Popular Posts

May 23, 2025

DB2 SQL Programming Freshers Interview Questions

 
Define Db2?

DB2 is a Database Management System for the MVS Operating System where, DB2 is a subsystem of MVS Operating System.

Explain About Rct?

RCT is expanded as Resource – Control Table and is defined in the DB2/CICS region. This is the component that comprises of features that are gathered through macros of DSNCRCT. RCT matches with the transaction ID that of CICS, with the authorization ID that of DB2. This should also be matched with plan ID.
DB2 SQL Programming Freshers Interview Questions And Answers
DB2 SQL Programming Freshers Interview Questions And Answers

How Can Tablespace Be Moved To Another Dasd Volume That Is Allocated For That Tablespace?


Tablespace that you are using is allocated only to STOGROUP, then you can enter the command ALTER STOGROUP for adding as well as deleting volume.

REORG TABLESPACE and RECOVER TABLESPACE are statements that are helpful in creating new STOGROUP that can point towards the new volume.

ALTER tablespace and REORG and RECOVER are statements used for altering and recovering the tablespace allocated in the memory.

Define Buffer Pool?

The buffer pool is a reserved main storage, which is to satisfy the buffering requirements for one or more table spaces or indexes. It can be made up of either 4K or 32K pages.

Explain The Function Of Data Manager?

The physical database is managed by the DB2 component called Data manager. It invokes other system components to perform logging, locking etc.

What Is A Storage Group (stogroup)?

STOGROUP is a named collection of DASD volumes, which is to be used by index spaces and table spaces of the database.

Define Predicate?

Predicate is an element of a search condition. It expresses or implies a search condition.

Define Declaration Generator (dclgen)?

Declaration Generator is a facility that is used to form SQL statements that describes a table or view. At pre-compile time, the table or view descriptions are then used to check the validity of SQL statements.

List Out The Buffer Pools In Db2?

There are four buffer pools in DB2 and they are:

BP0
BP1
BP2
BP32

What Is The Purpose Of Using Commit?

The data changes can be made permanent by using COMMIT. It also permits data to be accessed by other applications who can reference the committed data.

List Out The Data Types Available?

The Data types available here are:

SMALLINT
INTEGER
FLOAT
DECIMAL
CHAR
VARCHAR
DATE
TIME

What Are The Uses Of Db2 Optimizer?

It processes SQL statements.
It helps to select the access path

Define Sqlca?

SQL Communication Area is a structure of variables, which are updated after every execution of SQL statements. For an application that contains executable SQL statements, only one SQLCA is needed. FORTRAN need more than one SQLCA to be provided .For Java, SQLCA is not applicable.

Define Check Constraint?

It is specified as a condition or criteria to ensure data integrity. A value to be inserted or updated to a table is tested by CHECK constraint. The CHECK constraints are created during the creation of the table.

What Is Sqlca’s Maximum Length?

136 is the maximum length of the SQLCA.

Discuss About Db2 Bind?

The process that builds access paths to the DB2 table is known as bind. The bind uses Database Request Modules  from the DB2 pre-compile step as input and produces an application plan. It checks for user authentication and validates SQL statements in the DBRM(s).

List Out The Three Types Of Page Locks That Can Be Held?

Exclusive
Update
Share.

Define Clustering Index?

Clustering index is a type of index, which locates the table rows and determines how to group the rows together in the tablespace.

What Is Concurrency?

More than one DB2 application process can access the same data at the same time, is known as concurrency. However, problems can happen such as, lost updates access to unrepeatable reads and uncommitted data.

Explain The Function Done By Data Manager?

Data manager can be considered as a component that is capable of managing the databases that are physically present and is capable of invoking other components associated with the system for performing functionalities like logging, locking and in performing other I/O operations.

Explain About Dbrm?

DBRM stands for Database Request Module and is a component inside DB2, which is created by the pre compiler of DB2. This is a module that consists of SQL source statements that get extracted out of the application program. DBRMs form inputs that are helpful in the binding process.

Comment Whether The Cursor Is Closed During Commit Or Not.?

Yes. The cursor is closed during COMMIT.

In An Sql Table That Is Embedded, What Is The Procedure To Retrieve Rows That Are Part Of A Db2 Table?

Either you can use SELECT statements of single rows or an alternative way is to use CURSOR.

Mention The Way Of Highlighting As Well As Putting A Cursor To Use In A Cobol Program.?

The best way of putting a CURSOR to use in a COBOL program is to make use of DECLARE CURSOR, which can be used either in procedure division operation or in working storage. This is being done basically to highlight the SELECT statement. Once DECLARE CURSOR is used, this is followed by OPEN, FETCH and finally CLOSE.

If The Cursor Is Kept Open Followed The Issuing Of Commit, What Is The Procedure To Leave The Cursor That Way?

