A set of rules that governs data
communication is called
a. Protocols
b. Standards
c. RFCs
d. Servers

1 Answer

Answer :

a. Protocols

Related questions

Description : A ________ is a set of rules that governs data communication. A) forum B) protocol C) standard D) none of the above

Last Answer : protocol

Description : A ________ is a set of rules that governs data communication

Last Answer : protocol

Description : Which NTC memorandum circular governs the rules and regulations about the manufacture, acquisition, sale and service of radio communication equipment? A. MC No. 2-05-88 B. MC No. 2-04-88 C. MC No. 2-07-88 D. MC No. 2-09-88

Last Answer : A. MC No. 2-05-88

Description : Protocols are? A. Agreements on how communication components and DTE's are to communicate. B. Logical communication channels for transferring data C. Physical communication channels sued for transferring data D. None of above

Last Answer : A. Agreements on how communication components and DTE's are to communicate.

Description : The IETF standards documents that describe various protocols applicable to the working of the Internet are called ________ a) RFC b) RCF c) ID d) DFC

Last Answer : a) RFC

Description : Which protocols adopted the standards of HDLC (High Level Link Control) protocol? a. X.25 protocol as LAPB (Link Access Procedure Balanced, V.42 protocol as LAPM (Link Access Procedure for ... Services Digital Network) protocol as LAPD (Link Access Procedure on D channel) d. All the above

Last Answer : d. All the above

Description : Protocols are set of rules to govern _________ a) Communication b) Standard c) Metropolitan communication d) Bandwidth

Last Answer : a) Communication

Description : State weather the following statement is true or false for ISDN - Integrated Services Digital Network ISDN is an effort to standardize subscriber services, provide user/network interfaces 2). the goal of ISDN is to form a Local ... C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false

Last Answer : A. 1. True, 2. false, 3. true

Description : Which of the following is NOT true about User Datagram Protocol in transport layer? a. Works well in unidirectional communication, suitable for broadcast information. b. It does three way ... File System d. The lack of retransmission delays makes it suitable for real-time applications

Last Answer : b. It does three way handshake before sending datagrams

Description : Transport layer protocols deals with _____ a. application to application communication b. process to process communication c. node to node communication d. man to man communication

Last Answer : b. process to process communication

Description : Transport layer protocols deals with _____ a. application to application communication b. process to process communication c. node to node communication d. man to man communication

Last Answer : b. process to process communication

Description : Transport layer protocols deals with ____________ A. application to application communication B. process to process communication C. node to node communication D. man to man communication

Last Answer : B. process to process communication

Description : State whether the following statements are true/false: 1) The standards of TCP/IP are published in a series of documents called NFC. 2) A Protocol is an agreement between the communicating parties on how communication is to proceed. a. 1.F,2.T b. 1.F, 2.F c. 1.T, 2.T d. 1.T, 2.F

Last Answer : a. 1.F,2.T

Description : The Monarch of the UK __________ (A) rules and governs. (B) reigns but does not rule. (C) reigns and rules. (D) rules but does not reign.

Last Answer : (B) reigns but does not rule.

Description : Which of the following technique isused for encapsulation? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets. B. a technique used by protocols in which a lower level ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : a technique used by protocols in which a lower level protocol accepts a message from ahigher level protocol and places it in the data portion of the low level frame

Description : Which of the following technique isused for fragment? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets B. a technique used by protocols in which a lower level protocol ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : one of the pieces that results when an IP gateway divides an IP datagram into smallerpieces for transmission acrossa network that cannothandle the originaldatagram size

Description : Choose the Protocols working in the Data Link Control Layer of OSI model below. a. ATM (Asynchronous Transfer Mode), Frame Relay b. HDLC (High Level Data Link Control), SDLC (Synchronous Data Link Control) c. ARP (Address Resolution Protocol), IEEE802.3 d. All the above

Last Answer : d. All the above

Description : Basically describe an rfcs system.

Last Answer : A keyer provides rf excitation, which can be shifted above or below the assigned frequency.

Description : A network consists of eight NT servers. You are planning to move servers to different segments of yournetwork, what utility should be used at eachserver to determine which server generates the most traffic? A. NBTSTAT B. NETSTAT.EXE C. Performance Monitor D. Network Monitor E. ARP.EXE

Last Answer : Network Monitor

Description : Which field of cookie in WWW represents the server's directory structure by identifying the utilization of part associated with server's file tree? a. Domain b. Path c. Content d. Secure

Last Answer : b. Path

Description : Suppose you are browsing the world wide web using a web browser and trying to access the web servers. What is the underlying protocol and port number that are being used? a. UDP, 80 b. TCP, 80 c. TCP, 25 d. UDP, 25

Last Answer : b. TCP, 80

Description : Generally TCP is reliable and UDP is not reliable. DNS which has to be reliable uses UDP because a. UDP is slower b. DNS servers has to keep connections c. DNS requests are generally very small and fit well within UDP segments d. None of these

Last Answer : c. DNS requests are generally very small and fit well within UDP segments

Description : The ______ are programs that run on DNS clients and DNS servers and that create queries to extract information from name servers. A. transporter B. distributers C. Resolvers D. both a and b

Last Answer : C. Resolvers

Description : TCP and UDP are called ________ a. Application protocols b. Session protocols c. Transport protocols d. Network protocols

Last Answer : c. Transport protocols

Description : A list of protocols used by a system, one protocol per layer, is called ________ a) protocol architecture b) protocol stack c) protocol suite d) protocol system

Last Answer : b) protocol stack

Description : State weather the following statement is true or false for Internetwork layer. 1).Other internetwork-layer protocols are IP, ICMP, IGMP, ARP, and RARP. 2). Internet Protocol (IP) is the least important protocol in this layer ... 3.true C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false

Last Answer : B. 1. true, 2. false, 3.true

Description : TCP and UDP are called ________ A. Application protocols B. Session protocols C. Transport protocols D. Network protocols

Last Answer : C. Transport protocols

Description : What is Onion diagram illustrates? a) It illustrates the connection between the layers in communications protocols, such as the International Standards Organization Open Systems Interconnection (ISO OSI) model,or the ... with the kernel at the core c) All of the mentioned d) None of the mentioned

Last Answer : None of the mentioned

Description : The purpose of the _______is to provide flow and error control for the upper-layer protocols that actually demand theseservices A) MAC B) LLC C) LLU D) none of the above

Last Answer : LLC

Description : Both Go-Back-N and Selective-Repeat Protocols use a_________. A) sliding frame B) sliding window C) sliding packet D) none of the above

Last Answer : sliding window

Description : To handleframesarrivingfrom other protocols, Frame Relay uses adevice calleda _________. A) VOFR B) FRAD C) MUX D) none of the above

Last Answer : FRAD

Description : In IPv6,a _______address is usedif aLAN uses the Internet protocols but isnot connected tothe Internet for security reasons. A) link local B) site local C) mapped D) none of the above

Last Answer : link local

Description : Which of the following layer protocols are responsible for user and theapplicationprogrammesupport such aspasswords, resource sharing, file transfer and network management? A. Layer 7 protocols B. Layer 6 protocols C. Layer 5 protocols D. Layer 4 protocols E. None of the above

Last Answer : Layer 7 protocols

Description : What device separates asingle network into two segmentsbut lets the twosegments appear as one tohigher protocols? A. Switch B. Bridge C. Gateway D. Router

Last Answer : Bridge

Description : Which of the following is used for modulation and demodulation? A. modem B. protocols C. gateway D. multiplexer E. None of the above

Last Answer : modem

Description : The standard suit of protocols used by the Internet, Intranets, extranets and some other networks. A) TCP/IP B) Protocol C) Open system D) Internet work processor

Last Answer : A) TCP/IP

Description : Which of the following of the TCP/IP protocols is the used for transferring files from one machine to another? A) FTP B) C) SNMP C) SMTP D) D) Rpe

Last Answer : A) FTP

Description : Which of the transport layer protocols is connectionless? A) UDP B) TCP C) FTP D) Nvt

Last Answer : A) UDP

Description : Which of the following TCP/IP protocols is used for transferring files form one machine to another. A) FTP B) SNMP C) SMTP D) RPC

Last Answer : A) FTP

Description : Which of the following protocols is an application layer protocol that establishes, manages and terminates multimedia sessions ? a. Session Maintenance Protocol b. Real - time Streaming Protocol c. Real - time Transport Control Protocol d. Session Initiation Protocol

Last Answer : d. Session Initiation Protocol

Description : Which of the following protocols is used by email server to maintain a central repository that can be accessed from any machine ? a. POP3 b. IMAP c. SMTP d. DMSP

Last Answer : b. IMAP

Description : Which of the following is/are example(s) of stateful application layer protocols? (i) HTTP (ii) FTP (iii) TCP (iv) POP3 a. (i) and (ii) only b. (ii) and (iii) only c. (ii) and (iv) only d. (iv) only

Last Answer : c. (ii) and (iv) only

Description : In one of the pairs of protocols given below, both the protocols can use multiple TCP connections between the same client and the server. Which one is that? a. HTTP, FTP b. HTTP, TELNET c. FTP, SMTP d. HTTP, SMTP

Last Answer : a. HTTP, FTP

Description : Which among the below mentioned protocols provides a mechanism of acquiring an IP address without manual intervention in addition to plug and play type of networking? a. BOOTP b. DHCP c. Both a & b d. None of the above

Last Answer : b. DHCP

Description : TELNET, FTP, SMTP, Protocols fall in the following layer of OSI reference model? a. Transport layer b. Internet layer c. Network layer d. Application layer

Last Answer : d. Application layer

Description : Which of the following transport layer protocols is used to support electronic mail? a. SMTP b. IP c. TCP d. UDP

Last Answer : c. TCP

Description : The transport layer protocols used for real time multimedia, file transfer, DNS and email, respectively are: a. TCP, UDP, UDP and TCP b. UDP, TCP, TCP and UDP c. UDP, TCP, UDP and TCP d. TCP, UDP, TCP and UDP

Last Answer : c. UDP, TCP, UDP and TCP

Description : Which of the following are transport layer protocols used in networking? a. TCP and FTP b. UDP and HTTP c. TCP and UDP d. HTTP and FTP

Last Answer : c. TCP and UDP

Description : Which of the following are transport layer protocols used in networking? a. TCP and FTP b. UDP and HTTP c. TCP and UDP d. HTTP and FTP

Last Answer : c. TCP and UDP

Description : What are the common protocols associated with the network layer? a. Address Resolution Protocol b. Reverse Address Resolution Protocol c. Internet protocol d. Neighbour Discovery Protocol

Last Answer : c. Internet protocol