Technical Questions

Q:

Which interrupts is not level-sensitive in 8085?

Answer

TST 7.5 is a raising edge-triggering interrupt.

Report Error

View answer Workspace Report Error Discuss

Subject: Hardware

2 4283
Q:

88%of 370 +24% of 210-x =118 find x

Answer

From the given equation,


88x370/100 + 24x210/100 - 118 = x


=> x = 325.6 + 50.4 - 118


x = 258.

Report Error

View answer Workspace Report Error Discuss

Subject: Database Exam Prep: CAT , Bank Exams , AIEEE
Job Role: Bank PO , Bank Clerk

7 4279
Q:

What is silly window syndrome?

Answer

It is a problem that can ruin TCP performance. This problem occurs when data are passed to the sending TCP entity in large blocks, but an interactive application on the receiving side reads 1 byte at a time.

Report Error

View answer Workspace Report Error Discuss

Subject: Networking
Job Role: Database Administration

0 4273
Q:

 Stored procedures have which of the following advantages?

A) It takes a longer time to write them as compared to writing Visual Basic. B) Data integrity improves as multiple applications access the same stored procedure.
C) Network traffic increases D) Result in thicker client and thinner database server.
 
Answer & Explanation Answer: B) Data integrity improves as multiple applications access the same stored procedure.

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: Database

0 4263
Q:

Ethernet uses which topology

A) Star B) Bus
C) Twisted pair D) Both B & C
 
Answer & Explanation Answer: B) Bus

Explanation:

Ethernet uses Bus topology.

Report Error

View Answer Report Error Discuss

7 4255
Q:

What is NVT?

Answer

It is a set of rules defining a very simple virtual terminal interaction. The NVT is used in the start of a Telnet session.

Report Error

View answer Workspace Report Error Discuss

Subject: Networking
Job Role: Network Engineer

1 4254
Q:

What is Kerberos?

Answer

It is an authentication service developed at the Massachusetts Institute of Technology. Kerberos uses encryption to prevent intruders from discovering passwords and gaining unauthorized access to files.

Report Error

View answer Workspace Report Error Discuss

Subject: Networking
Job Role: Network Engineer

1 4209
Q:

What would be the output of the following program?

main()

{

        char huge * near * far *ptr1;

        char near * far * huge *ptr2;

        char far * huge * near *ptr3;

         printf ("%d%d%d", sizeof (ptr1), sizeof (ptr2), sizeof (ptr3));

}

Answer

4  4  2

Report Error

View answer Workspace Report Error Discuss

Subject: Programming

1 4200