Saturday, 23 February 2013

Computer Science fundamentals

SOFTWARE ENGINEERING

1. Software Engineering primarily aims on - Reliable and cost effective software.

2. Design phase will usually be - Top-down.

3. Design phase includes- Data, architechture, interface and procedural designs.

4. Which of the following is a tool in design phase- Abstraction, Refinement, Information hiding.

5. A good specification should be - Unambiguous, Distinctly specific, Functional.

6. Information hiding is to hide from user details.

7. In the object oriented design software, which of the following is not true- an object can belong to two classes.

8. Data Structure suitable for the application is discussed in Data design.

9. Assertions are conditions, which are true at the point of execution always.

10.Which of the following is not a factor in the failure of a system development project? - Size of the company.

11.Which of the following is not a phase in the SDLC?- Define the latest technology.

12.Which of the following decide new systems development projects to work on first?- Steering committee.

13.The documents listing all procedures and regulations that generally govern and organization is the - Organization manual.

14.The combination of top-down and the bottom-up approach may be referred to as an- Integrative approach.

15.The implementation project proposal is prepared by- Systems analysts under the guidance of the vice-president of information system.

16.The first step of the implementation phase is - Implementation planning.

17.During the implementation phase, the executive vise-president is primarily concerned with - Controlling.

18.An important aspect in coding is - Readability.

19.Structured programming include- sequencing, alteration & iteration.

20.Which of the following is desirable property of a module?- Independency.

21.The data flow model of an application mainly shows- Processing requirements and the flow of data.

22.One way to improve readability in coding is to - Avoid goto statements, Name variables and functions according to their use, Modularize the program.

23.Which of the following testing methods is normally used as the acceptance test for a software system?- Functional Testing

24.A computer program can often be a very statisfactory of a physical system such as road traffic condition- Simulation.

25.In object Oriented design of software, objective have- Attributes, name and operations.

26.Coding and testing are done in a Top down manner.

27.The black box concept is based on the assumption that- the relationship between inputs and outputs is stable.

Computer Science fundamentals

OPERATING SYSTEM

1. Disk scheduling involved deciding the order in which disk access requests must be serviced.

2. Kernal is the set of primitive functions upon which the rest of operating system functions are built up.

3. Dirty bit is used to show the page that is modified after being loaded into cache memory.

4. Fence register is used for Memory protection.

5. Which of the service is not supported by the operating system- Compilation.

6. The first-fit, best-fit and the worst fit algorithm can be used for - Contiguous allocation of memory.

7. Which of the following are single-user Operating system- XENIX, MS-DOS.

8. In Round Robin CPU scheduling, as the time quantum is increased the average turn around time - varies irregularly.

9.The size of the virtual memory depends on - the size of the address bus.

10. For implementing a multiprogramming Operating system- Special support from processor is not essential.

11. To obtain better memory utilization, dynamic loading is used. With dynamic loading, a routine is not
    loaded until it is called for. For implementing dynamic loading, User program can implement dynamic loading
    without any special support from the operating system or the hardware.

12. When overlys are used, the size of a process is not limited to the size of physical memory.

13. In a partitioned memory allocation scheme, the superiority of the first fit and the best fit algorithms depend on the
    sequence of memory requests.

14. Cascading termination refers to termination of all child processes before the parent terminates normally or abnormally.

Thursday, 21 February 2013

Internet fundamental concepts



IP: is responsible for moving packet of data from node to node. IP forwards each packet based on a four byte destination address (the IP number). The Internet authorities assign ranges of numbers to different organizations. The organizations assign groups of their numbers to departments. IP operates on gateway machines that move data from department to organization to region and then around the world.

TCP: is responsible for verifying the correct delivery of data from client to server. Data can be lost in the intermediate network. TCP adds support to detect errors or lost data and to trigger retransmission until the data is correctly and completely received.

Sockets: is a name given to the package of subroutines that provide access to TCP/IP on most systems.

Web Browser: A browser is an application program that provides a way to look at and interact with all the information on the World Wide Web. A Web browser is a client program that uses HTTP (Hypertext Transfer Protocol) to make requests of Web servers throughout the Internet on behalf of the browser user. Most browsers support e-mail and the File Transfer Protocol (FTP) but a Web browser is not required for those Internet protocols and more specialized client programs are more popular. The first Web browser, called WorldWideWeb, was created in 1990. That browser's name was changed to Nexus to avoid confusion with the developing information space known as the World Wide Web. Ex: Netscape, Internet Explorer (IE), Firefox, Flock, Safari, Lynx, Opera etc.

Ethernet: is a physical and data link layer technology for local area networks (LANs). Ethernet was invented by engineer Robert Metcalfe. When first widely deployed in the 1980s, Ethernet supported a maximum theoretical data rate of 10 megabits per second (Mbps). Later, so-called "Fast Ethernet" standards increased this maximum data rate to 100 Mbps. Today, Gigabit Ethernet technology further extends peak performance up to 1000 Mbps.Higher level network protocols like Internet Protocol (IP) use Ethernet as their transmission medium. Data travels over Ethernet inside protocol units called frames.The run length of individual Ethernet cables is limited to roughly 100 meters, but Ethernet networks can be easily extended to link entire schools or office buildings using network bridge devices.

