Find Interview Questions for Top Companies
Ques:- Which is the protocol used in ethernet. (CSMA/CD) Why is it called so ?
Comments
Admin May 17, 2020

CSMA/CD is a media access control mechanism used in Ethernet
to recover from frame collision. The following steps are
followed to recover from a collision.
Step 1: Before an Ethernet device sends a frame on the
Ethernet cable, it listens to find if another device is
already transmitting a frame (Carrier Sense).
Step 2: Once the device finds that other devices are not
transmitting any frame, it starts transmitting the frame. If
two devices detect that the Ethernet cable is free at the
same time, then both will start transmitting the frames
(Multiple Access). This will result in collision.
Step 3: The Ethernet devices while transmitting the frames,
also listen for the collision. (Collision Detect).
Step 4: If they detect a collision, both the devices stop
sending the frame (back off).
Step 5: They retry the transmission after a logarithmic
time-out period. This process is repeated till the frame is
transmitted successfully, for a maximum of 16 times. The
frame is discarded after the 16th retry.

Admin May 17, 2020

CSMA/CD -Its called the carrier Sense Multiple
Access /Collision Detection
Each interface must wait until there is no signal on the
channel, then it can begin transmitting. If some other
interface is transmitting there will be a signal on the
channel, which is called carrier. All other interfaces must
wait until carrier ceases before trying to transmit, and
this process is called Carrier Sense.
All Ethernet interfaces are equal in their ability to send
frames onto the network. No one gets a higher priority than
anyone else, This is what is meant by Multiple Access.
Since signals take a finite time to travel from one end of
an Ethernet system to the other, the first bits of a
transmitted frame do not reach all parts of the network
simultaneously. Therefore, it's possible for two interfaces
to sense that the network is idle and to start transmitting
their frames simultaneously. When this happens, the
Ethernet system has a way to sense the "collision" of
signals and to stop the transmission and resend the frames.
This is called Collision Detect.

Ques:- TCP/IP can work on a)ethernet b)tokenring c)a&b d)none
Comments
Admin May 17, 2020

C
Ethernet and TokenRing are data link layer protocols...
TCP IP is not really bothered what protocol is involved...
Not sure plz cross reference...
But i am sure the answer is c since TCPIP CAN work on both...

Admin May 17, 2020

TCP/IPan work on Both ethernet and tokenring

Ques:- What is the differnce between win 2000 server & win 2003 server?
Comments
Admin May 17, 2020

Domain name can be renamed, or moved in windows 2003 server
but in win 2k server, we cant do that.
there are 220 new group policies r added in 2k3 server over
2k server.
Shadow copy feature available in 2ke but not in 2k server.
terminal services improvement in 2k3 server because remote
user can access hard disk and other network resources like
printers remotely but not in 2k server.

Ques:- what is the role of Domain controller in lan ? What is the active directory ?
Comments
Admin May 17, 2020

The Domain controller works replication of all member
server. It contains all information of active directory.
Active directory contains information about objects and
network resources as well as the services that makes the
information available and useful over a network.

Admin May 17, 2020

Domain controller is the parent domain which shares it
authentication details with all its child domain.
D.C. must have active directory.
A.D. is the database which provides the centralised
information of all objects and users in the network

Ques:- what is web server,application server,database server
Comments
Admin May 17, 2020

Web server: A computer, including software package that
provides a specific kind of service to client software
running on other computers.
Application server: A machine or its software that works in
conjunction with a web server to deliver application
services such as the dynamic creation of a webpage from
content stored in a database.
Data base server: A data storage and retrieval system.
Database servers typically run on a dedicated computer and
are accessed by client applications over a network.

Ques:- what is the troublshooting the network
Comments
Admin May 17, 2020

Networking Troubleshooting means, recognizing and diagnosing
networking problems, is to keep the goal that network is
running satisfactorily.

