Wednesday, October 24

ONGC previous years ComputerEngineering questions







1. What is the name of the software that allows us to browse through web pages?

(a) Browser

(b) Mail Client

(c) FTP Client

(d) Messenger

2. What is the address given to a network called?

(a) System Address

(b) SYSID

(c) Process ID

(d) IP Address

3. Which one of the following is a valid DOS command?

(a) LIST *.*

(b) LIST???.???

(c) RECOVER A:

(d) RENAME A:SAMPLE.TXT C:TEST.DOC

4. All system settings in WINDOWS are stored in:

(a) CONTROL.INI

(b) MAIN.INI

(c) SYSTEM.INI

(d) SETTING.INI

5. Which number system is usually followed in a typical 32-bit computer?

(a) 2

(b) 10

(c) 16

(d) 32

6. Which of the following is not an output device:

(a) Printer

(b) Scanner

(c) Flat Screen

(d) Touch Screen

7. A microprocessor is a processor with reduced

(a) instruction set

(b) power requirement

(c) MIPS performance

(d) none of the above

8. Which of the following is not an output of an assembler?

(a) executable program

(b) source listing with line numbers and errors

(c) a symbol table

(d) object program

9. Which layer of OSI model is responsible for routing and flow control:

(a) Presentation

(b) Transport

(c) Network

(d) Data Link

10. Arrays are passed as arguments to a function by

(a) value

(b) reference

(c) both a and b

(d) none of the above

11. Array is:

(a) linear data structure

(b) non-linear structure

(c) none of the above

12. A data structure in which elements are added and removed from only one end, is known as:

(a) Array

(b) Stack

(c) Queue

(d) None of the above

13. A diamond-shaped box in an Entity-Relationship diagram refers to:

(a) Entity

(b) Relationship

(c) Attribute

14. The principle means of identifying entities within an entity set is:

(a) Primary Key

(b) Record

(c) Attribute

(d) Tuple

15. Modem refers to:

(a) Modulator

(b) Modulation

(c) Demodulator

(d) Modulator and Demodulator

16. C language is available for which of the following Operating Systems?

(a) DOS

(b) Windows

(c) Unix

(d) All of the above

17. Which of the following have the fastest access time?

(a) Magnetic Tapes

(b) Magnetic Disks

(c) Semiconductor Memories

(d) Compact Disks

18. DMA stands for:

(a) Direct Memory Allocation

(b) Distinct Memory Allocation

(c) Direct Memory Access

(d) Distinct Memory Access

19. Array subscripts in C always start at:

(a):1

(b) 0

(c) 1

(d) Value provided by user

20. Which type of commands in DOS needs additional files for their execution?

(a) Batch Commands

(b) Internal Commands

(c) External Commands

21. Which of the following statements in regard to Directories is false?

(a) Directories can exist inside directories

(b) The root directory is always at the highest level

(c) Directories with files can be deleted

(d) Directories cannot be renamed

22. It is better to buffer a table when

(a) When a table is read infrequently

(b) When a table is linked to check tables

(c) When a table is read frequently and the data seldom changes

(d) When a single record is to be picked up

23. The Operating System is responsible for:

(a) Controlling peripheral devices such as monitor, printers, disk drives

(b) Provide an interface that allows users to choose programs to run and to manipulate files

(c) Manage users' files on disk

(d) All of the above

24. A company whishes to connect two sites in different parts of the country together. It is decided to use the telephone system. What device should be connected to the fileservers on each site?

(a) Router

(b) Modem

(c) Switch

(d) Hub

25. What is a file server?

(a) A computer that performs a service for other computers

(b) A computer that controls the printers on the network

(c) A computer that stores files that are created by network users

26. What is the Protocol used for the Internet?

(a) IPX/SPX

(b) NetBIOS/NetBEUI

(c) CDMA/CA

(d) TCP/IP

27. Which one of the following is not a Normal Forms (Normalization) rule with regards to the Relational Model?

(a) All fields within a table must relate to or directly describe the Primary Key.

(b) Repeating Groups must be eliminated from tables.

(c) Fields that can contain non-numeric data are to be removed and placed within their own tables with an associated Primary Key.

(d) Redundant data is to be eliminated by placing the offending fields in another table.

28. Choose the answer which best describes the term Primary Key:

(a) The Primary Key is a field that contains data that can be duplicated.

(b) The Primary Key is a field that contains data that is unique.

