Friday, October 31, 2014

Core Java

1. What is the most important feature of Java?
Java is a platform independent language.

2. What do you mean by platform independence?
Platform independence means that we can write and compile the java code in one platform (eg Windows) and can execute the class in any other supported platform eg (Linux,Solaris,etc).

3. What is a JVM?
JVM is Java Virtual Machine which is a run time environment for the compiled java class files.

4. Are JVM's platform independent?
JVM's are not platform independent. JVM's are platform specific run time implementation provided by the vendor.

5. What is the difference between a JDK and a JVM?
JDK is Java Development Kit which is for development purpose and it includes execution environment also. But JVM is purely a run time environment and hence you will not be able to compile your source files using a JVM.

Thursday, October 30, 2014

Windows 2000 Server

1. 
You are the administrator of a Windows 2000 Server computer that has FIVE hard disks. Four 100 GB hard disks on the server are configured as a single stripe volume. You want to reconfigure the fourth disk so that the volume is fault tolerant and has as much space possible available for storing data. You want to use only existing hardware. What should you do?
A.Convert the disk to dynamic disk shut doWn and restart the server
B.Backup the data on the stripe volume and delete the stripe volume. Create a raidS volume on the four disks, restore the data to the new raid5 volume
C.Backup the data on the stripe volume and delete the stripe volume. Create a mirror volume, shut down and restart the server. Restore the data to new mirror volumes
D.Backup the data on the stripe volume and delete the stripe
E.None of above
2. 
You are the administrator of a Windows 2000 Server network that runs in mixed mode. You install a new Windows 2000 Server computer. You create and share a new HP LaserJet 4L printer. Your Windows 2000 Professional client computers can print to the new printer successfully. However, when users try to connect to the printer from Windows NT Workstation 4.0 client computers, they receive the dialog box shown in the exhibit. "The server on which the printer resides does not have a suitable HP LaserJet printer driver installed". You want the printer driver to be installed automatically on the Windows NT Workstation computers. What should you do?
A.Copy the Windows NT 4.0 Printer Drivers to the Net logon shared folders on all Windows NT Server 4.0 computers still configured as BDCs
B.Copy the Windows NT 4.0 printer drivers to the Net logon shared folder on the PDC emulator
C.Change the sharing options on the printer to install additional drivers for Windows NT 4.0 or Windows 2000
D.Copy the Windows NT 4.0 printer drivers to the Winnt\System32\ pri liter s\dri vers folder on the Windows 2000 print server
E.None of above
3. 
Your company's network includes Windows 3.1 client computers, Windows 95 client computers, and Windows 2000 Professional client computers. The company's manufacturing facilities run 24 hours per day. The company has developed its own 32-bit application that collects information from the manufacturing process so that workers on one shift can find out that was manufactured during the previous shift. The company wants to make the application available on all of the client computers by using Terminal Service on a Windows 2000 Server computer. This server will not run as a domain controller. You install Terminal Services. The information technology (IT) department needs to be able to remote control users' sessions to support and troubleshoot the application. What should you do to enable the IT department to control users' sessions?
A.Configure the Terminal server to run in Remote Administration mode
B.Grant the IT department Full Control permission to the Remote Desktop Protocol (RDP) on the Terminal server
C.Add the members of the IT department to the Power Users group on the Terminal server
D.Use third-party software to enable remote control of users' sessions
E.None of above
4. 
You are the administrator of contoso.local domain. You organize the domain into organizational units as shown in the EXHIBIT. You configure the local security options and other settings for the default domain policy object You delegate administration of Michigan and Florida OU. You want to prevent those administrators from creating any other group policy objects with settings that conflict with those you configured.What should you do?
A.From the group policy options from the contoso.local domains set the option not override
B.From the group policy options from the Michigan and Florida OU, set the option not override
C.Block the group policy inheritance for the contoso.local domain
D.Block the group policy inheritance for Michigan and Florida OU
E.None of above
5. 
You are the administrator of a Windows 2000 Server computer. The server contains one network adapter and is a file and print server for critical company resources. You install a second network adpater in the server and connect it to the same network subnet as the first adapter. You want to ensure that the first adapter is used for all network traffic and the second adapter is used only if the first adapter fails or is disconnected from the network. You also want to ensure that the server always has network connectivity even if one network adapter fails. What should you do?
A.Set the second adapters status to disable
B.Configure the first adapter to use a TCP/IP metric of 100
C.Configure the second adapter to use a TCP/IP metric of 25
D.Configure the binding order on the second adapter to bind TCP/IP last
E.None of above

Wednesday, October 29, 2014

Computer Fundamentals

1. 
A computer program that converts assembly language to machine language is
A.Compiler
B.Interpreter
C.Assembler
D.Comparator
E.None of the above
2. 
The time required for the fetching and execution of one simple machine instruction is
A.Delay time
B.CPU cycle
C.Real time
D.Seek time
E.None of the above
3. 
The time for which a piece of equipment operates is called
A.Seek time
B.Effective time
C.Access time
D.Real time
E.None of the above
4. 
Binary numbers need more places for counting because
A.They are always big numbers
B.Any no. of 0's can be added in front of them
C.Binary base is small
D.0's and l's have to be properly spaced apart
E.None of the above
5. 
Which access method is used for obtaining a record from a cassette tape?
A.Direct
B.Sequential
C.Random
D.All of the above
E.None of the above

