In a relational database, a _________ ensures that each row in a table is uniquely identifiable.

  • Foreign Key
  • Index
  • Primary Key
  • Unique Constraint
A primary key is a column or group of columns that uniquely identifies each row in a table. It must contain unique values and cannot have NULL values. This uniqueness ensures that each row can be uniquely identified and retrieved from the table.

A ___________ switch is capable of processing Layer 3 (IP) packets in addition to Layer 2 (MAC) frames.

  • Intelligent Switch
  • Layer 2 Switch
  • Layer 3 Switch
  • Managed Switch
Layer 3 switches, also known as multilayer switches, combine the functionality of traditional Layer 2 switches with routing capabilities found in routers. They can make forwarding decisions based on IP addresses (Layer 3) in addition to MAC addresses (Layer 2), providing faster packet processing and improved network performance, especially in VLANs and subnets.

What is the difference between white-box testing and black-box testing?

  • Checks for user interface behavior
  • Focuses on internal logic and code
  • Tests functionality without knowing code
  • Uses knowledge of code structure
White-box testing involves examining the internal logic and code structure of a software application. Testers need knowledge of the codebase to design test cases. Black-box testing, on the other hand, tests the functionality of the software without knowing its internal code structure. Testers focus on inputs and outputs, assessing the system from a user's perspective. Both methods are crucial in ensuring software quality.

Anomalies such as insertion, update, and deletion anomalies are minimized through ___________ normalization.

  • First
  • Fourth
  • Second
  • Third
Reducing Anomalies in Database through Normalization

Discuss the significance of the OSI Model in the development of networking standards.

  • It laid the groundwork for defining communication protocols globally.
  • It served as a foundational model for creating standardized protocols.
  • OSI principles guided the development of interoperable networking technologies.
  • The OSI Model encouraged collaboration among industry stakeholders.
The OSI Model played a pivotal role in shaping networking standards by promoting collaboration, interoperability, and the creation of standardized protocols. Its principles facilitated the development of globally accepted communication standards, driving innovation and consistency in networking technologies.

_________ databases typically use denormalization to optimize read performance.

  • Document
  • Graph
  • Key-value
  • Relational
Relational databases like PostgreSQL or MySQL often denormalize data by duplicating information to reduce the need for joins, thereby improving read performance at the expense of increased storage requirements.

The process of converting plaintext into ciphertext using a secret key is known as ___________.

  • Decryption
  • Encoding
  • Encryption
  • Hashing
Encryption is the process of converting plaintext into ciphertext using an encryption algorithm and a secret key. This ensures that unauthorized parties cannot read the encrypted data without the corresponding decryption key.

What happens when you push an element onto a stack?

  • Element is added to the bottom
  • Element is added to the top
  • Element is removed from the stack
  • Element is searched within the stack
When you push an element onto a stack, it gets added to the top of the stack. This means it becomes the newest element in the stack and is positioned above all existing elements. Stacks follow the Last In, First Out (LIFO) principle, where the last element added is the first one to be removed. This behavior is commonly used in programming for tasks like managing function calls, storing temporary data, and implementing undo operations.

Explain the concept of a kernel-level thread versus a user-level thread.

  • Independent scheduling decisions, kernel involvement in thread management
  • Thread management handled by user-level libraries, fast context switching
  • User-level threads are lightweight, lower overhead
  • User-level threads mapped to kernel threads, high concurrency
Kernel-level threads are managed by the operating system's kernel and are considered heavier since they involve more resources and overhead. They allow for independent scheduling decisions and are generally more suitable for multithreading tasks that require intensive computation or interaction with system resources. On the other hand, user-level threads are managed by user-level libraries without direct kernel involvement. They are lightweight and have faster context switching but may face limitations in terms of concurrency and system resource access.

What are the potential drawbacks of using too many indexes in a database?

  • Increased complexity of maintenance
  • Increased disk space usage
  • Reduced concurrency
  • Slower data insertion
Using too many indexes in a database can lead to increased complexity in maintenance tasks such as insertions, updates, and deletions. Additionally, it can consume more disk space and potentially slow down data insertion operations.