Which of the following fields in IPv4 datagram is not related to fragmentation? (A) Type of service (B) Fragment offset (C) Flags (D) Identification

1 Answer

Answer :

(A) Type of service 

Related questions

Description : In IPv4 header, the field is needed to allow the destination host to determine which datagram a newly arrived fragment belongs to. (A) identification (B) fragment offset (C) time to live (D) header checksum

Last Answer : (A) identification

Description : Which fields of an IP packet provide for fragmentation of datagrams to allow differing MTUs in the internet? * Identification * Flags * Frag Offset * Type of Service * Total Length

Last Answer : Correct answer: A, B & C The following are the fields in an IP segment, their length, and their definitions: VERS (Version number - 16 bits) HLEN (Number of 32-bit words in the header - 4 bits) ... Address (32 bits) IP Options (network testing, debugging, security and others - 4 bits) Data (4 bits).

Description : An IPv4 datagram is fragmented into three smaller datagrams. Which of the following is true? A. The do not fragment bit is set to 1 for all three datagrams. B. The more fragment bit is set to 0 ... field is the same for all three datagrams. D. The offset field is the same for all three datagrams

Last Answer : C. The identification field is the same for all three datagrams.

Description : In IPv4, if the fragment offset hasa value of 100, it means that _______. A) thedatagram has notbeen fragmented B) thedatagram is 100 bytes in size C) thefirst byte of the datagram is byte100 D) the first byteof the datagram is byte800

Last Answer : the first byteof the datagram is byte800

Description : In an IPv4 datagram, the M bit is 0, the value of HLEN is 10, the value of total length is 400 and the fragment offset value is 300. The position of the datagram, the sequence numbers of the ... 2789 b. First fragment, 2400 and 2759 c. Last fragment, 2400 and 2759 d. Middle fragment, 300 and 689

Last Answer : c. Last fragment, 2400 and 2759

Description : In an IPv4 datagram, the M bit is 0, the value of HLEN is 10, the value of total length is 400 and the fragment offset value is 300. The position of the datagram, the sequence numbers of the ... 2789 b. First fragment, 2400 and 2759 c. Last fragment, 2400 and 2759 d. Middle fragment, 300 and 689

Last Answer : c. Last fragment, 2400 and 2759

Description : In IPv4, what is needed to determine thenumber of the last byte of a fragment? A) Identification number B) Offset number C) Total length D) (b) and (c)

Last Answer : (b) and (c)

Description : An IPv4 datagram is fragmented into three smaller datagrams. Which of the following is true? A) Thedo not fragment bit is set to 1 for all three datagrams. B) The more fragment bit ... Theidentification fieldis the same for all three datagrams. D) Theoffset field is thesame for all three datagrams

Last Answer : Theidentification fieldis the same for all three datagrams.

Description : What field tells the Internet layer how to handle an IP packet? * Type of Service * IdentificationFlags * Frag Offset

Last Answer : Correct answer: A The following are the fields in an IP segment, their length, and their definitions: VERS (Version number - 16 bits) HLEN (Number of 32-bit words in the header - 4 bits) Type of ... (32 bits) IP Options (network testing, debugging, security and others - 4 bits) Data (4 bits).

Description : In IPv4, which field or bit value unambiguously identifies thedatagram as a fragment? A) Donot fragment bit ?0 B) More Fragment bit ?0 C) Fragment offset = 1000 D) noneof the above

Last Answer : Fragment offset = 1000

Description : What are the problems involved in an IP Fragmentation Process? A. Loss of any fragment results in rejection of all datagrams B. Management of buffer space is essential to handle reassembly process C. No necessity of initializing ... -oriented IP service a. A & B b. C & D c. B& C d. A & D

Last Answer : a. A & B

Description : A best-effort delivery service suchas IPv4 includes _______. A) error checking B) error correction C) datagram acknowledgment D) noneof the above

Last Answer : noneof the above

Description : State the concept of fragmentation in IPv4. 

Last Answer : Fragmentation: When the maximum size of datagram is greater than maximum size of data that can be held a frame then the network layer divides the datagram received from x-port layer into ... copied into the fragment header. The three fields Flags, Fragmentation offset and Total length are altered.

Description : In IPv4, when a datagram is encapsulated in a frame, the total sizeof the datagram must beless thanthe _______. A) MUT B) MAT C) MTU D) noneof the above

Last Answer : MTU

Description : What is the size of the ‘total length’ field in IPv4 datagram? a. 4 bit b. 8 bit c. 16 bit d. 32 bit

Last Answer : c. 16 bit

Description : The maximum length (in bytes) of an IPv4 datagram is? A. 32 B. 1024 C. 65535 D. 512

Last Answer : C. 65535

Description : In IPv4 layer, datagram is of ________ a) Fixed length b) Variable length c) Global length d) Zero length

Last Answer : b) Variable length

Description : Header of datagram in IPv4 has _________ a) 0 to 20 bytes b) 20 to 40 bytes c) 20 to 60 bytes d) 20 to 80 bytes

Last Answer : c) 20 to 60 bytes

Description : In version field of IPv4 header, when machine is using some other version of IPv4 then datagram is __________ a) Discarded b) Accepted c) Interpreted d) Interpreted incorrectly

Last Answer : a) Discarded

Description : Which of the following is true about ICMP messages? A) An ICMP error message may be generated for an ICMP error message. B) An ICMP error message may be generated only for the first fragment. C) An ICMP error message may be generated for a multicast datagram. D) noneis true

Last Answer : An ICMP error message may be generated only for the first fragmen

Description : Which of the following is true about ICMP messages? A) An ICMP error message may be generated for an ICMP error message. B) An ICMP error message may be generated for each fragment. C) An ICMP error message may be generated for a multicast datagram. D) noneis true

Last Answer : noneis true

Description : Which of the following technique isused for fragment? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets B. a technique used by protocols in which a lower level protocol ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : one of the pieces that results when an IP gateway divides an IP datagram into smallerpieces for transmission acrossa network that cannothandle the originaldatagram size

Description : Which of the following is not a field in TCP header? a. Sequence number b. Fragment offset c. Checksum d. Window size

Last Answer : b. Fragment offset

Description : In the TCP/IP protocol suite, which one of the following is NOT part of the IP header? a. Fragment Offset b. Source IP address c. Destination IP address d. Destination port number

Last Answer : d. Destination port number

Description : For the implementation of a paging scheme, suppose the average process size be x bytes, the page size be y bytes, and each page entry requires z bytes. The optimum page size that minimizes the total overhead due to the page ... fragmentation loss is given by (A) x/2 (B) xz/2 (C) √2xz (D) (√xz)/2

Last Answer : (C) √2xz 

Description : Unspecified address......................of IPV6 address is equivalent to the IPV4 unspecified address 0.0.0.0. A) (: : 1) B) (: : ) C) (: : 0) D) (1 : : )

Last Answer : B) (: : )

Description : Loopback address ....................... of IPv6 address is equivalent to the IPV4 loopback address 127.0.0.1. A) (: : 1) B) (: : ) C) (: : 0) D) (1 : : )

Last Answer : A) (: : 1)

Description : Unspecified address ………………….. of IPV6 address is equivalent to the IPV4 unspecified address 0.0.0.0. A) (: : 1) B) (: : ) C) (: : 0) D) (1 : : )

Last Answer : B) (: : )

Description : Loopback address ……………………. of IPv6 address is equivalent to the IPV4 loopback address 127.0.0.1. A) (: : 1) B) (: : ) C) (: : 0) D) (1 : : )

Last Answer : A) (: : 1)

Description : IPv4 and IPv6 are addresses used to identify computers on the internet. Find the correct statement out of the following: (A) Number of bits required for IPv4 address is more than number of bits required for ... of bits required for IPv6 address. (D) Number of bits required for IPv4 address is 64. 

Last Answer : (C) Number of bits required for IPv4 address is less than number of bits required for IPv6 address.

Description : Which of the following is used in the options field of IPv4 ? (A) Strict source routing (B) Loose source routing (C) time stamp (D) All of the above

Last Answer : (D) All of the above

Description : The ……………. is used to provide integrity check, authentication and encryption to IP datagram. A) SSL B) ESP C) TSL D) PSL

Last Answer : B) ESP

Description : The data unit in the TCP/IP layer called a ..... A) Message B) Segment C) Datagram D) Frame

Last Answer : D) Frame

Description : What is the size of the 'total length' field in IPv 4 datagram ? (A) 4 bits (B) 8 bits (C) 16 bits (D) 32 bits

Last Answer : (C) 16 bits 

Description : Which among the below stated datagram discard code fields in ICMP is/are generated if a router fails to forward a packet due to administrative filtering? a. Source Route Failed b. Communication Administratively Prohibited c. Host Precedence Violation d. Precedence Cut-off in Effect

Last Answer : b. Communication Administratively Prohibited

Description : The ............... addressing mode is similar to register indirect addressing mode, except that an offset is added to the contents of the register. The offset and register are specified in the instruction. (A) Base indexed (B) Base indexed plus displacement (C) Indexed (D) Displacement

Last Answer : (D) Displacement

Description : Based on the identification of objectives, input, output and file content, the vital document is called … A) System Definition B) System Document C) System Requirement Document D) System Subject

Last Answer : B) System Document

Description : Software safety is a ................... activity that focuses on the identification and assessment of potential hazards that may affect software negatively and cause an entire ... monitoring and management (B) Software quality assurance (C) Software cost estimation (D) Defect removal efficiency

Last Answer : (B) Software quality assurance

Description : Blind image deconvolution is ................ (A) Combination of blur identification and image restoration (B) Combination of segmentation and classification (C) Combination of blur and non-blur image (D) None of the above

Last Answer : (A) Combination of blur identification and image restoration 

Description : Biosystematics aims at (a) the classification of organisms based on broad morphological characters (b) delimiting various taxa of organisms and establishing their relationships (c) the ... (d) identification and arrangement of organisms on the basis of their cytological characteristics.

Last Answer : (b) delimiting various taxa of organisms and establishing their relationships

Description : ………… enable us to hide, inside the object, both the data fields and the methods that act on that data. A) Encapsulation B) Polymorphism C) Inheritance D) Overloading

Last Answer : A) Encapsulation

Description : The relational model is based on the concept that data is organized and stored in two-dimensional tables called ………………………A) Fields B) Records C) Relations D) Keys

Last Answer : C) Relations

Description : In a relational schema, each tuple is divided into fields called A) Relations B) Domains C) Queries D) All of the above

Last Answer : B) Domains

Description : Consider the following statements for priority queue: S1: It is a data structure in which the intrinsic ordering of the elements does determine the result of its basic operations. S2: The elements of a priority queue ... . (C) SI is incorrect and S2 is correct. (D) Both S1 and S2 are correct.

Last Answer : (D) Both S1 and S2 are correct.

Description : Which of the following control fields in TCP header is used to specify the sender has no more data to transmit? (A) FIN (B) RST (C) SYN (D) PSH

Last Answer : (A) FIN 

Description : In IPv4, service type of service in header field, first 3 bits are called ______ a) Type of service b) Code bits c) Sync bits d) Precedence bits

Last Answer : d) Precedence bits

Description : Okazaki fragment is related to (A) DNA synthesis (B) Protein synthesis (C) mRNA formation (D) tRNA formation

Last Answer : Answer : A

Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received in the same order as sent order d. it sends data very quickly

Last Answer : a. all UDP packets are treated independently by transport layer

Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received ... order d. it sends data very quickly Answer: Option(a) 4. Transmission control protocol ____

Last Answer : a. all UDP packets are treated independently by transport layer

Description : User datagram protocol is called connectionless because _____________ A. all UDP packets are treated independently by transport layer B. it sends data as a stream of related packets C. it is received in the same order as sent order D. it sends data very quickly

Last Answer : A. all UDP packets are treated independently by transport layer