Inside DECLARE CURSOR, there is a WITH HOLD option, which will come useful in this case. Although, one should note the point that WITH HOLD function has absolutely no effect if considered for CICS pseudo-conventional programs.

Explain Packages?

PACKAGES are units, which consist of executable codes that are meant for SQL statements for one respective DBRM.

Highlight All The Advantages That Are Attached To A Package?

Following are the advantages attached to a PACKAGE.

Avoid the cost of a large collection of bind. It is much more advisable to go for a small collection instead of a large one.

Ensure that you do not have to bring a large collection of members of DBRM together for a particular plan.

In case if you wish to make changes in the program and these changes eventually lead to errors, then you can decrease the fallback complexities with the help of PACKAGE.

During the process of automatic binding and rebinding of a particular plan, make sure that the total transaction attached to the process is unavailable during the course.

For A Db2 Column That Is Being Defined As Decimal (11, 2), Discuss The Cobol Picture Clause?
PIC S9 (9) V99 COMP – 3

In the expression DECIMAL (11, 2)  2 happens to be the precision whereas 11 is the data type size.

Explain Dclgen?

DCLGEN basically refers to DeCLarations GENerator whose primary purpose is to generate copy books of the host language for the tables. It is also used to create the DECLARE table.

Mention Some Fields That Are A Part Of Sqlca?

SQLERRM, SQLCODE, SQLERRD.

Explain The Contents That Are A Part Of Dclgen?

There are primarily two components of DCLGEN. These are:

A copy book of the host language, which will give alternative definitions for all the column names.
In terms of the data-types of DB2, EXEC SQL DECLARE TABLE shows an aesthetic layout of the table.

Comment Whether Dclgen Is Mandatorily Used. If Not, Then What Is The Point Of Using It?

It is not exactly mandatory to bring DCLGEN into use. The primary use of DCLGEN comes during the pre-compilation phase where it helps in detecting the misspelt column names. Since DCLGEN is just a tool, it will only generate variable definitions for the host and reduces the chances of errors.

In Case If At Some Point Of Time Db2 Is Down, Would That Impact The Pre-compilation Process Of A Db2-cobol Program?

Even if DB2 is down at some point of time, even then it will not impact the pre-compilation process of DB2-COBOL program. The reason for the same is that the pre-compiler never refers to the catalogue tables of DB2.

Following A Db2 Update Statement, What Is The Quickest Way To Compute The Total Number Of Updated Rows?

All you have to do is check the value that has been stored in SQLERRD (3).

What Is Meant By Explain?

EXPLAIN is basically used to show the path of access by the optimizer basically for an SQL statement. Furthermore, EXPLAIN can also be brought to use in SPUFI or even in BIND step.

Before You Give The Explain Statement, What Are The Prerogatives?

Before giving the EXPLAIN statement, we need to make sure that PLAN_TABLE has already been created under AUTHID.

Mention The Location Where The Output Received From Explain Statement Is Stored?

The output from EXPLAIN is stored in userid.PLAN_TABLE

Outputs Of Explain Are With Matchcols = 0. What Does This Signify?

This signifies a non-matching scan of index provided that ACCESSTYPE = I

Mention The Various Locks That Are Available In Db2?

EXCLUSIVE, SHARE and UPDATE

What Is Release/acquire In Bind?

There is a certain point in a program at which DB2 acquires or perhaps releases the locks against tables as well as table-spaces. These include intent locks.

Mention The Different Locking Levels That Are Available In Db2?

TABLE, PAGE and TABLESPACE

Mention The Downsides Of Page Level Lock?

In case if there are large updates to be done, then the resource utilization is high accordingly.

Define Data Page?

Data page can be considered as a unit that is capable of retrieving data from the database. The database from which the data can be retrieved is in the form of 4 kilobytes or 32 kilobytes. The form in which data is retrieved depends on the way the table is defined inside the database. Data page also contains information regarding the catalog or user that are part of the database.

What Is The Information Associated With Sysibm.syslinks Table?

This is the table that contains information on the links that exists between the tables created through referential constraints.

Explain In Detail About Buffer Manager And Its Functionalities?

Buffer manager can be considered as the component inside DB2 that helps in transferring data between virtual as well as external medium. The buffer manager reduces the quantity of physical input as well as output operations that are actually performed by making use of buffering techniques that are highly sophisticated.

Explain About Cursor Stability?

Cursor stability is the property that tells the DB2 that the values of database that are read by making use of this application gets protected while the data is used.

Mention A Credible Reason Why Select* Is Never Given Preference In An Sql Program That Has Been Embedded?

There are primarily three reasons why SELECT* is never given preference in an embedded SQL program.

These are:

In case if there is an alteration in the structure of the table, then the program has to undergo a modification process.

All columns will be retrieved by the program including those columns , which might not be used.
In case if the user wishes to scan the index, then that will not be possible.

Explain Correlated Sub-queries?

