Q. & A.s ‑‑‑ SCI.
& TECH. – 20
526Q. What is Tyre 1 system?
1 TIER :-
TIER -1 IS INTERNET SERVICE PROVIDERS.
1-tier network does not pay settlement.
To become 1-tier net work,. A net work must peer with
every net work of tier-1.
All transit free net works are 1-tier.
Transit free net works;
1] renesys corporation
2] RIPE.RIS.data base
3] oregon route views
This 1-tier network is used in the industry to mean a
network with no overt settlements.
It is closer to centre of internet.
It cannot reach most ead users.
Good quality network.
It cannot be free globally.
AT & T,
GBLX, L3, NIT Communication.
Remote network management
24X7 trouble assistance
527Q. What is Tyre 2 system?
2 TIER :-
TIER – 2 ARE PROTECTED SERVICES.
They can have redundant interconnections with more
than one tier-1 provider.
It can reach more end users.
It is larger than tier-1.
It is more better connectivity.
It is internet service provider.
It purchases IP transmit to reach others.
Virtual private network
Filtering routers and firewalls
Intrusion detection
Boundary anti-virus detection
Optional
network management
528Q. What is Tyre 3 system?
3 TIER :-
TIER – 3 IS
HIGH ASSURAQNCE SERVICE.
These are true resellers = tier – 2
Not successful because of depeering.
It is not multihomes.
Visigenic/noblenet
3-tier architecture is most commonly used to build web
applications.
Virtual private network
Encryption capable backbone
Filtering routers and firewalls
Trusted gateways and secure mail guards
Intrusion detection
529Q. What is American Standard Code?
In this process whatever we type is converted into
binary code.
0 0000 0000
1 0000 0001
2 0000 0010
3 0000 0011
4 0000 0100
5 0000 0101
6 0000 0110
7 0000 0111
8 0000 1000
9 0000 1001
10 0000 1010
|
A 65
0100 0001
B 66
C 67
D 68
E 69
F 70
G 71
. similarly upto
.
.
.
Z 90
|
a 97
b 98
.
.
.
. similarly upto
Z 122
|
+ 43
- 95
.
.
.
( 40
) 41
|
530Q. What is called flash memory?
Flash memory is called non-volatile. It found in
1.
Digital cameras
2.
MP 3 players
3.
USB keychain
4.
Storage devices
5.
Game consoles
A picture is stored on flash card turning millions of
tiny switches on and off.
531Q. What is the difference between 32 bit OS and 64 bit OS?
The bus carries one wire per one bit.
8 bits means the bus contains 8 wires in which one
wire can transfer one bit of data at a
time.
1 byte = 1 character [a / b… 1,2….. ]
32 bits = 4 bytes. That means 4 characters can be
transferred.
64 bits = 8 bytes. That means 8 characters can be
transferred.
532Q. What is called chip?
1.
Processors reside on chips.
2.
Chips are made on very thin wafers made of
silicon.
3.
Chip manufacturers use photolithography to
physically etch out the tiny grooves and notches that make up the chip’s
circuits.
4.
The surface of silicon wafer is covered with
gooey substance called photresist which is sensitive to certain types of light.
5.
A glass
pattern is placed over the wafer. This pattern is marked with the precise lines
where transistors are placed.
6.
UV light is shined on that. The photo resist
reacts to the light.
7.
The silicon exposed to this light is washed away
leaving a pattern of fine tracings on its surface.
8.
This wafer surface is coated wish ions.
9.
Atoms of the metal Al or Cu are placed in the
etched channels on the wafer’s surface.
10.
These connections will conduct electrons as they
move through the chip.
11.
Transistor to transistor gap is 1 micron = 10-6
metres.
533Q. What are the various of Operating Systems?
There are 4 types of Operating Systems.
1] Real time Operating Systems.
1.
medical diagnostics equipment
2. life
support system
3.
machinery
4.
scientific equipment/instruments
5.
industrial systems.
2] Single User / Single
Tasking Operating Systems.
1. the OS
that allows a single user to perform just one task at a time.
Task =
printing /
writing / editing
/down loading
3] Multi Tasking OS.
It allows
user to perform two or more functions at a time.
4] Multiuser OS /Multi
tasking OS.
Unix / VMS / Mainframe OS
534Q. What is DOS?
DOS = Disk Operating System.
1.
In came in 1980.
2.
It supported only one user at a time.
3.
It can run only one program m at a time.
4.
It has no built in networking.
5.
The user had to manually install drivers any
time.
6.
