembly of fragmented packets happens at the network layer of the final destination system.
16)Two of the additional functions of the network layer are diagnostics and the reporting of logical variations in
normal network operation. While the network layer diagnostics may be initiated by any networked system, the
system discovering the variation reports it to the original sender of the packet that is found to be outside normal network
operation.
17)The variation reporting exception is content validation calculations. If the calculation done by the receiving system
does not match the value sent by the originating system, the receiver discards the related packet with no
report to the sender. Retransmission is left to a higher layer’s protocol.
Some basic security functionality can also be set up by filtering traffic using layer 3 addressing on routers or
other similar devices.
22)Whether a designed to be a humorous extension or a secret technician code, layers 8, 9, and 10 are not officially part of
the OSI model. They refer to the non-technical aspects of computer networking that often interfere with the smooth design
and operation of the network.
2)Device drivers that are loaded in windows 3.X are loaded into the sytem.ini file.
3)30 pin SIMM’s, 72 pin SIMM’s, 168 pin DIMM’s types of RAM sockets can be seen on mother boards.
6)Digitizers can be converted from “dumb” to “smart” through the addition of a microprocessor
7)The extension of database file is given by dbf
9)In MS-logo Bye command is used to come out from that screen
11)A protocol that permits the transfer of files between computer on the network is FTP
12)The shortest path in routing can refer to the least expensive path
14)A data structure, in which an element is added and removed only from one end is known as stack.
16)A set of standards by which servers communicate with external programs is called common gateway interface
17) Netiquettes are some rules and regulations that have to be followed by users.
18)Multi vibrator is a two stage amplifier with output of one feedback to the input of the other.
19)A set of devices or combination of hardware and software that protects the systems on one side from system on the
other side is firewall.
20)When bandwidth of medium exceeds the required bandwidth of signals to be transmitted we use frequency division
multiplexing
24)Various input and output devices have a standard way of connecting to the CPU and Memory. These are
called interface standards.
25)Acknowledgement from a computer that a packet of data has been received and
verified is known as ACK.
3) To drop a column that is used as a foreign key, first:drop the foreign key constraint
4)In the straight CGI approach to database connectivity on the internet :the external program is located between the web
server and the database server.
CGI or Common Gateway Interface is a means for providing server-side services over the web by dynamically
producing HTML documents, other kinds of documents, or performing other computations in response to communication
from the user. In this assignment, students who want to interface with the Oracle database using Oracle’s Pro*C
precompiled language will be using CGI.
Java Servlets are the Java solution for providing web-based services. They provide a very similar interface for interacting
with client queries and providing server responses. As such, discussion of much of the input and output in terms of HTML
will overlap. Students who plan to interface with Oracle using JDBC will be working with Java Servlets.
Both CGI and Java Servlets interact with the user through HTML forms. CGI programs reside in a special directory, or in
our case, a special computer on the network (cgi-courses.stanford.edu), and provide service through a regular web server.
Java Servlets are separate network object altogether, and you’ll have to run a special Servlet program on a specific port on
a Unix machine.
5)Spanning Tree Protocol is the name of the protocol used to eliminate loops.
6)The effect of the ROLLBACK command in a transaction is to Undo all changes that the database resulting from the
execution of the transaction..
some other commands used to control transactions:
COMMIT: to save the changes.
ROLLBACK: to rollback the changes.
SAVEPOINT: creates points within groups of transactions in which to ROLLBACK
SET TRANSACTION: Places a name on a transaction.
7)In Oracle, 512 is the default number of transactions that MAXTRANS is set to if not specified.
9)Cipher lock includes a keypad that can be used to control access into areas.
10)A gateway is :a point in one network that is an entrance point to another network.
12)If the destination did not receive a segment, how will the TCP host know to resend the
information?,The ACK (acknowledgement) received will include the segment number that was not received.
13)What are the effects of mixing RAM modules with different speed ratings?The system may not run, or it crashes
periodically.
