SlideShare a Scribd company logo
1 of 32
PREVIOUS YEARS QUESTIONS WITH
ANSWER AND EXPLANATION
Part - 4
vrrgroup.academy@gmail.com
https://www.facebook.com/VRRAcademy
www.youtube/VRR Academy
1
2
Answer: (c)
3
• World wide web consortium (W3C)
• The World Wide Web Consortium (W3C) is the main international standards
organization for the World Wide Web (abbreviated WWW or W3).
• Founded and currently led by Tim Berners-Lee, the consortium is made up of
member organizations which maintain full-time staff for the purpose of working
together in the development of standards for the Web.
Answer: (a)
4
Answer: (a)
5
• Memory, also referred to as primary storage, typically refers to storage that is
directly accessible by the computer's CPU.
• RAM is a high-speed storage medium that can be accessed with minimal delay.
• Because the RAM is connected directly to the CPU via the memory bus, the CPU can
access data stored in RAM very quickly.
Answer: (a)
6
Answer: (c)
7
SRAM - Static RAM (SRAM)
• The word static indicates that the memory retains its contents as long as power is
being supplied.
• However, data is lost when the power gets down due to volatile nature.
• SRAM chips use a matrix of 6-transistors and no capacitors.
• Transistors do not require power to prevent leakage, so SRAM need not be
refreshed on a regular basis.
• There is extra space in the matrix, hence SRAM uses more chips than DRAM for
the same amount of storage space, making the manufacturing costs higher.
• SRAM is thus used as cache memory and has very fast access.
Characteristic of Static RAM
• Long life
• No need to refresh
• Faster
• Used as cache memory
• Large size
• Expensive
• High power consumption
DRAM – DYNAMIC RAM
 DRAM, unlike SRAM, must be continually refreshed in order
to maintain the data.
 This is done by placing the memory on a refresh circuit that
rewrites the data several hundred times per second.
 DRAM is used for most system memory as it is cheap and
small.
 All DRAMs are made up of memory cells, which are
composed of one capacitor and one transistor.
Characteristics of Dynamic RAM
 Short data lifetime
 Needs to be refreshed continuously
 Slower as compared to SRAM
 Used as RAM
 Smaller in size
 Less expensive
 Less power consumption
8
9
Unicode Transformation Format
UTF-8 is a compromise character encoding that can be as compact as ASCII
(if the file is just plain English text) but can also contain any unicode
characters (with some increase in file size).
The '8' means it uses 8-bit blocks to represent a character.
By default Unicode is a ….
It uses 16-bits to represent a symbol in the data.
It represents any non-english character like Chinese, Japanese.
Answer: (b)
10
Answer: (b)
11
Answer: (a)
12
Answer: (d)
13
Answer: (a)
14
Answer: (b)
Answer: (b)
15
Answer: (b)
Answer: (a)
Answer: (c)
16
Answer: (c)
Answer: (b)
17
What is a network?
• A computer network can be described as a system of interconnected devices
that can communicate using some common standard (called protocol).
• Computers on a network are called nodes.
• The connection between computers can be done via cabling, most
commonly the Ethernet cable, or wirelessly through radio waves.
• Connected computers can share resources, like access to the Internet,
printers, file servers, and others.
Components of a Network
1. Sender
2. Receiver
3. Media (Physical Connection)
4. Protocol
5. Message
6. Network Technology
Advantages and disadvantages of network
 Advantages
 Connectivity, Communication, Data Sharing, Hardware
Sharing, Internet Access Sharing, Entertainment etc.,
 Disadvantages
 Breakdowns and possible loss of resources, Expensive to build
 Security threats, Bandwidth issues, High dependability, Needs
continuous monitoring
18
19
Network Topologies
20
Types of Networks
PAN
 PAN is the acronym for Personal Area
Network.
 PAN is the interconnection between devices
within the range of a person’s private space,
typically within a range of 10 metres.
 If you have transferred images or songs from
your laptop to mobile or from mobile to your
friend’s mobile using Bluetooth, you have set
up and used a personal area network.
21
A person can connect his laptop, smart phone, personal digital assistant and
portable printer in a network at home. This network could be fully Wi-Fi or
a combination of wired and wireless.
22
LAN - Local Area Network
Characteristics of LAN
• Limited geographic operation up to 10 Km
• High speed data transfer rates
• Full time connectivity to local services
• Generally lower in cost.
• Uses mainly bus, ring and star topology
• LAN supports transmission media like UTP Cable, Optical fiber, Wireless.
• Requires cabling and maintenance.
MAN - Metropolitan Area Network.
 It is a network spread over a city, college campus or a small
region.
 MAN is larger than a LAN and typically spread over several
kilometres.
 Objective of MAN is to share hardware and software
resources, thereby decreasing infrastructure costs.
 MAN can be built by connecting several LANs.
 The most common example of MAN is cable TV network.
23
24
WAN - Wide Area Network
Characteristics of a WAN
• Cover more than one geographical
area.
• Connecting different LANs using
Routers.
• Connectivity from a router to
router is a circuit leased from a
Telephone / Communication
Company
Advantages:
• Covers large geographical area.
• Allows connecting workstations to
share resources and software.
• Messages can be sent very quickly to
anyone else on the network.
25
26
• ISO stands for International organization of Standardization.
• This is called a model for Open System Interconnection (OSI) and is commonly
known as OSI model.
• The ISO-OSI model is a seven layer architecture.
• It defines seven layers or levels in a complete communication system.
27
28
29
DRAM – DYNAMIC RAM
 DRAM, unlike SRAM, must be continually refreshed in order to maintain the data.
 This is done by placing the memory on a refresh circuit that rewrites the data
several hundred times per second.
 DRAM is used for most system memory as it is cheap and small.
 All DRAMs are made up of memory cells, which are composed of one capacitor
and one transistor.
Answer: (a)
Answer: (c)
30
Answer: (c)
Answer: (b)
31
Unicode Transformation Format
UTF-8 is a compromise character encoding that can be as compact as ASCII
(if the file is just plain English text) but can also contain any unicode
characters (with some increase in file size).
The '8' means it uses 8-bit blocks to represent a character.
By default Unicode is a ….
It uses 16-bits to represent a symbol in the data.
It represents any non-english character like Chinese, Japanese.
Answer: (c)
32

More Related Content

What's hot

Collections of CS Multiple Choice Questions
Collections of CS Multiple Choice QuestionsCollections of CS Multiple Choice Questions
Collections of CS Multiple Choice QuestionsShusil Baral
 
Assembly language progarmming
Assembly language progarmmingAssembly language progarmming
Assembly language progarmmingAzmeyer
 
Computer networking short_questions_and_answers
Computer networking short_questions_and_answersComputer networking short_questions_and_answers
Computer networking short_questions_and_answersTarun Thakur
 
Mi0035 – computer networks
Mi0035 – computer networksMi0035 – computer networks
Mi0035 – computer networkssmumbahelp
 
Joemary.doc
Joemary.docJoemary.doc
Joemary.doccas123
 

What's hot (7)

Computer network suggestion
Computer network suggestionComputer network suggestion
Computer network suggestion
 
Collections of CS Multiple Choice Questions
Collections of CS Multiple Choice QuestionsCollections of CS Multiple Choice Questions
Collections of CS Multiple Choice Questions
 
Networking
NetworkingNetworking
Networking
 
Assembly language progarmming
Assembly language progarmmingAssembly language progarmming
Assembly language progarmming
 
Computer networking short_questions_and_answers
Computer networking short_questions_and_answersComputer networking short_questions_and_answers
Computer networking short_questions_and_answers
 
Mi0035 – computer networks
Mi0035 – computer networksMi0035 – computer networks
Mi0035 – computer networks
 
Joemary.doc
Joemary.docJoemary.doc
Joemary.doc
 

Similar to RRB JE Stage 2 Computer and Applications Questions Part 4

networking hypherlink Group 2 presentation
networking hypherlink Group 2 presentationnetworking hypherlink Group 2 presentation
networking hypherlink Group 2 presentationHerson Franz Ugale
 
Networking Bridge course_PPT.pptx
Networking Bridge course_PPT.pptxNetworking Bridge course_PPT.pptx
Networking Bridge course_PPT.pptxakshataharage
 
Network Security and its applications in
Network Security and its applications inNetwork Security and its applications in
Network Security and its applications inssuser6478a8
 
What Is Wide Area Network (WAN): Live WAN Network Examples : Notes
What Is Wide Area Network (WAN): Live WAN Network Examples : NotesWhat Is Wide Area Network (WAN): Live WAN Network Examples : Notes
What Is Wide Area Network (WAN): Live WAN Network Examples : NotesSubhajit Sahu
 
2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.pptjaba kumar
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.pptSri Latha
 
vnd.ms-powerpoint&rendition=1.ppt
vnd.ms-powerpoint&rendition=1.pptvnd.ms-powerpoint&rendition=1.ppt
vnd.ms-powerpoint&rendition=1.pptunnipb1
 
cpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.pptcpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.pptrcbcrtm
 
introduction to computer Network-20210426203825 (1).ppt
introduction to computer Network-20210426203825 (1).pptintroduction to computer Network-20210426203825 (1).ppt
introduction to computer Network-20210426203825 (1).pptgauravgoswami78
 
Concepts of Networking.ppt
Concepts of Networking.pptConcepts of Networking.ppt
Concepts of Networking.pptrakesh132809
 
network class 4&5.pptx
network class 4&5.pptxnetwork class 4&5.pptx
network class 4&5.pptxSelfUse
 
NETTING THE SET: WORKSHOP FOR LIBRARIANS & LIS STUDENTS
NETTING THE SET: WORKSHOP FOR LIBRARIANS & LIS STUDENTSNETTING THE SET: WORKSHOP FOR LIBRARIANS & LIS STUDENTS
NETTING THE SET: WORKSHOP FOR LIBRARIANS & LIS STUDENTSSarika Sawant
 

Similar to RRB JE Stage 2 Computer and Applications Questions Part 4 (20)

networking hypherlink Group 2 presentation
networking hypherlink Group 2 presentationnetworking hypherlink Group 2 presentation
networking hypherlink Group 2 presentation
 
Networking Bridge course_PPT.pptx
Networking Bridge course_PPT.pptxNetworking Bridge course_PPT.pptx
Networking Bridge course_PPT.pptx
 
Computer network
Computer networkComputer network
Computer network
 
Unit11
Unit11Unit11
Unit11
 
Networking.pptx
Networking.pptxNetworking.pptx
Networking.pptx
 
Networking.pptx
Networking.pptxNetworking.pptx
Networking.pptx
 
Network Security and its applications in
Network Security and its applications inNetwork Security and its applications in
Network Security and its applications in
 
What Is Wide Area Network (WAN): Live WAN Network Examples : Notes
What Is Wide Area Network (WAN): Live WAN Network Examples : NotesWhat Is Wide Area Network (WAN): Live WAN Network Examples : Notes
What Is Wide Area Network (WAN): Live WAN Network Examples : Notes
 
2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
Ccna report
Ccna reportCcna report
Ccna report
 
vnd.ms-powerpoint&rendition=1.ppt
vnd.ms-powerpoint&rendition=1.pptvnd.ms-powerpoint&rendition=1.ppt
vnd.ms-powerpoint&rendition=1.ppt
 
OSI LAyer.ppt
OSI LAyer.pptOSI LAyer.ppt
OSI LAyer.ppt
 
Gunn 8th- Lily.pptx
Gunn 8th- Lily.pptxGunn 8th- Lily.pptx
Gunn 8th- Lily.pptx
 
cpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.pptcpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.ppt
 
introduction to computer Network-20210426203825 (1).ppt
introduction to computer Network-20210426203825 (1).pptintroduction to computer Network-20210426203825 (1).ppt
introduction to computer Network-20210426203825 (1).ppt
 
Concepts of Networking.ppt
Concepts of Networking.pptConcepts of Networking.ppt
Concepts of Networking.ppt
 
network class 4&5.pptx
network class 4&5.pptxnetwork class 4&5.pptx
network class 4&5.pptx
 
NETTING THE SET: WORKSHOP FOR LIBRARIANS & LIS STUDENTS
NETTING THE SET: WORKSHOP FOR LIBRARIANS & LIS STUDENTSNETTING THE SET: WORKSHOP FOR LIBRARIANS & LIS STUDENTS
NETTING THE SET: WORKSHOP FOR LIBRARIANS & LIS STUDENTS
 
Tata Chuna
Tata Chuna Tata Chuna
Tata Chuna
 

More from CAS

CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs CollectionCCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs CollectionCAS
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT SecurityCAS
 
Introduction to research methodology
Introduction to research methodologyIntroduction to research methodology
Introduction to research methodologyCAS
 
Can you solve this
Can you solve thisCan you solve this
Can you solve thisCAS
 
Symmetric encryption and message confidentiality
Symmetric encryption and message confidentialitySymmetric encryption and message confidentiality
Symmetric encryption and message confidentialityCAS
 
Public key cryptography and message authentication
Public key cryptography and message authenticationPublic key cryptography and message authentication
Public key cryptography and message authenticationCAS
 
Malicious software
Malicious softwareMalicious software
Malicious softwareCAS
 
Legal and ethical aspects
Legal and ethical aspectsLegal and ethical aspects
Legal and ethical aspectsCAS
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessmentCAS
 
It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and proceduresCAS
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionCAS
 
Human resources security
Human resources securityHuman resources security
Human resources securityCAS
 
Database security
Database securityDatabase security
Database securityCAS
 
Cryptographic tools
Cryptographic toolsCryptographic tools
Cryptographic toolsCAS
 
Internet security association and key management protocol (isakmp)
Internet security association and key management protocol (isakmp)Internet security association and key management protocol (isakmp)
Internet security association and key management protocol (isakmp)CAS
 
IP Security Part 2
IP Security   Part 2IP Security   Part 2
IP Security Part 2CAS
 
IP security Part 1
IP security   Part 1IP security   Part 1
IP security Part 1CAS
 
Growth of Human Communication systems
Growth of Human Communication systemsGrowth of Human Communication systems
Growth of Human Communication systemsCAS
 
Communication and networks Part 1
Communication and networks   Part 1Communication and networks   Part 1
Communication and networks Part 1CAS
 

More from CAS (20)

CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs CollectionCCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
 
Introduction to research methodology
Introduction to research methodologyIntroduction to research methodology
Introduction to research methodology
 
Can you solve this
Can you solve thisCan you solve this
Can you solve this
 
Symmetric encryption and message confidentiality
Symmetric encryption and message confidentialitySymmetric encryption and message confidentiality
Symmetric encryption and message confidentiality
 
Public key cryptography and message authentication
Public key cryptography and message authenticationPublic key cryptography and message authentication
Public key cryptography and message authentication
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Legal and ethical aspects
Legal and ethical aspectsLegal and ethical aspects
Legal and ethical aspects
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessment
 
It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and procedures
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Human resources security
Human resources securityHuman resources security
Human resources security
 
Database security
Database securityDatabase security
Database security
 
Cryptographic tools
Cryptographic toolsCryptographic tools
Cryptographic tools
 
Internet security association and key management protocol (isakmp)
Internet security association and key management protocol (isakmp)Internet security association and key management protocol (isakmp)
Internet security association and key management protocol (isakmp)
 
IP Security Part 2
IP Security   Part 2IP Security   Part 2
IP Security Part 2
 
IP security Part 1
IP security   Part 1IP security   Part 1
IP security Part 1
 
Growth of Human Communication systems
Growth of Human Communication systemsGrowth of Human Communication systems
Growth of Human Communication systems
 
Communication and networks Part 1
Communication and networks   Part 1Communication and networks   Part 1
Communication and networks Part 1
 

Recently uploaded

Launch Your Research Career: A Beginner's Guide
Launch Your Research Career: A Beginner's GuideLaunch Your Research Career: A Beginner's Guide
Launch Your Research Career: A Beginner's GuideKaziFaisalAlam
 
如何办理(Columbia毕业证书)哥伦比亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(Columbia毕业证书)哥伦比亚大学毕业证成绩单本科硕士学位证留信学历认证如何办理(Columbia毕业证书)哥伦比亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(Columbia毕业证书)哥伦比亚大学毕业证成绩单本科硕士学位证留信学历认证epyhpep
 
Career counseling presentation for commerce students
Career counseling presentation for commerce studentsCareer counseling presentation for commerce students
Career counseling presentation for commerce studentsHarmanDhillon43
 
Chennai (Chennai) Independent Escorts - 9632533318 100% genuine
Chennai (Chennai) Independent Escorts - 9632533318 100% genuineChennai (Chennai) Independent Escorts - 9632533318 100% genuine
Chennai (Chennai) Independent Escorts - 9632533318 100% genuineruksarkahn825
 
Sales Experience Presentation - Angel Lopez
Sales Experience Presentation - Angel LopezSales Experience Presentation - Angel Lopez
Sales Experience Presentation - Angel LopezInfinity Skies Corp
 
TEST BANK For Growth and Development Across the Lifespan, 3rd Edition By Glor...
TEST BANK For Growth and Development Across the Lifespan, 3rd Edition By Glor...TEST BANK For Growth and Development Across the Lifespan, 3rd Edition By Glor...
TEST BANK For Growth and Development Across the Lifespan, 3rd Edition By Glor...rightmanforbloodline
 
一比一定(购)南昆士兰大学毕业证(USQ毕业证)成绩单学位证
一比一定(购)南昆士兰大学毕业证(USQ毕业证)成绩单学位证一比一定(购)南昆士兰大学毕业证(USQ毕业证)成绩单学位证
一比一定(购)南昆士兰大学毕业证(USQ毕业证)成绩单学位证eqaqen
 
如何办理(NEU毕业证书)东北大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(NEU毕业证书)东北大学毕业证成绩单本科硕士学位证留信学历认证如何办理(NEU毕业证书)东北大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(NEU毕业证书)东北大学毕业证成绩单本科硕士学位证留信学历认证gakamzu
 
Ganga Path Project (marine drive project) Patna ,Bihar .pdf
Ganga Path Project (marine drive project) Patna ,Bihar .pdfGanga Path Project (marine drive project) Patna ,Bihar .pdf
Ganga Path Project (marine drive project) Patna ,Bihar .pdfDeepak15CivilEngg
 
👉 Tirunelveli Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Gir...
👉 Tirunelveli Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Gir...👉 Tirunelveli Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Gir...
👉 Tirunelveli Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Gir...vershagrag
 
Novo Nordisk Kalundborg. We are expanding our manufacturing hub in Kalundborg...
Novo Nordisk Kalundborg. We are expanding our manufacturing hub in Kalundborg...Novo Nordisk Kalundborg. We are expanding our manufacturing hub in Kalundborg...
Novo Nordisk Kalundborg. We are expanding our manufacturing hub in Kalundborg...Juli Boned
 
obat aborsi pacitan wa 081336238223 jual obat aborsi cytotec asli di pacitan0...
obat aborsi pacitan wa 081336238223 jual obat aborsi cytotec asli di pacitan0...obat aborsi pacitan wa 081336238223 jual obat aborsi cytotec asli di pacitan0...
obat aborsi pacitan wa 081336238223 jual obat aborsi cytotec asli di pacitan0...yulianti213969
 
obat aborsi gresik wa 081336238223 jual obat aborsi cytotec asli di gresik782...
obat aborsi gresik wa 081336238223 jual obat aborsi cytotec asli di gresik782...obat aborsi gresik wa 081336238223 jual obat aborsi cytotec asli di gresik782...
obat aborsi gresik wa 081336238223 jual obat aborsi cytotec asli di gresik782...yulianti213969
 
We’re looking for a junior patent engineer to join our Team!
We’re looking for a junior patent engineer to join our Team!We’re looking for a junior patent engineer to join our Team!
We’re looking for a junior patent engineer to join our Team!Juli Boned
 
一比一定(购)中央昆士兰大学毕业证(CQU毕业证)成绩单学位证
一比一定(购)中央昆士兰大学毕业证(CQU毕业证)成绩单学位证一比一定(购)中央昆士兰大学毕业证(CQU毕业证)成绩单学位证
一比一定(购)中央昆士兰大学毕业证(CQU毕业证)成绩单学位证eqaqen
 
如何办理(VIU毕业证书)温哥华岛大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(VIU毕业证书)温哥华岛大学毕业证成绩单本科硕士学位证留信学历认证如何办理(VIU毕业证书)温哥华岛大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(VIU毕业证书)温哥华岛大学毕业证成绩单本科硕士学位证留信学历认证gkyvm
 
Prest Reed Portfolio revamp Full Sail Presentation 2
Prest Reed Portfolio revamp Full Sail Presentation 2Prest Reed Portfolio revamp Full Sail Presentation 2
Prest Reed Portfolio revamp Full Sail Presentation 25203records
 
如何办理(USC毕业证书)南加利福尼亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(USC毕业证书)南加利福尼亚大学毕业证成绩单本科硕士学位证留信学历认证如何办理(USC毕业证书)南加利福尼亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(USC毕业证书)南加利福尼亚大学毕业证成绩单本科硕士学位证留信学历认证gakamzu
 
LinkedIn For Job Search Presentation May 2024
LinkedIn For Job Search Presentation May 2024LinkedIn For Job Search Presentation May 2024
LinkedIn For Job Search Presentation May 2024Bruce Bennett
 

Recently uploaded (20)

Cara Gugurkan Kandungan Awal Kehamilan 1 bulan (087776558899)
Cara Gugurkan Kandungan Awal Kehamilan 1 bulan (087776558899)Cara Gugurkan Kandungan Awal Kehamilan 1 bulan (087776558899)
Cara Gugurkan Kandungan Awal Kehamilan 1 bulan (087776558899)
 
Launch Your Research Career: A Beginner's Guide
Launch Your Research Career: A Beginner's GuideLaunch Your Research Career: A Beginner's Guide
Launch Your Research Career: A Beginner's Guide
 
如何办理(Columbia毕业证书)哥伦比亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(Columbia毕业证书)哥伦比亚大学毕业证成绩单本科硕士学位证留信学历认证如何办理(Columbia毕业证书)哥伦比亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(Columbia毕业证书)哥伦比亚大学毕业证成绩单本科硕士学位证留信学历认证
 
Career counseling presentation for commerce students
Career counseling presentation for commerce studentsCareer counseling presentation for commerce students
Career counseling presentation for commerce students
 
Chennai (Chennai) Independent Escorts - 9632533318 100% genuine
Chennai (Chennai) Independent Escorts - 9632533318 100% genuineChennai (Chennai) Independent Escorts - 9632533318 100% genuine
Chennai (Chennai) Independent Escorts - 9632533318 100% genuine
 
Sales Experience Presentation - Angel Lopez
Sales Experience Presentation - Angel LopezSales Experience Presentation - Angel Lopez
Sales Experience Presentation - Angel Lopez
 
TEST BANK For Growth and Development Across the Lifespan, 3rd Edition By Glor...
TEST BANK For Growth and Development Across the Lifespan, 3rd Edition By Glor...TEST BANK For Growth and Development Across the Lifespan, 3rd Edition By Glor...
TEST BANK For Growth and Development Across the Lifespan, 3rd Edition By Glor...
 
一比一定(购)南昆士兰大学毕业证(USQ毕业证)成绩单学位证
一比一定(购)南昆士兰大学毕业证(USQ毕业证)成绩单学位证一比一定(购)南昆士兰大学毕业证(USQ毕业证)成绩单学位证
一比一定(购)南昆士兰大学毕业证(USQ毕业证)成绩单学位证
 
如何办理(NEU毕业证书)东北大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(NEU毕业证书)东北大学毕业证成绩单本科硕士学位证留信学历认证如何办理(NEU毕业证书)东北大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(NEU毕业证书)东北大学毕业证成绩单本科硕士学位证留信学历认证
 
Ganga Path Project (marine drive project) Patna ,Bihar .pdf
Ganga Path Project (marine drive project) Patna ,Bihar .pdfGanga Path Project (marine drive project) Patna ,Bihar .pdf
Ganga Path Project (marine drive project) Patna ,Bihar .pdf
 
👉 Tirunelveli Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Gir...
👉 Tirunelveli Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Gir...👉 Tirunelveli Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Gir...
👉 Tirunelveli Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Gir...
 
Novo Nordisk Kalundborg. We are expanding our manufacturing hub in Kalundborg...
Novo Nordisk Kalundborg. We are expanding our manufacturing hub in Kalundborg...Novo Nordisk Kalundborg. We are expanding our manufacturing hub in Kalundborg...
Novo Nordisk Kalundborg. We are expanding our manufacturing hub in Kalundborg...
 
obat aborsi pacitan wa 081336238223 jual obat aborsi cytotec asli di pacitan0...
obat aborsi pacitan wa 081336238223 jual obat aborsi cytotec asli di pacitan0...obat aborsi pacitan wa 081336238223 jual obat aborsi cytotec asli di pacitan0...
obat aborsi pacitan wa 081336238223 jual obat aborsi cytotec asli di pacitan0...
 
obat aborsi gresik wa 081336238223 jual obat aborsi cytotec asli di gresik782...
obat aborsi gresik wa 081336238223 jual obat aborsi cytotec asli di gresik782...obat aborsi gresik wa 081336238223 jual obat aborsi cytotec asli di gresik782...
obat aborsi gresik wa 081336238223 jual obat aborsi cytotec asli di gresik782...
 
We’re looking for a junior patent engineer to join our Team!
We’re looking for a junior patent engineer to join our Team!We’re looking for a junior patent engineer to join our Team!
We’re looking for a junior patent engineer to join our Team!
 
一比一定(购)中央昆士兰大学毕业证(CQU毕业证)成绩单学位证
一比一定(购)中央昆士兰大学毕业证(CQU毕业证)成绩单学位证一比一定(购)中央昆士兰大学毕业证(CQU毕业证)成绩单学位证
一比一定(购)中央昆士兰大学毕业证(CQU毕业证)成绩单学位证
 
如何办理(VIU毕业证书)温哥华岛大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(VIU毕业证书)温哥华岛大学毕业证成绩单本科硕士学位证留信学历认证如何办理(VIU毕业证书)温哥华岛大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(VIU毕业证书)温哥华岛大学毕业证成绩单本科硕士学位证留信学历认证
 
Prest Reed Portfolio revamp Full Sail Presentation 2
Prest Reed Portfolio revamp Full Sail Presentation 2Prest Reed Portfolio revamp Full Sail Presentation 2
Prest Reed Portfolio revamp Full Sail Presentation 2
 
如何办理(USC毕业证书)南加利福尼亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(USC毕业证书)南加利福尼亚大学毕业证成绩单本科硕士学位证留信学历认证如何办理(USC毕业证书)南加利福尼亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(USC毕业证书)南加利福尼亚大学毕业证成绩单本科硕士学位证留信学历认证
 
LinkedIn For Job Search Presentation May 2024
LinkedIn For Job Search Presentation May 2024LinkedIn For Job Search Presentation May 2024
LinkedIn For Job Search Presentation May 2024
 

RRB JE Stage 2 Computer and Applications Questions Part 4

  • 1. PREVIOUS YEARS QUESTIONS WITH ANSWER AND EXPLANATION Part - 4 vrrgroup.academy@gmail.com https://www.facebook.com/VRRAcademy www.youtube/VRR Academy 1
  • 3. 3 • World wide web consortium (W3C) • The World Wide Web Consortium (W3C) is the main international standards organization for the World Wide Web (abbreviated WWW or W3). • Founded and currently led by Tim Berners-Lee, the consortium is made up of member organizations which maintain full-time staff for the purpose of working together in the development of standards for the Web. Answer: (a)
  • 5. 5 • Memory, also referred to as primary storage, typically refers to storage that is directly accessible by the computer's CPU. • RAM is a high-speed storage medium that can be accessed with minimal delay. • Because the RAM is connected directly to the CPU via the memory bus, the CPU can access data stored in RAM very quickly. Answer: (a)
  • 7. 7 SRAM - Static RAM (SRAM) • The word static indicates that the memory retains its contents as long as power is being supplied. • However, data is lost when the power gets down due to volatile nature. • SRAM chips use a matrix of 6-transistors and no capacitors. • Transistors do not require power to prevent leakage, so SRAM need not be refreshed on a regular basis. • There is extra space in the matrix, hence SRAM uses more chips than DRAM for the same amount of storage space, making the manufacturing costs higher. • SRAM is thus used as cache memory and has very fast access. Characteristic of Static RAM • Long life • No need to refresh • Faster • Used as cache memory • Large size • Expensive • High power consumption
  • 8. DRAM – DYNAMIC RAM  DRAM, unlike SRAM, must be continually refreshed in order to maintain the data.  This is done by placing the memory on a refresh circuit that rewrites the data several hundred times per second.  DRAM is used for most system memory as it is cheap and small.  All DRAMs are made up of memory cells, which are composed of one capacitor and one transistor. Characteristics of Dynamic RAM  Short data lifetime  Needs to be refreshed continuously  Slower as compared to SRAM  Used as RAM  Smaller in size  Less expensive  Less power consumption 8
  • 9. 9 Unicode Transformation Format UTF-8 is a compromise character encoding that can be as compact as ASCII (if the file is just plain English text) but can also contain any unicode characters (with some increase in file size). The '8' means it uses 8-bit blocks to represent a character. By default Unicode is a …. It uses 16-bits to represent a symbol in the data. It represents any non-english character like Chinese, Japanese. Answer: (b)
  • 17. 17 What is a network? • A computer network can be described as a system of interconnected devices that can communicate using some common standard (called protocol). • Computers on a network are called nodes. • The connection between computers can be done via cabling, most commonly the Ethernet cable, or wirelessly through radio waves. • Connected computers can share resources, like access to the Internet, printers, file servers, and others. Components of a Network 1. Sender 2. Receiver 3. Media (Physical Connection) 4. Protocol 5. Message 6. Network Technology
  • 18. Advantages and disadvantages of network  Advantages  Connectivity, Communication, Data Sharing, Hardware Sharing, Internet Access Sharing, Entertainment etc.,  Disadvantages  Breakdowns and possible loss of resources, Expensive to build  Security threats, Bandwidth issues, High dependability, Needs continuous monitoring 18
  • 21. PAN  PAN is the acronym for Personal Area Network.  PAN is the interconnection between devices within the range of a person’s private space, typically within a range of 10 metres.  If you have transferred images or songs from your laptop to mobile or from mobile to your friend’s mobile using Bluetooth, you have set up and used a personal area network. 21 A person can connect his laptop, smart phone, personal digital assistant and portable printer in a network at home. This network could be fully Wi-Fi or a combination of wired and wireless.
  • 22. 22 LAN - Local Area Network Characteristics of LAN • Limited geographic operation up to 10 Km • High speed data transfer rates • Full time connectivity to local services • Generally lower in cost. • Uses mainly bus, ring and star topology • LAN supports transmission media like UTP Cable, Optical fiber, Wireless. • Requires cabling and maintenance.
  • 23. MAN - Metropolitan Area Network.  It is a network spread over a city, college campus or a small region.  MAN is larger than a LAN and typically spread over several kilometres.  Objective of MAN is to share hardware and software resources, thereby decreasing infrastructure costs.  MAN can be built by connecting several LANs.  The most common example of MAN is cable TV network. 23
  • 24. 24 WAN - Wide Area Network Characteristics of a WAN • Cover more than one geographical area. • Connecting different LANs using Routers. • Connectivity from a router to router is a circuit leased from a Telephone / Communication Company Advantages: • Covers large geographical area. • Allows connecting workstations to share resources and software. • Messages can be sent very quickly to anyone else on the network.
  • 25. 25
  • 26. 26 • ISO stands for International organization of Standardization. • This is called a model for Open System Interconnection (OSI) and is commonly known as OSI model. • The ISO-OSI model is a seven layer architecture. • It defines seven layers or levels in a complete communication system.
  • 27. 27
  • 28. 28
  • 29. 29 DRAM – DYNAMIC RAM  DRAM, unlike SRAM, must be continually refreshed in order to maintain the data.  This is done by placing the memory on a refresh circuit that rewrites the data several hundred times per second.  DRAM is used for most system memory as it is cheap and small.  All DRAMs are made up of memory cells, which are composed of one capacitor and one transistor. Answer: (a) Answer: (c)
  • 31. 31 Unicode Transformation Format UTF-8 is a compromise character encoding that can be as compact as ASCII (if the file is just plain English text) but can also contain any unicode characters (with some increase in file size). The '8' means it uses 8-bit blocks to represent a character. By default Unicode is a …. It uses 16-bits to represent a symbol in the data. It represents any non-english character like Chinese, Japanese. Answer: (c)
  • 32. 32