It supported only 16 bit programs.
7.
It had limited RAM and storage space.
535Q. What are the specialties of Windows XP?
1.
It is released in 2001.
2.
It is professional.
3.
It is Home.
4.
It is Media Centred Edition.
5.
It is embedded.
It
has many features.
1.
Digital media support.
2.
Advanced networking & communications
1. Plug
and play
2. No
installation of hardware drivers.
3. Internet
connection.
4. Multiple
internet connection to multiple users.
3.
Advanced mobile computing.
4.
It is a do it yourself kit.
536Q. What are the various Hybrid Networks?
1.
CAN
2.
MAN
3.
HAN
4.
Internets
5.
Extranets
537Q. What is 2.5 G Technology?
2.5G,
which stands for "second and a half generation," is a cellular wireless technology developed in between its predecessor,
2G, and its successor, 3G.
The
term "2.5G" usually describes a 2G cellular system combined with
General Packet Radio Services (GPRS), or other services not generally found in
2G or 1G networks.
They are usually classified as 2.5G
technology because they have slower network speeds than most 3G services.
2.5G
networks may support services such as WAP, MMS, SMS mobile games, and search
and directory.
538Q. What are OSs of supercomputer?
Operating
systems
Until the early-to-mid-1980s, supercomputers usually
sacrificed instruction set
compatibility and code portability for performance (processing and memory
access speed).
For the most part, supercomputers to this time (unlike
high-end mainframes) had vastly different operating systems.
The Cray-1 alone had at least six different proprietary OSs
largely unknown to the general computing community.
In similar manner, different and incompatible vectorizing
and parallelizing compilers for Fortran
existed.
This trend would have continued with the ETA-10 were it not for the initial
instruction set compatibility between the Cray-1 and the Cray X-MP, and the
adoption of computer systems such as Cray's Unicos, or Linux.
539Q. What are the Special-purpose
supercomputers?
Examples of special-purpose supercomputers:
- Belle, Deep Blue,
and Hydra,
for playing chess
- Reconfigurable computing machines or parts of
machines
- GRAPE,
for astrophysics and molecular dynamics
- Deep Crack,
for breaking the DES cipher
- MDGRAPE-3,
for protein structure computation
- D. E. Shaw Research Anton, for simulating molecular dynamics
540Q. List out supercomputers in the world.
Year
|
Supercomputer
|
Location
|
|
2008
|
1.026 PFLOPS
|
||
1.105 PFLOPS
|
|||
2009
|
1.759 PFLOPS
|
Oak Ridge, USA
|
|
2010
|
2.566 PFLOPS
|
Tianjin,
China
|
|
2011
|
10.51 PFLOPS
|
541Q. What are the applications of supercomputer?
Applications of supercomputers
The stages of supercomputer
application may be summarized in the following table:
Decade
|
Uses and computer involved
|
1970s
|
|
1980s
|
|
1990s
|
3D nuclear test simulations as a
substitute for legal conduct Nuclear Proliferation Treaty
(ASCI Q).
|
2010s
|
542Q. How
fast does sound travel?
In dry air, sound travels 742
miles/hour. (Airlines usually go around 550 mi/hour). In something like water,
however, where the atoms are closer together, sound travels easier, and goes at
3,261 miles/hour.
Technically, one must cite the
temperature and pressure at which to quote a sound speed since it will vary a
little. These numbers then are at room temperature and 1 atmosphere of
pressure.
A tidbit of fact on the subject of going
fast: Some planes can go as fast and faster than sound. At NASA's wind tunnel
at Moffett Field, they keep the plane fixed and move the air at up to 4 times
the speed of sound!
543Q. What are Cloud Computing platforms?
Cloud computing
platforms:
Amazon Elastic Compute Cloud (EC2)
Google App Engine
Force.com
GoGrid
Azure
Intuit Partner Platform (IPP)
544Q. What are the uses of Elastic Cloud Computing?
Using Elastic Cloud Computing technology allows you
to have a flexible and scalable hardware infrastructure for
software deployment,
paying only for what you use.
You rent only the hardware infrastructure you need when you
need it.
545Q. What are the key
concepts of Cloud Computing?
Agility
improves with users' ability to rapidly and inexpensively re-provision
technological infrastructure resources.
·Application Programming Interface
(API) accessibility to software that enables machines to interact with cloud
software in the same way the user interface facilitates interaction between
humans and computers. Cloud Computing systems typically use REST-based APIs.
