Which of the following is used in the options field of IPv4 ? (A) Strict source routing (B) Loose source routing (C) time stamp (D) All of the above

1 Answer

Answer :

(D) All of the above

Related questions

Description : In IPv4 header, the field is needed to allow the destination host to determine which datagram a newly arrived fragment belongs to. (A) identification (B) fragment offset (C) time to live (D) header checksum

Last Answer : (A) identification

Description : Unspecified address......................of IPV6 address is equivalent to the IPV4 unspecified address 0.0.0.0. A) (: : 1) B) (: : ) C) (: : 0) D) (1 : : )

Last Answer : B) (: : )

Description : Loopback address ....................... of IPv6 address is equivalent to the IPV4 loopback address 127.0.0.1. A) (: : 1) B) (: : ) C) (: : 0) D) (1 : : )

Last Answer : A) (: : 1)

Description : Unspecified address ………………….. of IPV6 address is equivalent to the IPV4 unspecified address 0.0.0.0. A) (: : 1) B) (: : ) C) (: : 0) D) (1 : : )

Last Answer : B) (: : )

Description : Loopback address ……………………. of IPv6 address is equivalent to the IPV4 loopback address 127.0.0.1. A) (: : 1) B) (: : ) C) (: : 0) D) (1 : : )

Last Answer : A) (: : 1)

Description : IPv4 and IPv6 are addresses used to identify computers on the internet. Find the correct statement out of the following: (A) Number of bits required for IPv4 address is more than number of bits required for ... of bits required for IPv6 address. (D) Number of bits required for IPv4 address is 64. 

Last Answer : (C) Number of bits required for IPv4 address is less than number of bits required for IPv6 address.

Description : Which of the following fields in IPv4 datagram is not related to fragmentation? (A) Type of service (B) Fragment offset (C) Flags (D) Identification

Last Answer : (A) Type of service 

Description : Which of the stamp initiates the routing process in DTS?

Last Answer : SIGNED

Description : Open Short Path First (OSPF) ii) Routing Information Protocol (RIP) iii) Border Gateway Protocol (BGP) A) i only B) i, and ii only C) i and iii only D) All i, ii and iii

Last Answer : B) i, and ii only

Description : Which is the main function of transport layer? A) Node to node delivery B) End to end delivery C) Synchronization d) Updating and maintaining routing tables

Last Answer : B) End to end delivery

Description : When a mobile telephone physically moves from one to another cell, the base station transfers ownership to the cell getting strongest signal. This process is known as................. (A) handoff (B) mobile switching (C) mobile routing (D) cell switching

Last Answer : (A) handoff 

Description : In hierarchical routing with 4800 routers, what region and cluster sizes should be chosen to minimize the size of the routing table for a three layer hierarchy? (A) 10 clusters, 24 regions and 20 routers (B ... (C) 16 clusters, 12 regions and 25 routers (D) 15 clusters, 16 regions and 20 routers

Last Answer : (D) 15 clusters, 16 regions and 20 routers Rooters minimum, then regions minimum, then clusters minimum.

Description : Which of the following algorithms is not a broadcast routing algorithm ? (A) Flooding (B) Multidestination routing (C) Reverse path forwarding (D) All of the above

Last Answer : (D) All of the above

Description : Consider a subnet with 720 routers. If a three-level hierarchy is choosen with eight clusters, each containing 9 regions of 10 routers, then total number of entries in the routing table is ................... (A) 25 (B) 27 (C) 53 (D) 72

Last Answer : Answer: A  Explanation: Each router needs 10 entries for local routers, 8 entries for routing to other regions within its own cluster, and 7 entries for distant clusters, for a total of 25 entries.

