6
6
6
Q1. Based on storage capacity, which is the largest dam in the state of Rajasthan?
Hk.Mkj.k {kerk ds vk/kkj ij jktLFkku jkT; dk lcls cM+k cka/k dkSulk gS\
(a) Meja Dam estk cka/k (b) Rana Pratap Sagar Dam jk.kk izrki lkxj cka/k
(c) Jawai Dam tokbZ cka/k (d) Jakham Dam tk[ke cka/k
Q2. When was the “Sariska” sanctuary elevated to the level of a national park?
ÞlfjLdkÞ vHk;kj.; dks jk"Vªh; m|ku ds Lrj rd dc c<+k;k x;k\
(a) 1994 (b) 1992 (c) 1995 (d) 1990
Q3. Where is the office of Oil India located in the state of Rajasthan?
v‚;y bafM;k dk dk;kZy; jktLFkku jkT; esa dgk¡ fLFkr gS
(a) Nagaur ukxkSj (b) Jodhpur tks/kiqj
(c) Jaisalmer tSlyesj (d) Bikaner chdkusj
Q4. Which personality from Udaipur district has been honored with the Dadasaheb Phalke Icon Award-2023 in
Mumbai?
mn;iqj ftys dh fdl 'kf[l;r dks eqacà esa nknk lkgc QkYds vkbd‚u vokMZ&2023 ls lEekfur fd;k x;k gS\
(a) Rambabu jkeckcw (b) Ramesh Awasthi jes’k voLFkh
(c) Rohit Kothari jksfgr dksBkjh (d) Anil Bhojak vfuy Hkkstd
Q5. Where has Rajasthan's first iodized salt plant been established?
jktLFkku dk igyk vk;ksMkbt ued IykaV dgka LFkkfir fd;k x;k gS\
(a) Nathdwara, Rajsamand ukFk}kjk] jktlean (b) Osian, Jodhpur vksfl;ka] tksèkiqj
(c) Nawan, Kuchaman ukoka] dqpkeu (d) Sambhar, Jaipur lkaHkj] t;iqj
Q6. Recently, which state government has signed a MoU with NTPC for green hydrogen and renewable energy
development?
gky gh es]a fdl jkT; ljdkj us gfjr gkbMªkstu vkSj uohdj.kh; ÅtkZ fodkl ds fy, ,uVhihlh ds lkFk ,d le>kSrk Kkiu ij gLrk{kj fd, gSa\
[A]Rajasthan jktLFkku [B]Maharashtra egkjk"Vª
[C]UttarPradesh mÙkj izn’s k [D] Haryana gfj;k.kk
Q7. The Rajasthan government has decided to hold convention on preserving heritage properties in which city?
jktLFkku ljdkj us fdl 'kgj esa fojklr laifÙk;ksa ds laj{k.k ij lEesyu vk;ksftr djus dk fu.kZ; fy;k gS\
[A]Bikaner chdkusj [B]Jaipur t;iqj
[C]Udaipur mn;iqj [D] Bharatpur Hkjriqj
Q8. Which city of Rajasthan has recently declared UNESCO World Heritage site?
jktLFkku ds fdl 'kgj dks gky gh esa ;wuLs dks us foÜo èkjksgj LFky ?kksf"kr fd;k gS\
[A]Bikaner chdkusj [B]Udaipur mn;iqj
[C]Jaipur t;iqj [D] Jodhpur tks/kiqj
Q9. What is the new name of the food security scheme in Rajasthan, previously known as Indira Rasoi Yojana?
jktLFkku esa [kk| lqj{kk ;kstuk] ftls igys bafnjk jlksà ;kstuk ds uke ls tkuk tkrk Fkk] dk u;k uke D;k gS\
[A] Atal Bhojan Yojana vVy Hkkstu ;kstuk [B] Shree Annapurna Rasoi Yojana Jh vUuiw.kkZ jlksbZ ;kstuk
[C] Atal Rasoi vVy jlksbZ [D] Swami Vivekananda Aahar Yojana Lokeh foosdkuUn vkgkj ;kstuk
Q10.Recently, the Supreme Court has ordered the Rajasthan government to shutter 68 mines operating within a 1 km
periphery of the critical tiger habitat of which tiger reserve?
