0% found this document useful (0 votes)
29 views

Must Do Questions For Dbms CN Os Interviews Sde Core Sheet Interviews T

must-do-questions-for-dbms-cn-os-interviews-sde-core-sheet-interviews

Uploaded by

Shivam kumar
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views

Must Do Questions For Dbms CN Os Interviews Sde Core Sheet Interviews T

must-do-questions-for-dbms-cn-os-interviews-sde-core-sheet-interviews

Uploaded by

Shivam kumar
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 26

lOMoARcPSD|45413011

MUST-DO Questions for [DBMS, CN, OS] Interviews- SDE


Core Sheet - Interviews - T
DBMS Lab (Rajasthan Technical University)

Scan to open on Studocu

Studocu is not sponsored or endorsed by any college or university


Downloaded by Shivam kumar ([email protected])
lOMoARcPSD|45413011

takeUforward

January 11, 2022 ¥ Interviews Search

MUST-DO Questions for Search

[DBMS, CN, OS]


Interviews: SDE Core Sheet
(Sheet for the sole purpose of quick revision and
preparation in less time)

Made with love by takeUforward!

What is the SDE Core Sheet?

SDE Core Sheet contains very handily crafted and picked


interview questions of DBMS, OS, and CN. These
questions are very helpful for the last-minute
preparation for SDE interviews. 100+ students placed
already with the help of the SDE Core Sheet!

Why trust this sheet?

This sheet is prepared by Raj Vikramaditya A.K.A Striver,

Downloaded by Shivam kumar ([email protected])


lOMoARcPSD|45413011

Candidate Master, 6*, Currently working at Google, ex


Media.net (Directi), an ex Intern at Amazon India. Major
success with the previous sheets, and more importantly
trusted by his ÒTAKEUFORWARD FAMÓ
Vascular
Question Bank Starts drshaileshirexper

Operating System:
Advanced Non Surgical Laser Tre
What is the main purpose of an operating system? Discuss Hospital
dif

An operating system (OS) is system software that


manages computer hardware, software resources, and
provides common services for computer programs. So it
manages the computerÕs memory, processes, devices,
files, and security aspects of the system. It also allows
us to communicate with the computer without knowing
how to speak the computerÕs language. Without an
operating system, a computer is not useful.

Types of operating system: Watch Now

Batch OS
Distributed OS
Multitasking OS
Network OS
Real-Time OS
Mobile OS

Reference: https://www.geeksforgeeks.org/types-of-
operating-systems/

What is a socket, kernel and monolithic kernel ?

Socket:
A socket is defined as an endpoint for communication, A
pair of processes communicating over a network employ
a pair of sockets ,one for each process. A socket is

Downloaded by Shivam kumar ([email protected])


lOMoARcPSD|45413011

identified by an IP address concatenated with a port


number.
The server waits for incoming client requests by
listening to a specified port. Once a request is received,
the server accepts a connection from the client socket
to complete the connection.

Kernel is the central core component of an operating


system that manages operations of computer and
hardware. Kernel Establishes communication between
user level application and hardware. Manages memory
and CPU time. Decides state of incoming processes.
Sponsored by
Controls Disk, Memory, Task Management act.jhatkaa.org

Monolithic Kernel (provides good performance but lots


of lines of code) Recent Posts
It is one of the types of kernel where all operating
Top Array Interview
system services operate in kernel space. It has
Questions Ð
dependencies between system components. It has huge Structured Path with
lines of code which is complex. Video Solutions
Example : Unix, Linux, Open VMS, XTS-400 etc.
Longest Subarray with
Difference between process and program and thread? Dif sum K | [Postives and
Negatives]
Process: Count Subarray sum
Process is an instance of an executing program. For Equals K
example, we write our computer programs in a text file Binary Tree
and when we execute this program, it becomes a Representation in Java
process which performs all the tasks mentioned in the
Binary Tree
program. Representation in C++

Program:
Program is a set of instructions to perform a certain
task. Eg: chrome.exe, notepad.exe

Thread:
Thread is a path of execution within a process. A thread
is also known as a lightweight process. The idea is to

Downloaded by Shivam kumar ([email protected])


lOMoARcPSD|45413011

achieve parallelism by dividing a process into multiple


threads. For example,Word processor uses multiple Accolite Digital Amazon
threads: one thread to format the text, another thread Arcesium arrays Bank of America

to process inputs. Barclays BFS Binary


Search Binary Search Tree
DeÞne virtual memory, thrashing, threads.
Commvault CPP DE Shaw DFS

