6. What is OSI model and explain its 7 layers? OSI stands for Open Systems Interconnection. It was developed by ISO – ‘International Organization for Standardization’, in the year 1984. It is a 7-layer architecture with each layer having specific functionality to perform. All these 7 layers work collaboratively to transmit the data from one person to another across the globe.
7. What’s the difference between mutex and semaphore?
Mutex | Semaphore |
---|---|
A mutex is an object. | A semaphore is an integer. |
Mutex works upon the locking mechanism. | Semaphore uses signaling mechanism |
Operations on mutex: | Operation on semaphore: |
Mutex doesn’t have any subtypes. | Semaphore is of two types: |
8. What are Deadlocks? A deadlock is a situation where a set of processes are blocked because each process is holding a resource and waiting for another resource acquired by some other process.
9. What is a network congestion? Network Congestion occurs when the traffic flowing through a network exceeds its maximum capacity. In most cases, congestion is a temporary issue with the network caused due to a sudden upsurge of traffic, however, sometimes, a network is continually congested, indicating a deeper problem.
10. What are various types of TCP timers? TCP uses several timers to ensure that excessive delays are not encountered during communications. Several of these timers are elegant, handling problems that are not immediately obvious at first analysis.
11. What is inheritance and What are the different types of inheritance ? The capability of a class to derive properties and characteristics from another class is called Inheritance. Inheritance is one of the most important features of Object-Oriented Programming.
12. What is an API? API is an abbreviation for Application Programming Interface which is a collection of communication protocols and subroutines used by various programs to communicate between them.
13. What are various Keywords in C? Keywords are predefined or reserved words that have special meanings to the compiler. These are part of the syntax and cannot be used as identifiers in the program.
14. What’s the differences between TCP and UDP?
Basis | Transmission Control Protocol (TCP) | User Datagram Protocol (UDP) |
---|---|---|
Type of Service | is a connection-oriented protocol. Connection orientation means that the communicating devices should establish a connection before transmitting data and should close the connection after transmitting the data. | is the Datagram-oriented protocol. This is because there is no overhead for opening a connection, maintaining a connection, or terminating a connection. UDP is efficient for broadcast and multicast types of network transmission. |
Reliability | TCP is reliable as it guarantees the delivery of data to the destination router. | The delivery of data to the destination cannot be guaranteed in UDP. |
Error checking mechanism | TCP provides extensive error-checking mechanisms. It is because it provides flow control and acknowledgment of data. | UDP has only the basic error-checking mechanism using checksums. |
Acknowledgment | An acknowledgment segment is present. | No acknowledgment segment. |
Sequence | Sequencing of data is a feature of Transmission Control Protocol (TCP). this means that packets arrive in order at the receiver. | There is no sequencing of data in UDP. If the order is required, it has to be managed by the application layer. |
15. How is a TCP connection made? TCP is a connection-oriented protocol and every connection-oriented protocol needs to establish a connection in order to reserve resources at both the communicating ends.
16. What is Encapsulation? Encapsulation is a fundamental concept in object-oriented programming (OOP) that refers to the bundling of data and methods that operate on that data within a single unit, which is called a class in Java
17. What are Logic Gates and its types ? A semiconductor material’s electrical conductivity is somewhere between that of a conductor, such as metallic copper, and that of an insulator, such as glass. As the temperature rises, its resistivity reduces, whereas metals have the opposite effect.
18. What is virtual memory in OS ? Virtual Memory is a storage allocation scheme in which secondary memory can be addressed as though it were part of the main memory. The addresses a program may use to reference memory are distinguished from the addresses the memory system uses to identify physical storage sites and program-generated addresses are translated automatically to the corresponding machine addresses.
19. What is Cut-through Switching? Cut-through is a packet-switching method, where the switch forwards a packet as soon as the destination address is processed without waiting for the entire packet to be received. The next packet is sent as soon as the previous one has been verified as reaching the recipient without waiting for the complete transmission of the previous packet.