gky gh es]a lqçhe dksVZ us jktLFkku ljdkj dks fdl ck?k vHk;kj.; ds egRoiw.kZ ck?k fuokl LFkku ds 1 fdeh dh ifjfèk ds Hkhrj py jgh 68
[knkuksa dks can djus dk vkns'k fn;k gS\
A. SariskaTigerReserve lfjLdk Vkbxj fjtoZ
Head Office:- 68/27 Haldighati Marg Pratap Nagar Sanganer Call Us:- 8233013555
B. RanthamboreTigerReserve j.kFkaHkkSj Vkbxj fjtoZ
C. Dholpur&KarauliTigerReserve èkkSyiqj&djkSyh Vkbxj fjtoZ
D. Ramgarh Visdhari Tiger Reserve jkex<+ fo"kèkkjh Vkbxj fjtoZ
Q11. If Reena says, “Anjali's father Raman is the only son of my father-in-law Ramanand”, then how is Piyu, who is the
sister of Anjali, related to Ramanand ?
;fn jhuk dgrh gS] Þvatfy ds firk jeu esjs llqj jkekuan dk bdykSrk iq= gSÞ] rks fi;w] tks vatfy dh cgu gS] jkekuan ls dSls lacfa èkr gS\
A. Wife iRuh B. Sister cgu
C. Grand-daughter iksrh D. Daughter csVh
Q12. Assume that there are three statements followed by several conclusions. You have to take the given statements
to be true, even if they seem to be at variance from commonly-known facts and then decide which of the given
conclusion/s logically follows.
eku yhft, fd rhu dFku vkSj mlds ckn dà fu"d"kZ gSaA vkidks fn, x, dFkuksa dks lR; ekuuk gS] Hkys gh os lkekU;r% Kkr rF;ksa ls fHkUu çrhr
gksrs gksa vkSj fQj fu.kZ; ysa fd fn, x, fu"d"kks± esa ls dkSu lk fu"d"kZ rkÆdd :i ls vuqlj.k djrk gSA
Statements : I. All Pens are Tables lHkh isu Vscy gSa
II. Some tables are rulers. dqN Vscysa :yj gSA
III. Some rulers are chalk. dqN 'kkld pkd gSa
Conclusion : I. Some tables are chalk. dqN Vscy pkWd gSaA
II. Some pens are chalk. dqN isu pkWd gSa
III. Some rulers are pens. dqN :yj isu gSaA
IV. Some chalk are ruler dqN pkd :yj gS
A. Only IV follows B. Only II and I follows.
C. Only III follows. D. Only I, II and III followse
Q13. Arrange the given words in the sequence in which they occur in the dictionary and choose the correct sequence.
fn, x, 'kCnksa dks mlh Øe esa O;ofLFkr djsa ftlesa os 'kCndks"k esa vkrs gSa vkSj lgh Øe pquaAs
1. Economic vkfFkZd 2. Earlier igys 3. Each izR;sd
4. Edition laLdj.k 5. Eager mRlqd
A. 3, 4, 1, 5, 2 B. 2, 1, 3, 5, 4
C. 3, 2, 4, 1, 5 D. 3, 5, 2, 1, 4
Q14. If “GREEN” is given number code as 49, what is the difference between the number codes of “VIOLET” and
“PINK” ?
;fn ÞGREENÞ dks la[;k dksM 49 fn;k x;k gS] rks ÞVIOLETÞ vkSj ÞPINKÞ ds la[;k dksM ds chp D;k varj gS\
a. 55 b. 45 c. 33 d. 60
Q15. In given question, various terms of an alphabet series is given with one term missing as shown by (?). Choose the
missing term out of the given alternatives.
fn, x, ç'u es]a o.kZekyk J`a[kyk ds fofHkUu in fn, x, gSa] ftlesa ,d in yqIr gS tSlk fd ¼\½ }kjk n'kkZ;k x;k gSA fn, x, fodYiksa esa ls yqIr
in pqfu,A
D, G, J, M, ?, S, V
A. N B. P C. K D. O
Q16. 'A' is the sister of 'B'. 'C' is the husband of 'B'. 'C' is the brother of 'H'. What is the relation of 'H' and 'A' ?
'A' 'B' dh cgu gSA 'C' 'B' dk ifr gSA 'C', 'H' dk HkkbZ gSA 'H' vkSj 'A' dk lac/a k gS\
a. Son csVk b. No specific relation dksbZ fo’ks"k lac/a k ugha
c. Sister-in-law HkkHkh d. Brother-in-la Tkhtkth
Q17. In a span of 24 hours, how many times would the two hands of a clock point exactly in opposite directions ?
24 ?kaVs dh vofèk es]a ?kM+h dh nksuksa lwb;ka fdruh ckj fcYdqy foijhr fn'kkvksa esa bafxr djsaxh\
a. 10 b. 11 c. 23 d. 22
Head Office:- TRIVANI CHOURAHA, GOPALPURA BYPASS, JAIPUR Call Us:- 8233013555
Q18. ¾ part of tank is full of water. When 30 litres of water is taken out it becomes empty. The capacity of the tank is?
Vadh dk ¾ Hkkx ikuh ls Hkjk gSA 30 yhVj ikuh fudkyus ij ;g [kkyh gks tkrk gSA VSad dh {kerk gS\
a. 36 litres b. 42 litres c. 40 litres d. 38 litres
Q19. 280 oranges are divided among some boys and girls whose total number is 50 so that each boy gets 5 oranges
and each girl get 7 oranges. The number of girls is
280 larjs dqN yM+dksa vkSj yM+fd;ksa ds chp ckaVs x, ftudh dqy la[;k 50 gS rkfd çR;sd yM+ds dks 5 larjs vkSj çR;sd yM+dh dks 7 larjs feysAa
yM+fd;ksa dh la[;k gS
a. 30 b. 35 c. 15 d. 20
Q20. In a certain language, if SUNSHINE is coded as TVOTIJOF then how will MOON be coded:
,d fuf'pr Hkk"kk es]a ;fn SUNSHINE dks TVOTIJOF ds :i esa dksfMr fd;k tkrk gS rks MOON dks dSls dksfMr fd;k tk,xk%
a. NPPQ b. NPPO c. PPON d. NQQP
Q27. ____ are designed by database designers to facilitate communications between the database and the software.
A. Database Instances B. Database Schemas
C. Database Roles D. Database Structure
Q29. Let R = ABCDE is a relational scheme with functional dependency set F = {A → B, B → C, AC → D}. The attribute
closures of A and E are
A. ABCD, φ B. ABCD, E C. Φ, φ D. ABC, E
Head Office:- TRIVANI CHOURAHA, GOPALPURA BYPASS, JAIPUR Call Us:- 8233013555
Q30. The Relation Vendor Order (V_no, V_ord_no, V_name, Qty_sup, unit_price) is in 2NF because:
A. Non_key attribute V_name is dependent on V_no which is part of composite key
B. Non_key attribute V_name is dependent on Qty_sup
C. Key attribute Qty_sup is dependent on primary_key unit price
D. Key attribute V_ord_no is dependent on primary_key unit price
Q31. Which of the following concurrency control protocols ensure both conflict serializability and freedom from
deadlock? I. 2-phase locking II. Time-stamp ordering
A. I only B. II only
C. Both I and II D. Neither I nor II
Q32. Consider the following transactions with data items P and Q initialized to zero:
T1: read (P) ;
read (Q) ;
if P = 0 then Q : = Q + 1 ;
write (Q) ;
T2: read (Q) ;
read (P) ;
if Q = 0 then P : = P + 1 ;
write (P) ;
Any non-serial interleaving of T1 and T2 for concurrent execution leads to
A. A serializable schedule B. A schedule that is not conflict serializable
C. A conflict serializable schedule D. A schedule for which a precedence graph cannot be drawn
Q33. Assume the following information: Original timestamp value = 46 Receive timestamp value = 59 Transmit
timestamp value = 60 Timestamp at arrival of packet = 69 Which of the following statements is correct?
A. Receive clock should go back by 3 milliseconds
B. Transmit and Receive clocks are synchronized
C. Transmit clock should go back by 3 milliseconds
D. Receive clock should go ahead by 1 milliseconds
Q34. Suppose a database system crashes again while recovering from a previous crash. Assume check pointing is not
done by the database either during the transactions or during recovery. Which of the following statements is/are
correct?
A. The same undo and redo list will be used while recovering again
B. The system cannot recover any further
C. All the transactions that are already undone and redone will not be recovered again
D. The database will become inconsistent
Q35. The physical locations of a record is determined by a mathematical formula that transforms file key into a record
location in a/an
A. B-tree file B. Indexed file C. Hashed file D. All these
Q38. Consider a database implemented using B+ tree for file indexing and installed on a disk drive with block size of 4
KB. The size of search key is 12 bytes and the size of tree/disk pointer is 8 bytes. Assume that the database has one
million records. Also assume that no node of the B+ tree and no records are present initially in main memory. Consider
that each record fits into one disk block. The minimum number of disk accesses required to retrieve any record in the
database is _______
A. 4 B. 6
C. 7 D. 8
Q39. Assume transaction A holds a share lock R. If a transaction B also requests for a shared lock or R.
A. result in deadlock situation B. immediately be granted
C. immediately be rejected D. be granted as soon as it is released by A
Q40. In context of database, let T1 and T2 are two concurrent transactions. Consider the following sequence of
operations on data X :
T1 : READ(X) T2 : READ(X)
T1 : WRITE(X) T2 : WRITE(X)
This is a __________ problem.
A. Dirty Read B. Lost Update
C. Incorrect Summary D. Unrepeatable Read
Q41. Concurrency control in RDBMS is important for which of the following reasons?
A. To ensure data integrity when updates occur to the database in a single - user environment.
B. To ensure data integrity when reads occur to the database in a single-user environment.
C. To ensure data integrity when updates occur to the database in a multi-user environment.
D. To ensure data integrity when reads occur to the database in a multi-user environment.
Q42. Which of the following concurrency control protocols ensure both conflict serializability and freedom from
deadlock?
I. 2-phase locking
II. Time-stamp ordering
A. I only B. II only
C. Both I and II D. Neither I nor II
Q43. If transaction T1 reads a change made by transaction T2, then T1 commits only after T2 commits. This property of
a transaction schedule is known as:
A. Strict B. Serializable
C. Recoverable D. Cascadeless
Q44. Which of the following is correct according to the technology deployed by DBMS?
a) Pointers are used to maintain transactional integrity and consistency
b) Cursors are used to maintain transactional integrity and consistency
c) Locks are used to maintain transactional integrity and consistency
d) Triggers are used to maintain transactional integrity and consistency
Head Office:- TRIVANI CHOURAHA, GOPALPURA BYPASS, JAIPUR Call Us:- 8233013555
Q45. Two concurrent executing transactions T1 and T2 are allowed to update same stock item say ‘A’ in an
uncontrolled manner. In such a scenario, following problems may occur:
(a) Dirty read problem
(b) Lost update problem
(c) Transaction failure
(d) Inconsistent database state
Which of the following option is correct if database system has no concurrency module and allow concurrent
execution of above two transactions?
A. (a), (b) and (c) only B. (c) and (d) only
C. (a) and (b) only D. (a), (b) and (d) only
Q46. Which one of the following makes permanently recorded transaction in the database?
A. View B. Commit
C. Roll back D. Flash back
Q48. Consider a schema R(X, Y, Z W) and functional dependencies X → Y and W → Z. Then the decomposition of R into
T1(X, Y) and T2(Z, W) is
A. Dependency preserving and lossless join
B. Dependency preserving but not lossless join
C. Not dependency preserving but lossless join
D. Neither dependency preserving nor lossless join
Q49. Let the set of functional dependencies F = {QR → S, R → P, S → Q} hold on a relation schema X = (PQRS). X is not
in BCNF. Suppose X is decomposed into two schemas and Z where Y = (PR) and Z = (QRS). Consider the two statements
given below:
I. Both Y and Z are in BCNF
II. Decomposition of X into Y and Z is dependency preserving and a lossless.
Which of the above statements is/are correct?
A. I only B. Neither I nor II
C. Both I and II D. II only
Q50. Let r be a relation instance with schema R = (A, B, C, D). We define r1 = ΠA, B, C (r) and r2 = ΠA.D (r). Let s = r1 *
r2 where * denotes natural join. Given that the decomposition of r into r1 and r2 is lossy, which one of the following is
TRUE?
A. s ⊂ r B. r ∪ s C. r ⊂ s D. r * s = s
Q51. Consider a relation scheme R = (A, B, C, D, E, H) on which the following functional dependencies hold: {A–>B, BC–
>D, E–>C, D–>A}. What are the candidate keys of R?
A. AE, BE B. AE, BE, DE
C. AEH, BEH, BCH D. AEH, BEH, DEH
Head Office:- TRIVANI CHOURAHA, GOPALPURA BYPASS, JAIPUR Call Us:- 8233013555
Q52. The relation scheme Student Performance (name, courseNo, rollNo, grade) has the following functional
dependencies:
name, courseNo → grade
rollNo, courseNo → grade
name → rollNo
rollNo → name
The highest normal form of this relation scheme is
A. 2 NF B. 3 NF
C. BCNF D. 4NF
Q53. Consider the relation Student (name, sex, marks), where the primary key is shown underlined, pertaining to
students in a class that has at least one boy and one girl. What does the following relational algebra expression
produce? (Note: r is the rename operator).
Q55. Relation R with an associated set of functional dependencies, F is decomposed into BCNF. The redundancy
(arising out of functional dependencies) in the resulting set relations is.
A. Zero
B. More than zero but less than that of an equivalent 3NF decomposition
C. Proportional to the size of F+
D. Indeterminate
Head Office:- TRIVANI CHOURAHA, GOPALPURA BYPASS, JAIPUR Call Us:- 8233013555
Q57. Consider the relation employee(name, sex, supervisorName) with name as the key. supervisorName gives the
name of the supervisor of the employee under consideration. What does the following Tuple Relational Calculus query
produce?
Q58. Consider a join (relation algebra) between relations r(R)and s(S) using the nested loop method. There are 3
buffers each of size equal to disk block size, out of which one buffer is reserved for intermediate results. Assuming
size(r(R)) < size(s(S)), the join will have fewer number of disk block accesses if
A. relation r(R) is in the outer loop.
B. relation s(S) is in the outer loop.
C. join selection factor between r(R) and s(S) is more than 0.5.
D. join selection factor between r(R) and s(S) is less than 0.5.
Q59. Which is the optimized version of the relational algebra expression: ПA1(ПA2(σF1(σF2(r))) where A1, A2are sets
of attributes in r with A1< A2and F1, F2 are Boolean expression based on attributes in r?
(a)ПA1(σF1⋂F2(r)) (b) ПA1(σ(F1⋃F2) (r))
(c) ПA2(σ(F1⋂F2)(r)) (d) ПA2(σ(F1⋃ F2) (r))
Q62. A network security system that protects network resources by filtering message at the application layer is,
A. Packet Filter Firewall B. Proxy Firewall
C. Stateful inspection Firewall D. Next-Gen Firewall
Q63. Post office protocol (POP) is a message access protocol which is used to extract message for client. In this regard,
which of the following are true ?
(A) POP has two modes, Delete mode and keep
(B) In Delete mode, mail is deleted from mail box after each retrival
(C) In Delete mode, mail is deleted from mail box before each retrieval
(D) In keep mode, mail is deleted before retrival
Head Office:- TRIVANI CHOURAHA, GOPALPURA BYPASS, JAIPUR Call Us:- 8233013555
(E) In keep mode, mail remains in mail box after retrival
Choose the correct answer from the options given below:
A. (A) and (B) only B. (A), (D) and (E) only
C. (A), (B), (C) and (D) only D. (A), (B) and (E) only
Q65. Which of the following is not a protocol for communication within network?
A. TCP/IP B. HTML
C. HTTP D. None of the above
Q66. In computing, ______ is a network security system that monitors and controls incoming and outgoing network
traffic based on predetermined security rules.
A. Spyware B. Cookie
C. Spam D. Firewall
Q67. Which among the following network topologies has the highest transmission speed?
A. LAN B. WAN
C. MAN D. Both LAN and WAN have equal transmission speeds.
Q69. Which among the following protocols is known as the terminal emulation protocol?
A. HTTP B. FTP
C. SMTP D. TELENET
Q70. A combination of hardware and software which links two parts of the same LAN or two compatible LANs by
directing message to the correct node is called
A. Embedded System B. Router
C. Hybrid Computer D. Microprocessor
Q71. Arrange the following different types of computer networks in an ascending order on the basic of geographical
area implied.
(A) MAN (B) WAN (C) LAN
Choose the correct answer from the options given below:
A. (C), (B), (A) B. (A), (C), (B)
C. (C), (A), (B) D. (B), (a), (C)
Q73. What is the maximum number of links in a mesh network with N nodes?
A. N(N - 1) B. N2 C. N(N - 1) / 2 D. N
Head Office:- TRIVANI CHOURAHA, GOPALPURA BYPASS, JAIPUR Call Us:- 8233013555
Q74. Which of the following internet service is appropriate to access the computer of your office from home?
A. WWW B. IRC C. FTP D. Telnet
Q75. Which of the following device is used to connect similar LAN with same protocols?
