COMPLETE OS - Merged
COMPLETE OS - Merged
BASIC
OPERATING SYSTEM
500 + QUESTIONS
DAY - 1
Most Important Operating System Question ( Mission Bihar STET 2023 )
THANK YOU
Most Important Operating System Question ( Mission Bihar STET 2023 )
THANK YOU
Most Important Operating System Question ( Mission Bihar STET 2023 )
TOPIC
TYPES OF
OPERATION SYSTEM
Most Important Operating System Question ( Mission Bihar STET 2023 )
d) None
Most Important Operating System Question ( Mission Bihar STET 2023 )
d) None
Most Important Operating System Question ( Mission Bihar STET 2023 )
THANK YOU
Most Important Operating System Question ( Mission Bihar STET 2023 )
TOPIC
PROCESS
Most Important Operating System Question ( Mission Bihar STET 2023 )
Most Important Operating System Question ( Mission Bihar STET 2023 )
THANK YOU
Most Important Operating System Question ( Mission Bihar STET 2023 )
TOPIC
PROCESS SCHEDULER
Most Important Operating System Question ( Mission Bihar STET 2023 )
PROCESS SCHEDULER
Long Term or job scheduler:
It brings the new process to the ‘Ready State’. It controls the Degree of Multi-
programming, i.e., the number of processes present in a ready state at any point in time
Medium-term scheduler:
It is responsible for suspending and resuming the process. It mainly does swapping
(moving processes from main memory to disk and vice versa).
It reduces the degree of multiprogramming.
Most Important Operating System Question ( Mission Bihar STET 2023 )
Most Important Operating System Question ( Mission Bihar STET 2023 )
THANK YOU
Most Important Operating System Question ( Mission Bihar STET 2023 )
Difference Between
Multiprogramming And Multitasking
Important
Most Topic System
Important Operating ( Mission Bihar
Question STET
( Mission 2023
Bihar STET)2023 )
Multiprogramming Multitasking
▪ The process resides in the ▪ The process resides in the same CPU.
main memory. ▪ Multitasking follows the concept of
Topic
CPU Scheduling Algorithm
Most Important Operating System Question ( Mission Bihar STET 2023 )
Turn Around Time: Time Difference between completion time and arrival time.
Waiting Time(W.T): Time Difference between turn around time and burst time.
FCFS
▪ The process which arrives first in the ready queue is firstly assigned the CPU.
▪ In case of a tie, process with smaller process id is executed first.
▪ It is always non-preemptive in nature.
▪ It does not consider the priority or burst time of the processes.
▪ It suffers from convoy effect.
In convoy effect,
•Consider processes with higher burst time arrived before the processes with
smaller burst time.
•Then, smaller processes have to wait for a long time for longer processes to
release the CPU.
Most Important Operating System Question ( Mission Bihar STET 2023 )
Most Important Operating System Question ( Mission Bihar STET 2023 )
A
Most Important Operating System Question ( Mission Bihar STET 2023 )
Most Important Operating System Question ( Mission Bihar STET 2023 )
THANK YOU
Most Important Operating System Question ( Mission Bihar STET 2023 )
Topic
CPU Scheduling Algorithm
Most Important Operating System Question ( Mission Bihar STET 2023 )
THANK YOU
Most Important Operating System Question ( Mission Bihar STET 2023 )
Topic
CPU Scheduling Algorithm
Most Important Operating System Question ( Mission Bihar STET 2023 )
Advantages-
▪ No process can complete until the longest job also reaches its completion.
▪ All the processes approximately finishes at the same time.
Disadvantages-
▪ The waiting time is high.
▪ Processes with smaller burst time may starve for CPU.
Most Important Operating System Question ( Mission Bihar STET 2023 )
Most Important Operating System Question ( Mission Bihar STET 2023 )
Most Important Operating System Question ( Mission Bihar STET 2023 )
Most Important Operating System Question ( Mission Bihar STET 2023 )
Most Important Operating System Question ( Mission Bihar STET 2023 )
THANK YOU
Most Important Operating System Question ( Mission Bihar STET 2023 )
Topic
CPU Scheduling Algorithm
Most Important Operating System Question ( Mission Bihar STET 2023 )
Important Notes
In Priority Scheduling,
▪ Out of all the available processes, CPU is assigned to the process having the highest
priority.
▪ In case of a tie, it is broken by FCFS Scheduling.
▪ Priority Scheduling can be used in both preemptive and non-preemptive mode.
Advantages-
▪ It considers the priority of the processes and allows the important processes to run
first.
▪ Priority scheduling in preemptive mode is best suited for real time operating system.
Disadvantages-
▪ Processes with lesser priority may starve for CPU.
▪ There is no idea of response time and waiting time.
Most Important Operating System Question ( Mission Bihar STET 2023 )
Most Important Operating System Question ( Mission Bihar STET 2023 )
Most Important Operating System Question ( Mission Bihar STET 2023 )
Most Important Operating System Question ( Mission Bihar STET 2023 )
THANK YOU
Most Important Operating System Question ( Mission Bihar STET 2023 )
Topic
CPU Scheduling Algorithm
Most Important Operating System Question ( Mission Bihar STET 2023 )
Important Notes
▪ CPU is assigned to the process on the basis of FCFS for a fixed amount of time.
▪ This fixed amount of time is called as time quantum or time slice.
▪ After the time quantum expires, the running process is preempted and sent to the ready queue.
▪ Then, the processor is assigned to the next arrived process.
▪ It is always preemptive in nature.
Advantages-
Disadvantages-
▪ It leads to starvation for processes with larger burst time as they have to repeat the cycle many times.
▪ Its performance heavily depends on time quantum.
▪ Priorities can not be set for the processes.
Most Important Operating System Question ( Mission Bihar STET 2023 )
Important Notes-
Note-01:
With decreasing value of time quantum,
▪ Number of context switch increases
▪ Response time decreases
▪ Chances of starvation decreases
Note-02:
▪ FUNDAMENTALS
PREVIOUS YEAR QUESTION ANALYSIS
▪ NUMBER SYSTEM
KVS, NVS, DSSSB, NET, GATE
▪ DIGITAL LOGIC
▪ PROGRAMMING (PYTHON)
▪ EMERGING TRENDS
▪ OPERATING SYSTEM
▪ NETWORKING
▪ COMPUTER ARCHITECTURE
▪ DBMS
Most Important Operating System Question ( Mission Bihar STET 2023 )
TOPIC
Inter - process Communication /
Process Synchronization
Most Important Operating System Question ( Mission Bihar STET 2023 )
THANK YOU
Most Important Operating System Question ( Mission Bihar STET 2023 )
▪ FUNDAMENTALS
PREVIOUS YEAR QUESTION ANALYSIS
▪ NUMBER SYSTEM
KVS, NVS, DSSSB, NET, GATE
▪ DIGITAL LOGIC
▪ PROGRAMMING (PYTHON)
▪ EMERGING TRENDS
▪ OPERATING SYSTEM
▪ NETWORKING
▪ COMPUTER ARCHITECTURE
▪ DBMS
Most Important Operating System Question ( Mission Bihar STET 2023 )
TOPIC :- DEADLOCK
Most Important Operating System Question ( Mission Bihar STET 2023 )
▪ A deadlock is a situation where a set of processes are blocked because
each process is holding a resource and waiting for another resource
acquired by some other process.
THANK YOU
Most Important Operating System Question ( Mission Bihar STET 2023 )
▪ FUNDAMENTALS
PREVIOUS YEAR QUESTION ANALYSIS
▪ NUMBER SYSTEM
KVS, NVS, DSSSB, NET, GATE
▪ DIGITAL LOGIC
▪ PROGRAMMING (PYTHON)
▪ EMERGING TRENDS
▪ OPERATING SYSTEM
▪ NETWORKING
▪ COMPUTER ARCHITECTURE
▪ DBMS
Most Important Operating System Question ( Mission Bihar STET 2023 )
TOPIC
BANKERS’S ALGORITHM
Most Important Operating System Question ( Mission Bihar STET 2023 )
State 1 Process p1 p2 p3
device Allocation 2 3 4
State 2 processes p1 p2 p3
Device allocated 0 2 4
THANK YOU
Most Important Operating System Question ( Mission Bihar STET 2023 )
▪ FUNDAMENTALS
PREVIOUS YEAR QUESTION ANALYSIS
▪ NUMBER SYSTEM
KVS, NVS, DSSSB, NET, GATE
▪ DIGITAL LOGIC
▪ PROGRAMMING (PYTHON)
▪ EMERGING TRENDS
▪ OPERATING SYSTEM
▪ NETWORKING
▪ COMPUTER ARCHITECTURE
▪ DBMS
Most Important Operating System Question ( Mission Bihar STET 2023 )
TOPIC
Resource Aloocation graph
Most Important Operating System Question ( Mission Bihar STET 2023 )
In a Resource Allocation Graph where all the resources are NOT single
instance,
▪ If a cycle is being formed, then system may be in a deadlock state.
▪ Banker’s Algorithm is applied to confirm whether system is in a
deadlock state or not.
▪ If no cycle is being formed, then system is not in a deadlock state.
▪ Presence of a cycle is a necessary but not a sufficient condition for
the occurrence of deadlock.
Most Important Operating System Question ( Mission Bihar STET 2023 )
Most Important Operating System Question ( Mission Bihar STET 2023 )
Most Important Operating System Question ( Mission Bihar STET 2023 )
Most Important Operating System Question ( Mission Bihar STET 2023 )
Most Important Operating System Question ( Mission Bihar STET 2023 )
Most Important Operating System Question ( Mission Bihar STET 2023 )
THANK YOU
Most Important Operating System Question ( Mission Bihar STET 2023 )
▪ FUNDAMENTALS
PREVIOUS YEAR QUESTION ANALYSIS
▪ NUMBER SYSTEM
KVS, NVS, DSSSB, NET, GATE
▪ DIGITAL LOGIC
▪ PROGRAMMING (PYTHON)
▪ EMERGING TRENDS
▪ OPERATING SYSTEM
▪ NETWORKING
▪ COMPUTER ARCHITECTURE
▪ DBMS
Most Important Operating System Question ( Mission Bihar STET 2023 )
TOPIC :-
Contiguous memory allocation
Most Important Operating System Question ( Mission Bihar STET 2023 )
There are two popular techniques used for contiguous memory allocation-
▪ Static Partitioning
▪ Dynamic Partitioning
Most Important Operating System Question ( Mission Bihar STET 2023 )
Internal Fragmentation
▪ It occurs when the space is left inside the partition after
allocating the partition to a process.
▪ This space is called as internally fragmented space.
▪ This space can not be allocated to any other process.
▪ This is because only static partitioning allows to store only
one process in each partition.
▪ Internal Fragmentation occurs only in static partitioning.
Most Important Operating System Question ( Mission Bihar STET 2023 )
External Fragmentation
▪ It occurs when the total amount of empty
space required to store the process is
available in the main memory.
▪ But because the space is not contiguous, so
the process can not be stored.
Most Important Operating System Question ( Mission Bihar STET 2023 )
Most Important Operating System Question ( Mission Bihar STET 2023 )
Most Important Operating System Question ( Mission Bihar STET 2023 )
Most Important Operating System Question ( Mission Bihar STET 2023 )
Most Important Operating System Question ( Mission Bihar STET 2023 )
THANK YOU
Most Important Operating System Question ( Mission Bihar STET 2023 )
▪ FUNDAMENTALS
PREVIOUS YEAR QUESTION ANALYSIS
▪ NUMBER SYSTEM
KVS, NVS, DSSSB, NET, GATE
▪ DIGITAL LOGIC
▪ PROGRAMMING (PYTHON)
▪ EMERGING TRENDS
▪ OPERATING SYSTEM
▪ NETWORKING
▪ COMPUTER ARCHITECTURE
▪ DBMS
Most Important Operating System Question ( Mission Bihar STET 2023 )
TOPIC :-
Non-contiguous memory allocation
( Paging )
Most Important Operating System Question ( Mission Bihar STET 2023 )
▪ Non-contiguous memory allocation is a memory allocation technique.
▪ It allows to store parts of a single process in a non-contiguous fashion.
▪ Thus, different parts of the same process can be stored at different places in the main memory.
There are two popular techniques used for non-contiguous memory allocation-
1. Paging
2. Segmentation
Paging
▪ Paging is a fixed size partitioning scheme.
▪ In paging, secondary memory and main memory are divided into equal fixed size partitions.
▪ The partitions of secondary memory are called as pages.
▪ The partitions of main memory are called as frames.
▪ The size of the last part may be less than the page size.
Most Important Operating System Question ( Mission Bihar STET 2023 )
▪ CPU always generates a logical address.
▪ A physical address is needed to access the main memory.
The first fit, best fit and worst fit are strategies to select a ______
a) process from a queue to put in memory
b) processor to run the next process
c) free hole from a set of available holes
d) all of the mentioned
Most Important Operating System Question ( Mission Bihar STET 2023 )
Thank you
Most Important Operating System Question ( Mission Bihar STET 2023 )
▪ FUNDAMENTALS
PREVIOUS YEAR QUESTION ANALYSIS
▪ NUMBER SYSTEM
KVS, NVS, DSSSB, NET, GATE
▪ DIGITAL LOGIC
▪ PROGRAMMING (PYTHON)
▪ EMERGING TRENDS
▪ OPERATING SYSTEM
▪ NETWORKING
▪ COMPUTER ARCHITECTURE
▪ DBMS
Most Important Operating System Question ( Mission Bihar STET 2023 )
TOPIC :-
PAGE REPLACEMENT ALGORITHM
Most Important Operating System Question ( Mission Bihar STET 2023 )
▪ Page replacement is a process of swapping out an existing page from the frame
of a main memory and replacing it with the required page.
▪ Page replacement algorithms help to decide which page must be swapped out
from the main memory to create a room for the incoming page.
▪ Thus, a page has to be replaced to create a room for the required page.
Most Important Operating System Question ( Mission Bihar STET 2023 )
▪ It replaces the page that has not been referred by the CPU for
the longest time.
Most Important Operating System Question ( Mission Bihar STET 2023 )
▪ This is because the pages that will not be used in future for
the longest time can not be predicted.
Most Important Operating System Question ( Mission Bihar STET 2023 )
THANK YOU
Most Important Operating System Question ( Mission Bihar STET 2023 )
▪ FUNDAMENTALS
PREVIOUS YEAR QUESTION ANALYSIS
▪ NUMBER SYSTEM
KVS, NVS, DSSSB, NET, GATE
▪ DIGITAL LOGIC
▪ PROGRAMMING (PYTHON)
▪ EMERGING TRENDS
▪ OPERATING SYSTEM
▪ NETWORKING
▪ COMPUTER ARCHITECTURE
▪ DBMS
Most Important Operating System Question ( Mission Bihar STET 2023 )
TOPIC :-
Disk Scheduling Algorithm
Most Important Operating System Question ( Mission Bihar STET 2023 )
1.FCFS Algorithm
2.SSTF Algorithm
3.SCAN Algorithm
4.C-SCAN Algorithm
5.LOOK Algorithm
6.C-LOOK Algorithm
Most Important Operating System Question ( Mission Bihar STET 2023 )
Consider a disk queue with requests for I/O to blocks on cylinders 98, 183, 41,
122, 14, 124, 65, 67. The FCFS scheduling algorithm is used. The head is
initially at cylinder number 53. The cylinders are numbered from 0 to 199. The
total head movement (in number of cylinders) incurred while servicing these
requests is _______.
