Professional Documents
Culture Documents
Viva
Viva
Computer Fundamental
Q.1 A byte has how many bits?
8 bits are in a byte
Q.2 1KB is composed of how many bytes?
1024 bytes are present in 1MB
Q.3 1 GB consists of how many megabytes?
1024 bytes are present in 1MB
Q.4 What will we configure so that some files are not shown in the Windows explorer?
We can enable the hidden attribute of those file and the files will not be shown in the Windows explorer
Q.5 What is the use of USB device?
USB device can be attached to computer without any configuration as it automatically configured like USB
mouse or keyboard.
Q.6 Are there any input devices other than keyboard or mouse?
Yes, digital pen, touch screen and many other devices can be used for input.
Q.7 What type of device is a scanner?
Scanner is an input device as it sends image of documents to scan, to the computer.
Q.8 When should a laser printer be used in the office?
If the number of print outs needed in the office are high or at least 20 + in a month, then laser printer is
suggested.
Q.9 What is the benefit of laser printer?
A laser printer prints with high speed, at higher resolution and is low cost as compared to inkjet printer if
printing black and white prints.
Q.10 What is the benefit of inkjet printer?
An inkjet printer is allow cost solution to print color print outs for home, small office or small requirement.
Q.11 When should an inkjet printer be used in the office?
An inkjet printer should be used in the office if color prints are needed though in small number (may be 10 to 15
prints in a month).
Q.12 List a most used storage device
A pen drive or USB drive is the most used storage device
Q.13 Does RAM stores data after the computer is switched off?
No, RAM does not store data after the computer is switched off.
Q.14 Which storage device stores data after the computer is switched off?
Hard disk can store data after the computer is switched off.
Q.15 Does a USB mouse needs device driver to be installed for using it?
No, USB mouse does not needs device driver as it automatically detected and drivers are installed for usage.
Q.16 Which technology is used to connect computers wirelessly to a network?
Wi-Fi is the technology used to connect computers wirelessly to a network.
Q.17 Which Microsoft utility improves the access speed of data on the computer by storing data alongside
to other on hard disk instead of on various parts of a hard disk?
Disk Defragmenter is a Microsoft utility improves the access speed of data on the computer.
Q.18 Where does the start button is located on the Windows desktop?
The start button is located on bottom left-most end, of the Windows desktop
Q.19 What is the shortcut key in Windows to copy a file?
We need to select the file to copy and press the control key and 'c' key both at once, to copy the selected file.
Q.20 How do you move a file in Windows?
In Windows to move a file, we first select the file and press control and 'x' keys both at once and then press
control and 'v' key where the file was to be moved to.
Q.21 How can we access a folder in Windows on a network?
We can access a folder in Windows on a network by enabling the sharing options of the folder.
Q.22 Which section shows date and time on the Windows desktop?
Notification Area on the Windows desktop shows the date and time.
Q.23 What is ASCII?
ASCII stands for American Standard Code for Information Interchange and is used for storing data on
computer.
Q.24 List the keyboard keys to create a new blank document in MS-Word?
The keyboard keys are control and 'n', both at once.
Q.25 The keyboard keys to open a file in MS-Excel, is?
The keyboard keys are control and 'o', both at once.
Q.26 Name a free web based email
Gmail is a free and popular web based email.
Q.27 What produces soft copy output?
Monitor produces soft copy output
Q.28 What produces hard copy output?
Printer produces hard copy output
Q.29 Which storage unit stores more data - MB or GB?
GB stores more data as 1 GB equals 1024 MB.
Q.30 How will you protect data on hard disk?
We should take regular backup, which will protect data on hard disk and will be accessible if the hard disk
crashes.
Q.31 What could be the reason for printouts being light on from the black and white laser printer?
The toner has depleted and new one needs to be placed before other prints.
Q.32 What to do if the icons on the desktop are too big in size?
The video device driver is absent or corrupt due to which correct video resolution has not been selected. Install
correct video device driver and select the correct resolution for addressing the issue.
Q.33 What to do if the computer is not connected to local network?
Check the network cable or the wireless connection for any loose or interruption. Network device driver should
be checked.
Q.34 What do you understand by buffer?
A buffer is a temporary storage to store data items and is used during data transfer between devices like
computer and pen drive.
Q.35 Which unit is used to describe the screen resolution?
Pixel is the unit for screen resolution.
Q.36 What is meant by booting of the system?
Booting of the system means that the computer has just been started and it is loading the operating system like
Windows along with other programs.
Q.37 What is BIOS?
BIOS stores hardware setting of the computer and is used by the operating system.
Q.38 What is FAT?
FAT is a file system from Microsoft used in Windows operating system.
Q.39 Which file system is used in Windows 10?
Windows 10 uses NTFS as its file system.
Q.40 Which character indicates division in Excel?
The character '/' is used for division in Excel
Q.41 List the smallest storage unit in a computer?
Bit is the smallest storage unit in a computer.
Q.42 How many GB are there in a TB?
1024 GB are present in one TB.
Q.43 Which default file extension is used for a compressed file in Windows?
ZIP is the default file extension used for a compressed file in Windows.
Q.44 What is the default file extension for Notepad files?
TXT is the default file extension for Notepad files.
Q.45 List the file extension being used by MS-Paint files
BMP is the default file extension for MS-Paint files.
Q.46 Which shortcut key will close the active window on Microsoft Windows?
The keys 'Alt' and 'F4' pressed both at once, will close the active window on Microsoft Windows.
Q.47 What is the benefit of graphic files with jpg extension as compared to bmp?
The jpg extension file takes lesser space as compared to bmp graphic files for same image.
Q.48 Which formatting can be applied to text in Notepad?
Notepad only supports font based formatting for a text which includes font type, size and style.
Q.49 Can we open multiple Notepad windows?
Yes, we can open multiple Notepad windows.
Q.50 Can we open same file in multiple Notepad windows at once?
Yes, we can open same file in multiple Notepad windows at once.
1) A process is a _______.
Answer: (b) program in the execution
Explanation: A process is a program that is executed by the threads. It consists of multiple threads of
execution.
2) The word processing feature that catches most random typographical errors and misspellings is known as
Answer: (b) Spell checker
Explanation: The word processing feature that catches most random typographical errors and misspellings is
known as spell checker.
3) What is smallest unit of the information?
Answer: (a) A bit
Explanation: The smallest unit of the information is a bit. All information is stored in the computer as bits.
4) What is the decimal equivalent of the binary number 10111?
Answer: (d) 23
5) What is the term for a temporary storage area that compensates for differences in data rate and data flow
between devices?
Answer: (a) Buffer
Explanation: Buffer is the temporary storage that can be used to compensate for a difference in data rate and
data flow between devices. In other words, a buffer is an area of physical memory storage used to store data
temporarily.
6) How many color dots make up one color pixel on a screen?
Answer: (d) 3
Explanation: Three color dots form a color pixel on a screen, and these are the following color dots: red, blue,
and green. you can make any color from these 3 colors on the screen
8) How is the data stored on the diskette?
Answer: (c) Magnetism
Explanation: The data is stored on the diskette in magnetism form. A diskette is a removable data storage, and
it is used with the PC.
9) Which of the following is the smallest visual element on a video monitor?
Answer: (b) Pixel
Explanation: A pixel is the smallest portion of the screen. The name Pixel is made from the "Picture element"
and is also called the PEL. All screen is made by putting millions of pixels together in a matrix form.
10) Which of the following natural element is the primary element in computer chips?
Answer: (a) Silicon
Explanation: Silicon is the primary element in computer chips. Silicon is a highly pure element which is now
perfect for the massive computer chip industry. It is cost efficient and easy to use.
11) Which of the following programs enables you to calculate numbers related to rows and columns?
Answer: (b) Spreadsheet program
Explanation: Spreadsheet programs help you to calculate numbers related to rows and columns. It can also
graphically represent the data as per the user's requirement.
12) Which of the following is a structured programming technique that graphically represents the detailed steps
required to solve a program?
Answer: (c) Flowchart
Explanation: Flowchart is a structured programming technique that graphically represents the detailed steps
required to solve a program. Usually, it shows the steps as boxes of different types, and these boxes are
connected with arrows.
14) Which of the following is an output device?
Answer: (d) VDU
Explanation: The full form of VDU is the Visual Display Unit. It is a hardware output device that uses a
cathode ray tube to display a visual image.
15) Which of the following is an input device?
Answer: (d) Mouse
Explanation: A mouse is a hardware input device that controls a cursor on a computer. With the help of the
mouse, you can select, open, and move files, icons, folders, and text on the PC.
16) Which of the following is the extension of Notepad?
Answer: (a) .txt
Explanation: The .txt file extension is a standard text document extension that contains the unformatted text. It
is the default file extension for the notepad.
17) BIOS is used?
Answer: (a) By operating system
Explanation: BIOS is used by the operating system. It is used to configure and identify the hardware in a
system such as the hard drive, floppy drive, optical drive, CPU, and memory.
18) What is the mean of the Booting in the system?
Answer: (a) Restarting computer
Explanation: Booting is a process of the restart the computer. After restarting it, there is no software in the
computer's main memory.
19) A computer is accurate, but if the result of a computation is false, what is the main reason for it?
Answer: (c) Incorrect data entry
20) The central processing unit is located in the _____.
Answer: (b) System unit
Explanation: The central processing unit is located in the system unit. The system unit controls the entire
computer. It includes RAM, Processors, Optical drive, Power supply, Fans, Hardware, Peripheral devices,
BIOS, etc.
21) Which one of the following groups contains graphical file extensions?
Answer: (d) JPG, GIF, BMP
Explanation: JPG, GIF, BMP are all extensions of graphical file. JPG stands for Joint Photographic Experts
Group, GIF stands for Graphics Interchange Format, and BMP stands for Bitmap Image File.
22) Which of the following is equal to a gigabyte?
Answer: (c) 1024 megabytes
23) How many bytes does 4 kilobytes represent?
Answer: (c) 4096
Explanation:
1 kb = 210 bytes in binary
1 kb = 1024 bytes in binary
4 kb = 4 * 1024 bytes
= 4096 bytes
24) Which type of program acts as an intermediary between a user of a computer and the computer hardware?
Answer: (a) Operating system
Explanation: An OS is a kind of program that acts as an intermediary for computer hardware and computer
user. The purpose of an operating system is to provide a user-friendly and effective environment.
25) What kind of language can computer understand?
Answer: (a) Assembly language
Explanation: An assembly language is a scripting language capable of telling the computer explicitly what to
do.
27) Which of the following is not one of the internal components of a CPU?
Answer: (d) Floppy disk
Explanation: Floppy disk is not an internal components of a CPU. It is a component of the secondary storage
and external storage. It is a kind of data storage device.
28) What is the speed of computer measured in?
Answer: (c) Gigahertz
Explanation: The computer clock speed is normally calculated in gigahertz (GHz) or megahertz (MHz). a
gigahertz is equal to one billion ticks per second, and a megahertz is equal to one million ticks per second.
29) What is the full form of RAM?
Answer: (b) Random Access Memory
Explanation: The full name of RAM is random access memory. It is a hardware device located in a computer
that stores data temporarily. Temporary means it only stores data for some time. RAM is also called main
memory, primary memory, or system memory.
30) What is the full form of DRAM?
Answer: (b) Dynamic Random-Access Memory
Explanation: The full name of DRAM is dynamic random-access memory. It needs a refresh power to work
and it has transistor and capacitor for the memory cell. It is used in video game consoles, networking hardware,
and system memory, etc.
31) Which one of the following software applications would be the most appropriate for performing numerical
and statistical calculations?
Answer: (d) Spreadsheet
32) Which of the following is not considered hardware?
Answer: (a) Operating system
Explanation: The operating system (OS) is a software that acts as an interface between a computer and a user.
It is also called system software. OS is the first program to be loaded into a computer. It manages all the
operations of the computer.
33) Which of the following is exclusively a sequential access storage device?
Answer: (c) Magnetic tape
Explanation: Magnetic tape is exclusively a sequential access storage device. Sequential access memory is a
type of data storage devices that read and write the data in a series.
34) Akshat has created a story of ten pages, but only wants to print the first two pages. Which printer command
should he choose?
Answer: (b) Print from 1 to 2
35) What is the full form of SRAM?
Answer: (a) Static Random-Access Memory
36) What is the full form of USB?
Answer: (d) Universal System Bus
Explanation: The full name of USB is Universal Serial Bus. It is a common interface that allows the
communication between two devices.
37) Which one of the following is not a form of data storage media?
Answer: (a) A database
Explanation: A database is a collection of information that is organized in such a way that information can be
easily accessed, managed, and updated. In the database
38) What is five main components of a computer system?
Answer: (d) CPU, Memory, System bus, Input, Output
39) Which of the following numbers is a binary number?
Answer: (d) 0 and 1
32744) A hard disk drive can be directly connected to a PC via a _____.
Answer: (a) SCSI interface
Explanation: A hard disk drive can be directly connected to a PC via a SCSI interface. SCSI is a group of
protocols that send the data between computers and external devices in a physical manner.
45) The use of the IC in a computer has ______.
Answer: (b) Reduced the size and cost of computers
Explanation: The use of the IC in a computer has reduced the cost of computers. It is an incredibly small
electronics chip integrated with a set of electrical circuits and transistors. It is a very small chip.
47) What is the full form of SCSI?
Answer: (b) Small computer system interface
Explanation: The full name of SCSI is Small computer system interface. SCSI is a group of protocols that send
the data between computers and external devices in a physical manner.
48) Which one of the following is not input device?
Answer: (c) Speaker
49) Which one of the following is an example of the browser software?
Answer: (d) Internet explorer
Explanation: Internet explorer is a web browser software on the windows computer.
50) Which one of the following commands can be used to work on a file?
Answer: (c) Ctrl + C
1. Who is the father of Computers?
b) Charles Babbage
2. Which of the following is the correct abbreviation of COMPUTER?
d) Commonly Operated Machines Used in Technical and Educational Research
3. Which of the following is the correct definition of Computer?
a) Computer is a machine or device that can be programmed to perform arithmetical or logic operation
sequences automatically
b) Computer understands only binary language which is written in the form of 0s & 1s
c) Computer is a programmable electronic device that stores, retrieves, and processes the data
d) All of the mentioned
4. What is the full form of CPU?
c) Central Processing Unit
5. Which of the following language does the computer understand?
c) Computer understands only Binary Language
6. Which of the following computer language is written in binary codes only?
b) machine language
7. Which of the following is the brain of the computer?
a) Central Processing Unit
8. Which of the following is not a characteristic of a computer?
d) I.Q.
9. Which of the following is the smallest unit of data in a computer?
a) Bit
10. Which of the following unit is responsible for converting the data received from the user into a computer
understandable format?
b) Input Unit
11. Which of the following monitor looks like a television and are normally used with non-portable computer
systems?
c) CRT
13. Which of the following part of a processor contains the hardware necessary to perform all the operations
required by a computer?
d) Data path
14. Which of the following is designed to control the operations of a computer?
c) System Software
15. Which of the following device use positional notation to represent a decimal number?
b) Abacus
16. Which of the following is used in EBCDIC?
b) Mainframes
17. Which of the following are physical devices of a computer?
a) Hardware
18. Which of the following defines the assigned ordering among the characters used by the computer?
c) Collating Sequence
19. Which of the following storage is a system where a robotic arm will connect or disconnect off-line mass
storage media according to the computer operating system demands?
d) Tertiary
20. Which of the following is known as the interval between the instant a computer makes a request for the
transfer of data from a disk system to the primary storage and the instance the operation is completed?
c) Disk access time
21. Which of the following devices provides the communication between a computer and the outer world?
b) I/O
22. Which of the following are the input devices that enable direct data entry into a computer system from
source documents?
d) Data Scanning devices
23. Which of the following is the device used for converting maps, pictures, and drawings into digital form for
storage in computers?
b) Digitizer
24. Which of the following can access the server?
a) Web Client
25. Which of the following is known as the language made up of binary-coded instructions?
d) Machine
26. Which of the following package allows individuals to use personal computers for storing and retrieving their
personal information?
a) Personal assistance package
27. Which of the following is created when a user opens an account in the computer system?
c) Subdirectory
28. Which of the following is a technique that marked the beginning of computer communications?
c) Time Sharing
29. Which of the following is a type of technique in which dumb terminals are connected to a central computer
system?
a) Time Sharing
30. Which of the following service allows a user to log in to another computer somewhere on the Internet?
c) Telnet
31. Which of the following is not a type of computer on the basis of operation?
d) Remote
32. Which of the following type of computer is mostly used for automatic operations?
c) hybrid
33. Which of the following invention gave birth to the much cheaper microcomputers?
b) Microprocessors
34. Which of the following computers are lower than mainframe computers in terms of speed and storage
capacity?
c) Mini
35. Which of the following is the first neural network computer?
d) SNARC
2.Structured Programming
1) What is Computer programming?
Computer Programming is also known as programming or coding. Programming is a process which includes
processes such as coding, maintaining, updating, debugging, writing, designing (algorithm), etc.
2) How does programming work?
Programming contains a set of instructions for the computer to perform different tasks.
3) What is debugging?
Debugging is the process of finding and removing errors in a program
4) Name different types of errors which can occur during the execution of a program?
Syntax Errors
Runtime Errors
Logical errors
5) When a syntax error occurs?
A syntax error occurs when the program violates one or more grammatical rules of the programming language.
These errors are detected at compile time.
6) When a runtime error occurs?
A runtime error occurs when the computer is directed to perform an illegal operation by the program such as
dividing a number by zero.
7) When a logical error occurs?
The logical error happens when a program implements the wrong logic.
8) What is a flowchart?
The flowchart is a pictorial representation of a program which helps in understanding the flow of control and
data in the algorithm.
9) What is an algorithm?
An algorithm is a finite set of steps which, if followed, accomplish a particular task. An algorithm must be clear,
finite and effective.
11) What are variables?
Variables are named memory locations (memory cells) which are used to store the program’s input and its
computational results during program execution.
12) What are reserved words?
Reserved words or keywords are the words, which have predefined meanings. They have predefined uses and
cannot be used or redefined for any other purpose in a programming language.
Examples
IF
ELSE
THEN
13) What are loops?
The loop is a structure which can repeat a set of statements up to a fixed number of times or until a certain
criterion is satisfied.
17) What is the use of Nested Loop?
Loop within a loop is called nested loop.
18) What is Documentation?
Documentation is a detailed description of a program’s algorithm, design, coding method, testing, and proper
usage.
19) What is the working of a compiler?
A compiler is a unique program that can process statements which are written in a particular programming
language and can turn them into machine language or “code.”
20) What do we call the binary form of a target language?
The binary form of a target language is also called “Binary Code”.
21) What are constants?
A constant is a quantity whose value cannot be changed.
22) Name two types of constants.
Numeric Constants
String Constants
23) Define Numeric constants.
Numeric constants consist of integers, single precision, or double-precision numbers.
24) Define String constants.
A string constant is a sequence of alphanumeric characters enclosed in double quotation marks.
25) Define Operators.
Operators are symbols which are used to perform certain operations on a data. These include arithmetic,
relational, logical, and assignment operators.
26) What is an Array?
An array is a collection of contiguous memory locations which can store data of the same type.
28) What is the purpose of arithmetic operators?
Arithmetic operators are used to perform arithmetic operations on values (numbers).
29) What is the purpose of relational operators?
Relational operators are used to compare two values. These operators always evaluate to true or false.
32) What is Machine code?
Machine code is a language, which can be processed directly by a microprocessor without any need of the
previous transformation.
35) What is reliability?
It is the proper working of software during a specific period of time
36) What is modeling language?
An artificial language that can be used to express information or knowledge or systems in
an arrangement which is defined by a reliable number of rules.
37) Name some modeling languages.
Names of some modeling languages are listed below:
Business Process Modeling Notation
EXPRESS
Extended Enterprise Modeling Language
Flowchart
Fundamental Modeling Concepts
Jackson Structured Programming
Unified Modeling Language
Alloy (specification language
Systems Modeling Language
38) What is software testing?
Software testing a process in which software is tested under certain conditions to test the quality of a program.
39) Tell a few reasons of software testing.
A few reasons for software testing are mentioned below:
Proper working
Satisfying quality
Fulfills the requirements of the user
Can be implemented with the identical
40) What is Beta version?
The beta version of a software is that version which is not ready for release and can be changed after the
feedback from the users. Beta version comes after alpha version.
41) What is the working of logical operators?
Logical operators let us combine simple conditions to construct more complex ones (By conditions, we mean an
expression evaluating to true or false).
42) What is the purpose of the assignment operator?
The assignment operator is used to store a value, string or a computational result in a variable.
43) What is analyzing a program?
The process in which program is decomposed into sub-problems. Rather on concentrating the bigger problem as
a whole, we try to solve each sub-problem separately. This leads to a simple solution. This technique is also
known as top-down design.
44) What is the working on an algorithm?
Every algorithm performs at least following three steps:
Get data
Perform computation
Display results
45) How is the division by zero defined?
Division by zero is undefined.
46) What is the meaning of implementation of a program?
Once the program has been tested thoroughly, it must be installed or put into operation at the site where it will
be used. This is known as the implementation of the program.
47) What are numeric variables?
The variables which can store numeric values are called number variables. Numeric values include both floating
point numbers and whole numbers.
48) What are string variables?
A string can be defined as a sequence of characters enclosed in double quotations.
49) What are commands?
Commands are executable instructions which are operated in the direct mode. They do not require a preceding
line number. Incorrect info
51) What is the execution of a program?
Execution of the program refers to carrying out the instruction of the program. The program must be loaded into
memory (RAM) before execution.
10) Explain what a “Hash Algorithm” is and what are they used for?
“Hash Algorithm” is a hash function that takes a string of any length and decreases it to a unique fixed length
string. It is used for password validity, message & data integrity and for many other cryptographic systems.
14) Explain what is the difference between best case scenario and worst case scenario of an algorithm?
Best case scenario: Best case scenario for an algorithm is explained as the arrangement of data for
which the algorithm performs best. For example, we take a binary search, for which the best case
scenario would be if the target value is at the very center of the data you are searching. The best case
time complexity would be 0 (1)
Worst case scenario: It is referred for the worst set of input for a given algorithm. For example
quicksort, which can perform worst if you select the largest or smallest element of a sublist for the pivot
value. It will cause quicksort to degenerate to O (n2).
Big O Notation
The Big O notation bounds a function from above, it defines an upper bound of an algorithm. Let's consider the
case of insertion sort; it takes linear time in the best case and quadratic time in the worst case. The time
complexity of insertion sort is O(n2). It is useful when we only have upper bound on time complexity of an
algorithm.
Ω Notation
Just like Big O notation provides an asymptotic upper bound, the Ω Notation provides an asymptotic lower
bound on a function. It is useful when we have lower bound on time complexity of an algorithm.
7) How to swap two integers without swapping the temporary variable in Java?
It's a very commonly asked trick question. There are many ways to solve this problem.
But the necessary condition is we have to solve it without swapping the temporary variable.
If we think about integer overflow and consider its solution, then it creates an excellent impression in the eye of
interviewers.
8) What is a Hash Table? How can we use this structure to find all anagrams in a dictionary?
A Hash table is a data structure for storing values to keys of arbitrary type. The Hash table consists of an index
into an array by using a Hash function. Indexes are used to store the elements. We assign each possible element
to a bucket by using a hash function. Multiple keys can be assigned to the same bucket, so all the key and value
pairs are stored in lists within their respective buckets. Right hashing function has a great impact on
performance.
9) What is Divide and Conquer algorithms?
Divide and Conquer is not an algorithm; it's a pattern for the algorithm. It is designed in a way as to take dispute
on a huge input, break the input into minor pieces, and decide the problem for each of the small pieces. Now
merge all of the piecewise solutions into a global solution. This strategy is called divide and conquer.
Divide and conquer uses the following steps to make a dispute on an algorithm.
Divide: In this section, the algorithm divides the original problem into a set of subproblems.
Conquer: In this section, the algorithm solves every subproblem individually.
Combine: In this section, the algorithm puts together the solutions of the subproblems to get the solution to the
whole problem.
10) Explain the BFS algorithm?
BFS (Breadth First Search) is a graph traversal algorithm. It starts traversing the graph from the root node and
explores all the neighboring nodes. It selects the nearest node and visits all the unexplored nodes.
18) How to find all possible words in a board of characters (Boggle game)?
In the given dictionary, a process to do a lookup in the dictionary and an M x N board where every cell has a
single character. Identify all possible words that can be formed by order of adjacent characters. Consider that we
can move to any of the available 8 adjacent characters, but a word should not have multiple instances of the
same cell.
23) What Are The Criteria Of Algorithm Analysis?
An algorithm is generally analyzed by two factors.
o Time complexity
o Space complexity
Time complexity deals with the quantification of the amount of time taken by a set of code or algorithm to
process or run as a function of the amount of input. In other words, the time complexity is efficiency or how
long a program function takes to process a given input.
Space complexity is the amount of memory used by the algorithm to execute and produce the result.
24) What are the differences between stack and Queue?
Stack and Queue both are non-primitive data structure used for storing data elements and are based on some
real-world equivalent.
Let's have a look at key differences based on the following parameters.
Working principle
The significant difference between stack and queue is that stack uses LIFO (Last in First Out) method to access
and add data elements whereas Queue uses FIFO (First in first out) method to obtain data member.
Structure
In Stack, the same end is used to store and delete elements, but in Queue, one end is used for insertion, i.e., rear
end and another end is used for deletion of elements.
Number of pointers used
Stack uses one pointer whereas Queue uses two pointers (in the simple case).
Operations performed
Stack operates as Push and pop while Queue operates as Enqueue and dequeuer.
Variants
Stack does not have variants while Queue has variants like a circular queue, Priority queue, doubly ended
Queue.
Implementation
The stack is simpler while Queue is comparatively complex.
3.Data Structure
1. What is a Data Structure?
The Data Structure is the way data is organized (stored) and manipulated for retrieval and access
2. Describe the types of Data Structures?
1. Lists: A collection of related things linked to the previous or/and following data items.
2. Arrays: A collection of values that are all the same.
3. Records: A collection of fields, each of which contains data from a single data type.
4. Trees: A data structure that organizes data in a hierarchical framework.
5. Tables: The data is saved in the form of rows and columns.
4. What are some applications of Data Structures?
Numerical analysis, operating system, AI, compiler design, database management, graphics, statistical analysis,
and simulation.
5. What is the difference between file structure and storage structure?
The difference lies in the memory area accessed. Storage structure refers to the data structure in the memory of
the computer system, whereas file structure represents the storage structure in the auxiliary memory.
6. What is a multidimensional array?
A multidimensional array is a multidimensional array with more than one dimension.
7. How are the elements of a 2D array stored in the memory?
1. Row-Major Order: -In row-major ordering, all of the rows of a 2D array are stored in memory in a
contiguous manner.
1. Column-Major Order: In column-major ordering, all of the columns of a 2D array are stored in memory
in the same order.
8. What is a linked list Data Structure?
A linked list is a dynamic data structure, where the number of nodes is not fixed, and the list has the ability to
grow and shrink on demand.
18. What are the operations that can be performed on a stack?
A stack is a linear data structure that operates on the same concept, in that components in a stack are added and
deleted only from one end, referred to as the TOP. As a result, a stack is known as a LIFO (Last-In-First-Out)
data structure because the piece that was put last is the first to be removed.
A stack may perform three fundamental operations:
1. PUSH: The push action inserts a new element into the stack.
2. POP: The pop operation is performed to remove the stack's topmost element.
3. PEEK: A peek action returns the value of the stack's topmost element without removing it
19. What is a postfix expression?
A postfix expression is made up of operators and operands, with the operator coming after the operands. That is,
in a postfix expression, the operator comes after the operands.
25. Where can stack Data Structure be used?
Expression evaluation
Backtracking
Memory management
Function calling and return
26. What is the difference between a PUSH and a POP?
PUSH is used to add an item to a stack, while POP is used to remove an item.
PUSH takes two arguments, the name of the stack to add the data to and the value of the entry to be
added. POP only needs the name of the stack.
When the stack is filled and another PUSH command is issued, you get a stack overflow error, which
means that the stack can no longer accommodate the last PUSH. In POP, a stack underflow error occurs
when you’re trying to POP an already empty stack.
27. Which sorting algorithm is considered the fastest? Why?
A single sorting algorithm can’t be considered best, as each algorithm is designed for a particular data structure
and data set. However, the QuickSort algorithm is generally considered the fastest because it has the best
performance for most inputs.
28. What is the merge sort? How does it work?
Merge sort is a divide-and-conquer algorithm for sorting the data. It works by merging and sorting adjacent data
to create bigger sorted lists, which are then merged recursively to form even bigger sorted lists until you have
one single sorted list.
44. Explain the jagged array.
It is an array whose elements themselves are arrays and may be of different dimensions and sizes.
34) Define the tree data structure.
The Tree is a recursive data structure containing the set of one or more data nodes where one node is designated
as the root of the tree while the remaining nodes are called as the children of the root. The nodes other than the
root node are partitioned into the nonempty sets where each one of them is to be called sub-tree.
35) List the types of tree.
There are six types of tree given as follows.
o General Tree
o Forests
o Binary Tree
o Binary Search Tree
o Expression Tree
o Tournament Tree
40) Which data structure suits the most in the tree construction?
Queue data structure
48) Differentiate among cycle, path, and circuit?
o Path: A Path is the sequence of adjacent vertices connected by the edges with no restrictions.
o Cycle: A Cycle can be defined as the closed path where the initial vertex is identical to the end vertex.
o Circuit: A Circuit can be defined as the closed path where the initial vertex is identical to the end
vertex. Any vertex may be repeated.
49) Mention the data structures which are used in graph implementation.
o In sequential representation, Adjacency matrix is used.
o In Linked representation, Adjacency list is used.
50) Which data structures are used in BFS and DFS algorithm?
o In BFS algorithm, Queue data structure is used.
o In DFS algorithm, Stack data structure is used.
53) What are the advantages of Selection Sort?
o It is simple and easy to implement.
o It can be used for small data sets.
o It is 60 per cent more efficient than bubble sort.
55) List Some Applications of Multilinked Structures?
o Sparse matrix,
o Index generation.
56) What is the difference between NULL and VOID?
o Null is actually a value, whereas Void is a data type identifier.
o A null variable simply indicates an empty value, whereas void is used to identify pointers as having no
initial size.
The procedural language provides less scope of The object-oriented language provides more
code reuse scope of code reuse
2. The Flip flops of these counters are not clocked In these counters, the flip-flops are clocked
simultaneously. simultaneously.
3. Simple logic circuits are there for more number Complex logic circuits are there when the number of
of states. states increases.
https://testbook.com/objective-questions/bn/mcq-on-dbms--5eea6a1639140f30f369f554
7.Algorithm
8.Operating System
1) What is an operating system?
The operating system is a software program that facilitates computer hardware to communicate and operate
with the computer software.
2) What is the main purpose of an operating system?
There are two main purposes of an operating system:
o It is designed to make sure that a computer system performs well by managing its computational
activities.
o It provides an environment for the development and execution of programs.
3) What are the different operating systems?
o Batched operating systems
o Distributed operating systems
o Timesharing operating systems
o Multi-programmed operating systems
o Real-time operating systems
4) What is a socket?
A socket is used to make connection between two applications. Endpoints of the connection are called socket.
5) What is a real-time system?
Real-time system is used in the case when rigid-time requirements have been placed on the operation of a
processor. It contains a well defined and fixed time constraints.
6) What is kernel?
Kernel is the core and most important part of a computer operating system which provides basic services for all
parts of the OS.
7) What is monolithic kernel?
A monolithic kernel is a kernel which includes all operating system code is in single executable image.
8) What do you mean by a process?
An executing program is known as process. There are two types of processes:
o Operating System Processes
o User Processes
9) What are the different states of a process?
A list of different states of process:
o New Process
o Running Process
o Waiting Process
o Ready Process
o Terminated Process
10) What is the difference between micro kernel and macro kernel?
Micro kernel: micro kernel is the kernel which runs minimal performance affecting services for operating
system. In micro kernel operating system all other operations are performed by processor.
Macro Kernel: Macro Kernel is a combination of micro and monolithic kernel.
12) What is the difference between process and program?
A program while running or executing is known as a process.
13) What is the use of paging in operating system?
Paging is used to solve the external fragmentation problem in operating system. This technique ensures that the
data you need is available as quickly as possible.
14) What is the concept of demand paging?
Demand paging specifies that if an area of memory is not currently being used, it is swapped to disk to make
room for an application's need.
15) What is the advantage of a multiprocessor system?
As many as processors are increased, you will get the considerable increment in throughput. It is cost effective
also because they can share resources. So, the overall reliability increases.
16) What is virtual memory?
Virtual memory is a very useful memory management technique which enables processes to execute outside of
memory. This technique is especially used when an executing program cannot fit in the physical memory.
17) What is thrashing?
Thrashing is a phenomenon in virtual memory scheme when the processor spends most of its time in swapping
pages, rather than executing instructions.
18) What are the four necessary and sufficient conditions behind the deadlock?
These are the 4 conditions:
1) Mutual Exclusion Condition: It specifies that the resources involved are non-sharable.
2) Hold and Wait Condition: It specifies that there must be a process that is holding a resource already allocated
to it while waiting for additional resource that are currently being held by other processes.
3) No-Preemptive Condition: Resources cannot be taken away while they are being used by processes.