URL: stands for Uniform Resource Locator. A URL is a formatted text string used by Web browsers, email clients and other software to identify a network resource on the Internet. Network resources are files that can be plain Web pages, other text documents, graphics, or programs. URL strings consist of three parts (substrings):
1. network protocol
2. host name or address
3. file or resource location
These substrings are separated by special characters as follows:

protocol :// host / location
Search engines are programs that search documents for specified keywords and returns a list of the documents where the keywords were found. A search engine is really a general class of programs, however, the term is often used to specifically describe systems like Google, Bing and Yahoo! Search that enable users to search for documents on the World Wide Web.

Hypertext Transfer Protocol: (HTTP) is an application protocol for distributed, collaborative, hypermedia information systems.[1] HTTP is the foundation of data communication for the World Wide Web.

WWW: World Wide WebA technical definition of the World Wide Web is: all the resources and users on the Internet that are using the Hypertext Transfer Protocol (HTTP).A broader definition comes from the organization that Web inventor Tim Berners-Lee helped found, the World Wide Web Consortium (W3C):"The World Wide Web is the universe of network-accessible information, an embodiment of human knowledge."

ISP: (Internet service provider) is a company that provides individuals and other companies access to the Internet and other related services such as Web site building and virtual hosting. An ISP has the equipment and the telecommunication line access required to have a point-of-presence on the Internet for the geographic area served. The larger ISPs have their own high-speed leased lines so that they are less dependent on the telecommunication providers and can provide better service to their customers. Among the largest national and regional ISPs are AT&T WorldNet, IBM Global Network, MCI, Netcom, UUNet, and PSINet.

Intranet: is a private network that is contained within an enterprise. It may consist of many interlinked local area networks and also use leased lines in the wide area network. Typically, an intranet includes connections through one or more gateway computers to the outside Internet. The main purpose of an intranet is to share company information and computing resources among employees. An intranet can also be used to facilitate working in groups and for teleconferences.

MODEM: Modulator-demodulator. Electronic device that allows computers to communicate over telephone wires or cable-TV cable. One computer's modem converts its digital signals (which cannot be sent efficiently over phone lines) into analog signals (which can be). The other computer's modem reconverts the analog signals (that the computer cannot understand) into digital signals (that it can). Conversion of one type of signals to another is called modulation, their reconversion to the original type is called demodulation.

Wednesday, 20 February 2013

Computer Science

Operating System Bits

1. Memory protection is normally done by the processor and the associated hardware.

2. Which of the following scheduling algorithms gives minimum average waiting time SJF
   Shortest job first.

3. In a paged scheme of memory management, the segment table itself must have a page table because each segment
   is spread over a number of pages.

4. Which of the following page replacement algorithm suffers from Belady's anomaly FIFO- FIRST IN FIRST OUT.

5. A memory page containing a heavily used variable that was initialized very early and is in constant use is removed
   when the page replacement algorithm used is FIFO.

6. Which of the following scheduling policy is well suited for a time shared operating system-Round Robin.

7. Virtual Memory is an illusion of an extremely large memory.

8. Spatial locality is referred as a nearby location will be referenced soon.

9. Which of the following is an example of SPOOLED device- A line printer used to print the output of a number of jobs.

10.Page fault occurs when the page is not in main memory.

11. Overly is a single contegious memory that is used in olden days for running large programs by swapping.

12.Concurrent processes are processes that are overlap in time.

13. The page replacement policy that sometimes lead to more page faults when the size of the memory is increased is FIFO.

14. The only state transition that is initiated by the user process itself is Block

15. Fragmentation is fragments of memory words unused in a page.

16. Which of the following are real time systems
    a process control system
    aircraft control system

17. Dijkstra's banking algorithm in an operating system solves the problem of Deadlock avoidance.

18. In a paged memory systems if page size increased, then the internal fragmentation is generally becomes more.

19. Critical region is the software which monitors the operating system.

20. Necessary condition for deadlocks are
    Non-preemption and Circular wait.
    Mutual Exclusion and partial allocation.

21. In a time sharing operating system, when a time slot is given to a process is completed the process goes from
    the RUNNING state to READY state.

22. Supervisor calls are privileged calls that are used to perform resource management functions, which are controlled
    by the operating system.

23. Semaphores are used to solve the problem of Process synchronization and Mutual exclusion.

24. Preemptive scheduling algorithm is the strategy of temporarily suspending a running process before the CPU time slice expires.

25.Mutual exclusion problem occurs between Processes that share resources.

Oracle Reserved Words

Oracle  Reserved Words The following words are reserved by Oracle. That is, they have a special meaning to Oracle and so cannot be redefi...