Sunday, 28 April 2019

Tricky Micro Wave Engineering Lab Viva Questions with answers free download

0 comments

Common Microwave Engineering VIVA Questions and Answers:




1. What is Microwave Engineering?
Ans. Microwave engineering is the study and design of microwave circuits , components , and systems. Fundamental principles are applied to analysis , design and measurement techniin this field.The short wavelengths involved distinguish this discipline from electronic engineering . This is because there are different interactions with circuits, transmissions and propagation characteristics at microwave frequencies.a

2. Define s-matrix and its properties?
Ans. In a microwave junction there is an interaction of three or more components.There will be an output port, in addition there may be reflection from the junction of other ports. Totally there may be many combination, these are represented easily using a matrix called S matrix.
Properties of s- matrix
1. it possess symmetric properties sij=sji
2. it possess unitary property
3. [s][s]*=[i]

3. Write the applications of microwave engineering?
Ans. Following are the applications of microwave engineering-
1. Antenna gain is proportional to the electrical size of the antenna. At higher frequencies, more antenna gain is therefore possible for a given physical antenna size, which has important consequences for implementing miniaturized microwave systems.
2. More bandwidth can be realized at higher frequencies. Bandwidth is critically important because available frequency bands in the electromagnetic spectrum are being rapidly depleted.
3. Microwave signals travel by line of sight are not bent by the ionosphere as are lower frequency
signals and thus satellite and terrestrial communication links with very high capacities are possible.

4. Why is s-matrix used in MW analysis?
Ans. Matrix is used in MW analysis to overcome the problem which occurs when H,Y & Z parameter are used in high frequencies.

5. What are the advantages of ABCD matrix?
Ans. The advantages of ABCD matrix are as follows-
1. They are used in power transmission lines
2. They are helpful in case of cascade networks.

6. What are junctions ? Give some example
 Ans. A microwave circuit consists of several microwave devices connected in some way to achieve the desired transmission of MW signal. The interconnection of two or more microwave may be regarded as MW junction.
E.g.: TEE, HYBRID RING

7. What are non-reciprocal devices ?Give two examples?
Ans. The devices which are having the properties that the forward characteristics are not equal to the reverse characteristics are called non-reciprocal devices.

8. What are the applications of reflex klystron?
Ans. The main applications of a reflex klystron are as follows-
1. Signal source in MW generator
2. Local oscillators in receivers
3. It is used in FM oscillator in low power MW links.
4. In parametric amplifier as pump source.

9. What is the purpose of slow wave structures used in TWT amplifiers?
Ans. Slow wave structures are special circuits that are used in microwave tubes to reduce wave velocity in a certain direction so that the electron beam and the signal wave can interact. In TWT, since the beam can be accelerated only to velocities that are about a fraction of the velocity of light, slow wave structures are used.

10.Give two examples for two port junctions?
Ans. Following are the two examples of two port junctions-
1. The junction of two rectangular guides of unequal height
2. A symmetrical junction consisting of two similar rectangular guides joined by an Intermediate guide of greater width.

Top 20 Digital image processing Lab Viva Questions & Answers

0 comments

Common Digital image processing Viva Questions and Answers :




1. Define Image?
An image may be defined as two dimensional light intensity function f(x, y) where x and y denote spatial co-ordinate and the amplitude or value of f at any point (x, y) is called intensity or gray scale or brightness of the image at that point.

2. What is Dynamic Range?
The range of values spanned by the gray scale is called dynamic range of an image. Image will have high contrast, if the dynamic range is high and image will have dull washed out gray look if the dynamic range is low.

3. Define Brightness?
Brightness of an object is the perceived luminance of the surround. Two objects with different surroundings would have identical luminance but different brightness.

4. What do you meant by Gray level?
Gray level refers to a scalar measure of intensity that ranges from black to grays and finally to white.

5. What do you meant by Color model?
A Color model is a specification of 3D-coordinates system and a subspace within that system where each color is represented by a single point.

6. List the hardware oriented color models?
1. RGB model
2. CMY model
3. YIQ model
4. HSI model

7. What is Hue and saturation?
Hue is a color attribute that describes a pure color where saturation gives a measure of the degree to which a pure color is diluted by white light.

8. List the applications of color models?
1. RGB model--- used for color monitors & color video camera
2. CMY model---used for color printing
3. HIS model----used for color image processing
4. YIQ model---used for color picture transmission

9. What is Chromatic Adoption?
The hue of a perceived color depends on the adoption of the viewer. For example,the American Flag will not immediately appear red, white, and blue of the viewer has been subjected to high intensity red light before viewing the flag. The color of the flag will appear to shift in hue toward the red component cyan.

10. Define Resolutions? 
Resolution is defined as the smallest number of discernible detail in an image.Spatial resolution is the smallest discernible detail in an image and gray level resolution refers to the smallest discernible change is gray level.

11. What is meant by pixel?
A digital image is composed of a finite number of elements each of which has a particular location or value. These elements are referred to as pixels or image elements or picture elements or pixls elements.

12. Define Digital image? 
When x, y and the amplitude values of f all are finite discrete quantities , we call the image digital image.

13. What are the steps involved in DIP?
1. Image Acquisition
2. Preprocessing
3. Segmentation
4. Representation and Description
5. Recognition and Interpretation

14. What is recognition and Interpretation?
Recognition means is a process that assigns a label to an object based on the information provided by its descriptors.Interpretation means assigning meaning to a recognized object.

15. Specify the elements of DIP system?
1. Image Acquisition
2. Storage
3. Processing
4. Display

16. List the categories of digital storage?
1. Short term storage for use during processing.
2. Online storage for relatively fast recall.
3. Archival storage for infrequent access.

17. What are the types of light receptors?
The two types of light receptors are
• Cones and
• Rods

18. Differentiate photopic and scotopic vision ?
Photopic vision Scotopic vision
1. The human being can resolve the fine details with these cones because each one is connected to its own nerve end.
2. This is also known as bright light vision.

19. How cones and rods are distributed in retina?
In each eye, cones are in the range 6-7 million and rods are in the range 75-150 million.

20. Define subjective brightness and brightness adaptation?
Subjective brightness means intensity as preserved by the human visual system.Brightness adaptation means the human visual system can operate only from scotopic to glare limit. It cannot operate over the range simultaneously. It accomplishes this large variation by changes in its overall intensity.

21. Define weber ratio?
The ratio of increment of illumination to background of illumination is called as web er ratio.(ie) Δi/i
If the ratio (Δi/i) is small, then small percentage of change in intensity is needed (ie) good brightness adaptation.
If the ratio (Δi/i) is large , then large percentage of change in intensity is needed (ie) poor brightness adaptation.

22. What is meant by mach band effect?
Mach band effect means the intensity of the stripes is constant. Therefore it preserves the brightness pattern near the boundaries, these bands are called as mach band effect.

23. What is simultaneous contrast?
The region reserved brightness not depend on its intensity but also on its background. All centre square have same intensity. However they appear to the eye to become darker as the background becomes lighter.

24. What is meant by illumination and reflectance?
Illumination is the amount of source light incident on the scene. It is represented as i(x, y).
Reflectance is the amount of light reflected by the object in the scene. It is represented by r(x, y).

26. Define sampling and quantization?
Sampling means digitizing the co-ordinate value (x, y).Quantization means digitizing the amplitude value. Several rods are connected to one nerve end. So it gives the overall picture of the image.This is also known as thin lightvision.

What are some commonly asked C programming viva voce Questions And Answers

0 comments

Latest C Language VIVA Questions with Answers:




1)Who invented C Language?
Dennis Ritchie in 1972 developed a new language by inheriting the features of both BCPL and B and adding additional features. He named the language as just C.

2) Who invented B Language?
Ken Thomson at AT&T Bell Labs developed a language and named it B. Even the B language was found to have some short comings to support development of both business applications and system software.

3) Who invented BCPL Language?
Basic Combined Programming Language(BCPL) was developed by Martin Richards, Cambridge university.

4) Why C Language?
C is one of the high level languages. It is a general purpose language, which means it can be used to write programs of any sort.

5) What are the features of C Langauges?
In C one can write programs like that of high level languages as in COBOL, BASIC, FORTRAN etc. as well as it permits very close interaction with the inner workings of the computer.
It is a general purpose programming language. It is usually called system programming language but equally suited to writing a variety of applications.
It supports various data types.
It follows the programming style based on fundamental control flow constructions for structured programming.
Functions may be pre–defined or user defined and they may return values of basic types, structures, unions or pointers.

 6)What are the advantages of c language?
Easy to write
Rich set of operators and functions that are built–in
Support for bit–wise operation
Flexible use of pointers
Direct control over the hardware
Ability to access BIOS/DOS routines
Interacting using Interrupts
Ability to write TSR programs
Ability to create .COM files
Ability to create library files (.LIB)
Ability to write interface programs
Incorporating assembly language in C program

7) What are the disadvantages of c langauge?
C is considered difficult to learn
Because of its conciseness, the code can be difficult to follow
It is not suited to applications that require a lot of report formatting and data file manipulation.

 8) What are the salient features of c languages?
The following are the salient features of C language are :
C is called a middle level language
C supports structured design approach
C is extensible
C is rich in data types and operators
C is portable

 9) What is a header file?
Header files provide the definitions and declarations for the library functions. Thus, each header file contains the library functions along with the necessary definitions and declarations. For example, stdio.h, math.h, stdlib.h, string.h etc.

10) What is character set?
Character set is the set of characters allowed and supported in the programming language. Generally a program is a collection of instructions, which contain groups of characters. Only a limited set of characters is allowed to write instructions in the program.

11) What is C token?
The smallest individual units of a C program are known as tokens.

12) List the different types of C tokens?
Constants
Identifiers
Keywords
Operators
Special symbols
Strings

13) What is a string?
A string is a sequence of characters ending with NUL. It can be treated as a one–dimensional array of characters terminated by a NUL character.

14) What are qualifiers?
Qualifiers or modifiers are identifiers that may precede the scalar data types (except float) to specify the number of bits used for representing the respective type of data in memory. The qualifiers in C are short, long, signed, and unsigned.

15) What is a function?
A function is a set of statements to perform a specific task.

16) What is a constant?
A constant is a value that does not change during the program execution. A constant used in C does not occupy memory.

17) What are the different types of constants?
There are five types of constants. They are :
Integer constants
Floating point constants
Character constants
String literals
Enumeration constants

18) What is variable?
An identifier is used to identify and store some value. If the value of the identifier is changed during the execution of the program, then the identifier is known as variable.

19) What are the rules for the identifier?
The first character must be an alphabet or underscore (_)
Digits may be included in the variable
The maximum number of characters in a word are 32 (It may vary depending upon the platform)
No other special characters are allowed.

 20) What are global variables?
Global Variables are those, which are required to be acccessed by all the functions defined after their declaration. So, the variables declared before the main {) can be acccessed by all the functions, which follow their declaration.

21) What is a keyword?
Keywords are those words of C which have predefined meaning assigned by the C language. They form a part of the database required by the C compiler.

22) What are the different types of c instructions?
There are basically three types of instructions in C are :
Type Declaration Instruction
Arithmetic Instruction
Control Instruction

 23) What is an expression?
Expression is defined as a combination of operands and operators to obtain some computation. Operands represent variables or values and The operator tells is what operation to be performed.

24) What are the types of data files?
There are two types of data files :
stream oriented or standard data files
system oriented or low level data files

 25) Why C is called a middle level language?
C combines the features of both Assembly Level Languages (Low Level Languages) and Higher Level Languages. For this reason, C is referred to as a Middle Level Language. The feature of ALLs is that of enabling us to develop system level programs and the features of HLLs are those of higher degree of readability and machine independence.

26) How can variables be characterized?
The variables can be categorized by storage class as well as by data type. The storage class specifies the portion of the program within which the variables are recognized.

27) Give the rules for variable declaration?
The rules for variable declaration in C are given below :
A variable name consists of alphabets, digits and the underscore (_) character
The length of variable should be kept upto 8 characters though your system may allow upto 40 characters
They must begin with an alphabet
Some systems also recognize an underscore as the first character
White space and commas are not allowed
Any reserved word (keyword) cannot be used as a variable name.

28) What is the purpose of type declarations?
The type declaration allow to create a synonym for other data types. Its syntax is type def type identifier; The declaration type def unsigned long int INTEGER

29) What is recursion?
C language a function may call another function. When a function calls itself, it is referred to as recursive call and the process is known as recursion. C provides very good facilities for recursion.

30) What is data types?
Data types refer to the classes of data that can be manipulated by C programs. The three fundamental data types supported by C are character, integer and real type.

Saturday, 27 April 2019

Best Viva Questions and Answers For Java

0 comments

Latest 

Java Viva Questions And Answers:


1.What is JVM?
The Java interpreter along with the run time environment required to run the Java application in called as Java virtual machine(JVM)

 2. What is the most important feature of Java?
Java is a platform independent language.

3. What do you mean by platform independence?
Platform independence means that we can write and compile the java code in one platform (eg Windows) and can execute the class in any other supported platform eg (Linux,Solaris,etc).

 4. What is the difference between a JDK and a JVM?
JDK is Java Development Kit which is for development purpose and it includes execution environment also. But JVM is purely a run time environment and hence you will not be able to compile your source files using a JVM.

5. What is the base class of all classes?
java.lang.Object

 6. What are the access modifiers in Java?
There are 3 access modifiers. Public, protected and private, and the default one if no identifier is specified is called friendly, but programmer cannot specify the friendly identifier explicitly.

 7. What is are packages?
 A package is a collection of related classes and interfaces providing access protection and namespace   management.

 8. What is meant by Inheritance and what are its advantages?
 Inheritance is the process of inheriting all the features from a class. The advantages of inheritance are reusability  of code and accessibility of variables and methods of the super class by sub classes.

 9. What is the difference between superclass and subclass?
 A super class is a class that is inherited whereas sub class is a class that does the inheriting.

 10. What is an abstract class?
 An abstract class is a class designed with implementation gaps for sub classes to fill in and is deliberately  incomplete.

 11. What are the states associated in the thread?
 Thread contains ready, running, waiting and dead states.

 12. What is synchronization?
 Synchronization is the mechanism that ensures that only one thread is accessed the resources at a time.

 13. What is deadlock?
 When two threads are waiting each other and can’t precede the program is said to be deadlock.

 14. What is an applet?
 Applet is a dynamic and interactive program that runs inside a web page displayed by a java capable browser

 15. What is the lifecycle of an applet?
init() method - Can be called when an applet is first loaded
start() method - Can be called each time an applet is started.
paint() method - Can be called when the applet is minimized or maximized.
stop() method - Can be used when the browser moves off the applet’s page.
destroy() method - Can be called when the browser is finished with the applet.


 16. How do you set security in applets?
  using setSecurity Manager() method

 17. What is a layout manager and what are different types of layout managers available in java AWT?
 A layout manager is an object that is used to organize components in a container. The different layouts are    available are FlowLayout, BorderLayout, CardLayout, GridLayout and GridBagLayout

 18. What is JDBC?
 JDBC is a set of Java API for executing SQL statements. This API consists of a set of classes and interfaces to  enable programs to write pure Java Database applications.

 19. What are drivers available?
 a) JDBC-ODBC Bridge driver b) Native API Partly-Java driver
 c) JDBC-Net Pure Java driver d) Native-Protocol Pure Java driver

 20. What is stored procedure?
Stored procedure is a group of SQL statements that forms a logical unit and performs a particular task. Stored Procedures are used to encapsulate a set of operations or queries to execute on database. Stored procedures can be compiled and executed with different parameters and results and may have any combination of input/output parameters.

 21. What is the Java API?
The Java API is a large collection of ready-made software components that provide many useful capabilities, such as graphical user interface (GUI) widgets.

 22. Why there are no global variables in Java?
Global variables are globally accessible. Java does not support globally accessible variables due to following reasons:
1)The global variables breaks the referential transparency
2)Global variables creates collisions in namespace.

 23. What are Encapsulation, Inheritance and Polymorphism?
 Encapsulation is the mechanism that binds together code and data it manipulates and keeps both safe from outside interference and misuse. Inheritance is the process by which one object acquires the properties of another object. Polymorphism is the feature that allows one interface to be used for general class actions.

 24. What is the use of bin and lib in JDK?
Bin contains all tools such as javac, appletviewer, awt tool, etc., whereas lib contains API and all packages.

 25. What is method overloading and method overriding?
Method overloading: When a method in a class having the same method name with different arguments is said to be method overloading. Method overriding : When a method in a class having the same method name with same arguments is said to be method overriding.

 26. What is the difference between this() and super()?
this() can be used to invoke a constructor of the same class whereas super() can be used to invoke a super class constructor.

 27. What is Domain Naming Service(DNS)?
It is very difficult to remember a set of numbers(IP address) to connect to the Internet. The Domain Naming Service(DNS) is used to overcome this problem. It maps one particular IP address to a string of characters. For example, www. mascom. com implies com is the domain name reserved for US commercial sites, moscom is the name of the company and www is the name of the specific computer, which is mascom’s server.

 28. What is URL?
URL stands for Uniform Resource Locator and it points to resource files on the Internet. URL has four components: http://www. address. com:80/index.html, where http - protocol name, address - IP address or host name, 80 - port number and index.html - file path.

 29. What is RMI and steps involved in developing an RMI object?
Remote Method Invocation (RMI) allows java object that executes on one machine and to invoke the method of a Java object to execute on another machine. The steps involved in developing an RMI object are: a) Define the interfaces b) Implementing these interfaces c) Compile the interfaces and their implementations with the java compiler d) Compile the server implementation with RMI compiler e) Run the RMI registry f) Run the application.

30. What is RMI architecture?
RMI architecture consists of four layers and each layer performs specific functions: a) Application layer - contains the actual object definition. b) Proxy layer - consists of stub and skeleton. c) Remote Reference layer - gets the stream of bytes from the transport layer and sends it to the proxy layer. d) Transportation layer - responsible for handling the actual machine-to-machine communication.

Friday, 26 April 2019

Common Data Structures VIVA Questions and Answers

0 comments

Frequently Asked Data Structures Viva Questions and Answers:





1. What is data structure?
The logical and mathematical model of a particular organization of data is called data structure. There are two types of data structure
1.Linear
2.Nonlinear

2. What are the goals of Data Structure?
It must rich enough in structure to reflect the actual relationship of data in real world.
The structure should be simple enough for efficient processing of data.

3. What does abstract Data Type Mean?
Data type is a collection of values and a set of operations on these values. Abstract data type refer to the mathematical concept that define the data type.It is a useful tool for specifying the logical properties of a data type.ADT consists of two parts
1.Values definition
2.Operation definition

4. What is the difference between a Stack and an Array?
Stack is a ordered collection of items
Stack is a dynamic object whose size is constantly changing as items are pushed and popped .
Stack may contain different data types
Stack is declared as a structure containing an array to hold the element of the stack, and an integer to indicate the current stack top within the array.

ARRAY
Array is an ordered collection of items
Array is a static object i.e. no of item is fixed and is assigned by the declaration of the array
It contains same data types.
Array can be home of a stack i.e. array can be declared large enough for maximum size of the stack.

5. What do you mean by recursive definition?
The definition which defines an object in terms of simpler cases of itself is called recursive definition.

6. What is sequential search?
In sequential search each item in the array is compared with the item being searched until a match occurs. It is applicable to a table organized either as an array or as a linked list.

7. What actions are performed when a function is called?
When a function is called
i) arguments are passed
ii) local variables are allocated and initialized
ii) transferring control to the function

8. What actions are performed when a function returns?
i) Return address is retrieved
ii) Function’s data area is freed
iii) Branch is taken to the return address

9. What is a linked list?
A linked list is a linear collection of data elements, called nodes, where the linear order is given by pointers. Each node has two parts first part contain the information of the element second part contains the address of the next node in the list.

10. What are the advantages of linked list over array (static data structure)?
The disadvantages of array are
unlike linked list it is expensive to insert and delete elements in the array
One can’t double or triple the size of array as it occupies block of memory space.

In linked list
each element in list contains a field, called a link or pointer which contains the address of the next element
Successive element’s need not occupy adjacent space in memory.

11. Can we apply binary search algorithm to a sorted linked list, why?
No we cannot apply binary search algorithm to a sorted linked list, since there is no way of indexing the middle element in the list. This is the drawback in using linked list as a data structure.

12. What do you mean by free pool?
Pool is a list consisting of unused memory cells which has its own pointer.

13. What do you mean by garbage collection?
It is a technique in which the operating system periodically collects all the deleted space onto the free storage list.It takes place when there is minimum amount of space left in storage list or when "CPU" is ideal.The alternate method to this is to immediately reinsert the space into free storage list which is time consuming.

14. What do you mean by overflow and underflow?1
When new data is to be inserted into the data structure but there is no available space i.e. free storage list is empty this situation is called overflow.
When we want to delete data from a data structure that is empty this situation is called underflow.

15. What are the disadvantages array implementations of linked list?
1.The no of nodes needed can’t be predicted when the program is written.
2.The no of nodes declared must remain allocated throughout its execution

16. What is a queue?1
A queue is an ordered collection of items from which items may be deleted at one end (front end) and items inserted at the other end (rear end).It obeys FIFO rule there is no limit to the number of elements a queue contains.

17. What is a priority queue?
The priority queue is a data structure in which the intrinsic ordering of the elements (numeric or alphabetic)
Determines the result of its basic operation. It is of two types
i) Ascending priority queue- Here smallest item can be removed (insertion is arbitrary)
ii) Descending priority queue- Here largest item can be removed (insertion is arbitrary)

18. What are the disadvantages of sequential storage?
1.Fixed amount of storage remains allocated to the data structure even if it contains less element.
2.No more than fixed amount of storage is allocated causing overflow

19. What are the disadvantages of representing a stack or queue by a linked list?
i) A node in a linked list (info and next field) occupies more storage than a corresponding element in an array.
ii) Additional time spent in managing the available list.

20. What is dangling pointer and how to avoid it?
After a call to free(p) makes a subsequent reference to *p illegal, i.e. though the storage to p is freed but the value of p(address) remain unchanged .so the object at that address may be used as the value of *p (i.e. there is no way to detect the illegality).Here p is called dangling pointer.
To avoid this it is better to set p to NULL after executing free(p).The null pointer value doesn’t reference a storage location it is a pointer that doesn’t point to anything.

21. What are the disadvantages of linear list?
i) We cannot reach any of the nodes that precede node (p)
ii) If a list is traversed, the external pointer to the list must be persevered in order to reference the list again

22. Define circular list?
In linear list the next field of the last node contain a null pointer, when a next field in the last node contain a pointer back to the first node it is called circular list.
Advantages – From any point in the list it is possible to reach at any other point

23. What are the disadvantages of circular list?
i) We can’t traverse the list backward
ii) If a pointer to a node is given we cannot delete the node

24. Define double linked list?
It is a collection of data elements called nodes, where each node is divided into three parts
i) An info field that contains the information stored in the node
ii) Left field that contain pointer to node on left side
iii) Right field that contain pointer to node on right side

25. Is it necessary to sort a file before searching a particular item ?
If less work is involved in searching a element than to sort and then extract, then we don’t go for sort
If frequent use of the file is required for the purpose of retrieving specific element, it is more efficient to sort the file.Thus it depends on situation.

26. What are the issues that hamper the efficiency in sorting a file?
The issues are
i) Length of time required by the programmer in coding a particular sorting program
ii) Amount of machine time necessary for running the particular program
iii)The amount of space necessary for the particular program .

27. Calculate the efficiency of sequential search?
The number of comparisons depends on where the record with the argument key appears in the table
If it appears at first position then one comparison
If it appears at last position then n comparisons
Average=(n+1)/2 comparisons
Unsuccessful search n comparisons
Number of comparisons in any case is O (n).

28. Is any implicit arguments are passed to a function when it is called?
Yes there is a set of implicit arguments that contain information necessary for the function to execute and return correctly. One of them is return address which is stored within the function’s data area, at the time of returning to calling program the address is retrieved and the function branches to that location.