16)From smallest to largest, rank the following logical pieces of the database :
data block, extent, segment, tablespace ( Trick :- DbEST ~ the best,db-data block)
17)Data Blocks
At the finest level of granularity, Oracle stores data in data blocks (also called logical blocks, Oracle blocks, or pages).
One data block corresponds to a specific number of bytes of physical database space on disk. You set the data block size
for every Oracle database when you create the database. This data block size should be a multiple
of the operating system’s block size within the maximum limit. Oracle data blocks are the smallest units of storage that
Oracle can use or allocate.
18)Extents
The next level of logical database space is called an extent. An extent is a specific number of contiguous data blocks that
is allocated for storing a specific type of information.
19)Segments
The level of logical database storage above an extent is called a segment. A segment is a set of extents that have been
allocated for a specific type of data structure, and that all are stored in the same tablespace. For example,each table’s data
is stored in its own data segment, while each index’s datails stored in its own index segment. Oracle allocates space for
segments in extents. Therefore, when the existing extents of a segment are full, Oracle allocates another extent for that
segment. Because extents are allocated as needed, the extents of a segment may or may not be contiguous on disk. The
segments also can span files, but the individual extents cannot.
An Oracle database is comprised of one or more logical storage units called table spaces. The database’s data is
collectively stored in the database’s table spaces.
Each table space in an Oracle database is comprised of one or more operating system files called data files. A table
space’s data files physically store the associated database data on disk.
A database’s data is collectively stored in the data files that constitute each table space of the database. For example, the
simplest Oracle database would have one tablespace and one datafile. A more complicated database might have three table
spaces, each comprised of two data files (for a total of six data files).
24)In Oracle,Index organized table is more appropriate to store a small list of values in a single column in each
row for your address table.
25)While searching a website, you have been unable to find information that was on the site
several months ago. What might you do to attempt to locate that information?
Visit Google’s cached page to view the older copy.
As the name suggests, the database management system consists of two parts. They are:
Database and Management System
What is a Database?
To find out what database is, we have to start from data, which is the basic building block of any DBMS.
Data: Facts, figures, statistics etc. having no particular meaning (e.g. 1, ABC, 19 etc).
Record: Collection of related data items, e.g. in the above example the three data items had no meaning. But if we
organize them in the following way, then they collectively represent meaningful information.
The columns of this relation are called Fields, Attributes or Domains. The rows are called Tuples or Records.
Database: Collection of related relations. Consider the following collection of tables:
We now have a collection of 4 tables. They can be called a “related collection” because we can clearly find out that there
are some common attributes existing in a selected pair of tables. Because of these common attributes we may combine the
data of two or more tables together to find out the complete details of a student. Questions like “Which hostel does the
youngest student live in?” can be answered now, although Age and Hostel attributes are in different tables.
In a database, data is organized strictly in row and column format. The rows are called Tuple or Record. The data items
within one row may belong to different data types. On the other hand, the columns are often called Domain or Attribute.
All the data items within a single attribute are of the same data type.
{ trick :- Re-tu (ritu) Row ri hai …….re- record tu- tuple}
Do At Kullu.. DO- domain , At- attributes , Kullu- Column
A computer reveals the minimum of its internal details, when seen from outside. We do not know what parts it is built
with. This is the highest level of abstraction, meaning very few details are visible. If we open the computer case and look
inside at the hard disc, motherboard, CD drive, CPU and RAM, we are in middle level of abstraction. If we move on to
open the hard disc and examine its tracks, sectors and read-write heads, we are at the lowest level of abstraction, where no
details are invisible.
In the same manner, the database can also be viewed from different levels of abstraction to reveal different levels of
details. From a bottom-up manner, we may find that there are three levels of abstraction or views in the database. We
discuss them here.
The word schema means arrangement – how we want to arrange things that we have to store. The diagram above
shows the three different schemas used in DBMS, seen from different levels of abstraction.
The lowest level, called the Internal or Physical schema, deals with the description of how raw data items (like 1, ABC,
KOL, H2 etc.) are stored in the physical storage (Hard Disc, CD, Tape Drive etc.). It also describes the data type of these
data items, the size of the items in the storage media, the location (physical address) of the items in the storage device and
so on. This schema is useful for database application developers and database administrator.