4) Circular Wait Condition: It is an explanation of the second condition. It specifies that the processes in the
system form a circular list or a chain where each process in the chain is waiting for a resource held by next
process in the chain.
19) What is a thread?
A thread is a basic unit of CPU utilization. It consists of a thread ID, program counter, register set and a stack.
20) What is FCFS?
FCFS stands for First Come, First Served. It is a type of scheduling algorithm. In this scheme, if a process
requests the CPU first, it is allocated to the CPU first. Its implementation is managed by a FIFO queue.
21) What is SMP?
SMP stands for Symmetric Multi Processing. It is the most common type of multiple processor system. In SMP,
each processor runs an identical copy of the operating system, and these copies communicate with one another
when required.
23) What is deadlock? Explain.
Deadlock is a specific situation or condition where two processes are waiting for each other to complete so that
they can start. But this situation causes hang for both of them.
24) Which are the necessary conditions to achieve a deadlock?
There are 4 necessary conditions to achieve a deadlock:
o Mutual Exclusion:
o Hold and Wait:
o No preemption:
o Circular Wait:
25) What is Banker's algorithm?
Banker's algorithm is used to avoid deadlock. It is the one of deadlock-avoidance method. It is named as
Banker's algorithm on the banking system where bank never allocates available cash in such a manner that it
can no longer satisfy the requirements of all of its customers.
26) What is the difference between logical address space and physical address space?
Logical address space specifies the address that is generated by CPU. On the other hand physical address space
specifies the address that is seen by the memory unit.
27) What is fragmentation?
Fragmentation is a phenomenon of memory wastage. It reduces the capacity and performance because space is
used inefficiently.
28) How many types of fragmentation occur in Operating System?
There are two types of fragmentation:
o Internal fragmentation: It is occurred when we deal with the systems that have fixed size allocation
units.
o External fragmentation: It is occurred when we deal with systems that have variable-size allocation
units.
30) What is the difference between internal commands and external commands?
Internal commands are the built-in part of the operating system while external commands are the separate file
programs that are stored in a separate folder or directory.
34) What is starvation in Operating System?
Starvation is Resource management problem. In this problem, a waiting process does not get the resources it
needs for a long time because the resources are being allocated to other processes.
36) What are the advantages of multithreaded programming?
A list of advantages of multithreaded programming:
o Enhance the responsiveness to the users.
o Resource sharing within the process.
o Economical
o Completely utilize the multiprocessing architecture.
37) What is the difference between logical and physical address space?
Logical address specifies the address which is generated by the CPU whereas physical address specifies to the
address which is seen by the memory unit.
40) What is a Batch Operating System?
Batch Operating System is a type of Operating System which creates Batches for the execution of certain jobs
or processes.
41) Do the Batch Operating System interact with Computer for processing the needs of jobs or processes
required?
No, this is not that kind of Operating Systems which tries to interact with the computer. But, this job is taken up
by the Operator present in the Batch Operating Systems.
42) What are the advantages of Batch Operating System?
Advantages of Batch Operating System:
1. The time which the Operating System is at rest is very small or also known as Idle Time for the
Operating System is very small.
2. Very big tasks can also be managed very easily with the help of Batch Operating Systems
3. Many users can use this Batch Operating Systems.
4. It is incredibly challenging to estimate or determine how long it will take to finish any task. The batch
system processors are aware of how long a work will take to complete when it is in line.
43) What are the disadvantages of Batch Operating System?
Disadvantages of Batch Operating System:
1. If any work fails in the Batch Operating System, the other jobs will have to wait for an indeterminate
period of time.
2. Batch Operating systems are very challenging to debug,
3. Batch Operating Systems can be expensive at times
4. The computer operators who are using Batch Operating Systems must to be knowledgeable with batch
systems.
44) Where is Batch Operating System used in Real Life
They are used in Payroll System and for generating Bank Statements.
45) What is the Function of Operating System?
The most important functions of Operating Systems are:
1. File Management
2. Job Management
3. Process Management
4. Device Management
5. Memory Management
46) What are the Services provided by the Operating System?
1. Security to your computer
2. Protects your computer from external threats
3. File Management
4. Program Execution
5. Helps in Controlling Input Output Devices
6. Useful in Program Creation
7. Helpful in Error Detection
8. Operating System helps in communicating between devices
9. Analyzes the Performance of all devices
47) What is a System Call in Operating Systems?
Programs can communicate with the operating system by making a system call. When a computer application
requests anything from the kernel of the operating system, it performs a system call.System call uses
Application Programming Interfaces(API)to deliver operating system services to user programs
48) What are the Types of System Calls in Operating Systems?
The System Calls in Operating Systems are:
1. Communication
2. Information Maintenance
3. File Management
4. Device Management
5. Process Contro
49) What are the functions which are present in the Process Control and File Management System Call?
1. Create
2. Allocate
3. Abort
4. End
5. Terminate
6. Free Memory
50) What are the functions which are present in the File Management System Call?
The Functions present in File Management System Calls are:
1. Create
2. Open
3. Read
4. Close
5. Delete
51) What is a Process in Operating Systems?
The fundamental unit of work that has to be implemented in the system is called a process.
52) What are the types of Processes in Operating Systems?
The types of Operating System processes are:
1. Operating System Process
2. User Process
53) What is Process Control Block (PCB)?
A data structure called a Process Control Block houses details about the processes connected to it. The term
"process control block" can also refer to a "task control block," "process table entry," etc.
54) What are the Data Items in Process Control Block?
The Data Items in Process Control Block are:
1. Process State
2. Process Number
3. Program Counter
4. Registers
5. Memory Limits
6. List of Open Files
55) What are the Files used in the Process Control Block?
The Files used in Process Control Block are:
1. Central Processing Unit (CPU) Scheduling Information
2. Memory Management Information
3. Accounting Information
4. Input Output Status Information
56) What are the differences between Thread and Process
Thread Process
Threads are executed within the same process Processes are executed in the different memory spaces
Threads are not independent of each other Processes are independent of each other
Logical Address Space is a set of all logical Physical Address is a set of all physical
Address
addresses generated by the CPU in reference addresses mapped to the corresponding
Space
to a program. logical addresses.
Users can view the logical address of a Users can never view the physical address of
Visibility
program. the program.
The user can use the logical address to The user can indirectly access physical
Access
access the physical address. address but not directly.
Operating System provides interface b/w user and The kernel provides interface b/w application and
hardware. hardware.
Type of operating system includes single and multiuser Type of kernel includes Monolithic and Micro
OS, multiprocessor OS, realtime OS, Distributed OS. kernel.
It is the first program to load when the computer boots It is the first program to load when the operating
up. system loads
56. What is the difference between process and thread?
S.N
O Process Thread
Process switching uses, another process Thread switching does not require to call an operating
5. interface in operating system. system and cause an interrupt to the kernel.
If one process is blocked then it will not The second, thread in the same task could not run,
6. affect the execution of other process while one server thread is blocked.
The process has its own Process Control Thread has Parents’ PCB, its own Thread Control
7. Block, Stack and Address Space. Block and Stack and common Address space.
67. Write a difference between a user-level thread and a kernel-level thread?
User-level thread Kernel level thread
User threads are implemented by users. kernel threads are implemented by OS.
If one user-level thread performs a blocking If one kernel thread perform a the blocking operation
operation then entire process will be blocked. then another thread can continue execution.
User-level threads are designed as dependent Kernel level threads are designed as independent
threads. threads.
69.Difference between Multithreading and Multitasking?
S.No. Multi-threading Multi-tasking
Parameter
S.NO. Logical address Physical Address
s
Set of all logical addresses generated Set of all physical addresses mapped to
2. Address by CPU in reference to a program is the corresponding logical addresses is
referred as Logical Address Space. referred as Physical Address.
3. Visibility The user can view the logical address The user can never view physical address
of a program. of program
The user uses the logical address to The user can not directly access physical
4. Access
access the physical address. address
The difference between memory allocated The unused spaces formed between non-contiguous
5. and required space or memory is called memory fragments are too small to serve a new
Internal fragmentation. process, is called External fragmentation.
2. For the paging operating system is accountable. For segmentation compiler is accountable.
S.N
O Paging Segmentation
3. Page size is determined by hardware. Here, the section size is given by the user.
10.Data Communications
Layers of TCP/IP
Layer Description
Decides which links such as serial lines or classic Ethernet must be used to meet the needs of the
Link
connectionless internet layer.
The internet layer is the most important layer which holds the whole architecture together.
Internet
It delivers the IP packets where they are supposed to be delivered.
Its functionality is almost the same as the OSI transport layer. It enables peer entities on the
Transport
network to carry on a conversation.
Application It contains all the higher-level protocols.
16. Differentiate OSI Reference Model with TCP/IP Reference Model
OSI Reference Model TCP/IP Reference Model
7 layered architecture 4 layered architecture
Fixed boundaries and functionality for each layer Flexible architecture with no strict boundaries between layers
Low Reliability High Reliability
Vertical Layer Approach Horizontal Layer Approach
17. What are the HTTP and the HTTPS protocol?
HTTP is the HyperText Transfer Protocol which defines the set of rules and standards on how the information
can be transmitted on the World Wide Web (WWW). It helps the web browsers and web servers for
communication. It is a ‘stateless protocol’ where each command is independent with respect to the previous
command. HTTP is an application layer protocol built upon the TCP. It uses port 80 by default.
HTTPS is the HyperText Transfer Protocol Secure or Secure HTTP. It is an advanced and secured version of
HTTP. On top of HTTP, SSL/TLS protocol is used to provide security. It enables secure transactions by
encrypting the communication and also helps identify network servers securely. It uses port 443 by default.
18. What is the SMTP protocol?
SMTP is the Simple Mail Transfer Protocol. SMTP sets the rule for communication between servers. It is in
always-listening mode on port 25.
19. What is the DNS?
DNS is the Domain Name System. It is considered as the devices/services directory of the Internet.It uses port
53 by default.
20. What is the use of a router and how is it different from a gateway?
The router is a networking device used for connecting two or more network segments. It directs the traffic in the
network. It transfers information and data like web pages, emails, images, videos, etc. from source to
destination in the form of packets.
21. What is the TCP protocol?
TCP or TCP/IP is the Transmission Control Protocol/Internet Protocol. It is a set of rules that decides how a
computer connects to the Internet and how to transmit the data over the network.
22. What is the UDP protocol?
UDP is the User Datagram Protocol and is based on Datagrams.
23. Compare between TCP and UDP
TCP/IP UDP
Connection-Oriented Protocol Connectionless Protocol
TCP/IP UDP
More Reliable Less Reliable
Slower Transmission Faster Transmission
Packets order is not fixed and packets are independent of
Packets order can be preserved or can be rearranged
each other
Uses three ways handshake model for connection No handshake for establishing the connection
TCP packets are heavy-weight UDP packets are light-weight
Offers error checking mechanism No error checking mechanism
Protocols like HTTP, FTP, Telnet, SMTP, HTTPS, Protocols like DNS, RIP, SNMP, RTP, BOOTP, TFTP,
etc use TCP at the transport layer NIP, etc use UDP at the transport layer
24. What is the ICMP protocol?
ICMP is the Internet Control Message Protocol. It uses port 7 by default.
25. What do you mean by the DHCP Protocol?
DHCP is the Dynamic Host Configuration Protocol.
It is an application layer protocol used to auto-configure devices on IP networks enabling them to use the TCP
and UDP-based protocols. It uses port 67 by default.
26. What is the ARP protocol?
ARP is Address Resolution Protocol. It is a network-level protocol used to convert the logical address i.e.
27. What is the FTP protocol?
FTP is a File Transfer Protocol. It is an application layer protocol used to transfer files and data reliably and
efficiently between hosts. It uses port 27 by default.
28. What is the MAC address and how is it related to NIC?
MAC address is the Media Access Control address. It is a 48-bit or 64-bit unique identifier of devices in the
network. It is also called the physical address embedded with Network Interface Card (NIC) used at the Data
Link Layer. NIC is a hardware component in the networking device using which a device can connect to the
network.
29. Differentiate the MAC address with the IP address
The difference between MAC address and IP address are as follows:
MAC Address IP Address
Media Access Control Address Internet Protocol Address
6 or 8-byte hexadecimal number 4 (IPv4) or 16 (IPv6) Byte address
It is embedded with NIC It is obtained from the network
Physical Address Logical Address
Operates at Data Link Layer Operates at Network Layer.
Helps to identify the device Helps to identify the device connectivity on the network.
30. What is a subnet?
A subnet is a network inside a network achieved by the process called subnetting which helps divide a network
into subnets.
31. Compare the hub vs switch
Hub Switch
Operates at Physical Layer Operates at Data Link Layer
Half-Duplex transmission mode Full-Duplex transmission mode
Ethernet devices can be connectedsend LAN devices can be connected
Less complex, less intelligent, and cheaper Intelligent and effective
No software support for the administration Administration software support is present
Less speed up to 100 MBPS Supports high speed in GBPS
33. What is the firewall?
The firewall is a network security system that is used to monitor the incoming and outgoing traffic and blocks
the same based on the firewall security policies.
34. What are Unicasting, Anycasting, Multicasting and Broadcasting?
Unicasting: If the message is sent to a single node from the source then it is known as unicasting. This
is commonly used in networks to establish a new connection.
Anycasting: If the message is sent to any of the nodes from the source then it is known as anycasting. It
is mainly used to get the content from any of the servers in the Content Delivery System.
Multicasting: If the message is sent to a subset of nodes from the source then it is known as
multicasting. Used to send the same data to multiple receivers.
Broadcasting: If the message is sent to all the nodes in a network from a source then it is known as
broadcasting. DHCP and ARP in the local network use broadcasting.
35. What happens when you enter google.com in the web browser?
Below are the steps that are being followed:
Check the browser cache first if the content is fresh and present in cache display the same.
If not, the browser checks if the IP of the URL is present in the cache (browser and OS) if not then
request the OS to do a DNS lookup using UDP to get the corresponding IP address of the URL from the
DNS server to establish a new TCP connection.
A new TCP connection is set between the browser and the server using three-way handshaking.
An HTTP request is sent to the server using the TCP connection.
The web servers running on the Servers handle the incoming HTTP request and send the HTTP
response.
The browser process the HTTP response sent by the server and may close the TCP connection or reuse
the same for future requests.
If the response data is cacheable then browsers cache the same.
Browser decodes the response and renders the content.
1) What is the network?
o A network is a collection of devices connected to each other to allow the sharing of data.
4) What is the criteria to check the network reliability?
Network reliability: Network reliability means the ability of the network to carry out the desired operation
through a network such as communication through a network..
The reliability of a network can be measured by the following factors:
o Downtime: The downtime is defined as the required time to recover.
o Failure Frequency: It is the frequency when it fails to work the way it is intended.
o Catastrophe: It indicates that the network has been attacked by some unexpected event such as fire,
earthquake.
5) Which are the different factors that affect the security of a network?
o Unauthorized Access
o Viruses
6) Which are the different factors that affect the reliability of a network?
o Frequency of failure
o Recovery time of a network after a failure
7) Which are the different factors that affect the performance of a network?
o Large number of users
o Transmission medium types
o Hardware
o Software
8) What makes a network effective and efficient?
o Performance: : performance can be measured in many ways like transmit time and response time.
o Reliability: reliability is measured by frequency of failure.
o Robustness: robustness specifies the quality or condition of being strong and in good condition.
o Security: It specifies how to protect data from unauthorized access and viruses.
9) What is bandwidth?
Every signal has a limit of upper range frequency and lower range frequency. The range of limit of network
between its upper and lower frequency is called bandwidth.
11) What is a gateway? Is there any difference between a gateway and router?
A node that is connected to two or more networks is commonly known as a gateway. It is also known as a
router. It is used to forward messages from one network to another.
12) What is DNS?
DNS is an acronym stands for Domain Name System.
o DNS was introduced by Paul Mockapetris and Jon Postel in 1983.
o It is a naming system for all the resources over the internet which includes physical nodes and
applications. It is used to locate to resource easily over a network.
o DNS is an internet which maps the domain names to their associated IP addresses.
o Without DNS, users must know the IP address of the web page that you wanted to access.
o Frame synchronization: Data-link layer converts the data into frames, and it ensures that the
destination must recognize the starting and ending of each frame.
o Flow control: Data-link layer controls the data flow within the network.
o Error control: It detects and corrects the error occurred during the transmission from source to
destination.
o Addressing: Data-link layer attach the physical address with the data frames so that the individual
machines can be easily identified.
o Link management: Data-link layer manages the initiation, maintenance and, termination of the link
between the source and destination for the effective exchange of data.
3. Network Layer
o Network layer converts the logical address into the physical address.
o It provides the routing concept means it determines the best route for the packet to travel from source to
the destination.