Virtual Memory: DSA Self


A computer can address more memory than the amount
physically installed on the system. This extra memory is
Paced google

HackerEarth Hashing infosys


actually called virtual memory and it is a section of a
inorder Interview Experience
hard disk thatÕs set up to emulate the computerÕs RAM.
Java Juspay Kreeti Technologies
The main visible advantage of this scheme is that
Morgan Stanley Newfold Digital
programs can be larger than physical memory. Virtual
Oracle post order recursion
memory serves two purposes. First, it allows us to Samsung SDE Core Sheet

extend the use of physical memory by using a disk.


SDE Sheet Searching
Second, it allows us to have memory protection,
set-bits sorting
because each virtual address is translated to a physical
Strivers
address.
A2ZDSA Course
Thrashing:
sub-array subarray Swiggy
Thrashing is a condition or a situation when the system takeuforward TCS TCS
is spending a major portion of its time in servicing the
CODEVITA TCS Ninja TCS
page faults, but the actual processing done is very
negligible. High degree of multiprogramming(if number NQT VMware XOR
of processes keeps on increasing in the memory), lack of
frames (if a process is allocated too few frames, then
there will be too many and too frequent page faults)
causes Thrashing.

Threads:
A thread is a single sequential flow of execution of tasks
of a process so it is also known as thread of execution or
thread of control.

What is RAID ? Different types.

RAID, or ÒRedundant Arrays of Independent DisksÓ is a

Downloaded by Shivam kumar ([email protected])


lOMoARcPSD|45413011

technique which makes use of a combination of multiple


disks instead of using a single disk for increased
performance, data redundancy or both.Data
redundancy, although taking up extra space, adds to
disk reliability. This means, in case of disk failure, if the
same data is also backed up onto another disk, we can
retrieve the data and go on with the operation.

What is a deadlock? Different conditions to achieve a deadlock.


Vascular Care
Advanced Non
A Deadlock is a situation where each of the computer Surgical Laser W
processes waits for a resource which is being assigned Treatment Hospital

to some other process. In this situation, none of the


processes gets executed since the resource it needs is
held by some other process which is also waiting for
some other resource to be released.

How deadlock is achieved: Deadlock happens when


Mutual exclusion, hold and wait, No preemption and
circular wait occurs simultaneously.

Necessary Conditions for deadlock:


Vascular Care
1. Mutual Exclusion
Advanced Non
2. Hold and Wait Surgical Laser W
Treatment Hospital
3. No preemption
4. Circular Wait

What is fragmentation? Types of fragmentation.

Fragmentation:
An unwanted problem in the operating system in which
the processes are loaded and unloaded from memory,
and free memory space is fragmented. Processes canÕt
be assigned to memory blocks due to their small size,
and the memory blocks stay unused. It is also necessary
to understand that as programs are loaded and deleted
from memory, they generate free space or a hole in the

Downloaded by Shivam kumar ([email protected])


lOMoARcPSD|45413011

memory. These small blocks cannot be allotted to new


arriving processes, resulting in inefficient memory use.

The conditions of fragmentation depend on the memory


allocation system. As the process is loaded and
unloaded from memory, these areas are fragmented
into small pieces of memory that cannot be allocated to
incoming processes. It is called fragmentation.

Types of fragmentation:
1. Internal
2. External
Sponsored by
What is spooling ? act.jhatkaa.org

SPOOL is an acronym for simultaneous peripheral


operations online. Spooling is a process in which data is
temporarily held to be used and executed by a device,
program, or system.
In spooling, there is no interaction between the I/O
devices and the CPU. That means there is no need for
the CPU to wait for the I/O operations to take place.
Such operations take a long time to finish executing, so
the CPU will not wait for them to finish. Vascular Care
The biggest example of Spooling is printing. The Advanced Non
Surgical Laser W
documents which are to be printed are stored in the Treatment Hospital
SPOOL and then added to the queue for printing. During
this time, many processes can perform their operations
and use the CPU without waiting while the printer
executes the printing process on the documents one-
by-one.

What is semaphore and mutex (Differences might be asked)? DeÞne Binar

BeladyÕs Anomaly

BŽl‡dyÕs anomaly is the name given to the phenomenon


where increasing the number of page frames results in

Downloaded by Shivam kumar ([email protected])


lOMoARcPSD|45413011

an increase in the number of page faults for a given


memory access pattern.

