As the resources are reserved between two communicating
end systems in circuit switching, ___________ is achieved.
a) authentication
b) guaranteed constant rate
c) reliability
d) store and forward

1 Answer

Answer :

b) guaranteed constant rate

Related questions

Description : The required resources for communication between end systems are reserved for the duration of the session between end systems in ________ method. a) Packet switching b) Circuit switching c) Line switching d) Frequency switching

Last Answer : b) Circuit switching

Description : The required resources for communication between end systems are reserved for theduration of the session between end systems in method. a. Packet switched b. Bit switched c. Line switched d. Circuit switched

Last Answer : d. Circuit switched

Description : In _________, resources areallocatedon demand. A) datagram switching B) circuit switching C) frame switching D) none of the above

Last Answer : datagram switching

Description : In _______, the resources need to bereserved during the setup phase; the resources remain dedicated for the entire durationof data transfer phase until the teardownphase. A) datagram switching B) circuit switching C) frame switching D) none of the above

Last Answer : circuit switching

Description : Which one of the following statements is FALSE? a. Packet switching leads to better utilization of bandwidth resources than circuit switching. b. Packet switching results in less variation ... than circuit switching d. Packet switching can lead to reordering unlike in circuit switching

Last Answer : Packet switching results in less variation in delay than circuit switching.

Description : The ____ layer establishes, maintains, and synchronizes the interaction between communicating systems. a. network b. transport c. session d. presentation

Last Answer : c. session

Description : The primary goal of the......................protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity. A) SSL B) ESP C) TSL D) PSL

Last Answer : A) SSL

Description : he primary goal of the ………………….. protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity. A) SSL B) ESP C) TSL D) PSL

Last Answer : A) SSL

Description : Identify the INCORRECT statement below regarding chemical equilibrium. A All chemical reactions are, in principle, reversible. B Equilibrium is achieved when the forward reaction rate equals the ... equilibrium constant. E Equilibrium is achieved when reactant and product concentrations are equal.

Last Answer : E Equilibrium is achieved when reactant and product concentrations are equal.

Description : The packets switching concept was first proposed A. in the late1980s for the Defense Ministry of US. B. in the early 1960s for military communication systems, mainly to handle speech C. in the late 1950s for Defense Ministry of US D. All of theabove E. None of the above

Last Answer : in the early 1960s for military communication systems, mainly to handle speech

Description : In _______ there are no setup or teardown phases. A) datagram switching B) circuit switching C) frame switching D) none of the above

Last Answer : datagram switching

Description : In __________, eachpacket is treatedindependentlyof all others. A) datagram switching B) circuit switching C) frame switching D) none of the above

Last Answer : datagram switching

Description : In _________, thereis no resource allocation for a packet. A) datagram switching B) circuit switching C) frame switching D) none of the above

Last Answer : datagram switching

Description : Circuit switching takes place at the________ layer. A) data line B) physical C) network D) transport

Last Answer : physical

Description : In ATM,_____ is for conventionalpacket switching(virtual-circuit approachor datagram approach). A) AAL1 B) AAL2 C) AAL3/4 D) AAL5

Last Answer : AAL3/4

Description : Satellite-Switched Time-Division Multiple Access (SS/TDMA) is A. the method of determining whichdevice has access tothe transmission medium at any time. B. a medium access control technique for ... switching is used to dynamically changethechannel assignments D. All of theabove E. None of the above

Last Answer : a form of TDMA in which circuit switching is used to dynamically changethechannel assignments

Description : Which of the following approaches to switching share networks resource? a. Circuit switching b. Packet switching c. Both A and B d. None of these

Last Answer : b. Packet switching

Description : What is circuit switching and packet switching?

Last Answer : Circuit Switching is a strategy for switching data through a network. It involves establishing a dedicated path (circuit) between the source and destination. Packet Switching is also a ... the switch interconnects. It uses store and forward switching of discrete data units called packets.

Description : Most important advantage of an IC is its a. Easy replacement in case of circuit failure b. Extremely high reliability c. Reduced cost d. Lower power consumption

Last Answer : Extremely high reliability

Description : Example of circuit switching and S&F (Stored and Forward) switching is (A) Telephone and Post of Telegraph (B) Video Signal Post or Telegraph (C) Digital Signal Post or Telegraph (D) None of above

Last Answer : (A) Telephone and Post of Telegraph

Description : The _______ layer ensures interoperability between communicating devices through transformation of data into a mutually agreed upon format. a. network b. presentation c. transport d. data link

Last Answer : b. presentation

Description : State whether the following statements are true/false: 1) The standards of TCP/IP are published in a series of documents called NFC. 2) A Protocol is an agreement between the communicating parties on how communication is to proceed. a. 1.F,2.T b. 1.F, 2.F c. 1.T, 2.T d. 1.T, 2.F

Last Answer : a. 1.F,2.T

Description : For purposes of routing, the Internet isdivided into ___________. A) wide area networks B) autonomous networks C) autonomous systems D) none of the above

Last Answer : autonomous systems

Description : Marketing management is ________. A. Managing the marketing process B. Monitoring the profitability of the company's products and services C. Selecting target markets D. Developing ... , keeping, and growing customers through creating, delivering, and communicating superior customer value

Last Answer : E. The art and science of choosing target markets and getting, keeping, and growing customers through creating, delivering, and communicating superior customer value

Description : SSL is not responsible for a. Mutual authentication of client & server b. Secret communication c. Data Integrity protection d. Error detection and correction

Last Answer : d. Error detection and correction

Description : NAT limits the use of ………………….. and ……………… A. encryption, authentication. B. encryption, decryption C. encapsulation, translation D. authentication, verification

Last Answer : A. encryption, authentication.