29. Parenthesis is never required in Postfix or Prefix expressions, why?
Parenthesis is not required because the order of the operators in the postfix /prefix expressions determines the actual order of operations in evaluating the expression

30. List out the areas in which data structures are applied extensively?
Compiler Design,
Operating System,
Database Management System,
Statistical analysis package,
Numerical Analysis,
Graphics,
Artificial Intelligence,
Simulation

31. What are the major data structures used in the following areas : network data model & Hierarchical data model?
RDBMS – Array (i.e. Array of structures)
Network data model – Graph
Hierarchical data model – Trees

32. If you are using C language to implement the heterogeneous linked list, what pointer type will you use?
The heterogeneous linked list contains different data types in its nodes and we need a link, pointer to connect them. It is not possible to use ordinary pointers for this. So we go for void pointer. Void pointer is capable of storing pointer to any type as it is a generic pointer type.

33. Minimum number of queues needed to implement the priority queue?
Two. One queue is used for actual storing of data and another for storing priorities.

34. What is the data structures used to perform recursion?
Stack. Because of its LIFO (Last In First Out) property it remembers its ‘caller’ so knows whom to return when the function has to return. Recursion makes use of system stack for storing the return addresses of the function calls.
Every recursive function has its equivalent iterative (non-recursive) function. Even when such equivalent iterative procedures are written, explicit stack is to be used.

35. What are the notations used in Evaluation of Arithmetic Expressions using prefix and postfix forms?
Polish and Reverse Polish notations.

36. Convert the expression ((A + B) * C – (D – E) ^ (F + G)) to equivalent Prefix and Postfix notations?
1.Prefix Notation:
^ – * +ABC – DE + FG
2.Postfix Notation:
AB + C * DE – – FG + ^

37. Sorting is not possible by using which of the following methods?
(a) Insertion
(b) Selection
(c) Exchange
(d) Deletion
(d) Deletion.
Using insertion we can perform insertion sort, using selection we can perform selection sort, using exchange we can perform the bubble sort (and other similar sorting methods). But no sorting method can be done just using deletion.

38. List out few of the Application of tree data-structure?
The manipulation of Arithmetic expression,
Symbol Table construction,
Syntax analysis.

39. List out few of the applications that make use of Multilinked Structures?
Sparse matrix, Index generation.

40. in tree construction which is the suitable efficient data structure?
(A) Array (b) Linked list (c) Stack (d) Queue (e) none
(b) Linked list

41. What is the type of the algorithm used in solving the 8 Queens problem?
Backtracking

42. In an AVL tree, at what condition the balancing is to be done?
If the ‘pivotal value’ (or the ‘Height factor’) is greater than 1 or less than –1.

43. In RDBMS, what is the efficient data structure used in the internal storage representation?
B+ tree. Because in B+ tree, all the data is stored only in leaf nodes, that makes searching easier. This corresponds to the records that shall be stored in leaf nodes.

45. One of the following tree structures, which is, efficient considering space and time complexities?
a) Incomplete Binary Tree.
b) Complete Binary Tree.
c) Full Binary Tree.
b) Complete Binary Tree.
By the method of elimination:
Full binary tree loses its nature when operations of insertions and deletions are done. For incomplete binary trees,
extra property of complete binary tree is maintained even after operations like additions and deletions are done on it.

46. What is a spanning Tree?
A spanning tree is a tree associated with a network. All the nodes of the graph appear on the tree once. A minimum spanning tree is a spanning tree organized so that the total edge weight between nodes is minimized.

47. Does the minimum spanning tree of a graph give the shortest distance between any 2 specified nodes?
No.Minimal spanning tree assures that the total weight of the tree is kept at its minimum. But it doesn’t mean that the distance between any two nodes involved in the minimum-spanning tree is minimum.

48. Whether Linked List is linear or Non-linear data structure?
According to Storage Linked List is a Non-linear one.

TOP 50 Oops VIVA Questions and Answers

0 comments

Recently Asked Oops VIVA Questions and Answers:



1. What is OOPS?
OOPS is abbreviated as Object Oriented Programming system in which programs are considered as a collection of objects. Each object is nothing but an instance of a class.

2. Write basic concepts of OOPS?
Following are the concepts of OOPS and are as follows:.

Abstraction.
Encapsulation.
Inheritance.
Polymorphism.

3. What is a class?
A class is simply a representation of a type of object. It is the blueprint/ plan/ template that describe the details of an object.

4. What is an object?
Object is termed as an instance of a class, and it has its own state, behavior and identity.

5. What is Encapsulation?
Encapsulation is an attribute of an object, and it contains all data which is hidden. That hidden data can be restricted to the members of that class.

6. What is Polymorphism?
Polymorphism is nothing butassigning behavior or value in a subclass to something that was already declared in the main class. Simply, polymorphism takes more than one form.

7. What is Inheritance?
Inheritance is a concept where one class shares the structure and behavior defined in another class. Ifinheritance applied on one class is called Single Inheritance, and if it depends on multiple classes, then it is called multiple Inheritance.

8. What are manipulators?
Manipulators are the functions which can be used in conjunction with the insertion (<<) and extraction (>>) operators on an object. Examples are endl and setw.

9. Define a constructor?
Constructor is a method used to initialize the state of an object, and it gets invoked at the time of object creation.

10. Define Destructor?
Destructor is a method which is automatically called when the object ismade ofscope or destroyed. Destructor name is also same asclass name but with the tilde symbol before the name.

11. What is Inline function?
Inline function is a technique used by the compilers and instructs to insert complete body of the function wherever that function is used in the program source code.

12. What is avirtual function?
Virtual function is a member function ofclass and its functionality can be overridden in its derived class. This function can be implemented by using a keyword called virtual, and it can be given during function declaration.Virtual function can be achieved in C++, and it can be achieved in C Language by using function pointers or pointers to function.

13. What isfriend function?
Friend function is a friend of a class that is allowed to access to Public, private or protected data in that same class. If the function is defined outside the class cannot access such information.
Friend can be declared anywhere in the class declaration, and it cannot be affected by access control keywords like private, public or protected.

14. What is function overloading?
Function overloading is defined as a normal function, but it has the ability to perform different tasks. It allows creation of several methods with the same name which differ from each other by type of input and output of the function.
Example:
void add(int& a, int& b);
void add(double& a, double& b);
void add(struct bob& a, struct bob& b);

15. What is operator overloading?
Operator overloading is a function where different operators are applied and depends on the arguments. Operator,-,* can be used to pass through the function , and it has their own precedence to execute.

Example:
class complex {
double real, imag;

public:
complex(double r, double i) :
real(r), imag(i) {}
complex operator+(complex a, complex b);
complex operator*(complex a, complex b);
complex& operator=(complex a, complex b);
}

a=1.2, b=6

16. What is an abstract class?
An abstract class is a class which cannot be instantiated. Creation of an object is not possible withabstract class , but it can be inherited. An abstract class can be contain members, methods and also Abstract method.

A method that is declared as abstract and does not have implementation is known as abstract method.

Syntax:
               abstract void show();    //no body and abstract keyword

17. What is a ternary operator?
Ternary operator is said to be an operator which takes three arguments. Arguments and results are of different data types , and it is depends on the function. Ternary operator is also called asconditional operator.

18. What is the use of finalize method?
Finalize method helps to perform cleanup operations on the resources which are not currently used. Finalize method is protected , and it is accessible only through this class or by a derived class.

19. What are different types of arguments?
A parameter is a variable used during the declaration of the function or subroutine and arguments are passed to the function , and it should match with the parameter defined. There are two types of Arguments.
Call by Value – Value passed will get modified only inside the function , and it returns the same value whatever it is passed it into the function.
Call by Reference – Value passed will get modified in both inside and outside the functions and it returns the same or different value.

20. What is super keyword?
Super keyword is used to invoke overridden method which overrides one of its superclass methods. This keyword allows to access overridden methods and also to access hidden members of the super class.It also forwards a call from a constructor to a constructor in the super class.

21. What is method overriding?
Method overriding is a feature that allows sub class to provide implementation of a method that is already defined in the main class. This will overrides the implementation in the superclass by providing the same method name, same parameter and same return type.

22. What is an interface?
An interface is a collection of abstract method. If the class implements an inheritance, and then thereby inherits all the abstract methods of an interface.

