3i Infotech Papers: Sample Questions 307 - 309 of 1245

Examrace Placement Series prepares you for the toughest placement exams to top companies.

Question number: 307

» Basic CS » Networks

Short Answer Question▾

Write in Short

How in the SNMP protocol used to interact with the agent?


  • The SNMP server is called a SNMP agent.

  • Located on the device to monitor.

  • Client part is the SNMP manager in charge of the data collection and display.

  • SNMP agent is remote devices out in the network.

  • Agents depend type of network.

  • Agents can be in printers, managed switches, alarm remotes, generators, servers, and other networked devices.

  • Agents report problems and receive commands from a central “manager” using “manager-agent model”.

Question number: 308

» Languages » C & C Plus Plus

Short Answer Question▾

Write in Short

  1. void main ()
  2. {
  3.     int const * p = 5;
  4.     printf (“%d” + + (* p));
  5. }


  • In a program

Table shows the program

Table shows the program

int const * p = 5;

Pointer to constant integer

printf (“%d” ++ (* p) );

We tried to change constant integer value

  • But constant value can’t change

  • So, the answer is Compiler error: Cannot modify a constant value.

Question number: 309

» Basic CS » Networks

Essay Question▾

Describe in Detail

What is source route?


Given source route bridge network.

Given Source Route Bridge Network.

Given source route bridge network.

  • Source route refers to the sequence of IP address identifying the route a datagram must follow- provided by the source of sender.

  • A source route is optionally included in IP datagram header to specify the route that a packet should take through the network.

  • Allows easier troubleshooting, improved trace route, and enables a node to discover all the possible routes to a host.

  • The source route is for guidance- does not allow the source to directly manage network performance by forcing packets to travel over one path.

Uses of Source Routing

  • Troubleshoot a network

  • Map a network

  • Increase network performance

  • Unfortunately it can be used to hack a computer, carry out DoS attacks, snooping etc.