Sdp9 From The Photos

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Daniyar
D
Daniyar
Community Contributor
Quizzes Created: 2 | Total Attempts: 949
Questions: 209 | Attempts: 182

SettingsSettingsSettings
Sdp9 From The Photos - Quiz

.


Questions and Answers
  • 1. 

    1. Two packets A and B are sent in that order through a connectionless communication network. They will arrive at the destination:

    • A.

      In any order, after possibly having traversed different routes.

    • B.

      In the order A-B, after having traversed the same route.

    • C.

      In any order, after having traversed the same route.

    • D.

      In the order A-B, after possibly having traversed different routes

    Correct Answer
    A. In any order, after possibly having traversed different routes.
    Explanation
    In a connectionless communication network, packets are sent independently and do not follow a specific route or sequence. Therefore, it is possible for the packets to arrive at the destination in any order. Additionally, since the packets can traverse different routes, there is also a possibility that they may have taken different paths before reaching the destination. Thus, the correct answer is that the packets can arrive in any order, after possibly having traversed different routes.

    Rate this question:

  • 2. 

    1. The Internet received its name in the 1980s because:

    • A.

      It consisted of many interconnected networks.

    • B.

      It was an interim (temporary) design of what it later became, but the name stuck.

    • C.

      It was meant to be a network internal to the United States Department of Defense.

    • D.

      It achieved international scope with the addition of the City University of London.

    Correct Answer
    A. It consisted of many interconnected networks.
    Explanation
    The correct answer is "it consisted of many interconnected networks." This explanation is supported by the fact that the Internet was originally developed as a network of interconnected computers and networks, allowing for communication and data sharing between different systems. This interconnected nature of the Internet is what eventually led to its widespread adoption and global reach. The other options provided in the question do not accurately reflect the true reason for the Internet's name.

    Rate this question:

  • 3. 

    1. All store-and-forward networks are:

    • A.

      Packet or message switched networks.

    • B.

      Broadcast networks

    • C.

      Connection-based networks

    • D.

      Connectionless networks

    Correct Answer
    A. Packet or message switched networks.
    Explanation
    Store-and-forward networks are networks that receive and store the entire message or packet before forwarding it to the next node. This type of network is commonly used in packet or message switched networks, where data is divided into packets and transmitted separately. In contrast, broadcast networks transmit data to all nodes on the network simultaneously. Connection-based networks establish a dedicated connection between sender and receiver before transmitting data, while connectionless networks do not establish a dedicated connection and each packet is routed independently. Therefore, the correct answer is packet or message switched networks.

    Rate this question:

  • 4. 

    The Date: header in the HTTP response message indicates when the object in the response was last modified.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The Date: header in the HTTP response message does not indicate when the object in the response was last modified. Instead, the Last-Modified header is used for this purpose. The Date: header indicates the date and time when the response message was generated by the server.

    Rate this question:

  • 5. 

    The process that sends messages into, and receives messages from, the network through a software interface is called a socket

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    A socket is a software interface that allows communication between a computer program and the network. It enables the program to send and receive messages over the network. Therefore, the statement that the process that sends and receives messages through a software interface is called a socket is true.

    Rate this question:

  • 6. 

    1. The transfer of an html file from one host to another is:

    • A.

      Loss-tolerant and time sensitive

    • B.

      Loss-intolerant and time sensitive

    • C.

      Loss-intolerant and time insensitive

    • D.

      None of the above

    Correct Answer
    C. Loss-intolerant and time insensitive
    Explanation
    The transfer of an HTML file from one host to another is considered loss-intolerant because any loss or corruption of the file during the transfer could result in a broken or incomplete webpage. Additionally, it is time-insensitive because the speed of the transfer does not affect the functionality or integrity of the HTML file.

    Rate this question:

  • 7. 

    1. SMTP is used to

    • A.

      To transfer messages from one mail server to another

    • B.

      To transfer messages from mail server to a user agent

    • C.

      To define the format of message headers

    • D.

      All of the above

    Correct Answer
    A. To transfer messages from one mail server to another
    Explanation
    SMTP stands for Simple Mail Transfer Protocol. It is a communication protocol used to transfer email messages from one mail server to another. It is specifically designed for this purpose and ensures the reliable and efficient delivery of email messages across different servers. SMTP is not involved in transferring messages from a mail server to a user agent, nor does it define the format of message headers. Therefore, the correct answer is "to transfer messages from one mail server to another".