Functions of network layer:
o Routing: The network layer determines the best route from source to destination. This function is
known as routing.
o Logical addressing: The network layer defines the addressing scheme to identify each device uniquely.
o Packetizing: The network layer receives the data from the upper layer and converts the data into
packets. This process is known as packetizing.
o Internetworking: The network layer provides the logical connection between the different types of
networks for forming a bigger network.
o Fragmentation: It is a process of dividing the packets into the fragments.
4. Transport Layer
o It delivers the message through the network and provides error checking so that no error occurs during
the transfer of data.
o It provides two kinds of services:
o Connection-oriented transmission: In this transmission, the receiver sends the
acknowledgement to the sender after the packet has been received.
o Connectionless transmission: In this transmission, the receiver does not send the
acknowledgement to the sender.
5. Session Layer
o The main responsibility of the session layer is beginning, maintaining and ending the communication
between the devices.
o Session layer also reports the error coming from the upper layers.
o Session layer establishes and maintains the session between the two users.
6. Presentation Layer
o The presentation layer is also known as a Translation layer as it translates the data from one format to
another format.
o At the sender side, this layer translates the data format used by the application layer to the common
format and at the receiver side, this layer translates the common format into a format used by the
application layer.
Functions of presentation layer:
o Character code translation
o Data conversion
o Data compression
o Data encryption
7. Application Layer
o Application layer enables the user to access the network.
o It is the topmost layer of the OSI reference model.
o Application layer protocols are file transfer protocol, simple mail transfer protocol, domain name
system, etc.
o The most widely used application protocol is HTTP(Hypertext transfer protocol ). A user sends the
request for the web page using HTTP.
32) What is the usage of OSI physical layer?
The OSI physical layer is used to convert data bits into electrical signals and vice versa. On this layer, network
devices and cable types are considered and setup.
33) Explain the functionality of OSI session layer?
OSI session layer provides the protocols and means for two devices on the network to communicate with each
other by holding a session. This layer is responsible for setting up the session, managing information exchange
during the session, and tear-down process upon termination of the session.
34) What is the maximum length allowed for a UTP cable?
The maximum length of UTP cable is 90 to 100 meters.
42) What is multiplexing in networking?
In Networking, multiplexing is the set of techniques that is used to allow the simultaneous transmission of
multiple signals across a single data link.
44) What is RSA Algorithm?
RSA is short for Rivest-Shamir-Adleman algorithm. It is mostly used for public key encryption.
45) How many layers are in TCP/IP?
There are basic 4 layers in TCP/IP:
1. Application Layer
2. Transport Layer
3. Internet Layer
4. Network Layer
2. What are the Characteristics of Data Communications?
The effectiveness of a Data Communication and Computer Networks system depends on four fundamental
characteristics: delivery, accuracy, timeliness, and jitter.
Delivery:
Accuracy:
Timeliness:
4. Jitter: Jitter refers to the variation in the packet arrival time.
.3. What are the Components of Data Communication?
The different components of Data communication are shown in the following figure.
Message:
Sender:
Receiver:
Transmission medium:
Protocol:
4. What are Different Data Flow Directions?
Communication between any two devices can be simplex, half-duplex, or full-duplex.
Simplex: In simplex mode, the communication is unidirectional, as on a one-way street. Only one of the
two devices on a link can transmit; the other can only receive which can be represented in the following
figure.
Half-Duplex: In half-duplex mode, each station can both transmit and receive, but not at the same time.
When one device is sending, the other can only receive, and vice versa which will represent in the
following figure.
Full-Duplex: In full-duplex mode (also called duplex), both stations can transmit and receive
simultaneously as shown in the following figure.The full-duplex mode is like a two-way street with
traffic flowing in both directions at the same time.
5. Different Types of Connections
Point-to-Point: A point-to-point connection provides a dedicated link between two devices.
2.Multipoint: A multipoint (also called multidrop) connection is one in which more than two specific
devices share a single link as shown in the following figure.
OSI LAYER
DEVICES PROTOCOLS
layer 6
SESSION NetBIOS
layer 5
layer 4
NETWORK Routers, layer 3 (or IP) switches. IP, IPX, NWlink, NetBEUI
layer 3
1. What Is a Microprocessor?
Answer: The microprocessor is a program-controlled device, which reads a set of steps to be executed from
memory and executes them.
2. What Are the Flags In 8086?
Answer: . In 8086, carry flag, parity flag, auxiliary carry flag, zero flags, an overflow flag, trace flag, interrupt
flag, direction flag, and sign flag are present.
https://engineerspower.com/microprocessor-interview-questions-answers/
12.Computer Networking
1) What is a Link?
A link refers to the connectivity between two devices. It includes the type of cables and protocols used for one
device to be able to communicate with the other.
2) What are the layers of the OSI reference model?
There are 7 OSI layers: 1) Physical Layer, 2) Data Link Layer, 3) Network Layer, 4) Transport Layer, 5)
Session Layer, 6) Presentation Layer, and 7) Application Layer.
3) What is the backbone network?
A backbone network is a centralized infrastructure that is designed to distribute different routes and data to
various networks. It also handles the management of bandwidth and multiple channels.
5) What is a node?
A node refers to a point or joint where a connection takes place.
9) What is a subnet mask?
A subnet mask is combined with an IP address to identify two parts: the extended network address and the host
address. Like an IP address, a subnet mask is made up of 32 bits.
10) What is the maximum length allowed for a UTP cable?
A single segment of UTP cable has an allowable length of 90 to 100 meters.
11) What is data encapsulation?
Data encapsulation is the process of breaking down information into smaller, manageable chunks before it is
transmitted across the network.
12) Describe Network Topology
Network Topology refers to the layout of a computer network. It shows how devices and cables are physically
laid out, as well as how they connect.
13) What is a VPN?
VPN means Virtual Private Network, a technology that allows a secure tunnel to be created across a network
such as the Internet.
14) Briefly describe NAT
NAT is Network Address Translation. This is a protocol that provides a way for multiple computers on a
common network to share a single connection to the Internet.
15) What is the job of the Network Layer under the OSI reference model?
The Network layer is responsible for data routing, packet switching, and control of network congestion. Routers
operate under this layer.
16) How does a network topology affect your decision to set a network?
Network topology dictates what media you must use to interconnect devices. It also serves as a basis on what
materials, connectors, and terminations that is applicable for the setup.
18) What are the different ways of securing a computer network?
There are several ways to do this. Install a reliable and updated anti-virus program on all computers. Make sure
firewalls are setup and configured correctly. User authentication will also help a lot. All these combined would
make a highly secured network.
20) What is WAN?
WAN stands for Wide Area Network. It is an interconnection of computers and devices that are geographically
dispersed. It connects networks that are located in different regions and countries.
21) What is the importance of the OSI Physical Layer?
The physical layer does the conversion from data bits to the electrical signal, and vice versa. This is where
network devices and cable types are considered and setup.
23) What are proxy servers, and how do they protect computer networks?
Proxy servers primarily prevent external users who are identifying the IP addresses of an internal network.
24) What is the function of the OSI Session Layer?
This layer provides the protocols and means for two devices on the network to communicate with each other by
holding a session. This includes setting up the session, managing information exchange during the session, and
tear-down process upon termination of the session.
25) What is the importance of implementing a Fault Tolerance System?
A fault tolerance system ensures continuous data availability. This is done by eliminating a single point of
failure.
28) What is NOS?
NOS, or Network Operating System, is specialized software. The main task of this software is to provide
network connectivity to a computer in order to communicate with other computers and connected devices.
30) What is OSI, and what role does it play in computer networks?
OSI (Open Systems Interconnect) serves as a reference model for data communication. It is made up of 7 layers,
with each layer defining a particular aspect of how network devices connect and communicate with one another.
One layer may deal with the physical media used, while another layer dictates how data is transmitted across the
network.
31) What is the purpose of cables being shielded and having twisted pairs?
The primary purpose of this is to prevent crosstalk. Crosstalk’s are electromagnetic interferences or noise that
can affect data being transmitted across cables.
32) What is the advantage of address sharing?
By using address translation instead of routing, address sharing provides an inherent security benefit. That’s
because host PCs on the Internet can only see the public IP address of the external interface on the computer.
Instead, it provides address translation and not the private IP addresses on the internal network.
35) How can you identify the IP class of a given IP address?
By looking at the first octet of any given IP address, you can identify whether it’s Class A, B, or C. If the first
octet begins with a 0 bit, that address is Class A. If it begins with bits 10 then that address is a Class B address.
If it begins with 110, then it’s a Class C network.
36) What is the main purpose of OSPF?
OSPF, or Open Shortest Path First, is a link-state routing protocol that uses routing tables to determine the best
possible path for data exchange.
39) What are gateways?
Gateways provide connectivity between two or more network segments. It is usually a computer that runs the
gateway software and provides translation services.
41) What is SLIP?
SLIP, or Serial Line Interface Protocol, is an old protocol developed during the early UNIX days. This is one of
the protocols that are used for remote access.
46) What is a Hybrid Network?
A hybrid network is a network setup that makes use of both client-server and peer-to-peer architecture.
50) How can you manage a network using a router?
Routers have a built-in console that lets you configure different settings, like security and data logging. You can
assign restrictions to computers, such as what resources it is allowed access or what particular time of the day,
they can browse the Internet. You can even put restrictions on what websites are not viewable across the entire
network.
51) What protocol can be applied when you want to transfer files between different platforms, such as
UNIX systems and Windows servers?
Use FTP (File Transfer Protocol) for file transfers between such different servers. This is possible because FTP
is platform-independent.
52) What is the use of a default gateway?
Default gateways provide means for the local networks to connect to the external network. The default gateway
for connecting to the external network is usually the address of the external router port.
53) What can be considered as good passwords?
Good passwords are made up of not just letters, but by combining letters and numbers.
54) What is the proper termination rate for UTP cables?
The proper termination for unshielded twisted pair network cable is 100 ohms.
56) What is the number of network IDs in a Class C network?
For a Class C network, the number of usable Network ID bits is 21. The number of possible network IDs is 2
raised to 21 or 2,097,152. The number of host IDs per network ID is 2 raised to 8 minus 2, or 254.
57) What happens when you use cables longer than the prescribed length?
Cables that are too long would result in signal loss. It means that data transmission and reception would be
affected because the signal degrades over length.
58) What common software problems can lead to network defects?
Software related problems can be any or a combination of the following:
Client-server problems
Application conflicts
Error in configuration
Protocol mismatch
Security issues
User policy and rights issues
63) What advantages does fiber optics have over other media?
One major advantage of fiber optics is that it is less susceptible to electrical interference. It also supports higher
bandwidth, meaning more data can be transmitted and received. Signal degrading is also very minimal over
long distances.
65) What are the different network protocols that are supported by Windows RRAS services?
There are three main network protocols supported: NetBEUI, TCP/IP, and IPX.
66) What are the maximum networks and hosts in class A, B, and C network?
For Class A, there are 126 possible networks and 16,777,214 hosts. For Class B, there are 16,384 possible
networks and 65,534 hosts. For Class C, there are 2,097,152 possible networks and 254 hosts
67) What is the standard color sequence of a straight-through cable?
Orange/white, orange, green/white, blue, blue/white, green, brown/white, brown.
68) What protocols fall under the Application layer of the TCP/IP stack?
The following are the protocols under the TCP/IP Application layer: FTP, TFTP, Telnet, and SMTP.
69) You need to connect two computers for file sharing. Is it possible to do this without using a hub or a
router?
Yes, you can connect two computers, using only one cable. A crossover type cable can be used in this scenario.
In this setup, the data transmit pin of one cable is connected to the data receive pin of the other cable, and vice
versa.
70) What is ipconfig?
Ipconfig is a utility program that is commonly used to identify the addresses information of a computer on a
network. It can show the physical address as well as the IP address.
71) What is the difference between a straight-through and crossover cable?
A straight-through cable is used to connect computers to a switch, hub, or router. A crossover cable is used to
connect two similar devices, such as a PC to PC or Hub, to the Hub.
72) What is the client/server?
Client/server is a type of network wherein one or more computers act as servers. Servers provide a centralized
repository of resources such as printers and files. Clients refer to a workstation that accesses the server.
73) Describe networking.
Networking refers to the interconnection between computers and peripherals for data communication.
Networking can be done using wired cabling or through a wireless link.
74) When you move the NIC cards from one PC to another PC, does the MAC address gets transferred as
well?
Yes, that’s because MAC addresses are hard-wired into the NIC circuitry, not the PC. This also means that a PC
can have a different MAC address when another one replaced the NIC card.
75) Explain clustering support
Clustering support refers to the ability of a network operating system to connect multiple servers in a fault-
tolerant group. The main purpose of this is the if one server fails, all processing will continue with the next
server in the cluster.
76) Where is the best place to install an Anti-virus program?
An anti-virus program must be installed on all servers and workstations to ensure protection. That’s because
individual users can access any workstation and introduce a computer virus. You can plug in their removable
hard drives or flash drives.
79) What is the difference between CSMA/CD and CSMA/CA?
CSMA/CD, or Collision Detect, retransmits data frames whenever a collision occurred. CSMA/CA, or Collision
Avoidance, will first broadcast intent to send prior to data transmission.
80) What is SMTP?
SMTP is short for Simple Mail Transfer Protocol. This protocol deals with all internal mail and provides the
necessary mail delivery services on the TCP/IP protocol stack.
81) What is multicast routing?
Multicast routing is a targeted form of broadcasting that sends a message to a selected group of the user instead
of sending it to all users on a subnet.
82) What is the importance of Encryption on a network?
Encryption is the process of translating information into a code that is unreadable by the user. It is then
translated back or decrypted back to its normal readable format using a secret key or password. Encryption
ensures that information that is intercepted halfway would remain unreadable because the user must have the
correct password or key for it.
83) How are IP addresses arranged and displayed?
IP addresses are displayed as a series of four decimal numbers that are separated by period or dots. Another
term for this arrangement is the dotted-decimal format. An example is 192.168.101.2
84) Explain the importance of authentication.
Authentication is the process of verifying a user’s credentials before he can log into the network. It is normally
performed using a username and password. This provides a secure means of limiting access from unwanted
intruders on the network.
85) What is meaning by tunnel mode?
This is a mode of data exchange wherein two communicating computers do not use IPsec themselves. Instead,
the gateway that is connecting their LANs to the transit network creates a virtual tunnel. So, it uses the IPsec
protocol to secure all communication that passes through it.
86) What are the different technologies involved in establishing WAN links?
Analog connections – using conventional telephone lines
Digital connections – using digital-grade telephone lines
Switched connections – using multiple sets of links between the sender and receiver to move data.
88) When troubleshooting computer network problems, what common hardware-related problems can
occur?
A large percentage of a network is made up of hardware. Problems in these areas can range from
malfunctioning hard drives, broken NICs, and even hardware startups. Incorrect hardware configuration is also
one of those culprits to look into.
89) How can you fix signal attenuation problems?
A common way of dealing with such a problem is to use repeaters and hubs because it will help regenerate the
signal and therefore prevent signal loss. Checking if cables are properly terminated is also a must.
90) How does dynamic host configuration protocol aid in network administration?
Instead of having to visit each client computer to configure a static IP address, the network administrator can
apply dynamic host configuration protocol to create a pool of IP addresses known as scopes that can be
dynamically assigned to clients.
91) Explain profile in terms of networking concepts
Profiles are the configuration settings made for each user. A profile may be created that puts a user in a group,
96) What is one basic requirement for establishing VLANs?
A VLAN is required because at the switch level. There is only one broadcast domain. It means whenever a new
user is connected to switch. This information is spread throughout the network. VLAN on switch helps to create
a separate broadcast domain at the switch level. It is used for security purposes.
97) What is IPv6?
IPv6, or Internet Protocol version 6, was developed to replace IPv4. At present, IPv4 is being used to control
internet traffic but is expected to get saturated in the near future. IPv6 was designed to overcome this limitation.
98) What is the RSA algorithm?
RSA is short for the Rivest-Shamir-Adleman algorithm. It is the most commonly used public-key encryption
algorithm in use today.
100) what is the maximum segment length of a 100Base-FX network?
The maximum allowable length for a network segment using 100Base-FX is 412 meters. The maximum length
for the entire network is 5 kilometers.
104) What is the maximum segment length of a 100Base-FX network?
The maximum length for a network segment using 100Base-FX is 412 meters.
105) What is a Decoder?
The decoder is a type of circuit that converts the encoded data to its original format. It also converts the digital
signal into an analog signal.
106) What is Brouter?
Brouter is also known as Bridge Router. It is a device that acts as both a bridge and a router. As a bridge can
forwards data between the networks. It also routes the data to specified systems within a network.
108) Why the standard OSI model is known as 802.xx?
The OSI model was started in February 1980. In 802.XX, ’80’ stands for the year 1980, and ‘2’ represents the
month of February.
109) What is NVT (Network Virtual Terminal)?
NVT is a set of pre-defined rules to very simple virtual terminal interaction. This terminal helps you to start a
Telnet session.
110) What is the source route?
The source route is a sequence of IP addresses that helps you to identify the route a datagram. You can include
the source route in the IP datagram header.
111) Explain the term Pipelining
Pipelining describes the sequencing of processes. When any new task begins before an ongoing task is finished,
it is called sequencing.
112) Which measurement unit is used to measure the transmission speed of Ethernet?
The transmission speed of Ethernet is mostly measured in Mbps.
113) What is the maximum length of Thinnet cable?
The length of the Thinnet cable is 185 meters.
114) Which cable is also called as the RG8 cable?
Thicknet cable is also called as the RG8 cable.
115) Is coaxial cable still used in the computer network?
No, Nowadays, coaxial cable no longer used in a computer network.
116) Which cable uses the RJ11 connector?
Most of the telephone cable uses the RJ11 connector.
117) Explain Multi-homed Host
It is a host that has multiple network interfaces that multiple IP addresses is called a Multi-homed Host.
128) What are the types of MAC Addresses?
Here are the important types of MAC addresses:
Universally Administered AddressUAA(Universally Administered Address) is the most used type of
MAC address. It is given to the network adapter at the time of manufacturing.
Locally Administered AddressLAA (Locally Administered Address) is an address that changes the MAC
address of the adapter. You may assign this address to a device used by network administrator.
130) What is an Analog Signal?
Analog signal is a continuous signal in which one time-varying quantity represents another time-based variable.
These kind of signals works with physical values and natural phenomena such as earthquake, frequency,
volcano, speed of wind, weight, lighting, etc.
131) What is a Digital Signal?
A digital signal is a signal that is used to represent data as a sequence of separate values at any point in time. It
can only take on one of a fixed number of values. This type of signal represents a real number within a constant
range of values.
132) What are the differences between analog and digital signal?
Here are the main differences between Analog and Digital Signal:
Analog Digital
It is denoted by sine waves It is denoted by square waves.
It uses a continuous range of values that help you to The Digital signal uses discrete 0 and 1 to represent
represent information. information.
The analog signal bandwidth is low The digital signal bandwidth is high.
Digital hardware offers flexibility in
Analog hardware never offers flexible implementation.
implementation.
It is suited for audio and video transmission. It is suited for Computing and digital electronics.
The Analog signal doesn’t offer any fixed range. Digital signal has a finite number, i.e., 0 and 1.
134) What is Modem?
A modem (modulator-demodulator) is a device that modulates an analog signal to digital information.
135) What are the advantages of a Modem?
Here, are pros/advantage of Modem:
More useful in connecting LAN with the Internet
Speed depends on the cost
The Modem is the most widely used data communication roadway.
Q2. What are the different types of networks?
Ans. Considering the size or span of a network, we can classify them as follows:
PAN (Personal Area Network) – PAN is made up of devices used by a single person. It has a range of a
few meters.
WPAN (Wireless Personal Area Network) – It is a PAN network that uses wireless technologies as a
medium.
LAN (Local Area Network) – LAN is a network whose range is limited to a relatively small area, such
as a room, a building, an aero plane, etc.
WLAN (Wireless Local Area Network) – WLAN is a LAN network that uses wireless means of
communication. It is a widely used configuration due to its scalability and because it does not require the
installation of cables.
CAN (Campus Area Network) – A network of high-speed devices that connects LANs in a limited
geographical area, such as a university campus, a military base, etc.
MAN (Metropolitan Area Network) – MAN is a high-speed (broadband) network providing coverage
in a larger geographic area than a campus, but still limited.
WAN (Wide Area Network) – WAN extends over a large geographical area using unusual means of
communication, such as satellites, interoceanic cables, fibre optics, etc. Use public media.
VLAN – It is a type of logical or virtual LAN, mounted on a physical network, in order to increase
security and performance. In special cases, thanks to the 802.11Q protocol (also called QinQ), it is
possible to mount virtual networks on WAN networks. It is important not to confuse this implementation
with VPN technology.
Q4. What are the different types of network cables used in networking?
Ans. The different types of cables used in networks are –
Unshielded Twisted Pair (UTP) Cable
Shielded Twisted Pair (STP) Cable
Cable Installation Guides
Coaxial Cable
Fibre Optic Cable
Wireless LANs
Q5. What is a ‘subnet’?
Ans. A ‘subnet’ is a generic term for a section of an extensive network, usually separated by a bridge or a router.
Q11. What are the different features of Frame Relay?
Ans. The different features of Frame Relay are:
Frame Relay is a connectionless service, which means that every data packet that passes over the
network contains address information
Frame Relay is a service that is provided with a variety of speeds from 56 Kbs to 25 Mbs. Although the
speeds most used for the service are currently 56 Kbs and 1,544 Mbs
The frames are of variable length and go up to 4,096 bytes
Frame Relay is considered a broadband ISDN service
It operates at high speed (1,544 Mbps to 44,376 Mbps).
It operates only on the physical and data link layers. Therefore, it can be easily used on the Internet.
It has a large frame size of 9000 bytes. Therefore, it can accommodate all local area network frame
sizes.
Frame Relay can only detect errors (at the data link layer). But there is no flow control or error control.
It operates in the data link layer.
Q15. Differentiate between ‘attenuation’, ‘distortion’, and ‘noise’.
Ans. When a signal travels through a medium, it loses some of its energy due to the medium’s resistance. This
loss of energy is called attenuation.
When a signal travels through a medium from one point to another, it may change the form or shape of the
signal. This is known as distortion.
Noise is unwanted electrical or electromagnetic energy that degrades the quality of signals and data.
Q21. What are the major types of networks?
Ans. There are two major type of networks: Server-based network and Peer-to-peer network.
Q22. What are the important topologies for networks?
Ans. There are three essential topologies: Star, Bus, and Ring.
Q23. Differentiate between static IP addressing and dynamic IP addressing.
Ans. In a static IP address, a computer (or another device) is always configured to use the same IP address. In a
dynamic IP address, the IP address can change periodically and is managed by a centralized network service.
Q24. What are the different ways to exchange data?
Ans. Following are the different ways to exchange data:
Simplex
Half-duplex
Full-duplex
Q26. What are the criteria for the best path selection of a router?
Ans. The following parameters define the path selection:
Longest prefix match
Minimum AD (administrative distance)
Lowest metric value
Q32. What are the perquisites to configure a server?
Ans. The perquisites to configure a server are:
LAN card should be connected
Root (partition on which window is installed) should be in NTFS format.
A server should be configured with a static IP address.
Q41. A gateway works in which layer of the OSI model?
Ans. Transport layer.
Q43. What common software problems lead to network defects?
Ans. It can be any or a combination of:
Application conflicts
Client-server problems
Configuration error
Protocol mismatch
Security issues
User policy & rights issues
Q47. What is TELNET?
Ans. TELNET is a client-service protocol on the internet or local area network, allowing a user to log on to a
remote device and have access to it.
Q58. What is the difference between Communication and Transmission?
Ans. Transmission – A process of sending and receiving data between source and destination, in only one way.
It is regarded as the physical movement of data.
Communication – A process of sending and receiving data between source and destination, in both ways.
Q77. What are the Triggers?
Ans. Triggers are event-driven specialized procedures and are managed by database management systems. It is
capable of performing complex actions and uses procedural languages full throttle.
Q79. Is there a difference between a gateway and a router?
Ans. A gateway sends the data between two dissimilar networks, while a router sends the data between two
similar networks.
Q83. Explain 10Base-T.
Ans. 10Base-T specifies data transfer rate, i.e., 10Mbps. Here the usage of the term ‘Base’ defines ‘Baseband’
and not ‘Broadband’. T denotes the type of cable, which is a twisted pair.
Q84. Name the user support layers.
Ans. There are three types of user support layers –
Session Layer
Presentation Layer and
Application Layer
Q88. What are the different types of transmission media?
Ans. Transmission media has two broad types –
Guided media (wired)
Unguided media (wireless)
Q89. What is Process Sigma?
Ans. Process Sigma measures the frequency of a task that is performed without any error. It is expressed as a
number of standard deviations on a normal distribution.
Q93. What is the range of addresses in the classes of internet addresses?
Ans. Following are the five different ranges of addresses in the classes of the internet:
Class A: 0.0.0.0 – 127.255.255.255
Class B: 128.0.0.0 – 191.255.255.255
Class C: 192.0.0.0 – 223.255.255.255
Class D: 224.0.0.0 – 239.255.255.255
Class E: 240.0.0.0 – 247.255.255.255
Q95. What are the functions of a Network Layer?
Ans. The Network Layer or OSI Layer 3 provides services for exchanging individual sections of data over the
network between identified end devices. To perform this end-to-end transport Layer 3 uses four basic processes:
Addressing
Encapsulation
Routing
Decapsulation
Q96. Name the access method used in the 1000BaseTX network.
Ans. CSMA/CD access method is used in the 1000BaseTX network.
Q97. Mention the different types of links used to build a computer network.
Ans. Following are the different types of links used to build a computer network:
Cables
Wireless Links
Last-Mile Links
Leased Lines
Q98. Mention the types of wires used for data transmission in UTP cable.
Ans. There are four types of wires used for data transmission in UTP cable, which is wire 1, 2, 3, and 6. Where
wires 1 and 2 are used to transmit the data while wires 3 and 6 are used to receive the data.
Q99. Can we use RG59 and RG6 cables in a computer network?
Ans. RG59 and RG6 cables are not used in the computer network. These cables are made for the cable TV
network.
Q101. Name the cable used in the 10BaseFL network.
Ans. Fibre optical cable is the cable used in the 10BaseFL network.
Q102. Why is IP protocol deliberated as a connectionless protocol?
Ans. An IP protocol is deliberated as a connectionless protocol because it does not build up a connection before
sending data to the endpoint.
Q103. How many network segments can be populated in 10Base2?
Ans. 10Base2 networks allow a maximum of five segments with only three of those segments populated. Each
of the three populated segments can have a maximum of 30 nodes attached.
Q104. What is the point-to-point protocol?
Ans. A communications protocol is used to connect computers to remote networking services, including
Internet service providers.
Q106. Mention any five applications that use TCP port.
Ans. Following are the five application that uses TCP port:
FTP
POP
SSH
SMTP
Telnet
Q108. Name the measurement unit used to measure the transmission speed of Ethernet?
Ans. Mbps is the measurement unit used to measure the transmission speed of Ethernet.
Q109. Name the switching method used to explore the destination Mac address.
Ans. The switching method that is used to explore the destination Mac address is Cut Through.
Q110. Mention the use of DDR on Cisco routers.
Ans. DDR stands for dial-on-demand routing used to generate and close a circuit-switched session. It provides
on-demand routing to the low volume and periodic traffic.
Q111. Mention the number of access lists required per interface.
Ans. One access list can be used per interface and per protocol.
Q112. What is the possible way to convert the user data from DTE to the WAN Service Form?
Ans. To convert the user data from DTE to WAN Service Form, we can use the Modem, CSU/DSU, and
TA/NT1.
Q125. Mention the maximum number of networks and hosts used in classes A, B, and C networks.
Ans. The maximum number of networks and hosts used in class A, B, and C networks are:
Class A: 126 networks, 16,777,214 hosts.
Class B: 16,384 networks, 65,534 hosts.
Class C: 2,097,152 networks, 254 hosts.
Q126. Differentiate between a ‘bit rate’ and ‘baud rate’.
Ans. A bit rate is the number of bits transmitted during one second, whereas, baud rate refers to the number of
signal units per second that are required to represent those bits.
Baud rate = bit rate / N, where N is the no. of bits represented by each signal shift.
Q127. What is Project 802?
Ans. It is a project started by IEEE to set standards to enable intercommunication between equipment from a
variety of manufacturers.
12. Describe the OSI Reference Model
Open System Interconnections (OSI) is a network architecture model based on the ISO standards. It is called the
OSI model as it deals with connecting the systems that are open for communication with other systems.
The OSI model has seven layers. The principles used to arrive at the seven layers can be summarized briefly as
below:
Create a new layer if a different abstraction is needed.
Each layer should have a well-defined function.
The function of each layer is chosen based on internationally standardized protocols.
13. Define the 7 different layers of the OSI Reference Model
Here the 7 layers of the OSI reference model:
Layers of OSI Model
Layer Unit Exchanged Description
It is concerned with transmitting raw bits over a communication
channel.
Physical Bit Chooses which type of transmission mode is to be selected for the
transmission. The available transmission modes are Simplex, Half
Duplex and Full Duplex.,
The main task of this layer is to transform a raw transmission
facility into a line that appears free of undetected transmission
errors.
It also allows detecting damaged packets using the CRC (Cyclic
Redundancy Check) error-detecting, code.
Data Link Frame
When more than one node is connected to a shared link, Data Link
Layer protocols are required to determine which device has control
over the link at a given time.
It is implemented by protocols like CSMA/CD, CSMA/CA,
ALOHA, and Token Passing.
It controls the operation of the subnet.
Network Packet The network layer takes care of feedback messaging through ICMP
messages.
The basic functionality of this layer is to accept data from the
above layers, split it up into smaller units if needed, pass these to
TPDU - Transaction
Transport the network layer, and ensure that all the pieces arrive correctly at
Protocol Data Unit
the other end.
The Transport Layer takes care of Segmentation and Reassembly.
The session layer allows users on different machines to establish
sessions between them.
SPDU - Session
Session Dialogue control is using the full-duplex link as half-duplex. It
Protocol Data Unit
sends out dummy packets from the client to the server when the
client is ideal.
The presentation layer is concerned with the syntax and semantics
PPDU - Presentation of the information transmitted.
Presentation
Protocol Data Unit It translates a message from a common form to the encoded format
which will be understood by the receiver.
It contains a variety of protocols that are commonly needed by
APDU - Application
Application users.
Protocol Data Unit
The application layer sends data of any size to the transport layer.
14. Describe the TCP/IP Reference Model
It is a compressed version of the OSI model with only 4 layers. It was developed by the US Department of
Defence (DoD) in the 1980s. The name of this model is based on 2 standard protocols used i.e. TCP
(Transmission Control Protocol) and IP (Internet Protocol).
15. Define the 4 different layers of the TCP/IP Reference Model
Layers of TCP/IP
Layer Description
Decides which links such as serial lines or classic Ethernet must be used to meet the needs of the
Link
connectionless internet layer.
The internet layer is the most important layer which holds the whole architecture together.
Internet
It delivers the IP packets where they are supposed to be delivered.
Its functionality is almost the same as the OSI transport layer. It enables peer entities on the
Transport
network to carry on a conversation.
Application It contains all the higher-level protocols.
21. What is the TCP protocol?
TCP or TCP/IP is the Transmission Control Protocol/Internet Protocol.
22. What is the UDP protocol?
UDP is the User Datagram Protocol and is based on Datagrams. Mainly, it is used for multicasting and
broadcasting.
24. What is the ICMP protocol?
ICMP is the Internet Control Message Protocol. It is a network layer protocol used for error handling. It is
mainly used by network devices like routers for diagnosing the network connection issues and crucial for error
reporting and testing if the data is reaching the preferred destination in time. It uses port 7 by default.
29. Differentiate the MAC address with the IP address
The difference between MAC address and IP address are as follows:
MAC Address IP Address
Media Access Control Address Internet Protocol Address
6 or 8-byte hexadecimal number 4 (IPv4) or 16 (IPv6) Byte address
It is embedded with NIC It is obtained from the network
Physical Address Logical Address
Operates at Data Link Layer Operates at Network Layer.
Helps to identify the device Helps to identify the device connectivity on the network.
13.Software Engineering
1) What are the important categories of software?
System software
Application software
Embedded software
Web Applications
Artificial Intelligence software
Scientific software.
2) What is the main difference between a computer program and computer software?
A computer program is a piece of programming code. It performs a well-defined task. On the other hand, the
software includes programming code, documentation and user guide.
3) What is software re-engineering?
It is a process of software development which is done to improve the maintainability of a software system.
4) Describe the software development process in brief:
The software development is a life cycle is composed of the following stages:
Requirement analysis
Specification
Software architecture
Implementation
Testing
Documentation
Training and support
Maintenance
5) What are SDLC models available?
Waterfall Model, Spiral Model, Big-bag model, Iterative Model, and V- Model are some of the famous SDLC
models
6) What is verification and validation?
Verification:
Verification is a term that refers to the set of activities which ensure that software implements a specific
function.
Validation:
It refers to the set of activities which ensure that software that has been built according to the need of clients.
7) In software development process what is the meaning of debugging?
Debugging is the process that results in the removal of error. It is very important part of the successful testing.
8) How can you make sure that your code is both safe and fast?
In the software, development security is always first. So if the execution of the program is slow then, I will try
to identify the reason out ways to its time complexity.
9) Name two tools which are used for keeping track of software requirements?
There many l ways to keep track of requirements.
Two commonly used are:
Make a requirements specifications document to list all of the requirements.
