Networking technical interview question
85. What is passive topology? When the computers on the network simply listen and receive the signal, they are referred […]
85. What is passive topology? When the computers on the network simply listen and receive the signal, they are referred […]
79. What is frame relay, in which layer it comes? Frame relay is a packet switching technology. It will operate
73. What are the two types of transmission technology available? (i) Broadcast and (ii) point-to-point 74. What is subnet? A
67. What is Stop-and-Wait Protocol? In Stop and wait protocol, sender sends one frame, waits until it receives confirmation from
61. What is Fixed Size Framing? In fixed-size framing, there is no need for defining the boundaries of the frames.
55. What are Code Words? “r” redundant bits are added to each block to make the length n = k
49. List the steps involved in creating the checksum. a. Divide the data into sections b. Add the sections together
43. What is Error Detection? What are its methods? Data can be corrupted during transmission. For reliable communication errors must
37. What are the responsibilities of Presentation Layer? The Presentation layer is concerned with the syntax and semantics of the
31. Which layer links the network support layers and user support layers? The Transport layer links the network support layers
25. What is WDM? WDM is conceptually the same as FDM, except that the multiplexing and demultiplexing involve light signals
13. What are the key elements of protocols? The key elements of protocols are a. Syntax It refers to the
. Define Network? A network is a set of devices connected by physical media links. A network is recursively is
. Define Network? A network is a set of devices connected by physical media links. A network is recursively is
139. Explain concurrency transparency. Concurrency transparency is where each transaction in a distributed database is treated as if it is
133. Describe concurrency control. Concurrency control is the process managing simultaneous operations against a database so that database integrity is
121. Describe middleware applications that ease the connection of databases to Web applications. Both ASP and ColdFusion are middleware that
115. Describe the difference between embedded and dynamic SQL. Embedded SQL is the process of including hard coded SQL statements.
109. What are the steps to follow when preparing to create a table? 1. Identify the data type, length, and
103. What is denormalization and why would someone consider doing so? Denormalization is the process of taking normalized relations and
97. List some of the properties of a relation. Relations in a database have a unique name and no multivalued
91. Explain the difference between total specialization and partial specialization. Total specialization exists when every instance of a supertype must
79. The range of database applications can be divided into five categories. Explain the five different categories. Databases can support
61. Why is XML a better markup language than HTML? XML is a better markup language than HTML, primarily because
43. What is deadlock? How can it be avoided? How can it be resolved once it occurs? Deadlock occurs when