Correlated sub-queries are those queries wherein the nester query on the inner side refers directly back to outer query’s table. For each and every row that is qualified, the evaluation of correlated sub-query is a must.

AngularJS Advanced Experienced Interview Questions

 
What is AngularJS?

AngularJS is a framework to build large scale and high performance web application while keeping them as easy-to-maintain. Following are the features of AngularJS framework.
AngularJS is a powerful JavaScript based development framework to create RICH Internet Application (RIA).
  • AngularJS provides developers options to write client side application (using JavaScript) in a clean MVC (Model View Controller) way.
  • Application written in AngularJS is cross-browser compliant. AngularJS automatically handles JavaScript code suitable for each browser.
  • AngularJS is open source, completely free, and used by thousands of developers around the world. It is licensed under the Apache License version 2.0.
What is data binding in AngularJS?

Data binding is the automatic synchronisation of data between model and view components. ng-model directive is used in data binding.
Advanced Experienced AngularJS Interview Questions And Answers
Advanced Experienced AngularJS Interview Questions And Answers

What is scope in AngularJS?


Scopes are objects that refer to the model. They act as glue between controller and view.

What are the controllers in AngularJS?

Controllers are JavaScript functions that are bound to a particular scope. They are the prime actors in AngularJS framework and carry functions to operate on data and decide which view is to be updated to show the updated model based data.

What are the services in AngularJS?

AngularJS come with several built-in services. For example $http service is used to make XMLHttpRequests (Ajax calls). Services are singleton objects which are instantiated only once in app.

What are the filters in AngularJS?

Filters select a subset of items from an array and return a new array. Filters are used to show filtered items from a list of items based on defined criteria.

Explain directives in AngularJS?

Directives are markers on DOM elements (such as elements, attributes, css, and more). These can be used to create custom HTML tags that serve as new, custom widgets. AngularJS has built-in directives (ng-bind, ng-model, etc) to perform most of the task that developers have to do.

Explain templates in AngularJS.

Templates are the rendered view with information from the controller and model. These can be a single file (like index.html) or multiple views in one page using "partials".

What is routing in AngularJS?

It is concept of switching views. AngularJS based controller decides which view to render based on the business logic.

What is deep linking in AngularJS?

Deep linking allows you to encode the state of application in the URL so that it can be bookmarked. The application can then be restored from the URL to the same state.

What are the advantages of AngularJS?

Following are the advantages of AngularJS.
  • AngularJS provides capability to create Single Page Application in a very clean and maintainable way.
  • AngularJS provides data binding capability to HTML thus giving user a rich and responsive experience.
  • AngularJS code is unit testable.
  • AngularJS uses dependency injection and make use of separation of concerns.
  • AngularJS provides reusable components.
  • With AngularJS, developer writes less code and gets more functionality.
  • In AngularJS, views are pure html pages, and controllers written in JavaScript do the business processing.
  • AngularJS applications can run on all major browsers and smart phones including Android and iOS based phones/tablets.
What are the disadvantages of AngularJS?

Following are the disadvantages of AngularJS.
  • Not Secure − Being JavaScript only framework, application written in AngularJS are not safe. Server side authentication and authorization is must to keep an application secure.
  • Not degradable − If your application user disables JavaScript then user will just see the basic page and nothing more.
Which are the core directives of AngularJS?

Following are the three core directives of AngularJS.
  • ng-app − This directive defines and links an AngularJS application to HTML.
  • ng-model − This directive binds the values of AngularJS application data to HTML input controls.
  • ng-bind − This directive binds the AngularJS Application data to HTML tags.
Explain AngularJS boot process?

When the page is loaded in the browser, following things happen:
  • HTML document is loaded into the browser, and evaluated by the browser. AngularJS JavaScript file is loaded; the angular global object is created. Next, JavaScript which registers controller functions is executed.
  • Next AngularJS scans through the HTML to look for AngularJS apps and views. Once view is located, it connects that view to the corresponding controller function.
  • Next, AngularJS executes the controller functions. It then renders the views with data from the model populated by the controller. The page gets ready.
What is MVC?

Model View Controller or MVC as it is popularly called, is a software design pattern for developing web applications.

A Model View Controller pattern is made up of the following three parts:
  • Model − It is the lowest level of the pattern responsible for maintaining data.
  • View − It is responsible for displaying all or a portion of the data to the user.
  • Controller − It is a software Code that controls the interactions between the Model and View.
Explain ng-app directive.

ng-app directive defines and links an AngularJS application to HTML. It also indicate the start of the application.

Explain ng-model directive.

ng-model directive binds the values of AngularJS application data to HTML input controls. It creates a model variable which can be used with the html page and within the container control( for example, div) having ng-app directive.

Explain ng-bind directive.

ng-bind directive binds the AngularJS Application data to HTML tags. ng-bind updates the model created by ng-model directive to be displayed in the html tag whenever user input something in the control or updates the html control's data when model data is updated by controller.

