Brackets Meaning In Math, Black Legion Tzeentch, Best Books On Coral Reefs, Winter Aconite Bulbs For Sale, Uniden Database Manager Dfr9, Why Are Mangroves Important?, Sarson Ka Tel For Cooking, Henna Shampoo Nz, Anthony Albanese Girlfriend, Oblate In A Sentence, Peterson Strobostomp Hd Vs Sonic Research, " /> Brackets Meaning In Math, Black Legion Tzeentch, Best Books On Coral Reefs, Winter Aconite Bulbs For Sale, Uniden Database Manager Dfr9, Why Are Mangroves Important?, Sarson Ka Tel For Cooking, Henna Shampoo Nz, Anthony Albanese Girlfriend, Oblate In A Sentence, Peterson Strobostomp Hd Vs Sonic Research, "/>

viva questions for computer lab

viva questions for computer lab

Flow control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. What is semantic gap? Computer Networks VIVA Questions :- 1. In this list of Networking interview questions, we have covered all commonly asked basic and advanced interview questions on networking with detailed answers to help you clear the job interview. Physics Lab Experiments - December 04, 2020. If the message is sent to some subset of other nodes, it is called Multicasting. b.) What is the minimum and maximum length of the header in the TCP segment and IP datagram? What are the two types of transmission technology available? One number each pair indicates an intensity value, and second number specifies the number of adjacent pixels on the scan line that are to have that intensity value. 115. a. Service-point Addressing What is Multiple Access? b. If the message is sent to all the m nodes in the network it is called Broadcasting. In this list of Networking interview questions, we have covered all commonly asked basic and advanced interview questions on networking with detailed answers to help you clear the job interview. What is Beaconing? 18. a. Single-Bit error Your email address will not be published. b. 112. Answer. Questions And McLeodGaming May 6th, 2018 - Home Of SSF2 Yeah Jam Fury Impossible Pong More Latest News ... COMPUTER LAB EVERY NARAYANA E TECHNO PROGRAMMES MAKES USE OF SOPHISTICATED COMPUTER LABS WHERE GENERAL 17. b. As this viva questions in mwe and dc lab, it ends up inborn one of the favored book viva questions in mwe and dc lab collections that we have. b. Longitudinal Redundancy Check (VRC) Data Structures VIVA Questions :- 1. iii. What is subnet? A:- A MicroProcessor is a multipurpose, programmable, clock-driven, register-based electronic device that reads binary instructions from a storage device called memory, accepts binary data as input and processes the data according to those instruction, and provides results as output. 114. Performance a. What is virtual path? Routing, 35. What are the responsibilities of Session Layer? Hybrid devices that combine the features of both bridges and routers. Times, new century schoolbook is the examples of serif fonts. Gates are the digital circuits, which perform a specific type of logical operation. This is done through radio communication, satellite communication and cellular telephony. Point clipping, line clipping, area clipping, text clipping and curve clipping. 9. It has poor contrast Performance is inferior to the refresh CRT. 28. Which layers are user support layers? Electrical Measurements Lab Viva Questions and Answers. Tweet. 2. ii. (i) Broadcast and (ii) point-to-point. Name the categories of Multiplexing? (adsbygoogle = window.adsbygoogle || []).push({}); Engineering interview questions,Mcqs,Objective Questions,Class Lecture Notes,Seminor topics,Lab Viva Pdf PPT Doc Book free download. Class B – 128.0.0.0 – 191.255.255.255 Your email address will not be published. Subscribe . 32. Viva usually arranged by supervisor or other member of supervisor’s Department. b. 106 TOP CONTROL SYSTEMS LAB VIVA Questions and Answers PDF. Physical layer coordinates the functions required to transmit a bit stream over a physical medium. Its very nice…. What is the need of homogeneous coordinates? ii. How Gateway is different from Routers? Your email address will not be published. What is traffic shaping? the, ing, and, and ion. 19. i. Satellite Communication. File transfer, access and Management (FTAM) other lab viva Here we provide all engineering department of All semesters i.e; 1st 2nd 3rd 4th 5th 6th 7th 8th Lab Viva Questions with answers. a. It will operate in the data link layer. to the viva. Reliability Define Routing? 20. 2. What are the responsibilities of Data Link Layer? 24. What is translation? Burst Error baud rate = (bit rate / N) 1) What is data structure? a. In error detection, checks only any error has occurred. 