Solution to fix BeladyÕs Anomaly:


Implementing alternative page replacement algo helps
eliminate BeladyÕs Anomaly.. Use of stack based
algorithms, such as Optimal Page Replacement
Algorithm and Least Recently Used (LRU) algorithm, can
eliminate the issue of increased page faults as these
algorithms assign priority to pages

Starving and Aging in OS

Starving/Starvation(also called Lived lock): Starvation is


the problem that occurs when low priority processes get
jammed for an unspecified time as the high priority
processes keep executing. So starvation happens if a
method is indefinitely delayed.

Solution to Starvation : Ageing is a technique of


gradually increasing the priority of processes that wait
in the system for a long time.

Why does trashing occur?

High degree of multiprogramming(if number of


processes keeps on increasing in the memory) , lack of
frames(if a process is allocated too few frames, then
there will be too many and too frequent page faults.)
causes Thrashing.

What is paging and why do we need it?

Paging is a memory management scheme that


eliminates the need for contiguous allocation of physical
memory. This scheme permits the physical address
space of a process to be non Ð contiguous.
Paging is used for faster access to data. When a
program needs a page, it is available in the main

Downloaded by Shivam kumar ([email protected])


lOMoARcPSD|45413011

memory(RAM) as the OS copies a certain number of


pages from your storage device to main memory. Paging
allows the physical address space of a process to be
noncontiguous.

Demand Paging, Segmentation

Demand paging is a method of virtual memory


management which is based on the principle that pages
should only be brought into memory if the executing
process demands them. This is often referred to as lazy
evaluation as only those pages demanded by the
process are swapped from secondary storage to main
memory.
So demand paging works opposite to the principle of
loading all pages immediately.

Segmentation is a memory management technique in


which the memory is divided into the variable size parts.
Each part is known as a segment which can be allocated
to a process.

The details about each segment are stored in a table


called a segment table. Segment table is stored in one
(or many) of the segments.

Segment table contains mainly two information about


segment:

Base: It is the base address of the segment


Limit: It is the length of the segment.

Real Time Operating System, types of RTOS.

A real-time operating system (RTOS) is a special-


purpose operating system used in computers that has
strict time constraints for any job to be performed and is
intended to serve real time applications that possess
data as it comes in , typically without buffer delays.

Downloaded by Shivam kumar ([email protected])


lOMoARcPSD|45413011

Types of RTOS:

Hard RTOS
Firm RTOS
Soft RTOS

Difference between main memory and secondary memor

Dynamic Binding

Static binding happens when the code is compiled, while


dynamic bind happens when the code is executed at run
time.

Static Binding:
When a compiler acknowledges all the information
required to call a function or all the values of the
variables during compile time, it is called Òstatic bindingÓ.
As all the required information is known before runtime,
it increases the program efficiency and it also enhances
the speed of execution of a program. Static Binding
makes a program very efficient, but it declines the
program flexibility, as Ôvalues of variableÕ and Ôfunction
callingÕ are predefined in the program. Static binding is
implemented in a program at the time of coding.
Overloading a function or an operator is the example of
compile time polymorphism i.e. static binding.

Dynamic Binding Calling a function or assigning a value


to a variable, at run-time is called ÒDynamic BindingÓ.
Dynamic binding can be associated with run time
ÔpolymorphismÕ and ÔinheritanceÕ in OOP. Dynamic
binding makes the execution of a program flexible as it
can decide what value should be assigned to the
variable and which function should be called, at the time
of program execution. But as this information is
provided at run time it makes the execution slower as

Downloaded by Shivam kumar ([email protected])


lOMoARcPSD|45413011

compared to static binding.

FCFS Scheduling

SJF Scheduling

SRTF Scheduling

SRTF Scheduling is a preemptive version of SJF


scheduling. In SRTF, the execution of the process can be
stopped after a certain amount of time. At the arrival of
every process, the short term scheduler schedules the
process with the least remaining burst time among the
list of available processes and the running process.

LRTF Scheduling

This is a preemptive version of Longest Job First (LJF)


scheduling algorithm. In this scheduling algorithm, we
find the process with the maximum remaining time and
then process it. We check for the maximum remaining
time after some interval of time(say 1 unit each) to
check if another process having more Burst Time arrived
up to that time.

Priority Scheduling

Priority Scheduling is a method of scheduling processes


that is based on priority. In this algorithm, the scheduler
selects the tasks to work as per the priority.

The processes with higher priority should be carried out


first, whereas jobs with equal priorities are carried out
on a round-robin or FCFS basis. Priority depends upon
memory requirements, time requirements, etc.

Round Robin Scheduling

In Round-robin scheduling, each ready task runs turn by


turn only in a cyclic queue for a limited time slice. This

Downloaded by Shivam kumar ([email protected])


lOMoARcPSD|45413011

algorithm also offers starvation free execution of


processes. Widely used preemptive scheduling method
in traditional OS. All the jobs get a fair allocation of CPU.
Cons include : Finding a correct time quantum is a quite
difficult task in this system, Round-robin scheduling
doesnÕt give special priority to more important tasks.

Producer Consumer Problem

About Producer-Consumer problem: The Producer-


Consumer problem is a classic problem that is used for
multi-process synchronisation i.e. synchronisation
between more than one processes.

The job of the Producer is to generate the data, put it


into the buffer, and again start generating data. While
the job of the Consumer is to consume the data from
the buffer.

WhatÕs the problem here?


The following are the problems that might occur in the
Producer-Consumer:

The producer should produce data only when the buffer


is not full. If the buffer is full, then the producer
shouldnÕt be allowed to put any data into the buffer.
The consumer should consume data only when the
buffer is not empty. If the buffer is empty, then the
consumer shouldnÕt be allowed to take any data from
the buffer.
The producer and consumer should not access the
buffer at the same time.

We can solve this problem by using semaphores.

BankerÕs Algorithm

It is a banker algorithm used to avoid deadlock and


allocate resources safely to each process in the

Downloaded by Shivam kumar ([email protected])


lOMoARcPSD|45413011

computer system. The ÔS-StateÕ examines all possible


tests or activities before deciding whether the allocation
should be allowed to each process. It also helps the
operating system to successfully share the resources
between all the processes. The bankerÕs algorithm is
named because it checks whether a person should be
sanctioned a loan amount or not to help the bank
system safely simulate allocation resources.

Explain Cache

Cache memory is an extremely fast memory type that


acts as a buffer between RAM and the CPU. It holds
frequently requested data and instructions so that they
are immediately available to the CPU when needed.

Diff between direct mapping and associative mapping

Diff between multitasking and multiprocessing

Database Management System:

What is DBMS ? Mention advantages..

What is Database?

What is a database system?

What is RDBMS ? Properties..

Types of database languages

ACID properties (VVVVV IMP)

Difference between vertical and horizontal scaling

What is sharding

Downloaded by Shivam kumar ([email protected])


lOMoARcPSD|45413011

Keys in DBMS

Types of relationship

Data abstraction in DBMS, three levels of it

Indexing in DBMS

What is DDL (Data DeÞnition Language)

What is DML (Data Manipulation Language)

What is normalization ? Types of normalization.

What is denormalization ?

What is functional dependency ?

E-R Model ?

Conßict Serializability in DBMS ..

What is CCP ? (Concurrency Control Protocols)

Entity, Entity Type, Entity Set, Weak Entity Set..

What are SQL commands ? Types of them..

https://www.javatpoint.com/dbms-sql-command

Nested Queries in SQL ?

https://www.tutorialspoint.com/explain-about-nested-
queries-in-dbms

What is JOIN .. Explain types of JOINs

Downloaded by Shivam kumar ([email protected])


lOMoARcPSD|45413011

https://www.javatpoint.com/dbms-sql-joins

Inner and Outer Join

Here are the different types of the JOINs in SQL:

(INNER) JOIN: Returns records that have matching


values in both tables
LEFT (OUTER) JOIN: Returns all records from the left
table, and the matched records from the right table
RIGHT (OUTER) JOIN: Returns all records from the
right table, and the matched records from the left
table
FULL (OUTER) JOIN: Returns all records when there is
a match in either left or right table

Diff between 2 tier and 3 tier architecture

Diff between TRUNCATE and DELETE command ..

Difference between Intension and Extension in a DataBase

Difference between share lock and exclusive lock, deÞnition of lock

Computer Networks

DeÞne network

A network is a set of devices that are connected with a


physical media link. In
a network, two or more nodes are connected by a
physical link or two or more networks are connected by
one or more nodes. A network is a collection of devices
connected to each other to allow the sharing of data.

