Discussion: 25/09/2017 : Network : Protocol : Network Devices:VIRUS

Q. Binary Huffman coding is a
a) Prefix condition code
b) Suffix condition code
c) Both of the mentioned
d) None of the mentioned

Answer: A

Q1.First computer virus is known as

(a) Rabbit
(b) Creeper Virus
(c) Elk Cloner
(d) SCA Virus


Answer: b


Q2). The technique of temporarily delaying outgoing acknowledgements so that they can be hooked on to the next outgoing data frame is called -------------

A) piggybacking.
B)cyclic redundancy check.
C) code repeat check.
D) none of the above

Answer: A


Q3.Network device belong at the OSI physical layer


a) repeater b) router c) switch d) bridge

Answer: a


Q4. The default port number used for HTTP is__________.

A. 22
B. 80
C. 443
D. 110

Answer: B

If the plain text is ABCABA , then what will be the code for A,B & C in Huffman codding,
 1.A =1 B=0 C=11
2. A =1 B=0 C=10
3. A =0 B=1  C=11
4. A =0 B=10  C=11

Answer: 4
Explanation



Q5.In communication satellite,multiple repeaters are known as......

A)detector B)modular c)station d)transponders

Answer:D

Q6. RSA algorithm uses a ----  cryptography method.

A. Public key
B. Private key
C. Symmetric key
D. None of these

Answer:A
RSA is an algorithm used by modern computers to encrypt and decrypt messages. It is an asymmetric cryptographic algorithm. Asymmetric means that there are two different keys. This is also called public key cryptography, because one of them can be given to everyone.




Q7. Technique of temporarily removing inactive program from main memory ??
A. swapping
B. spooling
C. scheduling
D. formatting

 Answer:A


Q8. Secret-key encryption is also known as
(A) Secret-encryption              (B) Asymmetric encryption
(C) Symmetric encryption      (D) Private encryption

 Answer:C


Q9.The protocol used in TCP/IP  for dynamic address assignment is

A. ARP
B. ICMP
C.DHCP
D.NONE OF THESE

Answer: C

Q10. Flow control in TCP/IP is handled using

A. Urgent Pointer
B. Checksum
C. Acknowledgment number
D. Variable size sliding window

Answer: D

Q11. Which among the following will not lead to a deadlock?         a)Mutual exclusion       b)Hold and wait                        
c)Preemption                d)Circular wait

Answer : c)Preemption

Q12. The recursive function defined by f(n)=1 if n=1 and f(n)=n+f(n-1) computes the value:
(A) n2                 (B) n!
(C) n(n+1)/2      (D) 2n

 Answer :(C) n(n+1)/2

Q13. Cache memory works on the principal of:
1. Locality of reference
2. Locality of memory
3.locality of data
4.None of these

Answer: 2. Locality of memory

Q14. Which of the following protocols uses both TCP and UDP?
A.    FTP
B.    SMTP
C.    Telnet
D.    DNS                    

Answer: D
DNS uses TCP for zone exchanges between servers and UDP when a client is trying to resolve a hostname to an IP address.

Q15.RARP is used to convert:
(A) IP address to MAC address
(B) MAC address to IP address
(C) IP address to port number
(D) Port number to IP address 

Answer: (B) MAC address to IP address 
The Reverse Address Resolution Protocol (RARP) is an obsolete computer networking protocol used by a client computer to request its Internet Protocol (IPv4) address from a computer network, when all it has available is its link layer or hardware address, such as a MAC address.    

Q16.HDLC is
1.bit oriented
2.code dependent
3.both a nd b
4.none       

Answer: 1
High-Level Data Link Control (HDLC) is a bit oriented code-transparent synchronous data link protocol developed by the (ISO).                
                   
 More Questions and Discussion...


Comments

  1. Sir
    Cache memory works on locality of reference. Isn't it

    ReplyDelete

Post a Comment