106. The Data Link Layer transforms the physical layer, a raw transmission facility, to a reliable link and is responsible for node-node delivery. This sublayer is responsible for maintaining the link between computers when they are sending data across the physical network connection. What is difference between ARP and RARP? 27. Student makes corrections which are checked by examiners. Some system has multiple bits per pixel, the frame buffer is often referred to as pixel map. 76. The standard protocol has been defined between the terminal and the PAD, called X.28; another standard protocol exists between hte PAD and the network, called X.29. Differentiate plasma panel display and thin film electro luminescent display? Viva Questions for Class 12 Accountancy as well as Viva Questions for Class 12 Business Studies are also available for the preparation of CBSE 2020-21 Exams. In broadband transmission, signals are sent on multiple frequencies, allowing multiple signals to be sent simultaneously. Unix Programming Lab Viva Questions And Answer Author: accessibleplaces.maharashtra.gov.in-2020-12-07-04-58-23 Subject: Unix Programming Lab Viva Questions And Answer Keywords: unix,programming,lab,viva,questions,and,answer Created Date: 12/7/2020 4:58:23 AM Q.5 Write down the truth table of all logic gates? ICMP is Internet Control Message Protocol, a network layer protocol of the TCP/IP suite used by hosts and gateways to send notification of datagram problems back to the sender. 12. Beam penetration method, shadow mask method. 96. b. a. Syntax Mention some CAD packages? Data link protocols are sets of specifications used to implement the data link layer. Timing refers to two characteristics: When data should be sent and how fast they can be sent. What is region? Name the factors that affect the performance of the network? In LRC a redundant data unit follows n data units. The process of determining the appropriate pixels for representing picture or graphics object is known as rasterization. Presentation Layer and This byte is usually called the escape character (ESC), which has a predefined bit pattern. Ans. Name any four input devices? What is Protocol? Re transmission is a technique in which the receiver detects the occurrence of an error and asks the sender to resend the message. 42. DIGITAL ELECTRONICS LAB Quiz Questions with answer. I Prepared an Study materials for Karnataka State 1st PUC and 2nd PUC Computer Science Study Materials according to Syllabus. Communication means the meaning full exchange of information between two communication media. Name any three font editing tools. Lab Program viva voce questions for C, C++, Java, dbms, computer science, network, graphics, multimedia, Operating systems, Data structures are published in rejinpaul students can download most important viva questions with answers for all the branches . What is rasterization? Which layer links the network support layers and user support layers? The emissive display converts electrical energy into lightenergy. 45. What are the responsibilities of Network Layer? LANs of different type). The duration of time it takes to send a message from one end of a network to the other and back, is called RTT. 1. What are the key elements of protocols? The processes on each machine that communicate at a given layer are called peer-peer process. 109. Define Encoder? Dharanyadevi blogspot subsume with E-books, Notes, Lab Manual, Question Banks, Interview, Viva, Basics and Interview Questions for engineering students. d. Error Control System software,Compiler Design and Unix lab viva questions INTRODUCTION. Answer. Question. The extra functionality allows every incoming or outgoing packet to be inspected. The Presentation layer is concerned with the syntax and semantics of the information exchanged between two systems. To regulate the supply of air. ISC Computer Science Practical Viva Questions. What is horizontal retrace of the electron beam? 2n – 2k codewords that are not used. Viva Questions for Lab Programs Computer Science Java Computer Network. List out the merits and demerits of DVST? 118. A point (4,3) is rotated counterclockwise by an angle of 45°. 54. What are the important topologies for networks? 50. c. Take the complement of the final sum, this is the checksum. 1. What are the different operators available in C( Study in detail about each operator) a. Security/Encapsulation Class E – 240.0.0.0 – 247.255.255.255. Plug-and-play capabilities should be verified in Windows "Game Controller" utility. The process that allows a network to self-repair networks problems. The reflection is actually the transformation that produces a mirror image of an object. c. Data rate th, in, er, re and an. This digitization process is called scan conversion. Q.3 What is Truth Table? Design a BCD counter with JK flip-flopsAnswer60. What are the key design issues of a computer Network? d. Wireless Links, 41. Refreshing of screen is not required. Since we want to minimize the frame size, the smallest range that provides unambiguous communication. Packets meeting some criterion are forwarded normally. When a frame is carrying data from A to B, it can also carry control information about arrived (or lost) frames from B; when a frame is carrying data from B to A, it can also carry control information about the arrived (or lost) frames from A. Explain Polygon Filling algorithm. This is done by using sequence numbers. the transformation is:x| = x + tx ; y| = y+ty. Give examples for 8 / 16 / 32 bit Microprocessor? They reduce unwanted calculations intermediate steps saves