20. What’s the difference between linked list and arrays ?
21. What’s the difference between heap and stack ?
Parameter | STACK | HEAP |
---|---|---|
Basic | Memory is allocated in a contiguous block. | Memory is allocated in any random order. |
Allocation and De-allocation | Automatic by compiler instructions. | Manual by the programmer. |
Cost | Less | More |
Implementation | Easy | Hard |
Access time | Faster | Slower |
Main Issue | Shortage of memory | Memory fragmentation |
Locality of reference | Excellent | Adequate |
Safety | Thread safe, data stored can only be accessed by the owner | Not Thread safe, data stored visible to all threads |
Flexibility | Fixed-size | Resizing is possible |
Data type structure | Linear | Hierarchical |
22. What is Recovery Testing in Software Testing ? System testing is a type of software testing that evaluates the overall functionality and performance of a complete and fully integrated software solution. It tests if the system meets the specified requirements and if it is suitable for delivery to the end-users. This type of testing is performed after the integration testing and before the acceptance testing.
23. What are various types of TCP timers? TCP uses several timers to ensure that excessive delays are not encountered during communications. Several of these timers are elegant, handling problems that are not immediately obvious at first analysis
24. What is the difference between Structured Programming and Object Oriented Programming?
|
|
---|---|
It is a subset of procedural programming. | It relies on concept of objects that contain data and code. |
Programs are divided into small programs or functions. | Programs are divided into objects or entities. |
It is all about facilitating creation of programs with readable code and reusable components. | It is all about creating objects that usually contain both functions and data. |
Its main aim is to improve and increase quality, clarity, and development time of computer program. | Its main aim is to improve and increase both quality and productivity of system analysis and design. |
25. What’s the Difference between Normalization and Denormalization?
Normalization | Denormalization |
---|---|
In normalization, Non-redundancy and consistency data are stored in set schema. | In denormalization, data are combined to execute the query quickly. |
In normalization, Data redundancy and inconsistency is reduced. | In denormalization, redundancy is added for quick execution of queries. |
Data integrity is maintained in normalization. | Data integrity is not maintained in denormalization. |
In normalization, redundancy is reduced or eliminated. | In denormalization redundancy is added instead of reduction or elimination of redundancy. |
Number of tables in normalization is increased. | Denormalization, Number of tables in decreased. |
26. What are ACID properties? A transaction is a single logical unit of work that accesses and possibly modifies the contents of a database. Transactions access data using read-and-write operations. In order to maintain consistency in a database, before and after the transaction, certain properties are followed. These are called ACID properties.
27. Check if pair with given Sum exists in Array (Two Sum) Two Sum using Hashing
This problem can be solved efficiently by using the technique of hashing. Use a hash_map to check for the current array value x(let), if there exists a value target_sum-x which on adding to the former gives target_sum. This can be done in constant time.
28. Next Permutation
Brute Force Approach :
Find all possible permutations of the given array. Print the Next permutation right after the er given input sequence.
29. What is a trigger in SQL?
A trigger is a stored procedure in a database that automatically invokes whenever a special event in the database occurs. For example, a trigger can be invoked when a row is inserted into a specified table or when specific table columns are updated in simple words a trigger is a collection of SQL statements with particular names that are stored in system memory.
30. What is the difference between a structure and a class in C++?
Class | Structure |
---|---|
Members of a class are private by default. | Members of a structure are public by default. |
An instance of a class is called an ‘object’. | An instance of structure is called the ‘structure variable’. |
Member classes/structures of a class are private by default but not all programming languages have this default behavior eg Java etc. | Member classes/structures of a structure are public by default. |
It is declared using the keyword. | It is declared using the keyword. |
It is normally used for data abstraction and further inheritance. | It is normally used for the grouping of data |
31. Intersection of Two Linked Lists
Use Hashing
Basically, we need to find a common node of two linked lists. So we hash all nodes of the first list and then check the second list. Create an empty hash set. Traverse the first linked list and insert all nodes’ addresses in the hash set. Traverse the second list. For every node check if it is present in the hash set. If we find a node in the hash set, return the node.
