How does a distributed file system differ from a traditional file system?

  • Higher performance due to local disk access
  • Increased data security with centralized storage
  • Scalability and fault tolerance through multiple servers
  • Single point of failure
Distributed file systems use multiple servers to store and manage files, offering scalability and fault tolerance. In contrast, traditional file systems often rely on a single server, which can become a bottleneck and a single point of failure. This fundamental difference impacts scalability, fault tolerance, and overall system resilience.

What SQL keyword is used to retrieve data from a database?

  • FETCH
  • FILTER
  • SEARCH
  • SELECT
The correct SQL keyword used to retrieve data from a database is SELECT. This keyword is followed by specific columns or a wildcard (*) to indicate all columns that should be retrieved from a table or tables in the database. Using SELECT is fundamental in SQL as it forms the basis of querying data from databases.

Which normal form allows multi-valued dependencies to be removed?

  • First Normal Form (1NF)
  • Fourth Normal Form (4NF)
  • Second Normal Form (2NF)
  • Third Normal Form (3NF)
Fourth Normal Form (4NF) is the normal form that allows multi-valued dependencies to be removed. 4NF is an extension of third normal form (3NF) and deals specifically with situations where there are multiple independent multi-valued dependencies between attributes. By decomposing the table into smaller tables and ensuring each table has a single theme, 4NF helps in removing such complex dependencies and reducing data redundancy.

Which data structure is typically used for binary search?

  • Array
  • Linked List
  • Sorted Array
  • Stack
Binary search is typically performed on a sorted array. The reason for this is that binary search requires the elements to be in sorted order to efficiently divide and conquer the search space, reducing the time complexity to O(log n) compared to O(n) for linear search in an unsorted array.

In CSS, the ___________ property is used to control the appearance of text decorations such as underline and overline.

  • font-style
  • font-variant
  • text-decoration
  • text-transform
The text-decoration property in CSS is used to control the appearance of text decorations such as underline, overline, line-through, and blink. This property is commonly used to style links and text decorations.

The ________ layer of virtualization abstracts physical hardware resources for efficient utilization.

  • Hypervisor
  • Container
  • Application
  • Hardware
The correct option is "Hypervisor." The hypervisor layer is responsible for abstracting physical hardware resources such as CPU, memory, and storage, allowing multiple virtual machines (VMs) to share the underlying physical resources efficiently. This abstraction enables better resource utilization and flexibility in managing virtualized environments.

Memory ___________ is a technique used to rearrange memory contents to place all free memory together.

  • Allocation
  • Compaction
  • Fragmentation
  • Paging
Memory compaction is a technique used in memory management to reduce fragmentation by rearranging memory contents to place all free memory together in contiguous blocks. This helps in maximizing the available memory for allocating new processes or data structures, especially in systems where memory fragmentation can lead to inefficient memory usage.

Explain the concept of spanning tree protocol (STP) and its role in preventing network loops.

  • STP elects a root bridge to serve as a reference point for path calculations and topology stability.
  • STP operates at Layer 3 of the OSI model and prioritizes traffic based on VLAN configurations.
  • STP uses BPDU messages to exchange information between switches and determine the best path to the root bridge.
  • Spanning Tree Protocol (STP) prevents network loops by blocking redundant paths in a switched network.
STP is vital for ensuring network stability and preventing broadcast storms caused by looping paths in Ethernet networks. By intelligently blocking redundant links while maintaining alternative paths, STP maintains a loop-free topology, optimizing network performance and reliability.

In a densely populated urban area, you're responsible for troubleshooting connectivity issues in a public Wi-Fi network. How would you identify and mitigate potential sources of interference?

  • Analyze nearby networks, use Wi-Fi scanners, employ frequency hopping, use directional antennas
  • Analyze signal-to-noise ratio (SNR), implement airtime fairness, use MIMO technology, configure Wi-Fi scheduling
  • Use signal attenuators, implement congestion control algorithms, employ frequency division multiplexing (FDM), use Wi-Fi extenders
  • Utilize Wi-Fi heatmaps, implement band steering, use channel bonding, configure transmit power levels
In a densely populated urban area, identifying and mitigating interference in a public Wi-Fi network requires analyzing nearby networks to understand their frequencies and signal strengths. Wi-Fi scanners can provide detailed information about neighboring networks, helping in choosing less congested channels or frequencies. Frequency hopping can be used to avoid interference by switching between different channels rapidly. Directional antennas focus signals in specific directions, reducing interference from unwanted sources. These methods help identify and address interference issues effectively.

Explain the concept of DevOps and its relationship with the SDLC.

  • It aims to improve software quality through manual testing
  • It emphasizes continuous integration and continuous delivery
  • It focuses on collaboration between development and operations
  • It involves automating software development processes
DevOps is a methodology that promotes collaboration between software development (Dev) and IT operations (Ops). It aims to streamline the software delivery process...