23. What is exception handling?
Exception is an event that occurs during the execution of a program. Exceptions can be of any type – Run time exception, Error exceptions. Those exceptions are handled properly through exception handling mechanism like try, catch and throw keywords.

24. What are tokens?
Token is recognized by a compiler and it cannot be broken down into component elements. Keywords, identifiers, constants, string literals and operators are examples of tokens.
Even punctuation characters are also considered as tokens – Brackets, Commas, Braces and Parentheses.

25. Difference between overloading and overriding?

Overloading is static binding whereas Overriding is dynamic binding. Overloading is nothing but the same method with different arguments , and it may or may not return the same value in the same class itself.
Overriding is the same method names with same arguments and return types associates with the class and its child class.

26. Difference between class and an object?
An object is an instance of a class. Objects hold any information , but classes don’t have any information. Definition of properties and functions can be done at class and can be used by the object.
Class can have sub-classes, and an object doesn’t have sub-objects.

27. What is an abstraction?
Abstraction is a good feature of OOPS , and it shows only the necessary details to the client of an object. Means, it shows only necessary details for an object, not the inner details of an object. Example – When you want to switch On television, it not necessary to show all the functions of TV. Whatever is required to switch on TV will be showed by using abstract class.

28. What are access modifiers?
Access modifiers determine the scope of the method or variables that can be accessed from other various objects or classes. There are 5 types of access modifiers , and they are as follows:.

Private.
Protected.
Public.
Friend.
Protected Friend.

29. What is sealed modifiers?
Sealed modifiers are the access modifiers where it cannot be inherited by the methods. Sealed modifiers can also be applied to properties, events and methods. This modifier cannot be applied to static members.

30. How can we call the base method without creating an instance?
Yes, it is possible to call the base method without creating an instance. And that method should be,.Static method.Doing inheritance from that class.-Use Base Keyword from derived class.

31. What is the difference between new and override?
The new modifier instructs the compiler to use the new implementation instead of the base class function. Whereas, Override modifier helps to override the base class function.

32. What are the various types of constructors?
There are three various types of constructors , and they are as follows:.

- Default Constructor – With no parameters.
- Parametric Constructor – With Parameters. Create a new instance of a class and also passing arguments simultaneously.
- Copy Constructor – Which creates a new object as a copy of an existing object.

33. What is early and late binding?
Early binding refers to assignment of values to variables during design time whereas late binding refers to assignment of values to variables during run time.

34. What is ‘this’ pointer?
THIS pointer refers to the current object of a class. THIS keyword is used as a pointer which differentiates between the current object with the global object. Basically, it refers to the current object.

35. What is the difference between structure and a class?
Structure default access type is public , but class access type is private. A structure is used for grouping data whereas class can be used for grouping data and methods.
Structures are exclusively used for dataand it doesn’t require strict validation , but classes are used to encapsulates and inherit data which requires strict validation.

36. What is the default access modifier in a class?
The default access modifier of a class is Private by default.

37. What is pure virtual function?
A pure virtual function is a function which can be overridden in the derived classbut cannot be defined. A virtual function can be declared as Pure by using the operator =0.

Example -.
Virtual void function1() // Virtual, Not pure
Virtual void function2() = 0 //Pure virtual

38. What are all the operators that cannot be overloaded?
Following are the operators that cannot be overloaded -.

Scope Resolution (:: )
Member Selection (.)
Member selection through a pointer to function (.*)

39. What is dynamic or run time polymorphism?
Dynamic or Run time polymorphism is also known as method overriding in which call to an overridden function is resolved during run time, not at the compile time. It means having two or more methods with the same name,same signature but with different implementation.

40. Do we require parameter for constructors?
No, we do not require parameter for constructors.

41. What is a copy constructor?
This is a special constructor for creating a new object as a copy of an existing object. There will be always only on copy constructor that can be either defined by the user or the system.

42. What does the keyword virtual represented in the method definition?
It means, we can override the method.

43. Whether static method can use non static members?
False.

44. What arebase class, sub class and super class?
Base class is the most generalized class , and it is said to be a root class.
Sub class is a class that inherits from one or more base classes.
Super class is the parent class from which another class inherits.

45. What is static and dynamic binding?
Binding is nothing but the association of a name with the class. Static binding is a binding in which name can be associated with the class during compilation time , and it is also called as early Binding.
Dynamic binding is a binding in which name can be associated with the class during execution time , and it is also called as Late Binding.

46. How many instances can be created for an abstract class?
Zero instances will be created for an abstract class.

47. Which keyword can be used for overloading?
Operator keyword is used for overloading.

48. What is the default access specifier in a class definition?
Private access specifier is used in a class definition.

49. Which OOPS concept is used as reuse mechanism?
Inheritance is the OOPS concept that can be used as reuse mechanism.

50. Which OOPS concept exposes only necessary information to the calling functions?
Data Hiding / Abstraction

Viva question and answers of UML

0 comments

Common UML VIVA Questions and Answers:




1.What is UML?
UML stands for the Unified Modeling Language.
It is a graphical language for 1) visualizing, 2) constructing, and 3) documenting the artifacts of a system.
It allows you to create a blue print of all the aspects of the system, before actually physically implementing the system.

2.What are the advantages of creating a model?
Modeling is a proven and well-accepted engineering technique which helps build a model.
Model is a simplification of reality; it is a blueprint of the actual system that needs to be built.
Model helps to visualize the system.
Model helps to specify the structural and behavior of the system.
Model helps make templates for constructing the system.
Model helps document the system.

3.What are the different views that are considered when building an object-oriented software system? 
Normally there are 5 views.
Use Case view - This view exposes the requirements of a system.
Design View - Capturing the vocabulary.
Process View - modeling the distribution of the systems processes and threads.
Implementation view - addressing the physical implementation of the system.
Deployment view - focus on the modeling the components required for deploying the system.

4.What are the major three types of modeling used?
The 3 Major types of modeling are
architectural,
behavioral, and
structural.
5.Name 9 modeling diagrams that are frequently used?
9 Modeling diagrams that are commonly used are
Use case diagram
Class Diagram
Object Diagram
Sequence Diagram
statechart Diagram
Collaboration Diagram
Activity Diagram
Component diagram
Deployment Diagram.

6.How would you define Architecture?
Architecture is not only taking care of the structural and behavioral aspect of a software system but also taking into account the software usage, functionality, performance, reuse, economic and technology constraints.

7.What is SDLC (Software Development Life Cycle)?
SDLC is a system including processes that are
Use case driven,
Architecture centric,
Iterative, and
Incremental.

8.What is the Life Cycle divided into?
This Life cycle is divided into phases.
Each Phase is a time span between two milestones.
The milestones are
Inception,
Elaboration,
Construction, and
Transition.

9.What are the Process Workflows that evolve through these phases?
The Process Workflows that evolve through these phases are
Business Modeling,
Requirement gathering,
Analysis and Design,
Implementation,
Testing,
Deployment.
Supporting Workflows are Configuration, change management, and Project management.

10.What are Relationships?
There are different kinds of relationships:
Dependencies,
Generalization, and
Association.
Dependencies are relationships between two entities.
A change in specification of one thing may affect another thing.
Most commonly it is used to show that one class uses another class as an argument in the signature of the operation.

Generalization is relationships specified in the class subclass scenario, it is shown when one entity inherits from other.
Associations are structural relationships that are:
a room has walls,
Person works for a company.

Aggregation is a type of association where there is a has a relationship.
As in the following examples: A room has walls, or if there are two classes room and walls then the relation ship is called a association and further defined as an aggregation.

11.How are the diagrams divided? 
The nine diagrams are divided into static diagrams and dynamic diagrams.

 12.Static Diagrams (Also called Structural Diagram): 
The following diagrams are static diagrams.
Class diagram,
Object diagram,
Component Diagram,
Deployment diagram.

13.Dynamic Diagrams (Also called Behavioral Diagrams):
The following diagrams are dynamic diagrams.
Use Case Diagram,
Sequence Diagram,
Collaboration Diagram,
Activity diagram,
Statechart diagram.

14.What are Messages?
A message is the specification of a communication, when a message is passed that results in action that is in turn an executable statement.

15.What is an Use Case?
A use case specifies the behavior of a system or a part of a system.
Use cases are used to capture the behavior that need to be developed.
It involves the interaction of actors and the system.

Common Computer Networks Viva Questions - Practical Quiz Questions And Answers

0 comments

Frequently Asked Computer Networks Viva Questions and Answers:




1. Define Network?
A network is a set of devices connected by physical media links. A network is recursively is a connection of two or more nodes by a physical link or two or more networks connected by one or more nodes.

2. What is a Link?
At the lowest level, a network can consist of two or more computers directly connected by some physical medium such as coaxial cable or optical fiber. Such a physical medium is called as Link.

3. What is a node?
A network can consist of two or more computers directly connected by some physical medium such as coaxial cable or optical fiber. Such a physical medium is called as Links and the computer it connects is called as Nodes.

4. What is a gateway or Router?
A node that is connected to two or more networks is commonly called as router or Gateway. It generally forwards message from one network to another.

5. What is point-point link?
If the physical links are limited to a pair of nodes it is said to be point-point link.

6. What is Multiple Access?
If the physical links are shared by more than two nodes, it is said to be Multiple Access.

7. What are the advantages of Distributed Processing?
a. Security/Encapsulation
b. Distributed database
c. Faster Problem solving
d. Security through redundancy
e. Collaborative Processing

8. What are the criteria necessary for an effective and efficient network?
a. Performance
   It can be measured in many ways, including transmit time and response time. b. Reliability
   It is measured by frequency of failure, the time it takes a link to recover from a failure, and the network's robustness.
c. Security
   Security issues includes protecting data from unauthorized access and virues.

9. Name the factors that affect the performance of the network?
a. Number of Users
b. Type of transmission medium
c. Hardware
d. Software

10. Name the factors that affect the reliability of the network?
a. Frequency of failure
b. Recovery time of a network after a failure

11. Name the factors that affect the security of the network?
a. Unauthorized Access
b. Viruses

12. What is Protocol?
A protocol is a set of rules that govern all aspects of information communication.

13. What are the key elements of protocols?
The key elements of protocols are
a. Syntax
   It refers to the structure or format of the data, that is the order in which they are presented.
b. Semantics
   It refers to the meaning of each section of bits.
c. Timing
   Timing refers to two characteristics: When data should be sent and how fast they can be sent.

14. What are the key design issues of a computer Network?
a. Connectivity
b. Cost-effective Resource Sharing
c. Support for common Services
d. Performance

15. Define Bandwidth and Latency?
Network performance is measured in Bandwidth (throughput) and Latency (Delay). Bandwidth of a network is given by the number of bits that can be transmitted over the network in a certain period of time. Latency corresponds to how long it t5akes a message to travel from one end off a network to the other. It is strictly measured in terms of time.

16. Define Routing?
The process of determining systematically hoe to forward messages toward the destination nodes based on its address is called routing.

17. What is a peer-peer process?
The processes on each machine that communicate at a given layer are called peer-peer process.

18. When a switch is said to be congested?
It is possible that a switch receives packets faster than the shared link can accommodate and stores in its memory, for an extended period of time, then the switch will eventually run out of buffer space, and some packets will have to be dropped and in this state is said to congested state.

19. What is semantic gap?
Defining a useful channel involves both understanding the applications requirements and recognizing the limitations of the underlying technology. The gap between what applications expects and what the underlying technology can provide is called semantic gap.

20. What is Round Trip Time?
The duration of time it takes to send a message from one end of a network to the other and back, is called RTT.