Explain ng-controller directive.

ng-controller directive tells AngularJS what controller to use with this view. AngularJS application mainly relies on controllers to control the flow of data in the application. A controller is a JavaScript object containing attributes/properties and functions. Each controller accepts $scope as a parameter which refers to the application/module that controller is to control.

How AngularJS integrates with HTML?

AngularJS being a pure javaScript based library integrates easily with HTML.
Step 1 − Include angularjs javascript libray in the html page
<head>
   <script src = "http://ajax.googleapis.com/ajax/libs/angularjs/1.3.14/angular.min.js"></script>
</head>
Step 2 − Point to AngularJS app
Next we tell what part of the HTML contains the AngularJS app. This done by adding the ng-app attribute to the root HTML element of the AngularJS app. You can either add it to html element or body element as shown below:
<body ng-app = "myapp">
</body>

Explain ng-init directive.

ng-init directive initializes an AngularJS Application data. It is used to put values to the variables to be used in the application.

Explain ng-repeat directive.

ng-repeat directive repeats html elements for each item in a collection.

What are AngularJS expressions?

Expressions are used to bind application data to html. Expressions are written inside double braces like {{ expression}}. Expressions behave in same way as ng-bind directives. AngularJS application expressions are pure JavaScript expressions and outputs the data where they are used.

Explain uppercase filter.

Uppercase filter converts a text to upper case text.
In below example, we've added uppercase filter to an expression using pipe character. Here we've added uppercase filter to print student name in all capital letters.
Enter first name:<input type = "text" ng-model = "student.firstName">
Enter last name: <input type = "text" ng-model = "student.lastName">
Name in Upper Case: {{student.fullName() | uppercase}}

Explain lowercase filter.

Lowercase filter converts a text to lower case text.
In below example, we've added lowercase filter to an expression using pipe character. Here we've added lowercase filter to print student name in all lowercase letters.
Enter first name:<input type = "text" ng-model = "student.firstName">
Enter last name: <input type = "text" ng-model = "student.lastName">
Name in Upper Case: {{student.fullName() | lowercase}}

Explain currency filter.

Currency filter formats text in a currency format.
In below example, we've added currency filter to an expression returning number using pipe character. Here we've added currency filter to print fees using currency format.
Enter fees: <input type = "text" ng-model = "student.fees">
fees: {{student.fees | currency}}

Explain filter filter.

filter filter is used to filter the array to a subset of it based on provided criteria.
In below example, to display only required subjects, we've used subjectName as filter.
Enter subject: <input type = "text" ng-model = "subjectName">
Subject:
<ul>
  <li ng-repeat = "subject in student.subjects | filter: subjectName">
    {{ subject.name + ', marks:' + subject.marks }}
  </li>
</ul>

Explain orderby filter.

orderby filter orders the array based on provided criteria.
In below example, to order subjects by marks, we've used orderBy marks.
Subject:
<ul>
  <li ng-repeat = "subject in student.subjects | orderBy:'marks'">
    {{ subject.name + ', marks:' + subject.marks }}
  </li>
</ul>

Explain ng-disabled directive.

ng-disabled directive disables a given control.
In below example, we've added ng-disabled attribute to a HTML button and pass it a model. Then we've attached the model to an checkbox and can see the variation.
<input type = "checkbox" ng-model = "enableDisableButton">Disable Button
<button ng-disabled = "enableDisableButton">Click Me!</button>

Explain ng-show directive.

ng-show directive shows a given control.
In below example, we've added ng-show attribute to a HTML button and pass it a model. Then we've attached the model to a checkbox and can see the variation.
<input type = "checkbox" ng-model = "showHide1">Show Button
<button ng-show = "showHide1">Click Me!</button>

Explain ng-hide directive.

ng-hide directive hides a given control.
In below example, we've added ng-hide attribute to a HTML button and pass it a model. Then we've attached the model to a checkbox and can see the variation.
<input type = "checkbox" ng-model = "showHide2">Hide Button
<button ng-hide = "showHide2">Click Me!</button>

Explain ng-click directive.

ng-click directive represents a AngularJS click event.
In below example, we've added ng-click attribute to a HTML button and added an expression to updated a model. Then we can see the variation.
<p>Total click: {{ clickCounter }}</p></td>
<button ng-click = "clickCounter = clickCounter + 1">Click Me!</button>
l

How angular.module works?

angular.module is used to create AngularJS modules along with its dependent modules. Consider the following example:

var mainApp = angular.module("mainApp", []);
Here we've declared an application mainApp module using angular.module function. We've passed an empty array to it. This array generally contains dependent modules declared earlier.

How to validate data in AngularJS?

AngularJS enriches form filling and validation. We can use $dirty and $invalid flags to do the validations in seamless way. Use novalidate with a form declaration to disable any browser specific validation.