Description : The _______ is used to provide integrity check, authentication, and encryption to IP datagram’s. A. UDP B. Transport layer C. ESP D. SSL

Last Answer : C. ESP

Description : The next header t is an _____ field of Authentication Header that identifies the type of what follows. A. 16-bit B. 64-bit C. 8-bit D. 32-bit

Last Answer : C. 8-bit

Description : Forward chaining systems are _____________ where as backward chaining systems are ___________ a) Goal-driven, goal-driven b) Goal-driven, data-driven c) Data-driven, goal-driven d) Data-driven, data-driven

Last Answer : c) Data-driven, goal-driven

Description : There are two types of designs for communication subnets: they are ………… A. Point-to-Point channels and Broadcast channels B. packet-switched subnet and store-and-forward C. Multicasting and Broadcasting D. Point-to-Point channels and store-and-forward

Last Answer : A. Point-to-Point channels and Broadcast channels

Description : Most packet switches use this principle ____________ a) Stop and wait b) Store and forward c) Store and wait d) Stop and forward

Last Answer : b) Store and forward

Description : An algorithm A is admissible if ___________ a) It is not guaranteed to return an optimal solution when one exists b) It is guaranteed to return an optimal solution when one exists c) It returns more solutions, but not an optimal one d) It guarantees to return more optimal solutions

Last Answer : b) It is guaranteed to return an optimal solution when one exists

Description : “““.are words that aprogramming language has set asidefor its own use. (A) Control words (B) Control structures (C) Reserved words (D) Reserved keys (E) None of these

Last Answer : Reserved words

Description : State the following statement is true or false. I. In class B addresses a total of more than 1 billion addresses can be formed. II. Class E addresses are reserved for future or experimental use. a. True, False b. True, True c. False, True d. False, False

Last Answer : b. True, True

Description : addresses are reserved for multicasting. a. Class B b. Class C c. Class D d. Class E

Last Answer : c. Class D

Description : In virtual circuit network each packet contains ___________ a. full source and destination address b. a short VC number c. only source address d. only destination address

Last Answer : b. a short VC number

Description : In virtual circuit network each packet contains ___________ A. full source and destination address B. a short VC number C. only source address D. only destination address

Last Answer : B. a short VC number

Description : The Strategic Management Process is ------------- : A. A set of activities that is guaranteed to prevent Organizational failure B. A process concerned with a Firm's Resources, ... D. A dynamic process involving the full set of commitments, decisions and actions related to the Company

Last Answer : A dynamic process involving the full set of commitments, decisions and actions related to the Company

Description : The Aadhaar-Enabled Payment Systems(AEPS) is a bank led model that facilitates banking facilities by allowing transactions at Point of Sale through the Business Correspondent (BC) using the Aadhaar ... . Cash Withdrawal C. Online Payment D. Cash Deposit E. Aadhaar to Aadhaar funds transfer

Last Answer : C. Online Payment Explanation: Services Offered by AEPS: Balance Enquiry Cash Withdrawal Cash Deposit Aadhaar to Aadhaar Fund Transfer Gateway Authentication Services

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) The Distributed ... CardSpace specifications support the authentication type of data object d) None of the mentioned

Last Answer : The OpenID and

Description : Point out the wrong statement. A. Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems B. The Distributed Audit ... CardSpace specifications support the authentication type of data object D. All of the above

Last Answer : The OpenID and CardSpace specifications support the authentication type of data object

Description : What is true about SSO? A. SSO has multiple authentication server B. SSO managing single accesses to other systems C. In SSO, User sends the ticket to intranet server. D. All of the above

Last Answer : In SSO, User sends the ticket to intranet server.

Description : _____ has single authentication server, managing multiple accesses to other systems A. SSO B. IDaaS C. SOAP D. SOA

Last Answer : SSO

Description : In _______ switching, the paths in thecircuit are separatedfrom one another spatially. A) time-division B) space-division C) two-dimensional D) three-dimensiona

Last Answer : space-division

Description : In most Wide Area Networks, the subnet consists of two distinct components: which are they? A. Transmission Lines and Switching Elements. B. host and subnet C. Transmission Lines and host D. subnet and Switching Elements.

Last Answer : A. Transmission Lines and Switching Elements.

Description : Explain the two approaches of packet switching techniques.

Last Answer : _ Datagram approach _ Virtual circuit approach _ Switched virtual circuit(SVC) _ Permanent virtual circuit(PVC) _ Circuit – switched connection versus virtual – circuit connection _ Path versus route _ Dedicated versus shared

Description : Microprocessors as switching devices are for which generation computers a. First Generation b. Second Generation c. Third Generation d. Fourth Generation

Last Answer : Fourth Generation