General Viva on Database Management Systems
General Viva on Database Management Systems
GENERAL VIVA
Student ID T201046
Submitted to:
A major purpose of a database system is to provide users with an abstract view of the
data.
a) Physical Level
b) Logical Level
c) View Level
Physical Level: Lowest level of abstraction and describes how a record is stored.
Logical Level: Intermediate level of abstraction and describes data stored in database
and the relationships among the data.
View Level: Highest level of abstraction. there are different levels of views and every view
only defines a part of the entire
data. It also simplifies interaction with the user and it provides many views or multiple
views of the same database.
5. Define database Users and Administrators.
Database Users: Database users are the ones who really use and take the benefits of the
database.
Database Administrators: A person who has central control over the system is called a
database administrator (DBA).
6. What is Transaction?
It ensures that the database remains in a consistent state despite system failures and
transaction failures.
A database model is a type of data model that determines the logical structure of
a database.
A relational database stores and organizes data points that are related to one another.
Based on the relational database model, a relational database presents data sets as a
collection of tables and provides relational operators to manipulate the data in tabular
form.
Database key is a field, or combination of fields, in a database table used to retrieve and
sort rows in the table based on certain requirements.
12. Write the types of keys in DBMS.
a) Primary Key
b) Foreign Key
Primary Key: It is a column or group of columns in a table that uniquely identify every row
in that table.
Foreign Key: It is a column that creates a relationship between two tables. The purpose
of Foreign keys is to maintain data integrity and allow navigation between two different
instances of an entity.
Relational query languages use relational algebra to break the user requests and instruct
the DBMS to execute the requests. It is the language by which user communicates with
the database.
Relational algebra refers to a procedural query language that takes relation instances as
input and returns relation instances as output. It performs queries with the help of
operators.
a) Select (σ)
b) Projection (π)
c) Union (υ)
f) Rename (ρ)
SQL stands for Structured Query Language which is a computer language for storing,
manipulating and retrieving data stored in a relational database.
1. SELECT: The SELECT clause specifies the columns from which data values are to be
retrieved by the query.
2. WHERE: The WHERE clause is used to filter records while retrieving data from a single
table or multiple tables.
3. FROM: The FROM clause names one or more tables from which data values are
retrieved by the query.
19. Find all loan numbers for loans made at the Dhaka branch with loan amounts
greater than 30000Tk.
SELECT loan_number
FROM loan
SQL set operations combine the results of multiple query blocks into a single result. Set
operators include UNION, INTERSECT and EXCEPT.
UNION (∪): It is used to combine the result of two or more SQL SELECT queries.
EXCEPT (−): is used to retrieve the unique records that exist in the first table, not the
common records of both tables.
21. What is NULL Value in SQL?
The term NULL in SQL is used to specify that a data value does not exist in the database.
It is not the same as an empty string or a value of zero, and it signifies the absence of a
value or the unknown value of a data field.
The result of any arithmetic expression involving null is null. Example: 5 + null returns
null
SQL aggregation function is used to perform the calculations on multiple rows of a single
column of a table. It returns a single value and also summarize the data.
Nested subquery is a query within another SQL query and embedded within clauses,
most commonly in the WHERE clause.
Database modification refers to the process of changing the data that is stored in a
database. It can involve adding, deleting, or updating records in a database.
update instructor
In DBMS, a join expression is mainly used to combine two tables based on a specified
common field between them.
34. Write short notes on:
a) Natural Join
b) Inner Join
c) Outer Join
Natural Join: It refers to joining two or more tables based on common columns, which
have the same name and data type.
Inner Join: It selects all the rows from two or more tables with matching column values.
Outer Join: It returns all the rows of the participating tables that satisfy the join
conditions and the rows not satisfying the join conditions.
Any relation that is not of the conceptual model but is made visible to a user as a “virtual
relation” is called a view.
Integrity constraints are pre-defined set of rules that are applied on the table fields or
relations to ensure that the overall validity, integrity, and consistency of the data present
in the database table is maintained.
a) Binary Datatype
b) Binary Datatype
Character String Datatype: It can hold any sequence of letters, digits, punctuation, and
other valid characters. Typical character strings are names, descriptions, and mailing
addresses.