Following can be used to track error.
$dirty − states that value has been changed.
$invalid − states that value entered is invalid.
$error − states the exact error.

Explain ng-include directive.

Using AngularJS, we can embed HTML pages within a HTML page using ng-include directive.
<div ng-app = "" ng-controller = "studentController">
   <div ng-include = "'main.htm'"></div>
   <div ng-include = "'subjects.htm'"></div>
</div>

How to make an ajax call using Angular JS?

AngularJS provides $http control which works as a service to make ajax call to read data from the server. The server makes a database call to get the desired records. AngularJS needs data in JSON format. Once the data is ready, $http can be used to get the data from server in the following manner:
function studentController($scope,$http) {
   var url = "data.txt";
   $http.get(url).success( function(response) {
      $scope.students = response;
   });
}

What is use of $routeProvider in AngularJS?

$routeProvider is the key service which set the configuration of urls, maps them with the corresponding html page or ng-template, and attaches a controller with the same.

What is $rootScope?

Scope is a special JavaScript object which plays the role of joining controller with the views. Scope contains the model data. In controllers, model data is accessed via $scope object. $rootScope is the parent of all of the scope variables.

What is scope hierarchy in AngularJS?

Scopes are controllers specific. If we define nested controllers then child controller will inherit the scope of its parent controller.

<script>
      var mainApp = angular.module("mainApp", []);

      mainApp.controller("shapeController", function($scope) {
         $scope.message = "In shape controller";
         $scope.type = "Shape";
      });
 
      mainApp.controller("circleController", function($scope) {
         $scope.message = "In circle controller";   
      });
</script>

Following are the important points to be considered in above example.
  • We've set values to models in shapeController.
  • We've overridden message in child controller circleController. When "message" is used within module of controller circleController, the overridden message will be used.
What is a service?

Services are JavaScript functions and are responsible to do specific tasks only. Each service is responsible for a specific task for example, $http is used to make ajax call to get the server data. $route is used to define the routing information and so on. Inbuilt services are always prefixed with $ symbol.
What is service method?
Using service method, we define a service and then assign method to it. We've also injected an already available service to it.
mainApp.service('CalcService', function(MathService){
   this.square = function(a) {
      return MathService.multiply(a,a);
}
});

What is factory method?

Using factory method, we first define a factory and then assign method to it.
var mainApp = angular.module("mainApp", []);
mainApp.factory('MathService', function() {  
   var factory = {};

   factory.multiply = function(a, b) {
      return a * b
   }
   return factory;
});

What are the differences between service and factory methods?

factory method is used to define a factory which can later be used to create services as and when required whereas service method is used to create a service whose purpose is to do some defined task.

Which components can be injected as a dependency in AngularJS?

AngularJS provides a supreme Dependency Injection mechanism. It provides following core components which can be injected into each other as dependencies.
value
factory
service
provider
constant

What is provider?

provider is used by AngularJS internally to create services, factory etc. during config phase(phase during which AngularJS bootstraps itself). Below mention script can be used to create MathService that we've created earlier. Provider is a special factory method with a method get() which is used to return the value/service/factory.
//define a module
var mainApp = angular.module("mainApp", []);
...
//create a service using provider which defines a method square to return square of a number.
mainApp.config(function($provide) {
   $provide.provider('MathService', function() {

      this.$get = function() {
         var factory = {};
         factory.multiply = function(a, b) {
            return a * b;
         }
         return factory;
      };

   });
});

What is constant?

constants are used to pass values at config phase considering the fact that value cannot be used to be passed during config phase.
mainApp.constant("configParam", "constant value");

Is AngularJS extensible?

Yes! In AngularJS we can create custom directive to extend AngularJS existing functionalities.
Custom directives are used in AngularJS to extend the functionality of HTML. Custom directives are defined using "directive" function. A custom directive simply replaces the element for which it is activated. AngularJS application during bootstrap finds the matching elements and do one time activity using its compile() method of the custom directive then process the element using link() method of the custom directive based on the scope of the directive.

On which types of component can we create a custom directive?

AngularJS provides support to create custom directives for following type of elements.

Element directives − Directive activates when a matching element is encountered.

Attribute − Directive activates when a matching attribute is encountered.

CSS − Directive activates when a matching css style is encountered.

Comment − Directive activates when a matching comment is encountered.

What is internationalization?

Internationalization is a way to show locale specific information on a website. For example, display content of a website in English language in United States and in Danish in France.

How to implement internationalization in AngularJS?

AngularJS supports inbuilt internationalization for three types of filters currency, date and numbers. We only need to incorporate corresponding js according to locale of the country. By default it handles the locale of the browser. For example, to use Danish locale, use following script

<script src = "https://code.angularjs.org/1.2.5/i18n/angular-locale_da-dk.js"></script>

CCNA Experienced Level Interview Questions Answers

 

CCNA Experienced Advanced Level Interview Questions And Answers

1) What is Routing?