(c) The Primary Key is a field that is never associated with any field in other tables.

(d) The Primary Key field is a concept used only in Microsoft Access.

29. Which technique is used to reduce the size of a file:

(a) Compression

(b) Decompression

(c) Encryption

(d) Decryption

30. BIOS stands for

(a) Binary Input Output Set

(b) Binary Input Output System

(c) Basic Input Output Set

(d) Basic Input Output System

31. A floppy disk is consisting of 40 tracks, each track contains 100 sectors, and the capacity of a sector is 512 bytes, what is the approx. size of that disk?

(a) 1 MB

(b) 2 MB

(c) 4 MB

(d) 8 MB

32. What is the binary equivalent of a decimal number 68:

(a) 1000100

(b) 1100100

(c) 1000010

(d) 1000001

33. Assembly language to machine language translation is:

(a) One-to-One

(b) One-to-Many

(c) Many-to-One

(d) Many-to-Many

34. Maximum size of IP address is:

(a) 12 bits

(b) 24 bits

(c) 32 bits

(d) 48 bits

35. RAM stands for

(a) Read Access Memory

(b) Read After Memory

(c) Random Access Memory

(d) Random After Memory

36. What is the final value of sum?

main ()

{

int sum=1;

for(;sum<=9;)

printf(%d\n, ++sum);

}

(a) 9

(b) 10

(c) 11

(d) none of the above

37. If c is a variable initialized to 1, how many times the following loop be executed:

while(c>0 && c<60)

{

c++;

}

(a) 59

(b) 60

(c) 61

(d) none of the above

38. The declaration void fun(int) indicates the fun is a function which:

(a) has no arguments

(b) returns nothing

(c) both a and b

(d) none of the above

39. Out of the following which is not valid network topology:

(a) Bus

(b) Star

(c) Circle

(d) Tree

40. The overall logical structure of a database can be expressed graphically by:

(a) Data Flow Diagram

(b) Flow Chart

(c) Directed Graph

(d) Entity-Relationship Diagram

41. CARRY, in a half-adder, can be obtained using:

(a) OR gate

(b) AND gate

(c) EX-OR gate

(d) EX-AND gate

42. The memory that requires refreshing of data is:

(a) SROM

(b) DROM

(c) SRAM

(d) DRAM

43. The minimum number of bits required to represent numbers in the range:28 to +31 is-

(a) 5

(b) 6

(c) 7

(d) 8

44. Which bus carries information between processors and peripherals?

(a) Data bus

(b) Control bus

(c) Address bus

(d) Information bus

45. Which part of the computer perform arithmetic calculations?

(a) Control unit

(b) Registers

(c) ALU

(d) CPU

46. A gigabyte represents:

(a) 1 billion bytes

(b) 1000 kilobytes

(c) 230 bytes

(d) 10 megabytes

47. The minimum number of bits required to store the hexadecimal number FF is:

(a) 2

(b) 4

(c) 8

(d) 16

48. Cache memory enhances:

(a) memory capacity

(b) memory access time

(c) secondary storage capacity

(d) secondary storage access time

49. A UPS:

(a) increases the storage capacity of a computer system

(b) increases the processor speed

(c) provides backup power in the event of a power cut\

(d) none of the above

50. An RDBMS is a:

(a) Remote DBMS

(b) Relative DBMS

(c) Reliable DBMS

(d) Relational DBMS

Monday, August 6

ENGINEERS INDIA LIMITED - EIL- MANAGEMENT TARINEE RESULT OUT

Hi friends,




Result of Written test for  Management trainee conducted by Engineers India Limited on July 2012 is published

Check Your Result..!!!:)

Monday, July 16

EIL (Engineers India Ltd) Exam questions and answer key

Hi reader,

Here I'm posing some questions asked and its solution / key in EIL Management
Trainee recruitment test in July 2012.

All the information is collected from my freinds..!!!

The Test comprises of 150 questions eacxh carrying 1 mark . for each wrong answer 0.25 marks will be deducted.
Technical section(100 qustions)


General Awareness
Aptitude questions

English.(Non technical 50 questions)



General awareness section had some questions based on current affais , especiall on
April 2012( note Exam held on July 2012)
Sample:
* Name of the British Citizn caputred by Maoists recently.
* Richter scale reading of the drastic earthquake hit in Sumara islends recently

 ( 8.7, 8, 7.1, None of these)
*Name of the satellite successfully launched in April 2012
* Name the Indian company successfully dveloped medicine for meningitis.

* During which period first five year plan was established?(1952-56)
* Indiragandhi award was bagged this year by?


..and some more...



English section comprised of this pattern of questions
* Spot the error.
* Pick the synonym
*Reading comprehension




Aptitude section contained questions from
*Profit percentage
*Ralative velocity
*Circular arrangement of 6 persons form 6 different countries.
*Rate of work done.




Here I'm posting some of the etchnical questions asked.




1.The datastructure in which values can be added form bith ends, not fron the
middle?
-- Dequeue


2. In a circular linked list if a new node is insertted, how many links will get modified?
(0  ,  1,  2 ,  3)



3. Find the hamming distance between 010011 and 101011
4. In software tesing which path will give maximum performance?
*Hamiltonian path
*Eulearian path
*BFS
*DFS



5. Which of the folloing will give the minimal path between a node S to other nodes in
a connected unweighted, undirested graph?
*Dijikstra algorith
*Warshalls algorithm



6. Which of the following is false about C?
*C has no I/O functions
*C has no File functions
* None of these



7. In a C progra main( int argc, cahr argv[]),
argv[0] indicates?

Ans-- Name of the C program

8. In a C code exit() will act for
Ans-- to exit from the current working function.


9. The uninitialized automatc variable in C contains?
Ans-- garbage value




10. The variables that ca be accessed fro any part of the program is called?
Ans-- Global variable



11. the unmodulated wave in data transmission is called?
- Carrier wave



12. End to end connection, error detection error correction are donr by?
-- Transport Layer



13.Encryption and Decrytption are done by?
-- Presentation Layer



14. what is Thrashing?


15. What is the maximum number of processes which ensure that no dead lock will
occur, if there are 6 tapes and each process demand for at most 2 tapes.
Ans: 3



16. Bankers alogithm deals with?
-- Deadlock avoidance.


17. Spot the function of Type IV Firewall


18. What is Trojan?

19. what is Worm?

20. readability of a code can be enhance by?
-- Giving meaningful names to variables.



21. Any HTML code starts with?
<html>




22. We can align text in a teble o left by which code?

23. www belongs to which category?
*Local server
*Client server
*3 - tier architectre



24.Resolution of an image doesnt depend on?
-- bandwidth



25. Plotter image quality depends on repeatability and__________?

26. what is data warehosing?

27. File is?
collection of data



28. Phone number is an example of_?
Field


29. If the input is larger than the field , then..
Ans-- actual input will be shortened.



30. Which of the following will  depend on a high speed internet?
Email


31. In a complete binary tree, if there are N leaves, total number of internal  nodes will
be?
2N-1




32. If a inary tree is of 4 levels, total number of nodes will be
15


33. For a 3-ary tree, if there are 6 internal nodes, toal number of leaves will be?

34. What is  the maximum number of fulll duplex connection with 10 hubs.

35. Networking will not depend upon
stateless end hubs




36. snowflake schema is related with?
Dimension




37 Hub is related with?
Star Topology


38. One token policy is strictly followed by?
IEEE or FDDI




39. What is the advantage of OOP concept?

40. What is data hiding in C++



41. In a Lan connection each device is conneted using a cable and._________?
Interface card.


42. if new() is failed it will return?
*value 0
*NULL
*Exception
*Unexpected results




43. The return value of destructor is
-- Destructor has no return value




44return type of this function   int fun ( char t, char u)
ans-- int  



45. In stop and wait protocol, for sending N frames how many acknowledgemnets are
there?
Ans -- N



46. QPSK with 16 levels, 4600bps the rate will be?

47. How many bit address are used in TCP/IP connction?




Do you know any other question??  Please comment here..!! :)

Wednesday, July 4

SSC CGL 2012 Evening Shift First Sitting ~ Questions and Answers

Hi friends,


In this post I'm providing the complete questions asked in SSC Combine graduate level  Exam (Tier 1) on July Afternoon session and  it's  complete solution. All the questions and solution were collected from memory and with help of some friends.





1. The apparatus used to locate submerged objects?

Ans: SONAR

2. who decides the disputes regarding election of President?
Ans: The election commission


3. main cause for agitation for separation of states in India ?
Growing Regional imbalances.

4. the law of "use and disuse " theory was proposed by?
Lamarck

5. which of the revenue earned by Union Govt is not distributed among State Governments?


Excise duty

6. The substance that cause worst air pollution?

Carbon Monoxide.


7. Two bodies of the same mass are thrown with equal speed from the top of a 

tower simultaneously. one body (x) is thrown  vertically downwards. The 

other (y) is thrown horizontally. Then:
Ans:  x reaches ground with greater Kinetic Energy

8. Near which one of the following citeis, the Palitana Temples are situated?
(A) Bhav Nagar
(B)Mount Abu
(C)Mearke
(D)Ujjain

Ans: B

9. The orcket which gives us information about Mars is:
Ans: Cassinie.

10. JDBC stands for?
Ans: Java Database Connectivity

11. Correct among the following?
(A) Siksha -- astrology
(B)Nirukta - metre
(C)Jyotisha -- phonetics
(D)Vyakarana -- grammar

Ans: D

12.  The famous book "A better India, A better world" is written by?
Ans: N R narayana Murthy


13. The world's fastest growing water plant is 
Ans: Water hyacinth

14.  the international agreement to reduce greenhouse gases between 2008-

2012 is called?

Ans: Kyoto Protocol

15. Which of the following has recently produced the first cloned camel?
Dubai

16. The Newzealanders are also known as?
Kiwis

17. Find the odd one out?
Ans : FCI- Financial assisatance to merchants

18.Who is the first Law Officer of the Governemt of India?
Attorney general of India

19. "Milk of Magnesia" is a  suspension of?

Magnesium hydroxide

20. If all plants of the world dies, all the animals would also die due to 

shortage of?
Ans: Oxygen

21. A person opens his mouth on heraing a thunder  in order to:
equalise pressure of air on both sides of the ear drum


22. " El Nino effect" is closely related to?
Ans:  Gulf Current.


23. If a bacterium cell divides in every 20 minutes, how many bacteria will be 

formed in 2 hours?
 Ans: if we count from 8:00pm, the division occur at  8:20, 8:40, 9:00,9:20, 

9:40, 10:00.
Thus, totally 6 times.
So, 2^6 = 64.

24. The state of Jhansi was made a part of the British empire in India through 

the :
Ans: Doctrine of Lapse


25. Pila globosa is used as biofilter in cleaning pollution of water by:
Algal Blooms

26. As per 2011 cencus, in India the number of females per thousand is?
Ans:    940


27. Chemical name of Plaster of apris is?
ans:  Calcium sulphate hemihydrate


28. Who was the first envoy of the east Company to meet Jahangir in 1608 A. 

D?

William Hawkins


29. Carbohydrates are compounds of?
Carbon. Oxygen and hydrogen


30. The growth of Bacteris is measurred by?
hemacytometer


31. A government is classified as federal or unitary on the basis of?
Relations between the center and states

32. EVN stands
Ans:   Electronic Voting machine


33. When ice is heated from 0deg to 1- deg , the volume of water?
First increases, then decreases


34. Mammals form urea in the?
Ans:  Liver

35. wanchoo committee deals with

36. Which of the following wrongly matched?

(i) Tropic of cancer - 23 1/2 N Latitude
(ii) Tropic of Capricon - 66 1/2 N Latitude
(iii) International Date Line- 0 Longitude
(iv) Antarctic Circle - 66 1/2 S Latitude

Ans:  (ii) and (iii)


37. The tributary of river Indus which flows through Himachal  Pradesh is:
Ans : sutlej

38 which of the following is an essential ingredient of parliamnetary 

givernemnt?
Ans: A written consititution


39. Through which states does the river Chambal flows?
UP , MP, Rajastan

40. The contents of memory will not be lost, when the power goes off:
(A) ROM
(B)EPROM
(C)EEPROM
(D)All of above
Ans:  D


41. Simple Goitre is a disease affecting
Ans: thyroid glands


42. The word secular is  a part of the preamble of the constitution of India
Ans:  afte the 42nd amendment


43. The programme which is being implemented in all the districts of the 

country is:

Ans:  MGNRGE Programme

44. Which one of the following Cricketers has been declarted by the ICC as ' 

Cricketer of the Twentieth Century'  ?
Kapil Dev



45. As per the 2011 population census, the most  populous state in the country 

is?
Uttar Pardesh

46. Which one of the following is not an internal factor for industrial 

sickness?
Technological  Obsolescence


47. Vikrama shila University was founded by?
Dharmapala

48. Acidity of rain is measured by?
pH - meter

49. For which one of the following, are honey bees used?
Apiculture


50. Chlorination is 
Ans:  adding a small amount of chloride to contaminate water









Monday, July 2

Increase your Internet speed within Seconds


Increase your Internet speed within Seconds


1-go to run
2-type gpedit.msc
3-expand the administrative templates
4-expand the network
5-select Qos Packet Scheduler
6- double click limit reservable bandwidth
7-enable it and put 0 in the bandwidth limit
8-click apply and ok

eil previous year questions


1.  Which of the following statements about synchronous and asynchronous I/O is NOT true?
(a) An ISR is invoked on completion of I/O in synchronous I/O but not in asynchronous I/O
(b) In both synchronous and asynchronous I/O an ISR (Interrupt Service Routine) is invoked after completion of the I/O
(c) A process making a synchronous I/O call waits until I/O is complete, but a process making an asynchronous I/O call
does not wait for completion of the I/O
(d) In the case of synchronous I/O, the process waiting for the completion of I/O is woken up by the ISR that is invoked
after the completion of I/O

2.  Which of the following is NOT true of deadlock prevention and
deadlock avoidance schemes?
(a) In dead Lock prevention, the request for resources is always granted if the resulting state is safe
(b) In deadlock avoidance, the request for resources is always granted if the resulting state is safe
(c) Deadlock avoidance is less restrictive than deadlock prevention
(d) Deadlock avoidance requires knowledge of resource requirements a priori

3

4. A processor uses 36 bit physical addresses and 32 bit virtual addresses, with a page frame size of 4 Kbytes. Each page table entry is of size 4 bytes. A three level page table is used for virtual-to-physical address translation, where the virtual address is used as follows
bits 30-31 are used to index into the first level page table,
• bits 21-29 are used to index into the second level page table
• bits 12-20 are used to index into the third level page table
• bits 0-11 are used as offset within the page
The number of bits required for addressing the next level page table (or page frame) in the page table entry of the first, second and third level page tables are respectively.
(a) 20, 20 and 20
(b) 24, 24, and 24
(c) 24, 24 and 20.
(d) 25, 25 and 24

5.            In which one of the following page replacement policies, Belady’s anomaly may occur?
(a) FIFO
(b) Optimal
(c) LRU
(d) MRU

6. The essential content(s) in each entry of a page table is/are
(a) virtual page number
(b) page frame number
(c) both virtual page number and page frame number
(d) access right information

7. Consider a system with 4 types of resources RI (3 units), R2 (2 units), R3 (3 units), R4 (2 units). A non-preemptive resource allocation policy is used. At any given instance, a request is not entertained if it cannot be completely satisfied. Three processes P1, P2, P3 request the resources as follows if executed independently.

Which one of the following statements is TRUE if all three processes run concurrently starting at time t = 0?
(a) All processes will finish without any deadlock
(b) Only P1 and P2 will be in deadlock
(c) Only P1 and P3 will be in deadlock
(d) All three processes will be in deadlock

8. Consider a disk system with 100 cylinders. The requests to access the cylinders occur in following sequence:
4,34, 10,7, 19, 73, 2,15, 6,20
Assuming that the head is currently at cylinder 50, what is the time taken to satisfy all requests if it takes 1 ms to move from one cylinder to adjacent one and shortest seek time first policy is used?
(a) 95ms
(b) 119rns
(c) 233 ms
(d) 276 ms

9. Which of the following assertions is FALSE about the Internet Protocol (IP)?
(a) It is possible for a computer to have multiple IP addresses
(b) IP packets from the same source to the same destination can take different routes in the network
(c) IP ensures that a packet is forwarded if it is unable to reach its destination within a given number of hopes
(d) The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way

10. Which of the following functionalities must be implemented by a transport protocol over and above the network protocol?
(a) Recovery from packet losses
(b) Detection of duplicate packets
(c) Packet delivery in the correct order
(d) End to end connectivity

11. The subnet mask for a particular network is 255.255.3.1 . Which of the following pairs of IP addresses could belong to this network?
(a) 172.57.88.62 and 172.56.87.23.2
(b) 10.35.28.2 and 10.35.29.4
(c) 191.203.31.87 and 191.234.31.88
(d) 128.8.129.43 and 128.8.161.55

12. A 2 km long broadcast LAN has 107 bps bandwidth and uses CSMA/CD. The signal travels along the wire at 2 x 108 m/s. What is the minimum packet size that can be used on this network?
(a) 50 bytes
(b) 100 bytes
(c) 200 bytes
(d) None of the above

13. Host A is sending data to host B over a full duplex link. A and B are using the sliding window protocol for flow control. The send and receive window sizes are 5 packets each. Data packets (sent only from A to B) are all 1000 bytes long and the transmission time for such a packet is 50 micro s. Acknowledgment packets (sent only from B to A) are very small and require negligible transmission time. The propagation delay over the link is 200 micro s.. What is the maximum achievable throughput in this communication?
(a)          7.69 x 106 bps
(b) 11.11 x 106 bps
(c)           12.33 x 106 bps
(d) 15.00 x 106 bps

14.Choose the best matching between Group I and Group 2.


(al P-1 Q-4, R-3
(b) P-2, Q-4, R-1
(c) P-2, Q-3, R-1
(d) P-1, Q-3, R-2

15. Which of the following is NOT true with respect to a transparent bridge and a router?
(a) Both bridge and router selectively forward data packets
(b) A bridge uses IP addresses while a router uses MAC addresses
(c) A bridge builds up its routing table by inspecting incoming packets
(d) A router can connect between a LAN and a WAN

16. How many 8-bit characters can be transmitted per second over a 9600 baud serial communication link using asynchronous mode of transmission with one start bit, eight data bits, and one parity bit?
(a)600
(b) 800
(c)876
(d) 1200

17. A and B are the only two stations on an Ethernet. Each has a steady queue of frames to send. Both Aand B attempt to transmit a frame, collide, and A wins the first backoff race. At the end of this successful transmission by A, both A and B attempt to transmit and collide. The probability that A wins the second backoff race is
(a) 0.5
(b) 0.625
(c) 0.75
(d) 1.0

18.The routing table of a router is shown below:


On which interfaces will the router forward packets addressed to destinations 128.75.43.16 and 192.12.17.10 respectively?
(a) Eth1 and Eth2
(b) Eth0 and Eth2
(c) Eth0 andEth3
(d) Eth1 and Eth3
Data for Q. 19& Q. 20 are given below. Solve the problems and
choose the correct answers.
Consider three IP networks A, B and C. Host HA in network A sends
messages each containing 180 bytes of application data to a host HC in network C. The TCP layer prefixes a 20 byte header to the message. This passes through an intermediate network B. The maximum packet size, including 20 byte IP header, in each network is
A : 1000bytes
B : 100bytes
C : 1000bytes
The network A and B are connected through a 1 Mbps link, while B and C are connected by a 512 Kbps link (bps = bits per second).

19. Assuming that the packets are correctly delivered, how many bytes, including headers, are delivered to the IP layer at the destination for one application message, in the best case? Consider only data packets.
(a) 200
(b) 220
(c) 240
(d) 260
20. What is the rate at which application data is transferred to host H HC ?
Ignore errors, acknowledgments, and other overheads.
(a)325.5 Kbps
(b) 354.5 Kbps
(c)409.6 Kbps
(d) 512.0 Kbps
21. Packets of the same session may be routed through different paths n
(a) TCP, but not UDP
(b) TCP and UDP
(c) UDP, but not TCP
(d) Neither TCP, nor UDP

22. The address resolution protocol (ARP) is used for
(a) Finding the IP address from the DNS
(b) Finding the IP address of the default gateway
(c) Finding the IP address that corresponds to a MAC address
(d) Finding the MAC address that corresponds to an IP address

23.          The maximum window size for data transmission using the selective
reject protocol with n-bit frame sequence numbers is
(a)2n
(b)2n-1
(c)2n-1
(d)2n-2
24.          Tn a network of LANs connected by bridges, packets are sent from one LAN to another through intermediate bridges. Since more than one path may exist between two LANs, packets may have to be routed through multiple bridges. Why is the spanning tree algorithm used for bridge-routing?
(a) For shortest path routing between LANs
(b) For avoiding loops in the routing paths
(c) For fault tolerance
(d) For minimizing collisions

25. An organization has a class B network and wishes to form subnets for 64 departments. The subnet mask would be
(a)255.255.0.0
(b) 255.255.64.0
(c)255.255.128.0
(d) 255.255.255.0

Answers :

1              b
2              b
3              b
4              b
5              a
6              b
7              a
8              b
9              d
10           d
11           d
12           c
13           b
14           a
15           b
16           a
17           b
18           a
19           d
20           b
21           b
22           d
23           b
24           b
25           d