Most Important Operating System Question ( Mission Bihar STET 2023 )
Consider a disk queue with requests for I/O to blocks on cylinders 98, 183, 41,
122, 14, 124, 65, 67. The SSTF scheduling algorithm is used. The head is
initially at cylinder number 53 moving towards larger cylinder numbers on its
servicing pass. The cylinders are numbered from 0 to 199. The total head
movement (in number of cylinders) incurred while servicing these requests is
_______.
Most Important Operating System Question ( Mission Bihar STET 2023 )
Consider a disk system with 100 cylinders. The requests to access the cylinders
occur in following sequence-
4, 34, 10, 7, 19, 73, 2, 15, 6, 20
Assuming that the head is currently at cylinder 50, what is the time taken to
satisfy all requests if it takes 1 ms to move from one cylinder to adjacent one
and shortest seek time first policy is used?
1.95 ms
2.119 ms
3.233 ms
4.276 ms
Most Important Operating System Question ( Mission Bihar STET 2023 )
Consider a disk queue with requests for I/O to blocks on cylinders 98, 183, 41,
122, 14, 124, 65, 67. The SCAN scheduling algorithm is used. The head is
initially at cylinder number 53 moving towards larger cylinder numbers on its
servicing pass. The cylinders are numbered from 0 to 199. The total head
movement (in number of cylinders) incurred while servicing these requests is
_______.
Most Important Operating System Question ( Mission Bihar STET 2023 )
Consider a disk queue with requests for I/O to blocks on cylinders 98, 183, 41,
122, 14, 124, 65, 67. The C-SCAN scheduling algorithm is used. The head is
initially at cylinder number 53 moving towards larger cylinder numbers on its
servicing pass. The cylinders are numbered from 0 to 199. The total head
movement (in number of cylinders) incurred while servicing these requests is
_______.
Most Important Operating System Question ( Mission Bihar STET 2023 )
Consider a disk queue with requests for I/O to blocks on cylinders 98, 183, 41,
122, 14, 124, 65, 67. The LOOK scheduling algorithm is used. The head is
initially at cylinder number 53 moving towards larger cylinder numbers on its
servicing pass. The cylinders are numbered from 0 to 199. The total head
movement (in number of cylinders) incurred while servicing these requests is
_______.
Most Important Operating System Question ( Mission Bihar STET 2023 )
Consider a disk queue with requests for I/O to blocks on cylinders 47, 38, 121,
191, 87, 11, 92, 10. The C-LOOK scheduling algorithm is used. The head is
initially at cylinder number 63 moving towards larger cylinder numbers on its
servicing pass. The cylinders are numbered from 0 to 199. The total head
movement (in number of cylinders) incurred while servicing these requests is
_______.
Most Important Operating System Question ( Mission Bihar STET 2023 )
Thank you
WELCOME TO OUR CHANNEL
INSIGHT CS - IT
NETWORKING
Basic Computer Network
Basic Terminology
SYLLABUS
Network Devices
- I T
Data Transmission
▪
▪
Network
Internet ▪ Server
C S Mode
▪
▪
Intranet
Extranet
H T
▪ Router
▪ Switch
▪ SIMPLEX MODE
▪
▪
Node
Port
S I G
▪ Bridge
▪ Half Duplex
▪ Full Duplex
N
▪ Repeater
▪
▪
▪ I
Protocol
IP Address
MAC Address
▪ Hub
▪ Firewall
Basic Computer Network
SYLLABUS
- IT
Types Of Network
T C
▪ Bus S
Network Topology OSI Model
1. Application layer
▪
▪
WAN
S
MAN
▪ Ring 3. Session layer
▪
▪
IN
LAN
PAN
▪ Mesh
▪ Hybrid
4.Transport layer
5. Network layer
6. Data link layer
7. Physical layer
Basic Computer Network
T
Basic Terminology
Network :-
S - I
T C
A network is a collection of two or multiple connected
computer systems that may share resources.
H
S I G
I N
Basic Computer Network
T
Basic Elements Of a Communication System
S - I
C
▪ Sender: Creates and sends a message
▪ Medium: Carriers a message
G H T
I
▪ Receiver: Receives a message
I N S
Basic Computer Network
Internet
- IT
S
The Internet, sometimes called simply "the Net," is a
H T C
worldwide system of computer networks - a network
of networks in which users at any one computer can,
I G
if they have permission, get information from any
S
I N
other computer
Basic Computer Network
Intranet
- I T
CS
An intranet is a private network contained within an
T
enterprise that is used to securely share company
IGH
information and computing resources among
INS
employees. An intranet can also be used for working in
groups and teleconferences
Basic Computer Network
Extranet
- IT
C S
An extranet is a private network similar to an intranet, but
T
typically open to external parties, such as business partners,
G H
suppliers, key customers, etc. The main purpose of an
I
S
extranet is to allow users to exchange data and applications,
I N
and share information.
Basic Computer Network
IT
Internet Intranet Extranet
-
• Private • Private
S
• Public • It is derived from Internet. • It is derived from Intranet.
C
• It is the network of networks. • Specific to an organization. • To share information with
T
• Global system. • Restricted area upto an
H
suppliers and vendors it makes
G
• All over the world. organization. the use of public network.
S I
• It is accessible to everyone • It is accessible only to the • Restricted area upto an
N
connected. members of organization. organization and some of its
I
• It’s purpose is to share • It’s purpose is to share stakeholders or so.
information throughout the information throughout the • It’s purpose is to share
world. organization. information between members
and external, members.
Basic Computer Network
T
Node :-
- I
Nodes are devices that are connected to a network. These can include
S
computers, servers, printers, routers, switches, and other devices.
Port :-
T C
IGH
A port is a physical docking point using which an external device can be
S
connected to the computer.
IN
Protocols :-
A protocol is a set of rules and standards that govern how data is
transmitted over a network. Examples of protocols include TCP/IP, HTTP,
and FTP.
Basic Computer Network
MAC Address
T
IP Address
▪ Layer 2 address
-
▪ Layer 3 address
S I
C
▪ Can not be changed ▪ Can be changed at any time
▪ Also called Physical Address
I
▪ 12 digits grouped into six pairs ▪ 32 bits, grouped into four decimal
IN S
separated by hyphens
▪ Ex:- 00-00-00-00-00-00
numbers
▪ Ex:- 000.000.000.000
Basic Computer Network
T
Network Devices
- I
Server :- A server is a computer program or device that provides a service to
S
C
another computer program.
HT
Router :- The router is a physical or virtual internetworking device that is designed
G
I
to receive, analyze, and forward data packets between computer networks.
INS
Switch :- A network switch connects devices in a network to each other, enabling
them to talk by exchanging data packets.
Basic Computer Network
T
Bridge :- A bridge is a network device that connects multiple subnetworks to create a
single network.
S - I
Repeater :- A repeater is a dynamic network device used to reproduce the signals
equal.
T C
when they transmit over a greater distance so that the signal's strength remains
IGH
Hub :- A network hub is a node that broadcasts data to every computer or Ethernet-
S
based device connected to it.
IN
Firewall :- A firewall is a security device that is used to monitor and control incoming
and outgoing network traffic. Firewalls are used to protect networks from
unauthorized access and other security threats.