A. Gateways B. Router C. Switches D. Bridges
Q76. Which of the following topologies provides a highly fault - tolerant architecture?
A. Star B. Bus C. Ring D. Mesh
Q77. A message consisting of 2400 bits is to be passed over the Internet. The message is passed to the transport layer
which appends a 150-bit header, followed by the network layer which uses a 120-bit header. Network layer packets
are transmitted via two networks, each of which uses a 26-bit header. The destination network only accepts up to 900
bits long. The number of bits, including headers delivered to the destination network, is
A. 2706 bits B. 2634 bits
C. 2554 bits D. 2476 bits
Q79. What is the name of the device that connects two computers by means of telephone line?
A. Cable B. Bus C. Modem D. Tape
Q82. Period of a signal of 100 ms. Then the frequency The of this signal in kilohertz is ______.
A. 10 B. 10-1 C. 10-2 D. 10-3
Q83. Pick the incorrect statement in error retransmission used in continuous ARQ method
A. Go back N method requires more storage at the receiving side
B. Selected repeat involves complex logging than Go back N
C. Go back N has better line utilization
D. Selective repeat has better line utilization
Q84. Which of the following device is used to connect similar LAN with same protocols?
A. Gateways B. Router
C. Switches D. Bridges
Head Office:- TRIVANI CHOURAHA, GOPALPURA BYPASS, JAIPUR Call Us:- 8233013555
Q86. The device bridge is used at _____ layer of OSI reference model.
A. Datalink B. Network
C. Transport D. Application
Q87. Which layer in the OSI model provides the data transfer in the form of frames across the transmission link?
A. Data link layer B. Physical layer
C. Network layer D. Session layer
Q91. Consider the following statements regarding the slow start phase of the TCP congestion control algorithm. Note
that cwnd stands for the TCP congestion window and MSS denotes the Maximum Segment Size.
(i) The cwnd increase by 2 MSS on every successful acknowledgement.
(ii) The cwnd approximately doubles on every successful acknowledgement.
(iii) The cwnd increase by 1 MSS every round trip time.
(iv) The cwnd approximately doubles every round trip time.
Which one of the following is correct?
A. Only (ii) and (iii) are true B. Only (i) and (iii) are true
C. Only (iv) is true D. Only (i) and (iv) are true
Q92. Station A uses 32-byte packets to transmit message to Station B using a sliding window protocol. The round trip
time between A and B is 40 ms and the bottleneck bandwidth on the path A and B is 64 kbps. What is the optimal
window size that A should use?
A. 5 B. 10 C. 40 D. 80
Q93. With regard to Internet security, the full form of SSL is ____ and it provides security at the _____ layer.
A. Simple Socket Layer; Transport B. Secure Service Layer; Application
C. Secure Socket Layer; Transport D. Secure Socket Layer; Application
Q94. Which layer of OSI model provide the service of token management?
A. Session Layer B. Physical Layer
C. Transport Layer D. Data link layer
Head Office:- TRIVANI CHOURAHA, GOPALPURA BYPASS, JAIPUR Call Us:- 8233013555
Q95. Match the following:
I II
A. Physical Layer P. Packets
B. Network Layer Q. Error control
C. Transport Layer R. Dialogue control
D. Session Layer S. Bits
A. A - R, B - P, C - S, D - Q B. A - S, B - P, C - R, D - Q
C. A - S, B - P, C - Q, D - R D. A - R, B - P, C - Q, D - S
Q96. Which layer is associated with log in and log out form the network?
A. Data Link B. Presentation
C. Session D. Transport
Q97. Which of the following statement is incorrect about the ISO-OSI model?
A. when any two computers communicate, then all the layers communicate virtually with each other.
B. The communication between the corresponding layer is carried out by the protocol.
C. Representation of 1's and 2's complement operates at the presentation layer.
D. Interruption management, dialogue management are the functions of session management.
Q99. In the TCP/IP model, encryption and decryption are functions of _____ layer
A. data link B. Network
C. Transport D. Application
Q100. The major functions of the presentation layer in OSI stack are:
A. Dialog presentation and control
B. Dealing with difference in data representation, encryption and compression
C. Presenting the full and half duplex services to the user
D. enabling end to end error control presentation
Head Office:- TRIVANI CHOURAHA, GOPALPURA BYPASS, JAIPUR Call Us:- 8233013555