Create an excel sheet the list down the requirement, type, dependency, priority, etc.
10) What is the main difference between a stubs, a mock?
A stub is a minimal implementation of an interface which generally returns hardcoded data while mock usually
verifies outputs against expectations. Those expectations are set in the test.
11) What language do you like to write programming algorithms?
Every developer has their views when it comes to the programming language choices. Though, one should
prefer high-level languages because they are dynamic. Like C and C++ languages.
12) What is computer software?
Computer software is a package which includes a software program, its documentation, and user guide on how
to use the software.
14.Artificial Intelligence
2. What are Intelligent Agents, and How are They Used in AI?
Intelligent agents are autonomous entities that use sensors to know what is going on, and then use actuators to
perform their tasks or goals. They can be simple or complex and can be programmed to learn to accomplish
their jobs better.
3. What is TensorFlow, and What is It Used For?
TensorFlow is an open-source software library initially developed by the Google Brain Team
4. What is Machine Learning, and How Does It Relate to AI?
Machine learning is a subset of AI. The idea is that machines will “learn” and get better at tasks over time rather
than having humans continually having to input parameters. Machine learning is a practical application of AI.
5. What are Neural Networks, and How Do They Relate to AI?
Neural networks are a class of machine learning algorithms. The neuron part of the neural is the computational
component, and the network part is how the neurons are connected.
6. What is Deep Learning, and How Does It Relate to AI?
Deep learning is a subset of machine learning. It refers to using multi-layered neural networks to process data in
increasingly sophisticated ways, enabling the software to train itself to perform tasks like speech and image
recognition through exposure to these vast amounts of data for continual improvement in the ability to
recognize and process information. Layers of neural networks stacked on top of each for use in deep learning
are called deep neural networks.
7. Why is Image Recognition a Key Function of AI?
Humans are visual, and AI is designed to emulate human brains. Therefore, teaching machines to recognize and
categorize images is a crucial part of AI. Image recognition also helps machines to learn (as in machine
learning) because the more images that are processed, the better the software gets at recognizing and processing
those images.
8. What is Automatic Programming?
Automatic programming is describing what a program should do, and then having the AI system “write” the
program.
10. What are Constraint Satisfaction Problems?
Constraint Satisfaction Problems (CSPs) are mathematical problems defined as a set of objects, the state of
which must meet several constraints.
11. What is Supervised Versus Unsupervised Learning?
This is one of the next important AI questions. Supervised learning is a machine learning process in which
outputs are fed back into a computer for the software to learn from, for more accurate results the next time. With
supervised learning, the “machine” receives initial training to start. In contrast, unsupervised learning means a
computer will learn without initial training to base its knowledge.
12. What are some common misunderstandings about AI?
Since the beginning of the development of artificial intelligence, there have been a number of
misunderstandings regarding it. The following are examples of some of these common misunderstandings:
13. What Role Does Computer Vision Play in AI?
Artificial intelligence (AI) is broken down into a number of subfields, one of which is known as computer
vision. Computer vision is the process of teaching computers to understand and collect data from the visual
environment, such as graphics. Therefore, AI technology is used by computer vision in order to address
complicated challenges such as image analysis, object identification, and other similar issues.
14. How Does the Strong AI Differ From the Weak AI?
Strong AI
The goal of strong artificial intelligence is to create actual intelligence artificially, which refers to an intellect
created by humans that possesses feelings, consciousness, and emotions comparable to those of humans. The
idea of creating AI entities with perceiving, analyzing, and decision-making skills comparable to those of
humans is still only an assumption at this point.
Weak AI
The present phase of artificial intelligence research is known as "weak AI," and it is concerned with the
construction of expert systems and robots that can assist people and solve challenging real-world issues. Weak
artificial intelligence systems like Alexa and Siri are examples.
15. Where Does Artificial Intelligence Go From Here?
This is one of the next important AI questions. It is anticipated that artificial intelligence will continue to have a
significant impact on a large number of people as well as almost every sector. Artificial intelligence has become
the primary impetus behind the development of new technologies such as robots, the Internet of Things, and
large data sets. AI is capable of making an ideal judgment in a split second, which is almost difficult for a
person to do.
Cancer treatment, cutting-edge global climate solutions, smart transportation, and space research are all being
aided by AI. We don't expect it to renounce its position as the driving force behind computer innovation and
progress any time soon. Artificial Intelligence will have a greater influence on the globe than any other
technological advancement in human history.
16. What Do You Comprehend by the Phrase “Reward Maximization”?
Reinforcement learning uses the phrase "reward maximization" to describe the purpose of the agent, which is to
maximize rewards. Real-world rewards are positive feedback for doing an action that results in a change in a
state. A reward is given to the agent if he uses optimum policies to complete a good deed, and a reward is
deducted if he fails to do so. Rewards are maximized by using the best rules possible, which is known as reward
maximization.
17. How Many Different Kinds of Agents Exist in Artificial Intelligence?
Simple Reflex Agents
Simulation-Based Reflex Agents
Goal-Based Agents
Utilitarian Agents
Educative Agents
18. What is Your Comprehension of Hyperparameters?
This is one of the next important AI questions. The training process is controlled by hyperparameters. Model
train performance is directly influenced by these factors, which may be changed to one's liking. They are made
known in advance. Algorithm hyperparameters that have no influence on simulation results but can influence
the efficiency and acquisition of skills are the other two categories of hyperparameters that may be inferred
when accommodating the machine to the learning algorithm.
19. What are the Various Expert System Components?
The following are the primary components that make up an expert system:
User Interface
Inference Engine
Knowledge Base
20. What is a Chatbot?
A chatbot is a computer program with artificial intelligence (AI) that can converse with humans using natural
language processing.
21. How Can Artificial Intelligence Be Used to Identify Fraud?
This is one of the next important AI questions. It is possible to use artificial intelligence in fraud detection
utilizing various machine learning techniques (e.g., supervised and unsupervised). Machine learning's rule-
based algorithms may be used to identify and stop fraudulent transactions. Machine learning is used to identify
fraud in the following ways:
Extracting Data
Data Cleaning
Data Analysis and Exploration
Building Models
22. Why Do We Utilize an Inference Engine in AI?
AI's inference engine extracts valuable learning from its knowledge base by following a set of predefined
logical rules. For the most part, it operates in two distinct modes:
Backward Chaining
It starts with the end aim and then works backward to figure out the evidence that points in that direction.
Forward Chaining
It begins with facts that are already known and then claims new facts.
1. What is Artificial Intelligence?
The replication of human intellectual processes by machines, particularly computer systems, is known as
artificial intelligence. Expert systems, natural language processing, speech recognition, and machine vision are
examples of AI applications.
2. What are Different Platforms for Artificial Intelligence (AI) Development?
Some of the best Artificial Intelligence Platforms are Google AI Platform, Microsoft Azure, TensorFlow,
Infosys Nia, Rainbird, Wipro HOLMES, Premonition, Dialogflow, Ayasdi, Meya, MindMeld, KAI, Wit, Vital
A.I, Receptiviti, Lumiata, Watson Studio, and Infrrd.
3. What are the Programming Languages Used for Artificial Intelligence?
Prolog (generic core, modules) is an early 1970s logic programming language that is particularly well suited for
artificial intelligence applications. Python is presently the most popular language. Others:
R.
Julia.
Java and
C++.
4. What is the Future of Artificial Intelligence?
Machine learning and natural language processing are projected to advance further in the artificial intelligence
future (AI), resulting in the creation of more complex and autonomously AI systems. These systems may be
used in a wide range of applications, such as autonomous vehicles, personal assistants, and intelligent robots.
Additionally, AI is expected to play a significant role in areas such as healthcare, finance, and manufacturing.
However, as AI becomes more advanced and integrated into society, it is also important to consider the ethical
and societal implications of this technology and to ensure that it is developed and used responsibly.
5. What are the Types of Artificial Intelligence?
This is one of the next important AI questions for freshers. There are several types of Artificial Intelligence (AI)
that are commonly categorized based on their level of complexity and autonomy. These include:
Reactive Machines:
Limited Memory:
Theory of Mind:
Self-Aware:
Narrow AI or ANI:
7. How are Artificial Intelligence and Machine Learning Related?
This is one of the most basic, yet most important AI questions. Artificial Intelligence (AI) is a broad field that
encompasses a variety of techniques and approaches for creating intelligent systems that can perform tasks that
typically require human intelligence, such as recognizing speech, understanding natural language, and making
decisions.
Machine Learning (ML), on the other hand, is a specific approach to achieving AI. It involves the development
of algorithms and statistical models that enable systems to improve their performance over time by learning
from data. Machine learning algorithms can be categorized into three main categories: supervised learning,
unsupervised learning, and reinforcement learning.
8. What are Different Types of Machine Learning?
Supervised learning: An example of supervised learning would be when a model was trained on a labeled
dataset, with the best outputs provided for each input. The model then uses this labeled dataset to make
predictions on new, unseen data. Eg: linear regression, and support vector machines.
Unsupervised learning:
Reinforcement learning:
Semi-supervised learning:
Self-supervised learning:
1. What is Q-Learning?
Q-learning is a type of reinforcement learning algorithm that is used to find the optimal policy for an agent to
follow in an environment.
2. Which Assessment is Used to Test the Intelligence of a Machine? Explain It.
This is one of the most frequently asked AI questions. There are several ways to assess the intelligence of a
machine, but one of the most widely used methods is the Turing test. Essentially, the Turing test measures a
machine's ability to exhibit human-like intelligence.
3. What is Reinforcement Learning, and How Does It Work?
Reinforcement learning (RL) is a type of machine learning where an agent learns to make decisions in an
environment by interacting with it and receiving feedback in the form of rewards or penalties.
7. What is Overfitting?
Overfitting in AI occurs when a machine learning model becomes too complex and starts to fit the training data
too closely, to the point where it memorizes the training data rather than learning the underlying patterns and
relationships.
8. What are the Techniques Used to Avoid Overfitting?
Cross-validation:
Regularization:
Early stopping:
Ensemble methods:
Pruning:
Dropout:
Bayesian approaches:
9. What is Natural Language Processing?
Natural Language Processing (NLP) is a field of artificial intelligence and computer science that focuses on the
interaction between computers and humans in natural language.
10. What is the Difference Between Natural Language Processing and Text Mining?
NLP is a branch of artificial intelligence that focuses on the interaction between computers and humans in
natural language. It involves using techniques from computer science, linguistics, and mathematics to process
and analyze human language. NLP tasks include speech recognition, natural language understanding, natural
language generation, machine translation, and sentiment analysis.
Text Mining, on the other hand, is a broader field that involves the use of NLP techniques to extract valuable
information from unstructured text data. Text Mining often used in business, social science, and information
science. It includes tasks such as information retrieval, text classification, text clustering, text summarization,
and entity recognition.
11. What is Fuzzy Logic?
Fuzzy logic is a type of logic that allows reasoning with imprecise or uncertain information. It is an extension of
classical logic and allows for partial truth, rather than the traditional binary true or false. This means that
propositions in fuzzy logic can have a truth value between 0 and 1, representing the degree of truth.
14. What is an Artificial Neural Network? What are Some Commonly Used Artificial Neural Networks?
Artificial neural networks are developed to simulate the human brain digitally. These networks may be used to
create the next generation of computers. They are now employed for complicated studies in a variety of
disciplines, from engineering to medical.
15. What is a Rational Agent, and What is Rationality?
A rational agent is a system that makes decisions based on maximizing a specific objective. The concept of
rationality refers to the idea that the agent's decisions and actions are consistent with its objectives and beliefs.
In other words, a rational agent is one that makes the best decisions possible based on the information it has
available. This is often formalized through the use of decision theory and game theory.
1. If you are starting a new business, how Will you use AI to promote your business?
There are many ways that AI can be used to promote a new business. Some potential strategies include:
Chatbots:
Personalization
Predictive analytics:
Image and voice recognition:
Social Media:
Email Marketing:
SEO:
2. Suppose you know a farmer. He tells you that despite working hard in the fields, his crop yield is
deteriorating. How can AI help him?
There are several ways that AI can help a farmer improve crop yield, some of which include:
Crop monitoring:
Weather forecasting:
Precision agriculture:
Crop yield prediction:
Livestock monitoring:
3. “Customers who bought this also bought this”, you might have seen this when shopping on Amazon. How do
you think this works?
The "Customers who bought this also bought" feature on Amazon is a form of collaborative filtering.
Collaborative filtering is a method of making recommendations based on the past behavior of customers.
The system works by analyzing the purchase history of customers and identifying patterns in the items they
have bought together. For example, if a large number of customers who bought a specific book also bought
another book, the system will suggest the second book to customers who purchase the first one.
In order to accomplish this, Amazon uses a number of algorithms and techniques, such as:
Item-based collaborative filtering: This technique compares the purchase history of customers who bought a
specific item and makes recommendations based on the items they also bought.
User-based collaborative filtering: This technique compares the purchase history of customers who have bought
similar items, and makes recommendations based on the items they also bought.
Matrix Factorization: This method is used to factorize the user-item interaction matrix into a low-dimensional
representation, which allows for the generalization of customer preferences and the generation of
recommendations.
Deep learning techniques: These techniques are used to learn patterns in the data and make predictions based on
them.
4. Suppose you have to explain to a beginner how a face detection system works. How would you do that?
A face detection system is a computer program that uses artificial intelligence to identify human faces in digital
images or videos. Here is a simple explanation of how it works:
Next, the system applies a face detection algorithm to the image or video frame. This algorithm uses
mathematical algorithms and models to scan the image and identify patterns and features that are characteristic
of human faces, such as the eyes, nose, and mouth.
Once a face is detected, the system applies a face recognition algorithm to identify the person. This algorithm
compares the features of the detected face to a database of known faces, and makes a prediction about who the
person is.
Finally, the system outputs the result, which can be displayed on a screen, saved to a database, or used to trigger
other actions.
1) What is Artificial Intelligence?
Artificial Intelligence is an area of computer science that emphasizes the creation of intelligent machine that
work and reacts like humans.
2) What is an artificial intelligence Neural Networks?
Artificial intelligence Neural Networks can model mathematically the way biological brain works, allowing the
machine to think and learn the same way the humans do- making them capable of recognizing things like
speech, objects and animals like we do.
3) What are the various areas where AI (Artificial Intelligence) can be used?
Artificial Intelligence can be used in many areas like Computing, Speech recognition, Bio-informatics,
Humanoid robot, Computer software, Space and Aeronautics’s etc.
4) Which is not commonly used programming language for AI?
Perl language is not commonly used programming language for AI
5) What is Prolog in AI?
In AI, Prolog is a programming language based on logic.
6) Give an explanation on the difference between strong AI and weak AI?
Strong AI makes strong claims that computers can be made to think on a level equal to humans while weak AI
simply predicts that some features that are resembling to human intelligence can be incorporated to computer to
make it more useful tools.
7) Mention the difference between statistical AI and Classical AI ?
Statistical AI is more concerned with “inductive” thought like given a set of pattern, induce the trend etc.
While, classical AI, on the other hand, is more concerned with “ deductive” thought given as a set of
constraints, deduce a conclusion etc.
8) What is alternate, artificial, compound and natural key?
Alternate Key: Excluding primary keys all candidate keys are known as Alternate Keys.
Artificial Key: If no obvious key either stands alone or compound is available, then the last resort is to, simply
create a key, by assigning a number to each record or occurrence. This is known as artificial key.
Compound Key: When there is no single data element that uniquely defines the occurrence within a construct,
then integrating multiple elements to create a unique identifier for the construct is known as Compound Key.
Natural Key: Natural key is one of the data element that is stored within a construct, and which is utilized as
the primary key.
9) What does a production rule consist of?
The production rule comprises of a set of rule and a sequence of steps.
10) Which search method takes less memory?
The “depth first search” method takes less memory.
11) Which is the best way to go for Game playing problem?
Heuristic approach is the best way to go for game playing problem, as it will use the technique based on
intelligent guesswork. For example, Chess between humans and computers as it will use brute force
computation, looking at hundreds of thousands of positions.
12) A* algorithm is based on which search method?
A* algorithm is based on best first search method, as it gives an idea of optimization and quick choose of path,
and all characteristics lie in A* algorithm.
14) What is agent in artificial intelligence?
Anything perceives its environment by sensors and acts upon an environment by effectors are known as Agent.
Agent includes Robots, Programs, and Humans etc.
17) Which property is considered as not a desirable property of a logical rule-based system?
“Attachment” is considered as not a desirable property of a logical rule based system.
19) When an algorithm is considered completed?
An algorithm is said completed when it terminates with a solution when one exists.
20) What is a heuristic function?
A heuristic function ranks alternatives, in search algorithms, at each branching step based on the available
information to decide which branch to follow.
21) What is the function of the third component of the planning system?
In a planning system, the function of the third component is to detect when a solution to problem has been
found.