Routing is the process of finding a path on which data can pass from source to destination. Routing is done by a device called routers, which are network layer devices.

2) What is the purpose of the Data Link?

The job of the Data Link layer is to check messages are sent to the right device. Another function of this layer is framing.

3) What is the key advantage of using switches?

When a switch receives a signal, it creates a frame out of the bits that was extracted from that signal. With this process, it gains access and reads the destination address, after which it forwards that frame to the appropriate port. This is a very efficient means of data transmission, instead of broadcasting it on all ports.

4) When does network congestion occur?

CCNA Experienced Level Interview Questions And Answers
CCNA Experienced Level Interview Questions And Answers

Network congestion occurs when too many users are trying to use the same bandwidth. This is especially true in big networks that do not resort to network segmentation.

5) What is a Window in networking terms?

A Window refers to the number of segments that is allowed to be sent from source to destination before an acknowledgement is sent back.

6) Does a bridge divide a network into smaller segments?

Not really. What a bridge actually does is to take the large network and filter it, without changing the size of the network.

7) Which LAN switching method is used in CISCO Catalyst 5000?

This model uses the Store-and-forward switching method. It stores the entire frame to its buffers and performs a crc check before deciding whether or not to forward that data frame.

8 ) What is the role of the LLC sublayer?

The LLC sublayer, short for Logical Link Control, can provide optional services to an application developer. One option is to provide flow control to the Network layer by using stop/start codes. The LLC can also provide error correction.

9) How does RIP differ from IGRP?

RIP relies on the number of hops in order to determine the best route to a network. On the other hand, IGRP takes consideration many factors before it decides the best route to take, such as bandwidth, reliability, MTU and hop count.

10) What are the different memories used in a CISCO router?

– NVRAM stores the startup configuration file
– DRAM stores the configuration file that is being executed
– Flash Memory – stores the Cisco IOS.

11) What is BootP?

BootP is a protocol that is used to boot diskless workstations that are connected to the network. It is short for Boot Program. Diskless workstations also use BootP in order to determine its own IP address as well as the IP address of the server PC.

12) What is the function of the Application Layer in networking?

The Application Layer supports the communication components of an application and provides network services to application processes that span beyond the OSI reference model specifications. It also synchonizes applications on the server and client.

13) Differentiate User Mode from Privileged Mode

User Mode is used for regular task when using a CISCO router, such as to view system information, connecting to remote devices, and checking the status of the router. On the other hand, privileged mode includes all options that are available for User Mode, plus more. You can use this mode in order to make configurations on the router, including making tests and debugging.

14) What is 100BaseFX?

This is Ethernet that makes use of fiber optic cable as the main transmission medium. The 100 stands for 100Mbps, which is the data speed.

15) Differentiate full-duplex from half-duplex.

In full-duplex, both the transmitting device and the receiving device can communicate simultaneously, that is, both can be transmitting and receiving at the same time. In the case of half-duplex, a device cannot receive while it is transmitting, and vice versa.

16) What is MTU?

MTU stands for Maximum Transmission Unit. It refers to the maximum packet size that can be sent out onto the data line without the need to fragment it.

17) How does cut-through LAN switching work?

In Cut-Through LAN switching, as soon as the router receives the data frame, it will immediately send it out again and forward it to the next network segment after reading the destination address.

18) What is latency?

Latency is the amount of time delay that measures the point from which a network device receives a data frame to the time it sends it out again towards another network segment.

19) Utilizing RIP, what is the limit when it comes to number of hops?

The maximum limit is 15 hop counts. Anything higher than 15 indicates that the network is considered unreachable.

20) What is a Frame Relay?

Frame Relay is a WAN protocol that provides connection-oriented communication by creating and maintaining virtual circuits. It has a high performance rating and operates at the Data Link and Physical Layers.

21) How do you configure a Cisco router to route IPX?

The initial thing to do is to enable IPX routing by using the “ipx routing” command. Each interface that is used in the IPX network is then configured with a network number and encapsulation method.

22) What are the different IPX access lists?

There are two access lists: Standard and Extended. Standard Access List can only filter the source or destination IP address. An Extended Access List uses the source and destination IP addresses, port, socket and protocol when filtering a network.

23) Explain the benefits of VLANs.

VLANs allow the creation of collision domains by groups other than just physical location. Using VLANs, it is possible to establish networks by different means, such as by function, type of hardware, protocol, among others. This is a big advantage when compared to conventional LANs wherein collision domains are always tied to physical location.

24) What is subnetting?

Subnetting is the process of creating smaller networks from a big parent network. Being a part of a network, each subnet is assigned some additional parameters or identifier to indicate its subnet number.

25) What are the advantages of a layered model in the networking industry?

A layered network offers many advantages. It allows administrators to make changes in one layer without the need to make changes in the other layers. Specialization is encouraged, allowing the network industry to make progress faster. A layered model also lets administrators troubleshoot problems more efficiently.

