Professional Documents
Culture Documents
com
BRANCH: COMPUTER SCIENCE DATA STRUCTURE USING C:-
TIME: 1 hour
MARKS: 100 39. b
O/S:- 40. a
41. b
1. a 42. c
2. d 43. d
3. d 44. d
4. d 45. d
5. a 46. a
6. b 47. b
7. c 48. c
8. b
9. d C LANGUAGE:-
10. d
49. c
11. d
50. c
12. b
51. b
13. c
52. c
14. c
53. b
C.O.A:- 54. d
55. c
15. a 56. a
16. c 57. a
17. b 58. b
18. c 59. a
19. d 60. b
20. b 61. d
21. c 62. a
22. a 63. b
23. d
24. b DE:-
25. c
64. a
26. a
65. a
27. d
66. a
28. b
The DeMorgan’s law states that (AB)’ =
DATA BASE MANAGEMENT SYSTEM:- A’ + B’ & (A + B)’ = A’ * B’, as per the
Dual Property.
29. c 67. B
30. d (A’B + CD’)’ = (A’B)'(CD’)’ (By
31. b DeMorgan’s Theorem) = (A” + B’)(C’ +
32. a D”) (By DeMorgan’s Theorem) = (A +
33. b B’)(C’ + D).
34. b 68. b
35. d (A + B)(A + C) = AA + AC + AB + BC = A +
36. a AC + AB + BC (By Commutative
37. b Property) = A(1 + C + B) + BC = A + BC
38. d (1 + B + C =1 By 1’s Property).
1st Floor, Balkishun Complex, Near Rajeev Nagar Over bridge, Patna-24, 9931160839, 9319327527
STUDY ENGINEERS [GATE | PSU | JE | SEMESTER] www.studyengineers.com
the victim can’t use any bandwidth. In telephone channel. Internet can be
UDP flooding, too many UDP packets are provided through a high-speed
sent by the attacker to the victim at downstream channel in a residential
random ports. telephone line.
82. b 90. c
In Bandwidth flooding, the attacker DSL stands for Digital Subscriber Line
floods the victim machine with a deluge and ISP stands for Internet Service
of packets to make sure that no Provider. In a Digital Subscriber Line
bandwidth is available. The victim then system, the same company which
cannot utilize the complete bandwidth provides phone connection is also an
to perform its operation. ISP. The internet is provided through
83. b the pre-installed telephone lines.
The function of packet sniffers is to just 91. : c
silently receive the packets flowing in Hybrid fiber-coaxial (HFC) is a
the channel. If they inject any packets telecommunications industry term for a
into the channel, they might alert the broadband network that combines
other users about the intrusion. optical fiber and coaxial cable. It has
84. d been popularly used since the early
Switches make sure that the packet is 1990s. It is stronger than the optical
sent to the intended receiver and no one fiber cables and faster than the co-axial
else, thus preventing Sniffers to perform cables.
their function. Intelligent switches are 92. :a
hence used preferably for the network. AON stands for Active optical networks
85. a which are essentially switched
UDP is more vulnerable to attacks, so Ethernets. Each user has his/her own
firewalls are often configured to block dedicated optical fiber line connecting
suspicious UDP traffic. to the ISP in an AON.
86. b 93. d
Since there is no other packet to be Home Internet Access is provided by
transmitted, there is no need for a DSL, FTTP, and Cable. FTTP provides the
queue. Therefore, the delay caused due fastest speeds followed by the cable
to the queuing would be none i.e. 0. connections and then the DSLs. FTTP is
87. a popularly used in modern connections.
Telnet is an application layer protocol 94. d: Because DSL is made of twisted wire
that provides access to the command- copper pair, the gauge of twisted pair
line interface on a remote host. Telnet line i.e. the protection and electrical
stands for teletype network. interference would affect the
88. a transmission rate in DSL. Unlike DSL,
Telnet provides access to the command- FTTP is not really affected by these
line interface on a remote computer. factors.
One can login to the computer from the 95. : b
command-line interface. Explanation: The seven layers in ISO OSI
reference model is Application,
DCN:- Presentation, Session, Transport,
89. c Network, Data link and Physical layer.
A low-speed downstream channel is not OSI stands for Open System
a constituent of a residential telephone Interconnect and it is a generalized
line. But it might be just a two-way model.
1st Floor, Balkishun Complex, Near Rajeev Nagar Over bridge, Patna-24, 9931160839, 9319327527
STUDY ENGINEERS [GATE | PSU | JE | SEMESTER] www.studyengineers.com
96. a
Not only application layer, but
presentation layer, session layer and
transport layer are also implemented in
the end system. The layers below are
implemented outside the end system,
for example, the network layer is
implemented on the routers and the
physical layer is implemented for the
medium.
97. a
Application, Presentation, Session and
Transport layer are implemented in the
end system. The transport layer handles
the process to process delivery of the
packet through ports.
98. d
In OSI reference model, the fifth layer is
Session layer. Session layer provides the
mechanism for opening, closing and
managing a session between end-user
application processes. In TCP/IP
protocol stack, the functions of the
session layer are handled by the
transport layer itself and thus the
session layer is missing from the TCP/IP
model.
99. b
In OSI reference model, when data
packet moves from lower layers to
higher layer, headers get removed.
Whereas when the data packet moves
from higher layer to lower layers,
headers are added. These headers
contain the essential control
information for the protocols used on
the specific layer
100. a
One layer may use the information from
another layer, for example timestamp
value. The information is contained in
the header inserted by the previous
layer. The headers are added as the
packet moves from higher layers to the
lower layers..
1st Floor, Balkishun Complex, Near Rajeev Nagar Over bridge, Patna-24, 9931160839, 9319327527