What do you mean by network topology, and explain types of them

Downloaded by Shivam kumar ([email protected])


lOMoARcPSD|45413011

Network topology is the arrangement of nodes and


links of a network.
Topologies are categorized as either physical network
topology or logical network topology.
The topology of a network is key to determining its
performance.
Network topology can be categorized into Ð Bus
Topology, Ring Topology, Star Topology, Mesh
Topology, Tree Topology.

Read this article for more details.

DeÞne bandwidth, node and link ?

Bandwidth is the data transfer capacity of a computer


network in bits per second (Bps). The term may also be
used colloquially to indicate a personÕs capacity for tasks
or deep thoughts at a point in time.

A network is a connection setup of two or more


computers directly connected by some physical
mediums like optical fibre or coaxial cable. This physical
medium of connection is known as a link, and the
computers that it is connected to are known as nodes

Explain TCP model ..

It is a compressed version of the OSI model with only 4


layers. It was developed by the US Department of
Defence (DoD) in the 1860s. The name of this model is
based on 2 standard protocols used i.e. TCP
(Transmission Control Protocol) and IP (Internet
Protocol).

1. Network Access/Link layer : Decides which links such


as serial lines or classic Ethernet must be used
to meet the needs of the connectionless internet layer.
Ex Ð Sonet, Ethernet
2. Internet : The internet layer is the most important

Downloaded by Shivam kumar ([email protected])


lOMoARcPSD|45413011

layer which holds the whole


architecture together. It delivers the IP packets where
they are supposed to be
delivered. Ex Ð IP, ICMP.
3. Transport : Its functionality is almost the same as the
OSI transport layer. It
enables peer entities on the network to carry on a
conversation. Ex Ð TCP, UDP
(User Datagram Protocol)
4. Application : It contains all the higher-level protocols.
Ex Ð HTTP, SMTP, RTP,
DNS

Layers of OSI model

There are majorly 2 main layers in the OSI model:

Physical Layer
Data Link Layer

Read this article for details

SigniÞcance of Data Link Layer

It is used for transferring the data from one node to


another node.
It receives the data from the network layer and
converts the data into data frames and then attaches
the physical address to these frames which are sent
to the physical layer.
It enables the error-free transfer of data from one
node to another node.

Functions of Data-link layer:

Frame synchronisation: Data-link layer converts the


data into frames, and it ensures that the destination
must recognize the starting and ending of each

Downloaded by Shivam kumar ([email protected])


lOMoARcPSD|45413011

frame.
Flow control: Data-link layer controls the data flow
within the network.
Error control: It detects and corrects the error
occurred during the transmission from source to
destination.
Addressing: Data-link layers attach the physical
address with the data frames so that the individual
machines can be easily identified.
Link management: Data-link layer manages the
initiation, maintenance and termination of the link
between the source and destination for the effective
exchange of data.

DeÞne gateway, difference between gateway and router ..

A node that is connected to two or more networks is


commonly known as a gateway. It is also known as a
router. It is used to forward messages from one network
to another. Both the gateway and router regulate the
traffic in the network. Differences between gateway and
router: A router sends the data between two similar
networks while gateway sends the data between two
dissimilar networks.

What does ping command do ?

The ÒpingÓ is a utility program that allows you to check


the connectivity between the network devices. You can
ping devices using its IP address or name.

What is DNS, DNS forwarder, NIC, ?

DNS:
1. DNS is an acronym that stands for Domain Name
System.DNS was introduced by Paul Mockapetris and
Jon Postel in 1983.
2. It is a naming system for all the resources over the
Video for new features | Send bugs to [email protected] | Clear cache of website for login issues

Downloaded by Shivam kumar ([email protected])


lOMoARcPSD|45413011

Video for new features | Send bugs to [email protected] | Clear cache of website for login issues
Combination internet which includes
of SD-WAN and physical nodes and applications.
ZTNA - Cyber Security
It is used Companies
to locate resources easily over a network.
OPEN
StriverÕs
Define StriverÕs
new service offerings, strengthenA2Z DSA
their security StriverÕs CS Interview StriverÕs
& help them become "future-ready"
SDE Sheet
3. DNS is an internet which maps the
securenetworkhub.com Course/Sheet DSA
domain names Subjects
to Prep Sheets CP Sheet
their associated IP addresses. Playlists
4. Without DNS, users must know the IP address of the
web page that you wanted to access.