26) Why is UDP lease favored when compared to TCP?

It’s because UDP is unreliable and unsequenced. It is not capable of establishing virtual circuits and acknowledgements.

27) What are some standards supported by the Presentation layer?

Presentation layer supports many standards, which ensures that data is presented correctly. These include PICT, TIFF and JPEG for graphics, MIDI, MPEG and QuickTime for Video/Audio.

28) What’s the simplest way to remotely configure a router?

In cases when you need to configure a router remotely, the most convenient is to use the Cisco AutoInstall Procedure. However, the router must be connected to the WAN or LAN through one of the interfaces.

29) What does the show protocol display?

– routed protocols that is configured on the router
– the address assigned on each interface
– the encapsulation method that was configured on each interface

30) How do you depict an IP address?

It can be done in three possible ways:
– using Dotted-decimal. For example: 192.168.0.1
– using Binary. For example: 10000010.00111011.01110010.01110011
– using Hexadecimal. For example: 82 1E 10 A1

31) How do you go to privileged mode? How do you switch back to user mode?

To access privileged mode, you enter the command “enable” on the prompt. In order to get back to user mode, enter the command “disable”

32) What is HDLC?

HDLC is short for High Level Data Link Control protocol, and is a propriety protocol of CISCO. It is the default encapsulation operated within CISCO routers.

33) How are internetworks created?

Internetworks are created when networks are connected using routers. Specifically, the network administrator assigns a logical address to every network that connects to the router.

34) What is Bandwidth?

Bandwidth refers to the transmission capacity of a medium. It is a measure of how much volume a transmission channel can handle, and is measured in Kbps.

35) How does Hold-downs work?

Hold-downs prevent regular update messages from reinstating a downed link by removing that link from update messages. It uses triggered updates to reset the hold-down timer.

36) What are packets?

Packets are the results of data encapsulation. These are data that has been wrapped under the different protocols of the OSI layers. Packets are also referred to as datagrams.

37) What are segments?

Segments are sections of a data stream that comes from the upper OSI layers and ready for transmission towards the network. Segments are the logic units at the Transport Layer.

38) Give some benefits of LAN switching.

– allows full duplex data transmission and reception
– media rate adaption
– easy and efficient migration

39) What is Route Poisoning?

Route Poisoning is the process of inserting a table entry of 16 to a route, making it unreachable. This technique is used in order to prevent problems caused by inconsistent updates on a route.

40) How do you find valid hosts in a subnet?

The best way to go about this is to use the equation 256 minus the subnet mask. The hosts that are considered valid are those that can be found between the subnets.

41) What is DLCI?

DLCI, or Data Link Connection Identifiers, are normally assigned by a frame relay service provider in order to uniquely identify each virtual circuit that exists on the network.

42) Brielfly explain the conversion steps in data encapsulation.

From a data transmitter’s point of reference, data from the end user is converted to segments. Segments are then passed on to the other layers and converted into packets or datagrams. These packets are then converted into frames before passing on to the network interface. Finally, frames are converted to bits prior to actual data transmission.

43) What are the different types of passwords used in securing a CISCO router?

There are actually five types of passwords that can be used. These are enable secret, enable, virtual terminal, console, and auxiliary.

44) Why is network segmentation a good idea when managing a large network?

For a network administration, segmenting a network would help ease network traffic and ensures that high bandwidth is made available at all times for all users. This translates to better performance especially for a growing network.

45) What are the things that can be accessed in a CISCO router’s identifying information?

The hostname and the Interfaces. The hostname is the name of your router. The Interfaces are fixed configurations that refer to the router ports.

46) Differentiate Logical Topology from Physical Topology

Logical Topology refers to the signal path through the physical topology. Physical Topology is the actual layout of the network medium.

47) What causes a triggered update to reset the router hold-down timer?

This may happen when the hold-down timer has already expired, or when the router received a processing task that incidentally was proportional to the number of links in the internetwork.

48) In configuring a router, what command must be used if you want to delete the configuration data that is stored in the NVRAM?

A. erase running-config
B. erase startup-config
C. erase nvram
D. delete nvram
Correct Answer: B. erase startup-config

49) Referring to the commands shown, what command must next be used on the branch router prior to traffic being sent to the router router?

Hostname: Branch Hostname: Remote
PH# 123-6000, 123-6001 PH# 123-8000, 123-8001
SPID1: 32055512360001 SPID1: 32055512380001
SPID2: 32055512360002 SPID2: 32055512380002
isdn switch-type basic ni
username Remote password cisco
interface bri0
ip address 10.1.1.1 255.255.255.0
encapsulation ppp
ppp authentication chap
isdn spid1 41055512360001
isdn spid2 41055512360002
dialer map ip 10.1.1.2 name Remote 1238001
dialer-list 1 protocol ip permit

Correct Answer: (config-if)# dialer-group 1

50) When configuring a router utilizing both physical and logical interfaces, what factor must be considered in determining the OSPF router ID?

A. The highest IP address of any physical interface.
B. The lowest IP address of any logical interface.
C. The middle IP address of any logical interface..
D. The lowest IP address of any physical interface.
E. The highest IP address of any interface.
F. The highest IP address of any logical interface.
G. The lowest IP address of any interface.

Correct Answer: A. The highest IP address of any physical interface.

51) Mention what is the difference between the switch, hub, and router?


HubSwitchRouter
Hub has single broadcast domain and collision domain. Anything comes in one port is sent out to the others. It is a device that filters and forwards packets between LAN segments. Switches have single broadcast domain and multiple collision domains. It supports any packet protocol, as such it operates at the data link layer 2 and layer 3 Router is a device which transmits data packets along networks.

52. Mention what is the size of IP address?

Size of IP address is 32 bit for IPv4 and 128 bit for IPv6.

53. Mention what does data packets consist of?

A data packet consists of sender’s information, recipient’s information, and the data contained.  It also has the numeric identification number that defines the packet number and order.  When data is send across the network, that information is segmented into data packets.  In short, data packets carry the information and routing configuration for your transferred message.

54. Mention what is DHCP?

DHCP stands for Dynamic Host Configuration Protocol.  DHCP assigns an IP address automatically to a given workstation client.  You can also make static IPS for machines like printers, servers, routers and scanners.

55. Mention what is BOOTP?

BOOTP is a computer networking protocol used to deploy an IP address to network devices from a configuration server.

56. Explain why is UDP lease favored when compared to TCP?

It is because UDP is un-sequenced and unreliable. It is not capable of creating virtual circuits and acknowledgments

57. Mention what is the difference between dynamic IP and static IP addressing?

Dynamically IP addresses are provided by DHCP server and static IP address are given manually.

58. Mention what are the ranges for the private IPS?

Ranges for private IPS are

Class A: 10.0.0.0 – 10.0.0.255
Class B: 172.16.0.0 – 172.31.0.0
Class C: 192.168.0.0 – 192.168.0.255

59. In how many ways you can access router?

You can access it in three ways

Telnet (IP)
AUX (Telephone)
Console (Cable)
60. Explain what is EIGRP?

EIGRP stands for Enhanced Interior Gateway Routing Protocol; it is a routing protocol designed by Cisco Systems.  It is availed on a router to share routes with other routers within the same autonomous system. Unlike other routers like RIP, EIGRP only sends incremental updates, decreasing the workload on the router and the amount of data that needs to be transferred.

61. Mention what is the matric of EIGRP protocol?

EIGRP protocol consists of

Bandwidth
Load
Delay
Reliability
MTU
Maximum Transmission Unit

62. Mention what does the clock rate do?

Clockrate enables the routers or DCE equipment to communicate properly.

63. Mention what command you must use if you want to delete or remove the configuration data that is stored in the NVRAM?

Erase startup- coding is the command you must use if you want to delete the configuration data that is stored in the NVRAM

64. Mention what is the difference between TCP and UDP?

TCP and UDP both are protocols for sending files across computer network

           TCP (Transmission Control Protocol)              UDP (User Datagram Protocol)
TCP is connection oriented protocol. When connection lost during transferring files, the server would request the lost part.  While transferring a message, there is no corruption while transferring a message UDP is based on connectionless protocol. When you send data, there is no guarantee whether your transferred message will reach there without any leakage
 The message will deliver in the order it is sent The message you sent may not be in the same order
 Data in TCP is read as a stream, where one packet ends, and another begins Packets are transmitted individually and are guaranteed to be whole if they arrive
 Example of TCP includes World Wide Web, file transfer protocol, e-mail, Example for UDP are VOIP (Voice Over Internet Protocol) TFTP ( Trivial File Transfer Protocol),

 65. Explain the difference between half-duplex and full-duplex?

Full duplex means that the communication can occur in both directions at the same time, while half duplex means that the communication can occur in one direction at time.

66.Mention the conversion steps of data encapsulation?

Conversion steps of data encapsulation includes

Layer one, two and Three ( Application/presentation/session) : Alphanumeric input from the user is converted into Data
Layer Four (Transport): Data is converted into small segments
Layer Five (Network): Data converted into packets or datagrams and Network header is added
Layer Six (Data Link): Datagrams or packets are built into frames
Layer Seven (Physical): Frames are converted into bits

 67. What command do we give if router IOS is stucked?

Cntrl+Shift+F6 and X is the command we give if router IOS is stucked.

 68.Explain what is route poisoning?

Route poisoning is a technique of preventing a network from transmitting packets through a route that has become invalid.

 69. What route entry will be assigned to dead or invalid route in case of RIP?

In the case of RIP table entry 16 hops will be assigned to dead or invalid route making it unreachable.