Basic CS [TCS Placement]: Sample Questions 84 - 86 of 196

Get unlimited access to the best preparation resource for competitive exams : get questions, notes, tests, video lectures and more- for all subjects of your exam.

Question 84

Write in Short Short Answer▾

What are the major data structures used in the following areas: RDBMS, Network data model and Hierarchical data model.

Edit

Explanation

  • RDBMS = Array (Array of structures)
  • Network data model = Graph
  • Hierarchical data model = Trees

Question 85

Describe in Detail Essay▾

What is a gateway or router?

Edit

Explanation

  • A node connected to two or more networks is called a router or gateway.
  • It forwards message from one network to another.
  • A gateway in a computer network is a key stopping point for data on its way to or from other networks.
  • Gateway routes traffic from a workstation to the outside network that is serving up the web pages.
  • For example, for internet connection at home gateway is the Internet Service Provider.
Given the Image is Define the Gateway or Router

Question 86

Describe in Detail Essay▾

What are the criteria necessary for an effective and efficient network?

Edit

Explanation

A network must meet a certain criteria to become useable. Most important three criteria are as follows:

Performance:

  • Measured in many ways, including transmit time and response time.
  • Performance is a measurement of various factors such as the amount of time for messages to travel from one device to another, the time it requires to get a response starting from an inquiry.
  • Performance of a network depends on a number of factors such as number of active users, type of the transmission medium, capabilities of the connected hardware, and efficiency of the software.

Reliability:

  • Network reliability is measured by the frequency of failure, time it takes to recover from failure, the network՚s robustness.

Security:

  • Security includes protecting data from unauthorized access and malicious programs like viruses.
  • Network must be secured- data sent should reach destination without any third-party reading, altering or destroying the data.
  • Network must also have secured procedures to recover from data losses and breaches.