Vous êtes sur la page 1sur 11

Q1 What is RAd. Rapid application development describes a method of developing softwarte through the use of pre programed tools.

The controls are simply dropped on a screen to visually design the interface of application. Q2 What is event driven programming.? This programming style responde to the user events and is driven by the occurrence of user events. Q3. What is the object oriented programming This programming style emphasizes upon objects an object is an identifiable entity with some characteristics and behavior. Q4. What is event Events are activities thattake place either due to user interaction or due to some internal changes.user clicks upon a button or text of a textbox changes owing to a calculation. Q5.What is message? How is it related to an event. A message is the information / request set to an application about the occurrence of an event. Q6 What is the relation of properties,method and event. Although properties ,method and events do different things,yet they are interrelated .Properties can be thought of as an objects attributes ,method as its actions , and events as its responses. Q7. What are containers. Containers are those controls that can hold other control inside them .eg Frame ,panel label etc are containers. Q8 What is an keywords .can keywords be used as identifier Keywords are those words that convey a special meaning to the language compiler. These are reserved for the special purpose and must not be used as normal identifier names. Q9 What is an identifier Identifier are fundamental building blocks of a program and are used as the general terminology for the names given to different parts of the program viz. variables, objects, classes, functions, arrays etc. Q Is java case sensitive ? What is meant by the term case sensitive ? Yes, java is case sensitive. The term case sensitive means the letters/words with different cases ( i.e., Uppercase/ lowercase ) are treated differently e.g., name, Name, NAME are not the same for java as it is case sensitive. Q10 What are literals ? How many types of integer literals are available in java ? Literals ( often referred to as constants ) are data items that are fixed data values . java allows several kinds of literals : Ineger-literal Floting-literals Boolan literals Charater-literal

String-literal The null literal

Q11 .How many types of integer constants are allowed in java : How are they written ? Java allows three types of integer literals : Decimal (base 10). These are the integer literals that being with a non- zero digit e.g., 1234. Octal (base 8). These are the integer literals that being with a zero e.g., to write octal no. 24, you need to write : 024. Hexadecimal (base 16). These are the integer literals that being with 0x or 0X e.g., to write hexadecimal no. 2AF9,you need to write : 0x2AF9. Qust. What is the Characteristics of a good program. i) Effective and efficient ii) User friendly iii) Self documentation iv) Reliable v) Portable Satges of program Development process. i) Crack the problem ii) Code the algorithm iii) Compile the program iv) Execute the program ROBUSTNESSThe ability of a program ,to recover following an error an error and to continue operating within its environment, is called robustness.

DBMS .Database management System What is comments.explain it.


Comments A comment is a text that is not executed; it is only for documentation purpose. A comment generally describes the statements purpose within an application.There are two types of comment. 1 .Multiple line comment. -/* proceed with the text of the comment.This text can span multiple lines.end the comment with */. 2. single line comment. With - - (followed by the space ). Q 1 What is the role of UNIQUE constraint ? How is PRIMARY KEY constraint different from UNIQUE constraint ?

The UNIQUE constraint ensures that all values in a column are distinct. In other words, no two rows can hold the same value for a column with UNIQUE constraint. PRIMARY KEY constraint is different from UNIQUE constraints, since attributes with UNIQUE constraint are permitted to be NULL unless they have explicitly been declared to be NOT NULL, whereas, primary key attributes are required to be non null and unique. Q.2 What is primary key ? WHAT is PRIMARY KEY constraint ? A primary key is a set of one or more attributes, that is chooses by the database designer as the principal mean to identify rows within a relation. Primary key constraint marks a set of attributes as primary key. Q 3 What is NOT NULL constraint ? What is DEAFAULT constraint ? NOT NULL ensures that a column cannot have NULL value. The DEAFUALT constraint specifies the default value for the field when no value is specified at time of insertion. Q 4 What a columns value is skipped in an INSERT command, which value is inserted in the database ? The columns that are not listed in the INSERT command will have their default value, if it is defined for them, otherwise, NULL value. Q 5.How are SQL commands classified ? Ans. SQL commands can be mainly divided into following categories : 1 .DDL(Data Definition language) 2. DML(Data Manipulation Language) 3.DCL (Data Control Language ) 4. TCL (Transaction Control Language) 1.Data Definition Language (DDL) Commands. Commands that allow us to perform tasks related to data definition e.g., Creating, altering and dropping. Granting and revoking privileges and roles. Maintenance commands. 2.Data Manipulation Language (DML) commands. Commands that allow us to perform data manipulation e.g., retrieval, insertion, deletion and modification of data stored in a database. Transaction Control Language (TCL) Commands. Commands that allow us to manage and control the transactions ( a transaction is one complete unit of work involving many steps), e.g., Making changes to database, permanent Undoing changes to database, permanent Creating save points Setting properties for current transactions Q 6.Differentiate between DDL and DML commands.