DNS Forwarder : A forwarder is used with a DNS server


when it receives DNS queries that cannot be resolved
quickly. So it forwards those requests to external DNS
servers for resolution. A DNS server which is configured
as a forwarder will behave differently than the DNS
server which is not configured as a forwarder. NIC
stands for Network Interface Card. It is a peripheral card
attached to the PC to connect to a network. Every NIC
has its own MAC address that identifies the PC on the
network. It provides a wireless connection to a local area
network. NICs were mainly used in desktop computers.

What is MAC address ?

A media access control address (MAC address) is a


unique identifier assigned to a network interface
controller (NIC) for use as a network address in
communications within a network segment.

What is IP address, private IP address, public IP addr

An IP address is a unique address that identifies a


device on the internet or a local network. IP stands for
ÒInternet Protocol,Ó which is the set of rules governing
the format of data sent via the internet or local network.

Private IP Address Ð There are three ranges of IP


addresses that have been reserved
for IP addresses. They are not valid for use on the
internet. If you want to access the
internet on these private IPs, you must use a proxy

Downloaded by Shivam kumar ([email protected])


lOMoARcPSD|45413011

server or NAT server.

Public IP Address Ð A public IP address is an address


taken by the Internet Service
Provider which facilitates communication on the
internet.

APIPA stands for Automatic Private IP Addressing


(APIPA). It is a feature or characteristic in operating
systems (eg. Windows) which enables computers to
self-configure an IP address and subnet mask
automatically when their DHCP(Dynamic Host
Configuration Protocol:A DHCP Server is a network
server that automatically provides and assigns IP
addresses, default gateways and other network
parameters to client devices. It relies on the standard
protocol known as Dynamic Host Configuration
Protocol) server isnÕt reachable

Difference between IPv4 and IPv6

What is subnet ?

A subnet is a network inside a network achieved by the


process called subnetting which helps divide a network
into subnets. It is used for getting a higher routing
efficiency and enhances the security of the network. It
reduces the time to extract the host address from the
routing table.

Firewalls

The firewall is a network security system that is used to


monitor the incoming
and outgoing traffic and blocks the same based on the
firewall security policies. It acts as a wall between the
internet (public network) and the networking devices (a
private network). It is either a hardware device, software

Downloaded by Shivam kumar ([email protected])


lOMoARcPSD|45413011

program, or a combination of both. It adds a layer of


security to the network.

Different type of delays

The delays, here, means the time for which the


processing of a particular packet takes place.

We have the following types of delays in computer


networks:

Transmission Delay
Propagation delay
Queueing delay
Processing delay

3 way handshaking

Three-Way HandShake or a TCP 3-way handshake is a


process which is used in a TCP/IP network to make a
connection between the server and client. It is a three-
step process that requires both the client and server to
exchange synchronisation and acknowledgment packets
before the real data communication process starts.

Three-way handshake process is designed in such a way


that both ends help you to initiate, negotiate, and
separate TCP socket connections at the same time. It
allows you to transfer multiple TCP socket connections
in both directions at the same time.

Server-side load balancer

All backend server instances are registered with a


central load balancer. A client requests this load
balancer which then routes the request to one of the
server instances using various algorithms like round-
robin. AWS ELB(Elastic Load Balancing) is a prime

Downloaded by Shivam kumar ([email protected])


lOMoARcPSD|45413011

example of server-side load-balancing that registers


multiple EC2 instances launched in its auto-scaling
group and then routes the client requests to one of the
EC2 instances.

Advantages of server-side load balancing:

Simple client configuration: only need to know the


load-balancer address.
Clients can be untrusted: all traffic goes through the
load-balancer where it can be looked at. Clients are
not aware of the backend servers.

RSA Algorithm

RSA algorithm is an asymmetric cryptography


algorithm. Asymmetric actually means that it works on
two different keys i.e. Public Key and Private Key. As the
name describes, the Public Key is given to everyone and
the Private key is kept private.

An example of asymmetric cryptography : A client (for


example browser) sends its public key to the server and
requests for some data. The server encrypts the data
using the clientÕs public key and sends the encrypted
data. Client receives this data and decrypts it. Since this
is asymmetric, nobody else except the browser can
decrypt the data even if a third party has the public key
of the browser.

What is HTTP and HTTPS protocol ?