The Client-Server Database

1. 
Which of the following statements is true about symmetric multiprocessing?
A.A single copy of the operating system resides in each processor.
B.Useful for situations where data must remain in memory to process.
C.Bottlenecks increase with uniprocessor systems because tasks are not shared.
D.The problems of memory contention are unlikely.
2. 
Which of the following items are not necessary for client/server?
A.Assure that tools will connect with middleware.
B.Understand the requirements.
C.Determine network bandwidth capabilities.
D.Include the use of a file server.
3. 
A benefit of the three-tier architecture is which of the following?
A.New modules can be built to support specific business needs
B.Performance improves for compiled SQL statements
C.Results in a thinner client and database server
D.All of the above.

4. 
Which of the following statements is true concerning JDBC?
A.It is language independent.
B.It is similar in concept to ODBC.
C.It is useful for all object-oriented languages.
D.It consists of three main layers.
5. 
A characteristic of a file server is which of the following?
A.Manages file operations and is shared on a network.
B.Manages file operations and is limited to one PC.
C.Acts as a fat client and is shared on a network.
D.Acts as a fat client and is limited to one PC.

The Client-Server Database

1. 
Which of the following statements is true about symmetric multiprocessing?
A.A single copy of the operating system resides in each processor.
B.Useful for situations where data must remain in memory to process.
C.Bottlenecks increase with uniprocessor systems because tasks are not shared.
D.The problems of memory contention are unlikely.
2. 
Which of the following items are not necessary for client/server?
A.Assure that tools will connect with middleware.
B.Understand the requirements.
C.Determine network bandwidth capabilities.
D.Include the use of a file server.
3. 
A benefit of the three-tier architecture is which of the following?
A.New modules can be built to support specific business needs
B.Performance improves for compiled SQL statements
C.Results in a thinner client and database server
D.All of the above.
4. 
Which of the following statements is true concerning JDBC?
A.It is language independent.
B.It is similar in concept to ODBC.
C.It is useful for all object-oriented languages.
D.It consists of three main layers.
5. 
A characteristic of a file server is which of the following?
A.Manages file operations and is shared on a network.
B.Manages file operations and is limited to one PC.
C.Acts as a fat client and is shared on a network.
D.Acts as a fat client and is limited to one PC.

Tuesday, October 28, 2014

Windows NT

1. 
How do you configure a printing pool?
A.Associate one print device with multiple printers
B.Associate multiple print devices with one printer
C.Associate multiple print devices with multiple printers
D.Associate one physical print gear port with multiple printers
E.None of the above
2. 
In heavily overloaded networks, cross¬bar switching offers better performance than cell-backplane switching
A.TrueB.False
3. 
You want to connect 2 networks that are both lOBaseT Ethernet networks. The 2 networks are located in separate buildings so that they are approximately 1,000 meters apart. Which media should you use?
A.Type 1 STP Cable
B.RG-58 A/U Coaxial Cable
C.fiber-optic cable
D.wireless infrared
E.None of the above
4. 
You install Windows NT Server on a computer, making the computer a backup domain controller in an existing domain. After installation, you discover that you used the wrong domain name. What should you do?
A.Change the domain name by using Control Panel
B.Modify the domain name in the Registry
C.Reinstall Windows NT Server
D.Change the domain name by using the Emergency Repair disk
5. 
In your company, 2 Ethernet Networks are connected with a router. All network connections run TCP/IP. Your new client computer can access only the computers on your side of the router. All other computers are able to access one another. What is the most likely cause of the problem?
A.incorrect termination of the destination network
B.defective network adapter in the router
C.incorrect subnet mask on your client computer
D.malfunctioning repeater
E.None of the above

Monday, October 27, 2014

Networking

1. 
How many digits of the DNIC (Data Network Identification Code) identify the country?
A.first three
B.first four
C.first five
D.first six
E.None of the above
2. 
A station in a network forwards incoming packets by placing them on its shortest output queue. What routing algorithm is being used?
hot potato routing
B.flooding
C.static routing
D.delta routing
E.None of the above
3. 
The probability that a single bit will be in error on a typical public telephone line using 4800 bps modem is 10 to the power -3. If no error detection mechanism is used, the residual error rate for a communication line using 9-bit frames is approximately equal to
A.0.003
B.0.009
C.0.991
D.0.999
E.None of the above
4. 
Frames from one LAN can be transmitted to another LAN via the device
A.RouterB.Bridge
C.RepeaterD.Modem
5. 
Which of the following condition is used to transmit two packets over a medium at the same time?
A.Contention
B.Collision
C.Synchronous
D.Asynchronous
E.None of the above