Must Do Questions For Dbms CN Os Interviews Sde Core Sheet Interviews T
Must Do Questions For Dbms CN Os Interviews Sde Core Sheet Interviews T
takeUforward
Operating System:
Advanced Non Surgical Laser Tre
What is the main purpose of an operating system? Discuss Hospital
dif
Batch OS
Distributed OS
Multitasking OS
Network OS
Real-Time OS
Mobile OS
Reference: https://www.geeksforgeeks.org/types-of-
operating-systems/
Socket:
A socket is defined as an endpoint for communication, A
pair of processes communicating over a network employ
a pair of sockets ,one for each process. A socket is
Program:
Program is a set of instructions to perform a certain
task. Eg: chrome.exe, notepad.exe
Thread:
Thread is a path of execution within a process. A thread
is also known as a lightweight process. The idea is to
Threads:
A thread is a single sequential flow of execution of tasks
of a process so it is also known as thread of execution or
thread of control.
Fragmentation:
An unwanted problem in the operating system in which
the processes are loaded and unloaded from memory,
and free memory space is fragmented. Processes canÕt
be assigned to memory blocks due to their small size,
and the memory blocks stay unused. It is also necessary
to understand that as programs are loaded and deleted
from memory, they generate free space or a hole in the
Types of fragmentation:
1. Internal
2. External
Sponsored by
What is spooling ? act.jhatkaa.org
BeladyÕs Anomaly
Types of RTOS:
Hard RTOS
Firm RTOS
Soft RTOS
Dynamic Binding
Static Binding:
When a compiler acknowledges all the information
required to call a function or all the values of the
variables during compile time, it is called Òstatic bindingÓ.
As all the required information is known before runtime,
it increases the program efficiency and it also enhances
the speed of execution of a program. Static Binding
makes a program very efficient, but it declines the
program flexibility, as Ôvalues of variableÕ and Ôfunction
callingÕ are predefined in the program. Static binding is
implemented in a program at the time of coding.
Overloading a function or an operator is the example of
compile time polymorphism i.e. static binding.
FCFS Scheduling
SJF Scheduling
SRTF Scheduling
LRTF Scheduling
Priority Scheduling
BankerÕs Algorithm
Explain Cache
What is Database?
What is sharding
Keys in DBMS
Types of relationship
Indexing in DBMS
What is denormalization ?
E-R Model ?
https://www.javatpoint.com/dbms-sql-command
https://www.tutorialspoint.com/explain-about-nested-
queries-in-dbms
https://www.javatpoint.com/dbms-sql-joins
Computer Networks
DeÞne network
Physical Layer
Data Link Layer
frame.
Flow control: Data-link layer controls the data flow
within the network.
Error control: It detects and corrects the error
occurred during the transmission from source to
destination.
Addressing: Data-link layers attach the physical
address with the data frames so that the individual
machines can be easily identified.
Link management: Data-link layer manages the
initiation, maintenance and termination of the link
between the source and destination for the effective
exchange of data.
DNS:
1. DNS is an acronym that stands for Domain Name
System.DNS was introduced by Paul Mockapetris and
Jon Postel in 1983.
2. It is a naming system for all the resources over the
Video for new features | Send bugs to [email protected] | Clear cache of website for login issues
Video for new features | Send bugs to [email protected] | Clear cache of website for login issues
Combination internet which includes
of SD-WAN and physical nodes and applications.
ZTNA - Cyber Security
It is used Companies
to locate resources easily over a network.
OPEN
StriverÕs
Define StriverÕs
new service offerings, strengthenA2Z DSA
their security StriverÕs CS Interview StriverÕs
& help them become "future-ready"
SDE Sheet
3. DNS is an internet which maps the
securenetworkhub.com Course/Sheet DSA
domain names Subjects
to Prep Sheets CP Sheet
their associated IP addresses. Playlists
4. Without DNS, users must know the IP address of the
web page that you wanted to access.
What is subnet ?
Firewalls
Transmission Delay
Propagation delay
Queueing delay
Processing delay
3 way handshaking
RSA Algorithm
Hub vs Switch
Advantages of VPN :
1. VPN is used to connect offices in different
geographical locations remotely and is
cheaper when compared to WAN connections.
2. VPN is used for secure transactions and confidential
data transfer between
multiple offices located in different geographical
locations.
3. VPN keeps an organisationÕs information secured
against any potential threats or
intrusions by using virtualization.
4. VPN encrypts the internet traffic and disguises the
online identity
Disadvantages of VPN :
1. Not designed for continuous use
2. Complexity prevents scalability
3. Lack of granular security
4. Unpredictable performance
5. Unreliable availability
LAN
GeeksforGeeks Courses
Load Comments