Which of the following is not associated with the session layer? (A) Dialog control (B) Token management (C) Semantics of the information transmitted (D) Synchronization

1 Answer

Answer :

(C) Semantics of the information transmitted 

Related questions

Description : Find out the OSI layer, which performs token management. A) Network Layer B) Transport Layer C) Session Layer D) Presentation Layer

Last Answer : C) Session Layer

Description : In OSI network architecture, the dialogue control and token management are responsibility of a. session layer b. network layer c. transport layer d. data link layer e. none of above

Last Answer : session layer

Description : In OSI network architecture, the dialogue control and token management are responsibility of a. session layer b. network layer c. transport layer d. data link layer

Last Answer : a. session layer

Description : Find out the OSI layer, which performs token management. A) Network Layer B) Transport Layer C) Session Layer D) Presentation Layer

Last Answer : C) Session Layer

Description : Find out the OSI layer, which performs token management. A) Network Layer B) Transport Layer C) Session Layer D) Presentation Layer

Last Answer : C) Session Layer

Description : The ____ layer is the network dialog controller. a. network b. transport c. session d. presentation

Last Answer : c. session

Description : Which is the main function of transport layer? A) Node to node delivery B) End to end delivery C) Synchronization d) Updating and maintaining routing tables

Last Answer : B) End to end delivery

Description : Delimiting and synchronization of data exchange is provided by __________ a. Application layer b. Session layer c. Transport layer d. Link layer

Last Answer : b. Session layer

Description : Delimiting and synchronization of data exchange is provided by __________ a. Application layer b. Session layer c. Transport layer d. Link layer

Last Answer : b. Session layer

Description : Delimiting and synchronization of data exchange is provided by __________ a) Application layer b) Session layer c) Transport layer d) Link layer

Last Answer : b) Session layer

Description : Which of the following protocols is an application layer protocol that establishes, manages and terminates multimedia sessions? (A) Session Maintenance Protocol (B) Real - time Streaming Protocol (C) Real - time Transport Control Protocol (D) Session Initiation Protocol

Last Answer : (D) Session Initiation Protocol

Description : ................ is the ability of multiple process to co-ordinate their activities by exchange of information A) Synchronization B) Mutual Exclusion C) Dead lock D) Starvation

Last Answer : A) Synchronization

Description : Which of the following is not the layer of TCP/IP protocol? A) Application Layer B) Session Layer C) Transport Layer D) Internetwork layer

Last Answer : B) Session Layer

Description : Which of the following OSI layers correspond to TCP/IP's application layer? A) Application B) IP Address C) Session D) All of the above

Last Answer : D) All of the above

Description : TCP/IP ................. layer corresponds to the OSI models to three layers. A) Application B) Presentation C) Session D) Transport

Last Answer : A) Application

Description : In which layer of OSI session is first check and then data is transmitted a. Application layer b. Presentation layer c. Session layer d. Transport layer

Last Answer : c. Session layer

Description : The most important and common protocols associated TCP/IP internetwork layer are. i) Internet protocol(IP) ii) Internet control Message Protocol(ICMP) iii) Bootstrap Protocol (BooTP) iv) Dynamic Host Configuration Protocol (DHCP) v) ... C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : The most important and common protocols associated TCP/IP internetwork layer are. i) Internet Protocol (IP) ii) Internet Control Message Protocol (ICMP) iii) Bootstrap Protocol (BOOTP) iv) Dynamic Host Configuration Protocol (DHCP) V) ... C) i, iii, iv and v only D) All i, ii, iii, iv and v only

Last Answer : D) All i, ii, iii, iv and v only

Description : .............. refers to a situation in which a process is ready to execute but is continuously denied access to a processor in deference to other processes. A) Synchronization B) Mutual Exclusion C) Dead lock D) Starvation

Last Answer : D) Starvation

Description : Synchronization is achieved by a timing device called a ................. which generates a periodic train of .................. (A) clock generator, clock pulse (B) master generator, clock pulse (C) generator, clock (D) master clock generator, clock pulse

Last Answer : Answer: A and D

Description : The start and stop bits are used in serial communication for (A) error detection (B) error correction (C) synchronization (D) slowing down the communication

Last Answer : (C) synchronization 

Description : Dining Philosopher's problem is a: (A) Producer-Consumer problem (B) Classical IPC problem (C) Starvation problem (D) Synchronization primitive

Last Answer : (B) Classical IPC problem

Description : Which of the following is not a congestion policy at network layer? (A) Flow Control Policy (B) Packet Discard Policy (C) Packet Lifetime Management Policy (D) Routing Algorithm

Last Answer : (A) Flow Control Policy

Description : Which among the following represents the objectives/requirements of Data Link Layer? a. Frame Synchronization b. Error & Flow Control c. Both a & b d. None of the above

Last Answer : c. Both a & b

Description : ……………….. is a high performance fiber optic token ring LAN running at 100 Mbps over distances upto 1000 stations connected. A) FDDI B) FDDT C) FDDR D) FOTR

Last Answer : A) FDDI

Description : ........... is a high performance fiber optic token ring LAN running at 100 Mbps over distances up to 1000 stations connected. A) FDDI B) FDDT C) FDDR D) FOTR

Last Answer : A) FDDI

Description : A node X on a 10 Mbps network is regulated by a token bucket. The token bucket is filled at a rate of 2 Mbps. Token bucket is initially filled with 16 megabits. The maximum duration taken by X to transmit at full rate of 10 Mbps is ............ secs. (1) 1 (2) 2 (3) 3 (4) 4

Last Answer : (2) 2 

Description : Application layer protocol defines ____ a.types of messages exchanged b.message format, syntax and semantics c.rules for when and how processes send and respond to messages d.all of the mentioned

Last Answer : d.all of the mentioned

Description : Which of the following is an application layer service? A) Network virtual terminal B) File transfer, access and management C) Mail service D) All of the above

Last Answer : C) Mail service

Description : Which is the main function of transport layer? A) Node to node delivery B) End to end delivery C) Synchronization d) Updating and maintaining routing tables

Last Answer : B) End to end delivery

Description : Header of a Layer two frame usually contain ______________ A. synchronization bytes B. addresses C. frame identifier D. all of the mentioned

Last Answer : D. all of the mentioned

Description : While initiating SSL session, the client code recognizes the SSL request and establishes a connection through TCP Part …………….. to the SSL code on the server. A) 420 B) 1032 C) 443 D) 322

Last Answer : C) 443

Description : Which layers of the OSI determines the interface often system with the user? A) Network B) Application C) Data link D) Session

Last Answer : B) Application

Description : Which layers of the OSI reference model are host-to-host layers ? (A) Transport, Session, Presentation, Application (B) Network, Transport, Session, Presentation (C) Data-link, Network, Transport, Session (D) Physical, Data-link, Network, Transport

Last Answer : (A) Transport, Session, Presentation, Application

Description : Given code word 1110001010 is to be transmitted with even parity check bit. The encoded word to be transmitted for this code is (A) 11100010101 (B) 11100010100 (C) 1110001010 (D) 111000101

Last Answer : (A) 11100010101 

Description : The message 11001001 is to be transmitted using the CRC polynomial x3+1 to protect it from errors. The message that should be transmitted is (A) 110010011001 (B) 11001001 (C) 110010011001001 (D) 11001001011

Last Answer : (D) 11001001011

Description : Which of the following protocols is an application layer protocol that establishes, manages and terminates multimedia sessions ? a. Session Maintenance Protocol b. Real - time Streaming Protocol c. Real - time Transport Control Protocol d. Session Initiation Protocol

Last Answer : d. Session Initiation Protocol

Description : Given the following statements : S1 : SLR uses follow information to guide reductions. In case of LR and LALR parsers, the look-aheads are associated with the items and they make use of the left context available to ... (C) S1 is correct and S2 is not correct. (D) S1 is correct and S2 is correct.

Last Answer : (D) S1 is correct and S2 is correct.

Description : In Unix operating system, special files are used to : (A) buffer data received in its input from where a process reads (B) provide a mechanism to map physical device to file names (C ... pointers associated with i-nodes (D) store information entered by a user application program or utility program

Last Answer : (B) provide a mechanism to map physical device to file names 

Description : Which of the following refers to the rectangular area for displaying information and running programs? a) Desktop b) Dialog box c) Menu d) Window e) None of these

Last Answer : d) Window

Description : hich of the following burst is used to broadcast the frequency and time synchronization control messages? a) FCCH and SCH b) TCH and DCCH c) RACH and TCH d) FCCH and DCCH

Last Answer : a) FCCH and SCH

Description : ………………………….. level supply information to strategic tier for the use of top management. A) Operational B) Environmental C) Competitive D) Tactical

Last Answer : D) Tactical

Description : ………………………. is an important factor of management information system. A) System B) Data C) Process D) All

Last Answer : A) System

Description : As compared to rental and leasing methods to acquire computer systems for a Management Information System (MIS), purchase method has following advantage : (A) It has high level of flexibility (B) It doesn’t require cash up-front (C) It is a business investment (D) Little risk of obsolescence

Last Answer : (C) It is a business investment

Description : What is lexical semantics ?

Last Answer : The branch of morphology that deals with the meaning of words is called lexical semantics .

Description : What is Semantics ?

Last Answer : Semantics Orr is economics.

Description : The rules that give meaning to the instructions. a) Semantics b) Syntax c) Code d) Cases

Last Answer : Answer: a Explanation: The answer is semantics. They are the rules that give meaning to the instructions. Syntax is the formal rules that ensure validation of code

Description : The formal grammar rules governing the construction of valid instruction. a) test case b) syntax c) program d) semantics

Last Answer : Answer: b Explanation: Syntax determines the grammatical rules in a code. Semantics give meaning to the instructions