The Data definition language (DDL) commands ,as the names suggests, allow us to perform task relatesd to DDL. That is ,through these commands , you can perform task like , Create ,alter ,Drop, schema objects, What is constraint ? Name some constraints that you can apply to enhance database integrity. A constraint is a condition or check applicable on a field or set of fields. Example. NOT NULL (ensures that column cannot have null value), CHECK (make sure that all values satisfy certain criteria), UNIQUE ( ensures that all values in a column are different) etc.

Q Differentiate between CHAR and VARCHAR data types. The difference between CHAR and VARCHAR is that of fixed length and variable length. The CHAR datatypes specifies a fixed length character string. When a column is given datatype as CHAR(n), then MySQL ensures that all values stored in that column have this length i.e., n bytes. If a value is shorter than this length n then blanks are added, but the size of value remains n bytes. VARCHAR, on the other hand, specifies a variable length string. When a column is given datatype as VARCHAR(n), then the maximum size a value in this column can have is n bytes. Each value that is stored in this column stores exactly as we specify it i.e., no blanks are added if the length is shorter than maximum length n. However, if we exceed the maximum length n, then an error message is displayed. Q7.How many types of errors Ans .Compile time errors-When a program compiles its source code is checked for whether it follows the programming languages rules or not.Two types of errors fall into this category. 1 .Syntax errors 2. Semantics errors. Syntax errors- Syntax errors occur when rules programming language are misused.when a grammatical rule of java is violated. Semantics errors. Semantics errors occur when statements are not meaningful. Run time errors. Errors that during the execution of a program are run time errors. Java refers to runtime errors as exception also.some run time errors stop the execution program.

IT APPLICATION
Q 1.How is e-learing proved useful for a trainer ? The advantages of e-learing to the trainer or organization are : 1. Reduced Overall Cost. Its less expensive to produce. 2. Reduced Learning Times. It moves faster than traditional methods. 3. Consistent delivery. It provides a consistent message. 4. Cost effective and fast updation. It can be updated easily and quickly. 5. Increased Retention. It can lead to increased retention and a storage grasp on the subject. This is because of the many elements that are combined in e-learing to reinforce the message.

6. Easily Manageable. It can be easily managed for large groups of student. Q 2.What is the significance of a good GUI ? A good GUI is an important feature for a softwares success and acceptance. If the end users find the software ( and its GUIIs) to be too cumbersome or difficult to understand, then the software may be rejected even if it is an excellent software product. Q3 What do you think is most outstanding feature of e-learning ? The most outstanding feature of e-learning is that it has opened door for skill enhancement to the people of all age-groups, people of all skill-levels and people belonging to different strata of society. Q 4 Define (i) e-governance, (ii) e-business, (iii) e-learning. (i) E-governance refers to the application of electronic means in governance with an aim of fulfilling the requirements of common man at affordable costs and in fastest possible time. Waited t6ime reduced from 10% to 60%. Bribes reduced by 50% to 90%. All above factors resulted in reduced cost of availing the service. Q.5 What benefits does an e-business offer to the customers ? For cusatomers, e-business offers benefit such as : (i) Improved speed of response ; (ii) Cost savings ; (iii) Improved efficiency and productivity ; (iv) Improved customer service Q6. How is E leaning proved useful for a trainer.? 1. Reduced Overall Cost. 2. Reduced Learning Times. 3. Consistent delivery. 4. Cost effective and fast updation . 5. Increased Retention.

