Technical Questions

Q:

Difference between bit rate and baud rate.?

Answer

Bit rate is the number of bits transmitted during one second whereas baud rate refers to the number of signal units per second that are required to represent those bits.


baud rate = bit rate / N


where N is no-of-bits represented by each signal shift.

Report Error

View answer Workspace Report Error Discuss

Subject: Networking
Job Role: Network Engineer

0 4772
Q:

What is called scratch pad of computer?

Answer

Cache Memory is scratch pad of computer.

Report Error

View answer Workspace Report Error Discuss

Subject: Hardware

2 4742
Q:

What is a drawback of MVT?

Answer

1) ability to support multiple processors
2) virtual storage
3) source level debugging

Report Error

View answer Workspace Report Error Discuss

1 4737
Q:

The coding or scrambling of data so that humans cannot read them, is known as _____.

A) Compression B) Encryption
C) Ergonomics D) Biometrics
 
Answer & Explanation Answer: B) Encryption

Explanation:

The coding or scrambling of data so that humans cannot read them is known as encryption.

Report Error

View Answer Report Error Discuss

Filed Under: Programming

9 4695
Q:

Can ROM be used as stack?

Answer

ROM cannot be used as stack because it is not possible to write to ROM.

Report Error

View answer Workspace Report Error Discuss

Subject: Hardware

8 4682
Q:

Describe how to perform Risk Analysis during software testing.

Answer

While a test plan is being created, risks involved in testing the product are to be taken into consideration along with possibility of their occurrence and the damage they may cause along with solutions; if any. Detailed study of this is called as Risk Analysis.


Some of the risks could be:


New Hardware 


New Technology 


New Automation Tool 


Sequence of code delivery 


Availability of application test resources 


Identify and describe the risk magnitude indicators: High, Medium and Low


High magnitude means the effect of the risk would be very high and non-tolerable. Company may face severe loss and its reputation is at risk. Must be tested.


Medium: tolerable but not desirable. Company may suffer financially but there is limited liability or loss of reputation. Should be tested.


Low: tolerable. Little or no external exposure. Little or no financial loss. Company’s reputation unaffected. Might be tested.


Three perspectives of Risk Assessment: Effect, Cause and Likelihood.


To assess risk by Effect, identify a condition, event or action and try to determine its impact.


To asses risk by Cause is opposite of by Effect. Begin by stating an undesirable event or condition and identify the set of events that could have permitted the condition to exist.


To asses risk by Likelihood is to determine the probability that a requirement will not be satisfied.

Report Error

View answer Workspace Report Error Discuss

Subject: Software Testing

0 4680
Q:

Which layer 4 protocol is used for a Telnet connection?

A) UDP B) IP
C) TCP D) TCP/IP
 
Answer & Explanation Answer: C) TCP

Explanation:

Telnet uses TCP at layer 4. It uses IP at layer 3. We know that Telnet uses TCP/IP protocol, but in the question, it is asked specifically at layer 4 what is used in Telnet. So it is TCP at layer4 and IP at layer 3.

Report Error

View Answer Report Error Discuss

0 4624
Q:

 In a 1:N relationship, the foreign key is placed in:

A) the parent table. B) the child table.
C) either table without specifying parent and child tables. D) either the parent table or the child table.
 
Answer & Explanation Answer: B) the child table.

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: Database

0 4617