32. The Celebrity Problem
Using Elimination Technique (Efficient):
The idea is to follow below to steps based on the above approach: If A knows B, then A can’t be a celebrity. Discard A, and B may be celebrity. If A doesn’t know B, then B can’t be a celebrity. Discard B, and A may be celebrity. We will not use any extra space as will use spaces M[i][i] for storing whether i th person is a celebrity or not as these are by default 0, so if we find i th person is not a celebrity then we will mark M[i][i] as 1
33. Detect Cycle in a Directed Graph
Detect Cycle in a Directed Graph using DFS :
The problem can be solved based on the following idea:
To find cycle in a directed graph we can use the Depth First Traversal (DFS) technique. It is based on the idea that there is a cycle in a graph only if there is a back edge [i.e., a node points to one of its ancestors] present in the graph. To detect a back edge, we need to keep track of the nodes visited till now and the nodes that are in the current recursion stack [i.e., the current path that we are visiting]. If during recursion, we reach a node that is already in the recursion stack, there is a cycle present in the graph.
34. ZigZag Tree Traversal
We can use a queue just like we used in Level Order Traversal. But in this case, we can also maintain a flag variable which keeps track of alternate level to reverse the order of the corresponding level traversal.flag==true implies we have to insert from left to right and flag==false means we have to insert element from right to left our answer arraylist.
35. Minimum number of jumps to reach end (Jump Game) Minimum number of jumps to reach the end using Recursion :
Start from the first element and recursively call for all the elements reachable from the first element. The minimum number of jumps to reach end from first can be calculated using the minimum value from the recursive calls. minJumps(start, end) = 1 + Min(minJumps(k, end)) for all k reachable from start.
To check the Cisco Experiences and other asked question go through the attached link
Similar reads.
Exams & Answers | Online Test |
---|---|
Gostaria de saber a respeito de CPP C++ advanced.
Advanced c programming module and summary test and
We are updating
IMAGES
COMMENTS
Cisco CCNA v7 Exam Answers full Questions Activities from netacad with CCNA1 v7.0 (ITN), CCNA2 v7.0 (SRWE), CCNA3 v7.02 (ENSA) 2022 2023 100% scored passed ... Test the Interface Assignment: 2.8.2 Video Activity - Test End-to-End Connectivity: 2.9.1 Packet Tracer - Basic Switch and End Device Configuration:
Minor updates and refinements. CCNA 1 - Introduction to Networks v7.0 (ITN) Exam Answers. CCNA 1 v7.0 - The first course in the CCNA curriculum introduces the architectures, models, protocols, and networking elements that connect users, devices, applications and data through the Internet and across modern computer networks - including IP ...
CCNA-1-v7-Modules-1-3-Basic Network Connectivity and Communications Exam Answers 24. Explanation: The configuration mode that the administrator first encounters is user EXEC mode. After the enable command is entered, the next mode is privileged EXEC mode. From there, the configure termina l command is entered to move to global configuration mode.
CCNA 1 v7 Final Exam Answers. CCNA 1 (ITN v7.02) Labs & Packet Tracer (Answers Version) Packet Tracer - CCNA 1 (ITN v7.0) 1.0.5 Packet Tracer - Logical and Physical Mode Exploration. 1.5.7/1.5.5 Packet Tracer - Network Representation. 2.3.7 Packet Tracer - Navigate the IOS. 2.3.8 Packet Tracer - Navigate the IOS Using a Terminal ...
CCNA-1-v7-Modules-1-3-Basic Network Connectivity and Communications Exam Answers 54 The entire command, configure terminal, must be used. The administrator is already in global configuration mode. The administrator must first enter privileged EXEC mode before issuing the command. The administrator must connect via the console port to access ...
Quiz yourself with questions and answers for CCNA v7 final exam, so you can be ready for test day. ... manages ip address assignments for connected devices. ... how does the service password-encryption command enhance password security on cisco routers and switches.
Welcome to the 200-301 CCNA Study Material page. This page is designed to help you quickly find what you are looking for by organizing the content according to the exam topics. These resources are meant to supplement your learning experience and exam preparation. They are NOT designed to serve as a complete self-study program, but intended only ...
Use this CCNA practice test as study material to prepare for the Cisco CCNA Routing and Switching 200-125 exam. With 20 questions on a range of topics, we're not playing around. Achieving your Cisco Certified Networking Associate, or CCNA, certification requires more than just studying. Instead, it takes a true in-depth understanding of network ...