Basic Computer Network
T
Data Transmission Mode
SIMPLEX MODE
S - I
T C
It is a mode of transmission in which the flow of data is
H
I G
unidirectional. It means that the participant can do only
N S
one task at a time in a single direction. The receiver can
I
only receive data and not send it (and vice versa)
EX :- The keyboard, Television, Mouse,
Basic Computer Network
T
Data Transmission Mode
S - I
C
HALF DUPLEX
G H T
It is a mode of transmission in which the flow of
I
data is bi-directional but only in one direction at a
time.
IN S
EX :- A Walkie-talkie set
Basic Computer Network
T
Data Transmission Mode
S - I
H T C
FULL DUPLEX
It is a mode of transmission in which the flow of data is
S I G
bi-directional. The devices can send as well as receive
I N
data simultaneously at the same time.
EX :- Telephone lines, Mobile phones are commendable
Basic Computer Network
Types Of Network
▪ WAN :-
- IT
▪ MAN
T CS
▪ LAN
I G H
▪ PAN
I N S
Basic Computer Network
Types Of Network
- IT
C S
•A Wide Area Network is a network that extends over a large
T
geographical area such as states or countries.
G H
•The internet is one of the biggest WAN in the world.
I
S
•A Wide Area Network is widely used in the field of Business,
I N
government, and education.
Basic Computer Network
Types Of Network
MAN (Metropolitan Area Network)
- IT
S
•A metropolitan area network is a network that covers a larger geographic
H T C
area by interconnecting a different LAN to form a larger network.
•Government agencies use MAN to connect to the citizens and private
I G
industries.
I
exchange line.
S
•In MAN, various LANs are connected to each other through a telephone
N
•It has a higher range than Local Area Network(LAN).
Basic Computer Network
Types Of Network
LAN(Local Area Network)
- IT
S
•Local Area Network is a group of computers connected to each other in a
small area such as building, office.
H T C
•It is less costly as it is built with inexpensive hardware such as hubs, network
I G
adapters, and ethernet cables.
I N S
•The data is transferred at an extremely faster rate in Local Area Network.
•Local Area Network provides higher security.
Basic Computer Network
Types Of Network
- IT
S
PAN ( Personal Area Network )
C
•Personal Area Network is a network arranged within an individual
H T
person, typically within a range of 10 meters.
G
•Personal computer devices that are used to develop the personal
S I
area network are the laptop, mobile phones, media player and
N
I
play stations.
Basic Computer Network
Network Topology
- I T
S
▪ Bus
▪ Star
T C
▪ Ring
IGH
S
▪ Mesh
▪ Hybrid
IN
Basic Computer Network
Network Topology
Bus Topology :-
- I T
S
•The bus topology is designed in such a way that all the
C
stations are connected through a single cable known as a
T
backbone cable.
IGH
•When a node wants to send a message over the network,
S
it puts a message over the network. All the stations
IN
available in the network will receive the message whether
it has been addressed or not.
- I T
CS
•Ring topology is like a bus topology, but with connected ends.
•The node that receives the message from the previous computer
T
H
will retransmit to the next node.
G
•The data flows in one direction, i.e., it is unidirectional.
SI
•It has no terminated ends, i.e., each node is connected to other
IN
node and having no termination point.
•The data in a ring topology flow in a clockwise direction.
Basic Computer Network
Network Topology
Star Topology :-
- I T
S
•Star topology is an arrangement of the network in which
C
every node is connected to the central hub, switch or a central
computer.
T
IGH
•The central computer is known as a server, and the
INS
peripheral devices attached to the server are known
as clients.
- I T
CS
•Mesh technology is an arrangement of the network in which
T
computers are interconnected with each other through
H
various redundant connections.
IG
•There are multiple paths from one computer to another
computer.
INS
Basic Computer Network
Network Topology
Hybrid Topology :-
- I T
CS
•The combination of various different topologies
T
H
is known as Hybrid topology.
SIG
•A Hybrid topology is a connection between
IN
different links and nodes to transfer the data.
Basic Computer Network
OSI Model
1.Application layer
- IT
2. Presentation layer
3. Session layer
T CS
I G
4.Transport layer
H
I S
5. Network layer
N
6. Data link layer
7. Physical layer
THANK YOU
DO LIKE, COMMENT, SHARE And SUBSCRIBE
Most Important Question Of Data Base Management System ( Mission Bihar STET 2023 )
What is DBMS?
a) DBMS is a collection of queries
b) DBMS is a high-level language
c) DBMS is a programming language
d) DBMS stores, modifies and retrieves data
Most Important Question Of Data Base Management System ( Mission Bihar STET 2023 )
THANK YOU
Most Important Question Of Data Base Management System ( Mission Bihar STET 2023 )
▪ FUNDAMENTALS
PREVIOUS YEAR QUESTION ANALYSIS
▪ NUMBER SYSTEM
KVS, NVS, DSSSB, NET, GATE
▪ DIGITAL LOGIC
▪ PROGRAMMING (PYTHON)
▪ EMERGING TRENDS
▪ OPERATING SYSTEM
▪ NETWORKING
▪ COMPUTER ARCHITECTURE
▪ DBMS
Most Important Question Of Data Base Management System ( Mission Bihar STET 2023 )
TOPIC :- E R MODEL
Most Important Question Of Data Base Management System ( Mission Bihar STET 2023 )
THANK YOU
Most Important Question Of Data Base Management System ( Mission Bihar STET 2023 )
▪ FUNDAMENTALS
PREVIOUS YEAR QUESTION ANALYSIS
▪ NUMBER SYSTEM
KVS, NVS, DSSSB, NET, GATE
▪ DIGITAL LOGIC
▪ PROGRAMMING (PYTHON)
▪ EMERGING TRENDS
▪ OPERATING SYSTEM
▪ NETWORKING
▪ COMPUTER ARCHITECTURE
▪ DBMS
Most Important Question Of Data Base Management System ( Mission Bihar STET 2023 )
TOPIC
Functional Dependency
Most Important Question Of Data Base Management System ( Mission Bihar STET 2023 )
Most Important Question Of Data Base Management System ( Mission Bihar STET 2023 )
THANK YOU
Most Important Question Of Data Base Management System ( Mission Bihar STET 2023 )
▪ FUNDAMENTALS
PREVIOUS YEAR QUESTION ANALYSIS
▪ NUMBER SYSTEM
KVS, NVS, DSSSB, NET, GATE
▪ DIGITAL LOGIC
▪ PROGRAMMING (PYTHON)
▪ EMERGING TRENDS
▪ OPERATING SYSTEM
▪ NETWORKING
▪ COMPUTER ARCHITECTURE
▪ DBMS
Most Important Question Of Data Base Management System ( Mission Bihar STET 2023 )
TOPIC :- keys
Most Important Question Of Data Base Management System ( Mission Bihar STET 2023 )
Keys
▪ Keys play an important role in the relational database.
▪ It is used to uniquely identify any record or row of data from
the table. It is also used to establish and identify relationships
between tables.
Types Of Keys :
▪ Candidate Key ▪ Alternate Key
▪ Primary Key ▪ Composite Key
▪ Super Key
Most Important Question Of Data Base Management System ( Mission Bihar STET 2023 )
Primary key
▪ It is the first key used to identify one and only one instance of an entity uniquely. An entity can
contain multiple keys, as we saw in the PERSON table. The key which is most suitable from
those lists becomes a primary key.
▪ In the EMPLOYEE table, ID can be the primary key since it is unique for each employee. In the
EMPLOYEE table, we can even select License_Number and Passport_Number as primary keys
since they are also unique.
▪ For each entity, the primary key selection is based on requirements and developers.
Most Important Question Of Data Base Management System ( Mission Bihar STET 2023 )
Candidate key
▪ A candidate key is an attribute or set of attributes that can uniquely identify a tuple.
▪ Except for the primary key, the remaining attributes are considered a candidate key. The
candidate keys are as strong as the primary key.