NETWORKING

The shape of a local-area network (LAN) or other communications system. Topologies are either physical or logical. There are four principal topologies used in LANs. 1. bus topology: All devices are connected to a central cable, called thebus or backbone. Bus networks are relatively inexpensive and easy to install for small networks. Ethernet systems use a bus topology. ring topology : All devices are connected to one another in the shape of a closed loop, so that each device is connected directly to two other devices, one on either side of it. Ring topologies are relatively expensive and difficult to install, but they offer high bandwidth and can span large distances. star topology: All devices are connected to a central hub. Star networks are relatively easy to install and manage, but bottlenecks can occur because all data must pass through the hub. tree topology: A tree topology combines characteristics of linear bus and star topologies. It consists of groups of star-configured workstations connected to a linear bus backbone cable.

2.

3. 4.

These topologies can also be mixed. For example, a bus-star network consists of a high-bandwidth bus, called the backbone, which connects a collections of slower-bandwidth star. LAN: (local area network) A group of computers that share a common connection and are usually in a small area or even in the same building. For example an office or home network. They are usually connected by Ethernet cables and have high speed connections. If it was a wireless setup it would be called a WLAN, which would have a lower connection speed. MAN: (metropolitan area network) This is a larger network that connects computer users in a particular geographic area or region. For example a large university may have a network so

large that it may be classified as a MAN. The MAN network usually exist to provide connectivity to local ISPs, cable tv, or large corporations. It is far larger than a LAN and smaller than a WAN. Also large cities like London and Sydney, Australia have metropolitan area networks.

WAN: (wide area network) This is the largest network and can interconnect networks throughout the worldand is not restricted to a geographical location. The Internet is an example of a worldwide public WAN. Most WANs exist to connect LANs that are not in the same geographical area. This technology is high speed and very expensive to setup.

Notes:

Wireless LAN is WLAN. At the moment a wired connection is still always high speed. Even though having a Wireless LAN is less mess with no cables, it compromises on speed. With new networks popping up all the time like 3G, GSM, and GPRS, the actual end user gets to connect directly to a WMAN which was unheard of. Most of these networks are mobile data standards that previously or still are used on cell phones

Bus Network
-Advantages

Easy to implement and extend Well suited for temporary networks (quick setup) Initially less expensive than other topologies Cheap
-Disadvantages

Difficult to administer/troubleshoot. Limited cable length and number of stations. If there is a problem with the cable, the entire network goes down. Maintenance costs may be higher in the long run. Performance degrades as additional computers are added or on heavy traffic. Low security (all computers on the bus can see all data transmissions). One virus in the network will affect all of them (but not as badly as a star or ring network). Proper termination is required.(loop must be in closed path). If one node fails, the whole network will shut down. If many computers are attached, the amount of data flowing causes the network to slow down.

Ring Network

-Advantages

Data is quickly transferred without a bottle neck. (very fast, all data traffic is in the same direction) The transmission of data is relatively simple as packets travel in one direction only. Adding additional nodes has very little impact on bandwidth It prevents network collisions because of the media access method or architecture required.
-Disadvantages

Data packets must pass through every computer between the sender and recipient therefore this makes it slower. If any of the nodes fail then the ring is broken and data cannot be transmitted successfully. It is difficult to troubleshoot the ring. Because all stations are wired together, to add a station you must shut down the network temporarily. In order for all computers to communicate with each other, all computers must be turned on. Total dependence upon the one cable

Star Network
-Advantages

Good performance easy to set up and to expand. Any non-centralised failure will have very little effect on the network, whereas on a ring network it would all fail with one fault
-Disadvantages

Expensive to install
Extra hardware required Hub A hub takes the data that comes into a port and sends it out all the other ports in the hub. It doesn't perform any filtering or redirection of data. Although it's actually a little more complicated, you can think of a hub like a piece of wire.

Bridge Bridges (sometimes called "Transparent bridges" ). This means they don't know anything about protocols, but just forward data depending on the destination address in the data packet. This address is not the

IP ADDRESS, but the MAC (Media Access Control) address that is unique to each network

adapter card.