21. Define the terms Unicasting, Multiccasting and Broadcasting?
If the message is sent from a source to a single destination node, it is called Unicasting.
If the message is sent to some subset of other nodes, it is called Multicasting.
If the message is sent to all the m nodes in the network it is called Broadcasting.
22. What is Multiplexing?
Multiplexing is the set of techniques that allows the simultaneous transmission of multiple signals across a single data link.
23. Name the categories of Multiplexing?
a. Frequency Division Multiplexing (FDM)
b. Time Division Multiplexing (TDM)
   i. Synchronous TDM
   ii. ASynchronous TDM Or Statistical TDM.
c. Wave Division Multiplexing (WDM)
24. What is FDM?
FDM is an analog technique that can be applied when the bandwidth of a link is greater than the combined bandwidths of the signals to be transmitted.
25. What is WDM?
WDM is conceptually the same as FDM, except that the multiplexing and demultiplexing involve light signals transmitted through fiber optics channel.
26. What is TDM?
TDM is a digital process that can be applied when the data rate capacity of the transmission medium is greater than the data rate required by the sending and receiving devices.
27. What is Synchronous TDM?
In STDM, the multiplexer allocates exactly the same time slot to each device at all times, whether or not a device has anything to transmit.
28. List the layers of OSI
a. Physical Layer
b. Data Link Layer
c. Network Layer
d. Transport Layer
e. Session Layer
f. Presentation Layer
g. Application Layer
29. Which layers are network support layers?
a. Physical Layer
b. Data link Layer and
c. Network Layers
30. Which layers are user support layers?
a. Session Layer
b. Presentation Layer and
c. Application Layer
31. Which layer links the network support layers and user support layers?
The Transport layer links the network support layers and user support layers.
32. What are the concerns of the Physical Layer?
Physical layer coordinates the functions required to transmit a bit stream over a physical medium.
a. Physical characteristics of interfaces and media
b. Representation of bits
c. Data rate
d. Synchronization of bits
e. Line configuration
f. Physical topology
g. Transmission mode
33. What are the responsibilities of Data Link Layer?
The Data Link Layer transforms the physical layer, a raw transmission facility, to a reliable link and is responsible for node-node delivery.
a. Framing
b. Physical Addressing
c. Flow Control
d. Error Control
e. Access Control
34. What are the responsibilities of Network Layer?
The Network Layer is responsible for the source-to-destination delivery of packet possibly across multiple networks (links).
a. Logical Addressing
b. Routing
35. What are the responsibilities of Transport Layer?
The Transport Layer is responsible for source-to-destination delivery of the entire message.
a. Service-point Addressing
b. Segmentation and reassembly
c. Connection Control
d. Flow Control
e. Error Control
36. What are the responsibilities of Session Layer?
The Session layer is the network dialog Controller. It establishes, maintains and synchronizes the interaction between the communicating systems.
a. Dialog control
b. Synchronization
37. What are the responsibilities of Presentation Layer?
The Presentation layer is concerned with the syntax and semantics of the information exchanged between two systems.
a. Translation
b. Encryption
c. Compression
38. What are the responsibilities of Application Layer?
The Application Layer enables the user, whether human or software, to access the network. It provides user interfaces and support for services such as e-mail, shared database management and other types of distributed information services.
a. Network virtual Terminal
b. File transfer, access and Management (FTAM)
c. Mail services
d. Directory Services
39. What are the two classes of hardware building blocks?
Nodes and Links.
40. What are the different link types used to build a computer network?
a. Cables
b. Leased Lines
c. Last-Mile Links
d. Wireless Links
41. What are the categories of Transmission media?
a. Guided Media
  i. Twisted - Pair cable
    1. Shielded TP
    2. Unshielded TP
  ii. Coaxial Cable
  iii. Fiber-optic cable
b. Unguided Media
  i. Terrestrial microwave
  ii. Satellite Communication
42. What are the types of errors?
a. Single-Bit error
  In a single-bit error, only one bit in the data unit has changed
b. Burst Error
  A Burst error means that two or more bits in the data have changed.
43. What is Error Detection? What are its methods?
Data can be corrupted during transmission. For reliable communication errors must be deducted and Corrected. Error Detection uses the concept of redundancy, which means adding extra bits for detecting errors at the destination. The common Error Detection methods are
  a. Vertical Redundancy Check (VRC)
  b. Longitudinal Redundancy Check (VRC)
  c. Cyclic Redundancy Check (VRC)
  d. Checksum
44. What is Redundancy?
The concept of including extra information in the transmission solely for the purpose of comparison. This technique is called redundancy.
45. What is VRC?
It is the most common and least expensive mechanism for Error Detection. In VRC, a parity bit is added to every data unit so that the total number of 1s becomes even for even parity. It can detect all single-bit errors. It can detect burst errors only if the total number of errors in each data unit is odd.
46. What is LRC?
In LRC, a block of bits is divided into rows and a redundant row of bits is added to the whole block. It can detect burst errors. If two bits in one data unit are damaged and bits in exactly the same positions in another data unit are also damaged, the LRC checker will not detect an error. In LRC a redundant data unit follows n data units.
47. What is CRC?
CRC, is the most powerful of the redundancy checking techniques, is based on binary division.
48. What is Checksum?
Checksum is used by the higher layer protocols (TCP/IP) for error detection
49. List the steps involved in creating the checksum.
a. Divide the data into sections
b. Add the sections together using 1's complement arithmetic
c. Take the complement of the final sum, this is the checksum.
50. What are the Data link protocols?
Data link protocols are sets of specifications used to implement the data link layer. The categories of Data Link protocols are 1. Asynchronous Protocols
2. Synchronous Protocols
  a. Character Oriented Protocols
  b. Bit Oriented protocols
51. Compare Error Detection and Error Correction:
The correction of errors is more difficult than the detection. In error detection, checks only any error has occurred. In error correction, the exact number of bits that are corrupted and location in the message are known. The number of the errors and the size of the message are important factors.
52. What is Forward Error Correction?
Forward error correction is the process in which the receiver tries to guess the message by using redundant bits.
53. Define Retransmission?
Re transmission is a technique in which the receiver detects the occurrence of an error and asks the sender to resend the message. Re sending is repeated until a message arrives that the receiver believes is error-freed.
54. What are Data Words?
In block coding, we divide our message into blocks, each of k bits, called datawords. The block coding process is one-to-one. The same dataword is always encoded as the same codeword.
55. What are Code Words?
"r" redundant bits are added to each block to make the length n = k + r. The resulting n-bit blocks are called codewords. 2n - 2k codewords that are not used. These codewords are invalid or illegal.
56. What is a Linear Block Code?
A linear block code is a code in which the exclusive OR (addition modulo-2) of two valid codewords creates another valid codeword.
57. What are Cyclic Codes?
Cyclic codes are special linear block codes with one extra property. In a cyclic code, if a codeword is cyclically shifted (rotated), the result is another codeword.
58. Define Encoder?
A device or program that uses predefined algorithms to encode, or compress audio or video data for storage or transmission use. A circuit that is used to convert between digital video and analog video.
59. Define Decoder?
A device or program that translates encoded data into its original format (e.g. it decodes the data). The term is often used in reference to MPEG-2 video and sound data, which must be decoded before it is output.
60. What is Framing?
Framing in the data link layer separates a message from one source to a destination, or from other messages to other destinations, by adding a sender address and a destination address. The destination address defines where the packet has to go and the sender address helps the recipient acknowledge the receipt.
61. What is Fixed Size Framing?
In fixed-size framing, there is no need for defining the boundaries of the frames. The size itself can be used as a delimiter.
62. Define Character Stuffing?
In byte stuffing (or character stuffing), a special byte is added to the data section of the frame when there is a character with the same pattern as the flag. The data section is stuffed with an extra byte. This byte is usually called the escape character (ESC), which has a predefined bit pattern. Whenever the receiver encounters the ESC character, it removes it from the data section and treats the next character as data, not a delimiting flag.
63. What is Bit Stuffing?
Bit stuffing is the process of adding one extra 0 whenever five consecutive Is follow a 0 in the data, so that the receiver does not mistake the pattern 0111110 for a flag.
64. What is Flow Control?
Flow control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment.
65. What is Error Control ?
Error control is both error detection and error correction. It allows the receiver to inform the sender of any frames lost or damaged in transmission and coordinates the retransmission of those frames by the sender. In the data link layer, the term error control refers primarily to methods of error detection and re transmission.
66. What Automatic Repeat Request (ARQ)?
Error control is both error detection and error correction. It allows the receiver to inform the sender of any frames lost or damaged in transmission and coordinates the retransmission of those frames by the sender. In the data link layer, the term error control refers primarily to methods of error detection and retransmission. Error control in the data link layer is often implemented simply: Any time an error is detected in an exchange, specified frames are retransmitted. This process is called automatic repeat request (ARQ).
67. What is Stop-and-Wait Protocol?
In Stop and wait protocol, sender sends one frame, waits until it receives confirmation from the receiver (okay to go ahead), and then sends the next frame.
68. What is Stop-and-Wait Automatic Repeat Request?
Error correction in Stop-and-Wait ARQ is done by keeping a copy of the sent frame and retransmitting of the frame when the timer expires.
69. What is usage of Sequence Number in Relaible Transmission?
The protocol specifies that frames need to be numbered. This is done by using sequence numbers. A field is added to the data frame to hold the sequence number of that frame. Since we want to minimize the frame size, the smallest range that provides unambiguous communication. The sequence numbers can wrap around.
70. What is Pipelining ?
In networking and in other areas, a task is often begun before the previous task has ended. This is known as pipelining.
71. What is Sliding Window?
The sliding window is an abstract concept that defines the range of sequence numbers that is the concern of the sender and receiver. In other words, he sender and receiver need to deal with only part of the possible sequence numbers.
72. What is Piggy Backing?
A technique called piggybacking is used to improve the efficiency of the bidirectional protocols. When a frame is carrying data from A to B, it can also carry control information about arrived (or lost) frames from B; when a frame is carrying data from B to A, it can also carry control information about the arrived (or lost) frames from A.
73. What are the two types of transmission technology available?
(i) Broadcast and (ii) point-to-point
74. What is subnet?
A generic term for section of a large networks usually separated by a bridge or router.
75. Difference between the communication and transmission.
Transmission is a physical movement of information and concern issues like bit polarity, synchronisation, clock etc.
Communication means the meaning full exchange of information between two communication media.
76. What are the possible ways of data exchange?
(i) Simplex (ii) Half-duplex (iii) Full-duplex.
77. What is SAP?
Series of interface points that allow other computers to communicate with the other layers of network protocol stack.
78. What do you meant by "triple X" in Networks?
The function of PAD (Packet Assembler Disassembler) is described in a document known as X.3. The standard protocol has been defined between the terminal and the PAD, called X.28; another standard protocol exists between hte PAD and the network, called X.29. Together, these three recommendations are often called "triple X".
79. What is frame relay, in which layer it comes?
Frame relay is a packet switching technology. It will operate in the data link layer.
80. What is terminal emulation, in which layer it comes?
Telnet is also called as terminal emulation. It belongs to application layer.
81. What is Beaconing?
The process that allows a network to self-repair networks problems. The stations on the network notify the other stations on the ring when they are not receiving the transmissions. Beaconing is used in Token ring and FDDI networks.
82. What is redirector?
Redirector is software that intercepts file or prints I/O requests and translates them into network requests. This comes under presentation layer.
83. What is NETBIOS and NETBEUI?
NETBIOS is a programming interface that allows I/O requests to be sent to and received from a remote computer and it hides the networking hardware from applications.
NETBEUI is NetBIOS extended user interface. A transport protocol designed by microsoft and IBM for the use on small subnets.

84. What is RAID?
A method for providing fault tolerance by using multiple hard disk drives.

85. What is passive topology?
When the computers on the network simply listen and receive the signal, they are referred to as passive because they don't amplify the signal in any way. Example for passive topology -linear bus.

86. What is Brouter?
Hybrid devices that combine the features of both bridges and routers.

87. What is cladding?
A layer of a glass surrounding the center fiber of glass inside a fiber-optic cable.

88. What is point-to-point protocol?
A communications protocol used to connect computers to remote networking services including Internet service providers.

89. How Gateway is different from Routers?
A gateway operates at the upper levels of the OSI model and translates information between two completely different network architectures or data formats.

90. What is attenuation?
The degeneration of a signal over distance on a network cable is called attenuation.

91. What is MAC address?
The address for a device as it is identified at the Media Access Control (MAC) layer in the network architecture. MAC address is usually stored in ROM on the network adapter card and is unique.

92. Difference between bit rate and baud rate.
Bit rate is the number of bits transmitted during one second whereas baud rate refers to the number of signal units per second that are required to represent those bits.
  baud rate = (bit rate / N)
  where N is no-of-bits represented by each signal shift.