Super Key
▪ Super key is an attribute set that can uniquely identify a tuple. A super key is a superset of a
candidate key.
Foreign Key
▪ We use a foreign key to establish relationships between two available tables.
Composite key
▪ Whenever a primary key consists of more than one attribute, it is known as a composite key.
This key is also known as Concatenated Key.
Most Important Question Of Data Base Management System ( Mission Bihar STET 2023 )
THANK YOU
Most Important Question Of Data Base Management System ( Mission Bihar STET 2023 )
▪ FUNDAMENTALS
PREVIOUS YEAR QUESTION ANALYSIS
▪ NUMBER SYSTEM
KVS, NVS, DSSSB, NET, GATE
▪ DIGITAL LOGIC
▪ PROGRAMMING (PYTHON)
▪ EMERGING TRENDS
▪ OPERATING SYSTEM
▪ NETWORKING
▪ COMPUTER ARCHITECTURE
▪ DBMS
Most Important Question Of Data Base Management System ( Mission Bihar STET 2023 )
TOPIC :-
NORMALIZATION
Most Important Question Of Data Base Management System ( Mission Bihar STET 2023 )
What is Normalization?
▪ Normalization is the process of organizing the data in the database.
▪ Normalization is used to minimize the redundancy from a relation or set of relations. It is also
used to eliminate undesirable characteristics like Insertion, Update, and Deletion Anomalies.
▪ Normalization divides the larger table into smaller and links them using relationships.
▪ The normal form is used to reduce redundancy from the database table.
Let R1 (a, b, c) and R2 (x, y, z) be two relations in which a is the foreign key of
R1 that refers to the primary key of R2 . Consider following four options.
(a)Insert into R 1
(b)Insert into R 2
(c)Delete from R 1
(d)Delete from R 2
Which of the following is correct about the referential integrity constraint with
respect to above?
(A) Operations (a) and (b) will cause violation.
(B) Operations (b) and (c) will cause violation.
(C) Operations (c) and (d) will cause violation.
(D) Operations (d) and (a) will cause violation.
Most Important Question Of Data Base Management System ( Mission Bihar STET 2023 )
THANK YOU
Most Important Question Of Data Base Management System ( Mission Bihar STET 2023 )
TOPIC :-
NORMALIZATION
Most Important Question Of Data Base Management System ( Mission Bihar STET 2023 )
A BCNF is :
A. loss less join and dependency preserving
B. loss less join but not dependency preserving
C. not loss less join but dependency preserving
D. None of these
Most Important Question Of Data Base Management System ( Mission Bihar STET 2023 )
2NF relations are those that are in 1NF with all the
attribute types dependent on the ___ key.
a) Primary
b) Foreign
c) Composite
d) Alternate
Most Important Question Of Data Base Management System ( Mission Bihar STET 2023 )
THANK YOU
Most Important Question Of Data Base Management System ( Mission Bihar STET 2023 )
TOPIC :- SQL
Most Important Question Of Data Base Management System ( Mission Bihar STET 2023 )
e) D
Most Important Question Of Data Base Management System ( Mission Bihar STET 2023 )
THANK YOU
WELCOME To Our Channel
INSIGHT CS - IT
TOPIC
IP ADDRESS
8 8 8 8
Class - A
8 8 8 8
Class - B
8 8 8 8
Class - C
8 8 8 8
Class - D
8 8 8 8
Class - E
Class – D :- Reserved For Multitasking, Group Email, Broadcasting
Class – D :- No Concept of Network or Host bcz it is all about reserved
purpose ( Future) / Military purpose
What is the format of IP address?
a) 34 bit
b) 64 bit
c) 16 bit
d) 32 bit
Version 6 of IP address has how many
bits.
a) 64 bits
b) 128 bits
c) 32 bits
d) 256 bits
How many version /s of IP’s are there?
a) 4 versions
b) 3 versions
c) 2 versions
d) 1 version
Choose the address of class D is
(A) Unicast
(B) Reserved
(C) Multicast
(D) None of the above
Select the bits from where the class D
address starts.
(A)110
(B) 10
(c) 0
(D) 1111
Select the wrong class.
(A) CLASS A = 1 to 126
(B) CLASS C = 192 to 220
(C) CLASS B = 128 to 191
(D) CLASS D = 224 to 239
Select the bits from where the class A
address starts.
(A)110
(B) 10
(c) 0
(D) 1111
Select the bits from where the class B
address starts
(A) 0
(B) 110
(C) 10
(D) 1111
Select the bits from where the class C
address starts
(A) 0
(B) 10
(C) 110
(D) 1111
Select which one of these is not a class
of IP addresses.
(A) Class A
(B) Class F
(C) Class E
(D) Class B
Select the bits from where the class D
address starts
(A) 0
(B) 10
(C) 110
(d) 1110
Select the address of class A, B and C are
(A) Reserved
(B) Multicast
(C) Unicast
(D) None of the above
Select the size of Network bits and Host
bits of Class A of IP address.
(A) Network bits 7, Host bits 23
(B) Network bits 8, Host bits 24
(C) Network bits 7, Host bits 2
(D) Network bits 8, Host bits 23
Select from the following which one is
correct about Class B Address of IP
address.
(A) Network bit – 18, Host bit – 16
(B) Network bit – 16, Host bit – 16
(C) Network bit – 14, Host bit – 16
(D) Network bit – 12, Host bit – 14\
Select from the following which one is
correct about Class c Address of IP
address.
(A) Network bit – 18, Host bit – 16
(B) Network bit – 16, Host bit – 16
(C) Network bit – 24, Host bit – 8
(D) Network bit – 8, Host bit – 24
Select the uses of subnetting.
(A) It speeds up the speed of the network
(B) It divides the network into network classes
(C) It divides one large network into several smaller ones
(D) None of the above
Select from the following which
represents the last address of IP address.
(A) Unicast address
(B) Broadcast address
(C) Network address
(D) None of the above
Percent of addresses occupied by Class
A?
a) 50 %
b) 25 %
c) 6.25 %
d) 12.5 %
Which of the following address belongs
class A?
1.121.12.12.248
2.130.12.12.248
3.128.12.12.248
4.129.12.12.248
Which of the following is correct IPv4
address?
1.124.201.3.1.52
2.300.142.210.64
3.10110011.32.16.8
4.128.64.0.0
Which of the following IP addresses can
be used as (a) loop-back addresses?
1.0.0.0.0
2.127.0.0.1
3.255.255.255.255
4.0.255.255.255
In IP class – A address, the…….. Byte is
reserved for network ids.
a) Fourth
b) Second
c) Third
d) first
What is the Range Of logical IP Address
class A
a) 0 – 128
b) 1 – 127
c) 0 – 127
d) 1 - 128
What is the Range Of logical IP Address
class C
a) 192 – 222
b) 191 – 223
c) 192 - 223
d) 193- 228
Which of the following does not have a
Net ID and Host ID?
a) Class A
b) Class B
c) Class C
d) Class D
What is the Range Of logical IP Address
class B
a) 127 – 192
b) 128 – 192
c) 0 – 191
d) 128 - 191
Which Class is reserved for future use?
a) A
b) B
c) D
d) None of the Mentioned
Number of Blocks in class B are –
a) 27
b) 28
c) 214
d) 29
First Address is –
a) 180.8.0.0
b) 180.7.64.0
c) 180.8.1.256
d) 180.12.0.0
Select the bits from where the class A
address starts.
(A)110
(B) 10
(c) 0
(D) 1111
Last Address is –
a) 180.8.255.255. Percent of addresses
occupied by Class D?
a) 50 %
b) 180.8.255.0. b) 25 %
c) 6.25 %
d) 12.5 %
c) 180.12.0.255.
d) 180.9.255.255.