Binary Datatype: Binary data types contain byte strings—a sequence of octets or bytes.
Character data types contain character strings (text).
Authorization is the process where the database manager gets information about the
authenticated user.
Triggers are the SQL statements that are automatically executed when there is any
change in the database.
INSERT Event: This event is called when the new row is entered in the table.
UPDATE Event: This event is called when the existing record is changed or modified in
the table.
DELETE Event: This event is called when the existing record is removed from the table.
A recursive query is a powerful feature that allows us to query hierarchical data which are
used in relational databases.
47. What is OLAP?
OLAP stands for Online Analytical Processing Server. It is a software technology that
allows users to analyze information from multiple database systems at the same time.
Data that can be modeled as dimension attributes and measure attributes are called
multidimensional data.
An OLAP cube is a data structure that overcomes the limitations of relational databases
by providing rapid analysis of data
a) Roll-up
b) Drill-down
d) Pivot (rotate)
Pivot operation is also known as rotation operation as it rotates the current view to get a
new view of the representation. In the sub-cube obtained after the slice operation,
performing pivot operation gives a new view of it.
54. Differentiate between Tuple Relational Calculus (TRC) and Domain Relational
Calculus (DRC).
An Entity-Relationship Model represents the structure of the database with the help of a
diagram.
a) Entity
b) Entity Set
Entity: It may be an object, person, place or event that stores data in a database. In a
relationship diagram an entity is represented in rectangle form.
Entity set: It is a collection of entities of the same type which share similar properties.
Single value attribute: These attributes contain a single value. For example, age, salary
etc.
Multivalued attribute: They contain more than one value of a single entity. For example,
phone numbers.
Composite attribute: The attributes which can be further divided. For example, Name->
First name, Middle name, last name
Derived attribute: The attribute that can be derived from others. For example, Date of
Birth.
a) Relationship
b) Degree of Relationship
a) Unary relationship
b) Binary relationship
c) Ternary relationship
d) N-ary relationship
Constraints are used for modeling limitations on the relations between entities. There are
two types of constraints on the Entity Relationship (ER) model:
b) Participation constraints.
63. For the binary relationship set there are entity set A and B. Write the possible
mapping cardinality.
a) One-to-one
b) One-to-many
c) Many-to-one
d) Many-to-many
a) Aggregation
b) Specialization
c) Generalization
a) Aggregation
b) Specialization
c) Generalization
Aggregation: In aggregation, the relation between two entities is treated as a single entity.
Specialization: The process of designing sub groupings within an entity set is called
specialization.
Generalization: It is a process of extracting common properties from a set of entities and
creating a generalized entity from it.
A relation is in first normal form if every attribute in that relation is singled valued
attribute.
The process of breaking up or dividing a single relation into two or more sub relations is
called as decomposition of a relation.
Constraints are used for modeling limitations on the relations between entities. There are
two types of constraints on the Entity Relationship (ER) model:
b) Participation constraints.
a) One-to-one
b) One-to-many
Functional Dependency (FD) is a constraint that determines the relation of one attribute
to another attribute in a Database Management System (DBMS). A functional
dependency is denoted by an arrow “→”.
a) Multivalued Dependency
d) Transitive Dependency
Multivalued dependency occurs when two attributes in a table are independent of each
other but, both depend on a third attribute. A multivalued dependency consists of at least
two attributes that are dependent on a third attribute that's why it always requires at least
three attributes
Temporal Data is the temporary data that is valid only for a prescribed time. It becomes
invalid or obsolete after a certain period of time.
77. What is Domain-Key Normal Form?
A relation is in Domain-Key Normal Form (DKNF) when insertion or delete anomalies are
not present in the database. Domain-Key Normal Form is the highest form of
Normalization.
Third Normal Form (3NF): A relation is in third normal form, if there is no transitive
dependency for non-prime attributes as well as it is in second normal form.
Boyce-Codd Normal Form: BCNF (Boyce Codd Normal Form) is the advanced version
of 3NF. A table is in BCNF if every functional dependency X->Y, X is the super key of the
table.
79. Differentiate between First Normal Form (1NF) and Second Normal Form (2NF).
A servlet is a Java programming language class that is used to extend the capabilities of
servers that host applications accessed by means of a request-response programming
model.
81. What is Server-side scripting?
JSP stands for Java Server Pages. It is a technology that allows developers to create
dynamic web pages using a combination of HTML, XML, and Java code.
Application security helps protect application data and code against cyberattacks and
data theft.
Application performance indicates how the app is functioning and how responsive the
app is to the end-user.
Encryption is a way of scrambling data so that only authorized parties can understand the
information.
a) Symmetric-key encryption
b) Public-key encryption
a) Business modeling
b) Data modeling
c) Process modeling
d) Application generation
A complex data type is a transformation data type that represents multiple data values in
a single column position.
ARRAY data type: An array data type represents an ordered collection of elements.
MAP data type: A map data type represents an unordered collection of key-value pair
elements.
A structured type is a user-defined data type containing one or more named attributes,
each of which has a data type.
Table inheritance is the property that allows a table to inherit the behavior from the
supertable above it in the table hierarchy.
a) Arrays
b) Multisets
a) Array
b) Multiset
Object identity is a property of data that is created in the context of an object data model,
where an object is assigned a unique internal object identifier, or object id.
Q103.What is database?
information.
A file processing system is a collection of files and programs that access/modify these
files.
Q105. What are the advantages & disadvantages of file processing system?
Advantages
a) Cost friendly.
b) Easy to use.
c) High scalability.
Disadvantages
c) Inconsistent Data.
e) Unauthorized Access
a. Hardware
b. Software
c. Data
d. Users
e. Procedures
A file processing system is a collection of files and programs that access/modify these
files.
a) Super Key
b) Candidate Key
Super Key: A super key is a group of single or multiple keys which identifies rows in
a table.
Candidate Key: Candidate Key is a set of attributes that uniquely identify tuples in a
table. It is a super key with no repeated attributes.
Whenever a primary key consists of more than one attribute, it is known as a composite
a) Select (σ)
b) Projection (π)
SELECT (σ): The SELECT operation is used for selecting a subset of the tuples
Projection(π): The projection method defines a relation that contains a vertical subset
of Relation.
Q114. Define Unary and Binary operations.
Unary operation: The “select, project, rename” operations are called unary operations.
Binary operation: The “union, set difference, Cartesian product” operations are called
Tuple variables are defined in the from clause via the use of the as clause.
Find the customer names and their loan numbers for all customers having a loan at some
branch.
Find the names of all customers whose street includes the substring ‘Main’.
select customer-name
from customer
Q120. List in alphabetic order the names of all customers having a loan at Dhaka
branch.
order by customer-name
The drop table command deletes all information about the dropped relation from the
database.
Q123. For all instructors in the university who have taught some course, find their
SQL provides a mechanism for renaming both relations and attributes which is called
Q126. For all instructors in the university who have taught some course, find their
The predicate is not null succeeds if the value on which it is applied is not null.
Q128. Find all instructors who appear in the instructor relation with null values
for salary.
select name
from instructor
semester.
from teaches
No, SQL does not allow the use of distinct with count (*).
The GROUP BY Statement in SQL is used to arrange identical data into groups with
Having clause is useful to state a condition that applies to groups rather than to tuples.
If any attribute that is present in the having clause without being aggregated is not
SQL applies predicates in the having clause after groups have been formed.
A common use of subqueries is to perform tests for set membership, make set
comparisons, and determine set cardinality, by nesting subqueries in the where clause.
Q136. Define in and not in connectives.
The in connective tests for set membership, where the set is a collection of values
Q137. Find the names of instructors whose names are neither “Mozart” nor
“Einstein”.
from instructor
Q138. How the phrase “greater than at least one” is represented in SQL?
The phrase “greater than at least one” is represented in SQL by > some.
Q139. Find the names of all instructors whose salary is greater than at least one
select name
from instructor
from instructor
The phrase “greater than at least one” is represented in SQL by > all.