    Rate this question:

  • 8. 

    DNS resource record has Type\=MX

    • A.

      Value is the hostname of the DNS server that is authoritative for Name.

    • B.

      Value is the IP address of the mail server that has the alias hostname Name.

    • C.

      Value is the hostname of the mail server that has the alias hostname Name.

    • D.

      None of the above

    Correct Answer
    C. Value is the hostname of the mail server that has the alias hostname Name.
    Explanation
    The correct answer is "Value is the hostname of the mail server that has the alias hostname Name." This is because MX (Mail Exchanger) records are used to specify the mail server responsible for accepting email messages on behalf of a domain. The value in the MX record is the hostname of the mail server that should handle incoming mail for the specified domain.

    Rate this question:

  • 9. 

    1. When a UDP segment arrives to a host, in order to direct the segment to the appropriate socket, the OS uses

    • A.

      The destination port number

    • B.

      The source port number

    • C.

      The source IP address

    • D.

      All of the above

    Correct Answer
    A. The destination port number
    Explanation
    When a UDP segment arrives at a host, the operating system (OS) uses the destination port number to direct the segment to the appropriate socket. The destination port number is a unique identifier that specifies which application or service on the host should receive the incoming segment. The source port number and source IP address are not used by the OS for this purpose. Therefore, the correct answer is the destination port number.

    Rate this question:

  • 10. 

    1. The stop-and-wait protocol is highly inefficient when there is a

    • A.

      Large distance between source and destination and the transmission rate is high

    • B.

      Large distance between source and destination and the transmission rate is low

    • C.

      Short distance between source and destination and the transmission rate is high

    • D.

      Short distance between source and destination and the transmission rate is low

    Correct Answer
    A. Large distance between source and destination and the transmission rate is high
    Explanation
    The stop-and-wait protocol is highly inefficient when there is a large distance between source and destination and the transmission rate is high because it involves sending one packet at a time and waiting for an acknowledgment before sending the next packet. In a high transmission rate scenario, the time taken for the acknowledgment to reach the source becomes significant due to the large distance, resulting in a significant delay in the overall transmission process. This inefficiency can be mitigated by using other protocols like the sliding window protocol, which allows for the transmission of multiple packets before receiving an acknowledgment.

    Rate this question:

  • 11. 

    Pipelining requires which of the following

    • A.

      All of the above

    • B.

      Transmitting many packets  before receiving acknowledgements

    • C.

      Unique sequence numbers for each in-transit packet

    • D.

      Sender-side buffering of unacknowledged packets

    Correct Answer
    A. All of the above
    Explanation
    Pipelining in networking requires all of the mentioned options. It involves transmitting multiple packets before receiving acknowledgements, which helps in improving efficiency and reducing latency. Unique sequence numbers for each in-transit packet are necessary to ensure reliable delivery and maintain order. Sender-side buffering of unacknowledged packets is also essential to handle the flow of data and prevent congestion. Therefore, all of these options are required for effective pipelining in networking.

    Rate this question:

  • 12. 

    1. Suppose a client sends an HTTP request message with the If-modified-since: header. Suppose the object in a server has not 1changed since the last time a client retrieved the object. Then the server will send a response message with the status code

    • A.

      404 Not Found

    • B.

      200 OK

    • C.

      304 Not Modified

    • D.

      None of the above

    Correct Answer
    C. 304 Not Modified
    Explanation
    When a client sends an HTTP request message with the If-modified-since header, it means that the client is requesting a resource only if it has been modified since a certain date. In this scenario, the object on the server has not changed since the last time the client retrieved it. Therefore, the server will send a response message with the status code 304 Not Modified. This status code indicates that the requested resource has not been modified and the client can use its cached version without downloading it again.

    Rate this question:

  • 13. 

    1. Streams are not needed in which of the following programs:

    • A.

      UDPserver

    • B.

      TCPserver

    • C.

      UDPclient

    • D.

      TCPclient

    Correct Answer
    A. UDPserver
    Explanation
    Streams are not needed in a UDP server because UDP (User Datagram Protocol) is a connectionless protocol that does not guarantee the delivery of packets or the order in which they are received. Unlike TCP (Transmission Control Protocol), UDP does not establish a connection with the client, so there is no need for continuous data streams. UDP servers simply receive and process individual datagrams as they arrive.

    Rate this question:

  • 14. 

    For BitTorrent, which of the following is true:

    • A.

      Among the chunks that a peer does not have, the peer will request chunks that appear to be relatively rare in the torrent.

    • B.

      At a given instant of time, a peer A may upload to a peer B, even if peer B is not sending anything to A.

    • C.

      Although a peer may have 50 concurrent TCP connections with other peers, at any given instant of time it sends data to less than 10 other peers.

    • D.

      All of the above.

    Correct Answer
    D. All of the above.
    Explanation
    BitTorrent is a peer-to-peer file sharing protocol where peers exchange chunks of a file. The first statement is true because peers prioritize requesting chunks that are rare in the torrent to increase availability. The second statement is true because BitTorrent allows for reciprocal uploading, where a peer can upload to another peer even if they are not receiving anything in return. The third statement is true because although a peer can have multiple TCP connections, it typically sends data to only a subset of those connections at any given time. Therefore, all of the statements are true.

    Rate this question:

  • 15. 

    TCP applies fast retransmit to a segment when

    • A.

      It estimates unusually large RTTs

    • B.

      It receives three ACKs for an earlier segment

    • C.

      The segment's timer expires

    • D.

      none of the above

    Correct Answer
    B. It receives three ACKs for an earlier segment
    Explanation
    Fast retransmit is a mechanism used by TCP to quickly retransmit a lost segment without waiting for the retransmission timer to expire. It is triggered when the sender receives three duplicate acknowledgments (ACKs) for the same segment. This indicates that the receiver has received subsequent segments correctly but is still missing the one being acknowledged. Therefore, the sender assumes that the segment was lost and immediately retransmits it to avoid unnecessary delays in the data transmission.

    Rate this question:

  • 16. 

    Nmap is often used to:

    • A.

      Measure throughput between hosts

    • B.

      Measure round-trip times between hosts.

    • C.

      Decipher encrypted traffic

    • D.

      Do port scans over a range of ports at a target host.

    Correct Answer
    D. Do port scans over a range of ports at a target host.
    Explanation
    Nmap is a popular network scanning tool used to perform port scans over a range of ports at a target host. It helps in identifying open ports and services running on those ports, which can be useful for network administrators to ensure the security of their systems. By scanning a range of ports, Nmap can provide information about potential vulnerabilities and weaknesses that could be exploited by attackers. It is an essential tool for network reconnaissance and security testing purposes.

    Rate this question:

  • 17. 

    For Ethernet, if an adapter determines that a frame it has just received is addressed to a different adapter

    • A.

      It discards the frame without sending an error message to the network layer

    • B.

      It sends a NACK (not acknowledged frame) to the sending host

    • C.

      It delivers the frame to the network layer, and lets the network layer decide what to do

    • D.

      It discards the frame and sends an error message to the network layer

    Correct Answer
    A. It discards the frame without sending an error message to the network layer
    Explanation
    When an Ethernet adapter receives a frame that is addressed to a different adapter, it simply discards the frame without sending an error message to the network layer. This is because Ethernet operates at the data link layer, and it is the responsibility of the network layer to handle addressing and routing. The adapter does not need to notify the network layer about the discarded frame as it is not relevant to its operation.

    Rate this question:

  • 18. 

    A beacon frame sent by an AP includes:

    • A.

      Both the AP's MAC address and SSID.

    • B.

      The AP's SSID.

    • C.

      The AP's MAC address.

    • D.

      None of the above

    Correct Answer
    A. Both the AP's MAC address and SSID.
    Explanation
    A beacon frame is a type of management frame that is periodically broadcasted by an access point (AP) in a Wi-Fi network. It is used to announce the presence of the network and provide essential information to client devices. In this case, the correct answer is "both the AP's MAC address and SSID." This means that the beacon frame includes both the unique identifier (MAC address) of the AP and the network name (SSID) that clients can connect to. This information allows client devices to identify and join the appropriate network.

    Rate this question:

  • 19. 

    The 802.11 protocol does not implement collision detection because

    • A.

      The adapter would still not be able to detect all collisions due to hidden terminals.

    • B.

      It is costly to build wireless hardware that detects collisions.

    • C.

      Collision detection was found to be useless in wired Ethernet.

    • D.

      All of the above

    Correct Answer(s)
    B. It is costly to build wireless hardware that detects collisions.
    C. Collision detection was found to be useless in wired Ethernet.
    Explanation
    The correct answer is "it is costly to build wireless hardware that detects collisions" and "collision detection was found to be useless in wired Ethernet". The 802.11 protocol does not implement collision detection because it would be expensive to build wireless hardware that can accurately detect collisions in a wireless environment. Additionally, collision detection was already determined to be ineffective in wired Ethernet networks, so it is not implemented in the wireless protocol. Therefore, both reasons contribute to the decision of not including collision detection in the 802.11 protocol.

    Rate this question:

  • 20. 

    Packets sent by two stations in 802.11 can collide because

    • A.

      At a given time, the random backoff values of the two stations are the same

    • B.

      The packets are sent to different Aps but on the same channel

    • C.

      The two stations could be hidden from each other

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    The correct answer is "All of the above". This means that all of the given options can lead to packet collision in 802.11. When the random backoff values of two stations are the same, they may attempt to transmit at the same time, resulting in a collision. Similarly, if the packets are sent to different Access Points (APs) but on the same channel, they can interfere with each other and collide. Additionally, if the two stations are hidden from each other, they may not be able to detect each other's transmissions and collide.

    Rate this question:

  • 21. 

    An 802 11 frame includes

    • A.

      Four address fields.

    • B.

      A sequence number field.

    • C.

      An acknowledgement field.

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    An 802.11 frame includes four address fields, a sequence number field, and an acknowledgement field. This means that all of the mentioned fields are present in an 802.11 frame. The address fields are used to specify the source and destination MAC addresses. The sequence number field is used for reliable data transmission and to detect and discard duplicate frames. The acknowledgement field is used to confirm the successful reception of a frame. Therefore, all of these fields are included in an 802.11 frame.

    Rate this question:

  • 22. 

    Which of the following statements best describes the purpose of the SNMP protocol

    • A.

      The SNMP protocol is a tool for gathering data about network conditions and executing remote actions at remote managed devices

    • B.

      The SNMP protocol specified the action …

    • C.

      The SNMP protocol is used by the network …

    Correct Answer
    A. The SNMP protocol is a tool for gathering data about network conditions and executing remote actions at remote managed devices
    Explanation
    The correct answer explains that the purpose of the SNMP protocol is to gather data about network conditions and perform remote actions on managed devices. This means that SNMP allows for monitoring and managing network devices by collecting information and enabling remote control over them.

    Rate this question:

  • 23. 

    What is the purpose of the SNMP SetRequest message?

    • A.

      To allow a managing entity to query the value of a set of MIB object values in a managed device

    • B.

      To allow a managing entity to set the values of one or more MIB objects in a managed device

    • C.

      To allow a managed device to request and receive a set of initial values for MIB objects in the managed device.

    Correct Answer
    B. To allow a managing entity to set the values of one or more MIB objects in a managed device
    Explanation
    The purpose of the SNMP SetRequest message is to allow a managing entity to set the values of one or more MIB objects in a managed device. This message enables the managing entity to remotely configure and control the managed device by modifying the values of the MIB objects. It provides a means for the managing entity to make changes and updates to the configuration and behavior of the managed device through SNMP.

    Rate this question:

  • 24. 

    What is the purpose of a presentation service?

    • A.

      To display data in a format specified by a user.

    • B.

      None of the above

    • C.

      To allow a client to inform a server that it (the client) is present and ready to receive dat

    • D.

      To encode, transmit, and translate data from one machine-specific format to another

    Correct Answer
    D. To encode, transmit, and translate data from one machine-specific format to another
    Explanation
    The purpose of a presentation service is to encode, transmit, and translate data from one machine-specific format to another. This means that it is responsible for converting data into a format that can be easily understood and displayed by different devices or systems. This service ensures that data can be effectively communicated and shared across various platforms and technologies.

    Rate this question:

  • 25. 

    How we call the link-layer packets ?

    • A.

      Frames

    • B.

      Datagrams

    • C.

      Packets

    • D.

      Segment

    • E.

      Message

    Correct Answer
    A. Frames
    Explanation
    Link-layer packets are called frames. In computer networking, a frame is a unit of data that is transmitted over a physical link or network. It contains the source and destination addresses, error checking information, and the actual data being transmitted. Frames are used in the link layer of the OSI model to encapsulate and transmit data between network devices.

    Rate this question:

  • 26. 

    1. What is the segment?

    • A.

      Application-layer packet

    • B.

      Transport-layer packet

    • C.

      Data-link-layer packet

    • D.

      Physical-layer packet e. network-layer packet

    Correct Answer
    B. Transport-layer packet
    Explanation
    The segment refers to a unit of data that is generated at the transport layer of the OSI model. This layer is responsible for ensuring reliable communication between the source and destination systems. The transport-layer packet contains the segment along with additional information such as source and destination port numbers. This packet is then encapsulated into a network-layer packet for further transmission across the network.

    Rate this question:

  • 27. 

    Most packets use these as the inputs to the links. This means that the packet switch must receive the entire packet before it can begin to transmit the first bit of the packet onto the outbound link

    • A.

      Store and Forward

    • B.

      Datagram

    • C.

      Queuing delays

    • D.

      Reliable data

    Correct Answer
    A. Store and Forward
    Explanation
    Store and Forward is the correct answer because it refers to a packet-switching technique where the packet switch receives the entire packet before transmitting any part of it. This means that the switch stores the entire packet in its memory and checks for errors before forwarding it to the outbound link. This technique ensures reliable data transmission as it allows for error checking and correction before forwarding the packet. It also introduces queuing delays as the switch needs to wait for the entire packet to be received before transmitting it.

    Rate this question:

  • 28. 

    The housing a large number of hosts. is often used to create a powerful virtual server

    • A.

      Host center

    • B.

      Server house

    • C.

      Data center

    • D.

      Supercomputer

    Correct Answer
    C. Data center
    Explanation
    A data center is a facility that houses a large number of hosts, such as servers, storage devices, and networking equipment. It is designed to provide a secure and controlled environment for these hosts, ensuring their optimal performance and availability. By consolidating multiple hosts in a single location, a data center can create a powerful virtual server infrastructure that can handle high volumes of data processing and storage. Therefore, the statement "The housing a large number of hosts is often used to create a powerful virtual server" aligns with the concept of a data center.

    Rate this question:

  • 29. 

    In HTTP, the first line in a request message is called a _____ line; the first line in the response message is called the______ line

    • A.

      Request response

    • B.

      None

    • C.

      Response; request

    • D.

      Header line; request

    • E.

      Response: status

    Correct Answer
    B. None
    Explanation
    The correct answer is "None". This is because the question is asking for the terms used to describe the first line in a request message and the first line in a response message in HTTP. However, "None" is not a valid term for either of these lines. The request line and the status line are the correct terms for the first lines in a request message and a response message, respectively.

    Rate this question:

  • 30. 

    DNS provides a few other important services in addition to translating hostnames to IP addresses:

    • A.

      Host aliasing

    • B.

      Mail server aliasing

    • C.

      Load distribution

    • D.

      Delaying the packets

    • E.

      Congestion control

    • F.

      Define first hop router

    Correct Answer(s)
    A. Host aliasing
    B. Mail server aliasing
    C. Load distribution
    Explanation
    DNS provides several important services in addition to translating hostnames to IP addresses. Host aliasing allows multiple hostnames to be associated with a single IP address, making it easier to manage and access different services on a single server. Mail server aliasing enables multiple email servers to be associated with a single domain, improving redundancy and load balancing for email delivery. Load distribution involves distributing network traffic across multiple servers to improve performance and prevent overload on a single server. These services enhance the efficiency, reliability, and scalability of network infrastructure.

    Rate this question:

  • 31. 

    Small piece of data sent from a website and stored on the users computer by the users web browser while the user is browsing

    • A.

      Web cache

    • B.

      Set – cookies

    • C.

      Cookies

    • D.

      Status line

    Correct Answer
    C. Cookies
    Explanation
    Cookies are small pieces of data that are sent from a website and stored on the user's computer by the user's web browser while they are browsing. These cookies are used to remember information about the user, such as their preferences or login information, and are commonly used to enhance the browsing experience. By storing this data on the user's computer, websites can retrieve it later to personalize the user's experience or track their activities.

    Rate this question:

  • 32. 

    How many ports can be per IP address

    • A.

      65.535

    • B.

      64,535

    • C.

      65,335

    • D.

      68.535

    • E.

      60,535

    Correct Answer
    A. 65.535
    Explanation
    The correct answer is 65.535. This is because the maximum number of ports that can be assigned to an IP address is 65,535. Ports are used to identify specific applications or services running on a device connected to a network. Each port is assigned a unique number between 0 and 65,535, allowing for a wide range of possible connections and services.

    Rate this question:

  • 33. 

    1. FTP is built on _____ architecture

    • A.

      Client-server

    • B.

      P2P

    • C.

      Both of the mentioned

    • D.

      None

    Correct Answer
    A. Client-server
    Explanation
    FTP (File Transfer Protocol) is built on a client-server architecture. In this architecture, the client initiates a connection with the server and sends requests for file transfers. The server, which is always online, responds to these requests by providing access to its file system and allowing the client to upload or download files. This client-server model allows for efficient and secure file transfers, as the server manages the resources and controls access to files while the client interacts with the server to perform the desired actions.

    Rate this question:

  • 34. 

    1. FTP uses _ parallel TCP connection to transfer

    • A.

      1

    • B.

      2

    • C.

      3

    • D.

      4

    Correct Answer
    B. 2
    Explanation
    FTP uses 2 parallel TCP connections to transfer data. One connection is used for control information, such as commands and responses, while the other connection is used for the actual data transfer. This allows for efficient and reliable transfer of files over the network.

    Rate this question:

  • 35. 

    If 5 files are transferred from server A to client B in the same session. The number of TCP connection between A and B is

    • A.

      5

    • B.

      10

    • C.

      2

    • D.

      6

    Correct Answer
    D. 6
    Explanation
    In a TCP connection, there is a separate connection established for each file transfer. Since there are 5 files being transferred from server A to client B, there will be 5 separate TCP connections established. Additionally, there will be an extra TCP connection for the initial session setup. Therefore, the total number of TCP connections between A and B is 6.

    Rate this question:

  • 36. 

    __________algorithm computes the least-cost path between source and destination using complete, global knowledge about the network.

    • A.

      A Global Routing

    • B.

      Forwarding

    • C.

      None

    • D.

      Virtual circuit

    Correct Answer
    A. A Global Routing
    Explanation
    Global Routing algorithm computes the least-cost path between source and destination using complete, global knowledge about the network. This means that it takes into account the entire network topology and all available information about the network, such as link costs and congestion levels, to determine the best route. It considers the network as a whole and makes decisions based on the overall network state, rather than just local information. This allows it to find the most efficient path from the source to the destination, considering all possible options.

    Rate this question:

  • 37. 

    Computer networks that provide only a connection service at the network layer are called

    • A.

      Datagram network

    • B.

      Virtual-circuit networks

    • C.

      Network

    • D.

      None

    Correct Answer
    B. Virtual-circuit networks
    Explanation
    Virtual-circuit networks are computer networks that provide a connection service at the network layer. In this type of network, a virtual circuit is established between the sender and receiver before data transmission occurs. This virtual circuit guarantees the delivery of packets in the correct order and with minimal delay. Unlike datagram networks, which do not establish a pre-determined path for data transmission, virtual-circuit networks offer a more reliable and efficient communication service. Therefore, the correct answer for this question is virtual-circuit networks.

    Rate this question:

  • 38. 

    Each time an end system wants to send a packet, it stamps the packet with the address of the destination end system and then pops the packet into the network

    • A.

      Datagram network

    • B.

      Virtual-circuit networks

    • C.

      Network

    • D.

      None

    Correct Answer
    A. Datagram network
    Explanation
    In a datagram network, each packet is individually addressed with the destination end system's address before being sent into the network. This means that each packet can take a different path through the network and arrive at the destination independently. This is in contrast to virtual-circuit networks, where a predetermined path is established for a series of packets. The given statement suggests that the packet is stamped with the destination address before entering the network, which aligns with the characteristics of a datagram network. Therefore, the correct answer is Datagram network.

    Rate this question:

  • 39. 

    Determine the correct class of the following ip address: 93.44.123.184

    • A.

      A

    • B.

      B

    • C.

      C

    • D.

      D

    Correct Answer
    A. A
    Explanation
    The given IP address, 93.44.123.184, falls under Class A of IP addresses. In Class A, the first octet ranges from 1 to 126, and the remaining three octets can vary. The given IP address starts with 93, which is within the range of 1 to 126, indicating that it belongs to Class A.

    Rate this question:

  • 40. 

    1. Twisted-pair copper wire is no longer present in computer networks.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement is false because twisted-pair copper wire is still widely used in computer networks. It is commonly used for Ethernet connections and provides a reliable and cost-effective means of transmitting data.

    Rate this question:

  • 41. 

    A packet with no data is sent from host A to host B on an otherwise idle network. The packet is found to have taken 35 milliseconds to reach B. The incremental overhead to send an additional byte (usually called the "throughput") is estimated to be five microseconds by repeatedly measuring the transmission times of long packets. Approximately, how long will an eight Kbytes (8192 bytes) packet take to reach B when sent from A?

    • A.

      Cannot be determined from the information given

    • B.

      76 milliseconds

    • C.

      55 milliseconds

    • D.

      40 milliseconds

    Correct Answer
    B. 76 milliseconds
    Explanation
    The given information states that the incremental overhead to send an additional byte is five microseconds. However, it does not provide any information about the transmission time for an eight Kbytes packet. Therefore, it cannot be determined from the given information how long an eight Kbytes packet will take to reach B when sent from A.

    Rate this question:

  • 42. 

    In a broadcast-based network, longer propagation delays

    • A.

      Do not affect the cost-benefit trade-off of carrier sensing

    • B.

      Significantly decrease the benefit of sensing the carrier before transmitting

    • C.

      Destroy the carrier, making it impossible to sense it before transmitting

    • D.

      Make it all the more critical to sense the carrier before transmitting

    Correct Answer
    B. Significantly decrease the benefit of sensing the carrier before transmitting
    Explanation
    In a broadcast-based network, longer propagation delays significantly decrease the benefit of sensing the carrier before transmitting. This is because longer propagation delays mean that it takes more time for a signal to reach its destination. If the carrier sensing mechanism waits for the signal to reach its destination before transmitting, it will result in a significant delay in transmitting data. Therefore, the benefit of sensing the carrier before transmitting is diminished in the presence of longer propagation delays.

    Rate this question:

  • 43. 

    Convert the following IP address: 93.44.123.184 to the binary

    • A.

      11001100.11000111.11100011.00001111

    • B.

      01010110.01111011.00000001.00000001

    • C.

      01011101.00101100.01111011.10111000

    • D.

      11000100.00000101.01111011.11011101

    Correct Answer
    C. 01011101.00101100.01111011.10111000
    Explanation
    To convert an IP address to binary, each octet is converted separately. In this case, the octets are 93, 44, 123, and 184. To convert 93 to binary, we divide it by 2 repeatedly and record the remainders. The binary representation of 93 is 01011101. Similarly, the binary representations of 44, 123, and 184 are 00101100, 01111011, and 10111000 respectively. Therefore, the given IP address 93.44.123.184 is represented in binary as 01011101.00101100.01111011.10111000.

    Rate this question:

  • 44. 

    Which of the following is most likely to be a MAC address assigned to a NIC?

    • A.

      23.4f.17.8a.4c.10

    • B.

      192.168.1.121

    • C.

      713.555.1212

    • D.

      24.17.232.75

    Correct Answer
    A. 23.4f.17.8a.4c.10
    Explanation
    The MAC address is a unique identifier assigned to a network interface card (NIC). It consists of six pairs of hexadecimal digits separated by colons or hyphens. The given option "23.4f.17.8a.4c.10" follows this format and is therefore most likely to be a MAC address assigned to a NIC. The other options are IP addresses or phone numbers, which do not match the format of a MAC address.

    Rate this question:

  • 45. 

    Local DNS name servers

    • A.

      Cache resource records, but discard them after a period of time that is on the order of a few days

    • B.

      Cache resource records and never discard them

    • C.

      Obtain resource records from Web caches

    • D.

      Never cache resource records

    Correct Answer
    A. Cache resource records, but discard them after a period of time that is on the order of a few days
    Explanation
    Local DNS name servers cache resource records to improve the efficiency of DNS lookups. By storing recently accessed resource records, the name server can quickly respond to subsequent requests for the same information without having to query external DNS servers. However, to ensure the accuracy and timeliness of the information, these cached records are discarded after a certain period of time, typically a few days. This allows the name server to periodically update its cache with fresh information from authoritative DNS servers.

    Rate this question:

  • 46. 

    Convert the following IP address: 158.0.147.85 to the binary

    • A.

      11001100.11000111.11100011.00001111

    • B.

      01010110.01111011.00000001.00000001

    • C.

      10011110.00000000.10010011.01010101

    • D.

      11000100.00000101.01111011.11011101

    Correct Answer
    C. 10011110.00000000.10010011.01010101
    Explanation
    The given IP address, 158.0.147.85, can be converted to binary by converting each octet separately. The first octet, 158, is equal to 10011110 in binary. The second octet, 0, is equal to 00000000 in binary. The third octet, 147, is equal to 10010011 in binary. And the fourth octet, 85, is equal to 01010101 in binary. Therefore, the binary representation of the IP address 158.0.147.85 is 10011110.00000000.10010011.01010101.

    Rate this question:

  • 47. 

    Set of rules that the sending of rules that the sending program must follow so that the Internet can deliver the data to the destination program is called.

    • A.

      Application Programming Interface (API)

    • B.

      DNS domain name system

    • C.

      Internet transport-layer protocol (TCP or UDP)

    • D.

      Encapsulation

    Correct Answer
    A. Application Programming Interface (API)
    Explanation
    An Application Programming Interface (API) is a set of rules and protocols that govern the communication between software programs. In the context of the given question, an API ensures that the sending program follows the necessary rules for the Internet to successfully deliver data to the destination program. It provides a standardized way for different software components to interact and exchange information, enabling seamless communication and data transfer over the Internet.

    Rate this question:

  • 48. 

    Below provided a typical HTTP response message. Let’s take a careful look at this response message <img src \= “@@PLUGINFILE@@/image00jpg” alt \= “”> What three sections has HTTP response message ?

    • A.

      An initial status line , six header lines, and then the entity body.

    • B.

      Header lines , entity body , and then the URL structure

    • C.

      An initial status line , entity body , conclusion.

    • D.

      Header lines, entity body , and then the response

    Correct Answer
    A. An initial status line , six header lines, and then the entity body.
    Explanation
    The HTTP response message consists of an initial status line, followed by six header lines, and then the entity body. The initial status line provides information about the status of the request, such as the HTTP version, status code, and status message. The header lines contain additional information about the response, such as content type, content length, and server information. Finally, the entity body contains the actual content of the response, such as HTML, text, or binary data.

    Rate this question:

  • 49. 

    Below provided a typical HTTP response message. Let’s take a careful look at this response message. It has three sections: an initial status line , six header lines, and then the entity body <img src \= “@@PLUGINFILE@@/image002.jpg” alt \= “”> body is the meat of the message -it contains.

    • A.

      The information about receiver

    • B.

      The status line indicates that the server is using HTTP/1.1 and that everything is OK

    • C.

      The information about all the destination of packet

    • D.

      The requested object itself (represented by data data data data data)

    Correct Answer
    D. The requested object itself (represented by data data data data data)
    Explanation
    The correct answer is the requested object itself (represented by data data data data data). This is because the entity body in an HTTP response message contains the actual content or data that was requested by the client. In this case, the entity body is represented by the text "data data data data data". The other sections of the response message, such as the status line and header lines, provide additional information about the response and the server, but the entity body is where the requested object is found.

    Rate this question:

  • 50. 

    How does an operating system identify the application to which data coming in from the network should be relayed.

    • A.

      By the protocol with which the data was sent

    • B.

      Only one application at a time is given access to the network.

    • C.

      By the port number carried by the transport protocol

    • D.

      By the file extension of the data

    Correct Answer
    C. By the port number carried by the transport protocol
    Explanation
    An operating system identifies the application to which data coming in from the network should be relayed by the port number carried by the transport protocol. Each application is assigned a unique port number, and when data is received, the operating system checks the port number to determine which application should receive the data. This allows for proper routing and delivery of network data to the correct application.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 19, 2019
    Quiz Created by
    Daniyar
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.