93. What is Bandwidth?
Every line has an upper limit and a lower limit on the frequency of signals it can carry. This limited range is called the bandwidth.

94. What are the types of Transmission media?
Signals are usually transmitted over some transmission media that are broadly classified in to two categories.
a.) Guided Media: These are those that provide a conduit from one device to another that include twisted-pair, coaxial cable and fiber-optic cable. A signal traveling along any of these media is directed and is contained by the physical limits of the medium. Twisted-pair and coaxial cable use metallic that accept and transport signals in the form of electrical current. Optical fiber is a glass or plastic cable that accepts and transports signals in the form of light.
b.) Unguided Media: This is the wireless media that transport electromagnetic waves without using a physical conductor. Signals are broadcast either through air. This is done through radio communication, satellite communication and cellular telephony.

95. What is Project 802?
It is a project started by IEEE to set standards to enable intercommunication between equipment from a variety of manufacturers. It is a way for specifying functions of the physical layer, the data link layer and to some extent the network layer to allow for interconnectivity of major LAN protocols.
It consists of the following:
1.    802.1 is an internetworking standard for compatibility of different LANs and MANs across protocols.
2.    802.2 Logical link control (LLC) is the upper sublayer of the data link layer which is non-architecture-specific, that is remains the same for all IEEE-defined LANs.
3.    Media access control (MAC) is the lower sublayer of the data link layer that contains some distinct modules each carrying proprietary information specific to the LAN product being used. The modules are Ethernet LAN (802.3), Token ring LAN (802.4), Token bus LAN (802.5).
4.    802.6 is distributed queue dual bus (DQDB) designed to be used in MANs.
96. What is Protocol Data Unit?
The data unit in the LLC level is called the protocol data unit (PDU). The PDU contains of four fields a destination service access point (DSAP), a source service access point (SSAP), a control field and an information field. DSAP, SSAP are addresses used by the LLC to identify the protocol stacks on the receiving and sending machines that are generating and using the data. The control field specifies whether the PDU frame is a information frame (I - frame) or a supervisory frame (S - frame) or a unnumbered frame (U - frame).

97. What are the different type of networking / internetworking devices?
1.    Repeater: Also called a regenerator, it is an electronic device that operates only at physical layer. It receives the signal in the network before it becomes weak, regenerates the original bit pattern and puts the refreshed copy back in to the link.
2.    Bridges: These operate both in the physical and data link layers of LANs of same type. They divide a larger network in to smaller segments. They contain logic that allow them to keep the traffic for each segment separate and thus are repeaters that relay a frame only the side of the segment containing the intended recipent and control congestion.
3.    Routers: They relay packets among multiple interconnected networks (i.e. LANs of different type). They operate in the physical, data link and network layers. They contain software that enable them to determine which of the several possible paths is the best for a particular transmission.
4.    Gateways: They relay packets among networks that have different protocols (e.g. between a LAN and a WAN). They accept a packet formatted for one protocol and convert it to a packet formatted for another protocol before forwarding it. They operate in all seven layers of the OSI model.

98. What is ICMP?
ICMP is Internet Control Message Protocol, a network layer protocol of the TCP/IP suite used by hosts and gateways to send notification of datagram problems back to the sender. It uses the echo test / reply to test whether a destination is reachable and responding. It also handles both control and error messages.

99. What are the data units at different layers of the TCP / IP protocol suite?
The data unit created at the application layer is called a message, at the transport layer the data unit created is called either a segment or an user datagram, at the network layer the data unit created is called the datagram, at the data link layer the datagram is encapsulated in to a frame and finally transmitted as signals along the transmission media.

100. What is difference between ARP and RARP?
The address resolution protocol (ARP) is used to associate the 32 bit IP address with the 48 bit physical address, used by a host or a router to find the physical address of another host on its network by sending a ARP query packet that includes the IP address of the receiver.
The reverse address resolution protocol (RARP) allows a host to discover its Internet address when it knows only its physical address.

101. What is the minimum and maximum length of the header in the TCP segment and IP datagram?
The header should have a minimum length of 20 bytes and can have a maximum length of 60 bytes.

102. What is the range of addresses in the classes of internet addresses?
Class A   -       0.0.0.0   -   127.255.255.255
Class B   -   128.0.0.0   -   191.255.255.255
Class C   -   192.0.0.0   -   223.255.255.255
Class D   -   224.0.0.0   -   239.255.255.255
Class E   -   240.0.0.0   -   247.255.255.255

103. What is the difference between TFTP and FTP application layer protocols?
The Trivial File Transfer Protocol (TFTP) allows a local host to obtain files from a remote host but does not provide reliability or security. It uses the fundamental packet delivery services offered by UDP.
The File Transfer Protocol (FTP) is the standard mechanism provided by TCP / IP for copying a file from one host to another. It uses the services offer by TCP and so is reliable and secure. It establishes two connections (virtual circuits) between the hosts, one for data transfer and another for control information.

104. What are major types of networks and explain?
1.    Server-based network: provide centralized control of network resources and rely on server computers to provide security and network administration
2.    Peer-to-peer network: computers can act as both servers sharing resources and as clients using the resources.

105. What are the important topologies for networks?
1.    BUS topology: In this each computer is directly connected to primary network cable in a single line.
Advantages: Inexpensive, easy to install, simple to understand, easy to extend.
2.    STAR topology: In this all computers are connected using a central hub.
Advantages: Can be inexpensive, easy to install and reconfigure and easy to trouble shoot physical problems.
3.    RING topology: In this all computers are connected in loop. Advantages: All computers have equal access to network media, installation can be simple, and signal does not degrade as much as in other topologies because each computer regenerates it.

106. What is mesh network?
A network in which there are multiple network links between computers to provide multiple paths for data to travel.

107. What is difference between baseband and broadband transmission?
In a baseband transmission, the entire bandwidth of the cable is consumed by a single signal. In broadband transmission, signals are sent on multiple frequencies, allowing multiple signals to be sent simultaneously.

108. Explain 5-4-3 rule?
In a Ethernet network, between any two points on the network ,there can be no more than five network segments or four repeaters, and of those five segments only three of segments can be populated.

109. What MAU?
In token Ring , hub is called Multistation Access Unit(MAU).

110. What is the difference between routable and non- routable protocols?
Routable protocols can work with a router and can be used to build large networks. Non-Routable protocols are designed to work on small, local networks and cannot be used with a router.

111. Why should you care about the OSI Reference Model?
It provides a framework for discussing network operations and design.

112. What is logical link control?
One of two sublayers of the data link layer of OSI reference model, as defined by the IEEE 802 standard. This sublayer is responsible for maintaining the link between computers when they are sending data across the physical network connection.

113. What is virtual channel?
Virtual channel is normally a connection from one source to one destination, although multicast connections are also permitted. The other name for virtual channel is virtual circuit.

114. What is virtual path?
Along any transmission path from a given source to a given destination, a group of virtual circuits can be grouped together into what is called path.

115. What is packet filter?
Packet filter is a standard router equipped with some extra functionality. The extra functionality allows every incoming or outgoing packet to be inspected. Packets meeting some criterion are forwarded normally. Those that fail the test are dropped.

116. What is traffic shaping?
One of the main causes of congestion is that traffic is often busy. If hosts could be made to transmit at a uniform rate, congestion would be less common. Another open loop method to help manage congestion is forcing the packet to be transmitted at a more predictable rate. This is called traffic shaping.

117. What is multicast routing?
Sending a message to a group is called multicasting, and its routing algorithm is called multicast routing.

118. What is region?
When hierarchical routing is used, the routers are divided into what we will call regions, with each router knowing all the details about how to route packets to destinations within its own region, but knowing nothing about the internal structure of other regions.

119. What is silly window syndrome?
It is a problem that can ruin TCP performance. This problem occurs when data are passed to the sending TCP entity in large blocks, but an interactive application on the receiving side reads 1 byte at a time.

120. What are Digrams and Trigrams?
The most common two letter combinations are called as digrams. e.g. th, in, er, re and an. The most common three letter combinations are called as trigrams. e.g. the, ing, and, and ion.
 

Preparation for Engineering . Copyright 2012 All Rights Reserved