0% found this document useful (0 votes)
10 views

CS

The document contains a comprehensive list of questions covering various topics in computer science and networking, including MAC flooding, IP addressing, protocols, cybersecurity, programming concepts, and data management. It addresses both theoretical concepts and practical applications, highlighting the importance of understanding these topics in modern technology. Each question prompts exploration of fundamental principles and current practices in the field.

Uploaded by

Sopnobaz Fakir
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

CS

The document contains a comprehensive list of questions covering various topics in computer science and networking, including MAC flooding, IP addressing, protocols, cybersecurity, programming concepts, and data management. It addresses both theoretical concepts and practical applications, highlighting the importance of understanding these topics in modern technology. Each question prompts exploration of fundamental principles and current practices in the field.

Uploaded by

Sopnobaz Fakir
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

1. What is MAC flood in switch? How to prevent the MAC flooding attack?

2. What are the disadvantages of manual / static IP? Name the protocol of dynamic IP
assigning. How DHCP works?
3. What is pipelining? Explain execution stages?
4. What is block chain? How it works?
5. What are web browser and web server? How web server works?
6. What is a proxy server?
7. Short notes: Network, protocol, link, gateway, Traceable Matrix, Node.
8. Private IP Range of class A, B and C. Number of maximum host of each class.
9. Loopback address of ipv4 and ipv6.
10. What is vulnerability? How we can prevent these types of vulnerability.
11. Write main features of object oriented programming.
12. What is RAID?
13. Write the different between Hashing and Encrypting.
14. Write the functions of different layer in TCP/IP?
15. Difference between microprocessor and microcontroller.
16. Difference between core i5 and core i7.
17. Using NAND gate make logic diagram of OR gate. P-482.
18. What is cyber space? Write some threats of cyber space. What is computer virus?
19. What happens when you use cables longer than the prescribed length in a network?
20. What is VPN? How it works?
21. What is hyper threading? What the use of it?
22. Explain the difference between Firewall and Gateway. P-471
23. Why Firewall is used?
24. Describe SaaS, IaaS & PaaS.
25. What purpose is VPN used in computer security?
26. Why is virtual memory needed?
27. What is Dynamic programming? Explain with examples.
28. What is ARQ?
29. Web caching. Is it available for every user request? Why or why not.
30. How HTTP works? How many HTTP request would be needed for retrieve or manipulate
data.
31. Explain the problems with possible solutions session hijacking and SQL injection.
32. A network administrator is connecting host A and B directly through their Ethernet
interfaces as shown in the illustration. Ping attempts between the hosts are unsuccessful.
What can be done to provide connectivity between the host? Write some reason how the
problem will identify. P-454
33. Write connection type: Router to Router, Router to switch, computer to computer, hub to
switch, computer console port to switch.
34. What is multiplexing? Describe different type of multiplexing.
35. What is IPv6? Why it is required?
36. Short notes NAT, Ransom ware, firewall.
37. What is subnet Mask and Local host IP address?
38. Difference between TCP and UDP, HTTP and HTTPs.
39. What is OSI model? Describe briefly about OSI model layer. Difference between OSI
and TCP IP layer.
40. What is microprocessor?
41. Which operating system is open source operating system?
42. How many numbers of bit will be needed to identify IPv4 address?
43. Principles of OOPs.
44. Types of Topologies.
45. Write down the 2 element of data communication.
46. Write down cyber threats.
47. Short notes: DHCP, POP3, VSAT and LCD, NAT, SDN, HTML, CSS, PDU, principles
of OOP, supernetting, BIOS, virtual memory, cache memory,piggybacking, cluster,
bootloader
48. What are public and private IP address?
49. Consider the ip address 172.162.100.25/27. Now find Net address, ip class, subnet mask,
broadcast address, number of hosts per network. P-445
50. What is keyword? How many keywords are used in JAVA?
51. Difference between synchronous and asynchronous transmission. P-435
52. What is logic gate? Prove the NAND and NOR gate is universal.
53. Difference between data and information.
54. What is blacklist and white list? Write down the difference between black list and
whitelist.
55. NAT. private IPv4 address range
56. Confidentiality , integrity and availability of data.
57. What are the challenges in optimizing energy efficiency of data centers?
58. Math 405 page, 403
59. What is CIA traid? Confidentiality, integrity & Availability
60. Steps of SDLC
61. Explain process state.p-400
62. Explain denial of service (DoS)
63. Difference between TCP and UDP
64. What is DNS? What is forward and reverse lookup in DNS?
65. Describe different types of satellite and its usage.
66. Functions of ISP, iig, igw, icx.
67. Database management system roles in ICT sector. What is ACID properties.
68. Explain peer to peer network
69. What do you mean by complexity of an algorithm.
70. What is block chain technology? State the merits and demerits of using this technology.
71. Explain DNS and ARP, IPv4 address and MAC address.
72. What is information system? Describe various type of information system
73. State the importance of information system in modern society.
74. Difference between compile time and run time
75. Briefly explain different payment systems in e-commerce.
76. Short notes: operating system, cloud computing classification, 5G vs WiFi.
77. Explain the operation of public key and private key encryption. State the application of
each in daily life.
78. Limitation of dynamic RAM. Why should one prefer static RAM.
79. What is information system? Describe 5 basic types of information system
80. What is prototype? For a system design and explain the essential aspects that you should
consider.
81. Explain five different electronic payment systems used in e-commerce.
82. Show different steps of SMTP protocol using a block diagram.
83. Show different steps of SMTP protocol using a block diagram.
84. How many types of data transmission mode?
85. Write down 3 components which impact computer system
86. Baseband transmission vs Broadband transmission, Nyquest theorem
87. Short notes: cyber theft, 2 & 3 tier architechture, software life cycle, reentrancy and
thrashing.
88. Human computer interaction is an important issue in the field of ICT/ IT. Explain with
your argument.
89. Explain predictive data mining and write an application of clustering in real life world.
90. Write down the risk in traditional auction and online auction.
91. What are the different types of e-governance? What are the benefits of e-governance.
92. Difference between e-commerce and e-marketing, active and passive satelites.
93. Describe different types of orbital satellite.
94. TCP vs UDP, compiler vs interpreter
95. What is modulation? Why is it necessary?
96. Define distance vector and link state routing protocols
97. Which 2 services are required to enable a computer to receive dynamic IP address and
access Internet using domain names.
98. In what circumstances you would chose DFS over BFS.
99. Can you enumerate and explain the various types of error that can occur during the
execution of a computer program?
100. What is thread in OS?
101. What do you understand by deadlock in operating system? How can deadlock be
avoided?
102. What is network topology? Write the name all different topology used computer
networking with examples, diagram and their activities. P-264
103. Define networking and internetworking. What are the different types of networks?
Explain in details.
104. What is dhcp server and why it is needed in a computer network?
105. Briefly describe the relationship among threat, vulnerability and attacks. Give
examples
106. Why IP is considered as a best effort protocol?
107. Describe CSMA/ CD protocol for medium access control.
108. What is thread? Give some benefits of multi-threaded programming.
109. What is the purpose of router? How congestion control works in the TCP
protocol?
110. Difference between stateless and stateful protocol. Which type of protocol is http?
E-commerce vs f-commerce, open source vs proprietary software.

111. How can you define IoT? What are the basic components of IoT?

112. What do you mean by machine learning ? name three machine learning
applications in our daily life?

113. What is API? Explain with examples.

114. What is authentication and authorization in computer security?

115. Which one peripheral device between USB flash drive and RAM? Why?

116. 3 protocol name of TCP and UDP

117. What is UDP protocol? UDP is reliable or not? Why or why not?

118. What is cyber threat intelligence database? What is the use of this corporate office
network?

119. What DHCP starvation and how DHCP starvation work with diagram? Write
down the related attack introduced by DHCP starvation.

120. What is the MAC flooding attack? What is the impact of this in switch?

121. Write down the counter measure of SQL injection.

122. What do you mean by dynamic capacity provisioning? Why it is essential for a
data center?
123. What do you mean by TIERing of a data center? Distinguish between different
data center TIER standards with illustrative figures.

124. Cluster computing vs grid computing

125. What do you mean by multi-tenancy in the cloud? Why is it beneficial for cloud
service providers?

126. Distinguish between elasticity and scalability of resources in the cloud.

127. What is DCIM in data center?

128. What do you mean by RISC and CISC? Compare properties of RISC and CISC
processors.

129. HTTP vs HTTPs

130. Explain why called NOR and NAND gate universal?

131. Active attack vs passive attack, SRAM vs DRAM

132. What is SNR? Write significance of SNR in analog transmission. Signal o dBm
Noise 20 dBm. Calculate SNR.

133. Show the 3 way handshake protocol in TCP connection establishment using a
diagram.

134.
135.
136.

137.
138.
139.
140.
141.

You might also like