22) What is “Generality” in AI?
Generality is the measure of ease with which the method can be adapted to different domains of application.
23) What is a top-down parser?
A top-down parser begins by hypothesizing a sentence and successively predicting lower level constituents until
individual pre-terminal symbols are written.
24) Mention the difference between breadth first search and best first search in artificial intelligence?
These are the two strategies which are quite similar. In best first search, we expand the nodes in accordance
with the evaluation function. While, in breadth first search a node is expanded in accordance to the cost function
of the parent node.
25) What are frames and scripts in “Artificial Intelligence”?
Frames are a variant of semantic networks which is one of the popular ways of presenting non-procedural
knowledge in an expert system. A frame which is an artificial data structure is used to divide knowledge into
substructure by representing “stereotyped situations’. Scripts are similar to frames, except the values that fill the
slots must be ordered. Scripts are used in natural language understanding systems to organize a knowledge base
in terms of the situation that the system should understand.
26) What is FOPL stands for and explain its role in Artificial Intelligence?
FOPL stands for First Order Predicate Logic, Predicate Logic provides
a) A language to express assertions about certain “World”
b) An inference system to deductive apparatus whereby we may draw conclusions from such assertion
c) A semantic based on set theory
27) What does the language of FOPL consists of
a) A set of constant symbols
b) A set of variables
c) A set of predicate symbols
d) A set of function symbols
e) The logical connective
f) The Universal Quantifier and Existential Qualifier
g) A special binary relation of equality
28) For online search in ‘Artificial Intelligence’ which search agent operates by interleaving computation and
action?
In online search, it will first take action and then observes the environment.
29) Which search algorithm will use a limited amount of memory in online search?
RBFE and SMA* will solve any kind of problem that A* can’t by using a limited amount of memory.
30) In ‘Artificial Intelligence’ where you can use the Bayes rule?
In Artificial Intelligence to answer the probabilistic queries conditioned on one piece of evidence, Bayes rule
can be used.
31) For building a Bayes model how many terms are required?
For building a Bayes model in AI, three terms are required; they are one conditional probability and two
unconditional probability.
32) What is the consequence between a node and its predecessors while creating bayesian network?
The correct answer is (C) Conditionally independent
33) To answer any query how the Bayesian network can be used?
If a Bayesian Network is a representative of the joint distribution, then by summing all the relevant joint entries,
it can solve any query.
34) What combines inductive methods with the power of first order representations?
Inductive logic programming combines inductive methods with the power of first order representations.
35) In Inductive Logic Programming what needed to be satisfied?
The objective of an Inductive Logic Programming is to come up with a set of sentences for the hypothesis such
that the entailment constraint is satisfied.
36) In top-down inductive learning methods how many literals are available? What are they?
There are three literals available in top-down inductive learning methods they are
a) Predicates
b) Equality and Inequality
c) Arithmetic Literals
37) Which algorithm inverts a complete resolution strategy?
‘Inverse Resolution’ inverts a complete resolution, as it is a complete algorithm for learning first order theories.
38) In speech recognition what kind of signal is used?
In speech recognition, Acoustic signal is used to identify a sequence of words.
39) In speech recognition which model gives the probability of each word following each word?
Biagram model gives the probability of each word following each other word in speech recognition.
40) Which algorithm is used for solving temporal probabilistic reasoning?
To solve temporal probabilistic reasoning, HMM (Hidden Markov Model) is used, independent of transition and
sensor model.
45) In Artificial Intelligence, what do semantic analyses used for?
In Artificial Intelligence, to extract the meaning from the group of sentences semantic analysis is used.
46) What is meant by compositional semantics?
The process of determining the meaning of P*Q from P,Q and* is known as Compositional Semantics.
47) How logical inference can be solved in Propositional Logic?
In Propositional Logic, Logical Inference algorithm can be solved by using
a) Logical Equivalence
b) Validity
c) Satisfying ability
48) Which process makes different logical expression looks identical?
‘Unification’ process makes different logical expressions identical. Lifted inferences require finding substitute
which can make a different expression looks identical. This process is called unification.
49) Which algorithm in ‘Unification and Lifting’ takes two sentences and returns a unifier?
In ‘Unification and Lifting’ the algorithm that takes two sentences and returns a unifier is ‘Unify’ algorithm.
50) Which is the most straight forward approach for planning algorithm?
State space search is the most straight forward approach for planning algorithm because it takes account of
everything for finding a solution.
1) What do you understand by Artificial Intelligence?
Artificial intelligence is computer science technology that emphasizes creating intelligent machine that can
mimic human behavior. Here Intelligent machines can be defined as the machine that can behave like a human,
think like a human, and also capable of decision making. It is made up of two words, "Artificial" and
"Intelligence," which means the "man-made thinking ability."
With artificial intelligence, we do not need to pre-program the machine to perform a task; instead, we can create
a machine with the programmed algorithms, and it can work on its own.
2) Why do we need Artificial Intelligence?
The goal of Artificial intelligence is to create intelligent machines that can mimic human behavior. We need AI
for today's world to solve complex problems, make our lives more smoothly by automating the routine work,
saving the manpower, and to perform many more other tasks.
3) Give some real-world applications of AI.
There are various real-world applications of AI, and some of them are given below:
o Google Search Engine:
o Ridesharing Applications:
o Spam Filters in Email:
o Social Networking:
o Product recommendations:
4) How Artificial intelligence, Machine Learning, and Deep Learning differ from each other?
The difference between AI, ML, and Deep Learning is given in the below table:
Artificial Intelligence Machine Learning Deep Learning
The term Artificial intelligence The term ML was first The term DL was first coined in the
was first coined in the coined in the year 1959 by year 2000 Igor Aizenberg.
year 1956 by John McCarthy. Arthur Samuel.
It is a technology that is used to It is a subset of AI that It is the subset of machine learning and AI
create intelligent machines that learns from past data and that is inspired by the human brain cells,
can mimic human behavior. experiences. called neurons, and imitates the working of
the human brain.
AI completely deals with ML deals with structured Deep learning deals with structured and
structured, semi-structured data. and semi-structured data. unstructured data.
It requires a huge amount of It can work with less It requires a huge amount of the data
data to work. amount of data compared compared to the ML.
to deep learning and AI.
The goal of AI is to enable the The goal of ML is to The goal of deep learning is to solve the
machine to think without any enable the machine to complex problems as the human brain does,
human intervention. learn from past using various algorithms.
experiences.
11) What is the intelligent agent in AI, and where are they used?
The intelligent agent can be any autonomous entity that perceives its environment through the sensors and act
on it using the actuators for achieving its goal.
These Intelligent agents in AI are used in the following applications:
o Information Access and Navigations such as Search Engine
o Repetitive Activities
o Domain Experts
o Chatbots, etc.
12) How is machine learning related to AI?
Machine learning is a subset or subfield of Artificial intelligence. It is a way of achieving AI. As both are the
two different concepts and the relation between both can be understood as "AI uses different Machine learning
algorithms and concepts to solve the complex problems."
19) Give a brief introduction to the Turing test in AI?
Turing test is one of the popular intelligence tests in Artificial intelligence. The Turing test was introduced by
Alan Turing in the year 1950. It is a test to determine that if a machine can think like a human or not. According
to this test, a computer can only be said to be intelligent if it can mimic human responses under some particular
conditions.
20) Which assessment is used to test the intelligence of the machine?
Turing Test.
21) What is overfitting? How can it be overcome in Machine Learning?
When the machine learning algorithm tries to capture all the data points, and hence, as a result, captures noise
also, then overfitting occurs in the model. Due to this overfitting issue, the algorithm shows the low bias, but the
high variance in the output. Overfitting is one of the main issues in machine learning.
Methods to avoid Overfitting in ML:
o Cross-Validation
o Training With more data
o Regularization
o Ensembling
o Removing Unnecessary Features
o Early Stopping the training.
22) Tell one technique to avoid overfitting in neural networks?
Dropout Technique: The dropout technique is one of the popular techniques to avoid overfitting in the neural
network models. It is the regularization technique, in which the randomly selected neurons are dropped during
training.
Class
1. Basic idea
2. Genetic operstion(selection, crossover, mutation)
A genetic algorithm is a search heuristic that is inspired by Charles Darwin’s theory of natural evolution. This
algorithm reflects the process of natural selection where the fittest individuals are selected for reproduction in
order to produce offspring of the next generation.
Crossover is the most significant phase in a genetic algorithm. For each pair of parents to be mated,
a crossover point is chosen at random from within the genes. Offspring are created by exchanging the genes of
parents among themselves until the crossover point is reached. Mutation occurs to maintain diversity within the
population and prevent premature convergence.
3. Motivations of GA
Mimicking natural evolution:
Handling complex and large solution spaces
Exploration and exploitation trade-off
Ability to handle non-linear and non-differentiable problems:
4. Applications
Optimization problems:
Machine learning and data mining
Image and signal processing
Robotics and control systems
Game playing and strategy optimization
5. Learning/what you have learnt
Convergence and termination criteria
Solution representation
Fitness function
Evolutionary operators
Exploration and exploitation
6. Various features of GA
Population-based approach
Encoding and representation
Fitness evaluation
Genetic operators
7. How to solve knapsack problem using GA
1. Representation: Encode each individual in the population as a binary string of fixed length.
2. Initialization: Generate an initial population of individuals randomly or using a heuristic method.
3. Fitness evaluation: Evaluate the fitness of each individual by calculating its total value while considering
the weight constraint. Individuals with higher total value and satisfying the weight constraint should
have higher fitness scores.
4. Selection: Select individuals from the population for reproduction based on their fitness scores.
5. Crossover: Perform crossover between selected parents to create offspring.
6. Mutation: Introduce random changes (mutations) to the offspring's binary strings.
7. Repeat steps 3 to 6 for a certain number
8. Termination: Once the algorithm reaches the termination condition, select the best individual (highest
fitness) from the final population as the solution to the knapsack problem.
8. Maxone problem using GA
The Max-One problem is a simple binary optimization problem where the goal is to find a binary string of
maximum length, consisting of all ones. The objective is to maximize the number of ones in the string. Genetic
algorithms can be applied to solve the Max-One problem. Here's a step-by-step approach:
1. Representation: Each individual in the population is represented as a binary string of fixed length.
2. Initialization: Generate an initial population of individuals randomly. Each individual's binary string
represents a potential solution.
3. Fitness evaluation: Evaluate the fitness of each individual by counting the number of ones in their binary
string
4. Selection: Select individuals from the population for reproduction based on their fitness scores.
5. Crossover: Perform crossover between selected parents to create offspring
6. Mutation: Introduce random changes (mutations) to the offspring's binary strings.
7. Repeat steps 3 to 6 for a certain number of generations or until a termination condition is met (e.g.,
reaching a maximum number of generations or finding a satisfactory solution).
8. Termination: Once the algorithm reaches the termination condition, select the best individual (highest
fitness) from the final population as the solution to the Max-One problem.
9. The way of changing programming languages
1. Identify the target language: Determine the programming language you want to switch to.
2. Learn the basics: Familiarize yourself with the syntax, semantics, and core concepts of the new
language.
3. Explore the ecosystem: Get to know the tools, frameworks, libraries, and development environment
associated with the new language.
4. Practice and build small projects: Apply your knowledge by working on small projects or exercises in
the new language.
5. Leverage existing knowledge: Identify similarities and differences between the new language and the
one you are familiar with.
6. Learn from examples and projects: Study sample code, open-source projects, or tutorials in the new
language to understand how real-world applications are built
7. Seek community support: Engage with the developer community of the new language.
8. Port existing code or projects: If you have existing code or projects in the old language, consider porting
them to the new language.
9. Collaborate and seek feedback: Collaborate with others who are experienced in the new language.
10. Keep learning and practicing: Programming languages evolve over time, and there is always something
new to learn.
Class
Feature of digital signature:
Digital signatures can provide evidence of origin, identity and status of electronic documents, transactions or
digital messages.
2.Message authentication
a message authentication code (MAC), sometimes known as an authentication tag, is a short piece of
information used for authenticating a message.
3. Integrity
When sensitive information is exchanged, the receiver must have the assurance that the message has come
intact from the intended sender and is not modified inadvertently or otherwise.
4. Non-repudiation
Nonrepudiation is the property of agreeing to adhere to an obligation. More specifically, it is the inability to
refute responsibility. For example, if you take a pen and sign a (legal) contract your signature is a
nonrepudiation device.
5. Algithm -> (Block size, key size, Transfer from one key to another key, algorithm to algorithm)
6. Attacks -> (Denial service, passive attack vs active attack)
A denial-of-service (DoS) is a form of cyberattack that prevents legitimate users from accessing a computer or
network.
Active Attacks Passive Attacks
Modification of information occurs during an Modifying the information does not happen during a
active attack. passive attack.
Active attack poses a threat to integrity and Confidentiality is at risk from passive attacks.
availability.
During an active attack, the focus is on During a passive attack, the focus is on avoiding harm.
detection.
The system is permanently harmed due to an There is no harm to the system due to the passive
active attack. attack.
In an active attack, the victim is notified of the The victim is unaware of the attack while under passive
attack. attack.
System resources can be modified during an System resources do not alter when in the passive
Active Attacks Passive Attacks
Active attacks have an impact on the system's Information and communications in the system or
services. network are collected during a passive attack.
During the execution of active attacks, Passive attacks are carried out by gathering information
information gathered from passive attacks is such as passwords and messages on their own.
utilised.
An active attack is brutal to restrict from In comparison to an active attack, the passive attack is
entering systems or networks. much easier to prevent.
8. Digital signature
Digital signatures work through public key cryptography's two mutually authenticating cryptographic keys. For
encryption and decryption, the person who creates the digital signature uses a private key to encrypt signature-
related data. The only way to decrypt that data is with the signer's public key.
16.Cloud Computing.
1) What is cloud computing?
Cloud computing is an internet based new age computer technology. It is the next stage technology that uses the
clouds to provide the services whenever and wherever the user need it.It provides a method to access several
servers world wide.
2) What are the benefits of cloud computing?
The main benefits of cloud computing are:
Data backup and storage of data.
Powerful server capabilities.
Incremented productivity.
Very cost effective and time saving.
Software as Service known as SaaS.
3) What is a cloud?
A cloud is a combination of networks ,hardware, services, storage, and interfaces that helps in delivering
computing as a service. It has three users :
End users
Business management users
cloud service provider
4) What are the different data types used in cloud computing?
There are different data types in cloud computing like emails, contracts, images , blogs etc. As we know that
data is increasing day by day so it is needed to new data types to store these new data. For an example, if you
want to store video then you need a new data type.
5) Which are the different layers that define cloud architecture?
Following are the different layers that are used by cloud architecture:
CLC or Cloud Controller
Walrus
Cluster Controller
SC or Storage Controller
NC or Node Controller
AD
6) Which platforms are used for large scale cloud computing?
The following platforms are used for large scale cloud computing:
Apache Hadoop
MapReduce
7) What are the different layers in cloud computing? Explain working of them.
There are 3 layers in the hierarchy of cloud computing.
Infrastructure as a service (IaaS):It provides cloud infrastructure in terms of hardware as like memory,
processor, speed etc.
Platform as a service (PaaS):It provides cloud application platform for the developer.
Software as a service (SaaS)::It provides the cloud applications to users directly without installing anything on
the system. These applications remains on cloud.
8) What do you mean by software as a service?
Software As a Service (SaaS) is an important layer of cloud computing. It provides cloud applications like
Google is doing. It facilitate users to save their document on the cloud and create as well.
30. Explain the difference between cloud and traditional data centers.
d. The traditional data center is expensive due to heating and hardware/software issues. Mostly, the
expenditure is on the maintenance of the data centers.
e. Cloud is scaled up when there is an increase in demand, hence such expenditure issues are not faced
in Cloud Computing.
31. What is meant by Edge Computing?
Edge computing is a part of the distributed computing structure. It brings companies closer to the sources of
data. This benefits businesses by giving them better insights, good response time and better bandwidth.
32. What are the uses of APIs in cloud services?
f. APIs (Application Programming Interfaces) are used to eliminate the necessity to write complete
programs.
g. Here, instructions are provided to make communication between one or more applications.
h. Creation of applications is made easy and accessible for the link of cloud services with other
systems.
33. Mention different data center deployments of Cloud Computing.
Cloud Computing consists of different data centers as follows:
i. Containerized data centers: Containerized data centers are the packages that contain a consistent set
of servers, network components, and storage delivered to large warehouse kind of facilities. Here,
each deployment is relatively unique.
j. Low-density data centers: Containerized data centers promote heavy density which in turn causes
much heat and significant engineering troubles. Low-density data centers are the solution to this
problem. Here, the equipment is established far apart so that it cools down the generated heat.