Admin May 17, 2020

Process of finding errors in the network

Ques:- When we are developing interface program in oracle apps what we have to do if there is no interface table.
Comments
Admin May 17, 2020

Hi,
As per the client requirement,they will give the columns
then we need to create the custom interface table and
custom base tables
if any queries please let me know
Thanks & Regards,
Siva

Ques:- How many types of backups in windows2003
Comments
Admin May 17, 2020

1) Normal Backup
2) Daily Backup
3) Copy Backup
4) Incremental Backup
5) Differential Backup

Admin May 17, 2020

There are total 5 types of backup.
Following are the types of backup:-
1) Normal Backup
2) Daily Backup
3) Copy Backup
4) Incremental Backup
5) Differential Backup

Ques:- how many backups in windows2003
Comments
Admin May 17, 2020

Five types of Backup we can use in windows 2003
Normal backup
Copy backup
Daily backup
Diffrential backup
Incremental backup

Admin May 17, 2020

1.copy backup
2.daily backup
3.diffrential backup
4.incremental backup
5.normal backup

Ques:- what is frame realy
Comments
Admin May 17, 2020

Frame Relay is a high-performance WAN protocol that
operates at the physical and data link layers of the OSI
reference model. Frame Relay originally was designed for
use across Integrated Services Digital Network (ISDN)
interfaces. Today, it is used over a variety of other
network interfaces as well. This chapter focuses on Frame
Relay's specifications and applications in the context of
WAN services.
Frame Relay is an example of a packet-switched technology.
Packet-switched networks enable end stations to dynamically
share the network medium and the available bandwidth. The
following two techniques are used in packet-switching
technology:
•Variable-length packets
•Statistical multiplexing

Admin May 17, 2020

Frame Relay is a high-performance WAN protocol that
operates at the physical and data link layers of the OSI
reference model. Frame Relay originally was designed for
use across Integrated Services Digital Network (ISDN)
interfaces and but frame relay is costly in compare with
others

Ques:- how many systems can i connect in class “A,B AND C” as well as private and publi network?
Comments
Admin May 17, 2020

Class A
N.H.H.H-for one network
Ex 1.0.0.0-1.255.255.255=16581375
Networks=126*16581375
Class B
N.N.H.H
172.168.1.0-172.168.255.255=65000
Networks=16384*65000
Class C
N.N.N.H
192.168.1.0-192.1681.255=255
Networks=2,097,152*255

Ques:- How to use a user of domain as a SQL server database login.
Comments
Admin May 17, 2020

select the login option as Windows authentication.

Admin May 17, 2020

Windows authentication.
MS SQL supports both type of authentication for users - SQL
& Windows. You have Active Directory & SQL is a member of
that then your can can use windows authentication.

Ques:- What is the difference between software deployment and DFS
Comments
Admin May 17, 2020

Software Deployment is the process in which sofware is
deployed to the clients through the server.
In software deployment the software is installed on the
server & then it is pushed to all the clients from the
server.
DFS stands for Distributed file server.
DFS is used to store all the information at one centralised
location which all the clients can access to get the data.
For DFS all the clients can be given access with the
address of the centralised location.

Ques:- Different Solutions to dining philosophers problem.
Comments
Admin May 17, 2020

One solution would be to banish a philosopher from the
table, thus emptying a seat. This leaves five chopsticks
for four people, so at least one of the philosophers will
be able to eat; thus, no deadlock. This means that each
system must have more resources available than tables, in
essence.
Another solution is to say that a philosopher can only pick
up chopsticks if both are available, and then only if the
neighbors are not going to pick them up. This is a
permissive style that causes some extra slowdown by adding
the step of permissions, but it keeps all of the
philosophers alive, which is the most important thing.
A third solution is an asymmetric one: number the
philosophers starting at an arbitrary chair and continuing
around the table. Then, a philosopher with an odd number
picks up the left chopstick and then the right, and the
even numbered philosophers pike up the right chopstick and
then the left. Thus, philosophers 2, 3, and 4 only can be
missing a pair if one of the two people at their sides are
actually eating (not just waiting), thus making sure a
deadlock is impossible.
There are countless more possible solutions to the dining-
philosophers problem. The primary factor in deciding if a
solution is good or not is to make sure that there are no
deadlocks or long pauses in the procedure; in other words,
a good solution makes sure a philosopher doesn't starve to
death.
Solutions to this problem show up regularly in all sorts of
areas, from biology to psychology to computer science. The
problem of synchronization is a fundamental one in our
world, and the dining-philosophers problem addresses it
simply, clearly, and directly



AmbitionBox Logo

What makes Takluu valuable for interview preparation?

1 Lakh+
Companies
6 Lakh+
Interview Questions
50K+
Job Profiles
20K+
Users