Percent of addresses occupied by
Class D?
a) 50 %
b) 25 %
c) 6.25 %
d) 12.5 %
Select the bits from where the class c
address starts.
(A)110
(B) 10
(c) 0
(D) 1111
Percent of addresses occupied by
Class C?
a) 50 %
b) 25 %
c) 6.25 %
d) 12.5 %
Select the bits from where the class D
address starts.
(A)110
(B) 10
(c) 0
(D) 1110
What is the Range Of logical IP Address
class E
a) 240 – 255
b) 223 – 255
c) 224 – 239
d) 240 - 236
Percent of addresses occupied by Class B?
a) 50 %
b) 25 %
c) 6.25 %
d) 12.5 %
What is the Range Of logical IP Address
class D
a) 224 – 234
b) 223 – 235
c) 224 – 239
d) 223 - 236
Select the bits from where the class B
address starts.
(A)110
(B) 10
(c) 0
(D) 1111
THANK YOU
Artificial Intelligence Question Practice ( Mission Bihar STET 2023 )
THANK YOU
Artificial Intelligence Question Practice ( Mission Bihar STET 2023 )
What is an AI ‘agent’?
a) Takes input from the surroundings and uses its
intelligence and performs the desired operations
b) An embedded program controlling line following robot
c) Perceives its environment through sensors and acting
upon that environment through actuators
d) All of the mentioned
Artificial Intelligence Question Practice ( Mission Bihar STET 2023 )
THANK YOU
Artificial Intelligence Question Practice ( Mission Bihar STET 2023 )
What is a proposition?
▪ A proposition is the basic building block of logic.
▪ It is defined as a declarative sentence that is either True or False, but not both.
▪ The Truth Value of a proposition is True(denoted as T) if it is a true statement,
and False(denoted as F) if it is a false statement. For Example –
▪ The sun rises in the East and sets in the West.
▪ 1+1=2
▪ 'b' is a vowel.
▪ Are you tired?
▪ What a bright sunny day!
Artificial Intelligence Question Practice ( Mission Bihar STET 2023 )
Types Of Propositions-
1. Atomic propositions
2. Compound propositions
Artificial Intelligence Question Practice ( Mission Bihar STET 2023 )
1. Atomic Propositions-
▪ Atomic propositions are those propositions that can not be divided further.
▪ Small letters like p, q, r, s etc are used to represent atomic propositions.
Examples-
Example-
If p : It is raining outside.
Then, Negation of p is-
∼p : It is not raining outside.
Artificial Intelligence Question Practice ( Mission Bihar STET 2023 )
2. Conjunction-
If p and q are two propositions, then conjunction of p and q is a
proposition which is-
▪ True when both p and q are true
▪ False when both p and q are false
Example-
f p and q are two propositions where-
▪ p:2+4=6
▪ q : It is raining outside.
Disjunction-
If p and q are two propositions, then disjunction of p and q is a proposition which is-
▪ True when either one of p or q or both are true
▪ False when both p and q are false
Example-
Conditional-
Examples-
▪ If a = b and b = c then a = c.
▪ If I will go to Australia, then I will earn more money.
Artificial Intelligence Question Practice ( Mission Bihar STET 2023 )
Biconditional-
Examples-
THANK YOU
Cloud Computing Question Practice ( Mission Bihar STET 2023 )
TOPIC
CLOUD COMPUTING
Cloud Computing Question Practice ( Mission Bihar STET 2023 )
Deployment Models
PUBLIC CLOUD
The Public Cloud allows systems and services to be easily accessible to the general public.
Public cloud may be less secure because of its openness, e.g., e-mail.
PRIVATE CLOUD
The Private Cloud allows systems and services to be accessible within an organization. It
offers increased security because of its private nature.
COMMUNITY CLOUD
The Community Cloud allows systems and services to be accessible by group of organizations.
HYBRID CLOUD
The Hybrid Cloud is mixture of public and private cloud. However, the critical activities are
performed using private cloud while the non-critical activities are performed using public
cloud.
Cloud Computing Question Practice ( Mission Bihar STET 2023 )
Service Models
QUESTION PRACTICE
Cloud Computing Question Practice ( Mission Bihar STET 2023 )
THANK YOU
BSTET COMPUTER SCIENCE TEACHER
Computer Science Paper (100 Marks) Complete Preparation
Unit - 1
INTERNET OF THINGS
By- Punam
2 Times UGC NET Qualified (Computer Science)
Internet Of Thing ( IOT )Question Practice ( Mission Bihar STET 2023 )
What is IoT?
a) network of physical objects embedded with sensors
b) network of virtual objects
c) network of objects in the ring structure
d) network of sensors
Internet Of Thing ( IOT )Question Practice ( Mission Bihar STET 2023 )
THANK YOU
BSTET COMPUTER SCIENCE TEACHER
Computer Science Paper (100 Marks) Complete Preparation
Unit - 1
By- Punam
2 Times UGC NET Qualified (Computer Science)
Syllabus
▪ Introduction; Alphabets, Strings and Languages; Automata and Grammars, Deterministic finite Automata (DFA)-Formal
Definition, Simplified notation: State transition graph, Transition table, Language of DFA, Non-deterministic finite
Automata (NFA), NFA with epsilon transition, Language of NFA, Equivalence of NFA and DFA, Minimization of Finite
Automata, Distinguishing one string from other.⚫
▪ Regular expression (RE), Definition, Operators of regular expression and their precedence, Algebraic laws for Regular
expressions, Kleen's Theorem, Regular expression to FA, DFA to Regular expression, Arden Theorem, Non Regular
Languages, Pumping Lemma for regular Languages. Application of Pumping Lemma, Closure properties of Regular
Languages, Decision properties of Regular Languages, FA with output: Moore and Mealy machine, Equivalence of
Moore and Mealy Machine, Applications and Limitation of FA.
▪ Context free grammar (CFG) and Context Free Languages (CFL): Definition, Examples, Derivation Derivation trees,
Ambiguity in Grammer, Inherent ambiguity, Ambiguous to Unambiguous CFG, Useless symbols, Simplification of CFGs,
Normal forms for CFGS: CNF and GNF, Closure properties of CFLs, Decision Properties of CFLs: Emptiness, Finiteness and
Membership, Pumping lemma for CFLs.
▪ Push Down Automata (PDA): Description and definition, Instantaneous Description, Language of PDA, Acceptance by
Final state, Acceptance by empty stack. Deterministic PDA, Equivalence of PDA and CFG, CFG to PDA and PDA to CFG,
Two stack PDA
▪ Turing machines (TM): Basic model, definition and representation, Instantaneous Description, Language acceptance by
TM, Variants of Turing Machine, TM as Computer of Integer functions, Universal TM, Church's Thesis, Recursive and
recursively enumerable languages, Halting problem, Introduction to Undecidability, Undecidable problems about TMs.
Post correspondence problem (PCP), Modified PCP, Introduction to recursive function theory
▪ Regular Language and Finite Automata
• Language
• Grammer
• Automata ( Machine )
Symbol
Symbols simply call it as a character.
It is an atomic unit, such as a digit, character, lowercase letter, etc.
Alphabet
The set of characters is called as the alphabet.
An alphabet is a finite, non-empty set of symbols. It is denoted by Σ or E.
String or Word
A string is a finite set sequence of symbols choose from some alphabets
Grammer
Grammar in theory of computation is a finite set of formal rules that are generating syntactically correct
sentences.
Example 1
Consider a grammar
G = (V , T , P , S)
Where,
V = { S , A , B } ⇒ Non-Terminal symbols T = { a , b } ⇒ Terminal symbols Production rules P = { S → ABa , A → BB ,
B → ab , AA → b } S = { S } ⇒ Start symbol
Automata
Automata theory is a branch of the theory of computation. It deals with the
study of abstract machines and their capacities for computation. An abstract
machine is called the automata.