The middle level is known as the Conceptual or Logical Schema, and deals with the structure of the entire database.
Please note that at this level we are not interested with the raw data items anymore, we are interested with the structure of
the database. This means we want to know the information about the attributes of each table, the common attributes in
different tables that help them to be combined, what kind of data can be input into these attributes, and so on. Conceptual
or Logical schema is very useful for database administrators whose responsibility is to maintain the entire database.
The highest level of abstraction is the External or View Schema. This is targeted for the end users. Now, an end user
does not need to know everything about the structure of the entire database, rather than the amount of details he/she needs
to work with. We may not want the end user to become confused with astounding amount of details by allowing him/her
to have a look at the entire database, or we may also not allow this for the purpose of security, where sensitive information
must remain hidden from unwanted persons. The database administrator may want to create custom made tables, keeping
in mind the specific kind of need for each user. These tables are also known as virtual tables, because they have no
separate physical existence. They are crated dynamically for the users at runtime. Say for example, in our sample database
we have created earlier, we have a special officer whose responsibility is to keep in touch with the parents of any under
aged student living in the hostels. That officer does not need to know every detail except the Roll, Name, Addresss and
Age. The database administrator may create a virtual table with only these four attributes, only for the use of this officer.
Data Independence
This brings us to our next topic: data independence. It is the property of the database which tries to ensure that if we make
any change in any level of schema of the database, the schema immediately above it would require minimal or no need of
change.
What does this mean? We know that in a building, each floor stands on the floor below it. If we change the design of any
one floor, e.g. extending the width of a room by demolishing the western wall of that room, it is likely that the design in
the above floors will have to be changed also. As a result, one change needed in one particular floor would mean
continuing to change the design of each floor until we reach the top floor, with an increase in the time, cost and labour.
Would not life be easy if the change could be contained in one floor only? Data independence is the answer for this. It
removes the need for additional amount of work needed in adopting the single change into all the levels above.
Data independence can be classified into the following two types:
Physical Data Independence: This means that for any change made in the physical schema, the need to change the
logical schema is minimal. This is practically easier to achieve. Let us explain with an example.
Say, you have bought an Audio CD of a recently released film and one of your friends has bought an Audio Cassette of
the same film. If we consider the physical schema, they are entirely different. The first is digital recording on an optical
media, where random access is possible. The second one is magnetic recording on a magnetic media, strictly sequential
access. However, how this change is reflected in the logical schema is very interesting. For music tracks, the logical
schema for both the CD and the Cassette is the title card imprinted on their back. We have information like Track no,
Name of the Song, Name of the Artist and Duration of the Track, things which are identical for both the CD and the
Cassette. We can clearly say that we have achieved the physical data independence here.
Logical Data Independence: This means that for any change made in the logical schema, the need to change the external
schema is minimal. As we shall see, this is a little difficult to achieve. Let us explain with an example.
Suppose the CD you have bought contains 6 songs, and some of your friends are interested in copying some of those
songs (which they like in the film) into their favorite collection. One friend wants the songs 1, 2, 4, 5, 6, another wants 1,
3, 4, 5 and another wants 1, 2, 3, 6. Each of these collections can be compared to a view schema for that friend. Now by
some mistake, a scratch has appeared in the CD and you cannot extract the song 3. Obviously, you will have to ask the
friends who have song 3 in their proposed collection to alter their view by deleting song 3 from their proposed collection
as well.
Database Administrator
The Database Administrator, better known as DBA, is the person (or a group of persons) responsible for the well being of
the database management system. S/he has the flowing functions and responsibilities regarding database management:
Definition of the schema, the architecture of the three levels of the data abstraction, data independence.
Modification of the defined schema as and when required.
Definition of the storage structure i.e. and access method of the data stored i.e. sequential, indexed or direct.
