3i Infotech Placement: Sample Questions 662 - 664 of 1245

Glide to success with Doorsteptutor material for competitive exams : get questions, notes, tests, video lectures and more- for all subjects of your exam.

Question 662

Edit

Write in Short

Short Answer▾

Integrated check value (ICV) are used as:

Explanation

  • Integrated check values are used to message authentication code, which makes sure that IP header field does not change or is predictable.
  • The client computes the ICV and then compares it with the sender՚s value.
  • It is a variable length field that the field must be an integral multiple of bits in length.
  • The field is variable length to accommodate variations from ICV algorithms, and the length is specified by the selected function.
  • This is an optional field: It is included only when an authentication service is in use for the SA that corresponds to the header.
  • Information about the ICV function in use is maintained along with the rest of the SA data.

Question 663

Write in Short

Short Answer▾

Why are program counter and stack pointer bit registers?

Explanation

  • Program Counter and Stack Pointer hold -bit memory addresses.
  • PC stores the memory address of the next instruction to be fetched.
  • Stack pointer can temporarily store the bit memory address as well as data.
  • So Program counter & Stack pointer are -bit registers.

Question 664

Edit

Describe in Detail

Essay▾

What is FIFO?

Explanation

Formate of FIFO
  • FIFO are pipes with a name- commonly referred as “named pipes” .
  • Pipes are common on Linux command lines but do not have a system-wide name.
  • Two processes that wish to communicate using a pipe need to be related, parent and child or sharing a common parent.

Characteristics of Pipe

  • Different but named like a file.
  • Exists in the file system-but not necessary for the processes to communicate using FIFO.
  • We create a FIFO from the shell using the mknod command.

Developed by: