Q1. Two bodies changed from p1v1 to p2v2 state in two ways. The heat supplied is delta Q and work done is delta W
Then what is constant in these two processes
(a) delta q
(b) delta w
(c) delta q + delta w
(d) delta q - delta w
Ans. (d)
Q2. _______ have same atomic number and same mass number are
(a) Isotopes
(b) Isotones
(c) Isomers
(d) Isobars
Ans. (c)
Q3. When a free electron is placed in a plane of electro magnetic then it moves in
(a) in the direction of the electric field
(b) in the direction of magnetic field
(c) of propagation of wave
(d) of the plane containing magnetic field and propagation direction.
Q4. Name the phenomena in which one proton is jumped from one isomer to another isomer to create two different elements
(a) functional isomerisim
(b) sterio merisim
(c) tauto merisim
(d) penta merisim
Ans. (c)
Q5. In the below compounds which one has 40% C ,6.7% H and 53.3 % O what is its empherical formula
(a) CHO
(b) CH2
(c) C2H2O2
(d) C2H3O2
Ans: (b)
Q6. X rays are coming from X ray tube, the wavelength is _______ a certain wavelength/s
(a) below
(b) above
(c) inbetween
(d) out of
Ans. (c)
Q7. In a triode valve in order to increase the saturation current what has to be done
(a) increase plate voltage
(b) reduce distance between grid and plate
(c) increase cathode potential
(d) reduce grid potential
Ans. (d )
Q8. Seven different toys are distributed among 3 children how many different ways are possible?
(a) 7C3
(b) 7P3
(c) 3 7
(d) 7 3
Ans. (c)
Q9. A, B ans C are three speakers. They have to speak randomly along with another 5 speakers in a function.
A has to speak before B and B has to speak before C. What is the probability.
Ans. 1/6
Q10. If dy = (secx + ytanx)dx, Then the curve is
(a) x = ycosx
(b) x = ysinx
(c) x = ytanx
(d) x = ysecx
Ans. (a)
Q11. Two series are 16,21,26.... and 17,21,25.....
What is the sum of first hundred common numbers
(a) 101100
(b) 110100
(c) 101110
(d) 110101
Ans. (a)
Q12. There are two sections in a question paper each contain five questions. A students has to answer 6 questions.
Maximum no. of questions that can be answered from any section is 4. How many ways he can attempt the paper?
(a) 50
(b) 100
(c) 120
(d) 200
Ans. (d)
Q13. a and b are two numbers selected randomly from 1,2,3.... 25 what is the probability of a and b are not equal.
(a) 1/25
(b) 24/25
(c) 13/25
(d) 2/25
Ans. (b)
Q14. The sum of the series 1 + 1(1+1/n) + 3(1+1/n)2 + ..... is equal to?
Ans. n2
Q15. Two circles of different radii intersects each other what is the maximum no of intersections
(a) 0
(b) 1
(c) 2
(d) 3
Ans. (c)
Q16. If x= sin-1(t), y = log(1-t2), find d2y/dx2 when t=1/2
(a) 1
(b) 0
(c) -8/3
(d) -2/3
Ans. (c)
Q17. If x approaches infinity , then (òex dx )/( òe2xdx) is ?
(a) 1
(b) 0
(c) -1
(d) 2
Ans. (a)
Q18. If f(x)=1-cos(1-cosx)/x4 is continuos at f(0) then what is x
(a) 1
(b) 0
(c) 1/4
(d) -1/4
Ans. (c)
Q19. For the word SURITI, if you arrange the letters in dictionary order then what is its rank?
(a) 234
(b) 235
(c) 236
(d) 237
Ans. (c)
Q20. Period of sin ((2t + 3) / 6 pi)
(a) 6pi
(b) 6pi2
(c) 3pi
Ans. (b)
Q21 - Q23. Four questions given on the below data
X,Yand Z are senior engineers. A,B,C,D are junior engineers. Company wants to select 4 enginers. Two will be senior and two will be juniors. The company wants these engineers to work in the most productive way so they respect each person's likes/dislikes.
Y is not friends with A
Z is not friends with C
B is not friends with A
If B is selected then who will be the remaining 4 members ?
If C is selected, Z and ___ cannot be selected?
D is always selected if ___ is selected?
Q24. A speaks truth 70% of the times, B speaks truth 80% of the times.
What is the probability that both are contradicting each other is ?
Q25. ò((2x-3)/((x2 +x+1)2 )dx is ?
Q26. Ram starts from A walking 2 km North and turns right and walks 4 km and turns right again and walks 4 km and turns right again and walks 4 km and meets Radha at Bwalking in the opposite direction to Ram .
a) Which direction does Ram walk after the first turn?
b) Distance between A and B
Q27. If the equation x2 - 3x + a = 0 has the roots (0,1) then value of a is ?
Q28. A and B's temperature are 10°c and 20°c having same surface , then their ratio of rate of emmisions is ?
Q29. An atomic particle exists and has a particlular decay rate . It is in a train . When the train moves, a person observes for whether the decay rate
(a) increases
(b) decreases
(c) depend on the directions of movement of train
Q30. Which of the following exchanges positive ions
(a).cl-
(b) nh2-
(c) ch2
Ans. (b)
Q31. After execution of CMP, a instruction in Intel 8085 microprocessor
(a) ZF is set and CY is reset.
(b) ZF is set CY is unchanged
(c) ZF is reset, CY is set
(d) ZF is reset , CY is unchanged .
Ans. ZF is set and CY is reset
Q32. The best tool for editing a graphic image is ?
Q33. Network scheme defines
a.)one to one
b.) many to many
c.) one to ,many ?
Q34. A person wants to measures the length of a rod.First he measures with standing ideally then he maeasures by
moving parrel to the rod
(a)the length will decrease in second case
(b)length will be same
(c) length will increse in the second case.
Q35. One U-230 nucleus is placed in a train moving by velocity emiting alpha rays .When the train is at rest the
distance between nucleus and alpha particle is x . One passenger is observing the particle . When the train is moving
what is the distance between particle and nucleus ?
(a) x
(b) x + vt
(c) x - vt
Q36. What is the resulting solution when benzene and toluene are mixed ?
Q37. If the word FADENCOMT equals 345687921 then
What is FEAT
Find representation of 2998
Q38. Given 10 alphabets out of which 5 are to be chosen. How many words can be made with atleast one repetition.
Q39. Arrange by acidic values : phenol, nitrotolouene and o-cresol?
Q40. Find sum of 3 + 5/(1+22) + 7/(1 + 22 + 32) + ......
Ans. 3n/(1 + n)
The following are few sample questions that maybe asked in the software paper.We haven't been able to give the values in certain problems ; only the type of questions have been mentioned.
Q What sorting algos have their best and worst case times equal ?
Ans. O(nlogn) for mergesort and heap sort
Q. What page replacement algo . has minimumn number of page faults ?
Ans. Optimality algorithm
Q. What is the use of virtual base class in c++
Ans. Multiple lines between derived classes.
Q. Find the eccentricity of a given node in a directed graph
Q. Convert the infix to postfix for A-(B+C)*(D/E)
Ans. ABC+DE/*-
Q. What is swapping
Q. Assignment operator targets to
Ans. l-value
Q. A byte addressable computer has memory capacity of 2 power m Kbytes and can perform 2 power n operations
an instruction involving three operands and one operator needs maximum of ---bits
Ans. 3m + n
Q. In round robin scheduling, if time quatum is too large then it degenerates to
Ans. FCFS
Q. What is network schema?
Q. Packet Burst is ______
Q. Picard's method uses _______?
Ans. Successive Differentiation.
The following are few sample questions that maybe asked in the hardware paper. We haven't been able to give the values in certain problems ; only the type of questions have been mentioned.
Q. Concentration and restivity is given and conductivity is asked for ?
Q. R , resistance and C, capacitance is given ,find the frequency and Q factor of the crystal ?
Q. Critical frequency and angle theta is given ;.the max useable frequency is to be calculated
Q. Questions on parabolic reflector antenna's and half wave dipole antenna's design
Q. Ramp signal is generated from integrator .Whether it is a low or high pass filter .?
Q. Calculate FM bandwidth given max modulation frequency FM , max freq deviation , df and 8 pairs allowable side band component ?
Tuesday, February 23, 2010
WIPRO SAMPLE EXAM PAPERS
1. An electron moving in an electromagnetic field moves in a
(a) In a straight path
(b) Along the same plane in the direction of its propagation
(c) Opposite to the original direction of propagation
(d) In a sine wave
Ans. (b)
2. The total work done on the particle is equal to the change in its kinetic energy
(a) Always
(b) Only if the forces acting on the body are conservative.
(c) Only if the forces acting on the body are gravitational.
(d) Only if the forces acting on the body are elastic.
Ans. (a)
3. The following unit measure energy:
(a) Kilo-watt hour.
(b) Volt*volt/sec*ohm.
(c) Pascal*foot*foot
(d) (Coulomb*coulomb)*farad
Ans. (a)
4. Astronauts in stable orbits around the earth are in a state of weightlessness because
(a) There is no gravitational force acting on them.
(b) The satellite and the air inside it have an acceleration equal to that of gravitational acceleration there.
(c) The gravitational force of the earth and the sun balance giving null resultant.
(d) There is no atmosphere at the height at which the satellites move.
Ans. (b)
5. An organ pipe, open at both ends and another organ pipe closed at one end,
will resonate with each other, if their lengths are in the ratio of
(a) 1:1
(b) 1:4
(c) 2:1
(d) 1:2
Ans. (c)
6. During an isothermal expansion of an ideal gas
(a) Its internal energy increases.
(b) Its internal energy decreases.
(c) Its internal energy does not change.
(d) The work done by the gas is not equal to the quantity of heat absorbed by it.
Ans. (c)
7. A parallel plate capaciator is charged and the charging battery is then disconnected.
If the plates of the capacitor are moved further apart by means of insulating handles
(a) The charge on the capacitor increases.
(b) The voltage across the plates increases.
(c) The capacitance increases.
(d) The electrostatic energy stored in the capacitor decreases.
Ans. (b)
8. Two equal negative charges q are fixed at point (0,a) and (0,-a) on the y-axis.
A positive charge Q is released from rest at the point (2a,0) on the x-axis. The charge Q will
(a) Execute simple harmonic motion about the origin
(b) Move to the origin and remain at rest
(c) Move to infinity
(d) Execute oscillatory but not simple harmonic motion
Ans. (d)
9. A square conducting loop of length Lon a side carries a current I.
The magnetic field at the centre of the loop is
(a) Independant of L
(b) Proportional to L*L
(c) Inversely proportoinal to L
(d) Directly proportional to L
Ans. (c)
10. The focal length of a convex lens when placed in air and then in water will
(a) Increase in water with respect to air
(b) Increase in air with respect to water
(c) Decrease in water with respect to. air
(d) Remain the same
Ans. (a)
11. The maximum kinectic energy of the photoelectron emitted from the surface is dependant on
(a) The intensity of incident radiation
(b) The potential of the collector electrode
(c) The frequency of incident radiation
(d) The angle of incidence of radiation of the surface
Ans. (c)
12. An electron orbiting in a circular orbit around the nucleus of the atom
(a) Has a magnetic dipole moment
(b) Exerts an electric force on the nucleus equal to that on it by the nucleus
(c) Does not produce a magnetic induction at the nucleus
(d) All of the above
Ans. (d)
13. The X-rays beam coming from an X-ray tube will be:
(a) Monochromatic
(b) Having all wavelengths smaller than a certain minimum wavelength
(c) Having all wavelengths larger than a certain minimum wavelength
(d) Having all wavelengths lying between a minimum and a maximum wavelength
Ans. (c)
14. The mass number of a nucleus is
(a) Always less than its atomic number
(b) Always more than its atomic number
(c) Always equal to its atomic number
(d) Sometimes more and sometimes equal to its atomic number
Ans. (d)
15. Two successive elements belonging to the first transition series have the same number
of electrons partially filling orbitals. They are
(a) V and Cr
(b) Ti and V
(c) Mn and Cr
(d) Fe and Co
Ans. (c)
16. When n+l has the same value for two or more orbitals,the new electron enters the orbital where
(a) n is maximum
(b) n is minimum
(c) l is maximum
(d) l is minimum
Ans. (b)
17. A balloon filled with ethylene is pricked with a sharp pointed needle and quickly placed in a tank
full of hydrogen at the same pressure. After a while the balloon would have
(a) Shrunk
(b) Enlarged
(c) Completely collapsed
(d) Remain unchanged in size
Ans. (b)
18. Which of the following statements is not true?
(a) The ratio of the mean speed to the rms speed is independant of temperature
(b) Tthe square of the mean speed of the molecules is equal to the mean squared speed at a certain temperature
(c) Mean kinetic energy of the gas molecules at any given temperature is independant of the mean speed
(d) None
Ans. (b)
19. Which of the following statements represent Raoult's Law
(a) Mole fraction of solvent = ratio of vapour pressure of the solution to vapour pressure of the solvent
(b) Mole fraction of solute = ratio of vapour pressure of the solution to vapour pressure of the solvent
(c) Mole fraction of solute = lowering of vapour pressure of the solution
(d) Mole fraction of solvent = lowering of vapour pressure of the solution
Ans. (a)
20. Elements having the same atomic number and the same atomic mass are known as
(a) Isotopes
(b) Isotones
(c) Isomers
(d) None of the above
21.Which is the most acidic amongst
(a) Nitrophenol
(b) O-toulene
(c) Phenol
(d) Cresol
22. Pure water does not conduct electricity because it is
(a) Almost not ionised
(b) Low boiling
(c) Neutral
(d) Readily decomposed
Ans. (a)
23. In a salt bridge, KCl is used because
(a) It is an electrolyte
(b) The transference number of K+ and Cl¯ is nearly the same
(c) It is a good conductor of electricity
(d) All of the above
Ans. (d)
24. A depolarizer used in the dry cell batteries is
(a) KCl
(b) MnO2
(c) KOH
(d) None of the above
Ans. (b)
25. The hydrolysis of alkyl halides by aqueous NaOH is best termed as
(a) Electrophylic substitution reaction
(b) Electrophylic addition reaction
(c) Nnucleophylic addition reaction
(d) Nucleophylic substitution reaction
Ans. (d)
26. The hydrocarbon that gives a red precipitate with ammoniacal cuprous chloride is (where 'º' means a triple bond)
(a) CH3-CH2-CH2-CH3
(b) CH3-CºC-CH3
(c) CH2=CH-CH=CH2
(d) CH3-CH2-CºCH
Ans. (d)
27. Which of the following reagents is neither neutral nor basic
(a) Lucas' reagent
(b) Tollen's reagent
(c) Bayer's reagent
(d) Fehling's solution
Ans. (a)
28. The substance which is most easily nitrated
(a) Toluene
(b) Bbenzene
(c) Nitrobenzene
(d) Chlorobenzene
Ans. (a)
29. Carbylamine reaction is a test for
(a) Primary amine
(b) Secondary amine
(c) Tertiary amine
(d) Quarternary ammonium salt
Ans. (a)
30. Which of the following oxides cannot be reduced by carbon to obtain metal
(a) ZnO
(b) Al2O3
(c) Fe2O3
(d) PbO
Ans. (b)
31. Which of the following is not an oxide ore?
(a) Cassiterite
(b) Siderite
(c) Pyrolusite
(d) Bauxite
Ans. (b)
32. Which among the following is called philosopher's wool
(a) Cellulose
(b) Calamine
(c) Stellite
(d) Cerussite
Ans. (c)
33. Out of 10 white, 9 black and 7 red balls, in how many ways can we select one or more balls
(a) 234
(b) 52
(c) 630
(d) 879
Ans. (d)
34. A and B throw a dice. The probability that A's throw is not greater than B's is
(a) 5/12
(b) 7/12
(c) 11/12
(d) 5/36
Ans. (b)
35. Given two numbers a and b. Let A denote the single AM between these and S denote the sum of n AMs
between them. Then S/A depends upon
(a) n
(b) n,a
(c) n,b
(d) n,a,b
Ans. (a)
36. If the sum of the roots of the equation ax²+bx+c=0 is equal to the sum of the squares of their reciprocals,
then, a/c, b/a, c/b are in
(a) AP
(b) GP
(c) HP
(d) None of the these
Ans. (c)
In the following questions ~ represents the integral sign-for eg. 1~2[f(x)] means integration of
the function f(x) over the interval 1 to2.
37. Value of -1~2[|2-x²|]dx, ie integration of the function |2-x²| over the interval -1 to 2.
(a) 0
(b) 1
(c) 2
(d) None of the above
Ans. (d)
38. If 0~P[log sinx]dx=k,then the value of 0~P/4[log(1 + tan x)]dx ,where P stands for pi,is
(a) -k/4
(b) k/4
(c) -k/8
(d) k/8
Ans. (c)
39. If a,b,c be in GP and p,q be respectively AM between a,b and b,c then
(a) 2/b=1/p+1/q
(b) 2/b=1/p-1/q
(c) 2=a/p-c/q
(d) None of the above
Ans. (a)
40. A solution of KMnO4 is reduced to MnO2 .The normality of solution is 0.6.The molarity is
(a) 1.8M
(b) 0.6M
(c) 0.1M
(d) 0.2M
Ans. (d)
The questions 41-46 are based on the following pattern.The problems below contain a question
and two statements giving certain data. You have to decide whether the data given in the
statements are sufficient for answering the questions.The correct answer is
(A) If statement (I) alone is sufficient but statement (II) alone is not sufficient.
(B) If statement(II) alone is sufficient but statement(I) alone is not sufficient.
(C) If both statements together are sufficient but neither of statements alone is sufficient.
(D) If both together are not sufficient.
41. What is John's age?
(I) In 15 years John will be twice as old as Dias would be
(II) Dias was born 5 years ago
Ans. (C)
42. What is the distance from city A to city C in kms?
(I) City A is 90 kms from City B
(II) City B is 30 kms from City C
Ans. (D)
43.Is A=C ? A,B,C are real numbers
(I) A-B=B-C
(II) A-2C = C-2B
Ans. (C)
44. What is the 30th term of a given sequence ?
(I) The first two terms of the sequence are 1,1/2
(II) The common difference is -1/2
Ans. (A)
45.Was Avinash early, on time or late for work?
(I) He thought his watch was 10 minutes fast
(II) Actually his watch was 5 minutes slow
Ans. (D)
46. What is the value of A if A is an integer?
(I) A4 = 1
(II) A3 + 1 = 0
Ans. (B)
47. A person travels 12 km in the southward direction and then travels 5km to the right and then travels 15km toward the right and finally travels 5km towards the east, how far is he from his starting place?
(a) 5.5 kms
(b) 3 km
(c) 13 km
(d) 6.4 km
Ans. (b)
48. X's father's wife's father's granddaughter uncle will be related to X as
(a) Son
(b) Nephew
(c) Uncle
(d) Grandfather
Ans. (c)
49. Find the next number in the series 1, 3 ,7 ,13 ,21 ,31
(a) 43
(b) 33
(c) 41
(d) 45
Ans. (a)
50. If in a certain code "RANGE" is coded as 12345 and "RANDOM" is coded as 123678.
Then the code for the word "MANGO" would be
(a) 82357
(b) 89343
(c) 84629
(d) 82347
Ans. (d)
51. If "PROMPT" is coded as QSPLOS ,then "PLAYER" should be
(a) QMBZFS
(b) QWMFDW
(c) QUREXM
(d) URESTI
Ans. (a)
The questions 52-53 are based on the following data
6 people A,B,C,D,E and F sit around a table for dinner.Since A does not like C, he doesn't sit either opposite or beside C.B and F always like to sit opposite each other.
52. If A is beside F then who is are the two neighbours of B?
(a) D and C
(b) E and C
(c) D and E
(d) Either (a) or (b)
Ans. (c)
53. If D is adjacent to F then who is adjacent to C?
(a) E and B
(b) D and A
(c) D and B
(d) either (a) or (c)
Ans.(d)
54. Complete the sequence A, E ,I ,M ,Q ,U , _ , _
(a) B, F
(b) Y, C
(c) G, I
(d) K, O
Ans.(b)
55. A person travels 6km towards west, then travels 5km towards north ,then finally travels
6km towards west. Where is he with respect to his starting position?
(a) 13km east
(b) 13km northeast
(c) 13km northwest
(d) 13km west
Ans. (c)
56. If A speaks the truth 80% of the times, B speaks the truth 60% of the times.
What is the probability that they tell the truth at the same time
(a) 0.8
(b) 0.48
(c) 0.6
(d) 0.14
Ans.(b)
57. If the time quantum is too large, Round Robin scheduling degenerates to
(a) Shortest Job First Scheduling
(b) Multilevel Queue Scheduling
(c) FCFS
(d) None of the above
Ans. (c)
58. Transponders are used for which of the following purposes
(a) Uplinking
(b) Downlinking
(c) Both (a) and (b)
(d) None of the above
Ans. (c)
59. The format specifier "-%d" is used for which purpose in C
(a) Left justifying a string
(b) Right justifying a string
(c)Left justifying an intger
(d) Right justifying an intger
Ans. (c)
Wipro Sample Paper #2
1.When a bicycle is in motion, the force of friction exerted by the ground on the two wheels is such that it acts
(a) In the backward direction on the front wheel and in the forward direction on the rear wheel.
(b) In the forward direction on the front wheel and in the backward direction on the rear wheel.
(c) In the backward direction on both the front and rear wheels.
(d) In the backward direction on both the front and rear wheels.
Ans. (d)
2. A certain radioactive element A, has a half life = t seconds.
In (t/2) seconds the fraction of the initial quantity of the element so far decayed is nearly
(a) 29%
(b) 15%
(c) 10%
(d) 45%
Ans. (a)
3. Which of the following plots would be a straight line ?
(a) Logarithm of decay rate against logarithm of time
(b) Logarithm of decay rate against logarithm of number of decaying nuclei
(c) Decay rate against time
(d) Number of decaying nuclei against time
Ans. (b)
4. A radioactive element x has an atomic number of 100.
It decays directly into an element y which decays directly into element z.
In both processes a charged particle is emitted.
Which of the following statements would be true?
(a) y has an atomic number of 102
(b) y has an atomic number of 101
(c) z has an atomic number of 100
(d) z has an atomic number of 101
Ans. (b)
5. If the sum of the roots of the equation ax2 + bx + c=0 is equal to the sum of the squares of their reciprocals
then a/c, b/a, c/b are in
(a) AP
(b) GP
(c) HP
(d) None of these
Ans. (c)
6. A man speaks the truth 3 out of 4 times.
He throws a die and reports it to be a 6.
What is the probability of it being a 6?
(a) 3/8
(b) 5/8
(c) 3/4
(d) None of the above
Ans. (a)
7. If cos2A + cos2B + cos2C = 1 then ABC is a
(a) Right angle triangle
(b) Equilateral triangle
(c) All the angles are acute
(d) None of these
Ans. (a)
8. Image of point (3,8) in the line x + 3y = 7 is
(a) (-1,-4)
(b) (-1,4)
(c) (2,-4)
(d) (-2,-4)
Ans. (a)
9. The mass number of a nucleus is
(a) Always less than its atomic number
(b) Always more than its atomic number
(c) Sometimes more than and sometimes equal to its atomic number
(d) None of the above
Ans. (c)
10. The maximum KE of the photoelectron emitted from a surface is dependent on
(a) The intensity of incident radiation
(b) The potential of the collector electrode
(c) The frequency of incident radiation
(d) The angle of incidence of radiation of the surface
Ans. (c)
11. Which of the following is not an essential condition for interference
(a) The two interfering waves must be propagated in almost the same direction or
the two interfering waves must intersect at a very small angle
(b) The waves must have the same time period and wavelength
(c) Amplitude of the two waves should be the same
(d) The interfering beams of light must originate from the same source
Ans. (c)
12. When X-Ray photons collide with electrons
(a) They slow down
(b) Their mass increases
(c) Their wave length increases
(d) Their energy decreases
Ans. (c)
13. An electron emits energy
(a) Because its in orbit
(b) When it jumps from one energy level to another
(c) Electrons are attracted towards the nucleus
(d) The electrostatic force is insufficient to hold the electrons in orbits
Ans. (b)
14. How many bonds are present in CO2 molecule?
(a) 1
(b) 2
(c) 0
(d) 4
Ans. (d)
15. In a balanced chemical equation
(a) Atoms are conserved
(b) Molecules are conserved
(c) Moles are conserved
(d) Reactant and product molecules are preserved
Ans. (a)
16. How many grams of NaOH will react with 0.2 equivalent of HCl?
(a) 0.59
(b) 0.285
(c) 1.18
(d) none of these
Ans. (a)
17. Which of the following is least acidic
(a) Ortho-cresol
(b) Para-cresol
(c) Phenol
(d) Meta-cresol
Ans. (b)
18. In Reimer-Tiemann's reaction, the reaction intermediate is
(a) Carbene
(b) Dichloro carbene
(c) Carbonion
(d) Carbonium ion
Ans. (b)
19. Which of the following is most acidic?
(a) C2H5OH
(b) CH3CHOHCH3
(c) Ethanol
(d) CH3OH
Ans. (b)
20.A catalyst
(a)always slows down the reaction
(b)always starts a rection that would not have ocurred at all otherwise
(c)causes changes in the rate of the reaction
(d)changes the quantities of the products formed
Ans. (c)
21.The rate of the first order reaction depends on the
(a) Concentration of the reactant
(b) Concentration of the product
(c) Time
(d) Temperature
Ans. (d)
22. The most abundant element in the universe is
(a) Hydrogen
(b) Helium
(c) Oxygen
(d) Silicon
Ans. (a)
23. Integrate 3x + 5 / (x3-x2-x+1)
(a) 1/2 log | (x+1)/(x-1) | - 4/(x-1)
(b) log |2+tanx|
(c) -(1+logx)/x
(d) 2 log|(tanx)/(tanx+2)
Ans. A
24. If y=cos-1(cosx + 4sinx)/(17)1/2, then dy/dx is
(a) 0
(b) 1
(c)-1
(d) none of these
Ans. (b)
25. If the sum of n terms of two series of A.P are in the ratio 5n+4:9n+6 .find the ratio of their 13th terms
(a) 129/231
(b) 1/2
(c) 23/15
(d) None of the above
Ans. (a)
26. If the letters of the word "rachit" are arranged in all possible ways and these words are written
out as in a dictionary, what is the rank of the word "rachit".
(a) 485
(b) 480
(c) 478
(d) 481
Ans. (d)
27. Ravi's salary was reduced by 25%.Percentage increase to be effected to bring the salary
to the original level is
(a) 20%
(b) 25%
(c) 33 1/3%
(d) 30%
Ans. (c)
28. A and B can finish a piece of work in 20 days .B and C in 30 days and C and A in 40 days.
In how many days will A alone finish the job
(a) 48
(b) 34 2/7
(c) 44
(d) 45
Ans. (a)
29. How long will a train 100m long traveling at 72kmph take to overtake another train
200m long traveling at 54kmph
(a) 70sec
(b) 1min
(c) 1 min 15 sec
(d) 55 sec
Ans. (b)
30. What is the product of the irrational roots of the equation (2x-1)(2x-3)(2x-5)(2x-7)=9?
(a) 3/2
(b) 4
(c) 3
(d) 3/4
Ans. (a)
31. Which of the following parameters is the same for molecules of all gases at a given temperature?
(a) Mass
(b) Momentum
(c) Speed
(d) Kinetic energy
Ans. (d)
32. A solid is completely immersed in liquid. The force exerted by the liquid on the solid will
(a) Increase if it is pushed deeper inside the liquid
(b) Change if its orientation is changed
(c) Decrease if it is taken partially out of the liquid
(d) None of the above
Ans. (c)
33. Select the correct statements
(a) A simple harmonic motion is necessarily periodic
(b) An oscillatory motion is necessarily periodic
(c) A periodic motion is necessarily oscillatory
(d) All of the above
Ans. (a)
34. An electron is injected into a region of uniform magnetic flux density with the components
of velocity parallel to and normal to the flux. What is the path of the electron?
(a) Helix
(b) Parabola
(c) Circle
(d) Rectangle
Ans. (a)
35. A constant voltage is applied between the 2 ends of a uniform metallic wire.
Some heat is developed in it. The heat developed is doubled if
(a) both the length and radius of the wire are halved.
(b) both the length and radius of the wire are doubled
(c) the radius of the wire is doubled
(d) the length of the wire is doubled
Ans. (b)
36. If Young's double slit experiment is performed in water
(a) the fringe width will decrease
(b) the fringe width will increase
(c) the fringe width remains unchanged
(d) there will be no fringe
Ans. (a)
37. The shape of a spot of light produced when bright sunshine passes perpendicular
through a hole of very small size is
(a) Square, because the hole is a square
(b) Round, because it is an image of the sun
(c) Round with a small penumbra around it
(d) Square with a small penumbra
Ans. (b)
Select the alternative that logically follows from the two given statements.
38.
Some forms are books
All books are made of paper
(a) Some forms are made of paper
(b) Some forms are not made of paper
(c) No forms are made of paper
(d) None of the above
Ans. (a)
39.
All toffees are chocolates
Some toffees are not good for health
(a) Some chocolates are not good for health
(b) Some toffees are good for health
(c) No toffees are good for health
(d) Both (a) and (b)
Ans. (a)
The questions 40-46 are based on the following pattern.The problems below contain a question and two statements giving certain data. You have to decide whether the data given in the statements are sufficient for answering the questions.The correct answer is
(A) If statement (I) alone is sufficient but statement (II) alone is not sufficient.
(B) If statement(II) alone is sufficient but statement(I) alone is not sufficient.
(C) If both statements together are sufficient but neither of statements alone is sufficient.
(D) If both together are not sufficient.
(E) If statements (I) and (II) are identical.
43. If a ground is rectangular, what is its width?
(I) The ratio of its length to its breadth is 7:2
(II) Perimeter of the playground is 396 mts.
Ans. C
44. If the present age of my father is 39 yrs and my present age is x yrs, what is x?
(I) Next year my mother will be four times as old as i would be.
(II) My brother is 2 years older than I and my father is 4 years older than my mother.
Ans. C
45. How many brothers and sisters are there in the family of seven children?
(I) Each boy in the family has as many sisters as brothers
(II) Each of the girl in the family has twice as many brothers as sisters
Ans. D
46. x is not equal to 0, is x + y = 0?
(I) x is the reciprocal of y
(II) x is not equal to 1
Ans. A
Following questions are based on letter's analogy.First pair of letters should have the same relationship as the second pair of letters or vice versa.
47. ? : BGLQ : : YDIN : VAFK
(a) EKNS
(b) DKMT
(c) DLMS
(d) EJOT
Ans. (d)
48. NLO : RPS : : ? : ZXA
(a) VUW
(b) VTR
(c) VTW
(d) TRP
Ans. (c)
49. If "segment" is coded as rffndou, then "ritual" is coded as
(a) shutbm
(b) qjutbk
(c) qhutbk
(d) qhubtk
Ans. (c)
50. If "football" is "cricket" ,"cricket" is "basketball" ,"basketball" is "volleyball","volleyball" is "khokho" and "khokho" is cricket, which is not a ball game?
(a) cricket
(b) football
(c) khokho
(d) basketball
Ans. (a)
(a) In a straight path
(b) Along the same plane in the direction of its propagation
(c) Opposite to the original direction of propagation
(d) In a sine wave
Ans. (b)
2. The total work done on the particle is equal to the change in its kinetic energy
(a) Always
(b) Only if the forces acting on the body are conservative.
(c) Only if the forces acting on the body are gravitational.
(d) Only if the forces acting on the body are elastic.
Ans. (a)
3. The following unit measure energy:
(a) Kilo-watt hour.
(b) Volt*volt/sec*ohm.
(c) Pascal*foot*foot
(d) (Coulomb*coulomb)*farad
Ans. (a)
4. Astronauts in stable orbits around the earth are in a state of weightlessness because
(a) There is no gravitational force acting on them.
(b) The satellite and the air inside it have an acceleration equal to that of gravitational acceleration there.
(c) The gravitational force of the earth and the sun balance giving null resultant.
(d) There is no atmosphere at the height at which the satellites move.
Ans. (b)
5. An organ pipe, open at both ends and another organ pipe closed at one end,
will resonate with each other, if their lengths are in the ratio of
(a) 1:1
(b) 1:4
(c) 2:1
(d) 1:2
Ans. (c)
6. During an isothermal expansion of an ideal gas
(a) Its internal energy increases.
(b) Its internal energy decreases.
(c) Its internal energy does not change.
(d) The work done by the gas is not equal to the quantity of heat absorbed by it.
Ans. (c)
7. A parallel plate capaciator is charged and the charging battery is then disconnected.
If the plates of the capacitor are moved further apart by means of insulating handles
(a) The charge on the capacitor increases.
(b) The voltage across the plates increases.
(c) The capacitance increases.
(d) The electrostatic energy stored in the capacitor decreases.
Ans. (b)
8. Two equal negative charges q are fixed at point (0,a) and (0,-a) on the y-axis.
A positive charge Q is released from rest at the point (2a,0) on the x-axis. The charge Q will
(a) Execute simple harmonic motion about the origin
(b) Move to the origin and remain at rest
(c) Move to infinity
(d) Execute oscillatory but not simple harmonic motion
Ans. (d)
9. A square conducting loop of length Lon a side carries a current I.
The magnetic field at the centre of the loop is
(a) Independant of L
(b) Proportional to L*L
(c) Inversely proportoinal to L
(d) Directly proportional to L
Ans. (c)
10. The focal length of a convex lens when placed in air and then in water will
(a) Increase in water with respect to air
(b) Increase in air with respect to water
(c) Decrease in water with respect to. air
(d) Remain the same
Ans. (a)
11. The maximum kinectic energy of the photoelectron emitted from the surface is dependant on
(a) The intensity of incident radiation
(b) The potential of the collector electrode
(c) The frequency of incident radiation
(d) The angle of incidence of radiation of the surface
Ans. (c)
12. An electron orbiting in a circular orbit around the nucleus of the atom
(a) Has a magnetic dipole moment
(b) Exerts an electric force on the nucleus equal to that on it by the nucleus
(c) Does not produce a magnetic induction at the nucleus
(d) All of the above
Ans. (d)
13. The X-rays beam coming from an X-ray tube will be:
(a) Monochromatic
(b) Having all wavelengths smaller than a certain minimum wavelength
(c) Having all wavelengths larger than a certain minimum wavelength
(d) Having all wavelengths lying between a minimum and a maximum wavelength
Ans. (c)
14. The mass number of a nucleus is
(a) Always less than its atomic number
(b) Always more than its atomic number
(c) Always equal to its atomic number
(d) Sometimes more and sometimes equal to its atomic number
Ans. (d)
15. Two successive elements belonging to the first transition series have the same number
of electrons partially filling orbitals. They are
(a) V and Cr
(b) Ti and V
(c) Mn and Cr
(d) Fe and Co
Ans. (c)
16. When n+l has the same value for two or more orbitals,the new electron enters the orbital where
(a) n is maximum
(b) n is minimum
(c) l is maximum
(d) l is minimum
Ans. (b)
17. A balloon filled with ethylene is pricked with a sharp pointed needle and quickly placed in a tank
full of hydrogen at the same pressure. After a while the balloon would have
(a) Shrunk
(b) Enlarged
(c) Completely collapsed
(d) Remain unchanged in size
Ans. (b)
18. Which of the following statements is not true?
(a) The ratio of the mean speed to the rms speed is independant of temperature
(b) Tthe square of the mean speed of the molecules is equal to the mean squared speed at a certain temperature
(c) Mean kinetic energy of the gas molecules at any given temperature is independant of the mean speed
(d) None
Ans. (b)
19. Which of the following statements represent Raoult's Law
(a) Mole fraction of solvent = ratio of vapour pressure of the solution to vapour pressure of the solvent
(b) Mole fraction of solute = ratio of vapour pressure of the solution to vapour pressure of the solvent
(c) Mole fraction of solute = lowering of vapour pressure of the solution
(d) Mole fraction of solvent = lowering of vapour pressure of the solution
Ans. (a)
20. Elements having the same atomic number and the same atomic mass are known as
(a) Isotopes
(b) Isotones
(c) Isomers
(d) None of the above
21.Which is the most acidic amongst
(a) Nitrophenol
(b) O-toulene
(c) Phenol
(d) Cresol
22. Pure water does not conduct electricity because it is
(a) Almost not ionised
(b) Low boiling
(c) Neutral
(d) Readily decomposed
Ans. (a)
23. In a salt bridge, KCl is used because
(a) It is an electrolyte
(b) The transference number of K+ and Cl¯ is nearly the same
(c) It is a good conductor of electricity
(d) All of the above
Ans. (d)
24. A depolarizer used in the dry cell batteries is
(a) KCl
(b) MnO2
(c) KOH
(d) None of the above
Ans. (b)
25. The hydrolysis of alkyl halides by aqueous NaOH is best termed as
(a) Electrophylic substitution reaction
(b) Electrophylic addition reaction
(c) Nnucleophylic addition reaction
(d) Nucleophylic substitution reaction
Ans. (d)
26. The hydrocarbon that gives a red precipitate with ammoniacal cuprous chloride is (where 'º' means a triple bond)
(a) CH3-CH2-CH2-CH3
(b) CH3-CºC-CH3
(c) CH2=CH-CH=CH2
(d) CH3-CH2-CºCH
Ans. (d)
27. Which of the following reagents is neither neutral nor basic
(a) Lucas' reagent
(b) Tollen's reagent
(c) Bayer's reagent
(d) Fehling's solution
Ans. (a)
28. The substance which is most easily nitrated
(a) Toluene
(b) Bbenzene
(c) Nitrobenzene
(d) Chlorobenzene
Ans. (a)
29. Carbylamine reaction is a test for
(a) Primary amine
(b) Secondary amine
(c) Tertiary amine
(d) Quarternary ammonium salt
Ans. (a)
30. Which of the following oxides cannot be reduced by carbon to obtain metal
(a) ZnO
(b) Al2O3
(c) Fe2O3
(d) PbO
Ans. (b)
31. Which of the following is not an oxide ore?
(a) Cassiterite
(b) Siderite
(c) Pyrolusite
(d) Bauxite
Ans. (b)
32. Which among the following is called philosopher's wool
(a) Cellulose
(b) Calamine
(c) Stellite
(d) Cerussite
Ans. (c)
33. Out of 10 white, 9 black and 7 red balls, in how many ways can we select one or more balls
(a) 234
(b) 52
(c) 630
(d) 879
Ans. (d)
34. A and B throw a dice. The probability that A's throw is not greater than B's is
(a) 5/12
(b) 7/12
(c) 11/12
(d) 5/36
Ans. (b)
35. Given two numbers a and b. Let A denote the single AM between these and S denote the sum of n AMs
between them. Then S/A depends upon
(a) n
(b) n,a
(c) n,b
(d) n,a,b
Ans. (a)
36. If the sum of the roots of the equation ax²+bx+c=0 is equal to the sum of the squares of their reciprocals,
then, a/c, b/a, c/b are in
(a) AP
(b) GP
(c) HP
(d) None of the these
Ans. (c)
In the following questions ~ represents the integral sign-for eg. 1~2[f(x)] means integration of
the function f(x) over the interval 1 to2.
37. Value of -1~2[|2-x²|]dx, ie integration of the function |2-x²| over the interval -1 to 2.
(a) 0
(b) 1
(c) 2
(d) None of the above
Ans. (d)
38. If 0~P[log sinx]dx=k,then the value of 0~P/4[log(1 + tan x)]dx ,where P stands for pi,is
(a) -k/4
(b) k/4
(c) -k/8
(d) k/8
Ans. (c)
39. If a,b,c be in GP and p,q be respectively AM between a,b and b,c then
(a) 2/b=1/p+1/q
(b) 2/b=1/p-1/q
(c) 2=a/p-c/q
(d) None of the above
Ans. (a)
40. A solution of KMnO4 is reduced to MnO2 .The normality of solution is 0.6.The molarity is
(a) 1.8M
(b) 0.6M
(c) 0.1M
(d) 0.2M
Ans. (d)
The questions 41-46 are based on the following pattern.The problems below contain a question
and two statements giving certain data. You have to decide whether the data given in the
statements are sufficient for answering the questions.The correct answer is
(A) If statement (I) alone is sufficient but statement (II) alone is not sufficient.
(B) If statement(II) alone is sufficient but statement(I) alone is not sufficient.
(C) If both statements together are sufficient but neither of statements alone is sufficient.
(D) If both together are not sufficient.
41. What is John's age?
(I) In 15 years John will be twice as old as Dias would be
(II) Dias was born 5 years ago
Ans. (C)
42. What is the distance from city A to city C in kms?
(I) City A is 90 kms from City B
(II) City B is 30 kms from City C
Ans. (D)
43.Is A=C ? A,B,C are real numbers
(I) A-B=B-C
(II) A-2C = C-2B
Ans. (C)
44. What is the 30th term of a given sequence ?
(I) The first two terms of the sequence are 1,1/2
(II) The common difference is -1/2
Ans. (A)
45.Was Avinash early, on time or late for work?
(I) He thought his watch was 10 minutes fast
(II) Actually his watch was 5 minutes slow
Ans. (D)
46. What is the value of A if A is an integer?
(I) A4 = 1
(II) A3 + 1 = 0
Ans. (B)
47. A person travels 12 km in the southward direction and then travels 5km to the right and then travels 15km toward the right and finally travels 5km towards the east, how far is he from his starting place?
(a) 5.5 kms
(b) 3 km
(c) 13 km
(d) 6.4 km
Ans. (b)
48. X's father's wife's father's granddaughter uncle will be related to X as
(a) Son
(b) Nephew
(c) Uncle
(d) Grandfather
Ans. (c)
49. Find the next number in the series 1, 3 ,7 ,13 ,21 ,31
(a) 43
(b) 33
(c) 41
(d) 45
Ans. (a)
50. If in a certain code "RANGE" is coded as 12345 and "RANDOM" is coded as 123678.
Then the code for the word "MANGO" would be
(a) 82357
(b) 89343
(c) 84629
(d) 82347
Ans. (d)
51. If "PROMPT" is coded as QSPLOS ,then "PLAYER" should be
(a) QMBZFS
(b) QWMFDW
(c) QUREXM
(d) URESTI
Ans. (a)
The questions 52-53 are based on the following data
6 people A,B,C,D,E and F sit around a table for dinner.Since A does not like C, he doesn't sit either opposite or beside C.B and F always like to sit opposite each other.
52. If A is beside F then who is are the two neighbours of B?
(a) D and C
(b) E and C
(c) D and E
(d) Either (a) or (b)
Ans. (c)
53. If D is adjacent to F then who is adjacent to C?
(a) E and B
(b) D and A
(c) D and B
(d) either (a) or (c)
Ans.(d)
54. Complete the sequence A, E ,I ,M ,Q ,U , _ , _
(a) B, F
(b) Y, C
(c) G, I
(d) K, O
Ans.(b)
55. A person travels 6km towards west, then travels 5km towards north ,then finally travels
6km towards west. Where is he with respect to his starting position?
(a) 13km east
(b) 13km northeast
(c) 13km northwest
(d) 13km west
Ans. (c)
56. If A speaks the truth 80% of the times, B speaks the truth 60% of the times.
What is the probability that they tell the truth at the same time
(a) 0.8
(b) 0.48
(c) 0.6
(d) 0.14
Ans.(b)
57. If the time quantum is too large, Round Robin scheduling degenerates to
(a) Shortest Job First Scheduling
(b) Multilevel Queue Scheduling
(c) FCFS
(d) None of the above
Ans. (c)
58. Transponders are used for which of the following purposes
(a) Uplinking
(b) Downlinking
(c) Both (a) and (b)
(d) None of the above
Ans. (c)
59. The format specifier "-%d" is used for which purpose in C
(a) Left justifying a string
(b) Right justifying a string
(c)Left justifying an intger
(d) Right justifying an intger
Ans. (c)
Wipro Sample Paper #2
1.When a bicycle is in motion, the force of friction exerted by the ground on the two wheels is such that it acts
(a) In the backward direction on the front wheel and in the forward direction on the rear wheel.
(b) In the forward direction on the front wheel and in the backward direction on the rear wheel.
(c) In the backward direction on both the front and rear wheels.
(d) In the backward direction on both the front and rear wheels.
Ans. (d)
2. A certain radioactive element A, has a half life = t seconds.
In (t/2) seconds the fraction of the initial quantity of the element so far decayed is nearly
(a) 29%
(b) 15%
(c) 10%
(d) 45%
Ans. (a)
3. Which of the following plots would be a straight line ?
(a) Logarithm of decay rate against logarithm of time
(b) Logarithm of decay rate against logarithm of number of decaying nuclei
(c) Decay rate against time
(d) Number of decaying nuclei against time
Ans. (b)
4. A radioactive element x has an atomic number of 100.
It decays directly into an element y which decays directly into element z.
In both processes a charged particle is emitted.
Which of the following statements would be true?
(a) y has an atomic number of 102
(b) y has an atomic number of 101
(c) z has an atomic number of 100
(d) z has an atomic number of 101
Ans. (b)
5. If the sum of the roots of the equation ax2 + bx + c=0 is equal to the sum of the squares of their reciprocals
then a/c, b/a, c/b are in
(a) AP
(b) GP
(c) HP
(d) None of these
Ans. (c)
6. A man speaks the truth 3 out of 4 times.
He throws a die and reports it to be a 6.
What is the probability of it being a 6?
(a) 3/8
(b) 5/8
(c) 3/4
(d) None of the above
Ans. (a)
7. If cos2A + cos2B + cos2C = 1 then ABC is a
(a) Right angle triangle
(b) Equilateral triangle
(c) All the angles are acute
(d) None of these
Ans. (a)
8. Image of point (3,8) in the line x + 3y = 7 is
(a) (-1,-4)
(b) (-1,4)
(c) (2,-4)
(d) (-2,-4)
Ans. (a)
9. The mass number of a nucleus is
(a) Always less than its atomic number
(b) Always more than its atomic number
(c) Sometimes more than and sometimes equal to its atomic number
(d) None of the above
Ans. (c)
10. The maximum KE of the photoelectron emitted from a surface is dependent on
(a) The intensity of incident radiation
(b) The potential of the collector electrode
(c) The frequency of incident radiation
(d) The angle of incidence of radiation of the surface
Ans. (c)
11. Which of the following is not an essential condition for interference
(a) The two interfering waves must be propagated in almost the same direction or
the two interfering waves must intersect at a very small angle
(b) The waves must have the same time period and wavelength
(c) Amplitude of the two waves should be the same
(d) The interfering beams of light must originate from the same source
Ans. (c)
12. When X-Ray photons collide with electrons
(a) They slow down
(b) Their mass increases
(c) Their wave length increases
(d) Their energy decreases
Ans. (c)
13. An electron emits energy
(a) Because its in orbit
(b) When it jumps from one energy level to another
(c) Electrons are attracted towards the nucleus
(d) The electrostatic force is insufficient to hold the electrons in orbits
Ans. (b)
14. How many bonds are present in CO2 molecule?
(a) 1
(b) 2
(c) 0
(d) 4
Ans. (d)
15. In a balanced chemical equation
(a) Atoms are conserved
(b) Molecules are conserved
(c) Moles are conserved
(d) Reactant and product molecules are preserved
Ans. (a)
16. How many grams of NaOH will react with 0.2 equivalent of HCl?
(a) 0.59
(b) 0.285
(c) 1.18
(d) none of these
Ans. (a)
17. Which of the following is least acidic
(a) Ortho-cresol
(b) Para-cresol
(c) Phenol
(d) Meta-cresol
Ans. (b)
18. In Reimer-Tiemann's reaction, the reaction intermediate is
(a) Carbene
(b) Dichloro carbene
(c) Carbonion
(d) Carbonium ion
Ans. (b)
19. Which of the following is most acidic?
(a) C2H5OH
(b) CH3CHOHCH3
(c) Ethanol
(d) CH3OH
Ans. (b)
20.A catalyst
(a)always slows down the reaction
(b)always starts a rection that would not have ocurred at all otherwise
(c)causes changes in the rate of the reaction
(d)changes the quantities of the products formed
Ans. (c)
21.The rate of the first order reaction depends on the
(a) Concentration of the reactant
(b) Concentration of the product
(c) Time
(d) Temperature
Ans. (d)
22. The most abundant element in the universe is
(a) Hydrogen
(b) Helium
(c) Oxygen
(d) Silicon
Ans. (a)
23. Integrate 3x + 5 / (x3-x2-x+1)
(a) 1/2 log | (x+1)/(x-1) | - 4/(x-1)
(b) log |2+tanx|
(c) -(1+logx)/x
(d) 2 log|(tanx)/(tanx+2)
Ans. A
24. If y=cos-1(cosx + 4sinx)/(17)1/2, then dy/dx is
(a) 0
(b) 1
(c)-1
(d) none of these
Ans. (b)
25. If the sum of n terms of two series of A.P are in the ratio 5n+4:9n+6 .find the ratio of their 13th terms
(a) 129/231
(b) 1/2
(c) 23/15
(d) None of the above
Ans. (a)
26. If the letters of the word "rachit" are arranged in all possible ways and these words are written
out as in a dictionary, what is the rank of the word "rachit".
(a) 485
(b) 480
(c) 478
(d) 481
Ans. (d)
27. Ravi's salary was reduced by 25%.Percentage increase to be effected to bring the salary
to the original level is
(a) 20%
(b) 25%
(c) 33 1/3%
(d) 30%
Ans. (c)
28. A and B can finish a piece of work in 20 days .B and C in 30 days and C and A in 40 days.
In how many days will A alone finish the job
(a) 48
(b) 34 2/7
(c) 44
(d) 45
Ans. (a)
29. How long will a train 100m long traveling at 72kmph take to overtake another train
200m long traveling at 54kmph
(a) 70sec
(b) 1min
(c) 1 min 15 sec
(d) 55 sec
Ans. (b)
30. What is the product of the irrational roots of the equation (2x-1)(2x-3)(2x-5)(2x-7)=9?
(a) 3/2
(b) 4
(c) 3
(d) 3/4
Ans. (a)
31. Which of the following parameters is the same for molecules of all gases at a given temperature?
(a) Mass
(b) Momentum
(c) Speed
(d) Kinetic energy
Ans. (d)
32. A solid is completely immersed in liquid. The force exerted by the liquid on the solid will
(a) Increase if it is pushed deeper inside the liquid
(b) Change if its orientation is changed
(c) Decrease if it is taken partially out of the liquid
(d) None of the above
Ans. (c)
33. Select the correct statements
(a) A simple harmonic motion is necessarily periodic
(b) An oscillatory motion is necessarily periodic
(c) A periodic motion is necessarily oscillatory
(d) All of the above
Ans. (a)
34. An electron is injected into a region of uniform magnetic flux density with the components
of velocity parallel to and normal to the flux. What is the path of the electron?
(a) Helix
(b) Parabola
(c) Circle
(d) Rectangle
Ans. (a)
35. A constant voltage is applied between the 2 ends of a uniform metallic wire.
Some heat is developed in it. The heat developed is doubled if
(a) both the length and radius of the wire are halved.
(b) both the length and radius of the wire are doubled
(c) the radius of the wire is doubled
(d) the length of the wire is doubled
Ans. (b)
36. If Young's double slit experiment is performed in water
(a) the fringe width will decrease
(b) the fringe width will increase
(c) the fringe width remains unchanged
(d) there will be no fringe
Ans. (a)
37. The shape of a spot of light produced when bright sunshine passes perpendicular
through a hole of very small size is
(a) Square, because the hole is a square
(b) Round, because it is an image of the sun
(c) Round with a small penumbra around it
(d) Square with a small penumbra
Ans. (b)
Select the alternative that logically follows from the two given statements.
38.
Some forms are books
All books are made of paper
(a) Some forms are made of paper
(b) Some forms are not made of paper
(c) No forms are made of paper
(d) None of the above
Ans. (a)
39.
All toffees are chocolates
Some toffees are not good for health
(a) Some chocolates are not good for health
(b) Some toffees are good for health
(c) No toffees are good for health
(d) Both (a) and (b)
Ans. (a)
The questions 40-46 are based on the following pattern.The problems below contain a question and two statements giving certain data. You have to decide whether the data given in the statements are sufficient for answering the questions.The correct answer is
(A) If statement (I) alone is sufficient but statement (II) alone is not sufficient.
(B) If statement(II) alone is sufficient but statement(I) alone is not sufficient.
(C) If both statements together are sufficient but neither of statements alone is sufficient.
(D) If both together are not sufficient.
(E) If statements (I) and (II) are identical.
43. If a ground is rectangular, what is its width?
(I) The ratio of its length to its breadth is 7:2
(II) Perimeter of the playground is 396 mts.
Ans. C
44. If the present age of my father is 39 yrs and my present age is x yrs, what is x?
(I) Next year my mother will be four times as old as i would be.
(II) My brother is 2 years older than I and my father is 4 years older than my mother.
Ans. C
45. How many brothers and sisters are there in the family of seven children?
(I) Each boy in the family has as many sisters as brothers
(II) Each of the girl in the family has twice as many brothers as sisters
Ans. D
46. x is not equal to 0, is x + y = 0?
(I) x is the reciprocal of y
(II) x is not equal to 1
Ans. A
Following questions are based on letter's analogy.First pair of letters should have the same relationship as the second pair of letters or vice versa.
47. ? : BGLQ : : YDIN : VAFK
(a) EKNS
(b) DKMT
(c) DLMS
(d) EJOT
Ans. (d)
48. NLO : RPS : : ? : ZXA
(a) VUW
(b) VTR
(c) VTW
(d) TRP
Ans. (c)
49. If "segment" is coded as rffndou, then "ritual" is coded as
(a) shutbm
(b) qjutbk
(c) qhutbk
(d) qhubtk
Ans. (c)
50. If "football" is "cricket" ,"cricket" is "basketball" ,"basketball" is "volleyball","volleyball" is "khokho" and "khokho" is cricket, which is not a ball game?
(a) cricket
(b) football
(c) khokho
(d) basketball
Ans. (a)
INFOSYS SAMPLE EXAM PAPER
1. Father's age is three years more than three times the son's age.
After three years, father's age will be ten years more than twice the son's age.
What is the father's present age.
Ans: 33 years. (2 marks)
2. Find the values of each of the alphabets.
N O O N
S O O N
+ M O O N
----------
J U N E
Ans: 9326 (2 marks)
3. There are 20 poles with a constant distance between each pole
A car takes 24 second to reach the 12th pole.
How much will it take to reach the last pole.
Ans: 41.45 seconds (2 marks)
Let the distance between two poles = x
Hence 11x:24::19x:?
4. A car is travelling at a uniform speed.
The driver sees a milestone showing a 2-digit number.
After travelling for an hour the driver sees another milestone with the same digits in reverse order.
After another hour the driver sees another milestone containing the same two digits.
What is the average speed of the driver.
Ans: 45 kmph (4 marks)
5. The minute and the hour hand of a watch meet every 65 minutes.
How much does the watch lose or gain time and by how much?
Ans: Gains; 5/11 minutes (4 marks)
6. Ram, Shyam and Gumnaam are friends.
Ram is a widower and lives alone and his sister takes care of him.
Shyam is a bachelor and his neice cooks his food and looks after his house.
Gumnaam is married to Gita and lives in large house in the same town.
Gita gives the idea that all of them could stay together in the house and share monthly expenses equally.
During their first month of living together, each person contributed Rs.25.
At the end of the month, it was found that Rs 92 was the expense so the remaining amount was distributed equally
among everyone.
The distribution was such that everyone recieved a whole number of Rupees.
How much did each person recieve?
Ans. Rs 2 (4 marks)
(Hint: Ram's sister, Shyam's neice and Gumnaam's wife are the same person)
7. Four persons A, B, C and D are playing cards.
Each person has one card, laid down on the table below him, which has two different colours on either side.
The colours visible on the table are Red, Green, Red and Blue.
They see the color on the reverse side and give the following comment.
A: Yellow or Green
B: Neither Blue nor Green
C: Blue or Yellow
D: Blue or Yellow
Given that out of the 4 people 2 always lie find out the colours on the cards each person
Infosys Sample
1. Mr.Mathurs jewels have been stolen from his bank locker .
The bank has lockers of 12 people which are arranged in an array of 3 rows and 4 columns like:
1 2 3 4
5 6 7 8
9 10 11 12
The locker belonging to JONES was to the right of BLACK'S locker and directly above MILLAR'S.
BOOTH'S locker was directly above MILLAR'S.
SMITH'S locker was also above GRAY's (though not directly).
GREEN'S locker was directly below SMITH'S.
WILSON'S locker was between that of DAVIS and BOOTH.
MILLAR'S locker was on the bottom row directly to the right of HERD'S.
WHITE'S locker was on the bottom right hand corner in the same column as BOOTH'S.
Which box belonged to Mr.Mathurs?
Ans: Box number 9 belongs to Mr.Mathurs.
2. Fifty minutes ago if it was four times as many minutes past three o'clock,how many minutes is it to six o'clock?
Ans: Twenty six minutes.
3. If a clock takes 7seconds to strike 7, how long will the same clock take to strike 10?
Ans: The clock strikes for the first time at the start and takes 7 seconds for 6 intervals-thus for one interval time
taken=7/6.
Therefore, for 10 seconds there are 9 intervals and time taken is 9*7/6=10 and 1/2 seconds.
4. Three criminals were arrested for shop lifting.
However, when interrogated only one told the truth in both his statements, while the other two each told one true
statement and one lie.
The statements were:
ALBERT :(a)Chander passed the merchandise. (b)Bruce created the diversion.
BRUCE :(a)Albert passed the merchandise. (b)I created the diversion.
CLIVE :(a)I took the goods out of the shop. (b)Bruce passed them over.
Ans: Albert passed the goods.Bruce created the diversion..Clive took the goods out of the shop.
5. Everyday in his business a merchant had to weigh amounts from 1 kg to 121 kgs, to the nearest kg.
What are the minimum number of weight required and how heavy should they be?
Ans: .The minimum number is 5 and they should weigh 1,3,9,27 and 81 kgs.
6. A hotel has 10 storeys.Which floor is above the floor below the floor, below the floor above the floor, below the
floor above the fifth.
Ans: The sixth floor.
7. Seven members sat around a table for three days for a conference.
The member's names were Abhishek, Amol, Ankur, Anurag,Bhuwan ,Vasu and Vikram.
The meetings were chaired by Vikram.
On the first evening members sat around the table alphabetically.
On the following two nights, Vikram arranged the seatings so that he could have Abhishek as near to him as
possible and abesent minded Vasu as far away as he could.
On no evening did any person have sitting next to him a person who had previously been his neighbour.
How did Vikram manage to seat everybody to the best advantage on the second and third evenings?
Ans:
Second evening:Vikram,Ankur,Abhishek,Amol,Vasu,Anurag and Bhuwan.
Third evening :Vikram,Anurag,Abhishek,Vasu,Bhuwan,Ankur,Amol.
8. Two trains start from stations A and B spaced 50 kms apart at the same time and speed.
As the trains start, a bird flies from one train towards the other and on reaching the second train, it flies back to the
first train.This is repeated till the trains collide.
If the speed of the trains is 25 km/h and that of the bird is 100km/h.
How much did the bird travel till the collision.
Ans: 100 kms.
9. Four prisoners escape from a prison.
The prisoners, Mr East, Mr West, Mr South, Mr North head towards different directions after escaping.
The following information of their escape was supplied:
The escape routes were The North Road, South Road, East Road and West Road.
None of the prisoners took the road which was their namesake.
Mr.East did not take the South Road
Mr.West did not the South Road.
The West Road was not taken by Mr.East
What road did each of the prisoners take to make their escape?
Ans: Mr.East took the North Road
Mr.West took the East Road
Mr.North took the South Road
Mr.South took the West Road.
10. Complete the series:
5, 20, 24, 6, 2, 8, ?
Ans: 12 (as 5*4=20, 20+4=24, 24/4=6, 6-4=2, 2*4=8, 8+4=12).
After three years, father's age will be ten years more than twice the son's age.
What is the father's present age.
Ans: 33 years. (2 marks)
2. Find the values of each of the alphabets.
N O O N
S O O N
+ M O O N
----------
J U N E
Ans: 9326 (2 marks)
3. There are 20 poles with a constant distance between each pole
A car takes 24 second to reach the 12th pole.
How much will it take to reach the last pole.
Ans: 41.45 seconds (2 marks)
Let the distance between two poles = x
Hence 11x:24::19x:?
4. A car is travelling at a uniform speed.
The driver sees a milestone showing a 2-digit number.
After travelling for an hour the driver sees another milestone with the same digits in reverse order.
After another hour the driver sees another milestone containing the same two digits.
What is the average speed of the driver.
Ans: 45 kmph (4 marks)
5. The minute and the hour hand of a watch meet every 65 minutes.
How much does the watch lose or gain time and by how much?
Ans: Gains; 5/11 minutes (4 marks)
6. Ram, Shyam and Gumnaam are friends.
Ram is a widower and lives alone and his sister takes care of him.
Shyam is a bachelor and his neice cooks his food and looks after his house.
Gumnaam is married to Gita and lives in large house in the same town.
Gita gives the idea that all of them could stay together in the house and share monthly expenses equally.
During their first month of living together, each person contributed Rs.25.
At the end of the month, it was found that Rs 92 was the expense so the remaining amount was distributed equally
among everyone.
The distribution was such that everyone recieved a whole number of Rupees.
How much did each person recieve?
Ans. Rs 2 (4 marks)
(Hint: Ram's sister, Shyam's neice and Gumnaam's wife are the same person)
7. Four persons A, B, C and D are playing cards.
Each person has one card, laid down on the table below him, which has two different colours on either side.
The colours visible on the table are Red, Green, Red and Blue.
They see the color on the reverse side and give the following comment.
A: Yellow or Green
B: Neither Blue nor Green
C: Blue or Yellow
D: Blue or Yellow
Given that out of the 4 people 2 always lie find out the colours on the cards each person
Infosys Sample
1. Mr.Mathurs jewels have been stolen from his bank locker .
The bank has lockers of 12 people which are arranged in an array of 3 rows and 4 columns like:
1 2 3 4
5 6 7 8
9 10 11 12
The locker belonging to JONES was to the right of BLACK'S locker and directly above MILLAR'S.
BOOTH'S locker was directly above MILLAR'S.
SMITH'S locker was also above GRAY's (though not directly).
GREEN'S locker was directly below SMITH'S.
WILSON'S locker was between that of DAVIS and BOOTH.
MILLAR'S locker was on the bottom row directly to the right of HERD'S.
WHITE'S locker was on the bottom right hand corner in the same column as BOOTH'S.
Which box belonged to Mr.Mathurs?
Ans: Box number 9 belongs to Mr.Mathurs.
2. Fifty minutes ago if it was four times as many minutes past three o'clock,how many minutes is it to six o'clock?
Ans: Twenty six minutes.
3. If a clock takes 7seconds to strike 7, how long will the same clock take to strike 10?
Ans: The clock strikes for the first time at the start and takes 7 seconds for 6 intervals-thus for one interval time
taken=7/6.
Therefore, for 10 seconds there are 9 intervals and time taken is 9*7/6=10 and 1/2 seconds.
4. Three criminals were arrested for shop lifting.
However, when interrogated only one told the truth in both his statements, while the other two each told one true
statement and one lie.
The statements were:
ALBERT :(a)Chander passed the merchandise. (b)Bruce created the diversion.
BRUCE :(a)Albert passed the merchandise. (b)I created the diversion.
CLIVE :(a)I took the goods out of the shop. (b)Bruce passed them over.
Ans: Albert passed the goods.Bruce created the diversion..Clive took the goods out of the shop.
5. Everyday in his business a merchant had to weigh amounts from 1 kg to 121 kgs, to the nearest kg.
What are the minimum number of weight required and how heavy should they be?
Ans: .The minimum number is 5 and they should weigh 1,3,9,27 and 81 kgs.
6. A hotel has 10 storeys.Which floor is above the floor below the floor, below the floor above the floor, below the
floor above the fifth.
Ans: The sixth floor.
7. Seven members sat around a table for three days for a conference.
The member's names were Abhishek, Amol, Ankur, Anurag,Bhuwan ,Vasu and Vikram.
The meetings were chaired by Vikram.
On the first evening members sat around the table alphabetically.
On the following two nights, Vikram arranged the seatings so that he could have Abhishek as near to him as
possible and abesent minded Vasu as far away as he could.
On no evening did any person have sitting next to him a person who had previously been his neighbour.
How did Vikram manage to seat everybody to the best advantage on the second and third evenings?
Ans:
Second evening:Vikram,Ankur,Abhishek,Amol,Vasu,Anurag and Bhuwan.
Third evening :Vikram,Anurag,Abhishek,Vasu,Bhuwan,Ankur,Amol.
8. Two trains start from stations A and B spaced 50 kms apart at the same time and speed.
As the trains start, a bird flies from one train towards the other and on reaching the second train, it flies back to the
first train.This is repeated till the trains collide.
If the speed of the trains is 25 km/h and that of the bird is 100km/h.
How much did the bird travel till the collision.
Ans: 100 kms.
9. Four prisoners escape from a prison.
The prisoners, Mr East, Mr West, Mr South, Mr North head towards different directions after escaping.
The following information of their escape was supplied:
The escape routes were The North Road, South Road, East Road and West Road.
None of the prisoners took the road which was their namesake.
Mr.East did not take the South Road
Mr.West did not the South Road.
The West Road was not taken by Mr.East
What road did each of the prisoners take to make their escape?
Ans: Mr.East took the North Road
Mr.West took the East Road
Mr.North took the South Road
Mr.South took the West Road.
10. Complete the series:
5, 20, 24, 6, 2, 8, ?
Ans: 12 (as 5*4=20, 20+4=24, 24/4=6, 6-4=2, 2*4=8, 8+4=12).
TECHINICAL BIO DATA
multithreading
The ability of an operating system to execute different parts of a program, called threads, simultaneously. The programmer must carefully design the program in such a way that all the threads can run at the same time without interfering with each other
Hyper-Threading
A technology developed by Intel that enables multithreaded software applications to execute threads in parallel on a single multi-core processor instead of processing threads in a linear fashion. Older systems took advantage of dual-processing threading in software by splitting instructions into multiple streams so that more than one processor could act upon them at once
thread
(1) In online discussions, a series of messages that have been posted as replies to each other. A single forum or conference typically contains many threads covering different subjects. By reading each message in a thread, one after the other, you can see how the discussion has evolved. You can start a new thread by posting a message that is not a reply to an earlier message.
(2) In programming, a part of a program that can execute independently of other parts. Operating systems that support multithreading enable programmers to design programs whose threaded parts can execute concurrently.
operating system
The most important program that runs on a computer. Every general-purpose computer must have an operating system to run other programs. Operating systems perform basic tasks, such as recognizing input from the keyboard, sending output to the display screen, keeping track of files and directories on the disk, and controlling peripheral devices such as disk drives and printers.
For large systems, the operating system has even greater responsibilities and powers. It is like a traffic cop -- it makes sure that different programs and users running at the same time do not interfere with each other. The operating system is also responsible for security, ensuring that unauthorized users do not access the system.
Operating systems can be classified as follows:
multi-user : Allows two or more users to run programs at the same time. Some operating systems permit hundreds or even thousands of concurrent users.
multiprocessing : Supports running a program on more than one CPU.
multitasking : Allows more than one program to run concurrently.
multithreading : Allows different parts of a single program to run concurrently.
real time: Responds to input instantly. General-purpose operating systems, such as DOS and UNIX, are not real-time.
Operating systems provide a software platform on top of which other programs, called application programs, can run. The application programs must be written to run on top of a particular operating system. Your choice of operating system, therefore, determines to a great extent the applications you can run. For PCs, the most popular operating systems are DOS, OS/2, and Windows, but others are available, such as Linux.
As a user, you normally interact with the operating system through a set of commands. For example, the DOS operating system contains commands such as COPY and RENAME for copying files and changing the names of files, respectively. The commands are accepted and executed by a part of the operating system called the command processor or command line interpreter. Graphical user interfaces allow you to enter commands by pointing and clicking at objects that appear on the screen.
multiprocessing
(1) Refers to a computer system's ability to support more than one process (program) at the same time. Multiprocessing operating systems enable several programs to run concurrently. UNIX is one of the most widely used multiprocessing systems, but there are many others, including OS/2 for high-end PCs. Multiprocessing systems are much more complicated than single-process systems because the operating system must allocate resources to competing processes in a reasonable manner.
(2) Refers to the utilization of multiple CPUs in a single computer system. This is also called parallel processing.
parallel processing
The simultaneous use of more than one CPU to execute a program. Ideally, parallel processing makes a program run faster because there are more engines (CPUs) running it. In practice, it is often difficult to divide a program in such a way that separate CPUs can execute different portions without interfering with each other.
Most computers have just one CPU, but some models have several. There are even computers with thousands of CPUs. With single-CPU computers, it is possible to perform parallel processing by connecting the computers in a network. However, this type of parallel processing requires very sophisticated software called distributed processing software.
Note that parallel processing differs from multitasking, in which a single CPU executes several programs at once.
Parallel processing is also called parallel computing.
distributed processing
Refers to any of a variety of computer systems that use more than one computer, or processor, to run an application. This includes parallel processing, in which a single computer uses more than one CPU to execute programs. More often, however, distributed processing refers to local-area networks (LANs) designed so that a single program can run simultaneously at various sites. Most distributed processing systems contain sophisticated software that detects idle CPUs on the network and parcels out programs to utilize them.
Another form of distributed processing involves distributed databases, databases in which the data is stored across two or more computer systems. The database system keeps track of where the data is so that the distributed nature of the database is not apparent to users.
multitasking
The ability to execute more than one task at the same time, a task being a program. The terms multitasking and multiprocessing are often used interchangeably, although multiprocessing implies that more than one CPU is involved.
In multitasking, only one CPU is involved, but it switches from one program to another so quickly that it gives the appearance of executing all of the programs at the same time.
There are two basic types of multitasking: preemptive and cooperative. In preemptive multitasking, the operating system parcels out CPU time slices to each program. In cooperative multitasking, each program can control the CPU for as long as it needs it. If a program is not using the CPU, however, it can allow another program to use it temporarily. OS/2, Windows 95, Windows NT, the Amiga operating system and UNIX use preemptive multitasking, whereas Microsoft Windows 3.x and the MultiFinder (for Macintosh computers) use cooperative multitasking.
cooperative multitasking
A type of multitasking in which the process currently controlling the CPU must offer control to other processes. It is called cooperative because all programs must cooperate for it to work. If one program does not cooperate, it can hog the CPU. In contrast, preemptive multitasking forces applications to share the CPU whether they want to or not. Versions 8.0-9.2.2 of Macintosh OS and Windows 3.x operating systems are based on cooperative multitasking, whereas UNIX, Windows 95, Windows NT, OS/2, and later versions of Mac OS are based on preemptive multitasking
semaphore
A hardware or software flag. In multitasking systems, a semaphore is a variable with a value that indicates the status of a common resource. It's used to lock the resource that is being used. A process needing the resource checks the semaphore to determine the resource's status and then decides how to proceed.
deadlock
A condition that occurs when two processes are each waiting for the other to complete before proceeding. The result is that both processes hang. Deadlocks occur most commonly in multitasking and client/server environments. Ideally, the programs that are deadlocked, or the operating system, should resolve the deadlock, but this doesn't always happen.
A deadlock is also called a deadly embrace.
The 7 Layers of the OSI Model
The OSI, or Open System Interconnection, model defines a networking framework for implementing protocols in seven layers. Control is passed from one layer to the next, starting at the application layer in one station, proceeding to the bottom layer, over the channel to the next station and back up the hierarchy.
Application
(Layer 7) This layer supports application and end-user processes. Communication partners are identified, quality of service is identified, user authentication and privacy are considered, and any constraints on data syntax are identified. Everything at this layer is application-specific. This layer provides application services for file transfers, e-mail, and other network software services. Telnet and FTP are applications that exist entirely in the application level. Tiered application architectures are part of this layer.
Presentation
(Layer 6) This layer provides independence from differences in data representation (e.g., encryption) by translating from application to network format, and vice versa. The presentation layer works to transform data into the form that the application layer can accept. This layer formats and encrypts data to be sent across a network, providing freedom from compatibility problems. It is sometimes called the syntax layer.
Session
(Layer 5) This layer establishes, manages and terminates connections between applications. The session layer sets up, coordinates, and terminates conversations, exchanges, and dialogues between the applications at each end. It deals with session and connection coordination.
Transport
(Layer 4) This layer provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. It ensures complete data transfer.
Network
(Layer 3) This layer provides switching and routing technologies, creating logical paths, known as virtual circuits, for transmitting data from node to node. Routing and forwarding are functions of this layer, as well as addressing, internetworking, error handling, congestion control and packet sequencing.
Data Link
(Layer 2) At this layer, data packets are encoded and decoded into bits. It furnishes transmission protocol knowledge and management and handles errors in the physical layer, flow control and frame synchronization. The data link layer is divided into two sublayers: The Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. The MAC sublayer controls how a computer on the network gains access to the data and permission to transmit it. The LLC layer controls frame synchronization, flow control and error checking.
Physical
(Layer 1) This layer conveys the bit stream - electrical impulse, light or radio signal -- through the network at the electrical and mechanical level. It provides the hardware means of sending and receiving data on a carrier, including defining cables, cards and physical aspects. Fast Ethernet, RS232, and ATM are protocols with physical layer components.
applet
A program designed to be executed from within another application. Unlike an application, applets cannot be executed directly from the operating system. With the growing popularity of OLE (object linking and embedding), applets are becoming more prevalent. A well-designed applet can be invoked from many different applications.
Web browsers, which are often equipped with Java virtual machines, can interpret applets from Web servers. Because applets are small in files size, cross-platform compatible, and highly secure (can't be used to access users' hard drives), they are ideal for small Internet applications accessible from a browser.
J2EE
Short for Java 2 Platform Enterprise Edition. J2EE is a platform-independent, Java-centric environment from Sun for developing, building and deploying Web-based enterprise applications online. The J2EE platform consists of a set of services, APIs, and protocols that provide the functionality for developing multitiered, Web-based applications.
Some of the key features and services of J2EE:
At the client tier, J2EE supports pure HTML, as well as Java applets or applications. It relies on Java Server Pages and servlet code to create HTML or other formatted data for the client.
Enterprise JavaBeans (EJBs) provide another layer where the platform's logic is stored. An EJB server provides functions such as threading, concurrency, security and memory management. These services are transparent to the author.
Java Database Connectivity (JDBC), which is the Java equivalent to ODBC, is the standard interface for Java databases.
The Java servlet API enhances consistency for developers without requiring a graphical user interface.
MAC Layer
The Media Access Control Layer is one of two sublayers that make up the Data Link Layer of the OSI model. The MAC layer is responsible for moving data packets to and from one Network Interface Card (NIC) to another across a shared channel.
See a breakdown of the seven OSI layers in the Quick Reference section of Webopedia.
The MAC sublayer uses MAC protocols to ensure that signals sent from different stations across the same channel don't collide.
Different protocols are used for different shared networks, such as Ethernets, Token Rings, Token Buses, and WANs.
flow control
(1) In communications, the process of adjusting the flow of data from one device to another to ensure that the receiving device can handle all of the incoming data. This is particularly important where the sending device is capable of sending data much faster than the receiving device can receive it.
There are many flow control mechanisms. One of the most common flow control protocols for asynchronous communication is called xon-xoff. In this case, the receiving device sends a an xoff message to the sending device when its buffer is full. The sending device then stops sending data. When the receiving device is ready to receive more data, it sends an xon signal.
Flow control can be implemented in hardware or software, or a combination of both.
(2) In programming, the statements and other constructs that control the order in which operations are executed. For example, common looping statements such as for…next and while are known as flow control statements. Branching statements, such as if…then are also part of a programming language's flow control mechanism.
100Base-T
A networking standard that supports data transfer rates up to 100 Mbps (100 megabits per second). 100BASE-T is based on the older Ethernet standard. Because it is 10 times faster than Ethernet, it is often referred to as Fast Ethernet. Officially, the 100BASE-T standard is IEEE 802.3u.
Like Ethernet, 100BASE-T is based on the CSMA/CD LAN access method. There are several different cabling schemes that can be used with 100BASE-T, including:
Telnet
(tel´net) (n.) A terminal emulation program for TCP/IP networks such as the Internet. The Telnet program runs on your computer and connects your PC to a server on the network. You can then enter commands through the Telnet program and they will be executed as if you were entering them directly on the server console. This enables you to control the server and communicate with other servers on the network. To start a Telnet session, you must log in to a server by entering a valid username and password. Telnet is a common way to remotely control Web servers.
CSMA/CD
Short for Carrier Sense Multiple Access / Collision Detection, a set of rules determining how network devices respond when two devices attempt to use a data channel simultaneously (called a collision). Standard Ethernet networks use CSMA/CD. This standard enables devices to detect a collision. After detecting a collision, a device waits a random delay time and then attempts to re-transmit the message. If the device detects a collision again, it waits twice as long to try to re-transmit the message. This is known as exponential back off.
CSMA/CD is a type of contention protocol.
distributed processing
Refers to any of a variety of computer systems that use more than one computer, or processor, to run an application. This includes parallel processing, in which a single computer uses more than one CPU to execute programs. More often, however, distributed processing refers to local-area networks (LANs) designed so that a single program can run simultaneously at various sites. Most distributed processing systems contain sophisticated software that detects idle CPUs on the network and parcels out programs to utilize them.
Another form of distributed processing involves distributed databases, databases in which the data is stored across two or more computer systems. The database system keeps track of where the data is so that the distributed nature of the database is not apparent to users.
FTP
Short for File Transfer Protocol, the protocol for exchanging files over the Internet. FTP works in the same way as HTTP for transferring Web pages from a server to a user's browser and SMTP for transferring electronic mail across the Internet in that, like these technologies, FTP uses the Internet's TCP/IP protocols to enable data transfer.
FTP is most commonly used to download a file from a server using the Internet or to upload a file to a server (e.g., uploading a Web page file to a server).
TCP/IP
(pronounced as separate letters) Short for Transmission Control Protocol/Internet Protocol, the suite of communications protocols used to connect hosts on the Internet. TCP/IP uses several protocols, the two main ones being TCP and IP. TCP/IP is built into the UNIX operating system and is used by the Internet, making it the de facto standard for transmitting data over networks. Even network operating systems that have their own protocols, such as Netware, also support TCP/IP.
switch
(1) In networks, a device that filters and forwards packets between LAN segments. Switches operate at the data link layer (layer 2) and sometimes the network layer (layer 3) of the OSI Reference Model and therefore support any packet protocol. LANs that use switches to join segments are called switched LANs or, in the case of Ethernet networks, switched Ethernet LANs.
(2) A small lever or button. The switches on the back of printers and on expansion boards are called DIP switches. A switch that has just two positions is called a toggle switch.
(3) Another word for option or parameter -- a symbol that you add to a command to modify the command's behavior.
protocol
An agreed-upon format for transmitting data between two devices. The protocol determines the following:
the type of error checking to be used
data compression method, if any
how the sending device will indicate that it has finished sending a message
how the receiving device will indicate that it has received a message
There are a variety of standard protocols from which programmers can choose. Each has particular advantages and disadvantages; for example, some are simpler than others, some are more reliable, and some are faster.
From a user's point of view, the only interesting aspect about protocols is that your computer or device must support the right ones if you want to communicate with other computers. The protocol can be implemented either in hardware or in software.
HTTP
Short for HyperText Transfer Protocol, the underlying protocol used by the World Wide Web. HTTP defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands. For example, when you enter a URL in your browser, this actually sends an HTTP command to the Web server directing it to fetch and transmit the requested Web page.
The other main standard that controls how the World Wide Web works is HTML, which covers how Web pages are formatted and displayed.
HTTP is called a stateless protocol because each command is executed independently, without any knowledge of the commands that came before it. This is the main reason that it is difficult to implement Web sites that react intelligently to user input. This shortcoming of HTTP is being addressed in a number of new technologies, including ActiveX, Java, JavaScript and cookies.
Also see The Difference Between FTP and HTTP in the Did You Know . . . ? section of Webopedia.
SMTP
(pronounced as separate letters) Short for Simple Mail Transfer Protocol, a protocol for sending e-mail messages between servers. Most e-mail systems that send mail over the Internet use SMTP to send messages from one server to another; the messages can then be retrieved with an e-mail client using either POP or IMAP. In addition, SMTP is generally used to send messages from a mail client to a mail server. This is why you need to specify both the POP or IMAP server and the SMTP server when you configure your e-mail application.
routing
(n.) In internetworking, the process of moving a packet of data from source to destination. Routing is usually performed by a dedicated device called a router. Routing is a key feature of the Internet because it enables messages to pass from one computer to another and eventually reach the target machine. Each intermediary computer performs routing by passing along the message to the next computer. Part of this process involves analyzing a routing table to determine the best path.
Routing is often confused with bridging, which performs a similar function. The principal difference between the two is that bridging occurs at a lower level and is therefore more of a hardware function whereas routing occurs at a higher level where the software component is more important. And because routing occurs at a higher level, it can perform more complex analysis to determine the optimal path for the packet.
An application that runs on a personal computer or workstation and enables you to send, receive and organize e-mail. It's called a client because e-mail systems are based on a client-server architecture. Mail is sent from many clients to a central server, which re-routes the mail to its intended destination.
The Difference Between FTP and HTTP
File Transfer Protocol, or FTP, is a protocol used to upload files from a workstation to a FTP server or download files from a FTP server to a workstation. It is the way that files get transferred from one device to another in order for the files to be available on the Internet. When ftp appears in a URL it means that the user is connecting to a file server and not a Web server and that some form of file transfer is going to take place. Most FTP servers require the user to log on to the server in order to transfer files.
In contrast, Hyper Text Transfer Protocol, or HTTP, is a protocol used to transfer files from a Web server onto a browser in order to view a Web page that is on the Internet. Unlike FTP, where entire files are transferred from one device to another and copied into memory, HTTP only transfers the contents of a web page into a browser for viewing. FTP is a two-way system as files are transferred back and forth between server and workstation. HTTP is a one-way system as files are transported only from the server onto the workstation's browser. When http appears in a URL it means that the user is connecting to a Web server and not a file server. The files are transferred but not downloaded, therefore not copied into the memory of the receiving device.
Web server
A computer that delivers (serves up) Web pages. Every Web server has an IP address and possibly a domain name. For example, if you enter the URL http://www.pcwebopedia.com/index.html in your browser, this sends a request to the server whose domain name is pcwebopedia.com. The server then fetches the page named index.html and sends it to your browser.
Any computer can be turned into a Web server by installing server software and connecting the machine to the Internet. There are many Web server software applications, including public domain software from NCSA and Apache, and commercial packages from Microsoft, Netscape and others.
gateway
(n.) (1) A node on a network that serves as an entrance to another network. In enterprises, the gateway is the computer that routes the traffic from a workstation to the outside network that is serving the Web pages. In homes, the gateway is the ISP that connects the user to the internet.
In enterprises, the gateway node often acts as a proxy server and a firewall. The gateway is also associated with both a router, which use headers and forwarding tables to determine where packets are sent, and a switch, which provides the actual path for the packet in and out of the gateway.
(2) A computer system located on earth that switches data signals and voice signals between satellites and terrestrial networks.
(3) An earlier term for router, though now obsolete in this sense as router is commonly used
ActiveX control
A control using ActiveX technologies. An ActiveX control can be automatically downloaded and executed by a Web browser. ActiveX is not a programming language, but rather a set of rules for how applications should share information. Programmers can develop ActiveX controls in a variety of languages, including C, C++, Visual Basic, and Java.
An ActiveX control is similar to a Java applet. Unlike Java applets, however, ActiveX controls have full access to the Windows operating system. This gives them much more power than Java applets, but with this power comes a certain risk that the applet may damage software or data on your machine. To control this risk, Microsoft developed a registration system so that browsers can identify and authenticate an ActiveX control before downloading it. Another difference between Java applets and ActiveX controls is that Java applets can be written to run on all platforms, whereas ActiveX controls are currently limited to Windows environments.
Related to ActiveX is a scripting language called VBScript that enables Web authors to embed interactive elements in HTML documents.
platform
The underlying hardware or software for a system. For example, the platform might be an Intel 80486 processor running DOS Version 6.0. The platform could also be UNIX machines on an Ethernet network.
The platform defines a standard around which a system can be developed. Once the platform has been defined, software developers can produce appropriate software and managers can purchase appropriate hardware and applications. The term is often used as a synonym of operating system.
The term cross-platform refers to applications, formats, or devices that work on different platforms. For example, a cross-platform programming environment enables a programmer to develop programs for many platforms at once.
script
Another term for macro or batch file, a script is a list of commands that can be executed without user interaction. A script language is a simple programming language with which you can write scripts.
Apple Computer uses the term script to refer to programs written in its HyperCard or AppleScript language.
Application Server -
A software program that handles all application operations between users and an organization's backend business applications or databases. Application servers are typically used for complex transaction-based applications. To support high-end needs, an application server has to have built-in redundancy, monitors for high-availability, high-performance distributed application services and support for complex database access. These are the leading Java App Servers:
Apache/Jakarta Tomcat (the open source, and official reference implementation of the Java Servlet and JSP technologies) BEA WebLogic IBM WebSphere iPlanet Application Server Oracle Application Server
Enterprise JavaBeans (EJB) - A Java API developed by Sun Microsystems that defines a component architecture for multi-tier client/server systems. EJB systems allow developers to focus on the actual business architecture of the model, rather than worry about endless amounts of programming and coding needed to connect all the working parts. This task is left to EJB server vendors. Developers just design (or purchase) the needed EJB components and arrange them on the server. Because EJB systems are written in Java, they are platform independent. Being object oriented, they can be implemented into existing systems with little or no recompiling and configuring. (from Webopedia)
Java - A high-level object-oriented programming language developed by Sun Microsystems. Java is similar to C++, but simplified to eliminate language features that cause common programming errors. Java source code files (files with a .java extension) are compiled into a format called bytecode (files with a .class extension), which can then be executed by a Java interpreter. Compiled Java code can run on most computers because Java interpreters and runtime environments, known as Java Virtual Machines (VMs), exist for most operating systems, including UNIX, the Macintosh OS, and Windows. Bytecode can also be converted directly into machine language instructions by a just-in-time compiler (JIT).
Java 2 Platform Enterprise Edition (J2EE) - J2EE is a platform-independent, Java-centric environment from Sun for developing, building and deploying Web-based enterprise applications online. The J2EE platform consists of a set of services, APIs, and protocols that provide the functionality for developing multitiered, Web-based applications.
Java Applet - A program designed to be executed from within another application. Unlike an application, applets cannot be executed directly from the operating system. Applets became more prevalent with the popularity growth of OLE (object linking and embedding). A well-designed applet can be invoked from many different applications. Web browsers, which are often equipped with Java virtual machines, can interpret applets from Web servers. Because applets are small in file size, cross-platform compatible, and highly secure (can't be used to access users' hard drives), they are ideal for small Internet applications accessible from a browser. (from Webopedia)
Java Beans - A specification developed by Sun Microsystems that defines how Java objects interact. An object that conforms to this specification is called a JavaBean, and is similar to an ActiveX control. It can be used by any application that understands the JavaBeans format. The principal difference between ActiveX controls and JavaBeans are that ActiveX controls can be developed in any programming language but executed only on a Windows platform, whereas JavaBeans can be developed only in Java, but can run on any platform. (from Webopedia)
Java Database Connectivity (JDBC) - A Java API that enables Java programs to execute SQL statements. This allows Java programs to interact with any SQL-compliant database. Since nearly all relational database management systems (DBMSs) support SQL, and because Java itself runs on most platforms, JDBC makes it possible to write a single database application that can run on different platforms and interact with different DBMSs. (from Webopedia)
Java Server Pages (JSP) - A server-side technology that serve as an extension to the Java servlet technology that was developed by Sun as an alternative to Microsoft's ASPs (Active Server Pages). JSPs have dynamic scripting capability that works in tandem with HTML code, separating the page logic from the static elements -- the actual design and display of the page. Embedded in the HTML page, the Java source code and its extensions help make the HTML more functional, being used in dynamic database queries, for example. JSPs are not restricted to any specific platform or server. (from Webopedia)
Java Servlet - An applet that runs on a server. The term usually refers to a Java applet that runs within a Web server environment. This is analogous to a Java applet that runs within a Web browser environment. Java servlets are becoming increasingly popular as an alternative to CGI programs. The biggest difference between the two is that a Java applet is persistent. This means that once it is started, it stays in memory and can fulfill multiple requests. In contrast, a CGI program disappears once it has fulfilled a request. The persistence of Java applets makes them faster because there's no wasted time in setting up and tearing down the process. (from Webopedia)
macro
(1) A symbol, name, or key that represents a list of commands, actions, or keystrokes. Many programs allow you to create macros so that you can enter a single character or word to perform a whole series of actions. Suppose, for example, that you are editing a file and want to indent every third line five spaces. If your word processor supports macros, you can create one that consists of the following keystrokes:
Move Cursor to Beginning of Line
Move Cursor Down 1 Line
Move Cursor Down 1 Line
Move Cursor Down 1 Line
Insert 5 Spaces
Now you can enter the name of the macro, and the word processor will perform all these commands at once.
You can also use macros to enter words or phrases that you use frequently. For example, you could define a macro to contain all the keystrokes necessary to begin a letter -- your name, address, and a code that inserts the current date. Then, whenever you write a letter, you just press the macro key to include the letter header.
In a way, macros are like simple programs or batch files. Some applications support sophisticated macros that even allow you to use variables and flow control structures such as loops.
(2) In dBASE programs, a macro is a variable that points to another variable where the data is actually stored. In most other applications, this would be called a link.
batch file Last modified: Monday, September 01, 1997
A file that contains a sequence, or batch, of commands. Batch files are useful for storing sets of commands that are always executed together because you can simply enter the name of the batch file instead of entering each command individually.
In DOS systems, batch files end with a.BAT extension. For example, the following DOS batch file prints the date and time and sets the prompt to GO>:
date
time
prompt [GO>]
Whenever you boot a DOS -based computer, the system automatically executes the batch file named AUTOEXEC.BAT, if it exists.Many operating systems use the terms command file or shell script in place of batch file.
cross-platform Last modified: Sunday, September 01, 1996
Refers to the capability of software or hardware to run identically on different platforms. Many applications for Windows and the Macintosh, for example, now produce binary-compatible files, which means that users can switch from one platform to the other without converting their data to a new format.
Cross-platform computing is becoming increasingly important as local-area networks become better at linking machines of different types.
ISP
Short for Internet Service Provider, a company that provides access to the Internet. For a monthly fee, the service provider gives you a software package, username, password and access phone number. Equipped with a modem, you can then log on to the Internet and browse the World Wide Web and USENET, and send and receive e-mail.
In addition to serving individuals, ISPs also serve large companies, providing a direct connection from the company's networks to the Internet. ISPs themselves are connected to one another through Network Access Points (NAPs).
ISPs are also called IAPs (Internet Access Providers).
proxy server
A server that sits between a client application, such as a Web browser, and a real server. It intercepts all requests to the real server to see if it can fulfill the requests itself. If not, it forwards the request to the real server.
Proxy servers have two main purposes:
Improve Performance: Proxy servers can dramatically improve performance for groups of users. This is because it saves the results of all requests for a certain amount of time. Consider the case where both user X and user Y access the World Wide Web through a proxy server. First user X requests a certain Web page, which we'll call Page 1. Sometime later, user Y requests the same page. Instead of forwarding the request to the Web server where Page 1 resides, which can be a time-consuming operation, the proxy server simply returns the Page 1 that it already fetched for user X. Since the proxy server is often on the same network as the user, this is a much faster operation. Real proxy servers support hundreds or thousands of users. The major online services such as Compuserve and America Online, for example, employ an array of proxy servers.
Filter Requests: Proxy servers can also be used to filter requests. For example, a company might use a proxy server to prevent its employees from accessing a specific set of Web sites.
See the Server Types page in the quick reference section of Webopedia for a comparison of server types.
World Wide Web
A system of Internet servers that support specially formatted documents. The documents are formatted in a markup language called HTML (HyperText Markup Language) that supports links to other documents, as well as graphics, audio, and video files. This means you can jump from one document to another simply by clicking on hot spots. Not all Internet servers are part of the World Wide Web. There are several applications called Web browsers that make it easy to access the World Wide Web; Two of the most popular being Netscape Navigator and Microsoft's Internet Explorer.
World Wide Web is not synonymous with the Internet.
Compatible
(n) Indicates that a product can work with or is equivalent to another, better-known product. The term is often used as a shorthand for IBM-compatible PC , a computer that is compatible with an IBM PC. Another term for a compatible is clone. (adj) The ability of one device or program to work with another device or program. The term compatible implies different degrees of partnership. For example, a printer and a computer are said to be compatible if they can be connected to each other. An IBM compatible PC, on the other hand, is a computer that can run the same software as an IBM PC. Compatibility of two devices, such as printers, usually means that they react to software commands in the same way. Some printers achieve compatibility by tricking the software into believing that the printer is a different machine. This is called emulation. Be aware, however, that hardware compatibility does not always extend to expansion slots. For example, two compatible printers may not accept the same font cartridges. Complete hardware compatibility is denoted by the term plug compatible.Software products are compatible if they use the same data formats. For example, many programs are compatible with dBASE. This means that the files they produce can easily be transformed into a dBASE database or that they can import dBASE files.
API
Abbreviation of application program interface, a set of routines, protocols, and tools for building software applications. A good API makes it easier to develop a program by providing all the building blocks. A programmer puts the blocks together. Most operating environments, such as MS-Windows, provide an API so that programmers can write applications consistent with the operating environment. Although APIs are designed for programmers, they are ultimately good for users because they guarantee that all programs using a common API will have similar interfaces. This makes it easier for users to learn new programs.
ODBC
(pronounced as separate letters) Short for Open DataBase Connectivity, a standard database access method developed by the SQL Access group in 1992. The goal of ODBC is to make it possible to access any data from any application, regardless of which database management system (DBMS) is handling the data. ODBC manages this by inserting a middle layer, called a database driver , between an application and the DBMS. The purpose of this layer is to translate the application's data queries into commands that the DBMS understands. For this to work, both the application and the DBMS must be ODBC-compliant -- that is, the application must be capable of issuing ODBC commands and the DBMS must be capable of responding to them. Since version 2.0, the standard supports SAG SQL.
servlet
A small program that runs on a server. The term usually refers to a Java applet that runs within a Web server environment. This is analogous to a Java applet that runs within a Web browser environment.
Java servlets are becoming increasingly popular as an alternative to CGI programs. The biggest difference between the two is that a Java applet is persistent. This means that once it is started, it stays in memory and can fulfill multiple requests. In contrast, a CGI program disappears once it has fulfilled a request. The persistence of Java applets makes them faster because there's no wasted time in setting up and tearing down the process.
java
A high-level programming language developed by Sun Microsystems. Java was originally called OAK, and was designed for handheld devices and set-top boxes. Oak was unsuccessful so in 1995 Sun changed the name to Java and modified the language to take advantage of the burgeoning World Wide Web.
Java is an object-oriented language similar to C++, but simplified to eliminate language features that cause common programming errors. Java source code files (files with a .java extension) are compiled into a format called bytecode (files with a .class extension), which can then be executed by a Java interpreter. Compiled Java code can run on most computers because Java interpreters and runtime environments, known as Java Virtual Machines (VMs), exist for most operating systems, including UNIX, the Macintosh OS, and Windows. Bytecode can also be converted directly into machine language instructions by a just-in-time compiler (JIT).
Java is a general purpose programming language with a number of features that make the language well suited for use on the World Wide Web. Small Java applications are called Java applets and can be downloaded from a Web server and run on your computer by a Java-compatible Web browser, such as Netscape Navigator or Microsoft Internet Explorer.
database management system Last modified: Wednesday, December 03, 2003
A collection of programs that enables you to store, modify, and extract information from a database. There are many different types of DBMSs, ranging from small systems that run on personal computers to huge systems that run on mainframes. The following are examples of database applications:
computerized library systems
automated teller machines
flight reservation systems
computerized parts inventory systems
From a technical standpoint, DBMSs can differ widely. The terms relational, network, flat, and hierarchical all refer to the way a DBMS organizes information internally. The internal organization can affect how quickly and flexibly you can extract information.
Requests for information from a database are made in the form of a query, which is a stylized question. For example, the query SELECT ALL WHERE NAME = "SMITH" AND AGE > 35
requests all records in which the NAME field is SMITH and the AGE field is greater than 35. The set of rules for constructing queries is known as a query language. Different DBMSs support different query languages, although there is a semi-standardized query language called SQL (structured query language). Sophisticated languages for managing database systems are called fourth-generation languages, or 4GLs for short.
The information from a database can be presented in a variety of formats. Most DBMSs include a report writer program that enables you to output data in the form of a report. Many DBMSs also include a graphics component that enables you to output information in the form of graphs and charts.
SQL
Abbreviation of structured query language, and pronounced either see-kwell or as separate letters. SQL is a standardized query language for requesting information from a database. The original version called SEQUEL (structured English query language) was designed by an IBM research center in 1974 and 1975. SQL was first introduced as a commercial database system in 1979 by Oracle Corporation.
Historically, SQL has been the favorite query language for database management systems running on minicomputers and mainframes. Increasingly, however, SQL is being supported by PC database systems because it supports distributed databases (databases that are spread out over several computer systems). This enables several users on a local-area network to access the same database simultaneously.
Although there are different dialects of SQL, it is nevertheless the closest thing to a standard query language that currently exists. In 1986, ANSI approved a rudimentary version of SQL as the official standard, but most versions of SQL since then have included many extensions to the ANSI standard. In 1991, ANSI updated the standard. The new standard is known as SAG SQL.
database
(1) Often abbreviated DB. A collection of information organized in such a way that a computer program can quickly select desired pieces of data. You can think of a database as an electronic filing system.
Traditional databases are organized by fields, records, and files. A field is a single piece of information; a record is one complete set of fields; and a file is a collection of records. For example, a telephone book is analogous to a file. It contains a list of records, each of which consists of three fields: name, address, and telephone number.
An alternative concept in database design is known as Hypertext. In a Hypertext database, any object, whether it be a piece of text, a picture, or a film, can be linked to any other object. Hypertext databases are particularly useful for organizing large amounts of disparate information, but they are not designed for numerical analysis.
To access information from a database, you need a database management system (DBMS). This is a collection of programs that enables you to enter, organize, and select data in a database.
(2) Increasingly, the term database is used as shorthand for database management system.
CGI Last modified: Tuesday, March 02, 2004
Abbreviation of Common Gateway Interface, a specification for transferring information between a World Wide Web server and a CGI program. A CGI program is any program designed to accept and return data that conforms to the CGI specification. The program could be written in any programming language, including C, Perl, Java, or Visual Basic.
CGI programs are the most common way for Web servers to interact dynamically with users. Many HTML pages that contain forms, for example, use a CGI program to process the form's data once it's submitted. Another increasingly common way to provide dynamic feedback for Web users is to include scripts or programs that run on the user's machine rather than the Web server. These programs can be Java applets, Java scripts, or ActiveX controls. These technologies are known collectively as client-side solutions, while the use of CGI is a server-side solution because the processing occurs on the Web server.
One problem with CGI is that each time a CGI script is executed, a new process is started. For busy Web sites, this can slow down the server noticeably. A more efficient solution, but one that it is also more difficult to implement, is to use the server's API, such as ISAPI or NSAPI. Another increasingly popular solution is to use Java servlets.
mainframe
A very large and expensive computer capable of supporting hundreds, or even thousands, of users simultaneously. In the hierarchy that starts with a simple microprocessor (in watches, for example) at the bottom and moves to supercomputers at the top, mainframes are just below supercomputers. In some ways, mainframes are more powerful than supercomputers because they support more simultaneous programs. But supercomputers can execute a single program faster than a mainframe.
10.2 Pointers and Arrays; Pointer Arithmetic
[This section corresponds to K&R Sec. 5.3]
Pointers do not have to point to single variables. They can also point at the cells of an array. For example, we can write
int *ip;
int a[10];
ip = &a[3];
and we would end up with ip pointing at the fourth cell of the array a (remember, arrays are 0-based, so a[0] is the first cell). We could illustrate the situation like this:
We'd use this ip just like the one in the previous section: *ip gives us what ip points to, which in this case will be the value in a[3].
Once we have a pointer pointing into an array, we can start doing pointer arithmetic. Given that ip is a pointer to a[3], we can add 1 to ip:
ip + 1
What does it mean to add one to a pointer? In C, it gives a pointer to the cell one farther on, which in this case is a[4]. To make this clear, let's assign this new pointer to another pointer variable:
ip2 = ip + 1;
Now the picture looks like this:
If we now do
*ip2 = 4;
we've set a[4] to 4. But it's not necessary to assign a new pointer value to a pointer variable in order to use it; we could also compute a new pointer value and use it immediately:
*(ip + 1) = 5;
In this last example, we've changed a[4] again, setting it to 5. The parentheses are needed because the unary ``contents of'' operator * has higher precedence (i.e., binds more tightly than) the addition operator. If we wrote *ip + 1, without the parentheses, we'd be fetching the value pointed to by ip, and adding 1 to that value. The expression *(ip + 1), on the other hand, accesses the value one past the one pointed to by ip.
Given that we can add 1 to a pointer, it's not surprising that we can add and subtract other numbers as well. If ip still points to a[3], then
*(ip + 3) = 7;
sets a[6] to 7, and
*(ip - 2) = 4;
sets a[1] to 4.
Up above, we added 1 to ip and assigned the new pointer to ip2, but there's no reason we can't add one to a pointer, and change the same pointer:
ip = ip + 1;
Now ip points one past where it used to (to a[4], if we hadn't changed it in the meantime). The shortcuts we learned in a previous chapter all work for pointers, too: we could also increment a pointer using
ip += 1;
or
ip++;
Of course, pointers are not limited to ints. It's quite common to use pointers to other types, especially char. Here is the innards of the mystrcmp function we saw in a previous chapter, rewritten to use pointers. (mystrcmp, you may recall, compares two strings, character by character.)
char *p1 = &str1[0], *p2 = &str2[0];
while(1)
{
if(*p1 != *p2)
return *p1 - *p2;
if(*p1 == '\0' || *p2 == '\0')
return 0;
p1++;
p2++;
}
The autoincrement operator ++ (like its companion, --) makes it easy to do two things at once. We've seen idioms like a[i++] which accesses a[i] and simultaneously increments i, leaving it referencing the next cell of the array a. We can do the same thing with pointers: an expression like *ip++ lets us access what ip points to, while simultaneously incrementing ip so that it points to the next element. The preincrement form works, too: *++ip increments ip, then accesses what it points to. Similarly, we can use notations like *ip-- and *--ip.
As another example, here is the strcpy (string copy) loop from a previous chapter, rewritten to use pointers:
char *dp = &dest[0], *sp = &src[0];
while(*sp != '\0')
*dp++ = *sp++;
*dp = '\0';
(One question that comes up is whether the expression *p++ increments p or what it points to. The answer is that it increments p. To increment what p points to, you can use (*p)++.)
When you're doing pointer arithmetic, you have to remember how big the array the pointer points into is, so that you don't ever point outside it. If the array a has 10 elements, you can't access a[50] or a[-1] or even a[10] (remember, the valid subscripts for a 10-element array run from 0 to 9). Similarly, if a has 10 elements and ip points to a[3], you can't compute or access ip + 10 or ip - 5. (There is one special case: you can, in this case, compute, but not access, a pointer to the nonexistent element just beyond the end of the array, which in this case is &a[10]. This becomes useful when you're doing pointer comparisons, which we'll look at next.)
Using an array name as a pointer
An array name is really a pointer to the first element of the array. For example, the following is legal.
int b[100]; // b is an array of 100 ints.
int* p; // p is a pointer to an int.
p = b; // Assigns the address of first element of b to p.
p = &b[0]; // Exactly the same assignment as above.
Array name is a const pointer
When you declare an array, the name is a pointer, which cannot be altered. In the previous example, you could never make this assignment.
p = b; // Legal -- p is not a constant.
b = p; // ILLEGAL because b is a constant, altho the correct type.
Pointer arithmetic
"Meaningful" arithmetic operations are allowed on pointers.
· Add or subtract integers to/from a pointer. The result is a pointer. Subtract two pointers to the same type. The result is an int. Multiplying, adding two pointers, etc. don't make sense.
Pointer addition and element size
When you add an integer to a pointer, the integer is multiplied by the element size of the type that the pointer points to.
// Assume sizeof(int) is 4.
int b[100]; // b is an array of 100 ints.
int* p; // p is a a pointer to an int.
p = b; // Assigns address of first element of b. Ie, &b[0]
p = p + 1; // Adds 4 to p (4 == 1 * sizeof(int)). Ie, &b[1]
Fifth Normal Form (5NF)
The normal forms discussed so far required that the given relation R if not in the given normal form be decomposed in two relations to meet the requirements of the normal form. In some rare cases, a relation can have problems like redundant information and update anomalies because of it but cannot be decomposed in two relations to remove the problems. In such cases it may be possible to decompose the relation in three or more relations using the 5NF.
The fifth normal form deals with join-dependencies which is a generalisation of the MVD. The aim of fifth normal form is to have relations that cannot be decomposed further. A relation in 5NF cannot be constructed from several smaller relations.
A relation R satisfies join dependency (R1, R2, ..., Rn) if and only if R is equal to the join of
R1, R2, ..., Rn where Ri are subsets of the set of attributes of R.
A relation R is in 5NF (or project-join normal form, PJNF) if for all join dependencies at least one of the following holds.
(a) (R1, R2, ..., Rn) is a trivial join-dependency (that is, one of Ri is R)
(b) Every Ri is a candidate key for R.
An example of 5NF can be provided by the example below that deals with departments, subjects and students.
dept subject student
Comp. Sc.
Mathematics
Comp. Sc.
Comp. Sc.
Physics
Chemistry CP1000
MA1000
CP2000
CP3000
PH1000
CH2000 John Smith
John Smith
Arun Kumar
Reena Rani
Raymond Chew
Albert Garcia
The above relation says that Comp. Sc. offers subjects CP1000, CP2000 and CP3000 which are taken by a variety of students. No student takes all the subjects and no subject has all students enrolled in it and therefore all three fields are needed to represent the information.
The above relation does not show MVDs since the attributes subject and student are not independent; they are related to each other and the pairings have significant information in them. The relation can therefore not be decomposed in two relations
(dept, subject), and
(dept, student)
without loosing some important information. The relation can however be decomposed in the following three relations
(dept, subject), and
(dept, student)
(subject, student)
and now it can be shown that this decomposition is lossless.
Multivalued Normalisation -Fourth Normal Form
We have considered an example of Programmer(Emp name, qualification, languages) and discussed the problems that may arise if the relation is not normalised further. We also saw how the relation could be decomposed into P1(Emp name, qualifications) and P2(Emp name, languages) to overcome these problems. The decomposed relations are in fourth normal form (4NF) which we shall now define.
We are now ready to define 4NF. A relation R is in 4NF if, whenever a multivalued dependency
X -> Y holds then either
(a) the dependency is trivial, or
(b) X is a candidate key for R.
As noted earlier, the dependency X ->> ø or X ->> Y in a relation R (X, Y) is trivial since they must hold for all R (X, Y). Similarly (X, Y) -> Z must hold for all relations R (X, Y, Z) with only three attributes.
In fourth normal form, we have a relation that has information about only one entity. If a relation has more than one multivalue attribute, we should decompose it to remove difficulties with multivalued facts.
Intuitively R is in 4NF if all dependencies are a result of keys. When multivalued dependencies exist, a relation should not contain two or more independent multivalued attributes. The decomposition of a relation to achieve 4NF would normally result in not only reduction of redundancies but also avoidance of anomalies.
Single-Valued Dependencies
Initially Codd (1972) presented three normal forms (1NF, 2NF and 3NF) all based on functional dependencies among the attributes of a relation. Later Boyce and Codd proposed another normal form called the Boyce-Codd normal form (BCNF). The fourth and fifth normal forms are based on multivalue and join dependencies and were proposed later.
The primary objective of normalization is to avoid some of the anomalies that we discussed at the beginning of the chapter.
Example Normalisation
Un-Normalised Data
ORDER DETAILS 1
WID-008
Green Widget
Data is presented in a single column. In tis caste the following data is contained:
Quantity, Item ID and item Description. Since multiple unrelated values are stored in a column, this data is considered un-normalised.
First normal Form
ORDER DETAILS ItemCode Description Quantity
WID-008 Green Widget 1
Data is now in First Normal Form (1NF). Data items have been put in their own columns, and the columns furnished with a description. For data to be in 1NF each piece of information should be in its own column,and each row of data should contain the same columns.
Second Normal Form
ORDER DETAILS OrderID ItemCode Description Quantity
2345 WID-008 Green Widget 1
Data is now in Second Normal Form (2NF). 2NF is based on 1NF, with the addition that a unique identifier is added to each row - In this case the OrderID value. In most cases this unique value is a counter, rather than being related to the data. Each non-key attribute should be functionally dependent on the primary key for the table.
Third Normal Form
ORDER DETAILS OrderID ItemCode Quantity
2345 WID-008 1
ITEM DETAILS ItemCode Description
WID-008 Green Widget
Data is now in Third Normal Form (3NF). All attributes not dependent on the primary key should be moved to a separate table. Repetition of data is also eliminated. In this case, the tables are linked by the ItemCode attribute.
First Normal Form (1NF)
A table satisfying the properties of a relation is said to be in first normal form. As discussed in an earlier chapter, a relation cannot have multivalued or composite attributes. This is what the 1NF requires.
A relation is in 1NF if and only if all underlying domains contain atomic values only.
The first normal form deals only with the basic structure of the relation and does not resolve the problems of redundant information or the anomalies discussed earlier. All relations discussed in these notes are in 1NF.
For example consider the following example relation:
student (sno, sname, dob)
Add some other attributes so it has anomalies and is not in 2NF
The attribute dob is the date of birth and the primary key of the relation is sno with the functional dependencies sno -> sname and sno -> dob. The relation is in 1NF as long as dob is considered an atomic value and not consisting of three components (day, month, year). The above relation of course suffers from all the anomalies that we have discussed earlier and needs to be normalized. (add example with date of birth)
Second Normal Form (2NF)
The second normal form attempts to deal with the problems that are identified with the relation above that is in 1NF. The aim of second normal form is to ensure that all information in one relation is only about one thing.
A relation is in 2NF if it is in 1NF and every non-key attribute is fully dependent on each candidate key of the relation.
To understand the above definition of 2NF we need to define the concept of key attributes. Each attribute of a relation that participates in at least one candidate key of is a key attribute of the relation. All other attributes are called non-key.
The concept of 2NF requires that all attributes that are not part of a candidate key be fully dependent on each candidate key. If we consider the relation
student (sno, sname, cno, cname)
and the functional dependencies
sno -> sname
cno -> cname
and assume that (sno, cno) is the only candidate key (and therefore the primary key), the relation is not in 2NF since sname and cname are not fully dependent on the key. The above relation suffers from the same anomalies and repetition of information as discussed above since sname and cname will be repeated. To resolve these difficulties we could remove those attributes from the relation that are not fully dependent on the candidate keys of the relations. Therefore we decompose the relation into the following projections of the original relation:
S1 (sno, sname)
S2 (cno, cname)
SC (sno, cno)
Use an example that leaves one relation in 2NF but not in 3NF.
We may recover the original relation by taking the natural join of the three relations.
If however we assume that sname and cname are unique and therefore we have the following candidate keys
(sno, cno)
(sno, cname)
(sname, cno)
(sname, cname)
The above relation is now in 2NF since the relation has no non-key attributes. The relation still has the same problems as before but it then does satisfy the requirements of 2NF. Higher level normalization is needed to resolve such problems with relations that are in 2NF and further normalization will result in decomposition of such relations.
Third Normal Form (3NF)
Although transforming a relation that is not in 2NF into a number of relations that are in 2NF removes many of the anomalies that appear in the relation that was not in 2NF, not all anomalies are removed and further normalization is sometime needed to ensure further removal of anomalies. These anomalies arise because a 2NF relation may have attributes that are not directly related to the thing that is being described by the candidate keys of the relation. Let us first define the 3NF.
A relation R is in third normal form if it is in 2NF and every non-key attribute of R is non-transitively dependent on each candidate key of R.
To understand the third normal form, we need to define transitive dependence which is based on one of Armstrong's axioms. Let A, B and C be three attributes of a relation R such that A -> B and B -> C. From these FDs, we may derive A -> C. As noted earlier, this dependence A -> C is transitive.
The 3NF differs from the 2NF in that all non-key attributes in 3NF are required to be directly dependent on each candidate key of the relation. The 3NF therefore insists, in the words of Kent (1983) that all facts in the relation are about the key (or the thing that the key identifies), the whole key and nothing but the key. If some attributes are dependent on the keys transitively then that is an indication that those attributes provide information not about the key but about a kno-key attribute. So the information is not directly about the key, although it obviously is related to the key.
Consider the following relation
subject (cno, cname, instructor, office)
Assume that cname is not unique and therefore cno is the only candidate key. The following functional dependencies exist
cno -> cname
cno -> instructor
instructor -> office
We can derive cno -> office from the above functional dependencies and therefore the above relation is in 2NF. The relation is however not in 3NF since office is not directly dependent on cno. This transitive dependence is an indication that the relation has information about more than one thing (viz. course and instructor) and should therefore be decomposed. The primary difficulty with the above relation is that an instructor might be responsible for several subjects and therefore his office address may need to be repeated many times. This leads to all the problems that we identified at the beginning of this chapter. To overcome these difficulties we need to decompose the above relation in the following two relations:
s (cno, cname, instructor)
ins (instructor, office)
s is now in 3NF and so is ins.
An alternate decomposition of the relation subject is possible:
s(cno, cname)
inst(instructor, office)
si(cno, instructor)
The decomposition into three relations is not necessary since the original relation is based on the assumption of one instructor for each course.
The 3NF is usually quite adequate for most relational database designs. There are however some situations, for example the relation student(sno, sname, cno, cname) discussed in 2NF above, where 3NF may not eliminate all the redundancies and inconsistencies. The problem with the relation student(sno, sname, cno, cname) is because of the redundant information in the candidate keys. These are resolved by further normalization using the BCNF.
The ability of an operating system to execute different parts of a program, called threads, simultaneously. The programmer must carefully design the program in such a way that all the threads can run at the same time without interfering with each other
Hyper-Threading
A technology developed by Intel that enables multithreaded software applications to execute threads in parallel on a single multi-core processor instead of processing threads in a linear fashion. Older systems took advantage of dual-processing threading in software by splitting instructions into multiple streams so that more than one processor could act upon them at once
thread
(1) In online discussions, a series of messages that have been posted as replies to each other. A single forum or conference typically contains many threads covering different subjects. By reading each message in a thread, one after the other, you can see how the discussion has evolved. You can start a new thread by posting a message that is not a reply to an earlier message.
(2) In programming, a part of a program that can execute independently of other parts. Operating systems that support multithreading enable programmers to design programs whose threaded parts can execute concurrently.
operating system
The most important program that runs on a computer. Every general-purpose computer must have an operating system to run other programs. Operating systems perform basic tasks, such as recognizing input from the keyboard, sending output to the display screen, keeping track of files and directories on the disk, and controlling peripheral devices such as disk drives and printers.
For large systems, the operating system has even greater responsibilities and powers. It is like a traffic cop -- it makes sure that different programs and users running at the same time do not interfere with each other. The operating system is also responsible for security, ensuring that unauthorized users do not access the system.
Operating systems can be classified as follows:
multi-user : Allows two or more users to run programs at the same time. Some operating systems permit hundreds or even thousands of concurrent users.
multiprocessing : Supports running a program on more than one CPU.
multitasking : Allows more than one program to run concurrently.
multithreading : Allows different parts of a single program to run concurrently.
real time: Responds to input instantly. General-purpose operating systems, such as DOS and UNIX, are not real-time.
Operating systems provide a software platform on top of which other programs, called application programs, can run. The application programs must be written to run on top of a particular operating system. Your choice of operating system, therefore, determines to a great extent the applications you can run. For PCs, the most popular operating systems are DOS, OS/2, and Windows, but others are available, such as Linux.
As a user, you normally interact with the operating system through a set of commands. For example, the DOS operating system contains commands such as COPY and RENAME for copying files and changing the names of files, respectively. The commands are accepted and executed by a part of the operating system called the command processor or command line interpreter. Graphical user interfaces allow you to enter commands by pointing and clicking at objects that appear on the screen.
multiprocessing
(1) Refers to a computer system's ability to support more than one process (program) at the same time. Multiprocessing operating systems enable several programs to run concurrently. UNIX is one of the most widely used multiprocessing systems, but there are many others, including OS/2 for high-end PCs. Multiprocessing systems are much more complicated than single-process systems because the operating system must allocate resources to competing processes in a reasonable manner.
(2) Refers to the utilization of multiple CPUs in a single computer system. This is also called parallel processing.
parallel processing
The simultaneous use of more than one CPU to execute a program. Ideally, parallel processing makes a program run faster because there are more engines (CPUs) running it. In practice, it is often difficult to divide a program in such a way that separate CPUs can execute different portions without interfering with each other.
Most computers have just one CPU, but some models have several. There are even computers with thousands of CPUs. With single-CPU computers, it is possible to perform parallel processing by connecting the computers in a network. However, this type of parallel processing requires very sophisticated software called distributed processing software.
Note that parallel processing differs from multitasking, in which a single CPU executes several programs at once.
Parallel processing is also called parallel computing.
distributed processing
Refers to any of a variety of computer systems that use more than one computer, or processor, to run an application. This includes parallel processing, in which a single computer uses more than one CPU to execute programs. More often, however, distributed processing refers to local-area networks (LANs) designed so that a single program can run simultaneously at various sites. Most distributed processing systems contain sophisticated software that detects idle CPUs on the network and parcels out programs to utilize them.
Another form of distributed processing involves distributed databases, databases in which the data is stored across two or more computer systems. The database system keeps track of where the data is so that the distributed nature of the database is not apparent to users.
multitasking
The ability to execute more than one task at the same time, a task being a program. The terms multitasking and multiprocessing are often used interchangeably, although multiprocessing implies that more than one CPU is involved.
In multitasking, only one CPU is involved, but it switches from one program to another so quickly that it gives the appearance of executing all of the programs at the same time.
There are two basic types of multitasking: preemptive and cooperative. In preemptive multitasking, the operating system parcels out CPU time slices to each program. In cooperative multitasking, each program can control the CPU for as long as it needs it. If a program is not using the CPU, however, it can allow another program to use it temporarily. OS/2, Windows 95, Windows NT, the Amiga operating system and UNIX use preemptive multitasking, whereas Microsoft Windows 3.x and the MultiFinder (for Macintosh computers) use cooperative multitasking.
cooperative multitasking
A type of multitasking in which the process currently controlling the CPU must offer control to other processes. It is called cooperative because all programs must cooperate for it to work. If one program does not cooperate, it can hog the CPU. In contrast, preemptive multitasking forces applications to share the CPU whether they want to or not. Versions 8.0-9.2.2 of Macintosh OS and Windows 3.x operating systems are based on cooperative multitasking, whereas UNIX, Windows 95, Windows NT, OS/2, and later versions of Mac OS are based on preemptive multitasking
semaphore
A hardware or software flag. In multitasking systems, a semaphore is a variable with a value that indicates the status of a common resource. It's used to lock the resource that is being used. A process needing the resource checks the semaphore to determine the resource's status and then decides how to proceed.
deadlock
A condition that occurs when two processes are each waiting for the other to complete before proceeding. The result is that both processes hang. Deadlocks occur most commonly in multitasking and client/server environments. Ideally, the programs that are deadlocked, or the operating system, should resolve the deadlock, but this doesn't always happen.
A deadlock is also called a deadly embrace.
The 7 Layers of the OSI Model
The OSI, or Open System Interconnection, model defines a networking framework for implementing protocols in seven layers. Control is passed from one layer to the next, starting at the application layer in one station, proceeding to the bottom layer, over the channel to the next station and back up the hierarchy.
Application
(Layer 7) This layer supports application and end-user processes. Communication partners are identified, quality of service is identified, user authentication and privacy are considered, and any constraints on data syntax are identified. Everything at this layer is application-specific. This layer provides application services for file transfers, e-mail, and other network software services. Telnet and FTP are applications that exist entirely in the application level. Tiered application architectures are part of this layer.
Presentation
(Layer 6) This layer provides independence from differences in data representation (e.g., encryption) by translating from application to network format, and vice versa. The presentation layer works to transform data into the form that the application layer can accept. This layer formats and encrypts data to be sent across a network, providing freedom from compatibility problems. It is sometimes called the syntax layer.
Session
(Layer 5) This layer establishes, manages and terminates connections between applications. The session layer sets up, coordinates, and terminates conversations, exchanges, and dialogues between the applications at each end. It deals with session and connection coordination.
Transport
(Layer 4) This layer provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. It ensures complete data transfer.
Network
(Layer 3) This layer provides switching and routing technologies, creating logical paths, known as virtual circuits, for transmitting data from node to node. Routing and forwarding are functions of this layer, as well as addressing, internetworking, error handling, congestion control and packet sequencing.
Data Link
(Layer 2) At this layer, data packets are encoded and decoded into bits. It furnishes transmission protocol knowledge and management and handles errors in the physical layer, flow control and frame synchronization. The data link layer is divided into two sublayers: The Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. The MAC sublayer controls how a computer on the network gains access to the data and permission to transmit it. The LLC layer controls frame synchronization, flow control and error checking.
Physical
(Layer 1) This layer conveys the bit stream - electrical impulse, light or radio signal -- through the network at the electrical and mechanical level. It provides the hardware means of sending and receiving data on a carrier, including defining cables, cards and physical aspects. Fast Ethernet, RS232, and ATM are protocols with physical layer components.
applet
A program designed to be executed from within another application. Unlike an application, applets cannot be executed directly from the operating system. With the growing popularity of OLE (object linking and embedding), applets are becoming more prevalent. A well-designed applet can be invoked from many different applications.
Web browsers, which are often equipped with Java virtual machines, can interpret applets from Web servers. Because applets are small in files size, cross-platform compatible, and highly secure (can't be used to access users' hard drives), they are ideal for small Internet applications accessible from a browser.
J2EE
Short for Java 2 Platform Enterprise Edition. J2EE is a platform-independent, Java-centric environment from Sun for developing, building and deploying Web-based enterprise applications online. The J2EE platform consists of a set of services, APIs, and protocols that provide the functionality for developing multitiered, Web-based applications.
Some of the key features and services of J2EE:
At the client tier, J2EE supports pure HTML, as well as Java applets or applications. It relies on Java Server Pages and servlet code to create HTML or other formatted data for the client.
Enterprise JavaBeans (EJBs) provide another layer where the platform's logic is stored. An EJB server provides functions such as threading, concurrency, security and memory management. These services are transparent to the author.
Java Database Connectivity (JDBC), which is the Java equivalent to ODBC, is the standard interface for Java databases.
The Java servlet API enhances consistency for developers without requiring a graphical user interface.
MAC Layer
The Media Access Control Layer is one of two sublayers that make up the Data Link Layer of the OSI model. The MAC layer is responsible for moving data packets to and from one Network Interface Card (NIC) to another across a shared channel.
See a breakdown of the seven OSI layers in the Quick Reference section of Webopedia.
The MAC sublayer uses MAC protocols to ensure that signals sent from different stations across the same channel don't collide.
Different protocols are used for different shared networks, such as Ethernets, Token Rings, Token Buses, and WANs.
flow control
(1) In communications, the process of adjusting the flow of data from one device to another to ensure that the receiving device can handle all of the incoming data. This is particularly important where the sending device is capable of sending data much faster than the receiving device can receive it.
There are many flow control mechanisms. One of the most common flow control protocols for asynchronous communication is called xon-xoff. In this case, the receiving device sends a an xoff message to the sending device when its buffer is full. The sending device then stops sending data. When the receiving device is ready to receive more data, it sends an xon signal.
Flow control can be implemented in hardware or software, or a combination of both.
(2) In programming, the statements and other constructs that control the order in which operations are executed. For example, common looping statements such as for…next and while are known as flow control statements. Branching statements, such as if…then are also part of a programming language's flow control mechanism.
100Base-T
A networking standard that supports data transfer rates up to 100 Mbps (100 megabits per second). 100BASE-T is based on the older Ethernet standard. Because it is 10 times faster than Ethernet, it is often referred to as Fast Ethernet. Officially, the 100BASE-T standard is IEEE 802.3u.
Like Ethernet, 100BASE-T is based on the CSMA/CD LAN access method. There are several different cabling schemes that can be used with 100BASE-T, including:
Telnet
(tel´net) (n.) A terminal emulation program for TCP/IP networks such as the Internet. The Telnet program runs on your computer and connects your PC to a server on the network. You can then enter commands through the Telnet program and they will be executed as if you were entering them directly on the server console. This enables you to control the server and communicate with other servers on the network. To start a Telnet session, you must log in to a server by entering a valid username and password. Telnet is a common way to remotely control Web servers.
CSMA/CD
Short for Carrier Sense Multiple Access / Collision Detection, a set of rules determining how network devices respond when two devices attempt to use a data channel simultaneously (called a collision). Standard Ethernet networks use CSMA/CD. This standard enables devices to detect a collision. After detecting a collision, a device waits a random delay time and then attempts to re-transmit the message. If the device detects a collision again, it waits twice as long to try to re-transmit the message. This is known as exponential back off.
CSMA/CD is a type of contention protocol.
distributed processing
Refers to any of a variety of computer systems that use more than one computer, or processor, to run an application. This includes parallel processing, in which a single computer uses more than one CPU to execute programs. More often, however, distributed processing refers to local-area networks (LANs) designed so that a single program can run simultaneously at various sites. Most distributed processing systems contain sophisticated software that detects idle CPUs on the network and parcels out programs to utilize them.
Another form of distributed processing involves distributed databases, databases in which the data is stored across two or more computer systems. The database system keeps track of where the data is so that the distributed nature of the database is not apparent to users.
FTP
Short for File Transfer Protocol, the protocol for exchanging files over the Internet. FTP works in the same way as HTTP for transferring Web pages from a server to a user's browser and SMTP for transferring electronic mail across the Internet in that, like these technologies, FTP uses the Internet's TCP/IP protocols to enable data transfer.
FTP is most commonly used to download a file from a server using the Internet or to upload a file to a server (e.g., uploading a Web page file to a server).
TCP/IP
(pronounced as separate letters) Short for Transmission Control Protocol/Internet Protocol, the suite of communications protocols used to connect hosts on the Internet. TCP/IP uses several protocols, the two main ones being TCP and IP. TCP/IP is built into the UNIX operating system and is used by the Internet, making it the de facto standard for transmitting data over networks. Even network operating systems that have their own protocols, such as Netware, also support TCP/IP.
switch
(1) In networks, a device that filters and forwards packets between LAN segments. Switches operate at the data link layer (layer 2) and sometimes the network layer (layer 3) of the OSI Reference Model and therefore support any packet protocol. LANs that use switches to join segments are called switched LANs or, in the case of Ethernet networks, switched Ethernet LANs.
(2) A small lever or button. The switches on the back of printers and on expansion boards are called DIP switches. A switch that has just two positions is called a toggle switch.
(3) Another word for option or parameter -- a symbol that you add to a command to modify the command's behavior.
protocol
An agreed-upon format for transmitting data between two devices. The protocol determines the following:
the type of error checking to be used
data compression method, if any
how the sending device will indicate that it has finished sending a message
how the receiving device will indicate that it has received a message
There are a variety of standard protocols from which programmers can choose. Each has particular advantages and disadvantages; for example, some are simpler than others, some are more reliable, and some are faster.
From a user's point of view, the only interesting aspect about protocols is that your computer or device must support the right ones if you want to communicate with other computers. The protocol can be implemented either in hardware or in software.
HTTP
Short for HyperText Transfer Protocol, the underlying protocol used by the World Wide Web. HTTP defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands. For example, when you enter a URL in your browser, this actually sends an HTTP command to the Web server directing it to fetch and transmit the requested Web page.
The other main standard that controls how the World Wide Web works is HTML, which covers how Web pages are formatted and displayed.
HTTP is called a stateless protocol because each command is executed independently, without any knowledge of the commands that came before it. This is the main reason that it is difficult to implement Web sites that react intelligently to user input. This shortcoming of HTTP is being addressed in a number of new technologies, including ActiveX, Java, JavaScript and cookies.
Also see The Difference Between FTP and HTTP in the Did You Know . . . ? section of Webopedia.
SMTP
(pronounced as separate letters) Short for Simple Mail Transfer Protocol, a protocol for sending e-mail messages between servers. Most e-mail systems that send mail over the Internet use SMTP to send messages from one server to another; the messages can then be retrieved with an e-mail client using either POP or IMAP. In addition, SMTP is generally used to send messages from a mail client to a mail server. This is why you need to specify both the POP or IMAP server and the SMTP server when you configure your e-mail application.
routing
(n.) In internetworking, the process of moving a packet of data from source to destination. Routing is usually performed by a dedicated device called a router. Routing is a key feature of the Internet because it enables messages to pass from one computer to another and eventually reach the target machine. Each intermediary computer performs routing by passing along the message to the next computer. Part of this process involves analyzing a routing table to determine the best path.
Routing is often confused with bridging, which performs a similar function. The principal difference between the two is that bridging occurs at a lower level and is therefore more of a hardware function whereas routing occurs at a higher level where the software component is more important. And because routing occurs at a higher level, it can perform more complex analysis to determine the optimal path for the packet.
An application that runs on a personal computer or workstation and enables you to send, receive and organize e-mail. It's called a client because e-mail systems are based on a client-server architecture. Mail is sent from many clients to a central server, which re-routes the mail to its intended destination.
The Difference Between FTP and HTTP
File Transfer Protocol, or FTP, is a protocol used to upload files from a workstation to a FTP server or download files from a FTP server to a workstation. It is the way that files get transferred from one device to another in order for the files to be available on the Internet. When ftp appears in a URL it means that the user is connecting to a file server and not a Web server and that some form of file transfer is going to take place. Most FTP servers require the user to log on to the server in order to transfer files.
In contrast, Hyper Text Transfer Protocol, or HTTP, is a protocol used to transfer files from a Web server onto a browser in order to view a Web page that is on the Internet. Unlike FTP, where entire files are transferred from one device to another and copied into memory, HTTP only transfers the contents of a web page into a browser for viewing. FTP is a two-way system as files are transferred back and forth between server and workstation. HTTP is a one-way system as files are transported only from the server onto the workstation's browser. When http appears in a URL it means that the user is connecting to a Web server and not a file server. The files are transferred but not downloaded, therefore not copied into the memory of the receiving device.
Web server
A computer that delivers (serves up) Web pages. Every Web server has an IP address and possibly a domain name. For example, if you enter the URL http://www.pcwebopedia.com/index.html in your browser, this sends a request to the server whose domain name is pcwebopedia.com. The server then fetches the page named index.html and sends it to your browser.
Any computer can be turned into a Web server by installing server software and connecting the machine to the Internet. There are many Web server software applications, including public domain software from NCSA and Apache, and commercial packages from Microsoft, Netscape and others.
gateway
(n.) (1) A node on a network that serves as an entrance to another network. In enterprises, the gateway is the computer that routes the traffic from a workstation to the outside network that is serving the Web pages. In homes, the gateway is the ISP that connects the user to the internet.
In enterprises, the gateway node often acts as a proxy server and a firewall. The gateway is also associated with both a router, which use headers and forwarding tables to determine where packets are sent, and a switch, which provides the actual path for the packet in and out of the gateway.
(2) A computer system located on earth that switches data signals and voice signals between satellites and terrestrial networks.
(3) An earlier term for router, though now obsolete in this sense as router is commonly used
ActiveX control
A control using ActiveX technologies. An ActiveX control can be automatically downloaded and executed by a Web browser. ActiveX is not a programming language, but rather a set of rules for how applications should share information. Programmers can develop ActiveX controls in a variety of languages, including C, C++, Visual Basic, and Java.
An ActiveX control is similar to a Java applet. Unlike Java applets, however, ActiveX controls have full access to the Windows operating system. This gives them much more power than Java applets, but with this power comes a certain risk that the applet may damage software or data on your machine. To control this risk, Microsoft developed a registration system so that browsers can identify and authenticate an ActiveX control before downloading it. Another difference between Java applets and ActiveX controls is that Java applets can be written to run on all platforms, whereas ActiveX controls are currently limited to Windows environments.
Related to ActiveX is a scripting language called VBScript that enables Web authors to embed interactive elements in HTML documents.
platform
The underlying hardware or software for a system. For example, the platform might be an Intel 80486 processor running DOS Version 6.0. The platform could also be UNIX machines on an Ethernet network.
The platform defines a standard around which a system can be developed. Once the platform has been defined, software developers can produce appropriate software and managers can purchase appropriate hardware and applications. The term is often used as a synonym of operating system.
The term cross-platform refers to applications, formats, or devices that work on different platforms. For example, a cross-platform programming environment enables a programmer to develop programs for many platforms at once.
script
Another term for macro or batch file, a script is a list of commands that can be executed without user interaction. A script language is a simple programming language with which you can write scripts.
Apple Computer uses the term script to refer to programs written in its HyperCard or AppleScript language.
Application Server -
A software program that handles all application operations between users and an organization's backend business applications or databases. Application servers are typically used for complex transaction-based applications. To support high-end needs, an application server has to have built-in redundancy, monitors for high-availability, high-performance distributed application services and support for complex database access. These are the leading Java App Servers:
Apache/Jakarta Tomcat (the open source, and official reference implementation of the Java Servlet and JSP technologies) BEA WebLogic IBM WebSphere iPlanet Application Server Oracle Application Server
Enterprise JavaBeans (EJB) - A Java API developed by Sun Microsystems that defines a component architecture for multi-tier client/server systems. EJB systems allow developers to focus on the actual business architecture of the model, rather than worry about endless amounts of programming and coding needed to connect all the working parts. This task is left to EJB server vendors. Developers just design (or purchase) the needed EJB components and arrange them on the server. Because EJB systems are written in Java, they are platform independent. Being object oriented, they can be implemented into existing systems with little or no recompiling and configuring. (from Webopedia)
Java - A high-level object-oriented programming language developed by Sun Microsystems. Java is similar to C++, but simplified to eliminate language features that cause common programming errors. Java source code files (files with a .java extension) are compiled into a format called bytecode (files with a .class extension), which can then be executed by a Java interpreter. Compiled Java code can run on most computers because Java interpreters and runtime environments, known as Java Virtual Machines (VMs), exist for most operating systems, including UNIX, the Macintosh OS, and Windows. Bytecode can also be converted directly into machine language instructions by a just-in-time compiler (JIT).
Java 2 Platform Enterprise Edition (J2EE) - J2EE is a platform-independent, Java-centric environment from Sun for developing, building and deploying Web-based enterprise applications online. The J2EE platform consists of a set of services, APIs, and protocols that provide the functionality for developing multitiered, Web-based applications.
Java Applet - A program designed to be executed from within another application. Unlike an application, applets cannot be executed directly from the operating system. Applets became more prevalent with the popularity growth of OLE (object linking and embedding). A well-designed applet can be invoked from many different applications. Web browsers, which are often equipped with Java virtual machines, can interpret applets from Web servers. Because applets are small in file size, cross-platform compatible, and highly secure (can't be used to access users' hard drives), they are ideal for small Internet applications accessible from a browser. (from Webopedia)
Java Beans - A specification developed by Sun Microsystems that defines how Java objects interact. An object that conforms to this specification is called a JavaBean, and is similar to an ActiveX control. It can be used by any application that understands the JavaBeans format. The principal difference between ActiveX controls and JavaBeans are that ActiveX controls can be developed in any programming language but executed only on a Windows platform, whereas JavaBeans can be developed only in Java, but can run on any platform. (from Webopedia)
Java Database Connectivity (JDBC) - A Java API that enables Java programs to execute SQL statements. This allows Java programs to interact with any SQL-compliant database. Since nearly all relational database management systems (DBMSs) support SQL, and because Java itself runs on most platforms, JDBC makes it possible to write a single database application that can run on different platforms and interact with different DBMSs. (from Webopedia)
Java Server Pages (JSP) - A server-side technology that serve as an extension to the Java servlet technology that was developed by Sun as an alternative to Microsoft's ASPs (Active Server Pages). JSPs have dynamic scripting capability that works in tandem with HTML code, separating the page logic from the static elements -- the actual design and display of the page. Embedded in the HTML page, the Java source code and its extensions help make the HTML more functional, being used in dynamic database queries, for example. JSPs are not restricted to any specific platform or server. (from Webopedia)
Java Servlet - An applet that runs on a server. The term usually refers to a Java applet that runs within a Web server environment. This is analogous to a Java applet that runs within a Web browser environment. Java servlets are becoming increasingly popular as an alternative to CGI programs. The biggest difference between the two is that a Java applet is persistent. This means that once it is started, it stays in memory and can fulfill multiple requests. In contrast, a CGI program disappears once it has fulfilled a request. The persistence of Java applets makes them faster because there's no wasted time in setting up and tearing down the process. (from Webopedia)
macro
(1) A symbol, name, or key that represents a list of commands, actions, or keystrokes. Many programs allow you to create macros so that you can enter a single character or word to perform a whole series of actions. Suppose, for example, that you are editing a file and want to indent every third line five spaces. If your word processor supports macros, you can create one that consists of the following keystrokes:
Move Cursor to Beginning of Line
Move Cursor Down 1 Line
Move Cursor Down 1 Line
Move Cursor Down 1 Line
Insert 5 Spaces
Now you can enter the name of the macro, and the word processor will perform all these commands at once.
You can also use macros to enter words or phrases that you use frequently. For example, you could define a macro to contain all the keystrokes necessary to begin a letter -- your name, address, and a code that inserts the current date. Then, whenever you write a letter, you just press the macro key to include the letter header.
In a way, macros are like simple programs or batch files. Some applications support sophisticated macros that even allow you to use variables and flow control structures such as loops.
(2) In dBASE programs, a macro is a variable that points to another variable where the data is actually stored. In most other applications, this would be called a link.
batch file Last modified: Monday, September 01, 1997
A file that contains a sequence, or batch, of commands. Batch files are useful for storing sets of commands that are always executed together because you can simply enter the name of the batch file instead of entering each command individually.
In DOS systems, batch files end with a.BAT extension. For example, the following DOS batch file prints the date and time and sets the prompt to GO>:
date
time
prompt [GO>]
Whenever you boot a DOS -based computer, the system automatically executes the batch file named AUTOEXEC.BAT, if it exists.Many operating systems use the terms command file or shell script in place of batch file.
cross-platform Last modified: Sunday, September 01, 1996
Refers to the capability of software or hardware to run identically on different platforms. Many applications for Windows and the Macintosh, for example, now produce binary-compatible files, which means that users can switch from one platform to the other without converting their data to a new format.
Cross-platform computing is becoming increasingly important as local-area networks become better at linking machines of different types.
ISP
Short for Internet Service Provider, a company that provides access to the Internet. For a monthly fee, the service provider gives you a software package, username, password and access phone number. Equipped with a modem, you can then log on to the Internet and browse the World Wide Web and USENET, and send and receive e-mail.
In addition to serving individuals, ISPs also serve large companies, providing a direct connection from the company's networks to the Internet. ISPs themselves are connected to one another through Network Access Points (NAPs).
ISPs are also called IAPs (Internet Access Providers).
proxy server
A server that sits between a client application, such as a Web browser, and a real server. It intercepts all requests to the real server to see if it can fulfill the requests itself. If not, it forwards the request to the real server.
Proxy servers have two main purposes:
Improve Performance: Proxy servers can dramatically improve performance for groups of users. This is because it saves the results of all requests for a certain amount of time. Consider the case where both user X and user Y access the World Wide Web through a proxy server. First user X requests a certain Web page, which we'll call Page 1. Sometime later, user Y requests the same page. Instead of forwarding the request to the Web server where Page 1 resides, which can be a time-consuming operation, the proxy server simply returns the Page 1 that it already fetched for user X. Since the proxy server is often on the same network as the user, this is a much faster operation. Real proxy servers support hundreds or thousands of users. The major online services such as Compuserve and America Online, for example, employ an array of proxy servers.
Filter Requests: Proxy servers can also be used to filter requests. For example, a company might use a proxy server to prevent its employees from accessing a specific set of Web sites.
See the Server Types page in the quick reference section of Webopedia for a comparison of server types.
World Wide Web
A system of Internet servers that support specially formatted documents. The documents are formatted in a markup language called HTML (HyperText Markup Language) that supports links to other documents, as well as graphics, audio, and video files. This means you can jump from one document to another simply by clicking on hot spots. Not all Internet servers are part of the World Wide Web. There are several applications called Web browsers that make it easy to access the World Wide Web; Two of the most popular being Netscape Navigator and Microsoft's Internet Explorer.
World Wide Web is not synonymous with the Internet.
Compatible
(n) Indicates that a product can work with or is equivalent to another, better-known product. The term is often used as a shorthand for IBM-compatible PC , a computer that is compatible with an IBM PC. Another term for a compatible is clone. (adj) The ability of one device or program to work with another device or program. The term compatible implies different degrees of partnership. For example, a printer and a computer are said to be compatible if they can be connected to each other. An IBM compatible PC, on the other hand, is a computer that can run the same software as an IBM PC. Compatibility of two devices, such as printers, usually means that they react to software commands in the same way. Some printers achieve compatibility by tricking the software into believing that the printer is a different machine. This is called emulation. Be aware, however, that hardware compatibility does not always extend to expansion slots. For example, two compatible printers may not accept the same font cartridges. Complete hardware compatibility is denoted by the term plug compatible.Software products are compatible if they use the same data formats. For example, many programs are compatible with dBASE. This means that the files they produce can easily be transformed into a dBASE database or that they can import dBASE files.
API
Abbreviation of application program interface, a set of routines, protocols, and tools for building software applications. A good API makes it easier to develop a program by providing all the building blocks. A programmer puts the blocks together. Most operating environments, such as MS-Windows, provide an API so that programmers can write applications consistent with the operating environment. Although APIs are designed for programmers, they are ultimately good for users because they guarantee that all programs using a common API will have similar interfaces. This makes it easier for users to learn new programs.
ODBC
(pronounced as separate letters) Short for Open DataBase Connectivity, a standard database access method developed by the SQL Access group in 1992. The goal of ODBC is to make it possible to access any data from any application, regardless of which database management system (DBMS) is handling the data. ODBC manages this by inserting a middle layer, called a database driver , between an application and the DBMS. The purpose of this layer is to translate the application's data queries into commands that the DBMS understands. For this to work, both the application and the DBMS must be ODBC-compliant -- that is, the application must be capable of issuing ODBC commands and the DBMS must be capable of responding to them. Since version 2.0, the standard supports SAG SQL.
servlet
A small program that runs on a server. The term usually refers to a Java applet that runs within a Web server environment. This is analogous to a Java applet that runs within a Web browser environment.
Java servlets are becoming increasingly popular as an alternative to CGI programs. The biggest difference between the two is that a Java applet is persistent. This means that once it is started, it stays in memory and can fulfill multiple requests. In contrast, a CGI program disappears once it has fulfilled a request. The persistence of Java applets makes them faster because there's no wasted time in setting up and tearing down the process.
java
A high-level programming language developed by Sun Microsystems. Java was originally called OAK, and was designed for handheld devices and set-top boxes. Oak was unsuccessful so in 1995 Sun changed the name to Java and modified the language to take advantage of the burgeoning World Wide Web.
Java is an object-oriented language similar to C++, but simplified to eliminate language features that cause common programming errors. Java source code files (files with a .java extension) are compiled into a format called bytecode (files with a .class extension), which can then be executed by a Java interpreter. Compiled Java code can run on most computers because Java interpreters and runtime environments, known as Java Virtual Machines (VMs), exist for most operating systems, including UNIX, the Macintosh OS, and Windows. Bytecode can also be converted directly into machine language instructions by a just-in-time compiler (JIT).
Java is a general purpose programming language with a number of features that make the language well suited for use on the World Wide Web. Small Java applications are called Java applets and can be downloaded from a Web server and run on your computer by a Java-compatible Web browser, such as Netscape Navigator or Microsoft Internet Explorer.
database management system Last modified: Wednesday, December 03, 2003
A collection of programs that enables you to store, modify, and extract information from a database. There are many different types of DBMSs, ranging from small systems that run on personal computers to huge systems that run on mainframes. The following are examples of database applications:
computerized library systems
automated teller machines
flight reservation systems
computerized parts inventory systems
From a technical standpoint, DBMSs can differ widely. The terms relational, network, flat, and hierarchical all refer to the way a DBMS organizes information internally. The internal organization can affect how quickly and flexibly you can extract information.
Requests for information from a database are made in the form of a query, which is a stylized question. For example, the query SELECT ALL WHERE NAME = "SMITH" AND AGE > 35
requests all records in which the NAME field is SMITH and the AGE field is greater than 35. The set of rules for constructing queries is known as a query language. Different DBMSs support different query languages, although there is a semi-standardized query language called SQL (structured query language). Sophisticated languages for managing database systems are called fourth-generation languages, or 4GLs for short.
The information from a database can be presented in a variety of formats. Most DBMSs include a report writer program that enables you to output data in the form of a report. Many DBMSs also include a graphics component that enables you to output information in the form of graphs and charts.
SQL
Abbreviation of structured query language, and pronounced either see-kwell or as separate letters. SQL is a standardized query language for requesting information from a database. The original version called SEQUEL (structured English query language) was designed by an IBM research center in 1974 and 1975. SQL was first introduced as a commercial database system in 1979 by Oracle Corporation.
Historically, SQL has been the favorite query language for database management systems running on minicomputers and mainframes. Increasingly, however, SQL is being supported by PC database systems because it supports distributed databases (databases that are spread out over several computer systems). This enables several users on a local-area network to access the same database simultaneously.
Although there are different dialects of SQL, it is nevertheless the closest thing to a standard query language that currently exists. In 1986, ANSI approved a rudimentary version of SQL as the official standard, but most versions of SQL since then have included many extensions to the ANSI standard. In 1991, ANSI updated the standard. The new standard is known as SAG SQL.
database
(1) Often abbreviated DB. A collection of information organized in such a way that a computer program can quickly select desired pieces of data. You can think of a database as an electronic filing system.
Traditional databases are organized by fields, records, and files. A field is a single piece of information; a record is one complete set of fields; and a file is a collection of records. For example, a telephone book is analogous to a file. It contains a list of records, each of which consists of three fields: name, address, and telephone number.
An alternative concept in database design is known as Hypertext. In a Hypertext database, any object, whether it be a piece of text, a picture, or a film, can be linked to any other object. Hypertext databases are particularly useful for organizing large amounts of disparate information, but they are not designed for numerical analysis.
To access information from a database, you need a database management system (DBMS). This is a collection of programs that enables you to enter, organize, and select data in a database.
(2) Increasingly, the term database is used as shorthand for database management system.
CGI Last modified: Tuesday, March 02, 2004
Abbreviation of Common Gateway Interface, a specification for transferring information between a World Wide Web server and a CGI program. A CGI program is any program designed to accept and return data that conforms to the CGI specification. The program could be written in any programming language, including C, Perl, Java, or Visual Basic.
CGI programs are the most common way for Web servers to interact dynamically with users. Many HTML pages that contain forms, for example, use a CGI program to process the form's data once it's submitted. Another increasingly common way to provide dynamic feedback for Web users is to include scripts or programs that run on the user's machine rather than the Web server. These programs can be Java applets, Java scripts, or ActiveX controls. These technologies are known collectively as client-side solutions, while the use of CGI is a server-side solution because the processing occurs on the Web server.
One problem with CGI is that each time a CGI script is executed, a new process is started. For busy Web sites, this can slow down the server noticeably. A more efficient solution, but one that it is also more difficult to implement, is to use the server's API, such as ISAPI or NSAPI. Another increasingly popular solution is to use Java servlets.
mainframe
A very large and expensive computer capable of supporting hundreds, or even thousands, of users simultaneously. In the hierarchy that starts with a simple microprocessor (in watches, for example) at the bottom and moves to supercomputers at the top, mainframes are just below supercomputers. In some ways, mainframes are more powerful than supercomputers because they support more simultaneous programs. But supercomputers can execute a single program faster than a mainframe.
10.2 Pointers and Arrays; Pointer Arithmetic
[This section corresponds to K&R Sec. 5.3]
Pointers do not have to point to single variables. They can also point at the cells of an array. For example, we can write
int *ip;
int a[10];
ip = &a[3];
and we would end up with ip pointing at the fourth cell of the array a (remember, arrays are 0-based, so a[0] is the first cell). We could illustrate the situation like this:
We'd use this ip just like the one in the previous section: *ip gives us what ip points to, which in this case will be the value in a[3].
Once we have a pointer pointing into an array, we can start doing pointer arithmetic. Given that ip is a pointer to a[3], we can add 1 to ip:
ip + 1
What does it mean to add one to a pointer? In C, it gives a pointer to the cell one farther on, which in this case is a[4]. To make this clear, let's assign this new pointer to another pointer variable:
ip2 = ip + 1;
Now the picture looks like this:
If we now do
*ip2 = 4;
we've set a[4] to 4. But it's not necessary to assign a new pointer value to a pointer variable in order to use it; we could also compute a new pointer value and use it immediately:
*(ip + 1) = 5;
In this last example, we've changed a[4] again, setting it to 5. The parentheses are needed because the unary ``contents of'' operator * has higher precedence (i.e., binds more tightly than) the addition operator. If we wrote *ip + 1, without the parentheses, we'd be fetching the value pointed to by ip, and adding 1 to that value. The expression *(ip + 1), on the other hand, accesses the value one past the one pointed to by ip.
Given that we can add 1 to a pointer, it's not surprising that we can add and subtract other numbers as well. If ip still points to a[3], then
*(ip + 3) = 7;
sets a[6] to 7, and
*(ip - 2) = 4;
sets a[1] to 4.
Up above, we added 1 to ip and assigned the new pointer to ip2, but there's no reason we can't add one to a pointer, and change the same pointer:
ip = ip + 1;
Now ip points one past where it used to (to a[4], if we hadn't changed it in the meantime). The shortcuts we learned in a previous chapter all work for pointers, too: we could also increment a pointer using
ip += 1;
or
ip++;
Of course, pointers are not limited to ints. It's quite common to use pointers to other types, especially char. Here is the innards of the mystrcmp function we saw in a previous chapter, rewritten to use pointers. (mystrcmp, you may recall, compares two strings, character by character.)
char *p1 = &str1[0], *p2 = &str2[0];
while(1)
{
if(*p1 != *p2)
return *p1 - *p2;
if(*p1 == '\0' || *p2 == '\0')
return 0;
p1++;
p2++;
}
The autoincrement operator ++ (like its companion, --) makes it easy to do two things at once. We've seen idioms like a[i++] which accesses a[i] and simultaneously increments i, leaving it referencing the next cell of the array a. We can do the same thing with pointers: an expression like *ip++ lets us access what ip points to, while simultaneously incrementing ip so that it points to the next element. The preincrement form works, too: *++ip increments ip, then accesses what it points to. Similarly, we can use notations like *ip-- and *--ip.
As another example, here is the strcpy (string copy) loop from a previous chapter, rewritten to use pointers:
char *dp = &dest[0], *sp = &src[0];
while(*sp != '\0')
*dp++ = *sp++;
*dp = '\0';
(One question that comes up is whether the expression *p++ increments p or what it points to. The answer is that it increments p. To increment what p points to, you can use (*p)++.)
When you're doing pointer arithmetic, you have to remember how big the array the pointer points into is, so that you don't ever point outside it. If the array a has 10 elements, you can't access a[50] or a[-1] or even a[10] (remember, the valid subscripts for a 10-element array run from 0 to 9). Similarly, if a has 10 elements and ip points to a[3], you can't compute or access ip + 10 or ip - 5. (There is one special case: you can, in this case, compute, but not access, a pointer to the nonexistent element just beyond the end of the array, which in this case is &a[10]. This becomes useful when you're doing pointer comparisons, which we'll look at next.)
Using an array name as a pointer
An array name is really a pointer to the first element of the array. For example, the following is legal.
int b[100]; // b is an array of 100 ints.
int* p; // p is a pointer to an int.
p = b; // Assigns the address of first element of b to p.
p = &b[0]; // Exactly the same assignment as above.
Array name is a const pointer
When you declare an array, the name is a pointer, which cannot be altered. In the previous example, you could never make this assignment.
p = b; // Legal -- p is not a constant.
b = p; // ILLEGAL because b is a constant, altho the correct type.
Pointer arithmetic
"Meaningful" arithmetic operations are allowed on pointers.
· Add or subtract integers to/from a pointer. The result is a pointer. Subtract two pointers to the same type. The result is an int. Multiplying, adding two pointers, etc. don't make sense.
Pointer addition and element size
When you add an integer to a pointer, the integer is multiplied by the element size of the type that the pointer points to.
// Assume sizeof(int) is 4.
int b[100]; // b is an array of 100 ints.
int* p; // p is a a pointer to an int.
p = b; // Assigns address of first element of b. Ie, &b[0]
p = p + 1; // Adds 4 to p (4 == 1 * sizeof(int)). Ie, &b[1]
Fifth Normal Form (5NF)
The normal forms discussed so far required that the given relation R if not in the given normal form be decomposed in two relations to meet the requirements of the normal form. In some rare cases, a relation can have problems like redundant information and update anomalies because of it but cannot be decomposed in two relations to remove the problems. In such cases it may be possible to decompose the relation in three or more relations using the 5NF.
The fifth normal form deals with join-dependencies which is a generalisation of the MVD. The aim of fifth normal form is to have relations that cannot be decomposed further. A relation in 5NF cannot be constructed from several smaller relations.
A relation R satisfies join dependency (R1, R2, ..., Rn) if and only if R is equal to the join of
R1, R2, ..., Rn where Ri are subsets of the set of attributes of R.
A relation R is in 5NF (or project-join normal form, PJNF) if for all join dependencies at least one of the following holds.
(a) (R1, R2, ..., Rn) is a trivial join-dependency (that is, one of Ri is R)
(b) Every Ri is a candidate key for R.
An example of 5NF can be provided by the example below that deals with departments, subjects and students.
dept subject student
Comp. Sc.
Mathematics
Comp. Sc.
Comp. Sc.
Physics
Chemistry CP1000
MA1000
CP2000
CP3000
PH1000
CH2000 John Smith
John Smith
Arun Kumar
Reena Rani
Raymond Chew
Albert Garcia
The above relation says that Comp. Sc. offers subjects CP1000, CP2000 and CP3000 which are taken by a variety of students. No student takes all the subjects and no subject has all students enrolled in it and therefore all three fields are needed to represent the information.
The above relation does not show MVDs since the attributes subject and student are not independent; they are related to each other and the pairings have significant information in them. The relation can therefore not be decomposed in two relations
(dept, subject), and
(dept, student)
without loosing some important information. The relation can however be decomposed in the following three relations
(dept, subject), and
(dept, student)
(subject, student)
and now it can be shown that this decomposition is lossless.
Multivalued Normalisation -Fourth Normal Form
We have considered an example of Programmer(Emp name, qualification, languages) and discussed the problems that may arise if the relation is not normalised further. We also saw how the relation could be decomposed into P1(Emp name, qualifications) and P2(Emp name, languages) to overcome these problems. The decomposed relations are in fourth normal form (4NF) which we shall now define.
We are now ready to define 4NF. A relation R is in 4NF if, whenever a multivalued dependency
X -> Y holds then either
(a) the dependency is trivial, or
(b) X is a candidate key for R.
As noted earlier, the dependency X ->> ø or X ->> Y in a relation R (X, Y) is trivial since they must hold for all R (X, Y). Similarly (X, Y) -> Z must hold for all relations R (X, Y, Z) with only three attributes.
In fourth normal form, we have a relation that has information about only one entity. If a relation has more than one multivalue attribute, we should decompose it to remove difficulties with multivalued facts.
Intuitively R is in 4NF if all dependencies are a result of keys. When multivalued dependencies exist, a relation should not contain two or more independent multivalued attributes. The decomposition of a relation to achieve 4NF would normally result in not only reduction of redundancies but also avoidance of anomalies.
Single-Valued Dependencies
Initially Codd (1972) presented three normal forms (1NF, 2NF and 3NF) all based on functional dependencies among the attributes of a relation. Later Boyce and Codd proposed another normal form called the Boyce-Codd normal form (BCNF). The fourth and fifth normal forms are based on multivalue and join dependencies and were proposed later.
The primary objective of normalization is to avoid some of the anomalies that we discussed at the beginning of the chapter.
Example Normalisation
Un-Normalised Data
ORDER DETAILS 1
WID-008
Green Widget
Data is presented in a single column. In tis caste the following data is contained:
Quantity, Item ID and item Description. Since multiple unrelated values are stored in a column, this data is considered un-normalised.
First normal Form
ORDER DETAILS ItemCode Description Quantity
WID-008 Green Widget 1
Data is now in First Normal Form (1NF). Data items have been put in their own columns, and the columns furnished with a description. For data to be in 1NF each piece of information should be in its own column,and each row of data should contain the same columns.
Second Normal Form
ORDER DETAILS OrderID ItemCode Description Quantity
2345 WID-008 Green Widget 1
Data is now in Second Normal Form (2NF). 2NF is based on 1NF, with the addition that a unique identifier is added to each row - In this case the OrderID value. In most cases this unique value is a counter, rather than being related to the data. Each non-key attribute should be functionally dependent on the primary key for the table.
Third Normal Form
ORDER DETAILS OrderID ItemCode Quantity
2345 WID-008 1
ITEM DETAILS ItemCode Description
WID-008 Green Widget
Data is now in Third Normal Form (3NF). All attributes not dependent on the primary key should be moved to a separate table. Repetition of data is also eliminated. In this case, the tables are linked by the ItemCode attribute.
First Normal Form (1NF)
A table satisfying the properties of a relation is said to be in first normal form. As discussed in an earlier chapter, a relation cannot have multivalued or composite attributes. This is what the 1NF requires.
A relation is in 1NF if and only if all underlying domains contain atomic values only.
The first normal form deals only with the basic structure of the relation and does not resolve the problems of redundant information or the anomalies discussed earlier. All relations discussed in these notes are in 1NF.
For example consider the following example relation:
student (sno, sname, dob)
Add some other attributes so it has anomalies and is not in 2NF
The attribute dob is the date of birth and the primary key of the relation is sno with the functional dependencies sno -> sname and sno -> dob. The relation is in 1NF as long as dob is considered an atomic value and not consisting of three components (day, month, year). The above relation of course suffers from all the anomalies that we have discussed earlier and needs to be normalized. (add example with date of birth)
Second Normal Form (2NF)
The second normal form attempts to deal with the problems that are identified with the relation above that is in 1NF. The aim of second normal form is to ensure that all information in one relation is only about one thing.
A relation is in 2NF if it is in 1NF and every non-key attribute is fully dependent on each candidate key of the relation.
To understand the above definition of 2NF we need to define the concept of key attributes. Each attribute of a relation that participates in at least one candidate key of is a key attribute of the relation. All other attributes are called non-key.
The concept of 2NF requires that all attributes that are not part of a candidate key be fully dependent on each candidate key. If we consider the relation
student (sno, sname, cno, cname)
and the functional dependencies
sno -> sname
cno -> cname
and assume that (sno, cno) is the only candidate key (and therefore the primary key), the relation is not in 2NF since sname and cname are not fully dependent on the key. The above relation suffers from the same anomalies and repetition of information as discussed above since sname and cname will be repeated. To resolve these difficulties we could remove those attributes from the relation that are not fully dependent on the candidate keys of the relations. Therefore we decompose the relation into the following projections of the original relation:
S1 (sno, sname)
S2 (cno, cname)
SC (sno, cno)
Use an example that leaves one relation in 2NF but not in 3NF.
We may recover the original relation by taking the natural join of the three relations.
If however we assume that sname and cname are unique and therefore we have the following candidate keys
(sno, cno)
(sno, cname)
(sname, cno)
(sname, cname)
The above relation is now in 2NF since the relation has no non-key attributes. The relation still has the same problems as before but it then does satisfy the requirements of 2NF. Higher level normalization is needed to resolve such problems with relations that are in 2NF and further normalization will result in decomposition of such relations.
Third Normal Form (3NF)
Although transforming a relation that is not in 2NF into a number of relations that are in 2NF removes many of the anomalies that appear in the relation that was not in 2NF, not all anomalies are removed and further normalization is sometime needed to ensure further removal of anomalies. These anomalies arise because a 2NF relation may have attributes that are not directly related to the thing that is being described by the candidate keys of the relation. Let us first define the 3NF.
A relation R is in third normal form if it is in 2NF and every non-key attribute of R is non-transitively dependent on each candidate key of R.
To understand the third normal form, we need to define transitive dependence which is based on one of Armstrong's axioms. Let A, B and C be three attributes of a relation R such that A -> B and B -> C. From these FDs, we may derive A -> C. As noted earlier, this dependence A -> C is transitive.
The 3NF differs from the 2NF in that all non-key attributes in 3NF are required to be directly dependent on each candidate key of the relation. The 3NF therefore insists, in the words of Kent (1983) that all facts in the relation are about the key (or the thing that the key identifies), the whole key and nothing but the key. If some attributes are dependent on the keys transitively then that is an indication that those attributes provide information not about the key but about a kno-key attribute. So the information is not directly about the key, although it obviously is related to the key.
Consider the following relation
subject (cno, cname, instructor, office)
Assume that cname is not unique and therefore cno is the only candidate key. The following functional dependencies exist
cno -> cname
cno -> instructor
instructor -> office
We can derive cno -> office from the above functional dependencies and therefore the above relation is in 2NF. The relation is however not in 3NF since office is not directly dependent on cno. This transitive dependence is an indication that the relation has information about more than one thing (viz. course and instructor) and should therefore be decomposed. The primary difficulty with the above relation is that an instructor might be responsible for several subjects and therefore his office address may need to be repeated many times. This leads to all the problems that we identified at the beginning of this chapter. To overcome these difficulties we need to decompose the above relation in the following two relations:
s (cno, cname, instructor)
ins (instructor, office)
s is now in 3NF and so is ins.
An alternate decomposition of the relation subject is possible:
s(cno, cname)
inst(instructor, office)
si(cno, instructor)
The decomposition into three relations is not necessary since the original relation is based on the assumption of one instructor for each course.
The 3NF is usually quite adequate for most relational database designs. There are however some situations, for example the relation student(sno, sname, cno, cname) discussed in 2NF above, where 3NF may not eliminate all the redundancies and inconsistencies. The problem with the relation student(sno, sname, cno, cname) is because of the redundant information in the candidate keys. These are resolved by further normalization using the BCNF.
Subscribe to:
Posts (Atom)