34. List down the three basic functioning clouds in Cloud Computing.
a. Professional cloud
b. Personal cloud
c. Performance cloud
35. What are the characteristics of cloud architecture that differ from traditional cloud architecture?
The characteristics are:
d. In cloud, the hardware requirement is fulfilled as per the demand created for cloud architecture.
e. Cloud architecture is capable of scaling up resources when there is a demand.
f. Cloud architecture is capable of managing and handling dynamic workloads without any point of
failure.
36. What are the building blocks of cloud architecture?
g. Reference architecture
h. Technical architecture
i. Deployment operation architecture
37. Explain AWS.
AWS stands for Amazon Web Services which is a collection of remote computing services also known as
Cloud Computing. This technology is also known as IaaS or Infrastructure as a Service.
38. Mention the key components of AWS.
The key components of AWS are as follows:
j. AWS Route 53: AWS Route 53 is a DNS (Domain Name Server) web-based service platform.
k. Simple E-mail Service: Sending of e-mail is done by using a RESTFUL API call or via regular
SMTP (Simple Mail Transfer Protocol).
l. Identity and Access Management: Improvised security and identity management are provided for an
AWS account.
m. Simple Storage Device (S3): It is a huge storage medium, widely used for AWS services.
n. Elastic Compute Cloud (EC2): It allows on-demand computing resources for hosting applications
and is essentially useful for unpredictable workloads.
o. Elastic Block Stores (EBS): They are storage volumes attached to EC2 and allow the data lifespan
of a single EC2.
p. CloudWatch: Amazon CloudWatch is used to monitor AWS resources, and it allows administrators
to view and collect the keys required. Access is provided so that one can set a notification alarm in
the case of trouble.
39. Explain how you can vertically scale an Amazon instance.
This is one of the essential features of AWS and cloud virtualization. We spinup a newly developed large
instance where we pause that instance and detach the root EBS volume from the server and discard. Later, we
stop our live instance and detach its root volume connected. here, we note down the unique device ID and attach
the same root volume to the new server, and we restart it again. This results in a vertically scaled Amazon
instance.
40. Explain the security usage in the Amazon Web Services model.
a. AWS supports security groups.
b. Access is provided to create a security group for a jump box with SSH access only for port 22 open.
Later, a webserver group and a database group are created. The webserver group provides 80 and 443
from around the world, but only port 22 will be vital among the jump box group. The database group
allows port 3306 from the webserver group and port 22 from the jump box group. The addition of any
machines to the webserver group can store in the database. No one can directly SSH to any of our boxes.
41. What are reasons that make Amazon so big?
c. In Amazon, the backup storage of EBS volumes is maintained by inserting the snapshot facility via
an API call or via a GUI interface like Elasticfox.
d. Performance is improved by using Linux software RAID and striping across four volumes.
42. How does Resource Replication take place in Cloud Computing?
Resource Replication creates duplicates of the same resource. Replication is employed when a resource is needed
more and more.
1. Compare between Cloud and On-premise Computing.
Criteria Cloud On-premise
Initial cost Low High
Maintenance and Hassle-free Needs attention
support
Upgrade Automatic Manual
Scalability Excellent Good
Pay as you go Yes No
2. What is a Cloud?
A cloud is a collaboration of networks, hardware, services, storage, and interfaces that help in delivering
computing as a service. It has three users:
1. End users
2. Business management users
3. Cloud service providers
3. What is Cloud Computing?
It is an advanced-stage technology implemented so that the cloud provides its services globally as per the user
requirements. It provides a method to access several servers worldwide.
4. What are some of the key features of Cloud Computing?
Reliable
Scalable
Agile
Location Independent
Multi-tenant
5. What are the benefits of Cloud Computing?
The main benefits of Cloud Computing are:
Data backup and storage of data
Powerful server capabilities
Incremented productivity
Cost-effective and time-saving
6. Mention the layers of PaaS architecture.
Cloud Controller
Automatically creates virtual machines and controllers
Deploys applications
Connects to services
Automatically scales up and down
Storage Services
Object
NoSQL
Relational
Block storage
Applications Stored in Storage Services
Simple-to-scale applications
Easier recovery from failure
7. What are the cloud service models?
Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Software as a Service (SaaS)
9. What are the components of Windows Azure?
Windows Azure Platform Services
Cloud
SQL Azure
App Fabric: Allows fabric cloud
10. Which are the main constituents of the cloud ecosystem?
Cloud service providers
Cloud consumers
Direct consumers
11. Who are the cloud consumers in a cloud ecosystem?
People and teams who use different types of cloud services, within your organization.
12. Who are the direct consumers in a cloud ecosystem?
The individuals who utilize the service provided by your company, build within a cloud environment.
13. Who are the Cloud service providers in a cloud ecosystem?
Cloud service providers are the companies that sell their cloud services to others. Sometimes these companies
also provide cloud services internally to their partners, employees, etc.
14. What are the differences occurred in distributed operations?
FC: Master–Slave operations
Nova: Parallel process and its shared database
15. Which agent is equivalent of Nova Compute?
Azure Agent
16. Mention the reliability and availability of Cloud Computing.
Use of Fault Domains:
Two virtual machines are in a single fault domain if a single hardware can bring down both the virtual
machines.
Azure automatically distributes instances of a role across fault domains.
Use of Upgrade Domains:
When a new version of the software is rolled out, then only one up-gradation of the domain is done at a
time.
It ensures that any instance of the service is always available.
There is an availability of the applications in multiple instances.
Storage and Network Availability:
Copies of data are stored in different domains.
it is a mechanism to guard against DoS and DDoS attacks.
17. Explain the Cloud Computing Architecture.
Cloud Computing Architecture brings together two components of cloud computing – the front end and the
back-end. It is important to bring the correct services together for the benefit of both internal and external
people. If need be, cloud management should be able to quickly make the required changes.
18. What are the Cloud Storage Levels?
Files
Blocks
Datasets
Objects
19. What are the serverless components in cloud computing with their advantages and disadvantages?
These components allow you to create apps without the stress of managing the infrastructure.
Advantages Disadvantages
Cost-effective Can cause late responses
Increases productivity Not ideal for high-computing operations
Scalable More vulnerable when it comes to security
No server Debugging is challenging
management
20. Give the best example for the open-source Cloud Computing.
OpenStack
21. What are microservices and their importance in the cloud?
Microservices help create apps that consist of codes that are independent of one another and the platform they
were developed on. Microservices are important in the cloud because of the following reasons:
Each of them is built for a particular purpose. This makes app development simpler.
They make changes easier and quicker.
Their scalability makes it easier to adapt the service as needed.
23. Why Hybrid Clouds are so important?
Cloud Bursting:
Access capacity and specialized software are available in the public cloud and not in the private cloud.
Examples: Virtual Amazon and Dynamo
Leveraging the best of both worlds, there are hybrid clouds.
vCloud:
It is a VMware cloud.
It is expensive.
It gives enterprise quality.
OpenStack:
It has commodity servers and storage.
It is less reliable.
We can run web servers on OpenStack.
the database is built on vCloud.
24. List the platforms that are used for large-scale Cloud Computing.
The platforms that are used for large-scale Cloud Computing are:
Apache Hadoop
MapReduce
25. Mention the different types of models used for the deployment in Cloud Computing.
The different deployment models in Cloud Computing are:
Private Cloud
Public Cloud
Community Cloud
Hybrid Cloud
26. Explain security management in terms of Cloud Computing.
Identity management access provides the authorization of application services.
Access control permission is given to users to have complete controlling access of another user who is
entering into the cloud environment.
Authentication and authorization provide permission to only the authorized and authenticated users to
access the data and applications.
27. Which are the layers of Cloud Computing?
The different layers used by cloud architecture are as follows:
CLC or Cloud Controller
Walrus
Cluster Controller
Storage Controller (SC)
Node Controller (NC)
28. Explain the full form and the usage of 'Eucalyptus' in Cloud Computing.
The full form of ‘Eucalyptus’ is ‘Elastic Utility Computing Architecture for Linking Your Programs to Useful
Systems.
Eucalyptus is an open-source software infrastructure in Cloud Computing, which enables us to implement
clusters in the Cloud Computing platform. It is mainly used to build public, hybrid, and private clouds. It has
capabilities to convert our own data center into a private cloud and provides its functionalities for various other
organizations.
29. Mention the names of some large cloud providers and databases.
Google Bigtable
Amazon Simple Database
Cloud-based SQL (Sequential Query Language)
30. Explain the difference between cloud and traditional data centers.
The traditional data center is expensive due to heating and hardware/software issues. Mostly, the
expenditure is on the maintenance of the data centers.
Cloud is scaled up when there is an increase in demand, hence such expenditure issues are not faced in
Cloud Computing.
31. What is meant by Edge Computing?
Edge computing is a part of the distributed computing structure. It brings companies closer to the sources of
data. This benefits businesses by giving them better insights, good response time and better bandwidth.
32. What are the uses of APIs in cloud services?
APIs (Application Programming Interfaces) are used to eliminate the necessity to write complete
programs.
Here, instructions are provided to make communication between one or more applications.
Creation of applications is made easy and accessible for the link of cloud services with other systems.
33. Mention different data center deployments of Cloud Computing.
Cloud Computing consists of different data centers as follows:
Containerized data centers: Containerized data centers are the packages that contain a consistent set of
servers, network components, and storage delivered to large warehouse kind of facilities. Here, each
deployment is relatively unique.
Low-density data centers: Containerized data centers promote heavy density which in turn causes
much heat and significant engineering troubles. Low-density data centers are the solution to this
problem. Here, the equipment is established far apart so that it cools down the generated heat.
34. List down the three basic functioning clouds in Cloud Computing.
Professional cloud
Personal cloud
Performance cloud
35. What are the characteristics of cloud architecture that differ from traditional cloud architecture?
The characteristics are:
In cloud, the hardware requirement is fulfilled as per the demand created for cloud architecture.
Cloud architecture is capable of scaling up resources when there is a demand.
Cloud architecture is capable of managing and handling dynamic workloads without any point of failure.
36. What are the building blocks of cloud architecture?
Reference architecture
Technical architecture
Deployment operation architecture
37. Explain AWS.
AWS stands for Amazon Web Services which is a collection of remote computing services also known as Cloud
Computing. This technology is also known as IaaS or Infrastructure as a Service.
38. Mention the key components of AWS.
The key components of AWS are as follows:
AWS Route 53:
Simple E-mail Service:
Identity and Access Management:
Simple Storage Device (S3):
Elastic Compute Cloud (EC2
Elastic Block Stores (EBS):
CloudWatch:
39. Explain how you can vertically scale an Amazon instance.
This is one of the essential features of AWS and cloud virtualization. We spinup a newly developed large
instance where we pause that instance and detach the root EBS volume from the server and discard. Later, we
stop our live instance and detach its root volume connected. here, we note down the unique device ID and attach
the same root volume to the new server, and we restart it again. This results in a vertically scaled Amazon
instance.
40. Explain the security usage in the Amazon Web Services model.
AWS supports security groups.
Access is provided to create a security group for a jump box with SSH access only for port 22 open.
Later, a webserver group and a database group are created. The webserver group provides 80 and 443
from around the world, but only port 22 will be vital among the jump box group. The database group
allows port 3306 from the webserver group and port 22 from the jump box group. The addition of any
machines to the webserver group can store in the database. No one can directly SSH to any of our boxes.
41. What are reasons that make Amazon so big?
In Amazon, the backup storage of EBS volumes is maintained by inserting the snapshot facility via an
API call or via a GUI interface like Elasticfox.
Performance is improved by using Linux software RAID and striping across four volumes.
Hope that you will find these interviews questions for the role of Cloud Engineer useful. Do let us know in the
comments section below!
42. How does Resource Replication take place in Cloud Computing?
Resource Replication creates duplicates of the same resource. Replication is employed when a resource is
needed more and more. The resource is virtualized to replicate cloud-based resources.
43. What is Containers as a Service (CaaS)?
CaaS is a system that allows developers to run, scale, manage, upload, and organize containers by using
virtualization.
A container is a software pack. It allows teams to scale their apps to highly available cloud infrastructures.
Hope that you will find these interview questions for the role of Cloud Engineer useful. Do let us know in the
comments section below!
1. What are the various available cloud service models?
IAAS - IaaS rents hardware/infrastructure as a service to enterprises - for example, memory, computing,
servers. Organisations deploy their applications on Cloud Providers infrastructure.
SAAS - SaaS offers users software as a service that resides on the cloud. Software and applications are used on
a subscription basis. Cloud providers are responsible for the maintenance and upgrade of the software.
Communication with Applications happens over API calls advised by the Cloud provider—for example, Google
Drive.
PAAS - PaaS provides enterprises with a platform where they could deploy their code and applications. PaaS
packages the platform for development and testing along with data, storage, and computing capability.
2. What are the component layers found in Cloud architecture?
Cloud Controller (CLC) - CLC sits at the topmost layer and controls virtual resources like servers, networks,
and storage.
Walrus - It acts as a storage controller for users and deals with virtual machine images and user data.
Cluster Controller - It controls the execution of all the virtual machines stored on the nodes.
Storage Controller - Storage controller handles storage in block form that is dynamically attached to virtual
machines
The Node Controller - It controls the functionality of the hypervisor that controls VM activities. The
hypervisor is a hardware-supported emulation technique that allows multiple OS to run on the same host OS.
also called virtual machine manager.
3. What are some popular use cases for cloud computing?
Cloud storage - Storage over the internet through a web interface turned out to be a boon. With the
advent of cloud storage, customers could only pay for the storage they used. From Google Drive to more
privately operated proprietary applications, cloud storage is everywhere.
Big data analytics - Big data and Cloud technologies go hand in hand and essentially make systems
faster, scalable, failsafe, high-performance, and cheaper.
Test and Development - Cloud provides ready-to-use, customised, and fully set up resources. It offers
the infrastructure for the testing and development of applications and services without the downside of
installing and maintaining the on-premise resources, servers, and environment.
Disaster Recovery - Data recovery is cheaper and faster in Cloud Computing technology. Since a cloud
ideally stores the data on many different servers in different locations, the probability of complete data
loss reduces.
Data Backup - Data backup is more effortless and comes with security and availability of resources.
Older backup strategies had loopholes with the physical disc getting corrupted or running out of stock.
4. What is On-Demand functionality?
Cloud consists of a shared pool of resources and systems. The resources lent to the customer can be changed on
customers’ demand. On-Demand design saves customer’s overhead and provides easy scalability.
Raster graphics are consist of pixels Vector graphics are consist of paths
Raster image pixels do not include their appearance as to size Vector image do retain appearance regardless of
increases estimate.
Arithmetic DDA algorithm uses floating point, i.e., Bresenhams algorithm uses fixed point, i.e., Integer
Real Arithmetic's. Arithmetic's.
Operations DDA algorithms uses multiplication and Bresenhams algorithm use only subtraction and addition in
division in its operation. its operations.
Speed DDA algorithm is slowly than Bresenhams algorithm is faster than the DDA algorithm
Bresenham's algorithm inline drawing inline drawing because it performs only addition and
because it uses real arithmetic (floating- subtractions in its calculation and uses only integer
point methods). arithmetic, so it runs significantly fast.
Accuracy & DDA algorithms is not as accurate and Bresenham's algorithm is much accurate than the DDA
Efficiency efficient as Bresenham's algorithm. algorithms.
Drawing DDA algorithm can draw circle and Bresenhams algorithm can draw circle and curves with
curves, but which is not as accurate as much more accuracy than DDA Algorithm.
Bresenhams
Expensive DDA algorithm uses an excessive Bresenhams algorithm is less costly than the DDA
number of floating-point multiplications, algorithm as it uses only addition and subtraction.
so it is costly.
A color model described with the primary colors cyan, The HSV model uses color descriptors that have a more
magenta, and yellow (CMY) is useful for defining natural appeal to the user. Color function in this model is hue
color output to hard-copy devices. (H), saturation (S) and value(V).
Hard-copy devices such as plotters produce a Color To give color specification, a user selects a spectral color and
image by coating a paper with color pigments. the amounts of black and white that are to be added to obtain
different shades, tints, and tones.
#Wireless
1. wireless
refers to a computer network that makes use of Radio Frequency (RF) connections between nodes in the
network
2. Wifi
Wi-Fi, often referred to as WiFi, wifi, wi-fi or wi fi, is often thought to be short for Wireless Fidelity and the
organization that paid for the marketing firm is sometimes referred to as the Wireless Fidelity Alliance Inc.
3. Bluttoth
Bluetooth, technology standard used to enable short-range wireless communication between electronic devices.
4. Zigbee technology
Zigbee is a standards-based wireless technology developed to enable low-cost, low-power wireless machine-to-
machine (M2M) and internet of things (IoT) networks.Zigbee is for low-data rate, low-power applications and
is an open standard
5. Multiplexer
Multiplexing is a technique used to combine and send the multiple data streams over a single medium. The
process of combining the data streams is known as multiplexing and hardware used for multiplexing is known
as a multiplexer.