Basic CS [TCS Placement]: Sample Questions 84 - 86 of 196
Get unlimited access to the best preparation resource for competitive exams : get questions, notes, tests, video lectures and more- for all subjects of your exam.
Question 84
Write in Short Short Answer▾
What are the major data structures used in the following areas: RDBMS, Network data model and Hierarchical data model.
EditExplanation
- RDBMS = Array (Array of structures)
- Network data model = Graph
- Hierarchical data model = Trees
Question 85
Explanation
- A node connected to two or more networks is called a router or gateway.
- It forwards message from one network to another.
- A gateway in a computer network is a key stopping point for data on its way to or from other networks.
- Gateway routes traffic from a workstation to the outside network that is serving up the web pages.
- For example, for internet connection at home gateway is the Internet Service Provider.
Question 86
Describe in Detail Essay▾
What are the criteria necessary for an effective and efficient network?
EditExplanation
A network must meet a certain criteria to become useable. Most important three criteria are as follows:
Performance:
- Measured in many ways, including transmit time and response time.
- Performance is a measurement of various factors such as the amount of time for messages to travel from one device to another, the time it requires to get a response starting from an inquiry.
- Performance of a network depends on a number of factors such as number of active users, type of the transmission medium, capabilities of the connected hardware, and efficiency of the software.
Reliability:
- Network reliability is measured by the frequency of failure, time it takes to recover from failure, the network՚s robustness.
Security:
- Security includes protecting data from unauthorized access and malicious programs like viruses.
- Network must be secured- data sent should reach destination without any third-party reading, altering or destroying the data.
- Network must also have secured procedures to recover from data losses and breaches.