Q142. What are the Interactions in DBMS?
a) Data definition
b) Update
c) Retrieval
d) Administration
Retrieval is obtaining information either for end-user queries and reports or for
processing by applications.
Abstract view means, the system hides certain details of how the data are stored and
maintained.
The ability to modify the physical schema without changing the logical schema.
There are a number of users who can access or retrieve data on demand using the
a) Naive Users
b) Application Programmers
c) Sophisticated Users
End users: Naive users are end users of the database who work through a menu driven
application program, where the type and range of response is always indicated to the
user.
Database Administrator: The DBA has all the system privileges allowed by the
DBMS and can assign (grant) and remove (revoke) levels of access (privileges) to and
a) Redundancy is controlled.
DBMS provides a systematic and organized way of storing, managing and retrieving
from collection of logically related information. RDBMS also provides what DBMS
ORDER BY clause helps to sort the data in either ascending order to descending.
a) Analysis phase
b) Redo phase
c) Undo phase
Q155. Explain the differences between structured data and unstructured data.
Structured data are facts concerning objects and events. The most important structured
data are numeric, character, and dates. Structured data are stored in tabular form.
Unstructured data are multimedia data such as documents, photographs, maps, images,
sound, and video clips. Unstructured data are most commonly found on Web servers and
Web-enabled databases.
The hierarchical model is a top-down structure where each parent may have many
children, but each child can have only one parent. This model supports one-to-one and
one-to-many relationships.
The network model can be much more flexible than the hierarchical model since each
parent can have multiple children, but each child can also have multiple parents. This
An entity set that doesn't have sufficient attributes to form a primary key is referred to
Entity Integrity: This states a very important rule that value of a Primary key can never
Referential Integrity: This rule is related to the Foreign key which states that either
the value of a Foreign key is a NULL value or it should be the primary key of any other
relation.
4NF and it cannot have a lossless decomposition into any number of smaller tables.
c) Updating views
Q2. What is the primary function of the Physical Layer in the OSI model?
The Physical Layer deals with the physical transmission of data bits over a medium.
Q7. Name a popular medium access control protocol used in Ethernet networks.
IEEE standard 802.3, also known as Ethernet, is widely used for medium access control.
The Data Link Layer is responsible for error detection, correction, and framing of data.
Q9. What do you mean by Network?
transmission medium.
is used to send, receive and forward the electronic information, A device connected to
Network topology is a physical layout of the computer network, and it defines how the
Open System Interconnection, the name itself suggests that it is a reference model that
defines how applications can communicate with each other over a networking system.
Q14.Which layer links the network support layers and user support layers?
The Transport layer links the network support layers and user support layers
b) Physical Layer
d) Network Layer
e) Transport Layer
f) Session Layer
g) Presentation Layer
h) Application Layer
a) Physical Layer
c) Network Layer
a) Session Layer
b) Presentation Layer
c) Application Layer
a) Application Layer
b) Transport Layer
c) Internet Layer
d) Network Layer
The Network Layer is responsible for the source to destination delivery of packet
a) Logical Addressing
b) Routing
Q21.What are the responsibilities of Presentation Layer?
a) Translation
b) Encryption
c) Compression
a) Dialog control
b) Synchronization
Q24.What is a LAN?
LAN stands for Local Area Network. It refers to the connection between computers and
other network devices that are located within a small physical location.
Q25.What is a node?
A network can consist of two or more computers directly connected by some physical
medium such as coaxial cable or optical fiber. Such a physical medium is called as
If the physical links are limited to a pair of nodes it is said to be point-point link.
Q28.Define Routing?
The processes on each machine that communicate at a given layer are called peer-peer
process.
If the physical links are shared by more than two nodes, it is said to be Multiple Access.
If the physical links are shared by more than two nodes, it is said to be Multiple Access.
a) Number of Users
c) Hardware
d) Software
Q33.What is switching?
Q35.What is PLP?
manageable chunks before it is transmitted across the network. In this process that the
source and destination addresses are attached to the headers, along with parity checks.
Q38.What is Protocol?
a) Syntax
b) Semantics
c) Timing
Q40.What is Syntax?
It refers to the structure or format of the data, that is the order in which they are
presented.
Q41.What is Semantics?
Q42.What is Timing?
Timing refers to two characteristics: When data should be sent and how fast they can
be sent.
A subnet mask is combined with an IP address to identify two parts: the extended
network address and the host address. Like an IP address, a subnet mask is made up of
32 bits.
Q46.What is a VPN?
VPN means Virtual Private Network, a technology that allows a secure tunnel to be
created across a network such as the Internet. For example, VPNs allow you to establish
a secure dialup connection to a remote server.
Q47.What is Switch?
Switches manage the flow of data across a network by transmitting a received network
packet only to the one or more devices for which the packet is intended
Q48.What is Subnet?
A subnet is a network inside a network achieved by the process called subnetting which
a) Classful Subnetting
b) Classless Subnetting
a) Virtual Circuits
b) Datagrams
Frame Relay is a high-performance WAN protocol that operates at the physical and
Frame Relay often serves to connect local area networks (LANs) with major backbones
Advantages,
a) Cost Savings
c) Protocol Independence
d) Performance
Disadvantages,
Q55.What is ALOHA?
ALOHA is a medium access control (MAC) protocol for transmission of data via a
shared network channel. Using this protocol, several data streams originating from
a) Pure ALOHA
b) Slotted ALOHA
In Slotted Aloha, any station can transmit data only at beginning of any time slot. In Pure
Aloha, time is continuous and is not globally synchronized. Slotted Aloha reduces the
number of collisions to half thus doubles the efficiency.
a) Framing
b) Physical addressing
c) Flow control
d) Error control
e) Access control
Q61.What is NIC?
Network Interface Card (NIC) used at the Data Link Layer. NIC is a hardware
component in the networking device using which a device can connect to the network.
Q63.What is DNS?
Internet’s phone book. All the public IP addresses and their hostnames are stored in the
DNS
a) Single bit error :In a frame, there is only one bit anywhere, which is corrupt
b) Multiple bits error: Frame is received with more than one bit in corrupted state
a) Character Count
d) Encoding Violations
Q66.What are the types of error detection ?
a) Parity Checking.
d) Check Sum.
Q67.What is SNMP?
SNMP stands for Simple Network Management Protocol. It is a network protocol used
a) SNMP Manager
b) Managed device
c) SNMP Agent
SMTP is the Simple Mail Transfer Protocol. SMTP sets the rule for communication
between servers.
UDP is the User Datagram Protocol and is based on Datagrams. Mainly, it is used for
ICMP is the Internet Control Message Protocol. It is a network layer protocol used for
error handling.
FTP is a File Transfer Protocol. It is an application layer protocol used to transfer files
MAC address is the Media Access Control address. It is a 48-bit or 64-bit unique
Q75.How many types of modes are used in data transferring through networks?
Data transferring modes in computer networks are of three types. They are,
a) Simplex: Data transferring which takes place only in one direction is called Simplex.
For example, radio signal, the print signal given from computer to printer, etc.
b) Half Duplex: Data transferring can happen in both directions but not at the same time.
For example, browsing through the internet, a user sends the request to the server and
later the server processes the request and sends back the web page.
c) Full Duplex: Data transferring happens in both directions that too simultaneously. For
example, two-lane roads where traffic flows in both directions, telephone
communication etc.
Q76.What is Link?
A link or edge refers to the connectivity between two nodes in the network. It includes
the type of connectivity (wired or wireless) between the nodes and protocols used for
has 4 octets of 8-bit each with each number with a value up to 255.
IPv4 classes are differentiated based on the number of hosts on the network. There are
five types of IPv4 classes and are based on the first octet of IP addresses which are
classified as Class A, B, C, D, or E.
a) Static IP Address.
b) Dynamic IP Address
The services provided by the transport layer protocols can be divided into five
categories:
a) End-to-end delivery
b) Addressing
c) Reliable delivery
d) Flow control
e) Multiplexing
a) UDP-Connectionless Protocol-Simple
b) TCP-Connection oriented protocol-Complex
Q84.What is DHCP?
The idea of DHCP (Dynamic Host Configuration Protocol) is to enable devices to get
Q85.What is Unicasting?
If the message is sent to a single node from the source, then it is known as unicasting.
a) Personal Area Network (PAN): It is the smallest and basic network type that is
often used at home. It the connection between the computer and another device
b) Local Area Network (LAN): LAN is used in small offices and internet cafes to
area covered by MAN is a small town, city, etc. A huge server is used to cover
d) Wide Area Network (WAN): It is more complex than LAN and covers a large
span of the area typically a large physical distance. The Internet is the largest
Q88.What is Multicasting?
If the message is sent to a subset of nodes from the source, then it is known as
Q89.What is Broadcasting?
If the message is sent to all the nodes in a network from a source, then it is known as
If the message is sent to any of the nodes from the source, then it is known as any
casting. It is mainly used to get the content from any of the servers in the Content
Delivery System.
Q91.What is IP address?
1) Simplex
2) Half duplex
3) Full duplex
Q95.What is TCP/IP?
TCP/IP is the short form of the Transmission Control Protocol / Internet Protocol. It is
Q96.What is NAT?
It stands for Network Address Translation and is a protocol that allows a network
network.
Q97.In how many ways the data is represented and what are they?
a) Text
b) Audio
c) Video
d) Images
e) Numbers
phases:
Connection Establishment
Data Transfer
Connection termination
Q101.What are the types of multiplexing?
The application layer is used by end-user software such as web browsers and email
clients. It provides protocols that allow software to send and receive information and
It uses the services of the transport layer, the network layer, the data link layer, and
a) TELNET
b) FTP
c) TFTP
d) NFS
e) SMTP
f) X window
g) SNMP
h) DHCP
i) DNS
Q105.What are the three functions of the presentation layer?
Character-code translation
Data conversion
a) Lossless Compression
b) Lossy compression
Q107.What is NAT?
NAT stands for Network Address Translation. It deals with remapping one IP Address
space with another by changing the IP headers of the packets that are being transmitted
Q108.What is LAN?
a) Straight cable
b) Cross cable
Q110.What is cross cable?
It’s used to connect same type of devices without using switch/hub so that they can
communicate.
Q111.What is ipconfig?
information of a computer on a network. It can show the physical address as well as the
IP address.
NVT is a set of pre-defined rules to very simple virtual terminal interaction. This
FTP build on a client server architecture and uses separate control and data connections
HTTP port 30
SMTP port 25
Q120.What is NOS?
A network administrator has many responsibilities that can be summarized into 3 key
functions:
a) Installation of a network,
c) Maintenance/troubleshooting of networks.
A hybrid network is a network setup that makes use of both client-server and peer-to-
peer
architecture.
a) Client-server problems
b) Application conflicts
c) Error in configuration
d) Protocol mismatch
e) Security issues
Hamming code is a liner code that is useful for error detection up to two immediate bit
errors.
a) Primary Station
b) Secondary Station
c) Combined Station
Domain Name System can map a name to an address and conversely an address to
name.
World Wide Web (www) can be grouped into three broad categories: They are
a) Static
b) Dynamic
c) Active
Q130.What is URL?
the internet
a) Protocol
b) Host
c) Port
d) Path
HTTP is the Hyper Text Transfer Protocol which defines the set of rules and standards
on how the information can be transmitted on the world wide web (www). It uses port
80 by default.
HTTPS is the Hyper Text Transfer Protocol Secure or Secure HTTP. It is an advanced
and secured version of HTTP. On top of HTTP, SSL/TLS protocol is used to provide
a) Control Connection
b) Data Connection
Port 21
Email uses various protocols like SMTP, IMAP and POP. The most prominent one used
In general, dynamic means capable of action and/or change, while static means
stationary or fixed.
Subnetting involves dividing an IP network into smaller sub-networks for better address
management.
Flow control regulates the rate of data transmission to prevent overwhelming the
receiver.
The three-way handshake is a process where TCP establishes a connection with a SYN,
A firewall is a network security device that controls incoming and outgoing traffic,
network applications.
A proxy server acts as an intermediary between clients and servers, enhancing security,
DNS (Domain Name System) servers resolve domain names into IP addresses.
Congestion control manages network traffic to prevent network congestion and ensure
A Directory Server stores and manages information about network resources, such as
Frame relay is a packet-switching technology used for data transmission over wide area
networks (WANs).
Q151.Q21: How does selective repeat ARQ differ from Go-Back-N ARQ?
In selective repeat ARQ, only the damaged or lost frames are retransmitted, while Go-
The Medium Access Sublayer manages access to the shared communication medium
in a network.
ATM networks transmit data in fixed-size cells for efficient and reliable data transfer.
The Transport Layer ensures reliable data transfer between two devices and provides
A network protocol is a set of rules and conventions that govern data communication
Data compression techniques reduce the size of data for efficient storage and
transmission.
Q157. What is the purpose of the Presentation Layer in the OSI model?
The Presentation Layer is responsible for data translation, encryption, and compression.
Flooding is a technique in which a router sends incoming data packets to all connected
network devices.
A DNS server translates human-readable domain names into IP addresses for network
communication.
Q163.What is the purpose of the Network Layer in the OSI model?
The Network Layer is responsible for routing data packets between different networks.
The ICMP (Internet Control Message Protocol) is used for error reporting and
diagnostics in IP networks.
A Directory Server stores and manages information about network resources, such as
Frame relay is a wide area network (WAN) technology that transmits data in frames,
ATM networks use fixed-size cells to transmit data efficiently and reliably across wide
The Transport Layer ensures reliable data transfer between two devices, providing error
A network protocol is a set of rules and conventions that govern how data is
A router is a networking device that connects different networks and forwards data
packets between them. It determines the best path for data to travel, based on network
routing tables.
Q174.What is the purpose of NAT (Network Address Translation) in a router?
NAT is used to map private IP addresses to a single public IP address, allowing multiple
devices in a private network to share a single public IP when accessing the internet.
MAC filtering is a security feature that allows or denies network access based on the
Media Access Control (MAC) address of a device. Only devices with approved MAC
It allows network administrators to isolate and secure different groups of devices within
DNS spoofing is a cyberattack in which an attacker alters DNS records to redirect users
to malicious websites without their knowledge. It's a form of DNS cache poisoning.
A router's default gateway is the IP address of the router that serves as the entry and
exit point for traffic between a local network and external networks, such as the internet.
A hub is a basic networking device that broadcasts data to all devices in a network,
while a switch intelligently forwards data only to the device that needs it, improving
network efficiency.
Port forwarding is a router configuration that redirects incoming network traffic from a
specific port to a designated device or server within the local network. It's commonly
A DMZ is a network segment that sits between the internal network and an external
network, typically the internet. It is used to host public-facing services while isolating
QoS is a set of techniques used to prioritize network traffic and ensure that critical
applications receive adequate bandwidth and lower-priority traffic does not interfere with
them.
Q184.What is the role of a gateway in network communication?
A gateway is a device or software that connects two different networks using different
protocols, allowing data to be transferred between them. It acts as a translator and
protocol converter.
A MAC table is a database maintained by network switches that maps MAC addresses
A network hub is a basic networking device that connects multiple devices in a network.
It broadcasts incoming data packets to all connected devices, making it suitable for
small and simple networks.
A subnet mask is used to divide an IP address into network and host portions.
MAC address table aging time is the duration for which a network switch stores MAC
address entries in its MAC table. After this time expires, inactive entries are removed to
make space for new entries.
Q190.What is a DHCP lease time, and why is it important?
A DHCP lease time is the duration for which a device is granted an IP address lease by a
DHCP server. It is important because it determines how long a device can use a specific
IP address before it must renew the lease.
A broadcast domain is a logical division of a network in which all devices can receive each
other's broadcast messages. Routers typically separate broadcast domains.
A static IP address is a fixed, manually configured IP address that does not change. It is
used when a device needs a consistent, unchanging IP address, such as for servers or
network devices.