Sessions are ended with ________ primitive
A. B-RELEASE. Request
B. R-RELEASE. request
C. S-RELEASE. request
D. A-RELEASE. request

1 Answer

Answer :

C. S-RELEASE. request

Related questions

Description : Automatic repeat request error management mechanism is provided by ________ a. logical link control sublayer b. media access control sublayer c. network interface control sublayer d. application access control sublayer

Last Answer : a. logical link control sublayer

Description : Automatic repeat request error management mechanism is provided by ________ A. logical link control sublayer B. media access control sublayer C. network interface control sublayer D. application access control sublayer

Last Answer : A. logical link control sublayer

Description : What are "any request for a file from a Web server“ in web analytics?  Hits  Sessions  Page views  Visitor

Last Answer : Hits

Description : Which of the following protocols is an application layer protocol that establishes, manages and terminates multimedia sessions ? a. Session Maintenance Protocol b. Real - time Streaming Protocol c. Real - time Transport Control Protocol d. Session Initiation Protocol

Last Answer : d. Session Initiation Protocol

Description : What occurs in the session layer? a.Data compression and encryption b.MAC address are handled c.binary to decimal conversion d.sessions are created

Last Answer : d.sessions are created

Description : When thecomputer provides the manager with a multiple choice of possible answers, the prompting technique is A. question and answer B. form filling C. open-ended question D. menu selection E. None of the above

Last Answer : menu selection

Description : Inthe _________ method, a special packet called a ______ circulates through the ring. A) reservation: control frame B) polling: poll request C) token passing: token D) none of the above

Last Answer : token passing: token

Description : ARQ stands for _______. A) Automatic repeatquantization B) Automatic repeat request C) Automatic retransmissionrequest D) Acknowledge repeat request

Last Answer : Automatic repeat request

Description : _________control inthe datalink layer is based on automatic repeat request, which is the retransmission of data. A) Flow B) Error C) Transmission D) none of the above

Last Answer : Transmission

Description : ICMP messagesare divided into two broad categories: _____________. A) query and error reporting messages B) request and response messages C) request and reply messages D) noneof the above

Last Answer : query and error reporting messages

Description : An ARP request is normally _______. A) broadcast B) multicast C) unicast D) noneof the above

Last Answer : broadcast

Description : The target hardware address on an Ethernet is _______ in an ARP request. A) 0x000000000000 B) 0.0.0.0 C) variable D) class dependent

Last Answer : 0x000000000000

Description : Which URL method of HTTP performs similar function as that of PUT method only with an exception of request comprising a list of differences that exhibit the necessity to get implemented in the existing file? a. POST b. GET c. PATCH d. OPTION

Last Answer : c. PATCH

Description : In which layer of OSI client send request to the server? a. Application layer b. Presentation layer c. Session layer d. Transport layer

Last Answer : c. Session layer

Description : ARQ stands for __________ a. Automatic Repeat Request b. Automatic Request Repeat c. Application Repeat Request d. Application Request Repeat

Last Answer : a. Automatic Repeat Request

Description : The network layer issues request to which layer? a. Transport layer b. Data layer c. Application layer d. Session layer

Last Answer : b. Data layer

Description : The network layer responds to request from which layer? a. Transport layer b. Data layer c. Application layer d. Session layer

Last Answer : a. Transport layer

Description : A certain population of ALOHA users manages to generate 70 request/sec. If the time is slotted in units of 50 msec, then channel load would be a. 4.25 b. 3.5 c. 350 d. 450

Last Answer : b. 3.5

Description : Which provision can resolve / overcome the shortcomings associated with duplication or failure condition of Stop and Wait Automatic Repeat Request protocol especially due to loss of data frames or non reception ... message b. Provision of checksum computation c. Both a & b d. None of the above

Last Answer : Provision of sequence number in the header of message

Description : Which is the protocol that maps varying IP addresses to the Physical MAC Address of a machine in a LAN network? a. ARQ (Automatic Repeat Request) b. ARP (Address Resolution Protocol) c. SLIP (Serial Line Internet Protocol) d. PLIP (Parallel Line Internet Protocol)

Last Answer : b. ARP (Address Resolution Protocol)

Description : The client code recognizes the SSL request and establishes a connection through TCP port ____ to the SSL code on the server A. 1023 B. 402 C. 443 D. 8080

Last Answer : C. 443

Description : Which of the following is present in both an HTTP request line and a status line? A. HTTP version number B. URL C. Method D. None of the above

Last Answer : A. HTTP version number

Description : Which is the protocol that maps varying IP addresses to the Physical MAC Address of a machine in a LAN network? A. ARQ Automatic Repeat Request B. ARP Address Resolution Protocol C. SLIP Serial Line Internet Protocol D. PLIP Parallel Line Internet Protocol

Last Answer : B. ARP Address Resolution Protocol

Description : Which are the events concerning RAG can occur in a system: a. Request for a resource b. Allocation of a resource c. Release of resource d. Allof these

Last Answer : d. Allof these

Description : An item on the University Book Shop's survey asks respondents to tell the shop, in their own words, what they like least about textbook shopping. This item would be an example of ________ question. A)an open-ended B)a dichotomous C)a forced-sum choice D)a multiple choice E)a scale

Last Answer : A)an open-ended

Description : When the router runs out of buffer space, this is called ________. * Source Quench * Redirect * Information Request * Low Memory

Last Answer : Correct answer: A Source quench is the process where the destination router, or end internetworking device will “quench” the date from the “source”, or the source router. This usually happens when the destination router runs out of buffer space to process packets.

Description : ‘Pusa Neem’ (Neem-oil coated urea)— product used as inhibitors for slow release, was designated and reported by—(A) Dr. Rajendra Prasad and Colleagues (B) Dr. R.S. Paroda (C) Dr. G.B. Singh (D) Dr. M.S. Randhawa

Last Answer : (A) Dr. Rajendra Prasad and Colleagues

Description : - MAC is to Ethernet what ________ is to Frame Relay. A. DLCI B. LCI C. PVC D. None of the above

Last Answer : DLCI

Description : In Bluetooth, multiple ________ form a network called a _________. A) scatternet; piconets B) piconets: scatternet C) piconets:bluenet D) bluenet; scatternet

Last Answer : piconets: scatternet

Description : A Bluetooth network is called a ________. A) piconet B) scatternet C) bluenet D) none of the above

Last Answer : piconet

Description : The IEEE 802.11 wireless LANs use ________ types of frames. A) four B) five C) six D) none of the above

Last Answer : none of the above

Description : In IEEE 802.11, astation with ________ mobility can move from one ESS toanother. A) no-transition B) BSS-transition C) ESS-transition D) none of the above

Last Answer : ESS-transition

Description : In IEEE 802.11, astation with ________ mobility iseither stationary (not moving) or moving only insidea BSS. A) no-transition B) BSS-transition C) ESS-transition D) none of the above

Last Answer : no-transition

Description : . In IEEE 802.11, communication between two stations in twodifferent BSSs usually occurs viatwo ________. A) BSSs B) ESSs C) APs D) none of the above

Last Answer : APs

Description : In the ________ method, a stationneeds to make a reservationbefore sending data. Time is divided into intervals. A) reservation B) polling C) token passing D) none of the above

Last Answer : reservation

Description : In ________,a station monitors the medium after it sends a frame to see if the transmission was successful. If so, the station is finished. If, however, there is a collision, the frameis sentagain. A) CSMA/CA B) CSMA/CD C) either (a)or (b) D) both (a) and (b)

Last Answer : CSMA/CD

Description : ________ requires that each station first listento the medium before sending. A) MA B) CSMA C) FDMA D) CDMA

Last Answer : CSMA

Description : 1000Base-SX, 1000Base-LX, and 1000Base-CX use _________ block coding and ________ line coding. A) 4B/5B; NRZ B) 8B/10B; NRZ C) 4B/5B; MLT-3 D) 8B/10B; NRZ

Last Answer : 8B/10B; NRZ

Description : 100Base-FX uses_________ block coding and ________ linecoding. A) 4B/5B; NRZ-I B) 8B/10B; NRZ C) 4B/5B; MLT-3 D) 8B/10B; NRZ

Last Answer : 4B/5B; NRZ-I

Description : 100Base-TX uses_________ block coding and ________ linecoding. A) 4B/5B; NRZ B) 8B/10B; NRZ C) 4B/5B; MLT-3 D) 8B/10B; NRZ

Last Answer : 4B/5B; MLT-3

Description : ________ uses two pairsof twisted-pair cable. A) 100Base-TX B) 100Base-FX C) 100Base-T4 D) none of the above

Last Answer : 100Base-TX

Description : The maximum frame length for 10-Mbps Ethernet is ________ bytes. A) 1518 B) 1500 C) 1200 D) none of the abov

Last Answer : 1518

Description : ________ is actually a multiport repeater. It is normally usedto createconnections between stations in a physical star topology. A) An activehub B) A passivehub C) either (a)or (b) D) neither (a) nor (b)

Last Answer : An activehub

Description : In one's complement arithmetic, if positive 7 is 0111, then negative 7 is ________. A) 1111 B) 1101 C) 1000 D) none of the above

Last Answer : 1101

Description : In block coding, ifn = 5, the maximum Hamming distance between two codewords is ________. A) 2 B) 3 C) 5 D) none of the above

Last Answer : 5

Description : The Hamming distance between 100 and 001 is ________. A) 2 B) 0 C) 1 D) none of the above

Last Answer : 2

Description : The ________ between two words is the number ofdifferences between corresponding bits. A) Hamming code B) Hamming distance C) Hamming rule D) none of the above

Last Answer : Hamming distance

Description : We can divide coding schemes intotwobroad categories: ________ and______coding. A) block; linear B) linear; nonlinear C) block; convolution D) none of the above

Last Answer : block; convolution