Description : Which of the following is not a congestion policy at network layer? (A) Flow Control Policy (B) Packet Discard Policy (C) Packet Lifetime Management Policy (D) Routing Algorithm

Last Answer : (A) Flow Control Policy

Description : In link state routing algorithm after construction of link state packets, new routes are computed using: (1) DES algorithm (2) Dijkstra's algorithm (3) RSA algorithm (4) Packets 

Last Answer : Answer: 2

Description : Distance vector routing algorithm is a dynamic routing algorithm. The routing tables in distance vector routing algorithm are updated ........... (1) automatically (2) by server (3) by exchanging information with neighbour nodes. (4) with back up database

Last Answer : Answer: 3

Description : Which of the following concurrency protocol ensures both conflict serializability and freedom from deadlock ? (a) 2-phase Locking (b) Time stamp - ordering (A) Both (a) and (b) (B) (a) only (C) (b) only (D) Neither (a) nor (b)

Last Answer : (C) (b) only

Description : In the following graph, discovery time stamps and finishing time stamps of Depth First Search (DFS) are shown as x/y where x is discovery time stamp and y is finishing time stamp.  It shows which of the following depth first forest? (A ... {a,b,e} {f,g} {c,d} {h} (D) {a,b,c,d} {e,f,g} {h}

Last Answer : Answer: A

Description : A software design is highly modular if : (A) cohesion is functional and coupling is data type. (B) cohesion is coincidental and coupling is data type. (C) cohesion is sequential and coupling is content type. (D) cohesion is functional and coupling is stamp type.

Last Answer : (A) cohesion is functional and coupling is data type.

Description : In IPv4 header, an HLEN value of decimal 10 means _______ A. there are 10 bytes of options B. there are 40 bytes of options C. there are 10 bytes in the header D. there are 40 bytes in the header

Last Answer : D. there are 40 bytes in the header

Description : In IPv4, which field or bit value unambiguously identifies thedatagram as a fragment? A) Donot fragment bit ?0 B) More Fragment bit ?0 C) Fragment offset = 1000 D) noneof the above

Last Answer : Fragment offset = 1000

Description : An IPv4 datagram is fragmented into three smaller datagrams. Which of the following is true? A) Thedo not fragment bit is set to 1 for all three datagrams. B) The more fragment bit ... Theidentification fieldis the same for all three datagrams. D) Theoffset field is thesame for all three datagrams

Last Answer : Theidentification fieldis the same for all three datagrams.

Description : In IPv4, what is the lengthof the data field given an HLEN value of 12 and total length value of 40,000? A) 39,988 B) 40,012 C) 40,048 D) 39,952

Last Answer : 39,952

Description : In IPv4, what is the value of the total length field in bytes if the header is 28 bytes and the data field is 400bytes? A) 428 B) 407 C) 107 D) 427

Last Answer : 428

Description : What is the size of the ‘total length’ field in IPv4 datagram? a. 4 bit b. 8 bit c. 16 bit d. 32 bit

Last Answer : c. 16 bit

Description : An IPv4 datagram is fragmented into three smaller datagrams. Which of the following is true? A. The do not fragment bit is set to 1 for all three datagrams. B. The more fragment bit is set to 0 ... field is the same for all three datagrams. D. The offset field is the same for all three datagrams

Last Answer : C. The identification field is the same for all three datagrams.

Description : In IPv4, what is the value of the total length field in bytes if the header is 28 bytes and the data field is 400 bytes?

Last Answer : 428

Description : In IPv4, service type of service in header field, first 3 bits are called ______ a) Type of service b) Code bits c) Sync bits d) Precedence bits

Last Answer : d) Precedence bits

Description : In version field of IPv4 header, when machine is using some other version of IPv4 then datagram is __________ a) Discarded b) Accepted c) Interpreted d) Interpreted incorrectly

Last Answer : a) Discarded

Description : If a teacher had to establish his credibility in evaluating answer sheets he must be Options: A) strict B) lenient C) objective D) prompt

Last Answer : C) objective

Description : Who has the least chance of becoming an effective teacher? Options: A) One who is a strict disciplinarian. B) One who knows his subject well C) One who has no interest in teaching. D) One who teaches moral values.

Last Answer : C) One who has no interest in teaching. 