Switches Switches are the same thing as Bridges, but usually have multiple ports with the same "flavor" connection (Example: 10/100BaseT). Switches can be used in heavily loaded networks to isolate data flow and improve performance. In a switch, data between two lightly used computers will be isolated from data intended for a heavily used

Router

Routers forward data packets from one place to another, too! However routers are OSI model Layer 3
devices, and forward data depending on the Network address, not the Hardware (MAC) address. For TCP/IP networks, this means the IP address of the network interface.

Routers, like bridges, provide bandwidth control by keeping data out of subnets where it doesn't belong. However, routers need to be set up before they can get going, although once set up, they can communicate with other routers and learn the way to parts of a network that are added after a router is initially configured.

GATEWAY

Definition: A network gateway is an internetworking system capable of joining together two networks that use different base protocols. A network gateway can be implemented completely in software, completely in hardware, or as a combination of both. Depending on the types of protocols they support.

Internet Protocol Address (or IP Address) is an unique address that computing devices use to identify itself and communicate with other devices in the Internet Protocol network. Any device connected to the IP network must have an unique IP address within its network. An IP address is analogous to a street address or telephone number in that it is used to uniquely identify a network.An IP address is written in "dotted decimal" notation, which is 4 sets of numbers separated by period each set representing 8-bit number ranging from (0-255). An example of IPv4 address is 216.3.128.12, which is the IP address assigned to topwebhosts.org.

Wired technologies

Twisted pair wire is the most widely used medium for telecommunication. Twisted-pair cabling consist of copper wires that are twisted into pairs. Ordinary telephone wires consist of two insulated copper wires twisted into pairs. The use of two wires twisted together helps to reduce crosstalk and electromagnetic induction. The transmission speed ranges from 2 million bits per second to 10 billion bits per second. Shielded twisted-pair (STP) which are rated in categories which are manufactured in different increments for various scenarios. Coaxial cable is widely used for cable television systems, office buildings, and other work-sites for local area networks. The cables consist of copper or aluminum wire wrapped with insulating layer typically of a flexible material with a high dielectric constant, all of which are surrounded by a conductive layer. The layers of insulation help minimize interference and distortion. Transmission speed range from 200 million to more than 500 million bits per second. Optical fiber cable consists of one or more filaments of glass fiber wrapped in protective layers that carries data by means of pulses of light. It transmits light which can travel over extended distances. Fiber-optic cables are not affected by electromagnetic radiation.

Transmission speed may reach trillions of bits per second. The transmission speed of fiber optics is hundreds of times faster than for coaxial cables and thousands of times faster than a twisted-pair wire. This capacity may be further increased by the use of colored light.

Wireless technologies

Terrestrial microwave Terrestrial microwaves use Earth-based transmitter and receiver. The equipment looks similar to satellite dishes. Terrestrial microwaves use low-gigahertz range, which limits all communications to line-of-sight. Path between relay stations spaced approx, 48 km (30 miles) apart. Microwave antennas are usually placed on top of buildings, towers, hills, and mountain peaks. Communications satellites The satellites use microwave radio as their telecommunications medium which are not deflected by the Earth's atmosphere. The satellites are stationed in space, typically 35,400 km (22,200 miles) (for geosynchronous satellites) above the equator. These Earth-orbiting systems are capable of receiving and relaying voice, data, and TV signals. Cellular and PCS systems Use several radio communications technologies. The systems are divided to different geographic areas. Each area has a low-power transmitter or radio relay antenna device to relay calls from one area to the next area. Wireless LANs Wireless local area network use a high-frequency radio technology similar to digital cellular and a low-frequency radio technology. Wireless LANs use spread spectrum technology to enable communication between multiple devices in a limited area. An example of open-standards wireless radio-wave technology is IEEE 802.11. Infrared communication can transmit signals between devices within small distances of typically no more than 10 meters. In most cases, line-of-sight propagation is used, which limits the physical positioning of communicating devices.

Network interface cards

A network card, network adapter, or NIC (network interface card) is a piece of computer hardware designed to allow computers to physically access a networking medium. It provides a low-level addressing system through the use of MAC addresses. Each Ethernet network interface has a unique MAC address which is usually stored in a small memory device on the card, allowing any device to connect to the network without creating an address conflict. Ethernet MAC addresses are composed of six octets.

Vous aimerez peut-être aussi