HTTP is the HyperText Transfer Protocol which defines


the set of rules and standards on how the information
can be transmitted on the World Wide Web (WWW). It
helps the web browsers and web servers for
communication. It is a Ôstateless protocolÕ where each
command is independent with respect to the previous

Downloaded by Shivam kumar ([email protected])


lOMoARcPSD|45413011

command. HTTP is an application layer protocol built


upon the TCP. It uses port 80 by default. HTTPS is the
HyperText Transfer Protocol Secure or Secure HTTP. It is
an advanced and a secured version of HTTP. On top of
HTTP, SSL/TLS protocol is used to provide security. It
enables secure transactions by encrypting the
communication and also helps identify network servers
securely. It uses port 443 by default.

What is SMTP protocol ?

SMTP is the Simple Mail Transfer Protocol. SMTP sets


the rule for communication between servers. This set of
rules helps the software to transmit emails over the
internet. It supports both End-to-End and Store-and-
Forward methods. It is in always-listening mode on port
25.

TCP and UDP protocol, prepare differences

TCP is a connection-oriented protocol, whereas UDP is a


connectionless protocol. A key difference between TCP
and UDP is speed, as TCP is comparatively slower than
UDP. Overall, UDP is a much faster, simpler, and
efficient protocol, however, retransmission of lost data
packets is only possible with TCP.

TCP provides extensive error checking mechanisms. It is


because it provides flow control and acknowledgment of
data. UDP has only the basic error checking mechanism
using checksums.

What happens when you enter Ògoogle.comÓ (very ver

Check the browser cache first if the content is fresh


and present in the cache display the same.
If not, the browser checks if the IP of the URL is
present in the cache (browser and OS) if not then

Downloaded by Shivam kumar ([email protected])


lOMoARcPSD|45413011

requests the OS to do a DNS lookup using UDP to get


the corresponding IP address of the URL from the
DNS server to establish a new TCP connection.
A new TCP connection is set between the browser
and the server using three-way handshaking.
An HTTP request is sent to the server using the TCP
connection.
The web servers running on the Servers handle the
incoming HTTP request and send the HTTP response.
The browser processes the HTTP response sent by
the server and may close the TCP connection or
reuse the same for future requests.
If the response data is cacheable then browsers
cache the same.
Browser decodes the response and renders the
content.

Hub vs Switch

Hub: Hub is a networking device which is used to


transmit the signal to each port
(except one port) to respond from which the signal was
received. Hub is operated on a Physical layer. In this
packet filtering is not available. It is of two types: Active
Hub, Passive Hub.

Switch: Switch is a network device which is used to


enable the connection
establishment and connection termination on the basis
of need. Switch is operated on the Data link layer. In this
packet filtering is available. It is a type of full duplex
transmission mode and it is also called an efficient
bridge

VPN, advantages and disadvantages of it

VPN (Virtual Private Network) : VPN or the Virtual

Downloaded by Shivam kumar ([email protected])


lOMoARcPSD|45413011

Private Network is a private WAN


(Wide Area Network) built on the internet. It allows the
creation of a secured tunnel
(protected network) between different networks using
the internet (public network). By using the VPN, a client
can connect to the organisationÕs network remotely.

Advantages of VPN :
1. VPN is used to connect offices in different
geographical locations remotely and is
cheaper when compared to WAN connections.
2. VPN is used for secure transactions and confidential
data transfer between
multiple offices located in different geographical
locations.
3. VPN keeps an organisationÕs information secured
against any potential threats or
intrusions by using virtualization.
4. VPN encrypts the internet traffic and disguises the
online identity

Disadvantages of VPN :
1. Not designed for continuous use
2. Complexity prevents scalability
3. Lack of granular security
4. Unpredictable performance
5. Unreliable availability

LAN

A local area network (LAN) is a collection of devices


connected together in one physical location, such as a
building, office, or home. A LAN can be small or large,
ranging from a home network with one user to an
enterprise network with thousands of users and devices
in an office or school.

GFG Coupon Code Ð Flat 15% off on all

Downloaded by Shivam kumar ([email protected])


lOMoARcPSD|45413011

GeeksforGeeks Courses

Ç Previous Post Next Post È


StriverÕs Tree Series : Tree StriverÕs CP Sheet
Data Structure

Load Comments

Copyright © 2023 takeuforward | All rights reserved

Downloaded by Shivam kumar ([email protected])

You might also like