Network Engineer Questions


Q:

What is the main reason the OSI Model was created?

Answer

The OSI Model is used as a reference model.


The primary reason the OSI model was created was so that different networks could inter-operate. Hence, different networks could communicate.

Report Error

View answer Workspace Report Error Discuss

34 16253
Q:

10 examples of computer hardware?

Answer

A computer system consists of two major elements: hardware and software. Computer hardware is the collection of all the parts you can physically touch. Computer software, on the other hand, is not something you can touch. Software is a set of instructions for a computer to perform specific operations. You need both hardware and software for a computer system to work.


10 examples of computer hardware are ::


1. Monitor


2. Motherboard


3. CPU(Microprocessor) 


4. Main memory(RAM)


5. Expansion cards 


6. Power supply unit


7. Optical disc drive 


8. Hard disk drive (HDD)


9. Keyboard


10. Mouse

Report Error

View answer Workspace Report Error Discuss

26 16168
Q:

What is cladding?

Answer

A layer of a glass surrounding the center fiber of glass inside a fiber-optic cable.

Report Error

View answer Workspace Report Error Discuss

Subject: Networking
Job Role: Network Engineer

26 15848
Q:

Which OSI layer defines the standards for cabling and connectors?

A) Layer 1 B) Layer 4
C) Layer 7 D) Layer 3
 
Answer & Explanation Answer: A) Layer 1

Explanation:

OSI layer 1 defines the standards for cabling and connectors.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA
Job Role: Network Engineer

31 14580
Q:

The Basic Architecture of Computer was developed by

A) Charles Babbage B) Blaise Pascal
C) Garden Moore D) John Von Neumann
 
Answer & Explanation Answer: D) John Von Neumann

Explanation:

Computer Architecture refers to how a computer system is designed and what technologies it is compatible with. In brief, Computer architecture is a specification detailing how a set of software and hardware technology standards interact to form a computer system or platform.  

                                     comp1518074667.jpg image 

The Von Neumann Architecture, which is also known as the Von Neumann Model and Princeton architecture, is a computer architecture based on the 1945 description of computer by the mathematician and physicist John von Neumann.

Report Error

View Answer Report Error Discuss

19 13810
Q:

Which of the following is Not an Operating System?

A) UNIX B) Windows NT
C) C++ D) DOS
 
Answer & Explanation Answer: C) C++

Explanation:

C++ is not an Operating System.

 

An Operating System is a collection of system programs that manages all the other programs application programs in a computer as well as the allocation and use of hardware resources such as the CPU, Memory and the Hard Disk Drive.

It acts as an interface between the hardware and the user level program.

It controls and facilitates the overall operation of a computer. 

 

Here

UNIX : UNIX is a popular multi-user, multitasking operating system (OS) developed at Bell Labs.

 

Windows NT : Windows NT is a family of operating systems produced by Microsoft, the first version of which was released in July 1993.

 

DOS : DOS is Disk Operating System. The term DOS can refer to any operating system.

 

C++ : C++ is a programming language and computing platform.

 

Hence, C++ is not an Operating System.

Report Error

View Answer Report Error Discuss

46 13662
Q:

Which dml command is used in conjunction with @@identity?

A) INSERT and UPDATE B) UPDATE and DELETE
C) SCOPE_IDENTITY and IDENT_CURRENT D) Commit and rollback
 
Answer & Explanation Answer: C) SCOPE_IDENTITY and IDENT_CURRENT

Explanation:

Using automatically incrementing IDENTITY columns is very popular with database developers. You don’t need to explicitly calculate unique surrogate keys when inserting new data, the IDENTITY column functionality does that for you. The IDENTITY feature also allows you to specify useful Seed and Increment properties. When you use an INSERT statement to insert data into a table with an IDENTITY column defined, SQL Server will generate a new IDENTITY value.

 

You can use the @@IDENTITY variable and the SCOPE_IDENTITY and IDENT_CURRENT functions to return the last IDENTITY value that has been generated by SQL Server. This is very useful when you need to return the key for the row that has just been inserted, back to the caller.

Report Error

View Answer Report Error Discuss

20 13238
Q:

Impact analysis helps to decide

A) How many more test cases need to written. B) How much regression testing should be done.
C) Different Tools to perform Regression Testing D) Exit Criteria
 
Answer & Explanation Answer: B) How much regression testing should be done.

Explanation:

Impact Analysis is used in software testing to define all the risks associated with any kind of changes in a product being tested.

Impact Analysis is nothing but analyzing the impact of changes in the deployed product or application. It gives the information about the areas of the system that may be affected due to the change in the particular section or features of the application.

 

Why Impact Analysis is done :


1. It is done to understand the possible outcome of implementing the change. Inducing too much functionality into a product can reduce the overall performance of the product.

2. To identify all the files, documents and models that might have to be modified if team decides to implement the change in product

3. To estimate the effort needed behind implementing the change

4. To identify the task required to implement the change

5. It will list the dependencies on a specific element

 

The impact is analyzed on Requirements, Design & Architecture, impact on Test and impact on schedule.

Report Error

View Answer Report Error Discuss

0 13150