Chomsky Hierarchy
BSTET COMPUTER SCIENCE TEACHER
Computer Science Paper (100 Marks) Complete Preparation
Unit - 1
By- Punam
2 Times UGC NET Qualified (Computer Science)
QUESTION PRACTICE..
Which of the following automatons is the most powerful?
1.Finite Automaton
2.Pushdown Automaton
3.Turing Machine
4.None of the above
Context-free grammar can be recognized by ____.
1.Finite Automaton
2.Pushdown Automaton
3.Turing Machine
4.Linear Bounded
Which of the following statement is True?
1.Every type 2 language is also a type 1 and a type 3
2.Every type 2 language is also a type 3 and a type 0
3.Every type 2 language is also a type 1 and a type 0
4.None
According to Chomsky's hierarchy which of the following
represents Regular grammar?
1.TYPE 3
1.TYPE 2
2.TYPE 1
3.TYPE 0
According to Chomsky's hierarchy which of the following
represents context-free grammar?
1.TYPE 3
2.TYPE 2
3.TYPE 1
4.TYPE 0
According to Chomsky's hierarchy which of the following
represents unrestricted grammar?
1.TYPE 3
2.TYPE 2
3.TYPE 1
4.TYPE 0
What do you mean by CNF?
1.Chomsky's normal form
2.Chimpken normal form
3.Campbell's normal form
4.None
The language accepted by a Push down Automata:
1.Type0
2.Type1
3.Type2
4.Type3
What is a Finite automaton?
1.A Finite automaton is an automaton having an infinite
number of states.
2.A Finite automaton is an automaton having a finite number
of states
3.Both
4.None
An automaton is made up of ____.
1.States
2.Transitions
3.Both
4.None
In the theory of automation, how do we represent states?
1.Rectangle
2.Arrow
3.Circles
4.Both
5.None
In the theory of automation, how do we represent transitions?
1.Triangle
2.Circles
3.Double circles
4.Arrows
The extra memory in pushdown automata is known as ____.
1.Heap
2.Array
3.Stack
4.None
____ are entities or single objects that can be any letter,
alphabet, or picture.
1.Objects
2.Transitions
3.Symbols
4.Alphabets
What are the alphabets in the theory of computations?
1.Alphabets are a finite set of symbols
2.Alphabets are an infinite set of symbols
3.Both
4.None
Which of the following is used to denote alphabets?
1.W
2.∑
3.|W|
4.~
____ is a finite collection of symbols from the alphabet.
1.Switch
2.String
3.State
4.Symbols
Empty string is denoted by ____.
1.0
2.E
3.$
4.ε
Length of a string is represented by ____.
1.Null
2.L
3.|Length|
4.|w|
How many states do finite automata have?
1.1
2.2
3.3
4.None
2How many types of finite automata are there?
1.4
2.3
3.5
4.2
In the ____, the machine only goes to one state for each
input character.
1.DFA
2.NFA
3.CAN
4.None
A finite automaton is a collection of how many tuples?
1.5
2.4
3.7
4.3
Which of the following indicates accepting or final states?
1.Double circles
2.Triangle
3.Double dash
4.circle
THANK YOU
BSTET COMPUTER SCIENCE TEACHER
Computer Science Paper (100 Marks) Complete Preparation
Unit - 1
E – Commerce / Multimedia
By- Punam
2 Times UGC NET Qualified (Computer Science)
E - Commerce
E-Commerce stands for _______.
1. Electrical Commerce
2.Electronic Commerce
3.Entertainment Commerce
4.ElectroChemical Commerce
__________ is an early form of E-commerce
1. SCM
2.EDI
3.Both of these
4.Neither of these
____________ is concerned with the buying and selling
information, products and services over computer
communication networks
1. Commerce
2.E-Commerce
3.E-Business
4.None of these
_______ is a function of E commerce.
1. Marketing
2.Supply Chain
3.Finance
4.All of the above
1.________mainly deals with buying and selling, especially on
a large scale.
1. Shopping
2.Commerce
3.Retailing
4.Distribution
_______is a system of interconnected electronic components
or circuits.
1. Electronic Network
2.Marketplaces
3.Electronic Markets
4.Metamarkets
Some marketers or companies charge other companies for letting
them place a banner on their websites, blogs or platforms known
as the ___________E-Commerce Model.
1. Affiliate
2.Transaction
3.Aggregator
4.Advertising
MULTIMEDIA
Video Files are available in…….. Formats
a) AVI
b) JPG
c) PNG
d) PDF
Object on the slide that hold text are called
a) Placeholders
b) Auto layout
c) Textholder
d) Objectholders
Which Principles are used in digitization of multimedia
content
i) Sampling
ii) Quantization
a) Only I
b) Only ii
c) None
d) Both
A
THANK YOU
WELCOME To Our Channel
INSIGHT CS - IT
1. A network that links many different
type of computers all over the world.
a) Intranet
b) Internet
c) Extranet
d) LAN
2. Example of computer full duplex mode is
a) Telephone
b) Internet broadcasting
c) Both A and B
d) Television
3. Which of the through is share the data
of two computer?
a) Library
b) Network
c) Grouping
d) Integrated system
4. Computer data transmission mode in
which data can flow in both directions
but not at the same time is called
a) simplex mode
b) half duplex mode
c) full duplex mode
d) duplex mode
5. Way in which computer data is transmitted
from one place to another is called
a) Transmission mode
b) Transfer mode
c) Sending mode
d) Receiving mode
6. Which of the following best describes
uploading information?
a) Sorting data on a disk drive
b) Sending information to a host computer
c) Receiving information from a host computer
d) Sorting data on a hard drive
7. System in a computer which translates
an IP address into an easier name is called
a) Packet-switching domain system
b) Domain name system
c) Domain
d) Domain numbering system
8. All of the following are top-level
computer domains except
a) .edu
b) .org
c) .gov
d) .army
9. The combination of two or more
interconnected networks is called
a) Internetwork
b) LAN
c) MAN
d) WAN
10. Which of the following
transmission directions listed is not a
legitimate channel?
a) Simplex
b) Half Duplex
c) Full Duplex
d) Double Duplex
11. Which type of topology is best suited
for large businesses which must carefully
control and coordinate the operation of
distributed branch outlets?
a) Ring
b) Local area
c) Hierarchical
d) Star
12. What covers a larger geographical
area than MAN?
a) WAN
b) LAN
c) Both A and B
d) None of the above
13. “Parity bits” are used for which of
the following purposes?
a) Encryption of data
b) To transmit faster
c) To detect errors
d) To identify the user
14. A collection of hyperlinked
documents on the internet forms the ?.
a) World Wide Web (WWW)
b) E-mail system
c) Mailing list
d) Hypertext markup language
15. The location of a resource on the
internet is given by its?
a) Protocol
b) URL
c) E-mail address
d) ICQ
16. The term HTTP stands for?
a) Hyper terminal tracing program
b) Hypertext tracing protocol
c) Hypertext transfer protocol
d) Hypertext transfer program
17. A proxy server is used as the
computer?
a) With external access
b) Acting as a backup
c) Performing file handling
d) Accessing user permissions
18. Which software prevents the
external access to a system?
a) Firewall
b) Gateway
c) Router
d) Virus checker
19. Which one of the following is a valid
email address?
a) [email protected]
b) gmail.com
c) [email protected]
d) javatpoint@books
20. Which one of the following is the most
common internet protocol?
a) HTML
b) NetBEUI
c) TCP/IP
d) IPX/SPX
21. Which one of the following is not a
network topology?
a) Star
b) Ring
c) Bus
d) Peer to Peer
22. The maximum length (in bytes) of
an IPv4 datagram is?
