Network layer protocol exits in_____? A. Host B. Switches C. Packets D. Bridges

1 Answer

Answer :

A. Host  

Related questions

Description : Network layer protocol exits in _________ a. Host b. Switches c. Packets d. Bridges

Last Answer : a. Host

Description : The network layer consists of which hardware devices? A. Router B. Bridges C. Switches D. All of the above 

Last Answer : D. All of the above  

Description : The network layer is considered as the _______? A. Backbone B. packets C. Bytes D. bits 

Last Answer : A. Backbone  

Description : Data in network layer is transferred in the form of ____________ A. Layers B. Packets C. Bytes D. Bits

Last Answer : B. Packets 

Description : The ___ protocols define how the applications interface with the lower layer protocol to send the data over the network. A. Application layer B. Transport layer C. Network layer D. Link layer

Last Answer : A. Application layer 

Description : ___ layer perform the host addressing and packet routing. A. Application layer B. Transport layer C. Network layer D. Link layer

Last Answer : C. Network layer 

Description : Transport layer receives data in the form of? A. Packets B. Byte streams C. Bits stream D. both packet and Byte stream

Last Answer : B. Byte streams 

Description : The ________is a three layer network protocol that contains addressing information and some control information that enables packets to be routed: a) User Datagram Protocol b) Internet Protocol c) Dynamic Host Configuration Protocol d) None of These

Last Answer : b) Internet Protocol

Description : Which protocol is used to link all the devices in the IoT? A. TCP/IP B. Network C. UDP D. HTTP

Last Answer : A. TCP/IP 

Description : The network layer contains which hardware device? a. Routers, Bridges b. Bridges only c. Bridges and switches d. Routers, Bridges and Switches

Last Answer : d. Routers, Bridges and Switches

Description : Devices that transforms electrical signals into physical movements A. Sensors B. Actuators C. Switches D. Display

Last Answer : B. Actuators 

Description : Security based connection is provided by which layer? A. Application layer B. Transport layer C. Session layer D. Network layer

Last Answer : D. Network layer 

Description : ____________ protocols provide end to end message transfer capability independent of the underlying network. A. Network layer B. Transport layer C. Application layer D. Link layer 

Last Answer : B. Transport layer 

Description : ______ layer is responsible for sending of IP datagrams from the source network to the destination network. A. Application layer B. Transport layer C. Network layer D. Link layer

Last Answer : The correct answer is: C. Network layer The network layer is responsible for routing and forwarding IP datagrams from the source network to the destination network. It provides logical addressing ... at the network layer include IP (Internet Protocol) and ICMP (Internet Control Message Protocol).

Description : _____________ layer protocols determine how the data is physically sent over the network’s physical layer or medium. A. Application layer B. Transport layer C. Network layer D. Link layer

Last Answer : D. Link layer 

Description : The ________is a network layer Internet protocol that provides message packets to report errors and other information regarding IP packet processing back to the source: a) Internet Control Message ... Standard Flexible Message Protocol c) Internet Dynamic Chartered Message Protocol d) None of These

Last Answer : a) Internet Control Message Protocol

Description : In TCP/IP Reference model, the job of ............... layer is to permit hosts to inject packets into any network and travel them independently to the destination. (A) Physical (B) Transport (C) Application (D) Host-to-network

Last Answer : Answer: Marks to all

Description : ____ is a data-centric middleware standard for device-to-device and machine-to-machine communication. A. Data Distribution Serviced (DDS) B. Advance Message Queuing Protocol (AMQP) C. Extensible Messaging and Presence Protocol (XMPP) D. Message Queue Telemetry Transport (MQTT)

Last Answer : A. Data Distribution Serviced (DDS) 

Description : Which protocol has a quality of service? A. XMPP B. HTTP C. CoAP D. MQTT

Last Answer :  A. XMPP  

Description : HTTP expands? A. Hyper Text Transfer Protocol B. Hyper Terminal Transfer Protocol C. Hyper Text Terminal Protocol D. Hyper Terminal Text Protocol

Last Answer : A. Hyper Text Transfer Protocol 

Description : Which protocol is lightweight? A. MQTT B. HTTP C. CoAP D. SPI

Last Answer :  A. MQTT 

Description : MQTT is _________ protocol. A. Machine to Machine B. Internet of Things C. Machine to Machine and Internet of Things D. Machine Things

Last Answer : C. Machine to Machine and Internet of Things 

Description : ___________ protocol uses Universal Resource Identifiers (URIs) to identify HTTP resources. A. HTTP B. COAP C. WebSocket D. MQTT

Last Answer : A. HTTP 

Description :  ________ of the following is a protocol related to IOT A. Zigbee B. 6LoWPAN C. CoAP D. All of the above

Last Answer : C. CoAP 

Description : LR-WPANs standards from basis of specifications for high level communication protocol such as ___. A. Zigbee B. Allsean C. Tyrell D. Microsoft's Azure

Last Answer : A. Zigbee 

Description : There are 100 light bulbs lined up in a row in a long room. Each bulb has its own switch and is currently switched off. The room has an entry door and an exit door. There are 100 people ... And how many of the light bulbs are illuminated after the 100th person has passed through the room? -Riddles

Last Answer : First think who will operate each bulb, obviously person #2 will do all the even numbers, and say person #10 will operate all the bulbs that end in a zero. So who would operate for example bulb 48: Persons numbered: 1 & 48 ... 100 (1, 4, 9, 16, 25, 36, 49, 64, 81 & 100) hence 10 bulbs remain on.

Description : Which is the part of Data Link Layer: a. LLC b. MAC c. Both a and b d. None of these

Last Answer : c. Both a and b

Description : Which layer is called a port layer in OSI model? a. Session b. Application c. Presentation d. Transport

Last Answer : a. Session

Description : Which transport layer protocols is used by DHCP? a. RSVP b. TCP c. DCCP d. UDP

Last Answer : d. UDP

Description : Which one out of these is not a data link layer technology: a. Bluetooth b. UART c. WIFI d. HTTP

Last Answer : d. HTTP

Description : Using which layer in transport layer data integrity can be assured? A. Checksum B. Repetition codes C. Cyclic redundancy checks D. Error correction codes

Last Answer : A. Checksum 

Description : Services provided by application layer? A. Web chat B. Error control C. Connection services D. Congestion control

Last Answer : A. Web chat 

Description : Which one out of these is not a data link layer technology? A. Bluetooth B. UART C. Wi-Fi D. HTTP

Last Answer : D. HTTP 

Description : ______________ is useful for time-sensitive application that have very small data units to exchange and do not want the overhead of connection setup. A. TCP B. UDP C. Transport layer D. None of the above.

Last Answer : B. UDP 

Description : _____________ is a collection of wired Ethernet standard for the link layer. A. IEEE 802.3 B. IEEE 802.11 C. IEEE 802.16 D. IEEE 802.15.4

Last Answer : A. IEEE 802.3 

Description : WSN stands for A. Wide Sensor Network B. Wireless Sensor Network C. Wired Sensor Network D. None of these

Last Answer : B. Wireless Sensor Network 

Description :  TCP and UDP are called? A. Application protocols B. Session protocols C. Transport protocols D. Network protocols

Last Answer : C. Transport protocols  

Description :  What does HTTP do? A. Enables network resources and reduces perception of latency B. Reduces perception of latency and allows multiple concurrency exchange C. Allows multiple concurrent ... D. Enables network resources and reduces perception of latency and Allows multiple concurrent exchange.

Last Answer : D. Enables network resources and reduces perception of latency and Allows multiple concurrent exchange.

Description : 6LOWPAN stands for A. 6 LOW Personal Area Network B. IPv6 LOW Personal Area Network C. IPv6 over Low power wireless personal area network D. None of above

Last Answer : C. IPv6 over Low power wireless personal area network 

Description : Interconnection of Internet and computing devices embedded in everyday objects, enabling them to send and receive data is called_____________ A. Internet of Things B. Network Interconnection C. Object Determination D. None of these 

Last Answer : A. Internet of Things 

Description : Which of the following is (are) example(s) of embedded system for data communication? USB Mass Storage device A. Network router B. Digital camera C. Music player D. All of these E. None of these

Last Answer : B. Digital camera 

Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received in the same order as sent order d. it sends data very quickly

Last Answer : a. all UDP packets are treated independently by transport layer

Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received ... order d. it sends data very quickly Answer: Option(a) 4. Transmission control protocol ____

Last Answer : a. all UDP packets are treated independently by transport layer

Description : User datagram protocol is called connectionless because _____________ A. all UDP packets are treated independently by transport layer B. it sends data as a stream of related packets C. it is received in the same order as sent order D. it sends data very quickly

Last Answer : A. all UDP packets are treated independently by transport layer

Description : User datagram protocol is called connectionless because _____________ a) all UDP packets are treated independently by transport layer b) it sends data as a stream of related packets c) it is received in the same order as sent order d) it sends data very quickly

Last Answer : all UDP packets are treated independently by transport layer

Description : ------------------- is a set of rules governing the format and meaning of the packets, or messages that are exchanged by the peer entities within a layer. a. Interface b. Reference model c. Protocol d. None of these

Last Answer : c. Protocol

Description : Which of the following assertions is FALSE about the Internet Protocol (IP)? a. It is possible for a computer to have multiple IP addresses b. IP packets from the same source to the same ... outgoing packets; the route is determined only by the routing tables in the routers on the way

Last Answer : d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way

Description : The network layer is concerned with __________ of data. a. bits b. frames c. packets d. bytes

Last Answer : c. packets

Description : PGP is one of the protocols used to provide security at the ……….. It is designed to create authenticated and confidential ………. A. application layer, e-mails. B. Network layer, packets C. application layer, packets D. network layer , e-mails

Last Answer : A. application layer, e-mails

Description : The network layer encapsulates the data into _______of data. A. bits B. frames C. packets D. bytes

Last Answer : C. packets