Description : Network layer protocol exits in _________ a. Host b. Switches c. Packets d. Bridges
Last Answer : a. Host
Description : The network layer consists of which hardware devices? A. Router B. Bridges C. Switches D. All of the above
Last Answer : D. All of the above
Description : The network layer is considered as the _______? A. Backbone B. packets C. Bytes D. bits
Last Answer : A. Backbone
Description : Data in network layer is transferred in the form of ____________ A. Layers B. Packets C. Bytes D. Bits
Last Answer : B. Packets
Description : The ___ protocols define how the applications interface with the lower layer protocol to send the data over the network. A. Application layer B. Transport layer C. Network layer D. Link layer
Last Answer : A. Application layer
Description : ___ layer perform the host addressing and packet routing. A. Application layer B. Transport layer C. Network layer D. Link layer
Last Answer : C. Network layer
Description : Transport layer receives data in the form of? A. Packets B. Byte streams C. Bits stream D. both packet and Byte stream
Last Answer : B. Byte streams
Description : The ________is a three layer network protocol that contains addressing information and some control information that enables packets to be routed: a) User Datagram Protocol b) Internet Protocol c) Dynamic Host Configuration Protocol d) None of These
Last Answer : b) Internet Protocol
Description : Which protocol is used to link all the devices in the IoT? A. TCP/IP B. Network C. UDP D. HTTP
Last Answer : A. TCP/IP
Description : The network layer contains which hardware device? a. Routers, Bridges b. Bridges only c. Bridges and switches d. Routers, Bridges and Switches
Last Answer : d. Routers, Bridges and Switches
Description : Devices that transforms electrical signals into physical movements A. Sensors B. Actuators C. Switches D. Display
Last Answer : B. Actuators
Description : Security based connection is provided by which layer? A. Application layer B. Transport layer C. Session layer D. Network layer
Last Answer : D. Network layer
Description : ____________ protocols provide end to end message transfer capability independent of the underlying network. A. Network layer B. Transport layer C. Application layer D. Link layer
Last Answer : B. Transport layer
Description : ______ layer is responsible for sending of IP datagrams from the source network to the destination network. A. Application layer B. Transport layer C. Network layer D. Link layer
Last Answer : The correct answer is: C. Network layer The network layer is responsible for routing and forwarding IP datagrams from the source network to the destination network. It provides logical addressing ... at the network layer include IP (Internet Protocol) and ICMP (Internet Control Message Protocol).
Description : _____________ layer protocols determine how the data is physically sent over the network’s physical layer or medium. A. Application layer B. Transport layer C. Network layer D. Link layer
Last Answer : D. Link layer
Description : The ________is a network layer Internet protocol that provides message packets to report errors and other information regarding IP packet processing back to the source: a) Internet Control Message ... Standard Flexible Message Protocol c) Internet Dynamic Chartered Message Protocol d) None of These
Last Answer : a) Internet Control Message Protocol
Description : In TCP/IP Reference model, the job of ............... layer is to permit hosts to inject packets into any network and travel them independently to the destination. (A) Physical (B) Transport (C) Application (D) Host-to-network
Last Answer : Answer: Marks to all
Description : ____ is a data-centric middleware standard for device-to-device and machine-to-machine communication. A. Data Distribution Serviced (DDS) B. Advance Message Queuing Protocol (AMQP) C. Extensible Messaging and Presence Protocol (XMPP) D. Message Queue Telemetry Transport (MQTT)
Last Answer : A. Data Distribution Serviced (DDS)
Description : Which protocol has a quality of service? A. XMPP B. HTTP C. CoAP D. MQTT
Last Answer : A. XMPP
Description : HTTP expands? A. Hyper Text Transfer Protocol B. Hyper Terminal Transfer Protocol C. Hyper Text Terminal Protocol D. Hyper Terminal Text Protocol
Last Answer : A. Hyper Text Transfer Protocol
Description : Which protocol is lightweight? A. MQTT B. HTTP C. CoAP D. SPI
Last Answer : A. MQTT
Description : MQTT is _________ protocol. A. Machine to Machine B. Internet of Things C. Machine to Machine and Internet of Things D. Machine Things
Last Answer : C. Machine to Machine and Internet of Things
Description : ___________ protocol uses Universal Resource Identifiers (URIs) to identify HTTP resources. A. HTTP B. COAP C. WebSocket D. MQTT
Last Answer : A. HTTP
Description : ________ of the following is a protocol related to IOT A. Zigbee B. 6LoWPAN C. CoAP D. All of the above
Last Answer : C. CoAP
Description : LR-WPANs standards from basis of specifications for high level communication protocol such as ___. A. Zigbee B. Allsean C. Tyrell D. Microsoft's Azure
Last Answer : A. Zigbee
Description : There are 100 light bulbs lined up in a row in a long room. Each bulb has its own switch and is currently switched off. The room has an entry door and an exit door. There are 100 people ... And how many of the light bulbs are illuminated after the 100th person has passed through the room? -Riddles
Last Answer : First think who will operate each bulb, obviously person #2 will do all the even numbers, and say person #10 will operate all the bulbs that end in a zero. So who would operate for example bulb 48: Persons numbered: 1 & 48 ... 100 (1, 4, 9, 16, 25, 36, 49, 64, 81 & 100) hence 10 bulbs remain on.
Description : Which is the part of Data Link Layer: a. LLC b. MAC c. Both a and b d. None of these
Last Answer : c. Both a and b
Description : Which layer is called a port layer in OSI model? a. Session b. Application c. Presentation d. Transport
Last Answer : a. Session
Description : Which transport layer protocols is used by DHCP? a. RSVP b. TCP c. DCCP d. UDP
Last Answer : d. UDP
Description : Which one out of these is not a data link layer technology: a. Bluetooth b. UART c. WIFI d. HTTP
Last Answer : d. HTTP
Description : Using which layer in transport layer data integrity can be assured? A. Checksum B. Repetition codes C. Cyclic redundancy checks D. Error correction codes
Last Answer : A. Checksum
Description : Services provided by application layer? A. Web chat B. Error control C. Connection services D. Congestion control
Last Answer : A. Web chat
Description : Which one out of these is not a data link layer technology? A. Bluetooth B. UART C. Wi-Fi D. HTTP
Last Answer : D. HTTP
Description : ______________ is useful for time-sensitive application that have very small data units to exchange and do not want the overhead of connection setup. A. TCP B. UDP C. Transport layer D. None of the above.
Last Answer : B. UDP
Description : _____________ is a collection of wired Ethernet standard for the link layer. A. IEEE 802.3 B. IEEE 802.11 C. IEEE 802.16 D. IEEE 802.15.4
Last Answer : A. IEEE 802.3
Description : WSN stands for A. Wide Sensor Network B. Wireless Sensor Network C. Wired Sensor Network D. None of these
Last Answer : B. Wireless Sensor Network
Description : TCP and UDP are called? A. Application protocols B. Session protocols C. Transport protocols D. Network protocols
Last Answer : C. Transport protocols
Description : What does HTTP do? A. Enables network resources and reduces perception of latency B. Reduces perception of latency and allows multiple concurrency exchange C. Allows multiple concurrent ... D. Enables network resources and reduces perception of latency and Allows multiple concurrent exchange.
Last Answer : D. Enables network resources and reduces perception of latency and Allows multiple concurrent exchange.
Description : 6LOWPAN stands for A. 6 LOW Personal Area Network B. IPv6 LOW Personal Area Network C. IPv6 over Low power wireless personal area network D. None of above
Last Answer : C. IPv6 over Low power wireless personal area network
Description : Interconnection of Internet and computing devices embedded in everyday objects, enabling them to send and receive data is called_____________ A. Internet of Things B. Network Interconnection C. Object Determination D. None of these
Last Answer : A. Internet of Things
Description : Which of the following is (are) example(s) of embedded system for data communication? USB Mass Storage device A. Network router B. Digital camera C. Music player D. All of these E. None of these
Last Answer : B. Digital camera
Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received in the same order as sent order d. it sends data very quickly
Last Answer : a. all UDP packets are treated independently by transport layer
Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received ... order d. it sends data very quickly Answer: Option(a) 4. Transmission control protocol ____
Description : User datagram protocol is called connectionless because _____________ A. all UDP packets are treated independently by transport layer B. it sends data as a stream of related packets C. it is received in the same order as sent order D. it sends data very quickly
Last Answer : A. all UDP packets are treated independently by transport layer
Description : User datagram protocol is called connectionless because _____________ a) all UDP packets are treated independently by transport layer b) it sends data as a stream of related packets c) it is received in the same order as sent order d) it sends data very quickly
Last Answer : all UDP packets are treated independently by transport layer
Description : ------------------- is a set of rules governing the format and meaning of the packets, or messages that are exchanged by the peer entities within a layer. a. Interface b. Reference model c. Protocol d. None of these
Last Answer : c. Protocol
Description : Which of the following assertions is FALSE about the Internet Protocol (IP)? a. It is possible for a computer to have multiple IP addresses b. IP packets from the same source to the same ... outgoing packets; the route is determined only by the routing tables in the routers on the way
Last Answer : d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way
Description : The network layer is concerned with __________ of data. a. bits b. frames c. packets d. bytes
Last Answer : c. packets
Description : PGP is one of the protocols used to provide security at the ……….. It is designed to create authenticated and confidential ………. A. application layer, e-mails. B. Network layer, packets C. application layer, packets D. network layer , e-mails
Last Answer : A. application layer, e-mails
Description : The network layer encapsulates the data into _______of data. A. bits B. frames C. packets D. bytes
Last Answer : C. packets