Description : Inclusive Education Options: A) celebrates diversity in the classroom B) encourages strict admission procedures C) includes indoctrination of facts D) includes teachers from marginalized groups

Last Answer : A) celebrates diversity in the classroom 

Description : Learners display individual differences. So a teacher should Options: A) provide a variety of learning experiences B) enforce strict discipline C) increase number of tests D) insist on uniform pace of learning

Last Answer : A) provide a variety of learning experiences 

Description : inside the classroom, before explaining the importance of topic, it is too important to Options: A) maintain strict discipline in the class B) get the attention of the students C) ask the students few questions from the last lecture D) all of the above

Last Answer : B) get the attention of the students 

Description : The most important cause of failure for teacher lies in the area of: Options: A) Inter personal relationship B) Lack of command over the knowledge of the subject C) Verbal ability D) Strict handling of the students

Last Answer : B) Lack of command over the knowledge of the subject 

Description : A teacher's major contribution towards the maximum self-realization of the student is affected through: Options: A) Constant fulfilment of the students' needs B) Strict control of class-room ... C) Sensitivity to students' needs, goals and purposes D) Strict reinforcement of academic standards

Last Answer : C) Sensitivity to students’ needs, goals and purposes 

Description : The teacher's major contribution towards the maximum self-realization of the child is best affected through Options: A) Constant fulfilment of the child's needs B) Strict control of class-room ... C) Sensitivity to pupil needs, goals and purposes D) Strict reinforcement of a academic standards

Last Answer : C) Sensitivity to pupil needs, goals and purposes 

Description : Which of the following is the best statement of the relationship of intelligence to delinquency? Options: A) Dull children are most likely to be apprehended and appear to be more often delinquent B) ... ad the imbeciles D) Delinquency is not a product of intelligence as much as of other factors

Last Answer : B) Dull children appear more frequently delinquent because they tend to come from slum areas where strict law enforcement prevails

Description : If a girl student prefers you beyond the ethical limits then how would you control your own emotions? Options: A) You will try to sublimate her emotions, as she is passing through the ... relish her emotionality D) You will have in mind the similar emotions but afraid of social dignity

Last Answer : A) You will try to sublimate her emotions, as she is passing through the adolescent stage

Description : Which of the following statements is most correct? A. For small companies, long-term debt is the principal source of external financing. B. Current assets of the typical manufacturing firm account ... the financial manager to make a decision and not address the issue again for several months.

Last Answer : B. Current assets of the typical manufacturing firm account for over half of its total assets.

Description : The Multicast Open Shortest Path First (MOSPF)protocol is an extension of the OSPF protocol that uses multicast routing to create source-based trees. The protocol is basedon _______ routing. A) distancevector B) link state C) path vector D) none of the above

Last Answer : link state

Description : Multicast link state routing uses the _______ tree approach. A) source-based B) group-shared C) a or b D) none of the above

Last Answer : source-based

Description : Which of the following assertions is FALSE about the Internet Protocol (IP)? a. It is possible for a computer to have multiple IP addresses b. IP packets from the same source to the same ... outgoing packets; the route is determined only by the routing tables in the routers on the way

Last Answer : d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way

Description : Which algorithm is used to decide the path to transfer the packets from source to destination? (1) Routing (2) Pathing (3) Selecting (4) Directing

Last Answer : Routing

Description : Which of the options can be made using the rubber stamp shown in the figure?

Last Answer : B, C

Description : Given the following statements: (a) Strategic value of data mining is time stamping (b) Information collection is an expensive process in building an expert system. Which of the following options is correct ? (A) Both (a) and (b) ... true (C) (a) is true, (b) is false (D) (a) is false, (b) is true

Last Answer :  (B) Both (a) and (b) are true

Description : Consider the following two statements : (a) Data scrubling is a process to upgrade the quality of data, before it is moved into Data warehouse. (b) Data scrubling is a process of rejecting data from data warehouse to create ... true (C) Both (a) and (b) are false (D) Both (a) and (b) are true

Last Answer : (A) (a) is true, (b) is false