Basic CS [3i Infotech Placement]: Sample Questions 58 - 59 of 243

Glide to success with Doorsteptutor material for competitive exams : get questions, notes, tests, video lectures and more- for all subjects of your exam.

Question 58

Basic CS
Edit

Describe in Detail

Essay▾

What are the two types of transmission technology available?

Explanation

Bellow the two types of transmission technology:

  1. Broadcast network
  2. Point to point network
Two Types of Transmission Technology

Broadcast network:

  • Single communication channel is shared or used by all the machines on the network.
  • Short messages called packets sent by any machine are received by all the others.
  • Broadcast systems also support transmission to a subset of the machines known as multicasting.
  • Upon receiving a packet, a machine checks the address field.
  • If the packet is addressed to it than the packet is processed, otherwise the packet is ignored.

Point to point network:

  • Such networks consist of many connections between individual pairs of machines.
  • Packets on these networks traverse all intermediate computers before they reach the desired computer.
  • Packets can take different routes if a particular route is congested.
  • Packets can follow multiple routes of different lengths.
  • Routing algorithms are very important in the point to point networks.

Question 59

Edit

Describe in Detail

Essay▾

What is a trap and trapdoor?

Explanation

Image Shows the TRAP
Image Shows the Trap Door

Trap

  • Trap is a software generate interrupt.
  • Occurs when some exceptional conditions occurs- like divide by 0, process accessing memory outside address space.
  • There are two kinds of traps- hard traps are called interrupts, and software related traps are called exceptions.

Trap Door

  • Trap door in modern terminology has nothing to do with traps.
  • It is a secret undocumented entry point into a program granting access without normal authentication.
  • Generally maliciously- hidden software mechanism allowing the attacker to circumvent the security.
  • Malicious code can then allow unauthorized access to a computer system or network accepting remote commands.
  • Code listens for commands on transmission control protocol or user datagram protocol.

Developed by: