Sign up now
to enroll in courses, follow best educators, interact with the community and track your progress.
Download
Computer Network : PYQ ( in Hindi)
81 plays

More
In this lesson , I have discussed DSSSB Computer Teacher - Subject - wise Previous Year Questions With Detailed Analysis.

Sweta Kumari
YouTuber (channel : GATE NoteBook) | Verified Educator | 2+ year Online Teaching Experience

Unacademy user
Terimakasih atas ilmu yang diberikan. Sukses terus
  1. educator 017 Sweta Kuma INDIA'S LARGEST LEARNING PLATFORM unacademy un academy Sweta Kuman 7


  2. ABOUT ME Sweta Kumari Done B.TECH (CSE) From GGSIPUI Software Engineer | Online Educator at Unacademy for Empowering Technical Programming in Students Sweta Kumari Unscademy Top Educator 2017 Sweta Kumari top educator Learning is Earning - The more you learn, The more you Earn. 2017 FOLLOW M FOLLhtips:/unacademy.com/user/hellosonu


  3. DSSSB COMPUTER TEACHER PREVIOUS YEAR PAPER COMPUTER ORGANIZATION & ARCHITECTURE, 0 92 0s SYLLABUS DATABASE, OPERATING SYSTEM DATA STRUCTURES, COMPUTER NETWORK 7


  4. COMPUTER NETWORK PREVIOUS YEAR PAPER 7


  5. 1. A Virtual-Circuit Network (VCN) is normally implemented in the a) session layer b) data link layer c) network layer d) physical layer 7


  6. A virtual circuit (VC) is a means of transporting data over a packet switched computer network in such a way that it appears as though there is a dedicated physical layer link between the source and destination end systems of this data


  7. 2. The class of the IP addresses 208.34.54.12 will be a) class A b) Class B c) Class C d) Class E 7


  8. Class Class A Class B Class C Class D (multicast) Leading bits 0 10 110 1110 End address 127.255.255.255 191.255.255.255 223.255.255.255 239.255.255.255 11U 7


  9. 3. The checksum is used in the Internet by several protocols although not at the a) session layer b) transport layer c) network layer d) data link layer 7


  10. . A checksum is a small-sized datum derived from a block of digital data for the purpose of detecting errors which may have been introduced during its transmission or storage. It is usually applied to an installation file after it is received from the download server. 7


  11. BASIS OF COMPARISON IPV4 IPV6 Address Configuration Supports Manual and DHCP configuration. Supports Auto-configuration and renumbering Achievable End-to-end connection integrity Address Space Unachievable It can generate 4.29 x 10 addresses.It can produce quite a large n Security features Address length Address Representation Fragmentation performed by Security is dependent on application 32 bits (4 bytes) In decimal Sender and forwarding routers addresses, i.e., 3.4 x 108 IPSEC is inbuilt in the IPv6 protocol 128 bits (16 bytes) In hexadecimal Only by the sender Packet flow identification Not available Available and uses flow label field in the header Not available Checksum Field Available Message Transmission Scheme Broadcasting Multicasting and Anycasting Encryption and Authentication Not Provided Provided


  12. 7. In Hyper Text Transfer Protocol (HTTP), support a) Proxy Domain b) Proxy Documents c) Proxy Server d) Proxy IP 7


  13. 8. The Hypertext Transfer Protocol (HTTP), uses the services of TCP on a) well-known port 80 b) well-known port 81 c) well-known port 82 d) well-known port 83 001 . 7


  14. 9. If 5 files are transferred from server A to client B in the same session. The number of connection between A and B is a) 5 b) 10 c) 2 d) 6 7


  15. 10. The maximum size of the TCP header is a) 20 bytes b) 40 bytes c) 60 bytes d) 80 bytes 7