Which of the following network devices is primarily responsible for forwarding data packets between different networks?
A) Router
B) Switch
C) Hub
D) Repeater
A) Router
What is the significance of scalability in network design?
A) Scalability ensures that network devices can communicate with each other effectively.
B) Scalability allows networks to easily expand to accommodate increased traffic or additional users.
C) Scalability refers to the speed at which data can be transmitted over a network.
D) Scalability determines the physical size of the network infrastructure.
B) Scalability allows networks to easily expand to accommodate increased traffic or additional users.
Define the following terms:
Paging
Thrashing
Paging is a memory management scheme that divides memory into fixed-size blocks called pages to facilitate data storage and retrieval.
Thrashing occurs when a computer's performance significantly decreases due to excessive swapping of data between main memory and secondary storage, typically caused by insufficient physical memory for the number of active processes.
What is the primary function of the Network Layer in the OSI Model?
A) It facilitates communication between devices on the same network segment.
B) It establishes and terminates connections between network nodes.
C) It manages the flow of data packets between adjacent network nodes.
D) It determines the optimal path for data packets across multiple networks.
D) It determines the optimal path for data packets across multiple networks.
Describe the role of device drivers in device management. How do they work.
Device drivers are like translators between hardware devices (like printers or keyboards) and the operating system. They help the operating system talk to hardware by converting its commands into a language the hardware understands.
Which of the following transmission media is most susceptible to electromagnetic interference?
A) Twisted Pair Cable
B) Coaxial Cable
C) Fiber Optic Cable
D) Wireless Transmission
D) Wireless Transmission
What is the main advantage of using wired connections over wireless connections in computer networks?
A) Greater mobility and flexibility
B) Lower cost of installation
C) Higher data transfer rates and reliability
D) Reduced interference from external sources
C) Higher data transfer rates and reliability
State (2) two preemptive and (2) two Non preemptive algorithms.
Preemptive Algorithms:
Shortest remaining time first
Round robin
Priority scheduling
Non Preemptive Algorithms
First Come First Serve
Shortest Job First
Priority scheduling
What does network topology refer to in computer networking?
A) The physical layout of network cables and devices.
B) The speed at which data can be transmitted over a network.
C) The security protocols used to protect network traffic.
D) The process of routing data packets between network nodes.
A) The physical layout of network cables and devices.
What is spooling in device management?
A) It refers to the process of storing data temporarily in a cache memory.
B) It involves prioritizing tasks in a queue based on their urgency.
C) It is a technique for optimizing disk storage space by compressing files.
D) It entails storing data temporarily in a buffer before sending it to an output device.
D) It entails storing data temporarily in a buffer before sending it to an output device.
Explain the difference between attenuation and interference in the context of transmission media.
Attenuation refers to the reduction in signal strength as it travels through a medium, leading to a decrease in the quality and integrity of the transmitted data.
Interference, on the other hand, occurs when unwanted signals disrupt the transmission of data, often due to electromagnetic interference (EMI) or radio frequency interference (RFI).
What is the purpose of encryption in network security?
A) To prevent unauthorized access to network devices
B) To detect and mitigate network attacks
C) To ensure data confidentiality and integrity during transmission
D) To monitor and analyze network traffic patterns
C) To ensure data confidentiality and integrity during transmission
What sequence of steps does the operating system execute when a process, P5, has been interrupted by another process with a higher priority, P2, to allow both P2 and P5 to run to completion?
A) P5 is suspended, and P2 is executed until completion; then, P5 resumes execution.
B) P2 is preempted, and P5 is allowed to continue execution until completion; then, P2 resumes execution.
C) P2 and P5 execute concurrently until both complete their tasks simultaneously.
D) P2 is terminated, and P5 resumes execution from the point of interruption until completion.
A) P5 is suspended, and P2 is executed until completion; then, P5 resumes execution.
How many layers are in the OSI Model. Name each Layer.
The OSI (Open Systems Interconnection) Model consists of seven layers..
Physical Layer
Data Link Layer
Network Layer
Transport Layer
Session Layer
Presentation Layer
An ADT is a model defining a set of data values and operations on those values, hiding implementation details. Give 3 examples.
An ADT is a model defining a set of data values and operations on those values, hiding implementation details. Example; Stacks and Queues, Linked List
Describe the process of data transmission through a fiber optic cable
Electrical signals are converted into light signals which travel through the core of the fiber via total internal reflection and are then converted back into electrical signals at the receiving end using a photodetector.
What role does a router play in a computer network?
A router is responsible for forwarding data packets between different networks, allowing devices in one network to communicate with devices in another network.
Which of the following conditions must be satisfied for a deadlock to occur in a system?
A) Mutual exclusion, hold and wait, no preemption, and circular wait.
B) Mutual exclusion, hold and release, resource reclamation, and circular wait.
C) Mutual exclusion, hold and wait, resource preemption, and circular wait.
D) Mutual exclusion, hold and wait, resource allocation, and circular wait.
A) Mutual exclusion, hold and wait, no preemption, and circular wait.
Describe the role of the HTTP protocol in web communication. Discuss the difference between HTTP and HTTPS, and explain why HTTPS is considered more secure.
The HTTP (Hypertext Transfer Protocol) protocol facilitates communication between web clients (such as browsers) and servers.
HTTPS (Hypertext Transfer Protocol Secure) is a secure version of HTTP that adds encryption using SSL/TLS, ensuring data confidentiality and integrity. HTTPS is considered more secure because it encrypts data during transmission, protecting sensitive information from eavesdropping and tampering.
Describe the implementation of a stack ADT using an array. Explain push and pop operations and discuss advantages and limitations.
A stack with an array stores elements in a linear structure. Push adds to the top, and pop removes from the top.
Describe the function of a modem in a network.
A modem (modulator-demodulator) is a device that modulates digital data signals from a computer into analog signals suitable for transmission over a communication channel, such as telephone lines or cable systems. At the receiving end, it demodulates analog signals back into digital data for use by the receiving device.
What is the purpose of a firewall in network security?
A firewall is designed to monitor and control incoming and outgoing network traffic based on predetermined security rules, helping to protect the network from unauthorized access and malicious attacks.
List the (5) five process states of a process, Give a brief definition of each.
New: The process is being created but has not yet been admitted to the pool of executable processes by the operating system. Resources, such as memory space and process control blocks, may be allocated during this stage.
Ready: A process in the ready state is prepared to execute and is waiting for the CPU to be allocated by the scheduler. It has all the necessary resources to run but is waiting in the queue for its turn to be executed.
Running: When a process is in the running state, it is actively being executed by the CPU. The operating system has allocated CPU time to the process, and it is currently executing its instructions.
Blocked (Waiting): A process enters the blocked or waiting state when it cannot proceed until some event occurs. The process is temporarily suspended until the required event takes place.
Terminated (Exited): The terminated state indicates that the process has completed execution or has been forcefully terminated by the operating system.
What is the purpose of the Domain Name System (DNS) protocol in computer networks?
A) To encrypt network communication for secure data transmission.
B) To regulate network traffic and prevent congestion.
C) To translate domain names into IP addresses and vice versa.
D) To establish secure connections between network devices.
C) To translate domain names into IP addresses and vice versa.
Explain the concept of a queue data structure and its fundamental operations. Provide examples of real-world scenarios where queues are used.
A queue follows the FIFO (First-In-First-Out) principle, where elements are added at the rear and removed from the front. Its fundamental operations are enqueue (addition) and dequeue (removal). Examples include supermarket checkout lines, print queues, call centers, and traffic management systems.