·Cost is claimed to be greatly reduced
and in a public cloud delivery model capital expenditure is
converted to operational expenditure. This ostensibly lowers barriers to entry,
as infrastructure is typically provided by a third-party and does not need to
be purchased for one-time or infrequent intensive computing tasks. Pricing on a
utility computing
basis is fine-grained with usage-based options and fewer IT skills are required
for implementation (in-house).
·Device and location independence
enable users to access systems using a web browser regardless of their location
or what device they are using (e.g., PC, mobile). As infrastructure is off-site
(typically provided by a third-party) and accessed via the Internet, users can
connect from anywhere.
·Multi-tenancy
enables sharing of resources and costs across a large pool of users thus
allowing for:
o
Centralization of
infrastructure in locations with lower costs (such as real estate, electricity,
etc.)
o
Peak-load capacity
increases (users need not engineer for highest possible load-levels)
o
Utilization and efficiency
improvements for systems that are often only 10–20% utilized.
·Reliability is improved if multiple
redundant sites are used, which makes well designed cloud computing suitable
for business continuity
and disaster recovery.
Nonetheless, many major cloud computing services have suffered outages, and IT
and business managers can at times do little when they are affected.
·Scalability
via dynamic ("on-demand") provisioning of
resources on a fine-grained, self-service basis near real-time, without users
having to engineer for peak loads. Performance is
monitored, and consistent and loosely coupled architectures are constructed
using web services as
the system interface. One of the most important new methods for overcoming
performance bottlenecks for a large class of applications is data parallel
programming on a distributed data grid.
·Security
could improve due to centralization of data, increased security-focused
resources, etc., but concerns can persist about loss of control over certain
sensitive data, and the lack of security for stored kernels. Security is often
as good as or better than under traditional systems, in part because providers
are able to devote resources to solving security issues that many customers
cannot afford. Providers typically log accesses, but accessing the audit logs
themselves can be difficult or impossible. Furthermore, the complexity of
security is greatly increased when data is distributed over a wider area and /
or number of devices.
·Maintenance of
cloud computing applications is easier, since they don't have to be installed
on each user's computer. They are easier to support and to improve since the
changes reach the clients instantly.
·Metering
means that cloud computing resources usage should be measurable and should be
metered per client and application on a daily, weekly, monthly, and yearly
basis.
546Q. What are the uses of Cloud Computing?
Cloud computing
describes computation, software, data access, and storage services that do not
require end-user knowledge of the physical location and configuration of the
system that delivers the services.
Cloud computing
is a natural evolution of the widespread adoption of virtualization, service-oriented architecture, autonomic
and utility computing.
Details are abstracted
from end-users, who no longer have need for expertise in, or control over, the
technology infrastructure "in the cloud" that supports them.
Cloud computing
describes a new supplement, consumption, and delivery model for IT services based on Internet protocols, and it typically
involves provisioning of dynamically scalable
and often virtualized resources.
Virtualization
News, Support, Podcasts, Videos, Downloads for the Citrix support, VMware
support, Microsoft Virtualization, Remote Desktop Services (Terminal Services),
Application Virtualization, Server Virtualization, Desktop Virtualization
(VDI), Virtualization Security, and Desktop Management Software
547Q. What is the main difference between a rich man and a poor man?
A poor is ready to sell his “ time “ to the rich man.
Whereas
a rich man is ready to buy the “time” from the poor. He is not ready to
sell his time.
The poor will have mostly one source of
income where as the rich have multiple sources of income.
548Q. What are the
advantages of Bluetooth Technology?
1.
Wireless synchronisation
2.
Economical
3.
Universally accepted
4.
Automatic
5.
Upgradeable
6.
Standard protocol
7.
Instant PAN (Personal Area Network)
8.
Faster data and voice Sharing
9.
Simplifies communication while driving
10. Avoids interference from other wireless devices
11. Low power consumption
12. Best alternative to data transfer
549Q. What are the different ways of connecting electronic devices?
There are lots of
different ways that electronic devices can connect to one another.
For example:
·Component
cables
·Electrical
wires
·Ethernet
cables
·Infrared
signals
·Bluetooth
550Q. What are the ranges of Bluetooth?
Bluetooth is a standard wire-replacement
communications protocol primarily designed for low power consumption, with a
short range based on low-cost transceiver
microchips in each device.
Class
|
Maximum
permitted power
|
Range
(m) |
|
(mW)
|
(dBm)
|
||
Class 1
|
100
|
20
|
~100
|
Class 2
|
2.5
|
4
|
~10
|
Class 3
|
1
|
0
|
~5
|