In process to process delivery, an application process is assigned a ………….., which is likely to
be …………….each time that process is started
A. process identifier number , different
B. process identifier number, same
C. source, mixed
D. Source, similar

1 Answer

Answer :

A. process identifier number , different

Related questions

Description : An application process is assigned a process identifier number (process ID), which is likely to be _______ each time that process is started. A. Similar B. smaller C. different D. larger

Last Answer : C. different

Description : Each item of the Work Breakdown Structure is assigned a unique identifier. What is the name  of this identifier? 1. Product ID number  2. Code of accounts  3. Quality inspection identifier  4. Project activity code

Last Answer : 2. Code of accounts

Description : What is meant by a dedicated computer? a. Which is used by one person only b. Which is assigned one and only one task c. Which uses one kind of software d. Which is meant for application software

Last Answer : Which is assigned one and only one task

Description : The physical layer is concerned with ___________ a. bit-by-bit delivery b. process to process delivery c. application to application delivery d. port to port delivery

Last Answer : a. bit-by-bit delivery

Description : The physical layer is concerned with ___________ A. bit-by-bit delivery B. process to process delivery C. application to application delivery D. port to port delivery

Last Answer : A. bit-by-bit delivery

Description : The physical layer is concerned with ___________ a) bit-by-bit delivery p) process to process delivery c) application to application delivery d) port to port delivery

Last Answer : a) bit-by-bit delivery

Description : In IPv6, the _______ field inthe baseheader and thesender IP address combineto indicate aunique path identifier for aspecific flow of data. A) flow label B) nextheader C) hoplimit D) destination IP address

Last Answer : flow label

Description : Header of a frame generally contains a. synchronization bytes b. addresses c. frame identifier d. all of the mentioned

Last Answer : d. all of the mentioned

Description : Header of a Layer two frame usually contain ______________ A. synchronization bytes B. addresses C. frame identifier D. all of the mentioned

Last Answer : D. all of the mentioned

Description : The master list of an indexed file A. is sortedin ascending order B. containsonly a list of keys and record numbers C. has a number assigned toeach record D. both (b)and (c) E. None of the above

Last Answer : has a number assigned toeach record

Description : A subnet has been assigned a subnet mask of 255.255.255.192. What is the maximum number of hosts that can belong to this subnet? a. 14 b. 30 c. 62 d. 126

Last Answer : c. 62

Description : In ___________ methods, no station is superior to another station and none is assigned the controlover another. A) random access B) controlledaccess C) channelization D) none of the above

Last Answer : random access

Description : In the network 200.10.11.144/27, the fourth octet (in decimal) of the last IP address of the network which can be assigned to a host is ________ a. 158 b. 255 c. 222 d. 223

Last Answer : a. 158

Description : To avoid ambiguity, the names assigned to machines must be carefully selected from a ______ with complete control over the binding between the names and IP addresses A. Table B. look up table C. name space D. name table

Last Answer : C. name space

Description : Which layer is responsible for process to process delivery in a general network model? a) network layer b) transport layer c) session layer d) data link layer

Last Answer : b) transport layer

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : Consider different activities related to email: m1: Send an email from a mail client to a mail server m2: Download an email from mailbox server to a mail client m3: Checking email in a web browser Which is the application ... FTP m3: HTTP c. m1: SMTP m2: POP m3: HTTP d. m1: POP m2: SMTP m3: IMAP

Last Answer : c. m1: SMTP m2: POP m3: HTTP

Description : Which of the following assertions is FALSE about the Internet Protocol (IP)? a. It is possible for a computer to have multiple IP addresses b. IP packets from the same source to the same ... outgoing packets; the route is determined only by the routing tables in the routers on the way

Last Answer : d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way

Description : Key field is a unique identifier for each record. It is defined in the form of (a) rows (b) columns -Technology

Last Answer : (b) Key is a data item that allows you to uniquely identify individual occurrences which is defined as the column or set of columns.

Description : Processes on the remote systems are identified by ___________ a) host ID b) host name and identifier c) identifier d) process ID

Last Answer : host name and identifier

Description : A ________ is a 16-bit number used by the host-to-host protocol to identify to which higher- level protocol or application program (process) it must deliver incoming messages A. connection B. UDP C. port D. TCP

Last Answer : C. port

Description : In Bluetooth, the_____ link is used when avoiding latency (delay in data delivery) is more important than integrity (error-free delivery). A) SCO B) ACL C) ACO D) SCL

Last Answer : SCO

Description : The term ________ means that IP provides no error checking or tracking. IP assumes the unreliabilityof the underlying layers and does its best to get a transmission throughto its destination,but with ... ) reliable delivery B) connection-oriented delivery C) best-effort delivery D) noneof the above

Last Answer : best-effort delivery

Description : A best-effort delivery service suchas IPv4 includes _______. A) error checking B) error correction C) datagram acknowledgment D) noneof the above

Last Answer : noneof the above

Description : Which of the following technique isused for encapsulation? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets. B. a technique used by protocols in which a lower level ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : a technique used by protocols in which a lower level protocol accepts a message from ahigher level protocol and places it in the data portion of the low level frame

Description : Which of the following technique isused for fragment? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets B. a technique used by protocols in which a lower level protocol ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : one of the pieces that results when an IP gateway divides an IP datagram into smallerpieces for transmission acrossa network that cannothandle the originaldatagram size

Description : Which is the main function of transport layer? A) Node to node delivery B) End to end delivery C) Synchronization d) Updating and maintaining routing tables

Last Answer : B) End to end delivery

Description : The ……… protocol is based on end-to- end delivery. a. SMTP b. TCP c. IP d. SCTP

Last Answer : a. SMTP

Description : DDP stands for _________ a. Datagram Delivery Protocol b. Device Delivery Protocol c. Datagram Device Protocol d. Device Datagram Protocol

Last Answer : a. Datagram Delivery Protocol

Description : The ______ protocol is based on end-to-end delivery. A. SCTP B. TCP C. SMTP D. SCTP

Last Answer : C. SMTP

Description : The subnet gets increasingly loaded with packets causing increase in delay in the delivery of packets, which can lead to more retransmission, and ultimately increasing more and more traffic. This is a concept called as _________ A. blockage B. Traffic jam. C. Congestion D. both a and b

Last Answer : C. Congestion

Description : In virtual circuit network each packet contains ___________ a. full source and destination address b. a short VC number c. only source address d. only destination address

Last Answer : b. a short VC number

Description : In virtual circuit network each packet contains ___________ A. full source and destination address B. a short VC number C. only source address D. only destination address

Last Answer : B. a short VC number

Description : How does creating a social network marketing plan differ from a traditional marketing plan? A. The brand image should be completely different for social marketing B. The staff requirements and skill sets for ... method of delivery, a marketing plan either way will be similar D. None of the abov

Last Answer : B. The staff requirements and skill sets for social marketing are different

Description : . How does creating a social network marketing plan differ from a traditional marketing plan? *  The brand image should be completely different for social marketing  The staff requirements and skill sets ... the method of delivery, a marketing plan either way will be similar  None of the above

Last Answer :  The staff requirements and skill sets for social marketing are different

Description : What is meant by a dedicated computer? A) Which is used by one person only B) Which is assigned one and only one task C) Which uses one kind of software D) Which is meant for application software

Last Answer : Answer : B

Description : Point out the correct statement. a) Virtual machines are containers that are assigned specific resources b) Applications need not be mindful of how they use cloud resources c) When a developer ... a cloud service, the developer cannot attach to the appropriate service d) All of the mentioned

Last Answer : Virtual machines are containers that are assigned specific resources

Description : Point out the correct statement. a) Virtual machines are containers that are assigned specific resources b) Applications need not be mindful of how they use cloud resources c) When a developer ... uses a cloud service, the developercannot attach to the appropriate service d) All of the mentioned

Last Answer : Virtual machines are containers that are assigned specific resources

Description : What is meant by a dedicated computer? a. which is used by one person only b. which is assigned to one and only one task c. which does one kind of software d. which is meant for application software only

Last Answer : d. which is meant for application software only

Description : What is meant by a dedicated computer? a. Which is used by one person only b. Which is assigned one and only one task c. Which uses one kind of software d. Which is meant for application software

Last Answer : d. Which is meant for application software

Description : What is meant by a dedicated computer? a. Which is used by one person only b. Which is assigned one and only one task c. Which uses one kind of software d. Which is meant for application software

Last Answer : b. Which is assigned one and only one task

Description : AC and DC generators are similar in that they _____________. A. both generate alternating voltages B. both rectify the voltage before delivery C. are constructed at the same physical size for the same kilowatt rating D. both supply three-phase power

Last Answer : Answer: A

Description : Transport layer protocols deals with _____ a. application to application communication b. process to process communication c. node to node communication d. man to man communication

Last Answer : b. process to process communication

Description : Transport layer protocols deals with _____ a. application to application communication b. process to process communication c. node to node communication d. man to man communication

Last Answer : b. process to process communication

Description : The Application layer offers _______ service. A. End to end B. Process to process C. Both End to end and Process to process D. None of the mentioned

Last Answer : A. End to end

Description : Transport layer protocols deals with ____________ A. application to application communication B. process to process communication C. node to node communication D. man to man communication

Last Answer : B. process to process communication