Creating new used-id, password etc, and also creating the access permissions that each user can or cannot enjoy. DBA is
responsible to create user roles, which are collection of the permissions (like read, write etc.) granted and restricted for a
class of users. S/he can also grant additional permissions to and/or revoke existing permissions from a user if need be.
Defining the integrity constraints for the database to ensure that the data entered conform to some rules, thereby
increasing the reliability of data.
Creating a security mechanism to prevent unauthorized access, accidental or intentional handling of data that can cause
security threat.
Creating backup and recovery policy. This is essential because in case of a failure the database must be able to revive
itself to its complete functionality with no loss of data, as if the failure has never occurred. It is essential to keep regular
backup of the data so that if the system fails then all data up to the point of failure will be available from a stable storage.
Only those amount of data gathered during the failure would have to be fed to the database to recover it to a healthy
status.
Sharing of Data: In a paper-based record keeping, data cannot be shared among many users. But in computerized DBMS,
many users can share the same database if they are connected via a network.
Data Integrity: We can maintain data integrity by specifying integrity constrains, which are rules and restrictions about
what kind of data may be entered or manipulated within the database. This increases the reliability of the database as it
can be guaranteed that no wrong data can exist within the database at any point of time.
Data security: We can restrict certain people from accessing the database or allow them to see certain portion of the
database while blocking sensitive information. This is not possible very easily in a paper-based record keeping.
However, there could be a few disadvantages of using DBMS. They can be as following:
As DBMS needs computers, we have to invest a good amount in acquiring the hardware, software, installation facilities
and training of users.
We have to keep regular backups because a failure can occur any time. Taking backup is a lengthy process and the
computer system cannot perform any other job at this time.
While data security system is a boon for using DBMS, it must be very robust. If someone can bypass the security system
then the database would become open to any kind of mishandling.
1)When collection of various computers seems a single coherent system to its client, then it is called distributed system.
2)Two devices are in network if a process in one device is able to exchange information with a process in another device.
5)Communication channel is shared by all the machines on the network in broadcast network.
7)A router is a device that forwards packets between networks by processing the routing information included in the
packet.
8)A list of protocols used by a system, one protocol per layer, is called protocol stack.
11)The IETF standards documents are called RFC (Request For Comments.)
12)In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are Added.Every layer adds
its own header to the packet from previous layer.
13)The structure or format of data is called Syntax.Semantics defines how a particular pattern to be interpreted, and what
action is to be taken based on that interpretation.
14)Communication between a computer and a keyboard involves Simplex transmission.Data flows in single direction.
16)The Medium is the physical path over which a message travels.Message travel from sender to reciever via a medium
using a protocol.
17)FCC organization has authority over interstate and international commerce in the communications field.
18)Switch is not a network edge device.Network egde devices refer to host systems, which can host applications like web
browser.
19)A set of rules that governs data communication is Protocols.
Reference Models
1)OSI stands for open system interconnection.
3)TCP/IP model does not have session layer,presentation layer but OSI model have these layers.
4) transport layer links the network support layers and user support layers.
5)physical address and logical address,port address,specific addresses are used in an internet employing the TCP/IP
protocols.
Physical Layer
1) The physical layer concerns with bit-by-bit delivery.. Data format is bits.
2)optical fiber transmission media has the highest transmission speed in a network.
3)Bits can be send over guided and unguided media as analog signal by digital modulation.
4)The portion of physical layer that interfaces with the media access control sublayer is called physical signalling
sublayer..
8)The physical layer translates logical communication requests from the data link layer into hardware specific operations.
1)Date format if FRAMES.The data link layer takes the packets from network layer and encapsulates them into frames
for transmission.
3)media access control sublayer of the data link layer performs data link functions that depend upon the type of medium.
5)Automatic repeat request error management mechanism is provided by logical link control sublayer.
6)When 2 or more bits in a data unit has been changed during the transmission, the error is called burst error.
8)The technique of temporarily delaying outgoing outgoing acknowledgements so that they can be hooked onto the next
outgoing data frame is called piggybacking.
Protocols :-