a) 32
b) 1024
c) 65535
d) 512
23. The length of an IPv6 address is?
a) 32 bits
b) 64 bits
c) 128 bits
d) 256 bits
24. The length of an IPv4 address is?
a) 32 bits
b) 64 bits
c) 128 bits
d) 256 bits
25. The term IANA stands for?
a) Internet Assigned Numbers Authority
b) Internal Assigned Numbers Authority
c) Internet Associative Numbers Authoritative
d) Internal Associative Numbers Authority
THANK YOU
WELCOME To Our Channel
INSIGHT CS - IT
26. The first Network
a) ARPANET
b) CNNET
c) NSFNET
d) ASAPNET
e) None of these
27. How many versions available of IP?
a) 6 version
b) 4 version
c) 2 version
d) 1 version
28. The term IPv4 stands for?
a) Internet Protocol Version 4
b) Internet Programming Version 4
c) International Programming Version
d) None of these
29. Which of the following methods is
used to broadcast two packets on the
medium at a time?
a) Collision
b) Synchronous
c) Asynchronous
d) None of the above
30. The private key in asymmetric key
cryptography is kept by?
a) Sender
b) Receiver
c) Sender and Receiver
d) None of the these
31. Mesh topology, have devices
which are connected via
a) single and multiple links
b) Multipoint link
c) Point to point link
d) No Link
32. LAN has mostly used the topologies
a) Bus
b) Ring
c) Star
d) All of these
33. Which topologies have two or more
Combination
a) multigrid
b) Star Topology
c) Bus Topology
d) Ring topology
e) Hybrid
34. Which topology has the highest reliability?
A) Mesh topology
b) Star topology
c) Ring Topology
d) Bus Topology
e) none of these
35. Star Topology is basically based
on a central device ______
a) HUB
b) Switch
c) Gates
d) Both a and b
e) none of these
36. A topology that is responsible for
describing the geometric arrangement of
components that make up the LAN
a) Complex
b) Physical
c) Logical
d) Incremental
37. In a network, participating computers
are referred to as
a) Clients
b) Servers
c) Nodes
d) CPUs
e) both a and c
38. Tokens are involved in a topology.
a) Star
b) hybrid
c) Bus
d) Daisy Chaining
e) Ring
39. The performance of a data communications
network is highly dependeds on _____
a) Number of users
b) transmission
c) hardware and software
d) All of the above
40. Which type of protocol provides a
virtual terminal in TCP/IP model_____
a) SMTP
b) Telnet
c) HTTP
d) None of these
41. Which of the following protocols are
used for Email ?
a) TELNET and SMTP
b) SMTP and POP
c) POP and FTP
d) TELNET and FTP
42. Mobile Application Protocol typically
runs on top of which protocol______?
a) SMTP
b) SNMP
c) SS7
d) All of these
43. Computer and a keyboard involves_____
transmission to communicate
a) Automatic
b) Simplex
c) Half-duplex
d) Full-duplex
e) None of these
44. _____ physical path is used to travel
massages form one place to another
a) Path
b) Protocol
c) Route
d) Medium
e) None of these
45. Which of this is not a network edge device?
a) Switch
b) PC
c) Smartphones
d) Servers
e) None of these
THANK YOU
WELCOME To Our Channel
INSIGHT CS - IT
TOPIC :- E - MAIL
Who invented email?
a) Larry Page
b) Tim Barners
c) Ray Tomlinson
d) All of these
The user name and email server parts of
an email address are separated by
_______ symbol
a) #
b) @
c) &
c) $
An email may contain non-text
information which may be __________
a) downloaded
b) uploaded
c) erased
d) transmitted
The second part of email address
identifies ______
a) name of bank
b) name of the email server
c) name of individual user
d) name of the mobile phone operator
You can _________ an email if you want to
remember it is important, and this also puts the
email into a special folder for easy access
a) Star
b) Draft
c) Label
d) Reply
What sends a copy of an email to a new
recipient?
a) Reply
b) BCC
c) Reply All
d) Forward
The first part of email address
identifies____
a) name of the email server
b) name of the mobile phone operator
c) name of individual user
d) name of bank
Gmail.com, yahoo.com, yahoo.co.in,
ymail.com, rediff.com, rediffmail.com,
fastmail.fm, etc. are popular_________________
a) email servers
b) social media sites
c) FTP servers
d) None
SMTP stands for__________________
a) Simple Mail Transfer Protocol
b) Server Mail Transfer Protocol
c) Short mail transmission protocol
d) Small mail transmission protocol
What is the main folder in Gmail?
a) Inbox
b) Trash
c) SPAM
d) Star
What do we call the people we send an
email to?
a) Recipients
b) SPAM
c) Contacts
d) Inbox
In MS Office, ______ is the software for
managing emails
a) MS Publisher
b) MS Access
c) MS Outlook
d) None
In email communication, CC stands for
a) cold coffee
b) carbon copy
c) casual copy
d) blind carbon copy
The email ID of a person contains _______
parts
a) 4
b) 3
c) 2
d) 5
The file attached to an email is called
the _______
a) attachment
b) content
c) subject
d) BCC
The email ID of the secondary recipient
of email is entered in ______ field
a) CC
b) BCC
c) Subject
d) To
Unsolicited emails may be filtered and
separated into ____
a) inbox
b) spam bin
c) sent mails
d) draft
How do you properly format an email?
a) Subject, Body, Signature, Closing
b) Subject, Salutation, Body, Signature
c) Signature, Body, Salutation, Subject
d) Subject, Salutation, Body, Closing,
Signature
What does BCC stand for when sending
an email?
a) Blind Copy Carbon
b) Blind Copy of a Copy
c) Blind Carbon Copy
D Bulk Copy of a Copy
A half completed email may be saved for
later editing and transmission to the
receiver in ______ folder.
a) inbox
b) spam bin
c) sent mails
d) draft
What is the term used to describe what
Internet scammers do to trick people our
of their personal information?
a) Catfishing
b) Phishing
c) Hacking
d) Digital Theft
Which of these is correct email address?
a) userName@website@com
b) userName.website.com
C) userName.website@com
d) [email protected]
Which of the following statements is incorrect
with respect to writing e-mails?
a) We cannot add more than one address in the
"To" field.
b) We can leave the 'Bcc' field blank
c) We can leave the "Cc field blank.
d) The To' and 'Cc fields are often used
interchangeably.
What is the use of Carbon copy (CC)?
a) Recipients are invisible to all of the other
recipients of the message in CC
b) Recipients are visible to all of the other
recipients of the message in CC
c) Recipients are invisible to only one recipients
of the message in CC
d) None of the above
Which of the following is mandatory for
sending an email?
a) Body
b) Sender mail ID
c) Attachment
d) Subject
What is included in an E-mail address?
a) Domain name followed by user's name
b) User's name followed by domain name
c) User's name followed by postal address
d) User's name followed by Street address
A block of text automatically added to
the end of an outgoing email is called
an/a
a) Attachment
b) Signature
c) Decryption
d) Encryption
THANK YOU
WELCOME To Our Channel
INSIGHT CS - IT
TOPIC
OSI Or TCP / IP MODEL
OSI Model TCP / IP Model
▪ It stands for Open System Interconnection. ▪ It stands for Transmission Control Protocol.
▪ OSI model has been developed by ISO ▪ It was developed by ARPANET (Advanced
(International Standard Organization) Research Project Agency Network).
▪ In this model, the session and ▪ In this model, the session and presentation
presentation layers are separated, i.e., layer are not different layers. Both layers are
both the layers are different.. included in the application layer.
Layer 1: The Physical Layer
Data encoding, Transmission technique, Physical medium
transmission: