Discussion: 25/09/2017 : Network : Protocol : Network Devices:VIRUS
Q. Binary Huffman coding is a
a) Prefix condition code
b) Suffix condition code
c) Both of the mentioned
d) None of the mentioned
Answer: A
Q1.First computer virus is known as
(a) Rabbit
(b) Creeper Virus
(c) Elk Cloner
(d) SCA Virus
Answer: b
Q2). The technique of temporarily delaying outgoing acknowledgements so that they can be hooked on to the next outgoing data frame is called -------------
A) piggybacking.
B)cyclic redundancy check.
C) code repeat check.
D) none of the above
Answer: A
Q3.Network device belong at the OSI physical layer
a) repeater b) router c) switch d) bridge
Answer: a
Q4. The default port number used for HTTP is__________.
A. 22
B. 80
C. 443
D. 110
Answer: B
If the plain text is ABCABA , then what will be the code for A,B & C in Huffman codding,
1.A =1 B=0 C=11
2. A =1 B=0 C=10
3. A =0 B=1 C=11
4. A =0 B=10 C=11
Answer: 4
Explanation
Q5.In communication satellite,multiple repeaters are known as......
A)detector B)modular c)station d)transponders
Answer:D
Q6. RSA algorithm uses a ---- cryptography method.
A. Public key
B. Private key
C. Symmetric key
D. None of these
Answer:A
RSA is an algorithm used by modern computers to encrypt and decrypt messages. It is an asymmetric cryptographic algorithm. Asymmetric means that there are two different keys. This is also called public key cryptography, because one of them can be given to everyone.
Q7. Technique of temporarily removing inactive program from main memory ??
A. swapping
B. spooling
C. scheduling
D. formatting
Answer:A
Q8. Secret-key encryption is also known as
(A) Secret-encryption (B) Asymmetric encryption
(C) Symmetric encryption (D) Private encryption
Answer:C
Q9.The protocol used in TCP/IP for dynamic address assignment is
A. ARP
B. ICMP
C.DHCP
D.NONE OF THESE
Answer: C
Q10. Flow control in TCP/IP is handled using
A. Urgent Pointer
B. Checksum
C. Acknowledgment number
D. Variable size sliding window
Answer: D
Q11. Which among the following will not lead to a deadlock? a)Mutual exclusion b)Hold and wait
c)Preemption d)Circular wait
Answer : c)Preemption
Q12. The recursive function defined by f(n)=1 if n=1 and f(n)=n+f(n-1) computes the value:
(A) n2 (B) n!
(C) n(n+1)/2 (D) 2n
Answer :(C) n(n+1)/2
Q13. Cache memory works on the principal of:
1. Locality of reference
2. Locality of memory
3.locality of data
4.None of these
Answer: 2. Locality of memory
Q14. Which of the following protocols uses both TCP and UDP?
A. FTP
B. SMTP
C. Telnet
D. DNS
Answer: D
DNS uses TCP for zone exchanges between servers and UDP when a client is trying to resolve a hostname to an IP address.
Q15.RARP is used to convert:
(A) IP address to MAC address
(B) MAC address to IP address
(C) IP address to port number
(D) Port number to IP address
Answer: (B) MAC address to IP address
More Questions and Discussion...
a) Prefix condition code
b) Suffix condition code
c) Both of the mentioned
d) None of the mentioned
Answer: A
Q1.First computer virus is known as
(a) Rabbit
(b) Creeper Virus
(c) Elk Cloner
(d) SCA Virus
Answer: b
Q2). The technique of temporarily delaying outgoing acknowledgements so that they can be hooked on to the next outgoing data frame is called -------------
A) piggybacking.
B)cyclic redundancy check.
C) code repeat check.
D) none of the above
Answer: A
Q3.Network device belong at the OSI physical layer
a) repeater b) router c) switch d) bridge
Answer: a
Q4. The default port number used for HTTP is__________.
A. 22
B. 80
C. 443
D. 110
Answer: B
If the plain text is ABCABA , then what will be the code for A,B & C in Huffman codding,
1.A =1 B=0 C=11
2. A =1 B=0 C=10
3. A =0 B=1 C=11
4. A =0 B=10 C=11
Answer: 4
Explanation
Q5.In communication satellite,multiple repeaters are known as......
A)detector B)modular c)station d)transponders
Answer:D
Q6. RSA algorithm uses a ---- cryptography method.
A. Public key
B. Private key
C. Symmetric key
D. None of these
Answer:A
RSA is an algorithm used by modern computers to encrypt and decrypt messages. It is an asymmetric cryptographic algorithm. Asymmetric means that there are two different keys. This is also called public key cryptography, because one of them can be given to everyone.
Q7. Technique of temporarily removing inactive program from main memory ??
A. swapping
B. spooling
C. scheduling
D. formatting
Answer:A
Q8. Secret-key encryption is also known as
(A) Secret-encryption (B) Asymmetric encryption
(C) Symmetric encryption (D) Private encryption
Answer:C
Q9.The protocol used in TCP/IP for dynamic address assignment is
A. ARP
B. ICMP
C.DHCP
D.NONE OF THESE
Answer: C
Q10. Flow control in TCP/IP is handled using
A. Urgent Pointer
B. Checksum
C. Acknowledgment number
D. Variable size sliding window
Answer: D
Q11. Which among the following will not lead to a deadlock? a)Mutual exclusion b)Hold and wait
c)Preemption d)Circular wait
Answer : c)Preemption
Q12. The recursive function defined by f(n)=1 if n=1 and f(n)=n+f(n-1) computes the value:
(A) n2 (B) n!
(C) n(n+1)/2 (D) 2n
Answer :(C) n(n+1)/2
Q13. Cache memory works on the principal of:
1. Locality of reference
2. Locality of memory
3.locality of data
4.None of these
Answer: 2. Locality of memory
Q14. Which of the following protocols uses both TCP and UDP?
A. FTP
B. SMTP
C. Telnet
D. DNS
Answer: D
DNS uses TCP for zone exchanges between servers and UDP when a client is trying to resolve a hostname to an IP address.
Q15.RARP is used to convert:
(A) IP address to MAC address
(B) MAC address to IP address
(C) IP address to port number
(D) Port number to IP address
Answer: (B) MAC address to IP address
The Reverse Address Resolution Protocol (RARP) is an obsolete computer networking protocol used by a client computer to request its Internet Protocol (IPv4) address from a computer network, when all it has available is its link layer or hardware address, such as a MAC address.
Q16.HDLC is
1.bit oriented
2.code dependent
3.both a nd b
4.none
Answer: 1
High-Level Data Link Control (HDLC) is a bit oriented code-transparent synchronous data link protocol developed by the (ISO).
Q16.HDLC is
1.bit oriented
2.code dependent
3.both a nd b
4.none
Answer: 1
High-Level Data Link Control (HDLC) is a bit oriented code-transparent synchronous data link protocol developed by the (ISO).
More Questions and Discussion...
Sir
ReplyDeleteCache memory works on locality of reference. Isn't it