time and memory and produce a sequence of transformations. What is the meaning of URL?What is UNIX?What is Adobe Photoshop?Who is the father of modern computer? Lab Viva Questions In Web Technologies Summary Of : Lab Viva Questions In Web Technologies May 07, 2020 Book Lab Viva Questions In Web Technologies By Astrid Lindgren, web technology lab viva questions css 1 what are cascading style sheets called css is a list of statements or rules that A generic term for section of a large networks usually separated by a bridge or router. Usually the aspect ratio is ¾. What MAU? A major task of the display processor is digitizing a picture definition given in an application program into a set of pixel-intensity values for storage in the frame buffer. In error correction, the exact number of bits that are corrupted and location in the message are known. The File Transfer Protocol (FTP) is the standard mechanism provided by TCP / IP for copying a file from one host to another. It uses the services offer by TCP and so is reliable and secure. 2. One of two sublayers of the data link layer of OSI reference model, as defined by the IEEE 802 standard. 22. 45. Re sending is repeated until a message arrives that the receiver believes is error-freed. c. Cyclic Redundancy Check (VRC) Then you must shift to iterative solution methods. 26. What are the Data link protocols? Routable protocols can work with a router and can be used to build large networks. 39. 103. 8. Define Bandwidth and Latency? A device or program that uses predefined algorithms to encode, or compress audio or video data for storage or transmission use. List out the merits and demerits of Penetration techniques? What is VRC? The Common Balance Experiment. The Trivial File Transfer Protocol (TFTP) allows a local host to obtain files from a remote host but does not provide reliability or security. The line type, width and color are the attributes of the line.The line type include solid line, dashed lines, and dotted lines. Computer Science. b. a. Cables Transformation is the process of introducing changes in the shape size and orientation of the object using scaling rotation reflection shearing & translation etc. Routers: They relay packets among multiple interconnected networks (i.e. 82. 35. d. Flow Control As this is usually a favourite opening question with the aim of getting you to relax with something familiar. 1. What do you meant by “triple X” in Networks? What are the two classifications of shear transformation? The function of PAD (Packet Assembler Disassembler) is described in a document known as X.3. Cyclic codes are special linear block codes with one extra property. 93. Representation of bits #computerbasic#interview# Output Device – to display / print results by the computer. Define clipping? Guidelines for Lab Work and Practical Evaluation of Computer Science/Application (Science, Commerce and Humanities) published. This code is called as the scan code. What is virtual channel? 23. 97. A non-luminous oxidising flame is used […] It establishes two connections (virtual circuits) between the hosts, one for data transfer and another for control information. EDC Lab Viva Questions and Answers Electrical Lab Edit Question No. To allocate the separate resources of the computer as needed to solve the problem given. What is difference between baseband and broadband transmission? What are the types of Transmission media? It refers to the meaning of each section of bits. 40. What are Digrams and Trigrams? 1. This limited range is called the bandwidth. What is Project 802? Physical Addressing I have tried to list down some of the commonly asked viva questions. b. The transformation is given by:X| = r cos (q + f) and Y| = r sin (q + f). Basic National GK. What is Brouter? interview for Computer Basics. In block coding, we divide our message into blocks, each of k bits, called datawords. What is a gateway or Router? b. Synchronization, 37. DSAP, SSAP are addresses used by the LLC to identify the protocol stacks on the receiving and sending machines that are generating and using the data. Security issues includes protecting data from unauthorized access and virues. 30. you can make use of it and prepare well for your lab viva exams. 25. 23. Fundamentals of VLSI Lab viva and interview questions with answers for freshers. b. Unguided Media MCQ Practice Tests. Network performance is measured in Bandwidth (throughput) and Latency (Delay). 2. Semantics They contain logic that allow them to keep the traffic for each segment separate and thus are repeaters that relay a frame only the side of the segment containing the intended recipent and control congestion. The sliding window is an abstract concept that defines the range of sequence numbers that is the concern of the sender and receiver. What is Bandwidth? 44. e. Session Layer Fiber-optic cable Data link Layer and Virtual channel is normally a connection from one source to one destination, although multicast connections are also permitted. d. Performance. 13. The sequence numbers can wrap around. - 8-bit Processor - 8085 / Z80 / 6800; 16-bit Processor - 8086 / 68000 / Z8000; 32-bit Processor - 80386 / 80486. 2. GK National MCQ : India. 2. These codewords are invalid or illegal. 7. 72. What is Flow Control? b. 48. d. Transport Layer The quality of the picture is not good when it is compared to other techniques. It can detect burst errors only if the total number of errors in each data unit is odd. The Network Layer is responsible for the source-to-destination delivery of packet possibly across multiple networks (links). What is Framing? 4. 2. Whenever the receiver encounters the ESC character, it removes it from the data section and treats the next character as data, not a delimiting flag. What are the possible ways of data exchange? d. Checksum. Q.3 Give example of Demorgan’s theorem. Packet filter is a standard router equipped with some extra functionality. In thin film electro luminescent display, the region between two glasses plates are filled with phosphor, such as zinc sulphide doped with manganese. What is Synchronous TDM? When the computers on the network simply listen and receive the signal, they are referred to as passive because they don’t amplify the signal in any way. Define Circle? 1. FDM is an analog technique that can be applied when the bandwidth of a link is greater than the combined bandwidths of the signals to be transmitted. 14. 65. What is Piggy Backing? c. Timing A network is recursively is a connection of two or more nodes by a physical link or two or more networks connected by one or more nodes. What is Error Control ? Class A – 0.0.0.0 – 127.255.255.255 A field is added to the data frame to hold the sequence number of that frame. It consists of the following: The data unit in the LLC level is called the protocol data unit (PDU). What is frame relay, in which layer it comes? Questions and Answers. ... Electrical Machines Lab Viva Questions and Answers Electrical Lab Edit Question No. 120. Firstly, looking good will help your self-esteem, making you feel more confident. Feel free to leave us your comments at the end of the article if you need more information or have any question for us. What Is Usb? What is bitmap? In a Ethernet network, between any two points on the network ,there can be no more than five network segments or four repeaters, and of those five segments only three of segments can be populated. b. 27. 8. A node that is connected to two or more networks is commonly called as router or Gateway. 68. Seriously Sir….tomorrow is my ISC Computr Prac Exam..nd i didnt knew wat to study 4 dis viva…it has been wonderful reading ur questions and answers…u have covered d major part of the syllabus…Thanxxx a lot Sir.. Nd plzzz carry on with ur site because computr students are soo underrated dat dey dnt even publish a test paper 2 practise 4 xams… 117. What is Stop-and-Wait Protocol? A line is of infinite extent can be defined by an angle of slope q and one point on the line P=P(x,y). What is the difference between impact and non-impactprinters? SHARES. A line printer and dot-matrix printer are examples.Non-impact printer and plotters use Laser techniques,inkjet sprays, Xerographic process, electrostatic method sand electrothermal methods to get images onto the papers. VivA QuestionS and AnswerS in MP InterfacinG LaB - 1 1) What is MicroProcessor? In raster scan display, at the end of one frame, the electron beam returns to the left top corner of the screen to start the next frame. a. A method for providing fault tolerance by using multiple hard disk drives. b. Electrical Circuits Lab Viva Questions and Answers Electrical Lab Edit Question No. Picture definition is stored in a memory area called frame buffer or refresh buffer. e. Access Control, 34. What do you mean by emissive and non-emissivedisplays? In the data link layer, the term error control refers primarily to methods of error detection and re transmission. 22. In LRC, a block of bits is divided into rows and a redundant row of bits is added to the whole block. 4. Along any transmission path from a given source to a given destination, a group of virtual circuits can be grouped together into what is called path. Answer: Energy is defined as the capacity of a physical system to perform work. Coaxial Cable Dress for Viva Success. What is multicast routing? Recovery time of a network after a failure, 11. b. At some point, depending on the number and location of non-zero coefficients, and the total number of equations, Gauss Elimination becomes too expensive in both computer time and memory requirements. It allows the receiver to inform the sender of any frames lost or damaged in transmission and coordinates the retransmission of those frames by the sender. Circle is defined by its center xc, yc and its radius in user coordinate units. Explain What is Network? ... An operating system is a program that acts as an intermediary between the user and the computer hardware. 26. What is run length encoding? It belongs to application layer. 99. In the CRT, heat is applied to the cathode by directing a current through a coil of wire, is called filament. For this use some angles and lines of reflection. Arial, optima are examples for sanserif fonts. What Is Backward Compatible? Viva Questions and Answers. Q.1 Define gates ? Latency corresponds to how long it t5akes a message to travel from one end off a network to the other. Shielded TP X shear, y shear, 40. What are the data units at different layers of the TCP / IP protocol suite? Electrical Measurements Lab Viva Questions and Answers. It allows the receiver to inform the sender of any frames lost or damaged in transmission and coordinates the retransmission of those frames by the sender. The data unit created at the application layer is called a message, at the transport layer the data unit created is called either a segment or an user datagram, at the network layer the data unit created is called the datagram, at the data link layer the datagram is encapsulated in to a frame and finally transmitted as signals along the transmission media. What is TDM? c. Faster Problem solving They operate in all seven layers of the OSI model. 2. What is resolution? Add the sections together using 1’s complement arithmetic The shell programming language is a command language with a lot of features common to many computer programming languages, … What is Protocol Data Unit? 69. (adsbygoogle = window.adsbygoogle || []).push({}); Engineering interview questions,Mcqs,Objective Questions,Class Lecture Notes,Seminor topics,Lab Viva Pdf PPT Doc Book free download. Another open loop method to help manage congestion is forcing the packet to be transmitted at a more predictable rate. What are major types of networks and explain? Important Topics and questions. It includes general instructions, format of recording in Practical Log Book, Score distribution, list of practicals, sample questions and assessment scheme for classes XI and XII. b. The logical and mathematical model of a particular organization of data is called data structure. Computer architecture is a specification detailing about how a set of software and hardware standards interacts with each other to form a computer system or platform. 77. c. Mail services What is usage of Sequence Number in Relaible Transmission? The destination address defines where the packet has to go and the sender address helps the recipient acknowledge the receipt. 87. Sub: 8086 VIVA QUESTIONS Compiled by: L. Krishnananda, Assistant Professor, REVA Institute of Technology, Bangalore 1 1. Orthographic projection is commonly used because it gives 100% details of an object by drawing different views e.g. Machine learning interview questions tend to be technical questions that test your logic and programming skills: this … 24. Unauthorized Access The PDU contains of four fields a destination service access point (DSAP), a source service access point (SSAP), a control field and an information field. A special purpose processor, which is used to control the operation of the display device, is known as video controller or display controller. The term is often used in reference to MPEG-2 video and sound data, which must be decoded before it is output. 1. They operate in the physical, data link and network layers. 4. 2. It is a way for specifying functions of the physical layer, the data link layer and to some extent the network layer to allow for interconnectivity of major LAN protocols. It is 2-D, whereas Pictorial views are 3-D and don’t give full details. e.g. Web Technologies Interview Questions and Answers. a. Bridges: These operate both in the physical and data link layers of LANs of same type. Computer Network Lab Viva Questions And Answers Author: discovervanuatu.com.au-2020-12-06T00:00:00+00:01 Subject: Computer Network Lab Viva Questions And Answers Keywords: computer, network, lab, viva, questions, and, answers Created Date: 12/6/2020 2:38:10 PM The below list covers 130+ important interview questions for Networking for freshers candidates as well as Networking interview questions for experienced. 21. What are Code Words? Poor limitation etc. What is shearing? 62. e. Line configuration The merits and demerits of the Penetration techniques areas follows. It generally forwards message from one network to another. Define Computer graphics. It has a flat screen. LAB MANUALS (Programs+Viva Questions are included{In some manuals}) C and Data Structures Lab manual Code 01: What is modulation? It requires complex addressing and wiring. Short notes on video controller? a. 58. 37. It also handles both control and error messages. 108. TDM is a digital process that can be applied when the data rate capacity of the transmission medium is greater than the data rate required by the sending and receiving devices. 91. Where the video controller is used? What is Redundancy? 102. The linker’s job is to tie together your compiled code with the libraries … Question 19. What is Transformation? What is vertical retrace of the electron beam? Gateways: They relay packets among networks that have different protocols (e.g. Chemistry Practicals Class 12 Viva Questions with Answers Question.1. What is Aspect ratio? 19. Difference between bit rate and baud rate. 3. In plasma panel display, the region between two glass plates is filled with neon gas. But one top tip for preparing for this one: prepare a 1 minute, 3-5 minute and 10 minute summary for both a non-specialist scientist and a lay audience because you could be asked any sort of combination. If two bits in one data unit are damaged and bits in exactly the same positions in another data unit are also damaged, the LRC checker will not detect an error. Web Technologies Interview Questions and Answers. Such a physical medium is called as Links and the computer it connects is called as Nodes. Q.1 What do you mean by Logic Gates? Run length encoding is a compression technique used to store the intensity values in the frame buffer, which store search scan line as a set of integer pairs. A network is a set of devices connected by physical media links. MAC address is usually stored in ROM on the network adapter card and is unique. […] If the message is sent from a source to a single destination node, it is called Unicasting. Write the types of clipping? At the lowest level, a network can consist of two or more computers directly connected by some physical medium such as coaxial cable or optical fiber. b. Those that fail the test are dropped. c. Flow Control 94. 57. 1. ii. The header should have a minimum length of 20 bytes and can have a maximum length of 60 bytes. 2. The reverse address resolution protocol (RARP) allows a host to discover its Internet address when it knows only its physical address. In a cyclic code, if a codeword is cyclically shifted (rotated), the result is another codeword. A linear block code is a code in which the exclusive OR (addition modulo-2) of two valid codewords creates another valid codeword. “r” redundant bits are added to each block to make the length n = k + r. The resulting n-bit blocks are called codewords. ie; this transformation slants the shape of an object along a required plane. What is the difference between routable and non- routable protocols? Guided Media: These are those that provide a conduit from one device to another that include twisted-pair, coaxial cable and fiber-optic cable. In STDM, the multiplexer allocates exactly the same time slot to each device at all times, whether or not a device has anything to transmit. The process of adjusting intensities of the pixels along the line to minimize the effect of aliasing is called anti aliasing. Computer graphics remains one of the most existing and rapidly growing computer fields. 12. b. Encryption Translation a. This is called traffic shaping. 13. It is costlier than CRT. LAB MANUALS (Programs+Viva Questions are included{In some manuals}) C and Data Structures Lab manual Code Repeater: Also called a regenerator, it is an electronic device that operates only at physical layer. It is an inexpensive technique. What is reflection? The common Error Detection methods are What is frame buffer? Years of lab work may have your wardrobe looking a little worse for wear and your idea of smart as wearing a T-shirt without any stains or holes, but you should try to make a proper effort to dress smart on your viva day. Online Quizzes. Ans. Data Link Layer Media access control (MAC) is the lower sublayer of the data link layer that contains some distinct modules each carrying proprietary information specific to the LAN product being used. A computer is actuated and controlled with the help of computer programs called software. it decodes the data). In VRC, a parity bit is added to every data unit so that the total number of 1s becomes even for even parity. Online Quizzes. CPU (cenral processing unit) – to process the data. But this sort of question also applies for each chapter in your thesis. 95. What are the responsibilities of Presentation Layer? What is the difference between TFTP and FTP application layer protocols? f. Physical topology It receives the signal in the network before it becomes weak, regenerates the original bit pattern and puts the refreshed copy back in to the link. What is scaling? ResEdit, FONTo grapher. (i) Simplex (ii) Half-duplex (iii) Full-duplex. 74. I Prepared an Study materials for Karnataka State 1st PUC and 2nd PUC Computer Science Study Materials according to Syllabus. 25. b. 1. Redirector is software that intercepts file or prints I/O requests and translates them into network requests. 791. c. Application Layer. A technique called piggybacking is used to improve the efficiency of the bidirectional protocols. Learn about Cryptography and how encryption and key exchange have a role in computer security. Posts. Leased Lines 56. What are Cyclic Codes? 104. 36. Write the two techniques for producing color displays with a CRT? power system lab viva questions and answers Archives. Unshielded TP AUTOCAD STAAD 3DsMax REVIT BEAMD STRAP MATLAB MS Project ETABS EPANET 3. Question.2. A 2-D rotation is done by re positioning the coordinates along a circular path, in the x-y plane by making an angle with the axes. Token ring LAN ( 802.3 ), the result is another codeword State 1st PUC and PUC... Segmentation and reassembly c. connection control d. Flow control refers primarily to methods error... That acts as an intermediary between the hosts, one for data transfer and another for control information unit. Previous task has ended y| ) device to another and thin film electro luminescent?. And retransmitting of the final sum, this is the method of cutting a graphics display to fit. ( X, y ) in the TCP / IP protocol suite C is the of! Computer is actuated and controlled with the libraries … viva questions and Answers information.. Seven layers of the header in the physical layer coordinates the functions to! Through a coil of wire, is called attenuation Single-Bit error in a certain period of time it to... Limited to a single signal database c. Faster problem solving d. Security redundancy... Would you use for general heating purpose often referred to as the resolution and analog video USB is Bunsen. Reference to MPEG-2 video and sound data, which must be deducted and.. 8 / 16 / 32 bit MicroProcessor Bunsen burner provided with air holes the end the. Unit follows N data units at different layers of the network in a straight-line path from one coordinate to. The Application layer protocols TDM ) i. Synchronous TDM ii correction is the google Engine! Principles in practice the cathode by directing a current through a coil of viva questions for computer lab is... Revit BEAMD STRAP MATLAB MS Project ETABS EPANET 3 knows only its physical address produce sequence. Over a physical medium such as coaxial cable use metallic that accept and Transport signals the... Tcp segment and IP datagram too & in your technical round also execute on computer hardware in a memory called... Is MicroProcessor compress audio or video data for storage or transmission use the truth table of all S.E computer students. And user support layers and user support layers and user support layers gives 100 % of... Multiple networks ( links ) of question also applies for each chapter in your too! Perform a specific type of transmission medium c. hardware d. software,.! Limited to a group is called Multistation Access unit ( MAU ) Security issues includes protecting data unauthorized... Transformation actually slants the shape of an object by drawing different views e.g sender can send waiting... ] are as follows y direction as required means adding extra bits for detecting errors at viva... Such a physical medium screen point is a glass surrounding the center fiber of inside... X|, y| ) no-of-bits represented by each signal shift Lab model viva questions the between... Graphics viva questions ) 1 what id difference between routable and non- routable protocols rate = ( bit rate N. For this use some angles and Lines of reflection d. Transport layer is concerned with the following binary 0! Redundancy, which means adding extra bits for detecting errors at the end of the network two communication media of... Ring, hub is called routing is reachable and responding questions for Lab computer. Has to go and the resultant point, 41 cyclically shifted ( rotated ), Token ring (... The range of devices connected by some physical medium is called multicasting, and trackball, is. Graphics may be asked in your thesis or part erasing of screen is not.... Words, he sender and receiver since we want to minimize the frame buffer refresh! An environment for a device or program that uses predefined algorithms to encode, or compress audio video! A destination is reachable and responding why is a standard router equipped with some extra functionality allows every incoming outgoing. Due to complete combustion of hydrocarbons I/O requests and translates information between two completely different network architectures data! Rotated counterclockwise by an angle of 45° some system has multiple bits per pixel the. Interview & acquire viva questions for computer lab career as Cryptography Developer the method of cutting a display... … Fundamentals of VLSI Lab viva questions and Answers in MP InterfacinG -! Network operations and design it knows only its physical address detection and retransmission burst errors only if the message sent. The applications requirements and recognizing the limitations of the final sum, this is the process of changing the of. The cathode by directing a current through a coil of wire, is examples. The position of an object in a baseband transmission, the term control... Restrict the amount of data is organized and manipulated as Cryptography Developer looking good will help your self-esteem, you... That traffic is often begun before the previous task has ended acknowledge the receipt actuated and controlled with syntax!, resolution, and aspect ratio and secure need for defining the boundaries of OSI! To connect a range of addresses in the LLC level is called as nodes layer and c. network.. Reduce unwanted calculations intermediate steps saves time and memory and produce a sequence of.... To No or minor corrections database c. Faster problem solving d. Security redundancy... A specific type of flame would you use for general heating purpose Synchronization of e.. Answers on operating system for Engineering and mca, although multicast connections are also permitted: energy is defined the. Protocols are sets of specifications used to build a computer network transmitted at a time, use homogeneous coordinates matrixes. By drawing different views e.g networks that have different protocols ( TCP/IP ) for error,! » computer graphics Lab viva questions INTRODUCTION physical topology g. transmission mode, 33 a cyclic code, a! Of data is organized and manipulated is output support layers and user support layers of each section of.. Lab Civil Lab Medicine your Lab viva questions Answers on operating system is a Bunsen burner provided air! Error detection by more than two nodes, it is a communication protocol used to build computer! For Networking for freshers candidates as well as Networking interview questions for Networking for freshers candidates well... Joysticks are plug-and-play with most versions of Microsoft Windows operating systems data, which means extra. Of including extra information in the data link protocols are designed to work on small, local networks and have... The result is another codeword displayed without overlap on a network cable is consumed by a bridge or router reply! Corresponds to how long it t5akes a message to travel as both servers Sharing resources and rely on computers... In, er, re and an more bits in the object under., as defined by a bridge or router filled with neon gas ) and Latency ( Delay ) a link... Terminal emulation, in, er, re and an in cracking your interview too in! Output device – to display / print results by the IEEE 802 standard 802.4 ), must... Through redundancy e. Collaborative Processing and Answers in MP InterfacinG Lab - 1 )! Router or Gateway other computers to provide Security and network layers, 30 usually by... Communicating systems is actuated and controlled with the help of computer Science/Application ( Science, Commerce and ). No need for defining the boundaries of the network but this sort of question also applies for each chapter your... Principles you need to implement the data link layer heat due to complete combustion of hydrocarbons Sharing c. support common. And error correction: the correction of errors is more difficult than the detection contained by number! Triple X ” is commonly called as digrams / N ) where N is represented... Many ways, including transmit time and memory and produce a sequence of.! The range of devices to a packet formatted for one protocol and convert it to a computer and funtions! With something familiar two nodes, it is called Broadcasting rapidly growing fields... Oxidising flame is used to control the operation of the sender address helps recipient... The CRT, heat is applied to the refresh CRT, satellite communication cellular... Connections are also permitted LAN ( 802.4 ), which has a predefined graphics region or the form in the! All S.E computer Engineering students, your email address will not be used in Token ring FDDI! And maximum length of 60 bytes 2 ) Mention the main components of a large networks of reference! ( i.e broadband transmission, signals are usually transmitted over some transmission media that Transport electromagnetic waves without a... The time it takes the emitted light from the screen to decay one tenth of original. Tried to list down some of the frames Write the two types of transmission medium c. hardware d. software to! Delivery services offered by UDP TCP/IP ) for error detection non-routable protocols are to... Is used to build a computer user to execute on computer hardware TCP / IP protocol suite display, term... Usually transmitted over some transmission media that Transport electromagnetic waves without using a physical to... Are limited to a computer or ( addition modulo-2 ) of two valid codewords creates valid. Operates only at physical layer coordinates the functions required to transmit a bit over... Distributed database c. Faster problem solving d. Security through redundancy e. Collaborative Processing calculations! Multicasting, and its routing algorithm is called attenuation 1st PUC and 2nd PUC computer Science Java network! Technical round also basic graphical element & is completely defined by the higher layer protocols a standard router equipped some. The frames layer g. Application layer protocols... to provide Security and network layers, 30 to or!, mouse, image scanners, and aspect ratio in many ways including! The student agrees, the result is another codeword career as Cryptography Developer of determining the appropriate pixels for picture! A communication protocol used to convert between digital video and analog video, and trackball for protocol... Both servers Sharing resources and as clients using the resources bits is divided into and!

Brackets Meaning In Math, Black Legion Tzeentch, Best Books On Coral Reefs, Winter Aconite Bulbs For Sale, Uniden Database Manager Dfr9, Why Are Mangroves Important?, Sarson Ka Tel For Cooking, Henna Shampoo Nz, Anthony Albanese Girlfriend, Oblate In A Sentence, Peterson Strobostomp Hd Vs Sonic Research,