Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Topic :: Wing





Wing Interview Questions
Questions Answers Views Company eMail

Convert the following infix expression to post fix notation ((a+2)*(b+4)) -1

9 21747

Explian following terms: Constraint Rules, Design by contract.

1 5736

Give Proper Example for following situations 1. Sevirity 'Low' Priority 'Urgent' 2. Sevirity 'Urgent' Priority 'Low' 3. Sevirity 'Urgent' Priority 'Urgent' ? Also explain what is sevirity & Priority if A Printer suppose to print out 1000 Print outs for 1 refill of cartage But actually it is taking 1100?

4 8727

Which of the following, we cannot include in a compiled module? a)check points b)analog statements c)reporting statemnts

Belly,

3 7129

What is shadowing?

TCS,

5 19697

What does the following series of commands accomplish? router igrp 71 network 10.0.0.0 router igrp 109 network 172.68.7.0 A. It isolates networks 10.0.0.0 and 172.68.7.0. B. It loads igrp for networks 109 and 71. C. It disables RIP. D. It disables all routing protocols.

1 5883

You have typed "ping" 172.16.101.1 and get the following display: Type escape sequence to abort. Sending 5, 100-byte ICMP Echoes to 172.16.101.1, timeout is 2 seconds: .!!!! What does the "." signify? A. That one message timed out. B. That all messages were successful. C. That one message was successful. D. That one message completed in under the allotted timeframe.

1 8234

The following selections show the command prompt and the configuration of the IP network mask. Which two are correct? A. Router#term IP netmask-format { bitcount | decimal | hexadecimal } B. Router(config-if)#IP netmask-format { bitcount | decimal | hexadecimal } C. Router(config-if)#netmask-format { bitcount | decimal | hexadecimal } D. Router#ip netmask-format { bitcount | decimal | hexadecimal }

2 6973

You are given the following address: 153.50.6.27/25. Determine the subnet mask, address class, subnet address, and broadcast address. A. 255.255.255.128, B,153.50.6.0, 153.50.6.127 B. 255.255.255.128, C,153.50.6.0, 153.50.6.127 C. 255.255.255.128, C,153.50.6.127, 153.50.6.0 D. 255.255.255.224, C,153.50.6.0, 153.50.6.127

2 12391

You are given the following address: 128.16.32.13/30. Determine the subnet mask, address class, subnet address, and broadcast address. A. 255.255.255.252, B,128.16.32.12, 128.16.32.15 B. 255.255.255.252, C,128.16.32.12, 128.16.32.15 C. 255.255.255.252, B,128.16.32.15, 128.16.32.12 D. 255.255.255.248, B,128.16.32.12, 128.16.32.15

1 7927

You are given the following address: 15.16.193.6/21. Determine the subnet mask, address class, subnet address, and broadcast address. A. 255.255.248.0, A, 15.16.192.0, 15.16.199.255 B. 255.255.248.0, B, 15.16.192.0, 15.16.199.255 C. 255.255.248.0, A, 15.16.199.255, 14.15.192.0 D. 255.255.242.0, A, 15.16.192.0, 15.16.199.255

2 9282

What do the following commands accomplish? access-list 1 deny 172.16.4.0 0.0.0.255 access-list 1 permit any interface ethernet 0 IP access-group 1 out A. This will block traffic from subnet 172.16.4.0 and allow all other traffic. B. This will allow traffic from subnet 172.16.4.0 and block all other traffic. C. All traffic is allowed. D. All traffic is blocked.

1 8508

What do the following statements in an extended access list accomplish? access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 21 access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 20 access-list 101 permit TCP 172.16.4.0 0.0.0.255 0.0.0.0 255.255.255.255 A. This will block ftp traffic. B. This will block http traffic. C. This will permit ftp traffic. D. This will permit tftp traffic.

1 6535

Access lists are numbered. Which of the following ranges could be used for an IP access list? A. 600 - 699 B. 100 - 199 C. 1 - 99 D. 800 - 899 E. 1000 - 1099

1 4484

What do the following commands accomplish? access-list 1 permit 172.16.0.0 0.0.255.255 interface ethernet 0 IP access-group 1 out interface ethernet 1 IP access-group 1 out A. Only traffic from the source network 172.16.0.0 will be blocked. B. Only traffic from the source network 172.16.0.0 will be forwarded. Non-172.16.0.0 network traffic is blocked. C. Non-172.16.0.0 traffic will be forwarded. D. All traffic will be forwarded.

1 11784




Related Topics


Un-Answered Questions { Wing }

What are advantages of using Java?s layout managers than windowing systems?

2375


How to synchronize slow growing bacterial species of Cyanobacteria, Thiobacilli, Mycoplasma?

1919


What Testing process U r following in ur organization?

2381


what r the strategies & methodologies r u following in preperation of test cases based on usecase?

2096


Which one of the following activities is the most efficient and most cost effective at identifying defects? 1. Prototyping 2. Unit test 3. Beta test 4. Design/code inspection 5. Risk analysis

2083


The Following Characterstics posses some XYZ company. * Uses formal standards and policies * Conducts software inspections * Has advanced configuration management and change control * Uses CASE tools * Has a software engineering process group * Gathers metrics on process and quality * Requires that developers have formal software engineering training * Practices continued process improvement Based on aboue , Tell me which CMM Level is the company..? 1. Level 1 - Initial 2. Level 2 - Repeatable 3. Level 3 - Defined 4. Level 4 - Managed 5. Level 5 - Optimizing

2189


Rules of civil law are different than that of criminal law. Are you prepared to enter this knowing that there is little guidance from within our office?

2281


During a heart attack, blood flowing to the heart muscle is interrupted by blockage of a coronary artery. How would you expect the metabolism in the heart to change?

3082


A 22 year old woman collapses following Neville Barnes forceps delivery of the second twin. She is hypotensive and tachycardic and the estimated blood loss is now 800ml. How would you manage this situation?

3466


I'm new to sewing, and I need to know what are some good pieces to start with?

2180


Which namespace do the classes, allowing you to support COM functionality, are located?

2622


Who was the first person to recognize that true flies have two wings and gave them the name ?Diptera??

2059


Who was the first person to recognize that true flies have two wings and gave them the name ?Diptera??

1993


What is the trouble in growing streptococcus species?

2183


What are the Conditions for growing slow-growing mycobacteria?

1967