The CCNA 200-301 is for the Cisco Certified Network Associate (CCNA) Implementing and Administering Cisco Solutions exam. You can use the practice test to check your knowledge and improve your understanding in preparation for the Cisco CCNA certification exam. The Cisco CCNA 200-301 practice exam tests include questions to test your knowledge ...
Study with Quizlet and memorize flashcards containing terms like What three application layer protocols are part of the TCP/IP protocol suite?, Fault tolerance, scalibility and more.
CCNA 1 v7 ITN v7.02 Module Exam Answers Full 100% 2024 - Introduction to Network (version 7.02). Welcome to the ultimate collection of Cisco NetAcad CCNA 1 v7 and ITN v7.02 module lab and final exam answers for 2024. This comprehensive guide covers all aspects of the Introduction to Network (version 7.00) course, providing you with expertly verified answers to help you achieve a full mark of ...
Packet Tracer Lab answers full Series free download file pka pkt CCNA CCNP it essential Denet lab, ccna security lab instructor version update ... Test the Interface Assignment: 2.8.2 Video Activity - Test End-to-End Connectivity: ... Use a TFTP Server to Upgrade a Cisco IOS Image: 10.8.1 Packet Tracer - Configure CDP, LLDP, and NTP ...
However, Cisco Packet Tracer has some significant advantages for CCNAs: · Cost: Free. · Low CPU & RAM: It should run on the computer you already own as a desktop app. · Usefulness for CCNA: Supports 90%+ of the CCNA config/verify topics. · Quality: Excellent for its intended purpose as a learning tool.
820-605 Cisco Customer Success Manager (CSM) 840-425 Executing Cisco Advanced Business Value Analysis and Design Techniques. 840-450 Mastering The Cisco Business Architecture Discipline. Check these Popular Free Cisco Exam Questions and Answers to prepare for your IT exam. Each question has community assistance.
Hi! Sometimes. the PKA files can come with a PDF file with the same instructions that you can also see in your PKA file. The instructor can indicate you write the answers in a word document or notepad file.
106F:65FF:FEC2:BDF8. Explanation: To derive the EUI-64 interface ID by using the MAC address 1C-6F-65-C2-BD-F8, three steps are taken. Change the seventh bit of the MAC address from a binary 0 to a binary 1 which changes the hex C, into a hex E. Insert hex digits FFFE into the middle of the address.
CCNA 1 v7 Final Exam Answers Full, Introduction to Networks (ITN Version 7.0) ITNv7 Final Exam Answers passed new questions free download pdf file 2023-2024. ... Resolves domain names, such as cisco.com, into IP addresses. A basic set of rules for exchanging text, graphic images, sound, video, and other multimedia files on the web. ...
Insight on Cisco Online Assessment. Here are some facts related to Cisco Recruitment Test: Cisco Conducts its Recruitment Test on Hackerrank.; On Hackerrank candidates can choose any Programming Language to solve the given Problem Statement.; Aptitude Based Questions may or may not be asked in Online Assessment, but Coding Questions are always asked.; Team of 3 Members needs to be formed to ...
2. Explain various mechanisms for building a Distributed file system. Distributed Systems are the systems that make a single system image to users of the networks. The failure of one system in the network will not be coming into the picture of all other uses. Characteristics of distributed file system.
Networking Essentials Quiz & Exams Answers. Online Test. Module 1 - Communications in a Connected World Quiz. Module 2 - Online Connections Quiz. Module 3 - Explore Networks with Packet Tracer Quiz. Module 4 - Build a Simple Network Quiz. Modules 1 - 4: Internet Connection: Getting Online Group Exam. Module 5 - Communication ...
Welcome to our channel! In this video, we provide detailed answers and explanations for the Week 5 assignment of the NPTEL course on "Wild Life Ecology." We ...
They are very powerful programming tools. Learning C/C++ gives you a wider perspective. First, it will give you a solid foundation and pave your way to learning other programming languages much easier and much faster. And second, when you code in C/C++, you actually have to understand everything you write. This means you will understand.