Quiz 8 & 9

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Karugshiv
K
Karugshiv
Community Contributor
Quizzes Created: 1 | Total Attempts: 155
Questions: 20 | Attempts: 155

SettingsSettingsSettings
Computer Science Quizzes & Trivia

.


Questions and Answers
  • 1. 

    TCP/IP reference model contains how many layers

    • A.

      3

    • B.

      4

    • C.

      6

    • D.

      7

    Correct Answer
    B. 4
    Explanation
    The correct answer is 4 because the TCP/IP reference model consists of four layers: the Network Interface layer, the Internet layer, the Transport layer, and the Application layer. Each layer has its own specific functions and protocols to ensure reliable communication over the internet.

    Rate this question:

  • 2. 

    Which protocol deals with emails

    • A.

      FTP

    • B.

      SMTP

    • C.

      LPD

    • D.

      X window

    Correct Answer
    B. SMTP
    Explanation
    SMTP (Simple Mail Transfer Protocol) is the correct answer because it is the protocol specifically designed for sending and receiving emails. FTP (File Transfer Protocol) is used for transferring files, LPD (Line Printer Daemon) is used for printing over a network, and X Window is a system for managing graphical user interfaces. Therefore, SMTP is the most appropriate protocol for dealing with emails.

    Rate this question:

  • 3. 

    Which protocol deals with resolving domain names

    • A.

      X-Window

    • B.

      SMTP

    • C.

      DNS

    • D.

      FTP

    Correct Answer
    C. DNS
    Explanation
    DNS (Domain Name System) is the correct answer because it is the protocol that deals with resolving domain names. DNS translates domain names into IP addresses, allowing users to access websites by typing in easy-to-remember domain names instead of complex numerical IP addresses. X-Window is a protocol used for remote graphical user interface (GUI) connections, SMTP is a protocol used for sending email, and FTP is a protocol used for file transfer.

    Rate this question:

  • 4. 

    If you use either Telnet or FTP, which is the highest layer you are using to transmit data?

    • A.

      Application

    • B.

      Presentation  

    • C.

      Session  

    • D.

      Transport

    Correct Answer
    A. Application
    Explanation
    When using either Telnet or FTP, the highest layer being used to transmit data is the Application layer. This layer is responsible for providing services and protocols that allow user applications to access the network and transmit data. Telnet and FTP are both application layer protocols that enable users to remotely access and transfer files over a network.

    Rate this question:

  • 5. 

    TCP/IP layer is equivalent to combined Session, Presentation and

    • A.

      Network layer

    • B.

      Application layer

    • C.

      Transport layer

    • D.

      Both a and c

    Correct Answer
    B. Application layer
    Explanation
    The TCP/IP layer is equivalent to the Application layer because it is responsible for providing network services to applications. This layer interacts directly with the end-user and is responsible for tasks such as data formatting, encryption, and authentication. The Application layer protocols include HTTP, FTP, SMTP, and DNS, which are all used by various applications to communicate over the network. Therefore, the TCP/IP layer corresponds to the Application layer.

    Rate this question:

  • 6. 

    Which one d HTTP is ________ protocol.

    • A.

      Application layer

    • B.

      Transport layer

    • C.

      Network layer

    • D.

      None of the mentioned

    Correct Answer
    A. Application layer
    Explanation
    HTTP (Hypertext Transfer Protocol) is a protocol used for communication between web browsers and web servers. It operates at the application layer of the TCP/IP protocol stack, which is responsible for providing communication services directly to user applications. The application layer is the topmost layer in the TCP/IP model and is responsible for protocols that enable user applications to access the network. Therefore, HTTP is an application layer protocol.

    Rate this question:

  • 7. 

    TCP protocol is ​​​​

    • A.

      Connection less

    • B.

      Connection oriented

    • C.

      Start but no ending

    • D.

      None of Above

    Correct Answer
    B. Connection oriented
    Explanation
    The correct answer is "connection oriented." This means that the TCP protocol establishes a reliable and dedicated connection between the sender and receiver before data transmission occurs. This connection ensures that data is delivered in the correct order and without errors. TCP also guarantees that data packets are acknowledged and retransmitted if necessary, providing a reliable and ordered data transfer mechanism.

    Rate this question:

  • 8. 

    Application layer offers _______ service.

    • A.

      End to end

    • B.

      Process to process

    • C.

      Both End to end and Process to process

    • D.

      None of the mentioned

    Correct Answer
    A. End to end
    Explanation
    The application layer offers end to end service. This means that it provides communication between the end users or applications on different hosts. It ensures that the data is delivered accurately and reliably from the source to the destination, without any loss or corruption. The application layer is responsible for managing the communication between the user and the network, and it provides services such as email, file transfer, and web browsing.

    Rate this question:

  • 9. 

    Pick the odd one out:

    • A.

      File transfer

    • B.

      File download

    • C.

      E-mail

    • D.

      Interactive games

    Correct Answer
    D. Interactive games
    Explanation
    The odd one out is "Interactive games" because it does not involve the transfer or download of files like the other options. File transfer and file download are both processes related to moving files from one location to another, while email involves sending and receiving electronic messages. However, interactive games do not typically involve the transfer or download of files, but rather focus on real-time interaction and gameplay.

    Rate this question:

  • 10. 

    File to the Web site is transferred by using:

    • A.

      HTTP

    • B.

      ASCII

    • C.

      FTP

    • D.

      None of the 

    Correct Answer
    C. FTP
    Explanation
    Files to a website are transferred using FTP (File Transfer Protocol). FTP is a standard network protocol used to transfer files from one host to another over a TCP-based network, such as the internet. It allows for the uploading and downloading of files between a client and a server. HTTP (Hypertext Transfer Protocol) is used for transferring web pages and data on the World Wide Web, but it is not specifically designed for file transfers. ASCII is a character encoding standard, not a file transfer protocol. Therefore, the correct answer is FTP.

    Rate this question:

  • 11. 

    Computer can be linked to internet through the ​​​

    • A.

      Phone-line modem

    • B.

      DSL

    • C.

      Cable modem

    • D.

      All of these

    Correct Answer
    D. All of these
    Explanation
    All of these options can be used to link a computer to the internet. A phone-line modem allows the computer to connect to the internet using a telephone line. DSL (Digital Subscriber Line) uses a high-speed broadband connection over traditional copper telephone lines. A cable modem connects the computer to the internet through a cable television network. Therefore, all of these options are valid methods to link a computer to the internet.

    Rate this question:

  • 12. 

    Verification of a login name and password is known as:

    • A.

      Configuration

    • B.

      Accessibility

    • C.

      Authentication

    • D.

      Logging in

    Correct Answer
    C. Authentication
    Explanation
    Authentication refers to the process of verifying the identity of a user or system. In the context of a login name and password, authentication involves confirming that the provided credentials match the authorized user's information. This process ensures that only authorized individuals can gain access to a system or application, enhancing security and protecting sensitive data.

    Rate this question:

  • 13. 

    Internet is

    • A.

      Dynamic system

    • B.

      Complex system

    • C.

      Decentralized system

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    The correct answer is "All of the above" because the internet is a dynamic system that constantly changes and evolves. It is also a complex system with multiple interconnected components and layers. Additionally, the internet is decentralized, meaning that it does not have a central authority or control, but rather operates through a network of interconnected devices and servers.

    Rate this question:

  • 14. 

    TCP/IP suite was created by ​​​​

    • A.

      IEEE

    • B.

      Department of defence

    • C.

      Open source

    • D.

      None of above

    Correct Answer
    A. IEEE
    Explanation
    The TCP/IP suite was created by the IEEE.

    Rate this question:

  • 15. 

    A device operating at the network layer is called a

    • A.

      Bridge

    • B.

      Router

    • C.

      Hub

    Correct Answer
    B. Router
    Explanation
    A device operating at the network layer is called a router. A router is a networking device that forwards data packets between computer networks. It determines the best path for data transmission based on the destination IP address of the packets. Routers are responsible for directing traffic efficiently and securely across networks, allowing different networks to communicate with each other. Unlike bridges and hubs, routers have the ability to make intelligent decisions about how to route data, making them essential for connecting multiple networks together.

    Rate this question:

  • 16. 

    _________ are rules that govern a communication exchange.

    • A.

      Media

    • B.

      Interfaces

    • C.

      Protocols

    • D.

      All of the above

    Correct Answer
    C. Protocols
    Explanation
    Protocols are a set of rules that govern the exchange of information or communication between different devices or systems. They define the format, order, and error-checking procedures for transmitting data. Protocols ensure that communication is reliable, efficient, and standardized. Media refers to the channels through which data is transmitted, while interfaces are the physical or virtual connections between devices. While both media and interfaces are important in communication, protocols specifically define the rules and procedures for the exchange of information. Therefore, protocols are the correct answer in this context.

    Rate this question:

  • 17. 

    Encryption and decryption are functions of

    • A.

      Transport layer

    • B.

      Session layer

    • C.

      Presentation layer

    • D.

      None of the above

    Correct Answer
    C. Presentation layer
    Explanation
    Encryption and decryption are functions of the Presentation layer. The Presentation layer is responsible for the translation, compression, and encryption of data. Encryption is the process of converting plain text into a secret code to protect it from unauthorized access, while decryption is the reverse process of converting the encrypted code back into plain text. Therefore, the Presentation layer is the correct answer as it handles the encryption and decryption functions.

    Rate this question:

  • 18. 

    TELNET, FTP, SMTP, Protocols fall in the following layer of OSI reference model

    • A.

      Transport Layer

    • B.

      Internet Layer

    • C.

      Network Layer

    • D.

      Application Layer

    Correct Answer
    D. Application Layer
    Explanation
    TELNET, FTP, and SMTP are all application layer protocols. The application layer is responsible for providing network services to user applications. These protocols are used for specific applications such as remote login (TELNET), file transfer (FTP), and email transfer (SMTP). The application layer protocols interact with the lower layers of the OSI reference model to establish communication between different systems on a network. Therefore, these protocols fall in the Application Layer of the OSI reference model.

    Rate this question:

  • 19. 

    UDP is ___________ protocol.

    • A.

      Connection oriented

    • B.

      Connectionless

    • C.

      Neither

    Correct Answer
    B. Connectionless
    Explanation
    UDP is a connectionless protocol because it does not establish a dedicated connection between the sender and receiver before transmitting data. It operates by simply sending data packets without any acknowledgment or guarantee of delivery. This lack of connection establishment and reliability makes UDP a faster and more efficient protocol compared to connection-oriented protocols like TCP. However, it also means that UDP does not provide error checking or retransmission of lost packets, making it less reliable for certain types of applications that require guaranteed delivery.

    Rate this question:

  • 20. 

    How many bits internet address is assigned to each host on an IP4 internet which is used in all communications with the host?

    • A.

      16 bits

    • B.

      32 bits

    • C.

      48 bits

    • D.

      64 bits

    Correct Answer
    B. 32 bits
    Explanation
    Each host on an IP4 internet is assigned a 32-bit internet address. This means that there are 2^32 possible unique addresses that can be assigned to different hosts. The 32-bit address is used in all communications with the host, allowing for the identification and routing of data packets over the internet.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 30, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 23, 2019
    Quiz Created by
    Karugshiv
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.